15781<>0_7<>milos d. ercegovac<>variable radix real and complex digit-recurrence division<>asap<>jean-michel muller<>
15784<>0_10<>arnaud tisserand:benoit dupont de dinechin:christophe monat<>division by constant for the st100 dsp microprocessor<>arith<>jean-michel muller<>
15789<>0_15<>nicolas brisebarre:david defour:peter kornerup:nathalie revol<>a new range-reduction algorithm<>tc<>jean-michel muller<>
15791<>0_17<>sylvie boldo<>some functions computable with a fused-mac<>arith<>jean-michel muller<>
15797<>0_23<>josn-alejandro pineiro:stuart f. oberman:javier d. bruguera<>high-speed function approximation using a minimax quadratic interpolator<>tc<>jean-michel muller<>
15803<>0_29<>nicolas brisebarre<>correctly rounded multiplication by arbitrary precision constants<>arith<>jean-michel muller<>
5935<>7_9<>anh nguyen-tuong:salvatore guarnieri:doug greene:jeff shirley<>automatically hardening web applications using precise tainting<>sec<>david evans<>
39362<>10_14<>nulo<>the cognitive processes of abstraction and formal inferences<>IEEEicci<>yingxu wang<>
39365<>10_17<>nulo<>on cognitive properties of human factors in engineering<>IEEEicci<>yingxu wang<>
39366<>10_18<>nulo<>mathematical models and properties of games<>IEEEicci<>yingxu wang<>
39375<>12_1<>pierre moulin<>on achievable error exponents for watermarking<>sswmc<>ying wang<>
39377<>12_3<>pierre moulin<>improved qim strategies for gaussian watermarking<>iwdw<>ying wang<>
39379<>13_1<>li li:joseph y. halpern:paramvir bahl:roger wattenhofer<>a cone-based distributed topology-control algorithm for wireless multi-hop networks<>ton<>yi-min wang<>
39382<>13_4<>doug beck:binh vo:roussi roussev:chad verbowski<>detecting stealth software with strider ghostbuster<>dsn<>yi-min wang<>
39395<>15_1<>jiankun hu:heiko schroder<>a gradient based weighted averaging method for estimation of fingerprint orientation fields<>dicta<>yi wang<>
26555<>17_2<>petr kroha<>a case study: news classification based on term frequency<>dexaw<>ricardo a. baeza-yates<>
26577<>17_24<>nulo<>web mining<>la-web<>ricardo a. baeza-yates<>
26585<>17_32<>alejandro salinger<>experimental analysis of a fast intersection algorithm for sorted sequences<>spire<>ricardo a. baeza-yates<>
26607<>17_54<>nulo<>applications of web query mining<>ecir<>ricardo a. baeza-yates<>
26609<>17_56<>alvaro r. pereira jr.:nivio ziviani<>wim: an information mining model for the web<>la-web<>ricardo a. baeza-yates<>
26612<>17_59<>alvaro r. pereira jr.:nivio ziviani<>wim: an information mining model for the web<>dexaw<>ricardo a. baeza-yates<>
26615<>17_62<>barbara poblete<>a website mining model centered on user queries<>ewmf<>ricardo a. baeza-yates<>
26618<>17_65<>alvaro r. pereira jr.<>applications of a web information mining model to data mining and information retrieval tasks<>dexaw<>ricardo a. baeza-yates<>
26628<>17_75<>mariano p. consens<>database and information retrieval techniques for xml<>asian<>ricardo a. baeza-yates<>
26629<>17_76<>carlos a. hurtado:marcelo mendoza:georges dupret<>modeling user search behavior<>la-web<>ricardo a. baeza-yates<>
23322<>18_11<>janos pach:rom pinchasi:goza toth<>topological graphs with no large grids<>gc<>micha sharir<>
23358<>18_47<>rom pinchasi<>on graphs that do not contain the cube and related problems<>combinatorica<>micha sharir<>
10931<>21_0<>mathieu serrurier<>possibilistic inductive logic programming<>ecsqaru<>henri prade<>
10941<>21_10<>mathieu serrurier<>coping with exceptions in multiclass ilp problems using possibilistic logic<>ijcai<>henri prade<>
10953<>21_22<>leila amgoud:jean-francois bonnefon<>an argumentation-based approach to multiple criteria decision<>ecsqaru<>henri prade<>
10956<>21_25<>salem benferhat<>encoding formulas with partially constrained weights in a possibilistic-like many-sorted propositional logic<>ijcai<>henri prade<>
