Kao |
Chiung-Tung |
1992 |
Efficient/practical algorithms for geometric structures :#onvex hulls, Delaunay triangulations and Voronoi diagrams |
Hanan Samet |
Karagol-Ayan |
Burcu |
2007 |
Resource Generation from Structured Documents for Low-Density Languages |
Amy Weinberg |
Karinthi |
Raghu |
1990 |
An Algebraic Approach to Feature Interactions |
Dana Nau |
Karlson |
Amy |
2007 |
Interface and Interaction Design for One-Handed Mobile Computing |
Ben Bederson |
Kashyap |
Srinivas |
2007 |
Algorithms for Data Placement, Reconfiguration and Monitoring in Storage Networks |
Samir Khuller |
Kasif |
Simon |
1984 |
Analysis of Parallelism in Logic Programs |
|
Katz |
Moshe Matanya |
2023 |
Software-Defined Software |
Ashok Agrawala |
Katz |
Garrett |
2017 |
A Cognitive Robotic Imitation Learning System Based On Cause-Effect Reasoning |
James Reggia |
Kaya |
Yigitcan |
2023 |
The Limitations of Deep Learning Methods in Realistic Adversarial Settings |
Tudor Dumitras |
Kayyoor |
Ashwin |
2014 |
Minimizing Resource Consumption
through Workload Consolidation in
Large-Scale Distributed Data Platforms |
Amol Deshpande |
Kelley |
David |
2011 |
Computational Methods to Improve Genome Assembly and
Gene Prediction |
Steven Salzberg |
Kelly |
Wayne |
1996 |
Optimization within a Unified Transformation Framework |
William Pugh |
Kettler |
Brian |
1995 |
Case-based Planning with a High-Performance Parallel Memory |
Hendler |
Khamis |
Sameh |
2015 |
Leveraging Structure in Activity
Recognition: Context and Spatiotemporal Dynamics |
Larry Davis |
Khani |
Mohammadreza |
2015 |
Revenue Efficient Mechanisms for
Online Advertising |
Mohammad Hajiaghayi |
Khoo |
Yit Phang |
2013 |
User-Centered Program Analysis Tools |
Michael HicksJeffery Foster |
Khurana |
Udayan |
2015 |
Historical Graph Data Management |
Amol Deshpande |
Kim |
Kyungnam |
2005 |
Algorithms and Evaluation for Object Dectection and Tracking in Computer Vision |
Larry Davis |
Kim |
Yoo |
2005 |
Algorithms for Data Migration |
Samir Khuller |
Kim |
Taehyeong |
1996 |
Toward optimizing distributed programs directed by configurations |
James Purtilo |
Kim |
Chee |
1986 |
Virtual Waiting Time Analysis of an Erlangian Single Server Queuing System and Its Applications |
Ashok Agrawala |
Kim |
Jung-Min |
2001 |
Mechanisms Driving Costs and Benefits of Regression Test Selection Techniques |
Adam Porter |
Kim |
Youngmin |
2008 |
Saliency-Guided Graphics and Visualization |
Amitabh Varshney |
Kim |
Youngmin |
2008 |
Saliency-Guided Graphics and Visualization |
Amitabh Varshney |
Kim |
Jik-Soo |
2009 |
Decentralized and Scalable Resource Management for Desktop Grids |
Alan Sussman |
Kim |
Daehwan |
2013 |
RNA-Sequencing Analysis: Read Alignment and
Discovery Reconstruction of Fusion Transcripts |
Steven Salzberg |
Kim |
Doowon |
2020 |
Understanding of Adversary Behavior and Security Threats in Public Key Infrastructures |
Tudor Dumitras |
Kirby |
Robert |
1983 |
Iterative Parallel Labeling for Pattern Recognition |
Azriel Rosenfeld |
Kitchen |
Leslie |
1982 |
Local consistency and constraint filtering for structure matching and image analysis |
Azriel Rosenfeld |
Ko |
Keng-Tai |
1991 |
On congestion control in high-speed wide-area networks |
Satish Kumar Tripathi |
Kobla |
Vikrant |
2000 |
Automated Analysis of MPEG Compressed Video |
Azriel Rosenfeld |
Koc |
Ugur |
2019 |
Improving the Usability of Static Analysis Tools Using Machine Learning |
Adam Porter |
Kochut |
Andrzej |
2005 |
Timestep Stochastic Sinulation of Computer Networks Using Diffusion Approximation |
A. Udaya Shankar |
Kohli |
Madhur |
1987 |
Controlling the Execution of Logic Programs |
|
Kohout |
Robert |
1998 |
Guaranteeing safety in the presence of moving obstacles |
Hendler |
Kolak |
Okan |
2005 |
Cross-Lingual Utilization of NLP Resources for New Languages |
Philip Resnik |
Kolovski |
Vladimir |
2008 |
Analyzing Web Access Control Policies using Description Logics |
Hendler |
Koo |
Chiu Yuen |
2007 |
Studies on Fault-Tolerant Broadcast and Secure
Computation |
Jonathan Katz |
Koren |
Sergey |
2012 |
Genome Assembly: Novel Applications by Harnessing Emerging Sequencing Technologies and Graph Algorithms |
Mihai Pop |
Korn |
Philip |
1998 |
Indexing and Mining Medical Image and Multimedia Databases |
Christos Faloutsos |
Korpeoglu |
Ibrahim |
2000 |
Mobile and wireless networking for palmtop and laptop computers |
Satish Kumar Tripathi |
Kotidis |
Ioannis |
2000 |
A Framework for Mangament and Efficient Maintenance of Materialized Data Warehouse Aggregates |
Nicholas Roussopoulos |
Krishnamoorthy |
Shivsubramani |
2013 |
Rover – II: A Context-Aware Middleware for Pervasive
Computing Environment |
Ashok Agrawala |
Kuijt |
David |
2001 |
An Object-Oriented Approach to Parallel Spatial Indexing of Vector-Format Polygons |
Hanan Samet |
Kules |
William |
2006 |
Supporting Exploratory Search with Meaningful and Stable Categorized Overviews |
Ben Shneiderman |
Kulkarni |
Ashok |
1976 |
Optional and heuristic synthesis of hierarchical classifiers |
|
Kumar |
Vipin |
1982 |
A unified approach to problem solving search procedures |
|
Kumar |
Abhishek |
2013 |
Learning with Multiple Similarities |
Hal Daumé III |
Kumar |
Jayant |
2013 |
Efficient Machine Learning Methods for Document Image Analysis |
Larry Davis |
Kumar |
Srijan |
2017 |
Characterization and Detection of Malicious Behavior on the Web |
V.S. Subrahmanian |