Conference Papers
(Publications are listed alphabetically by title)
Pages
An efficient parallel algorithm for channel routing. In: Computer Design: VLSI in Computers and Processors, 1990. ICCD '90. Proceedings., 1990 IEEE International Conference on.; 1990. 4. p. 400-403p.
An efficient system for multi-perspective imaging and volumetric shape analysis. In: Proceedings of the 2001 Workshop on Parallel and Distributed Computing in Imaging Processing, Video Processing, and Multimedia.; 2001.
An empirical comparison of pie vs. linear menus. In: Proceedings of the SIGCHI conference on Human factors in computing systems. New York, NY, USA: ACM; 1988. 9. p. 95-100p. (CHI '88).
An empirical exploration of code evolution. In: International Workshop on Empirical Studies of Software Maintenance.; 1996.
An empirical study of filesystem activity following a SSH compromise.; 2007. 1. p. 1-5p.
An empirical study of regression test application frequency. In: Proceedings of the 22nd international conference on Software engineering - ICSE '00. Limerick, Ireland; 2000. 1. p. 126-135p.
An empirical study to compare two parallel programming models. In: Proceedings of the eighteenth annual ACM symposium on Parallelism in algorithms and architectures. New York, NY, USA: ACM; 2006. 1. p. 114. (SPAA '06).
An energy-driven design methodology for distributing DSP applications across wireless sensor networks. In: Proceedings of RTSS.; 2007. 2. p. 214-226p.
An Error-Theory of Consciousness. In: MARYLAND COMPUTER SCIENCE.; 1994.
An experience management system for a software engineering research organization. In: Software Engineering Workshop, 2001. Proceedings. 26th Annual NASA Goddard.; 2001. 2. p. 29-35p.
An experiment to assess different defect detection methods for software requirements inspections. In: Proceedings of the 16th international conference on Software engineering.; 1994. 1. p. 103-112p.
An experimental evaluation of correlated network partitions in the Coda distributed file system.; 2003. 2. p. 273-282p.
An experimental evaluation of linear and kernel-based methods for face recognition. In: Applications of Computer Vision, 2002. (WACV 2002). Proceedings. Sixth IEEE Workshop on.; 2002. 1. p. 13-18p.
An experimental evaluation to determine if port scans are precursors to an attack.; 2005. 6. p. 602-611p.
An exploratory study of the W3C mailing list test collection for retrieval of emails with pro/con arguments. In: Proceedings of the Third Conference on Email and Anti-Spam, Mountain View, CA, July.; 2006.
An Extensible Heuristic-Based Framework for GUI Test Case Maintenance. In: Software Testing, Verification and Validation Workshops, 2009. ICSTW '09. International Conference on.; 2009. 2. p. 251-254p.
An extension of the Lovász Local Lemma, and its applications to integer programming. In: Proceedings of the seventh annual ACM-SIAM symposium on Discrete algorithms. Philadelphia, PA, USA: Society for Industrial and Applied Mathematics; 1996. 6. p. 6-15p. (SODA '96).
An improved classification tree analysis of high cost modules based upon an axiomatic definition of complexity. In: Software Reliability Engineering, 1992. Proceedings., Third International Symposium on.; 1992. 1. p. 164-172p.
An improved mean shift tracking method based on nonparametric clustering and adaptive bandwidth. In: Machine Learning and Cybernetics, 2008 International Conference on. Vol 5.; 2008. 2. p. 2779-2784p.
An improved replacement strategy for function caching. In: Proceedings of the 1988 ACM conference on LISP and functional programming - LFP '88. Snowbird, Utah, United States; 1988. 2. p. 269-276p.
An Initial Characterization of Industrial Graphical User Interface Systems. In: Software Testing Verification and Validation, 2009. ICST '09. International Conference on.; 2009. 1. p. 11-20p.
An integrated framework for scenarios and state machines. In: Integrated Formal Methods.; 2005. 3. p. 366-385p.
An intelligent environment for simulating mechanical assembly operations.; 1998. 1. p. 13-16p.
An Interactive Approach to Pose-Assisted and Appearance-based Segmentation of Humans. In: Computer Vision, 2007. ICCV 2007. IEEE 11th International Conference on.; 2007. 1. p. 1-8p.
An international SIGCHI research agenda. In: CHI '99 extended abstracts on Human factors in computing systems. New York, NY, USA: ACM; 1999. 1. p. 171. (CHI EA '99).
