Meshry |
Moustafa Mahmoud |
2022 |
Neural Rendering Techniques for Photo-realistic Image Generation and Novel View Synthesis |
Abhinav Shrivastava, Larry Davis |
Meng |
Xiaoxu |
2020 |
Enhancing Visual and Gestural Fidelity for Effective Virtual Environments |
Amitabh Varshney |
Mendonca |
Manoel |
1997 |
An approach to improving existing measurement frameworks in software development organizations |
Victor Basili |
Memory |
Alexander |
2019 |
Collective Relational Data Integration with Diverse and Noisy Evidence |
Lise Getoor |
Memarsadeghi |
Nargess |
2007 |
Efficient Algorithms for Clustering and Interpolation of Large Spatial Data Sets |
David Mount |
McSkimin |
James |
1976 |
Techniques for Employing Semantic Information in Question-Answering Systems |
|
McMaster |
Scott |
2008 |
A Context-Sensitive Coverage Criterion for Test Suite
Reduction |
|
McFadden |
Frank |
1993 |
Competitive learning and competitive activation in cortical map formation |
|
McCann |
Justin |
2012 |
Automating Performance Diagnosis in Networked Systems |
Michael Hicks |
Maynord |
Michael |
2023 |
|
|
Matta |
Ibrahim |
1995 |
Fast evaluation and dynamic control of integrated services networks |
A. Udaya Shankar |
Matos |
Gilberto |
1998 |
Analysis and applications of receptive safety properties in concurrent systems |
James Purtilo |
Martinez |
Maria Vanina |
2011 |
Contributions to Personalizable Knowledge Integration |
V.S. Subrahmanian |
Margalit |
Avraham |
1989 |
Efficient image matching |
Azriel Rosenfeld |
Mardziel |
Piotr |
2015 |
Modeling, Quantifying, and Limiting Adversary
Knowledge |
Michael Hicks |
Manson |
Jeremy |
2004 |
The Java Memory Model |
William Pugh |
Manjunatha |
Varun |
2019 |
Vision And Natural Language For Creative Applications, And Their Analysis |
Larry Davis |
Maneewongvatana |
Songrit |
2001 |
Nearest Neighbor Searching in High Dimensional Spaces |
David Mount |
Malu |
Meethu |
2018 |
Designing and Implementing Accessible Wearable Interactions for People with Motor Impairments |
|
Malozemoff |
Alexis |
2016 |
Efficient Secure Computation for Real-world Settings and
Security Models |
Jonathan Katz |
Malik |
Sana |
2016 |
A Visual Analytics Approach to Comparing Cohorts of Event Sequences |
Ben Shneiderman |
Malekian |
Azarakhsh |
2009 |
Combinatorial Optimization and Electronic Commerce |
Samir Khuller |
Makarios |
Selene |
1992 |
Parallel Paradigms and Practices for Spatial Data |
Hanan Samet |
Mah |
Matthew |
2011 |
Time-Based Location Techniques Using Inexpensive,
Unsynchronized Clocks in Wireless Networks |
Ashok Agrawala |
Magen |
Assaf |
2019 |
Characterization Of Survival Associated Gene Interactions And Lymphocyte Heterogeneity In Cancer |
|
Madnani |
Nitin |
2010 |
The Circle of Meaning: From Translation to
Paraphrasing and Back |
Bonnie Dorr |
Maddali |
Hanuma Teja |
2023 |
Design Considerations for Remote Expert Guidance Using Extended Reality in Skilled Hobby Settings |
Amanda Lazar |
Ma |
Kin Keung |
2011 |
Improving Program Testing and Understanding via Symbolic Execution |
Jeffrey Foster, Michael Hicks |
Ma |
Kin Keung |
2011 |
Improving Program Testing and Understanding via Symbolic Execution |
Jeffrey Foster, Michael Hicks |
Luo |
Yuancheng |
2014 |
Fast Numerical and Machine
Learning Algorithms for Spatial Audio Reproduction |
Ramani Duraiswami |
Lumezanu |
Cristian |
2009 |
Using Internet Geometry to Improve End-End Communication Performance |
|
Luke |
Sean |
2000 |
Issues in Scaling Genetic Programming: Breeding Strategies, Tree Generation, and Code Bloat |
Hendler |
Lowe |
George |
1979 |
Heuristic approaches to the decomposition of sparse matrices |
Werner C. Rheinboldt |
Lott |
Christopher |
1996 |
Measurement-based feedback in a process-centered software engineering environment |
Victor Basili |
Lotem |
Amnon |
2000 |
GraphHTN: Combining Planning Graphs and HTN Planning |
Dana Nau |
Lopez |
Adam |
2008 |
Machine Translation by Pattern Matching |
Philip Resnik |
Long |
Teng |
2016 |
Collaborative Testing of Shared Software Components |
Alan Sussman |
London |
Benjamin |
2015 |
On the Stability of Structured Prediction |
Lise Getoor |
London |
Philip |
1978 |
Dependency Networks as a Representation for Modeling in General Problem Solvers |
Rieger |
Lobo |
Jose |
1990 |
Semantics for Normal Disjunctive Logic Programs |
|
Liu |
Chang |
2016 |
Trace Oblivious Program Execution |
Michael HicksElaine Shi |
Liu |
Haiying |
2003 |
Algorithms for Capturing Human Body Motion and Structure |
|
Liu |
Hong |
1996 |
Automatic validation of multi-process communication protocols |
|
Liu |
Xu |
2008 |
Computer Vision and Image Processing Techniques for Mobile Applications |
Larry Davis |
Liu |
Bo |
2012 |
Computational Metagenomics: Network, Classification and Assembly |
Mihai Pop |
Litton |
James |
2020 |
Composing and Decomposing OS Abstractions |
Bobby Bhattacharjee |
Ling |
Haibin |
2006 |
Techniques for Image Retrieval: Deformation Insensitivity and Large Automatic Thumbnail Cropping |
David JacobsDavid Jacobs |
Lin |
Chih-Chen |
1990 |
Coupling production systems and database systems :! homogeneous approach |
Timos Sellis |
Lin |
Chih-Lung |
1996 |
Context based approaches for aerial image exploitation |
|
Lin |
King-Ip |
1996 |
Indexing Non-traditional and Multimedia Data Types |
Christos Faloutsos |