Nelson |
Randal |
1988 |
Visual navigation |
John Aloimonos |
Neamtiu |
Iulian |
2008 |
Practical Dynamic Software Updating |
Michael Hicks |
Nayak |
Kartik |
2018 |
Efficient Data-Oblivious Computation |
Jonathan Katz |
Navlaka |
Saket |
2010 |
Algorithms to Explore the Structure and
Evolution of Biological Networks |
Carl Kingsford |
Narayanan |
P.J. |
1992 |
|
Larry Davis |
Nandy |
Kaustav |
2015 |
Segmentation and Informatics in
Multi-Dimensional Fluorescence
Optical Microscopy Images |
|
Namata |
Galileo |
2012 |
Identifying Graphs from Noisy Observational Data |
Lise Getoor |
Nam |
Beomseok |
2007 |
Distributed Multidimensional Indexing for Scientific Data Analysis Applications |
Alan Sussman |
Nakamura |
Taiga |
2007 |
Recurring Software Defects in High End Computing |
Victor Basili |
Najibikohnehshahri |
Mahyar |
2020 |
|
Larry Davis |
Nair |
Suraj Rajappan |
2023 |
Effective and Efficient Search Across Languages |
Doug Oard |
Nagel |
Roger |
1976 |
Computer detection of freehand forgeries |
Azriel Rosenfeld |
Nagaraja |
Varun |
2016 |
Context Models for Understanding Images and Videos |
Larry Davis |
Nadeem |
Tamer |
2006 |
Efficient Cross Layer Designs for IEEE 802.11 |
Ashok Agrawala |
Myers |
Austin |
2017 |
From Form to Function:
Detecting the Affordance of Tool Parts
using Geometric Features and Material Cues |
John Aloimonos |
Murphy |
Sandra |
1990 |
Service specification and protocol construction for a layered architecture |
A. Udaya Shankar |
Murphy |
Jack |
1986 |
Matrix computations by Monte Carlo optimization |
Edmundson |
Murphy |
Michael |
2001 |
Geometric Algorithms in Control-Volume Meshing |
David Mount |
Mukherjee |
Sarit |
1993 |
A Multiclass Preemptive Protocol for High Speed Local and Metropolitan Area Networks |
Satish Kumar Tripathi |
Mukherjee |
Koyel |
2013 |
Algorithmic Approaches to Reducing Resource Costs in Data Centers |
Samir Khuller |
Moustafa |
Walaa El-Din |
2013 |
Declarative Cleaning, Analysis, and Querying of Graph-structured Data |
Amol Deshpande |
Motteler |
Howard |
1987 |
A mathematical model of static dataflow |
Carl Herbert Smith |
Mosse |
Daniel |
1993 |
A Framework for the Development and Deployment of Fault Tolerant Applications in Real-Time Systems |
Ashok Agrawala |
Morselli |
Ruggero |
2006 |
Lookup Protocols and Techniques for Anonymity |
Jonathan Katz |
Morimoto |
Carlos |
1997 |
Electronic digital image stabilization :$esign and evaluation, with applications |
|
Morgenthaler |
David |
1981 |
Three-dimensional digital image processing |
Azriel Rosenfeld |
Morell |
Larry |
1983 |
A theory of error-based testing |
Richard G. Hamlet |
Morariu |
Vlad |
2010 |
Analyzing Structured Scenarios by Tracking
People and Their Limbs |
Larry Davis |
Moon |
Bongki |
1996 |
Data placement for high performance spatio-temporal databases |
Joel Saltz |
Moon |
Soo-Mook |
1993 |
Compile-time Parallelization of Non-numerical Code VLIW and Superscalar |
Ashok Agrawala |
Montemayor |
Jaime |
2003 |
Physical Programming |
Hendler |
Monroe |
Megan |
2014 |
Interactive Event Sequence Query and Transformation |
Ben Shneiderman |
Monner |
Derek |
2011 |
A Neurocomputational Model of Grounded Language Comprehension
And Production at the Sentence Level |
James Reggia |
Mondal |
Jayanta |
2016 |
Real-Time Querying and Analytics on Large Dynamic
Graphs |
Amol Deshpande |
Mohr |
Jeffrey |
1980 |
On the characterization of computer systems' workloads |
Ashok Agrawala |
Mittal |
Anurag |
2002 |
Surveillance under Severe Occlusions |
Larry Davis |
Mittal |
Trisha |
2023 |
Towards Multimodal and Context-Aware Emotion Perception |
Dinesh Manocha |
Mitrokhin |
Anton |
2020 |
Motion Segmentation and Egomotion Estimation with Event-Based Cameras |
John Aloimonos |
Mitchell |
Elizabeth |
1990 |
A competitive activation mechanism for semantic inference |
James Reggia |
Mishra |
Arunesh |
2005 |
Supporting Secure and Transparent Mobility in Wireless-Local-Area Networks |
William Arbaugh |
Mirrashed |
Fatemeh |
2013 |
Domain Adaptive Object Recognition and Detection |
Larry Davis |
Mintz |
Doron |
1991 |
Robustness by consensus |
Azriel Rosenfeld |
Milton |
Leslie |
2016 |
User Behavioral Modeling of Web-based
Systems for Continuous User Authentication |
|
Miller |
Andrew |
2016 |
Provable Security for Cryptocurrencies |
Jonathan Katz |
Miller |
Michael |
1993 |
A view of one's past and other aspects of reasoned change in belief |
Don Perlis |
Milgram |
David |
1973 |
Web automata |
Azriel Rosenfeld |
Micinski |
Kristopher |
2017 |
Interaction-Based Privacy Policies for Mobile Apps |
Jeffrey Foster |
Miao |
Hui |
2018 |
Provenance Management for Collaborative Data Science Workflows |
Amol Deshpande |
Mestre |
Julian |
2007 |
Primal-Dual Algorithms for Combinatorial Optimization Problems |
Samir Khuller |
Meshry |
Moustafa Mahmoud |
2022 |
Neural Rendering Techniques for Photo-realistic Image Generation and Novel View Synthesis |
Abhinav Shrivastava, Larry Davis |