Conference Papers
(Publications are listed alphabetically by title)
Pages
Anthropomorphism: from Eliza to Terminator 2. In: Proceedings of the SIGCHI conference on Human factors in computing systems. New York, NY, USA: ACM; 1992. 6. p. 67-70p. (CHI '92).
Anti-collusion codes: multi-user and multimedia perspectives. In: Image Processing. 2002. Proceedings. 2002 International Conference on. Vol 2.; 2002. I. II-p. 149-p. II-152 vol.p. 2-p. II-p. 149-p. II-152 vol.2.
Anti-collusion of group-oriented fingerprinting. In: Multimedia and Expo, 2003. ICME '03. Proceedings. 2003 International Conference on. Vol 2.; 2003. I. II - p. 217-20p. vol.p. 2-p. II - p. 217-20p. vol.2.
Anywhere, Anytime Code Inspections: Using the Web to Remove Inspection Bottlenecks in Large-Scale Software Development. In: Software Engineering, International Conference on. Los Alamitos, CA, USA: IEEE Computer Society; 1997. 1. p. 14.
Appearance modeling under geometric context. In: Computer Vision, 2005. ICCV 2005. Tenth IEEE International Conference on. Vol 2.; 2005. 1. p. 1252-1259p. Vol. p. 2-1252p. -1259 Vol. 2.
Appearance-based tracking and recognition using the 3D trilinear tensor. In: Acoustics, Speech, and Signal Processing, 2004. Proceedings. (ICASSP '04). IEEE International Conference on. Vol 3.; 2004. i. iii - p. 613-16p. vol.p. 3-p. iii - p. 613-16p. vol.3.
Application level scheduling of gene sequence comparison on metacomputers. In: Proceedings of the 12th international conference on Supercomputing.; 1998. 1. p. 141-148p.
Application of MCL in a dialog agent. In: Third Language and Technology Conference.; 2007.
Application-layer broker for scalable Internet services with resource reservation. In: Proceedings of the seventh ACM international conference on Multimedia (Part 2). New York, NY, USA: ACM; 1999. 1. p. 103-106p. (MULTIMEDIA '99).
Applications or Protected Circumscription. In: 7th International Conference on Automated Deduction, Napa, California, USA, May 14-16, 1984: proceedings. Vol 170.; 1984. 4. p. 414.
Applying flow-sensitive CQUAL to verify MINIX authorization check placement. In: Proceedings of the 2006 workshop on Programming languages and analysis for security. Ottawa, Ontario, Canada: ACM; 2006. 3. p. 3-6p. (PLAS '06).
Applying graphics processor acceleration in a software defined radio prototyping environment. In: 2011 22nd IEEE International Symposium on Rapid System Prototyping (RSP).; 2011. 6. p. 67-73p.
Applying Software Reliability Models on Security Incidents.; 2007. 1. p. 159-168p.
Applying the CHAOS/PARTI library to irregular problems in computational chemistry and computational aerodynamics. In: Scalable Parallel Libraries Conference, 1993., Proceedings of the.; 1993. 4. p. 45-56p.
APPOINT: an Approach for Peer-to-Peer Offloading the INTernet. In: Proceedings of the 2002 annual national conference on Digital government research. Digital Government Society of North America; 2002. 1. p. 1-7p. (dg.o '02).
Approximate and exact parallel scheduling with applications to list, tree and graph problems. In: 27th Annual Symposium on Foundations of Computer Science.; 1986. 4. p. 478-491p.
Approximate Data Collection in Sensor Networks using Probabilistic Models. In: Proceedings of the 22nd International Conference on Data Engineering, 2006. ICDE '06. IEEE; 2006. 4. p. 48.
Approximate earth mover's distance in linear time. In: Computer Vision and Pattern Recognition, 2008. CVPR 2008. IEEE Conference on.; 2008. 1. p. 1-8p.
Approximate expressions for the mean and the covariance of the maximum likelihood estimator for acoustic source localization. In: Acoustics, Speech, and Signal Processing, 2005. Proceedings. (ICASSP '05). IEEE International Conference on. Vol 3.; 2005. i. iii/p. 73-p. iii/76 Vol. p. 3-p. iii/p. 73-p. iii/76 Vol. 3.
Approximate kernel matrix computation on GPUs forlarge scale learning applications. In: Proceedings of the 23rd international conference on Supercomputing. Yorktown Heights, NY, USA: ACM; 2009. 5. p. 511-512p. (ICS '09).
Approximate nearest neighbor queries in fixed dimensions. In: Proceedings of the fourth annual ACM-SIAM Symposium on Discrete algorithms. Philadelphia, PA, USA: Society for Industrial and Applied Mathematics; 1993. 2. p. 271-280p. (SODA '93).
Approximate parallel prefix computation and its applications. In: Parallel Processing Symposium, 1993., Proceedings of Seventh International.; 1993. 3. p. 318-325p.
Approximate range searching. In: Proceedings of the eleventh annual symposium on Computational geometry. New York, NY, USA: ACM; 1995. 1. p. 172-181p. (SCG '95).
