2025 |
Ehaab Basil |
Large Language Models for Aviation Safety: Enhancing Incident Analysis through Summarization of ASRS Reports |
Heng Huang |
Spring_2025_Basil,_Ehaab_Scholarly_Paper.pdf |
2025 |
Siddhant Bharti |
LLM-Check: Investigating Detection of Hallucinations in Large Language Models |
Soheil Feizi |
Spring_2025_Bharti,_Siddhant_Scholarly_Paper.pdf |
2025 |
Nathan Blanken |
Enabling Single Machine Topological Simplification with Distributed Preprocessing of Large Datasets |
Leila De Floriani |
Spring_2025_Blanken,_Nathan_Scholarly_Paper.pdf |
2025 |
Zijie Cai |
Real-World Benchmarking and Synthetic Fine-Tuning of Monocular Metric Depth Estimation in Underwater Environments |
Christopher Metzler |
Spring_2025_Cai,_Zijie_Scholalry_Paper.pdf |
2025 |
Simon Chervenak |
The Banana-Exporting Casino Imprisoned the Neutron: Semantically Boggling Syntactic Probes |
Philip Resnik |
Spring_2025_Chervenak,_Simon_Scholarly_Paper.pdf |
2025 |
Purva Chiniya |
Comparison of Single File vs Repository Level Code Benchmark |
Yizheng Chen |
Spring_2025_Chiniya,_Purva_Scholarly_Paper.pdf |
2025 |
Ayman Chowdhury |
Are LLMs Reliable for Qualitative Coding in Security? |
Dave Levin |
Spring_2025_Chowdhury,_Ayman_Scholarly_Paper.pdf |
2025 |
Akshaj Gaur |
All-in-Focus Imaging of Dynamic Scenes with an Event-Based Focal Stack |
Christopher Metzler |
Spring_2025_Gaur,_Akshaj_Scholarly_Paper.pdf |
2025 |
Patrick Gough |
User Strategies for Social Bot Detection |
Michelle Mazurek |
Spring_2025_Gough,_Patrick_Scholarly_Paper.pdf |
2025 |
Feng Gu |
Personalized Help for Optimizing Low-Skilled Users’ Strategy |
Jordan Boyd-Graber |
Spring_2025_Gu,_Feng_Scholarly_Paper.pdf |
2025 |
Evan Guenterberg |
Evaluating Implicit Neural Representations for Single Cell Sequencing Compression |
Rob Patro |
Spring_2025_Guenterberg,_Evan_Scholarly_Paper.pdf |
2025 |
Sahit Kadthala |
Infographic Generator: LLM-Driven Visualization of Narrative Content |
Zhicheng Liu |
Spring_2025_Kadthala,_Sahit_Scholarly_Paper.pdf |
2025 |
Grace Ko |
A3G Public Conversation Model: Analyzing the Distributions of Influential and Susceptible Members in a Multi-agent Model of Text-based Online Communities |
Michel Cukier |
Spring_2025_Ko,_Grace_Scholarly_Paper.pdf |
2025 |
Zichao Liang |
Self-Improvement of Open-Ended and Long-Form Responses via Group Relative Policy Optimization |
Jordan Boyd-Graber |
Spring_2025_Liang,_Zichao_Scholarly_Paper.pdf |
2025 |
Charles Lin |
On Improving Spencer's Graph Bounds |
William Gasarch |
Spring_2025_Lin,_Charles_Scholarly_Paper.pdf |
2025 |
Spencer Lutz |
Illusion3D: 3D Multiview Illusion with 2D Diffusion Priors |
Jia-Bin Huang |
Spring_2025_Lutz,_Spencer_Scholarly_Paper.pdf |
2025 |
Neal Machado |
Protecting Intellectual Property of Artists from Generative AI |
Gabriel Kaptchuk |
Spring_2025_Machado,_Neal_Scholarly_Paper.pdf |
2025 |
Nathan Pan |
E Pluribus Deanonymization: Fingerprinting Browsing Sessions Instead of Individual Webpages |
Dave Levin |
Spring_2025_Pan,_Nathan_Scholarly_Paper.pdf |
2025 |
Nithin Parepally |
The Hilbert Geometry: Algorithms and Applications |
David Mount |
Spring_2025_Parepally,_Nithin_Scholarly_Paper.pdf |
2025 |
Srividya Ponnada |
Investigations in Model Reliability and Efficiency: Diffusion Detection, 3D Reconstruction with GAN Priors, and Parameter-Efficient Transformer Fine-Tuning |
Tom Goldstein |
|
2025 |
Sambit Sahoo |
Emergency Response Optimization for Traffic Accidents in Washington, D.C. |
Hanan Samet |
Spring_2025_Sahoo,_Sambit_Scholarly_Paper.pdf |
2025 |
Zachary Sating |
Jorge: Approximate Preconditioning for GPU-Efficient Second-Order Optimization |
Abhinav Bhatele |
Fall_2024_Sating,_Zachary_Scholarly_Paper.pdf |
2025 |
Anders Spear |
Developer Perceptions on Trusting Software |
Michelle Mazurek |
Spring_2025_Spear,_Anders_Scholarly_Paper.pdf |
2025 |
Utkarsh Tyagi |
MMAU: A Massive Multi-Task Audio Understanding and Reasoning Benchmark |
Ramani Duraiswami |
Spring_2025_Tyagi,_Utkarsh_Scholarly_Paper.pdf |
2025 |
Rahul Vishnoi |
Deep Learning at the Edge of Space |
|
Spring_2025_Vishnoi,_Rahul_Scholarly_Paper.pdf |
2025 |
Tien Vu |
Centaurus: Characterizing the Energy Efficiency of Contemporary CPUs for Running Sparse Problems |
Bahar Asgari |
Spring_2025_Vu,_Tien_Scholarly_Paper.pdf |
2025 |
Chandler Wang |
Mapping Privacy Responsibilities in Agile Development |
Michelle Mazurek |
Spring_2025_Wang,_Chandler_Scholarly_Paper.pdf |
2025 |
Simon Wang |
Understanding Agentic AI Systems for Data Analysis: Techniques, Components, and Considerations |
Zhicheng Liu |
Spring_2025_Wang,_Simon_Scholarly_Paper.pdf |
2024 |
Vibhu Agrawal |
SAIL: Self-improving Efficient Online Alignment of Large Language Models |
Furong Huang |
Fall_2024_Agrawal,_Vibhu_Scholarly_Paper.pdf |
2024 |
Dev Bhardwaj |
Evaluating Functional Correctness via Comparison of a Code Summary to Natural Language Directives |
Ashok Agrawala |
Spring_2024_Bhardwaj,_Dev_Scholarly_Paper.pdf |
2024 |
Jacob Clements |
GPU-accelerated Direct Geolocation of GNSS Interference |
Christopher Metzler |
Fall_2024_Clements,_Jacob_Scholarly_Paper.pdf |
2024 |
Rakrish Dhakal |
Pipit: Enabling programmatic analysis of parallel execution traces |
Abhinav Bhatele |
Spring_2024_Dhakal,_Rakrish_Scholarly_Paper.pdf |
2024 |
Danna Doratotaj |