10957<>21_26<>leila amgoud:sihem belabbes<>towards a formal framework for the search of a consensus between autonomous agents<>argmas<>henri prade<>
10963<>21_32<>leila amgoud:sihem belabbes<>towards a formal framework for the search of a consensus between autonomous agents<>atal<>henri prade<>
10965<>21_34<>didier dubois:souhila kaci<>expressing preferences from generic rules and examples - a possibilistic approach without aggregation function<>ecsqaru<>henri prade<>
10967<>21_36<>didier dubois:thomas sudkamp<>"on the representation, measurement, and discovery of fuzzy associations."<>tfs<>henri prade<>
10974<>21_43<>leila amgoud<>"handling threats, rewards, and explanatory arguments in a unified setting."<>ijis<>henri prade<>
25184<>22_0<>sachin agarwal<>a pragmatic solution to an indian accented english speech synthesizer using residual excited linear predictive coded voice<>iicai<>pallavi agarwal<>
8478<>23_0<>edwin r. hancock<>image scale-space from the heat kernel<>ciarp<>fan zhang<>
8483<>23_5<>huaijun qiu:edwin r. hancock<>evolving spanning trees using the heat equation<>caip<>fan zhang<>
25085<>25_23<>yonatan bilu:rachel kolodny<>faster algorithms for optimal multiple sequence alignment based on pairwise comparisons<>wabi<>pankaj k. agarwal<>
25093<>25_31<>lars arge:ke yi<>an optimal dynamic interval stabbing-max data structure?<>soda<>pankaj k. agarwal<>
25109<>25_47<>sariel har-peled:nabil h. mustafa:yusu wang<>near-linear time approximation algorithms for curve simplification<>algorithmica<>pankaj k. agarwal<>
25112<>25_50<>boris aronov:vladlen koltun:micha sharir<>lines avoiding unit balls in three dimensions<>dcg<>pankaj k. agarwal<>
25123<>25_61<>yusu wang:p. brown:herbert edelsbrunner:johannes rudolph<>coarse and reliable geometric alignment for protein docking<>psb<>pankaj k. agarwal<>
25179<>25_117<>robert-paul berretty:anne d. collins<>a near-quadratic algorithm for fence design<>dcg<>pankaj k. agarwal<>
8504<>26_1<>ou jianping<>super restricted edge connectivity of regular graphs<>gc<>fuji zhang<>
8508<>26_5<>ou jianping<>3-restricted edge connectivity of vertex transitive graphs<>arscom<>fuji zhang<>
8509<>26_6<>mihai ciucu:weigen yan<>the number of spanning trees of plane graphs with reflective symmetry<>jct<>fuji zhang<>
8487<>28_1<>samuel t. chanson<>power-aware processor scheduling under average delay constraints<>rtas<>fan zhang<>
8489<>28_3<>samuel t. chanson<>proxy-assisted scheduling for energy-efficient multimedia streaming over wireless lan<>networking<>fan zhang<>
33414<>32_5<>marvin v. zelkowitz:sima asgari:lorin hochstein:jeffrey k. hollingsworth:taiga nakamura<>measuring productivity on high performance computers<>metrics<>victor r. basili<>
33417<>32_8<>taiga nakamura<>metrics of software architecture changes based on structural distance<>metrics<>victor r. basili<>
33450<>32_41<>forrest shull:daniela cruzes:manoel g. mendonca<>simulating families of studies to build confidence in defect hypotheses<>infsof<>victor r. basili<>
33454<>32_45<>paolo donzelli:daniel hirschbach<>using visualization to understand dependability: a tool support for requirements analysis<>sew<>victor r. basili<>
33484<>32_75<>lorin hochstein:marvin v. zelkowitz:jeffrey k. hollingsworth:jeffrey carver<>combining self-reported and automatic data to improve programming effort measurement<>sigsoft<>victor r. basili<>
38515<>33_1<>hyunseok lee:yoav harel:mark woh:scott a. mahlke:trevor n. mudge:krisztian flautner<>software defined radio - a high performance embedded challenge<>hipeac<>yuan lin<>
38510<>36_0<>bettina kemme:marta patiio-martinez:ricardo jimenez-peris<>middleware based data replication providing snapshot isolation<>sigmod<>yi lin<>
