Strecker |
Jaymie |
2009 |
Accounting for Defect Characteristics in Emprical Studies of Software Testing |
|
Stoker |
Geoffrey |
2014 |
Analyzing the Combined Effects of Measurement
Error and Perturbation
Error on Performance Announcement |
Jeffrey K. Hollingsworth |
Stockman |
George |
1977 |
A problem-reduction approach to the linguistic analysis of waveforms |
|
Stevenson |
Suzanne |
1994 |
A Competitive Attachment Model for Resolving Syntactic Ambiguities in Natural Language Parsing |
James Reggia |
Stevens |
Rock |
2021 |
Optimizing Proactive Measures for Security Operations |
Michelle Mazurek |
Stathatos |
Konstantinos |
1998 |
Adaptive Techniques for Hybrid Delivery |
Nicholas Roussopoulos |
Stanfill |
Craig |
1983 |
Form and function :4he representation of machines |
Reiger |
Srivastava |
Saurabh |
2010 |
Satisfiability-Based Program Reasoning and Synthesis |
Jeffrey Foster |
Srinivasan |
Shravan |
2023 |
Data Structures and Protocols for Scalability and Security of Distributed Consensus |
|
Srinivasan |
Balaji Vasan |
2011 |
Scalable Learning for Geostatistics and Speaker Recognition |
Ramani Duraiswami |
Spetsakis |
Minas |
1991 |
The geometry and statistics of visual motion |
John Aloimonos |
Spector |
Lee |
1992 |
Supervenience in Dynamic World Planning |
Hendler |
Spacco |
Jaime |
2006 |
Marmoset: a Programming Project Assignment Framework to Improve the Feedback Cycle for Students, Faculty and Researchers |
William Pugh |
Song |
Zhexuan |
2003 |
Indexing Moving Objects |
Nicholas Roussopoulos |
Song |
Junehwa |
1997 |
Structured multimedia documents :$esign and presentation in a distributed environment |
|
Song |
Charles |
2011 |
Understanding, Discovering and Leveraging a Software System’s Effective
Configuration Space |
Adam Porter |
Song |
Sukhyun |
2012 |
Decentralized Network Bandwidth Prediction and Node Search |
Alan Sussman |
Son |
Sang |
1986 |
On Reliability Mechanisms in Distributed Database Systems |
Ashok Agrawala |
Soffer |
Aya |
1995 |
Retrieval by content in symbolic-image databases |
Hanan Samet |
Soares |
Joao |
2015 |
Efficient Image Segmentation and
Segment-Based Analysis in Computer Vision Applications |
David Jacobs |
Snover |
Matthew |
2010 |
Improving Statistical Machine Translation
Using Comparable Corpora |
Bonnie Dorr |
Smith |
Stephen |
1997 |
Task-Network Planning using Total-Order Forward Search, and Applications to Bridge and to Microwave-Module Manufacture |
Dana Nau |
Sliva |
Amy |
2011 |
Scalable Techniques for Behavioral Analysis and
Forecasting |
V.S. Subrahmanian |
Siy |
Harvey |
1996 |
Identifying the mechanisms driving code inspection costs and benefits |
Adam Porter |
Sivan |
Ron |
1995 |
Surface modeling using quadtrees |
Hanan Samet |
Sismanis |
John |
2004 |
Dwarf: A Complete System for Analyzing High-Dimensional Datasets |
Nicholas Roussopoulos |
Sirin |
Evren |
2006 |
Combining Description Logic Reasoning with AI Planning for Composition of Web Services |
Hendler |
Singla |
Sahil |
2023 |
Reliable Deep Learning: a Robustness Perspective |
Soheil Feizi |
Singhal |
Mukesh |
1986 |
Concurrency Control Algorithms and their Performance in Replicated Database Systems |
Ashok Agrawala |
Singhal |
Swati |
2022 |
A FLEXIBLE APPROACH FOR ORCHESTRATING ADAPTIVE SCIENTIFIC WORKFLOWS FOR SCALABLE COMPUTING |
Alan Sussman |
Singh |
Chahat Deep |
2023 |
|
|
Singh |
Bharat |
2018 |
Detecting Objects and Actions with Deep Learning |
Larry Davis |
Simari |
Gerardo |
2010 |
Stochastic Reasoning with Action
Probabilistic Logic Programs |
V.S. Subrahmanian |
Silberberg |
David |
2002 |
Uniform and High-level intelligent Access to Heterogeneous Information Sources |
Hendler |
Silberberg |
Teresa |
1985 |
Three dimensional object recognition using linear features and oriented model points |
Larry Davis |
Silaghi |
Bujor-Dorin |
2003 |
Replication Techniques for Peer-to-Peer Networks |
Pete Keleher |
Siddiquie |
Behjat |
2011 |
Image Retrieval based on Complex Descriptive Queries |
Larry Davis |
Shulman |
David |
1991 |
A theory of discontinuous regularization |
John Aloimonos |
Shull |
Forrest |
1998 |
Developing Techniques for Using Software Documents: A Series of Empirical Studies |
Victor Basili |
Shroff |
Nitesh |
2012 |
|
|
Shpeisman |
Tatiana |
1999 |
|
William Pugh |
Shkuro |
Yuri |
2001 |
Functional Specialization in Redundant Modular Neural Networks |
James Reggia |
Shivashankar |
Vikas |
2015 |
Hierarchical Goal Networks:
Formalisms and Algorithms for Learning and Acting |
Dana Nau |
Shin |
Christian |
2000 |
The Roles of Document Structure in Document Image Retrieval and Classification |
Azriel Rosenfeld |
Shin |
Min-ho |
2007 |
Localized Distributed Hash Table (LDHT): A Fast Scalable Peer-to-Peer Lookup Service in Multi-Hop Wireless Networks |
William Arbaugh |
Shin |
Ji Sun |
2009 |
Enhancing Privacy in Cryptographic Protocols |
Virgil Gligor |
Shim |
Kyuseok |
1993 |
Advanced query optimization techniques for relational database systems |
Timos Sellis |
Shet |
Vinay |
2007 |
Billatice Based Logical Reasoning for Automated Visual Surveillance and Other Applications |
Larry Davis |
Sherwood |
Robert |
2008 |
Discovering and Securing Shared Resources on the
Internet |
Bobby Bhattacharjee |
Sherlekar |
Deepak |
1987 |
Graph Dissection Techniques for VLSI and Algorithms |
|