The Implementation and Evaluation of a Compiler from a Subset of Racket to WebAssembly as a New Back End for the 838e Compiler |
David Van Horn |
Spring_2024_Doratotaj,_Danna_Scholarly_Paper.pdf |
2024 |
Chandra Evuru |
Decidio 2.0: Enabling Enhanced Collaborative Decision-Support and Interaction |
James Purtilo |
Spring_2024_Evuru,_Chandra_Kiran_Reddy_Scholarly_Paper.pdf |
2024 |
Jerry Gui |
Seedzer: A Pipeline for Fuzzing in Deep Learning Compilers |
Bahar Asgari |
Spring_2024_Gui,_Jerry_Scholarly_Paper.pdf |
2024 |
Abhimanyu Hans |
Spotting LLMs With Binoculars: Zero-Shot Detection of Machine-Generated Text |
Tom Goldstein |
Fall_2024_Hans,_Abhimanyu_Scholarly_Paper.pdf |
2024 |
E Huang |
Compressed Checkpoint Index and Parallel Parser for FASTQ Files |
Rob Patro |
Fall_2023_Huang,_E_Scholarly_Paper.pdf.pdf |
2024 |
Sathvik Inteti |
A Temporal Similarity Matrix Based Approach for 3D Pose Comparison in Exercise Videos |
Mohammad Nayeem Teli |
Spring_2024_Inteti,_Sathvik_Scholarly_Paper.pdf |
2024 |
Md. Ishat-E-Rabban |
Failure-Resilient Coverage Maximization With Multiple Robots |
Pratap Tokekar |
Spring_2024_Ishat-E-Rabban,_Md_Scholarly_Paper.pdf |
2024 |
Austin Kaminow |
Opal: Oblivious Programmable Access Limiting |
Ian Miers |
Spring_2024_Kaminow,_Austin_Scholarly_Paper.pdf |
2024 |
Shubham Karanjekar |
Declarative Interactive Visualization in Mascot: Depedency Graph Architecture |
Zhicheng Liu |
Spring_2024_Karanjekar,_Shubham_Scholarly_Paper.pdf |
2024 |
Benjamin Landrum |
Approximate Nearest Neighbor Search with Filters |
Laxman Dhulipala |
|
2024 |
Angela Liu |
Comparing Reinforcement Learning and Imitation Learning in Teaching a Model to Play Games |
Ming Lin |
Spring_2024_Liu,_Angela_Scholarly_Paper.pdf |
2024 |
Kent O'Sullivan |
A Framework for Benchmarking Graph-Based Artificial Intelligence |
William Regli |
|
2024 |
Varun Ramani |
IMUOptimize: A Data-Driven Approach to Optimal IMU Placement for Human Pose Estimation with Transformer Architecture |
Nirupam Roy |
Fall_2024_Ramani,_Varun_Scholarly_Paper.pdf |
2024 |
Sathvik Ravi |
Combining Metrics to Improve RNA-Seq Quantification |
Rob Patro |
Spring_2024_Ravi,_Sathvik_Scholarly_Paper.pdf |
2024 |
Zuzanna Rutkowska |
Empirical Study on the Watermarking Methods for Diffusion Models |
Mohammad Hajiaghayi |
Spring_2024_Rutkowska,_Zuzanna_Scholarly_Paper.pdf |
2024 |
Pranav Sivaraman |
Taking GPU Programming Models to Task for Performance Portability |
Abhinav Bhatele |
Fall_2024_Sivaraman,_Pranav_Scholarly_Paper.pdf |
2024 |
Jeovane Slater-Taylor |
The Intersectional Divide: Exploring the Barriers and Opportunities for Black Women and Girls in AI - A Systematic Literature Review |
Sheena Erete |
Spring_2024_Slater-Taylor,_Jeovane_Scholarly_Paper.pdf |
2024 |
Alexander Straub |
Prompt Engineering Large Language Models to Simulate Members in Online Communities |
Michel Cukier |
Spring_2024_Straub,_Alexander_Scholarly_Paper.pdf |
2024 |
Michael Suehle |
Layoff Prediction Using Real and Forecasted Stock Data via Domain Adaptation and Ensemble Learning |
Tianyi Zhou |
Fall_2024_Suehle,_Michael_Scholarly_Paper.pdf |
2024 |
Kasra Torshizi |
When to Localize? A Risk-Constrained Reinforcement Learning Approach |
Pratap Tokekar |
Fall_2024_Torshizi,_Kasra__Scholarly_Paper.pdf |
2024 |
Allen Tu |
PUP 3D-GS: Principled Uncertainty Pruning for 3D Gaussian Splatting |
Tom Goldstein |
Fall_2024_Tu,_Allen_Scholarly_Paper.pdf |
2024 |
Addison Waller |
Examining Influence Dynamics in Online Communities Through a Public Conversation Model |
Michel Cukier |
Spring_2024_Waller,_Addison_Scholarly_Paper.pdf |
2024 |
Thomas Wrona |
DEPENDENT ROUNDING SPEEDUPS AND APPLICATIONS |
Aravind Srinivasan |
|
2024 |
Sathwik Yanamaddi |
Evaluating OpenMP 4.5 Support on Compilers |
Alan Sussman |
Spring_2024_Yanamaddi,_Sathwik_Scholarly_Paper.pdf |
2024 |
Yishan Zhao |
A Success Typing System on Imperative Programming Language |
Leonidas Lampropoulos |
Spring_2024_Zhao,_Yishan_Scholarly_Paper.pdf |
2024 |
Andrew Zhong |
A Survey of Personalizable Text to Image Diffusion Models |
Jia-Bin Huang |
Spring_2025_Andrew,_Zhong_Scholarly_Paper.pdf.pdf |
2024 |
Chenqi Zhu |
Inertially Constrained Ruled Surfaces for Visual Odometry |
John Aloimonos |
|
2024 |
Mingwei Zhu |
Implementing a Quantam Program Verifier |
Leonidas Lampropoulos |
Spring_2024_Zhu,_Mingwei_Scholarly_Paper.pdf |
2023 |
Neal Anwar |
Towards an Improved Hyperdimensional Classifier for Event-Based Data |
John Aloimonos |
Fall_2023_Anwar_Neal_Scholalry_Paper.pdf |
2023 |
Arman Bolouri |
PyraModel: Model for Computationally Crafting Elite Quizbowl Questions |
Jordan Boyd-Graber |
Fall_2023_Bolouri_Arman_Scholalry_Paper.pdf |
2023 |
Kevin Hyekang Joo |
CLIP-TSA: CLIP-Assisted Temporal Self-Attention for Weakly-Supervised Video Anomaly Detection |
David Jacobs |
KevinHyekangJoo_hkjoo_05-2023.pdf |
2023 |
Tyler Kitts |
Efficiently Storing States For HTN Planner Backtracking |
Dana Nau |
Fall_2023_Kitts,_Tyler_Efficiently_Storing_States_for_HTN_Planner_Backtracking.pdf |
2023 |
Charlie Lu |
Designing Interaction Support for Mascot Data Visualization Grammar |
Zhicheng Liu |
Fall_2023_Lu,Charlie_Designing_Interaction_Support_for_Mascot_Data_Visualization_Grammar.pdf |
2020 |
Sweta Agrawal |
Controlling Text Complexity in Neural Machine Translation |
