Tunpan |
Apinun |
2002 |
A long-term rate scheduling framework for bulk data multicast dissemination in hybrid heterogeneous satellite-terrestrial networks |
M. Scott Corson |
Tung |
Immanuel |
1977 |
A language-acceptor type of probabilistic cellular automation |
Edmundson |
Tsuneto-Rager |
Reiko |
1999 |
Efficient Refinement Strategies for HTN Planning |
Hendler |
Tsoumakos |
Dimitrios |
2006 |
Search, Replication and Grouping for Unstructured P2P Networks |
Nicholas Roussopoulos |
Tsepenekas |
Leonidas |
2022 |
On Algorithmic Fairness and Stochastic Models for Combinatorial Optimization and Unsupervised Machine Learning |
Aravind Srinivasan |
Trinh |
Michael |
2006 |
Achieving Global Synchrony in a Distributed System with Free-Running Local Clocks |
Ashok Agrawala |
Trinh |
Khoa |
2017 |
Approximation Algorithms for Facility Location and
Clustering Problems |
Aravind Srinivasan |
Trigg |
Randall |
1983 |
A network-based approach to text handling for the online scientific community |
Rieger |
Trapnell |
Bruce |
2010 |
Transcript Assembly and Abundance Estimation
with High-Throughput RNA Sequencing |
Steven Salzberg |
Tran |
Son |
2008 |
Robust Techniques for Visual Surveillance |
Larry Davis |
Tiwari |
Ananta |
2011 |
Turning Parallel Applications in Parallel |
Jeffrey K. Hollingsworth |
Tikir |
Mustafa |
2005 |
Using Hardware Monitors to Automatically Improve Memory Performance |
Jeffrey K. Hollingsworth |
Tian |
Jianhui |
1992 |
Understanding and using program complexity to improve software development |
Marvin Zelkowitz |
Thompson |
Scott |
1994 |
Growth models for shapes |
Azriel Rosenfeld |
Thomas |
William |
1997 |
Evolutionary approaches for software engineering empirical modeling |
Victor Basili |
Thomas |
Scott |
2007 |
On an Apparent Limit to Verb Idiosyncrasy, given a Mapping between Argument Realization and Polysemy (or Argument Optionality) |
Don Perlis |
Thitikamol |
Kritchalach |
2000 |
Dynamic Software DSM Systems |
Pete Keleher |
Thiruvengadam |
Aishwarya |
2017 |
Improving Round Complexity of Ideal-Cipher Constructions |
Jonathan Katz |
Thareja |
Ashok |
1982 |
Buffer Allocation Policies For Message Switching Networks |
Ashok Agrawala |
Terry |
Jordan Kirby |
2023 |
Multi-Agent Reinforcement Learning: Systems for Evaluation and Applications to Complex Systems |
|
Teo |
Ching Lik |
2015 |
Computational Mid-Level Vision:
From Border Ownership to Categorical
Object Recognition |
John Aloimonos |
Teng |
Yangpin |
1993 |
Parallel processing of geometric structures :6isibility and triangulation algorithms |
Larry Davis |
Tas |
Nazif |
2010 |
Link Adaptation in Wireless Networks: A
Cross-Layer Approach |
Ashok Agrawala |
Tarkan |
Sureyya |
2013 |
Interactive Visual Displays for Results Management
In Complex Medical Workflows |
Ben Shneiderman |
Tanin |
Egemen |
2001 |
Browsing Large Online Data Using Exploratory Overviews |
Ben Shneiderman |
Tang |
Zhenyu |
2022 |
Efficient Acoustic Simulation for Learning-based Virtual and Real-World Audio Processing |
Dinesh Manocha |
Tan |
Qingyang |
2023 |
Learning-based Physics Simulation with Collision Handling |
Dinesh Manocha |
Tahmoush |
David |
2008 |
Similarity Classification and Retrieval in
Cancer Images and
Informatics |
Hanan Samet |
Taheri |
Sima |
2013 |
Subspace Representations for Robust Face and Facial
Expression Recognition |
|
Taha |
Ahmed |
2021 |
Closing the Gap Between Classification and Retrieval Models |
Larry Davis |
Tagamets |
Malle |
1994 |
Self-organization of spatio-temporal behaviors in an oscillatory neural network |
James Reggia |
Sze |
Tsz Wo |
2007 |
On Solving Univariate Polynomial Equations over Finite Fields and Some Related Problems |
Clyde Kruskal |
Sylvester |
Jared |
2014 |
Neurocomputational Methods for Autonomous
Executive Control |
James Reggia |
Sweet |
Ian Nicholas |
2022 |
Language-Based Techniques for Secure Programming |
Michael Hicks |
Swamy |
Nikhil |
2008 |
Language-Based Enforcement of User-Defined Security Policies As Applied to Multi-tier Web Programs |
Michael Hicks |
Sutton |
Granger |
1992 |
Competitive learning and map formation in artificial neural networks using competitive activation mechanisms |
James Reggia |
Sussmann |
Yoram |
1999 |
Approximation Algorithms for Facility Location Problems |
Samir Khuller |
Suryan |
Varun |
2022 |
Efficient Environment Sensing and Learning for Mobile Robots |
Pratap Tokekar |
Sun |
Jin |
2018 |
Finding Objects in Complex Scenes |
David Jacobs |
Sun |
Yanchao |
2023 |
Towards Robust and Adaptable Real-World Reinforcement Learning |
Furong Huang |
Sun |
Xiaobai |
1991 |
A unified analysis of numerical methods for nearly uncoupled Markov chains |
G.W. (Pete) Stewart |
Sun |
Xuetong |
2021 |
Towards Effective Displays for Virtual and Augmented Reality |
Amitabh Varshney |
Summers-Stay |
Douglas |
2014 |
Productive Vision: Methods for Automatic Image Comprehension |
John Aloimonos |
Sullins |
John |
1990 |
Distributed learning: Motion in constraint space |
John Aloimonos |
Suh |
Bongwon |
2005 |
Image Management Using Pattern Recognition Systems |
Ben Bederson |
Suciu |
Octavian |
2021 |
Data-Driven Techniques For Vulnerability Assessments |
Tudor Dumitras |
Subramani |
K. |
2000 |
Duality in the Parametric Polytype and its Application to a scheduling Problem |
Ashok Agrawala |
Subbarao |
Muralidha |
1986 |
Interpretation of visual motion:! computational study |
Larry Davis |
Su |
Yuan |
2020 |
Algorithms for quantum simulation: design, analysis, implementation, and application |
Andrew Childs |
Stuckman |
Jeffrey |
2015 |
Continuous, Effort-Aware Prediction of
Software Security Defects |
James Purtilo |