5984<>42_11<>pier luca lanzi:daniele loiacono:stewart w. wilson<>xcs with computed prediction in multistep environments<>gecco<>david e. goldberg<>
5985<>42_12<>pier luca lanzi:daniele loiacono:stewart w. wilson<>extending xcsf beyond linear approximation<>gecco<>david e. goldberg<>
5995<>43_1<>marshall w. bern<>eigenms: de novo analysis of peptide tandem mass spectra by spectral graph partitioning<>recomb<>david goldberg<>
8051<>44_0<>sven verdoolaege:kristof beyls:maurice bruynooghe<>experiences with enumeration of integer projections of parametric polytopes<>cc<>francky catthoor<>
6005<>45_2<>pedro julian:andreas g. andreou:gert cauwenberghs:milutin stanacevic:pablo sergio mandolesi:laurence riddle:shihab shamma<>field test results for low power bearing estimator sensor nodes<>iscas<>david h. goldberg<>
26770<>50_1<>michael y. k. cheng<>reasoning about interaction in a multi-user system<>um<>robin cohen<>
26784<>50_15<>michael y. k. cheng:chris micacchi<>adjusting the autonomy of collections of agents in multiagent systems<>ai<>robin cohen<>
26786<>50_17<>michael y. k. cheng<>a hybrid transfer of control model for adjustable autonomy multiagent systems<>atal<>robin cohen<>
26789<>52_0<>pierre fraigniaud:david ilcinkas:amos korman:david peleg<>labeling schemes for tree representation<>iwdc<>reuven cohen<>
18795<>55_1<>reishi yokomori:tetsuo yamamoto:makoto matsushita:shinji kusumoto<>ranking significance of software components based on use relations<>tse<>katsuro inoue<>
37571<>75_1<>moon-sang jeong:jong-tae park<>hmnr scheme based dynamic route optimization to support network mobility of mobile network<>euc<>yeong-hun cho<>
37572<>75_2<>moon-sang jeong:jong-tae park:wee-hyuk lee<>distributed management architecture for multimedia conferencing using sip<>dfma<>yeong-hun cho<>
27202<>76_2<>ashok k. turuk<>qos provisioning in wdm ring networks with tunable transceivers<>jhsn<>rajeev kumar<>
27206<>76_6<>durga prasad mohapatra:rajib mall<>computing dynamic slices of concurrent object-oriented programs<>infsof<>rajeev kumar<>
27208<>76_8<>vikram agrawal:anil mangolia<>realization of multimethods in single dispatch object oriented languages<>sigplan<>rajeev kumar<>
27217<>76_17<>pramod kumar singh:p. p. chakrabarti<>multiobjective ea approach for improved quality of solutions for spanning tree problem<>emo<>rajeev kumar<>
27224<>76_24<>sandip aine:p. p. chakrabarti<>adaptive control of anytime algorithm parameters<>iicai<>rajeev kumar<>
27227<>76_27<>dipankar das:p. p. chakrabarti<>dictionary based code compression for variable length instruction encodings<>vlsid<>rajeev kumar<>
27234<>77_2<>matthew wolenetz:junsuk shin:umakishore ramachandran<>a simulation-based study of wireless sensor network middleware<>ijnm<>rajnish kumar<>
27238<>77_6<>santashil palchaudhuri:richard g. baraniuk:david b. johnson<>design of adaptive overlays for multi-scale communication in sensor networks<>dcoss<>rajnish kumar<>
27243<>79_0<>jian liang:y. xi:keith w. ross<>pollution in p2p file sharing systems<>infocom<>rakesh kumar<>
27246<>79_3<>micah adler:keith w. ross:dan rubenstein:torsten suel:david d. yao<>optimal peer selection for p2p downloading and streaming<>infocom<>rakesh kumar<>
27247<>80_0<>vlasios tsiatsis:mani b. srivastava<>computation hierarchy for in-network processing<>monet<>ram kumar<>
27251<>81_1<>eyal de lara:yogesh chopra:nilesh vaghela:dan s. wallach:willy zwaenepoel<>iterative adaptation for mobile clients using existing apis<>tpds<>rajnish kumar<>
32365<>83_1<>rui yamaguchi:satoru yamashita<>estimating gene networks with cdna microarray data using state-space models<>iccsa<>tomoyuki higuchi<>
33379<>87_3<>christian poellabauer:santosh pande:karsten schwan<>an efficient frequency scaling approach for energy-aware embedded real-time systems<>arcs<>tao zhang<>