Marine Carpuat |
Agrawal, Sweta_scholarly paper.pdf |
2020 |
Omer Akgul |
Secrecy, Flagging, and Paranoia Revisited: User Attitudes Toward Encrypted Messaging Apps |
|
Akgul, Omer_scholarly paper.pdf |
2020 |
Sigurthor Bjorgvinsson |
In Search of a Generic Deepfake Detector |
Adam Porter |
Sigurthor_Bjorgvinsson_Scholarly_Paper_Deepfakes.pdf |
2020 |
Rangfu Hu |
Youtube Safety |
|
Hu, Rangfu_Youtube_Safety.pdf |
2020 |
Tamer Rogabi |
ShadowNet: Deep Learning for Adding Shadows to a Scene |
|
Mograbi, Tomi_Scholarly paper.pdf |
2020 |
Ahmed Taha |
Kid-Net: Convolution Networks for Kidney Vessels Segmentation from CT-Volumes |
Larry Davis |
Taha, Ahmed_MS Scholarly.pdf |
2020 |
Jessica Thompson |
Applying Boosting Techniques to the training of RBMs and VAEs |
|
Thompson, Jessica_MS_Scholarly paper.pdf |
2020 |
Fan Yang |
SYNTHESIZING AUDIO USING GENERATIVE ADVERSARIAL NETWORKS |
|
Yang, Fan_MS scholarly paper.pdf |
2019 |
Andrew Fichman |
Vega Postgres |
Leilani Battle |
Fichman, Andrew_scholarly paper.pdf |
2019 |
Kelsey Fulton |
Towards a Customizable Framework for Evaluating Visualization Recommendations |
Leilani Battle |
fulton_scholarly_paper.pdf |
2018 |
Rohan Chandra |
PhasePack: A Phase Retrieval Library |
Tom Goldstein |
Chandra, Rohan_1801.pdf |
2018 |
Javran Cheng |
Adding Gradual Types to Existing Languages |
|
Cheng, Javran_1801.pdf |
2018 |
Ronald Cheng |
D2PI: Identifying Malware through Deep Packet Inspection with Deep Learning |
|
Cheng, Ronald_1801.pdf |
2018 |
Ryan Eckenrod |
Tracking Buses to Track Smartphone Users |
|
Eckenrod, Ryan_1801.pdf |
2018 |
Alejandro Flores-Velazco |
Nearest Neighbor Condensation with Guarantees |
|
Flores, Alejandro_1801.pdf |
2018 |
Karan Kaur |
Birds of a Feather Reveal Together: A Promising Approach to Social Network De-Anonymization |
|
Kaur, Karan_1801.pdf |
2018 |
Tara Larrue |
Denoising Videos with Convolutional Autoencoders |
|
Larrue, Tara_1801.pdf |
2018 |
Tongyang Li |
Efficient simulation of sparse Markovian quantum dynamics |
Andrew Childs |
Li, Tongyang_1801_1.pdf |
2018 |
Tongyang Li |
Quantum SDP Solvers: Large Speed-ups, Optimality, and Applications to Quantum Learning |
Xiaodi Wu |
Li, Tongyang_1801_2.pdf |
2018 |
Tongyang Li |
Quantum query complexity of entropy estimation |
Xiaodi Wu |
Li, Tongyang_1801_3.pdf |
2018 |
Yancy Liao |
Supplementing information theory with opposite polarity of amino acids for protein contact prediction |
|
Liao, Yancy_1801.pdf |
2018 |
Pouya Moetakef |
Minimum capacity full array escape routing |
Samir Khuller |
Pouya Motakef - scholarly_report.pdf |
2018 |
Ivan Petrov |
Measuring the Rapid Growth of HSTS and HPKP Deployments |
Dave Levin |
Petrov, Ivan_1801.pdf |
2018 |
Elissa Redmiles |
Net Benefits: Digital Inequities in Social Capital, Privacy Preservation, and Digital Parenting Practices of U.S. Social Media Users |
|
Redmiles, Elissa_1801.pdf |
2018 |
Xuetong Sun |
View-Dependent Text Placement for Augmented Reality using Offset Surfaces |
Amitabh Varshney |
Sun, Xuetong_1801.pdf |
2018 |
Gavin Watson |
A Comparison of Header and Deep Packet Features when Detecting Network Intrusions |
|
Watson, Gavin_1801.pdf |
2018 |
Ashton Webster |
An Application of Jeeves for Honeypot Sanitization |
|
Webster, Ashton_1801.pdf |
2017 |
Des Chandhok |
MC3: A Multi-Class Consensus Classification Framework |
|
Chandhok.pdf |
2017 |
Matthew Devlin |
Action-Based Learning: A Proposal for Robust Gesture & Object Recognition using Spatio-Temporal Domain Models |
|
Devlin.pdf |
2017 |
Fan Du |
EventAction: Visual Analytics for Temporal Event Sequence Recommendation |
|
FanDu.pdf |
2017 |
Nicholas Fung |
Toward Real Time Autonomous Robotics Through Integration of Hierarchical Goal Network Planning and Low Level Control Libraries |
|
Fung - HGN Integration.pdf |
2017 |
Ahmed Elgohary Ghoneim |
Learning Monolingual Compositional Representations via Bilingual Supervision |
|
Ghoneim.pdf |
2017 |
Jay Ghurye |
Better Identification of Repeats in Metagenomic Scaffolding |
|
Ghurye.pdf |
2017 |
Ujjwal Goel |
Taxonomy Tree Alignment |
|
Goel.pdf |
2017 |
Neal Gupta |
Teaching Dimension versus VC Dimension |
|
NealGupta.pdf |
2017 |
Janani Gururam |
Performance Tuning and Evaluation of Iterative Algorithms in Spark |
|
Gururam.pdf |
2017 |
Somay Jain |
Compressed Volume Rendering using Deep Learning |
|
Jain.pdf |
2017 |
Xiaomeng Jiang |
FriendGuard: A Context-Awareness Mobile App Helps Securing College Female Safety |
Ashok Agrawala |
Xiaomeng, Jiang.pdf |
2017 |
Ahmed Kosba |
Hawk: The Blockchain Model of Cryptography and Privacy-Preserving Smart Contracts |
|
Kosba.pdf |
2017 |
Emily Kowalczyk |
Piecing Together App Behavior from Multiple Artifacts: A Case Study |
|
Kowalczyk, Emily MS paper.pdf |
2017 |
Srijan Kumar |
Edge Weight Prediction in Weighted Signed Networks |
|
SrijanKumar.pdf |
2017 |
Kartik Nayak |
An Oblivious Parallel RAM with O(log2N) Parallel Runtime |
|
Nayak.pdf |
2017 |
Xing Niu |
Parallel Training Data Selection for Conversational Machine Translation |
|
Niu.pdf |
2017 |
Thomas Pensyl |
Partial rounding and near-independence |
|
Pensyl.pdf |
2017 |
Karthik Abinav Sankararaman |
Semi-Bandit feedback: A survey of results |
|
Sankararaman.pdf |
2017 |
Amr Sharaf |