Approximate scheduling, exact scheduling, and applications to parallel algorithms. In: Proceedings Symposium on Foundations of Computer Science.; 1986. 4. p. 478-491p.
Approximating hyper-rectangles: learning and pseudo-random sets. In: Proceedings of the twenty-ninth annual ACM symposium on Theory of computing. New York, NY, USA: ACM; 1997. 3. p. 314-323p. (STOC '97).
Approximation Algorithms for Computing Capacity of Wireless Networks with SINR Constraints. In: IEEE INFOCOM 2008. The 27th Conference on Computer Communications. IEEE; 2008. 1. p. 1166-1174p.
Approximation algorithms for multiple-tool miling. In: Proceedings of the fourteenth annual symposium on Computational geometry. New York, NY, USA: ACM; 1998. 2. p. 297-306p. (SCG '98).
Approximation algorithms for stochastic and risk-averse optimization. In: Proceedings of the eighteenth annual ACM-SIAM symposium on Discrete algorithms. Philadelphia, PA, USA: Society for Industrial and Applied Mathematics; 2007. 1. p. 1305-1313p. (SODA '07).
Approximation algorithms for throughput maximization in wireless networks with delay constraints. In: 2011 Proceedings IEEE INFOCOM. IEEE; 2011. 1. p. 1116-1124p.
Approximation results for probabilistic survivability. In: Multi-Agent Security and Survivability, 2005 IEEE 2nd Symposium on.; 2005. 1. p. 1-10p.
ApproxRank: Estimating Rank for a Subgraph. In: IEEE 25th International Conference on Data Engineering, 2009. ICDE '09. IEEE; 2009. 5. p. 54-65p.
AQuA: an adaptive architecture that provides dependable distributed objects. In: Seventeenth IEEE Symposium on Reliable Distributed Systems.; 1998. 2. p. 245-253p.
Arabic Cross-Document Coreference Resolution. In: Proceedings of the ACL-IJCNLP 2009 Conference Short Papers$}$.; 2009. 3. p. 357-360p.
Arbitrate-and-move primitives for high throughput on-chip interconnection networks. In: Circuits and Systems, 2004. ISCAS '04. Proceedings of the 2004 International Symposium on. Vol 2.; 2004. I. II - p. 441-4p. Vol.p. 2-p. II - p. 441-4p. Vol.2.
Archimedes, an archive of medical images. In: American Medical Informatics Association 2006 Annual Symposium Proceedings Biomedical and Health Informatics: From Foundations to Applications to Policy, Washington, DC, DW Bates, JH Holmes, and G. Kuperman, editors.; 2006.
Architectural Interaction Diagrams: AIDs for System Modeling. In: Software Engineering, International Conference on. Los Alamitos, CA, USA: IEEE Computer Society; 2003. 3. p. 396.
Archiving, indexing, and retrieval of video in compressed domain. In: SPIEConference on Multimedia Storage and Archiving Systems. Vol 2916.; 1996. 7. p. 78-89p.
Are developers complying with the process: an XP study. In: Proceedings of the 2010 ACM-IEEE International Symposium on Empirical Software Engineering and Measurement. New York, NY, USA: ACM; 2010. 1. 14:p. 1-14p. :p. 10-14p. :p. 1-14p. :10. (ESEM '10).
Are GSM phones THE solution for localization?. In: Mobile Computing Systems and Applications, 2006. WMCSA'06. Proceedings. 7th IEEE Workshop on.; 2005. 3. p. 34-42p.
ARobust Method for Unknown Forms Analysis. In: ICDAR.; 1999. 5. p. 531-534p.
ARobust Stamp Detection Framework on Degraded Documents. In: International Conference on Document Recognition and Retrieval XIII. San Jose, CA; 2006. 1. p. 1-9p.
Ask WINE: Are We Safer Today? Evaluating Operating System Security Through Big Data Analysis. In: LEET'12 Proceedings of the 5th USENIX conference on Large-Scale Exploits and Emergent Threats. USENIX Association; 2012. 1. p. 11. (LEET'12).
ASPIRE: automated systematic protocol implementation robustness evaluation. In: Software Engineering Conference, 2004. Proceedings. 2004 Australian.; 2004. 2. p. 241-250p.
Assessing others' knowledge and ignorance. In: Proceedings of the 4th International Symposium on Methodologies for Intelligent Systems.; 1989.
Assessing the Attack Threat due to IRC Channels.; 2006. 4. p. 467-472p.
Assessment of Temperature Fluctuation Models for RANS Simulations of Hypersonic Reacting Flows. In: 38th AIAA Aerospace Sciences Meeting and Exhibit. Reno, NV; 2000.
Assessment of the k-epsilon turbulence model for compressible flows using direct simulation data. In: 39th AIAA Aerospace Sciences Meeting and Exhibit. Reno, NV; 2001.
Assessor error in stratified evaluation. In: Proceedings of the 19th ACM international conference on Information and knowledge management.; 2010. 5. p. 539-548p.
Assigning cameras to subjects in video surveillance systems. In: Robotics and Automation, 2009. ICRA '09. IEEE International Conference on.; 2009. 8. p. 837-843p.