33380<>87_4<>xiaotong zhuang:santosh pande<>building intrusion-tolerant secure software<>cgo<>tao zhang<>
33383<>87_7<>xiaotong zhuang:santosh pande:wenke lee<>anomalous path detection with hardware support<>cases<>tao zhang<>
33374<>89_1<>daniel freedman<>improving performance of distribution tracking through background mismatch<>pami<>tao zhang<>
33375<>89_2<>daniel freedman:richard j. radke:yongwon jeong:d. michael lovelock:george t. y. chen<>model-based segmentation of medical imagery by matching distributions<>tmi<>tao zhang<>
33372<>91_1<>pavel sumazin:gengxin chen:naoya hata:andrew d. smith:michael q. zhang<>dwe: discriminating word enumerator<>bioinformatics<>theresa zhang<>
33368<>93_3<>henny b. sipma:zohar manna<>the decidability of the first-order theory of knuth-bendix order<>cade<>ting zhang<>
33369<>93_4<>henny b. sipma:zohar manna<>decision procedures for queues with integer constraints<>fsttcs<>ting zhang<>
33393<>96_2<>fei sun<>parallel high-throughput limited search trellis decoder vlsi design<>tvlsi<>tong zhang<>
10845<>99_4<>paul duff:michael r. mccarthy:angus clark:cliff randell:shahram izadi:andy boucher:andy law:sarah pennington:richard swinford<>a new method for auto-calibrated object tracking<>huc<>henk l. muller<>
10869<>99_28<>andrew moss<>efficient code generation for a domain specific language<>gpce<>henk l. muller<>
34492<>100_1<>paul baker:tim todman:henry styles<>reconfigurable designs for radiosity<>fccm<>wayne luk<>
34500<>100_9<>dong-u lee:altaf abdul gaffar:oskar mencer<>minibit: bit-width optimization via affine arithmetic<>dac<>wayne luk<>
34502<>100_11<>ray c. c. cheung:peter y. k. cheung<>reconfigurable elliptic curve cryptosystems on a chip<>date<>wayne luk<>
34504<>100_13<>oliver pell<>resolving quartz overloading<>charme<>wayne luk<>
34512<>100_21<>jose gabriel f. coutinho:jun jiang<>interleaving behavioral and cycle-accurate descriptions for reconfigurable hardware compilation<>fccm<>wayne luk<>
34513<>100_22<>dong-u lee:john d. villasenor:guanglie zhang:philip heng wai leong<>a hardware gaussian noise generator using the wallace method<>tvlsi<>wayne luk<>
34515<>100_24<>c. t. chow:l. s. m. tsui:philip heng wai leong:steven j. e. wilton<>dynamic voltage scaling for commercial fpgas<>fpt<>wayne luk<>
34528<>100_37<>dong-u lee:altaf abdul gaffar:oskar mencer<>optimizing hardware function evaluation<>tc<>wayne luk<>
34530<>100_39<>sherif yusuf:morris sloman:geoffrey brown:emil c. lupu:naranker dulay<>a combined hardware-software architecture for network flow<>ersa<>wayne luk<>
34539<>100_48<>david b. thomas<>high quality uniform random number generation through lut optimised linear recurrences<>fpt<>wayne luk<>
34542<>100_51<>ray c. c. cheung:n. j. telle:peter y. k. cheung<>customizable elliptic curve cryptosystems<>tvlsi<>wayne luk<>
34544<>100_53<>tim todman:jose gabriel f. coutinho<>customisable hardware compilation<>tjs<>wayne luk<>
34548<>100_57<>ray c. c. cheung:dong-u lee:oskar mencer:peter y. k. cheung<>automating custom-precision function evaluation for embedded processors<>cases<>wayne luk<>
14210<>101_1<>philip w. jones:patrick h. worley:yoshikatsu yoshida:john levesque<>practical performance portability in the parallel ocean program (pop)<>concurrency<>james b. white iii<>
14211<>101_2<>thomas h. dunigan jr.:jeffrey s. vetter:patrick h. worley<>performance evaluation of the cray x1 distributed shared-memory architecture<>micro<>james b. white iii<>
14230<>104_0<>nulo<>evolving fuzzy decision tree structure that adapts in real-time<>gecco<>james f. smith iii<>
14218<>105_0<>leonid taycher:trevor darrell<>incorporating object tracking feedback into background maintenance framework<>wacv<>john w. fisher iii<>
23405<>106_11<>nirmit desai:ashok u. mallya:amit k. chopra<>interaction protocols as design abstractions for business processes<>tse<>munindar p. singh<>