Variance Reduction for Structured Prediction with Bandit Feedback |
|
sharaf.pdf |
2017 |
Ashwin Shivapuram |
A Parallel Hybrid Framework for Graph Processing |
|
Shivapuram.pdf |
2017 |
Virinchi Srinivas |
Framework for Replaying Transactions Using Dependency Graph |
Daniel Abadi |
virinchi_paper.pdf |
2017 |
Rock Stevens |
Summoning Demons: The Pursuit of Exploitable Bugs in Machine Learning |
|
Stevens.pdf |
2017 |
Octavian Suciu |
Vulnerability Disclosure in the Age of Social Media: Exploiting Twitter for Predicting Real-World Exploits |
|
Suciu.pdf |
2017 |
Yogarshi Vyas |
Sparse BilingualWord Representations for Cross-lingual Lexical Entailment |
|
Vyas.pdf |
2017 |
Faizan Wajid |
CrimeStand: Spatial Tracking of Criminal Activity |
|
Wajid.pdf |
2017 |
Konstantinos Xirogiannopoulos |
Extracting and Analyzing Hidden Graphs from Relational Databases |
|
Xirogiannopoulos.pdf |
2017 |
Zheng Xu |
Adaptive ADMM with Spectral Penalty Parameter Selection |
|
ZhengXu.pdf |
2017 |
Abhay Kumar Yadav |
Biconvex Relaxation for Semidefinite Programming in Computer Vision |
|
Yadav.pdf |
2017 |
Weiwei Yang |
A Discriminative Topic Model using Document Network Structure |
|
YangWeiwei.pdf |
2016 |
Ahmed Abdelkader |
The Inapproximability of Illuminating Polygons by α-Floodlights |
|
Abdelrazek.pdf |
2015 |
Anis Abboud |
Equal-area Breaks: A Classification Scheme for Data to Obtain an Evenly-colored Chloropleth Map |
|
Abboud.pdf |
2014 |
Christopher Ackermann |
Integrated Functional and Non-Functional Design Verification for Embedded Software Systems |
|
Ackermann.pdf |
2014 |
Marco Adelfio |
Completion Prediction in Network Coding |
|
Adelfio.pdf |
2014 |
Rob Argue |
Supervised learning as a tool for metagame analysis |
|
Argue.pdf |
2007 |
Mudit Agrawal |
Re-Targetable OCR with Intelligent Character Segmentation |
|
MuditAgrawal.pdf |
|
Saeed Alaei |
Bayesian Combinatorial Auctions: Expanding Single Buyer Mechanisms to Many Buyers |
|
saeed_alaei_scholarly_paper.pdf |
|
Mujtaba Ali |
Unique Pointers: Performance, Burden and Inference |
|
MujtabaAli.pdf |
|
Christian Almazan |
Information Dynamics: Understanding Information in Computer and Software Systems |
|
infodynamics.pdf |
|
Aleks Aris |
Ubiquitous Computing |
|
AleksAris_UbiquitousComputing.pdf |
|
William Armstrong |
Using Topic Models to Investigate Depression on Social Media |
|
Armstrong.pdf |
|
Nima Asadi |
Pseudo Test Collections for Learning Web Search Ranking Functions |
|
NimaAsadi.pdf |
|
Randolph Baden |
IP Geolocation in Metropolitan Area Networks |
|
RandolphBaden.pdf |
|
Mossaab Bagdouri |
Towards Mimizing the Annotation Cost of Certified Text Classification |
|
Bagdouri.pdf |
|
Anand Bahety |
Extension and Evaluation of ID3 - Decision Tree Algorithm |
|
Bahety.pdf |
|
Arun Balasubramanian |
Dynamic Decentralized Preemptive Scheduling across Heterogenous Multi-core Desktop Grids |
|
Balasubramanian.PDF |
|
Adam Bender |
Privacy in Revealed and Dependent Databases |
|
AdamBender.pdf |
|
Greg Benjamin |
Secure k-anonymous Communication Protocols with Misbehavior Detection |
|
Benjamin.pdf |
|
Konstantin Berlin |
SignalDraw: GUI Tool For Generating Pulse Sequences |
|
berlin.pdf |
|
Preeti Bhargava |
An ontological context model for representing a situation and the design of an intelligent context-aware middleware |
|
Bhargava.pdf |
|
Souvik Bhattacherjee |
A Storage Framework for Managing Scientific Data |
|
SouvikB.pdf |
|
Sujal Bista |
Global Contours |
|
SujalBista.pdf |
|
Arijit Biswas |
Active Image Clustering: Seeking Constraints from Humans to Complement Algorithms |
|
Biswas.pdf |
|
Jeffrey Blank |
Evaluating Window Placement for Hypertext-based Source Code Exploration Tools |
|
jblank.pdf |
|
Joshua Bradley |
A filtering strategy to reduce reference bias in measurements of allele-specific expression |
|
JoshBradley.pdf |
|
Matthias Broecheler |
Using Histograms to Better Answer Queries to Probabilistic Logic Programs |
|
Broecheler.pdf |
|
Joshua Brule |
PSCAN: Parallel, density-based clustering of protein sequences |
|
Brule.pdf |
|
Dan Bucatanschi |
RITIS Development Framework |
|
Bucatanschi.pdf |
|
Steven Burgart |
Gap Trap: A Pothole Detection and Reporting System Utilizing Mobile Devices |
|
Burgart.pdf |
|
George Caragea |
Data Prefetching on a Manycore Architecture Case Study: The XMT Platform |
|
caragea_scholarly_paper.pdf |
|
Carlos Castillo |
Using Stereo Matching for 2-D Face Recognition Across Pose |
|
carlos-castillo.pdf |
|
Victoria Cepeda |
Reference-guided Assembly of Metagenomic Sequences |
|
CepedaEspinoza.pdf |
|
Timur Chabuk |
Integrating Knowledge-Based and Case-Based Reasoning |
|
TimurChabuk.pdf |
|
Tiffany Chao |
Exploring personally relevant making |
|
Tiffany Chao.pdf |
|
Amit Chavan |
AN INTRODUCTION TO GRAPH COMPRESSION TECHNIQUES FOR IN-MEMORY GRAPH COMPUTATION |
|
Chavan.pdf |
|
Daozheng Chen |
Dynamic Processing Allocation in Video |
|
DaozhengChen.pdf |
|
Jun-Cheng Chen |
Ambiguities in Camera Self-Calibration |
|
ChenJC.pdf |
|
Ping Chen |
The Adaptive Preconditioned Conjugate Gradient Method |
|
adaptive.pdf |
|
Ray Chen |
Finding Chapel's Peak: Introducing Auto-Tuning to the Chapel Parallel Programming Language |
|
RayChen.pdf |
|
Kan-Leung Cheng |
Emergence of Cooperative Societies in Evolutionary Games Using a Social Orientation Model |