An introduction to PSQL: A pictorial structured query language. In: Proc. IEEE Workshop on Visual Languages.; 1984. 7. p. 77-87p.
An M-channel directional filter bank compatible with the contourlet and shearlet frequency tiling. In: Proceedings of SPIE. Vol 6701.; 2007. 6. p. 67010C.
An MPEG-2 to H. 263 transcoder. In: SPIE Voice, Video, and Data Communications Conference.; 1999.
An online computation of critical path profiling. In: Proceedings of the SIGMETRICS symposium on Parallel and distributed tools.; 1996. 1. p. 11-20p.
An ontology based approach for activity recognition from video. In: Proceedings of the 16th ACM international conference on Multimedia. New York, NY, USA: ACM; 2008. 7. p. 709-712p. (MM '08).
An operational framework for value-passing processes. In: Proceedings of the 21st ACM SIGPLAN-SIGACT symposium on Principles of programming languages. New York, NY, USA: ACM; 1994. 3. p. 326-338p. (POPL '94).
An operational semantics of value passing. In: Proceedings 2nd North American Process Algebra Workshop, Ithaca, New York.; 1993.
An Optimal Ear Decomposition Algorithm with Applications on Fixed-Size Linear Arrays. In: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON PARALLEL PROCESSING.; 1995.
An output sensitive algorithm for computing visibility graphs. In: Foundations of Computer Science, 1987., 28th Annual Symposium on.; 1987. 1. p. 11-19p.
An unsupervised learning method for representing simple sentences. In: Neural Networks, 2009. IJCNN 2009. International Joint Conference on.; 2009. 2. p. 2133-2140p.
An unsupervised method for word sense tagging using parallel corpora. In: Proceedings of the 40th Annual Meeting on Association for Computational Linguistics.; 2002. 2. p. 255-262p.
Analysis of attacks on SDMI audio watermarks. In: Acoustics, Speech, and Signal Processing, 2001. Proceedings. (ICASSP '01). 2001 IEEE International Conference on. Vol 3.; 2001. 1. p. 1369-1372p. vol.p. 3-1369p. -1372 vol.3.
Analysis of Computer Security Incident Data Using Time Series Models.; 2008. 7. p. 77-86p.
Analysis of Nonlinear Collusion Attacks on Fingerprinting Systems for Compressed Multimedia. In: Image Processing, 2007. ICIP 2007. IEEE International Conference on. Vol 2.; 2007. I. II -133 -II -p. 136-p. II -133 -II -136.
Analyzing (social media) networks with NodeXL. In: Proceedings of the fourth international conference on Communities and technologies. New York, NY, USA: ACM; 2009. 2. p. 255-264p. (C&T '09).
Analyzing concurrent systems using the Concurrency Workbench. In: Functional Programming, Concurrency, Simulation and Automated Reasoning.; 1993. 1. p. 129-144p.
Analyzing medium-scale software development. In: Proceedings of the 3rd international conference on Software engineering. Piscataway, NJ, USA: IEEE Press; 1978. 1. p. 116-123p. (ICSE '78).
Analyzing the process of installing rogue software.; 2009. 5. p. 560-565p.
And away we go: understanding the complexity of launching complex HPC applications. In: Proceedings of the second international workshop on Software engineering for high performance computing system applications. New York, NY, USA: ACM; 2005. 4. p. 45-49p. (SE-HPCS '05).
ANew Algorithm for Detecting Text Line in Handwritten Documents. In: 10th International Workshop on Frontiers in Handwriting Recognition. La Baule, France; 2006. 3. p. 35-40p.
Annotating the semantic web using natural language. In: Proceedings of the 2nd workshop on NLP and XML - Volume 17. Stroudsburg, PA, USA: Association for Computational Linguistics; 2002. 1. p. 1-8p. (NLPXML '02).
Annotation compatibility working group report. In: Proceedings of the Workshop on Frontiers in Linguistically Annotated Corpora 2006. Stroudsburg, PA, USA: Association for Computational Linguistics; 2006. 3. p. 38-53p. (LAC '06).
Answering queries using OQL view expressions. In: In Workshop on Materialized Views, in cooperation with ACM SIGMOD.; 1996.
Answering what-if deployment and configuration questions with wise. In: Proceedings of the ACM SIGCOMM 2008 conference on Data communication. New York, NY, USA: ACM; 2008. 9. p. 99-110p. (SIGCOMM '08).
Ant Colony Optimization in a Changing Environment. In: 2011 AAAI Fall Symposium Series.; 2011.