23411<>106_17<>e. michael maximilien<>agent-based trust model involving multiple qualities<>atal<>munindar p. singh<>
23457<>106_63<>ashok u. mallya<>incorporating commitment protocols into tropos<>aose<>munindar p. singh<>
23460<>106_66<>pinar yolum<>engineering self-organizing referral networks for trustworthy service selection<>tsmc<>munindar p. singh<>
23475<>108_2<>matt glennen<>automated ground-based cloud recognition<>paa<>maneesha singh<>
23478<>108_5<>sameer singh:derek partridge<>parameter optimization for image segmentation algorithms: a systematic approach<>icapr<>maneesha singh<>
23480<>108_7<>sameer singh<>image enhancement optimization for hand-luggage screening at airports<>icapr<>maneesha singh<>
23484<>110_0<>elena nabieva:kam jim:amit agarwal:bernard chazelle<>whole-proteome prediction of protein function via graph-theoretic analysis of interaction maps<>ismb<>mona singh<>
23485<>110_1<>carleton l. kingsford:bernard chazelle<>solving and analyzing side-chain positioning problems using linear and integer programming<>bioinformatics<>mona singh<>
6620<>118_0<>sameer tilak:tony fountain<>token equilibria in sensor networks with multiple sponsors<>colcom<>david a. miller<>
6574<>127_15<>alwen tiu<>a proof theory for generic judgments<>tocl<>dale miller<>
6575<>127_16<>elaine pimentel<>on the specification of sequent systems<>lpar<>dale miller<>
32808<>135_10<>priya baliga<>kolmogorov complexity based automata modeling for intrusion detection<>grc<>t. y. lin<>
32814<>135_16<>i-jen chiang<>semantic based clustering of web documents<>grc<>tsau young lin<>
32817<>135_19<>nulo<>introduction to special issues on data mining and granular computing<>ijar<>tsau young lin<>
36298<>143_1<>heshan lin:praveen chandramohan:al geist:nagiza f. samatova<>efficient data access for parallel blast<>ipps<>xiaosong ma<>
36304<>145_0<>w. eric l. grimson<>edge-based rich representation for vehicle classification<>iccv<>xiaoxu ma<>
32927<>146_0<>jun sese:yoichiro nakatani:fumi sano:masashi yukawa:yoshikazu ohya:shinichi morishita<>data mining tools for the  morphological database<>nar<>taro l. saito<>
37240<>147_2<>chi-jen lu<>oblivious polynomial evaluation and oblivious neural learning<>tcs<>yan-cheng chang<>
17434<>151_0<>birgit m. planitz:anthony j. maeder<>the correspondence framework for 3d surface matching algorithms<>cviu<>j. a. williams<>
17435<>151_1<>neil w. bergmann:x. xie<>fifo communication models in operating systems for reconfigurable computing<>fccm<>john a. williams<>
5770<>153_41<>michael t. goodrich:jonathan z. sun<>the skip quadtree: a simple dynamic data structure for multidimensional data<>compgeom<>david eppstein<>
5784<>153_55<>richard beigel<>3-coloring in time o(1.3289)<>jal<>david eppstein<>
5815<>153_86<>tony givargis<>memory reference caching for activity reduction on address buses<>mam<>david eppstein<>
5829<>153_100<>michael t. goodrich:jeremy yu meng<>delta-confluent drawings<>gd<>david eppstein<>
5859<>153_130<>nulo<>all maximal independent sets and dynamic dominance for sparse graphs<>soda<>david eppstein<>
5866<>153_137<>michael t. goodrich:daniel s. hirschberg<>improved combinatorial group testing for real-world problem sizes<>wads<>david eppstein<>
5885<>153_156<>kevin a. wortman<>minimum dilation stars<>compgeom<>david eppstein<>
5896<>153_167<>lars arge:michael t. goodrich<>skip-webs: efficient distributed data structures for multi-dimensional data sets<>podc<>david eppstein<>
5914<>153_185<>matthew dickerson:michael t. goodrich:jeremy yu meng<>confluent drawings: visualizing non-planar diagrams in a planar way<>jgaa<>david eppstein<>
5918<>153_189<>nulo<>the lattice dimension of a graph<>ejc<>david eppstein<>