|
KLCheng.pdf |
|
Hyunjong Cho |
Evaluation of LC-KSVD on UCF101 Action Dataset |
|
HyunjongCho.pdf |
|
Hyoungtae Cho |
Coinonia: Privacy-Aware Meeting Scheduler based on Location-Based Services for Mobile Users |
|
HyoungtaeCho.pdf |
|
Amanda Crowell |
A Survey of Access Control Policies |
|
ACrowell.pdf |
|
Nathaniel Crowell |
Parallel Algorithms for Graph Problems |
|
NCrowell.pdf |
|
Tim Destan |
Large Scale Entity Resolution of Quiz Bowl Questions |
|
Destan.pdf |
|
Khoa Doan |
Performance Comparison of Big-Data Technologies in Locating Intersections in Satellite Ground Tracks |
|
Doan.pdf |
|
Justin Domke |
A Probabilistic Framework for Correspondence and Egomotion |
|
JustinDomke.pdf |
|
Ryan Dorson |
Analyzing the results of a usability study on CrosScan within the framework of the Android Design Principles and Material Design |
|
Dorson.pdf |
|
Ruofei Du |
The Design and Preliminary Evaluation of a Finger-Mounted Camera and Feedback System to Enable Reading of Printed Text for the Blind |
|
RuofeiDu.pdf |
|
Thomas DuBois |
Key Exchange with Cards: Generating Extra Bits in Expectation |
|
TomDubois.pdf |
|
Cody Dunne |
Improving Graph Drawing Readability by Incorporating Readability Metrics: A Software Tool for Network Analysts |
|
CodyDunneUpdate.pdf |
|
Cyntrica Eaton |
Improving Browsing Environment Compliance Evaluations for Websites |
|
EatonScholarly.pdf |
|
Aleksandrs Ecins |
Shadow free segmentation in still images using local density measure |
|
Ecins.pdf |
|
Soheil Ehsani |
Subcubic Equivalences Between APSP, Co-Diameter, and Other Complementary Problems |
|
Ehsani.pdf |
|
Vladimir Eidelman |
Language Model and Grammar Extraction Variation in Machine Translation |
|
vladimir_eidelman_ms_scholarly_paper.pdf |
|
Walaa ElDin M. Moustafa |
Who should catch (this Exception){?} |
|
WalaaMoustafa.pdf |
|
Tamer Elsayed |
TDT-2004: Adaptive Topic Tracking at Maryland |
|
tdt2004.pdf |
|
Kevin Engel |
Learning a Reversi Board Evaluator with Minimax |
|
Engel.pdf |
|
Peter Enns |
Predicting Viewer Reactions to Discourse in Political Debates |
|
Enns.pdf |
|
Hossein Esfandiari |
A Tight Algorithm for Strongly Connected Steiner Subgraph on Two Terminals with Demands |
|
Esfandiari.pdf |
|
Ryan Farrell |
Ad-Hoc Sensor Localization in Active Camera Networks |
|
AdHocLocalization-farrell.pdf |
|
Mohammed Fathy |
Essential Matrix Estimation Using Adaptive Penalty Formations |
|
Fathy.pdf |
|
Iason Filippou |
Assigning affinity-preserving binary hash codes to images |
|
Filippou.pdf |
|
Darya Filippova |
Interactive Exploration of Multivariate Categorical Data: Exploiting Ranking Criteria to Reveal Patterns and Outliers |
|
Filippova.pdf |
|
Allan Fong |
Predicting Electrocardiogram and Arterial Blood Pressure Waveforms with Different Echo State Network Architectures |
|
Fong.pdf |
|
Peter Fontana |
A Combination of Decision Trees and Instance-Based Learning |
|
PeterFontana.pdf |
|
Sorelle Friedler |
Approximation Algorithm for the Kinetic Robust K-Center Problem |
|
Sorelle.pdf |
|
Brendan Fruin |
Semantic Cashing for Spatial Mobile Applications |
|
Fruin.pdf |
|
Michael Furr |
Checking Type Safety of Foreign Function Calls |
|
furr-scholary.pdf |
|
Vasile Gaburici |
A Fractional Differencing Method for File System Data Storage and Transmission |
|
fractionaldiff.pdf |
|
Mohammadreza Ghodsi |
Approximate String Matching using Backtracking over Suffix Arrays |
|
ghodsi.pdf |
|
Milad Gholami |
Parkbaan |
|
Gholami.pdf |
|
Jonathan Gluck |
Hone: "Scaling Down" Hadoop on Shared-Memory Systems |
|
Gluck.pdf |
|
Samuel Dov Gordon |
Complete Fairness in Multi-Party Computation Without an Honest Majority |
|
DovGordon.pdf |
|
Nick Gramsky |
Seeder Finder - Identifying Additional Needles in the Twitter Haystack |
|
Gramsky.pdf |
|
David Greenfieldboyce |
Type Qualifiers for Java |
|
greenfiledboyce.pdf |
|
Adam Groce |
A New Framework for Efficient Password-Based Authenticated Key Exchange |
|
AdamGroce.pdf |
|
Alexander Grushin |
The Effects of Static Fitness Function Noise Upon the Performance of Genetic Algorithms |
|
staticfitness.pdf |
|
John Alexis Guerra Gomez |
Interactive Visualizations for Comparing Two Trees with Structure and Node Value Changes |
|
GuerraGomez.pdf |
|
Abhinav Gupta |
Constraint Integration for Efficient Multiview Pose Estimation with Self-Occlusions |
|
agupta.pdf |
|
Akhil Gupta |
Skipping Streams with XHints |
|
xhints.pdf |
|
Neha Gupta |
Analysis of Computer Clock Characteristics for Location Determination |
|
NehaGupta.pdf |
|
Khoa Ha |
A method for depth-based hand tracing |
|
KhoaHa.pdf |
|
Hamid Haidarian Shahri |
Grounding the Foundations of Ontology Mapping on Neglected Ambitions |
|
Hamid.pdf |
|
Emily Hand |
Attributes for Improved Attributes |
|
EmilyHand.pdf |
|
Eric Hardisty |
Modeling Perspective Using Adaptor Grammars |
|
Hardisty.pdf |
|
Chaudhry Hassan Afzal |
High Performance Communication Between Parallel Components |
|
Afzal.pdf |
|
Christopher M. Hayden |
A Testing Based Empirical Study of Dynamic Software Update Safety Restrictions |
|
hayden.pdf |
|
Chang Hu |
Enhancing Readibility of Scanned Picture Books |
|
changhu.pdf |
|
Yuening Hu |
Interactive Topic Modeling |
|
YueningHu.pdf |
|
Mei Huang |
Multi-Class Document Layout Classification Using Random Chopping |