5697<>158_4<>eyke hullermeier<>a notion of comparative probabilistic entropy based on the possibilistic specificity ordering<>ecsqaru<>didier dubois<>
5699<>158_6<>jorome fortin:pawel zielinski:helene fargier<>interval analysis in scheduling<>cp<>didier dubois<>
5701<>158_8<>henri prade:thomas sudkamp<>"on the representation, measurement, and discovery of fuzzy associations."<>tfs<>didier dubois<>
5709<>158_16<>philippe fortemps<>selecting preferred solutions in the minimax approach to dynamic programming problems under flexible constraints<>eor<>didier dubois<>
5714<>158_21<>asma brini:mohand boughanem<>a model for information retrieval based on possibilistic networks<>spire<>didier dubois<>
5724<>158_31<>helene fargier<>on the qualitative comparison of sets of positive and negative affects<>ecsqaru<>didier dubois<>
5728<>158_35<>cedric baudrit<>comparing methods for joint objective and subjective uncertainty propagation with an example in a risk assessment<>isipta<>didier dubois<>
22317<>162_0<>yongik yoon<>an una-based approach to support mobility in the internet<>networking<>mahnhoon lee<>
22289<>167_3<>sabrina s. s. fu<>it-based knowledge sharing and organizational trust: the development and initial test of a comprehensive model<>ecis<>matthew k. o. lee<>
22290<>167_4<>jolie lam<>"bridging the digital divide - the roles of internet self-efficacy towards learning computer and the internet among elderly in hong kong, china."<>hicss<>matthew k. o. lee<>
22295<>167_9<>christy m. k. cheung<>consumer satisfaction with internet shopping: a research framework and propositions for future research<>ACMicec<>matthew k. o. lee<>
22297<>168_0<>m. yousif<>instant attack stopper in infiniband architecture<>ccgrid<>manhee lee<>
22298<>168_1<>eun jung kim:mazin s. yousif<>security enhancement in infiniband architecture<>ipps<>manhee lee<>
22285<>169_1<>mei-yin shen:akio yoneyama:c. c. jay kuo<>dct-domain image registration techniques for compressed video<>iscas<>ming-sui lee<>
40554<>170_1<>zhisheng niu<>a channel-aware adaptive control to the mac protocol in rate adaptive wireless lans<>wicomm<>yanfeng zhu<>
40552<>171_0<>mark fisher:reyer zwiggelaar<>improving asm search using mixture models for grey-level profiles<>ibpria<>yanong zhu<>
40550<>175_0<>kyu-han kim:raghupathy sivakumar:hung-yun hsieh<>a receiver-centric transport protocol for mobile hosts with heterogeneous wireless interfaces<>winet<>yujie zhu<>
40546<>176_0<>kai xie:jie yang<>real-time rendering of 3d medical data sets<>fgcs<>yue min zhu<>
40547<>176_1<>kai xie:jie yang<>multi-resolution lod volume rendering in medicine<>iccS<>yue min zhu<>
40548<>176_2<>jianhua luo:patrick clarysse:isabelle e. magnin<>correction of bias field in mr images using singularity function analysis<>tmi<>yuemin zhu<>
41349<>177_1<>franjo ivancic:malay k. ganai:aarti gupta:ilya shlyakhter:pranav ashar<>f-soft: software verification platform<>cav<>zijiang yang<>
40517<>178_1<>bryson r. payne:saeid belkasim:g. scott owen:michael weeks<>accelerated 2d image processing on gpus<>iccS<>ying zhu<>
40518<>178_2<>jeffrey w. chastine:jeremy c. brooks:g. scott owen:robert w. harrison:irene t. weber<>ammp-vis: a collaborative virtual environment for molecular modeling<>vrst<>ying zhu<>
40519<>178_3<>saeid belkasim<>a 3d reconstruction algorithm based on 3d deformable atlas<>icita<>ying zhu<>
40522<>178_6<>jason a. pamplin:paul s. katz:rajshekhar sunderraman<>a 3d user interface for visualizing neuron location in invertebrate ganglia<>iccS<>ying zhu<>
8770<>180_7<>xiaotie deng:haodi feng:benyun shi<>a ptas for semiconductor burn-in scheduling<>jco<>guojun li<>
8773<>181_0<>tze-yun leong:louxin zhang<>translation initiation sites prediction with mixture gaussian models in human cdna sequences<>tkde<>guoliang li<>