|
mei%20huang.pdf |
|
Samuel Huang |
Probabilistic Model Checking of Disease Spread and Prevention |
|
SamHuang.pdf |
|
Mohamed Hussein |
Real-Time Human Detection in Uncontrolled Camera Motion Environments |
|
hussein.pdf |
|
Phil Huynh |
An Evaluation of Nearest Neighbor Images-to-Classes versus Nearest Neighbor Images-to-Images |
|
PhilHuynh.pdf |
|
Thuan Huynh |
Improving Rule Extraction from Neural Networks by Modifying Hidden Layer Representation |
|
thuanhuynh.pdf |
|
Tugrul Ince |
Profile Driven Selective Program Loading |
|
Ince.pdf |
|
Mohit Iyyer |
Political Ideology Detection Using Recursive Neural Networks |
|
Iyyer.pdf |
|
Isaac Julien |
Aligning Real-Time Opinion Poll Responses with an Expectation-Maximization Algorithm |
|
Julien.pdf |
|
Jin Hyuk Jung |
Cholesky Decomposition and Linear Programming on a GPA |
|
jjung.pdf |
|
Aditya Kalyanpur |
Swoop: Design and Architecture of a Web Ontology Browser (/Editor) |
|
swoop.pdf |
|
Bhargav Kanagal |
Online Filtering, Smoothing and Probabilistic Modeling of Streaming Data |
|
BhargavKanagal.pdf |
|
Alap Karapurkar |
Modeling Human Activities |
|
karapurkar.pdf |
|
Srinivas Kashyap |
Node Ranking In Labeled Directed Graphs |
|
noderanking.pdf |
|
Fatih Kaya |
Discretizing Continuous Features for Naive Bayes and C4.5 Classifiers |
|
fatih-kaya.pdf |
|
David Kelley |
Detection and Correction of False Segmental Duplications Caused by Genome Mis-assembly |
|
davidkelley.pdf |
|
Udayan Khurana |
An Introduction to Temporal Graph Data Management |
|
Khurana_SchPaper.pdf |
|
Angjoo Kim |
Locally Scale-Invariant Convolutional Neural Networks |
|
AngjooKim.pdf |
|
Jik-Soo Kim |
Comparing the Performance of High-Level Middleware Systems in Shared and Distributed Memory Parallel Environments |
|
highlevel.pdf |
|
Youngil Kim |
Virtual MeshTest--Improving Wireless Network Testbed Using Virtualization and Migration Algorithm |
|
YoungilKim.pdf |
|
Morgan Kleene |
Information Flow Using CQual |
|
MorganKleene.pdf |
|
Ken Knudsen |
Impact of Collusion and Coalitions in RISK |
|
Knudsen.pdf |
|
Nikolaos Kofinas |
Leak Finder: A tool for Dynamic Analysis of Android Applications |
|
Kofinas.pdf |
|
Vladimir Kolovski |
Logic-Based Access Control Policy Specification and Management |
|
VKolovski.pdf |
|
Shravya Konda |
A Comparative Evaluation of Symbolic Learning Methods and Neural Learning Methods |
|
ShravyaKonda.pdf |
|
Govind Kothari |
Dirichlet Process based model for GWAS |
|
Govind%20Kothari.pdf |
|
Albert Koy |
Subgraphcentric LargeScale Graph Analytics on Spark |
|
AlbertKoy.pdf |
|
Gregory Kramida |
Resolving the Vergence-Accommodation Conflict in Head Mounted Displays |
|
Kramida.pdf |
|
Shivsubramani Krishnamoorthy |
Contextual Information Integration Platform for Humanitarian Relief |
|
Krishnamoorthy.pdf |
|
Nicholas Kuilema |
LockSTM: Mixing Locks and Transcactional Memory |
|
NickKuilema.pdf |
|
Dan Kuklov |
PEGAGUS--Architecture for Mobility using in situ 802.11 deployments at high velocities |
|
Kuklov-Pegasus.pdf |
|
Jayant Kumar |
Codebook Based Handwritten and Printed Arabic Text Zone Classification |
|
JayantKumar.pdf |
|
Ashwin Kumar Kayyoor |
Data Placement and Replica Selection for Improving Co-location in Distributed Environments |
|
Kayyoor.pdf |
|
Ranjit Kumaresan |
The Round Complexity of Verifiable Secret Sharing: The Statistical Case |
|
Kumaresan.pdf |
|
Jack Kustanowitz |
Bi-level Hierarchical Layouts for Photo Libraries: Algorithms for Design Optimization with Quantum Content |
|
BiLevlHierarchicalLayouts_submitted.pdf |
|
Michael Lam |
Dynamic Floating-Point Cancellation Detection |
|
MikeLam.pdf |
|
Rongjian Lan |
The Picture of Health: Map-Based, Collaborative Spatio-Temporal Disease Tracking |
|
Rongjian Lan.pdf |
|
Grecia Lapizco-Encinas |
Effects of Cheaters in Altrustic Signaling |
|
cheaters.pdf |
|
Hanseung Lee |
A New Visual Language for Incremental Generation of Visual Representations |
|
HanseungLee.pdf |
|
Jaehwan Lee |
Decentralized Resource Management for Multi-core Desktop Grids |
|
Jaehwan_Lee.pdf |
|
Joonghoon Lee |
Exploring Global Terrorism Data: A Web-based Visualization of Temporal Data |
|
JoonghoonLee.pdf |
|
Vasileios Lekakis |
Topology Independence and Information Leakage in Replicated Storage Systems |
|
Lekakis.pdf |
|
Ang Li |
Planar Structure Matching Under Projective Uncertainty for Geolocation |
|
AngLi.pdf |
|
Qianwen Li |
SymDroid: A Symbolic Executor to Identify Activity Permission in Android Application |
|
QianwenLi.pdf |
|
Michael Lieberman |
You Are Where You Edit: Locating Wikipedia Users Through Edit Histories |
|
Lieberman.pdf |
|
Naiwen Lin |
QR and RNG in Flagon, Web Service Composition with User Preferences |
|
NaiwenLin.pdf |
|
Liping Liu |
Implementation of LU |
|
LipingLiu.pdf |
|
Ran Liu |
ManyLists: Product Comparison Tool Using Spatial Layouts with Animated Transitions |
|
RanLiu.pdf |
|
John Locke |
LeechLock: Preventing Selfish Clients in the BitTorrent Protocol |
|
JohnLocke.pdf |
|
Teng Long |
Overlap and Synergy in Testing Software Components Across Loosely-Coupled Communities |
|
TengLong.pdf |
|
Cristian Lumezanu |
Decentralized Message Ordering |
|
Lumezanu.pdf |
|
Yuancheng Luo |
Alternative Tilings for the Fast Multipole Method on the Plane |
|
YuanchengLuo.pdf |
|
Matthew Mah |
Device-Free Passive Localization |
|
MatthewMah.pdf |
|
Hitesh Maidasani |
A Context-Aware Amusement Park |
|
Maidasani.pdf |
|
Azarakhsh Malekian |
Improved Algorithms for Data Migration |
|
malekian.pdf |
|
Sana Malik |
Punctuation Input on Touchscreen Keyboards: Analyzing Frequency of Use and Costs |
|
Malik.pdf |
|
Varun Manjunatha |
Supervised Image Hashing with Proximal Methods |
|
Manjunatha.pdf |
|
Rahmatri Mardiko |
Predicting Users' First Impressions of Website Aesthetics With a Quantification of Perceived Visual Complexity and Colorfulness |
|
Mardiko.pdf |
|
Elizabeth McNany |
Metacognitive Guidance in a Dialog Agent |
|
McNany.pdf |
|
Nargess Memarsadeghi |
Cokriging Interpolation |
|
cokriging.pdf |
|
David Mihalcik |
The Design and Implementation of ViPER |
|
davidm-viper.pdf |
|
Casey Mihaloew |
Automated search for randomized algorithms for recursive 3-MAJ and 5-MAJ |
|
Mihaloew.pdf |
|
Derek Monner |
An Unsupervised Learning Method for Representing Simple Sentences |
|
DerekMonner.pdf |
|
Megan Monroe |
Exploring Point and Interval Event Patterns: Display Methods and Interactive Visual Query |
|
MeganMonroe.pdf |
|
Chris Musialek |
Distill-ery: Iterative Topic Modeling to Improve the Content Analysis Process |
|
Musialek.pdf |
|
Galileo Namata |
Inferring Formal Titles in Organizational Email Archives |
|
GalileoNamata.pdf |
|
Sonia Ng Zeng |
Spot and Park: Where Mobile Technology Meets Parking Management |
|
Ng%20Zeng.pdf |
|
Bao Nguyen |
Top-k Queries in Uncertain OLAP |
|
BaoNguyen.pdf |
|
Morimichi Nishigaki |
Color Segmentation-based Optical Flows Computation and Motion Segmentation |
|
MNishigaki.pdf |
|
Angela Noh |
ConfViz: Supportive Configuration Visualization for Guaranteed Coverage Analysis |
|
AngelaNoh.pdf |
|
Neeti Ogale |
A survey of techniques for human detection from video |
|
neetiPaper.pdf |
|
Joseph Owen |
Crowdsourcing Bikeshare Transit Planning: An Empirical Investigation of Washington D.C. and New York City |
|
JosephOwen_Bikeshare.pdf |
|
Matthew Paisner |
Symbolic Anomaly Detection and Assessment Using Growing Neural Gas |
|
Paisner.pdf |
|
Martin Paraskevov |
The Geometric Set k-cover problem through the prism of polychromatic colorings of range spaces and planar graphs |
|
Paraskevov.pdf |
|
Eunhui Park |
A Dynamic Data Structure for Approximate Range Searching |
|
EunhuiPark.pdf |
|
Sungwoo Park |
Portfolio Selection Using Tikhonov Filtering to Estimate the Covariance Matrix |
|
Sungwoo%20Park_Scholarly%20Paper.pdf |
|
Nir Peer |
AlwaySocial: Social Networking in the Real World |
|
NirPeer.pdf |
|
Shangfu Peng |
SPDO: High-Throughput Road Distance Computations on Spark Using Distance Oracles |
|
ShangfuPeng.pdf |
|
Adam Phillippy |
Optimized Probe Selection for Pan-genomic DNA Microarrays |
|
phillippy.pdf |
|
Manish Purohit |
Improved algorithms and analysis for the laminar matroid secretary problem |
|
Purohit.pdf |
|
Qiang Qiu |
A Unified Approach for Modeling and Recognition of Individual Actions and Group Activities |
|
Qiang%20Qiu.pdf |
|
Alexander Quinn |
Readability of Scanned Books in Digital Libraries |
|
AlexQuinn.pdf |
|
Eric Raboin |
Generating Strategies for Multi-Agent Pursuit-Evasion Games in Partially Observable Euclidean Space |
|
Raboin.pdf |
|
Prahalad Rajkumar |
A Survey of Monte-Carlo Techniques in Games |
|
Rajkumar.pdf |
|
Srividya Ramaswamy |
Comparing the Efficiency of Two Clustering Techniques |
|
Srividya_Ramaswamy.pdf |
|
Sudha Rao |
Parser for Abstract Meaning Representation using Learning to Search |
|
SudhaRao-1.pdf |
|
Sudha Rao |
Biomedical event extraction using Abstract Meaning Representation |
|
SudhaRao-2.pdf |
|
Elnatan Reisner |
Using Symbolic Evaluation to Understand Behavior in Configurable Software Systems |
|
Reisner.pdf |
|
Patrick Roos |
Risk Preference and Sequential Choice in Evolutionary Games |
|
PatrickRoos.pdf |
|
Brianne Roth |
An Alternative Method for Computing the Semidiscrete Matrix Decomposition |
|
rothpaper.pdf |
|
David Rouff |
Concept Map: Visualizing Data Clusters in Categorical Domains |
|
DavidRouff.pdf |
|
Nickolas Rutar |
Optimized Register Usage for Dynamic Instrumentation |
|
Rutar.pdf |
|
Brianna Satinoff |
An Evaluation of Two Algorithms for Hierarchically Semiseparable Matrices |
|
Satinoff.pdf |
|
Asad Sayeed |
Prepositions and scrambling: potential consequences for the architecture of language |
|
Sayeed.pdf |
|
Hassan Sayyadi |
FutureRank: Ranking Scientific Articles by Predicting Their Future |
|
sayyadi.pdf |
|
Patricia J. Sazama |
An Overview of Visualizing Dynamic Graphs |
|
Sazama.pdf |
|
Michael Schatz |
BlastReduce: High Performance Short Reading Mapping with MapReduce |
|
MichaelSchatz.pdf |
|
Aaron Schulman |
On the Fidelity of 802.11 Packet Traces |
|
schulman.pdf |
|
Rachel Schwartz |
An Efficient Implementation of the Robust k-Center Clustering Problem |
|
Rachel_Schwartz.pdf |
|
Jessica Seastrom |
Characterizing Transport Layer Behavior in the MeshTest Wireless Testbed |
|
Seastrom.pdf |
|
Emre Sefer |
Metric Labeling and Semi-metric Embedding for Protein Annotation Prediction |
|
Sefer.pdf |
|
Yoav Segev |
Complete Domain Decomposition A new approach to communication avoidance when solving boundary value problems in a parallel environment |
|
Segev.pdf |
|
Vivek Sehgal |
Entity Resolution in Geospatial Data Integration |
|
sehgal.pdf |
|
Paulo Shakarian |
SCARE: The Spatio-Cultural Abductive Reasoning Engine |
|
Shakarian.pdf |
|
Hossam Sharara |
Understanding Actor Loyalty to Event-Based Groups in Affiliation Networks |
|
HossamSharara.pdf |
|
Puneet Sharma |
A method to efficiently select the suitable barrier algorithm during the system characterization task |
|
PuneetSharma.pdf |
|
Sameer Shirdhonkar |
Non-Negative Lighting and Specular Object Recognition |
|
Specular.pdf |
|
Behjat Siddiquie |
Combining Multiple Kernels for Efficient Image Classification |
|
Siddiquie.pdf |
|
Tandeep Sidhu |
Spot and Park: Parking Management System |
|
Sidhu.pdf |
|
Gerardo Simari |
Computing Most Probable Worlds for Action Probabilistic Logic Programs |
|
GerardoSimari.pdf |
|
Evren Sirin |
Automated Composition of Web Services using AI Planning Techniques |
|
aiplanning.pdf |
|
Amy Sliva |
Find Most Probable Worlds of Probablistic Logic Programs: a Parallel Approach |
|
AmySliva.pdf |
|
Charles Song |
Evaluating and Tuning Predictors for Execution Classification |
|
CharlesSong.pdf |
|
Hyunyoung Song |
CubeExplore: An Evaluation of Interaction Techniques in Architectural Education |
|
hsong_scholarly.pdf |
|
Sukhyun Song |
Decentralized Pairwise Bandwidth Prediction |
|
SukhyunSong.pdf |
|
Awalin Sopan |
Application of Manynets to Analyze Dynamic Networks and Compare Oline Communities |
|
Sopan.pdf |
|
Sharath Srinivas |
Indexing Techniques for Temporal Text Containment Queries |
|
sharathsrinivas.pdf |
|
Jaymie Strecker |
An Empirical Evaluation of Test Adequacy Criteria for Event-Driven Programs |
|
strecker.pdf |
|
Jared Sylvester |
Maximizing Diffusion on Dynamic Social Networks |
|
Sylvester.pdf |
|
Nicholas Sze |
Construction of Composite Numbers by Recursively Exponential Numbers |
|
sze.pdf |
|
Dave Tahmoush |
Computer Vision and Learning Approaches to Medical Imaging |
|
compvision.pdf |
|
Sureyya Tarkan |
The Formal Specification of a Kitchen Environment |
|
Tarkan.pdf |
|
Benjamin Teitler |
NewsStand: A New View on News |
|
Teitler.pdf |
|
Alison Teoh |
Reuse for Code-Level Generalization |
|
Teoh.pdf |
|
Shashvat Thakor |
An Empirical Comparison of Fault-Detection Effectiveness and Cost of Exhaustive and Pair-Wise Testing |
|
ShashvatThakor.pdf |
|
Ananta Tiwari |
Auto-tuning Parallel Programs at Compiler- and Application-Levels |
|
Tiwari.pdf |
|
Mohammad Toossi |
AYAC: A Probabilistic Complex Event Processor for Incomplete Streams |
|
toossi-ayac.pdf |
|
Khoa Trinh |
A Survey of Algorithms for Capacitated k-median Problems |
|
Trinh.pdf |
|
Jonathan Turpie |
MultiOtter: Multiprocess Symbolic Execution |
|
Turpie.pdf |
|
Alexandros Tzannes |
Automatic XMTC to Cilk Translation |
|
Tzannes.pdf |
|
Praveen Vaddadi |
Selfishness, Cooperation and Topology Dynamics in Networks |
|
Vaddadi.pdf |
|
Michael VanDaniker |
Visualizing Real-Time and Archived Traffic Incident Data |
|
VanDaniker.pdf |
|
Maria Vanina Martinez |
An Axiomatic Approach to Measure the Degree of Dirtiness in Relational Databases |
|
Martinez.pdf |
|
Balaji Vasan Srinivasan |
Fast Matrix-Vector Product Based FGMRES for Kernel Machines |
|
Srinivasan.pdf |
|
Marcelo Velloso |
Computing 3D Curvature through a Bucket PR Octree |
|
Velloso.pdf |
|
Nicholas Violi |
Caretaker: A Social Game for Studying Trust Dynamics |
|
NicholasVioli.pdf |
|
Nathaniel Waisbrot |
Hybrid Techniques for Classical Planning |
|
waisbrot.pdf |
|
Xu Wang |
From Centralization to Distribution: a Comparison of File Sharing Protocols |
|
XuWang.pdf |
|
Brandyn White |
Towards Flexible Classification: Cost-Aware Online Query of Cascades and Operating Points |
|
BrandynWhite.pdf |
|
R. Kent Wills |
Efficient Sentiment Analysis of Feeds for Rapid User Information Gain |
|
Wills.pdf |
|
Shomir Wilson |
An Active Logic Approach to Moore's Paradox |
|
ShomirWilson.pdf |
|
Peratham Wiriyathammabhum |
Computer Vision and Natural Language Processing: Recent Approaches in Multimedia and Robotics |
|
PerathamW.pdf |
|
Krist Wongsuphasawat |
Finding Comparable Patient Histories: A Temporal Categorical Similarity Measure with an Interactive Visualization |
|
Wongsuphasawat.pdf |
|
Derek Wood |
Improving genome start site annotations with multiple alignments of homologous proteins |
|
DerekWood.pdf |
|
Shanchan Wu |
An Approximate Scheme to Mine Frequent Patterns over Data Streams |
|
ShanchanWu.pdf |
|
Qian Wu |
Spatial Hashtags in Tweets |
|
QianWu.pdf |
|
Fusun Yaman-Sirin |
A Logic of Motion |
|
logic.pdf |
|
Philip Yang |
Bayesian Nonparametrics Analysis of Spatial Temporal fMRI Signals |
|
PhilipYang.pdf |
|
Jihwang Yeo |
WLAN Workload Characterization |
|
wlan.pdf |
|
Arkady Yerukhimovich |
A General Framework for One Database Private Information Retrieval |
|
Arkady-pircomp.pdf |
|
Hyoungjune Yi |
Detecting semi-specular reflection component from a sequence of images |
|
H%20Yi.pdf |
|
Konstantinos Zampogiannis |
Manipulation action representations via tracking object-wise spatial relations |
|
Zampogiannisrev.pdf |
|
Nico Zazworka |
Tool Supported Detection and Judgment of Nonconformance in Process Execution |
|
Zazworka.pdf |
|
Ke Zhai |
Using Variational Inference and MapReduce to Scale Topic |
|
KeZhai.pdf |