8756<>183_0<>jianhua feng:qian qian:yuguo liao:na ta<>dmt: a flexible and versatile selectivity estimation approach for graph query<>waim<>guoliang li<>
8752<>185_3<>min zhang:yuxi fu:zhizhou zhang:lin he<>typing aberrance in signal transduction<>icnc<>guoqiang li<>
8746<>189_1<>joe michael kniss:robert van uitert:abraham stephens:tolga tasdizen:charles d. hansen<>statistically quantitative volume visualization<>visualization<>guo-shi li<>
27179<>190_1<>sebastien ferre<>a dichotomic search algorithm for mining and learning in domain-specific logics<>fuin<>ross d. king<>
41382<>194_0<>jorma laaksonen<>partial relevance in interactive facial image retrieval<>icapr<>zhirong yang<>
41383<>194_1<>jorma laaksonen<>approximated classification in interactive facial image retrieval<>scia<>zhirong yang<>
41366<>197_0<>gang chen:hao he:kiah mok goh<>maintaining system state information in a multiagent environment for effective learning<>ieicet<>zhonghua yang<>
41367<>197_1<>gang chen:hao he:kiah mok goh<>coordinating multiple agents via reinforcement learning<>aamas<>zhonghua yang<>
41368<>197_2<>jing-bing zhang:robert gay:liqun zhuang:hui lee<>building a semantic-rich service-oriented manufacturing environment<>wise<>zhonghua yang<>
41373<>199_1<>sheng zhong:rebecca n. wright<>anonymity-preserving data collection<>kdd<>zhiqiang yang<>
41375<>199_3<>sheng zhong:rebecca n. wright<>privacy-preserving classification of customer data without loss of accuracy<>sdm<>zhiqiang yang<>
41376<>199_4<>sheng zhong:rebecca n. wright<>privacy-enhancing -anonymization of customer data<>pods<>zhiqiang yang<>
34717<>205_3<>jun huan:deepak bandyopadhyay:jack snoeyink:jan prins:alexander tropsha<>comparing graph representations of protein structure for mining family-specific residue-based packing motifs<>jcb<>wei wang<>
34732<>205_18<>guodong liu:jingdan zhang:leonard mcmillan<>a system for analyzing and indexing human-motion databases<>sigmod<>wei wang<>
34745<>205_31<>feng pan:anthony k. h. tung:jiong yang<>finding representative set from massive data<>icdm<>wei wang<>
34759<>205_45<>peng wang:haixun wang:xiaochen wu:baile shi<>on reducing classifier granularity in mining concept-drifting data streams<>icdm<>wei wang<>
34760<>205_46<>jiong yang:haixun wang:philip s. yu<>an improved biclustering method for analyzing gene expression profiles<>ijait<>wei wang<>
34762<>205_48<>jiong yang<>guest editors' introduction: special issue on mining biological data<>tkde<>wei wang<>
34769<>205_55<>haixun wang<>stay current and relevant in data mining research<>dasfaa<>wei wang<>
34771<>206_0<>diep bich do:xuemin lin<>term graph model for text classification<>adma<>wei wang<>
34772<>206_1<>hongzhi wang:jianzhong li:xuemin lin:reymond wong<>practical indexing xml document for twig query<>asian<>wei wang<>
34773<>206_2<>yi luo:zheng liu:xuemin lin:jeffrey xu yu<>similarity search with implicit object features<>waim<>wei wang<>
34774<>206_3<>hongzhi wang:xuemin lin:jianzhong li<>subgraph join: efficient processing subgraph queries on graph-structured xml document<>waim<>wei wang<>
34775<>206_4<>hongzhi wang:xuemin lin:jianzhong li<>labeling scheme and structural joins for graph-structured xml data<>apweb<>wei wang<>
34778<>208_1<>l. yuan:enfang. sang:jonathon a. chambers<>an effective method to improve convergence for sequential blind source separation<>icnc<>wenwu wang<>
34782<>210_1<>ko-wei lih<>list coloring halin graphs<>arscom<>wei-fan wang<>
34805<>211_0<>lifeng wang:julie dorsey:xu yang:baining guo:heung-yeung shum<>real-time rendering of plant leaves<>tog<>wenle wang<>
34815<>212_9<>bin chan<>geocube - gpu accelerated real-time rendering of transparency and translucency<>vc<>wenping wang<>
17215<>220_2<>qi zhao:abhishek kumar:jun xu<>data streaming algorithms for accurate and efficient measurement of traffic and flow matrices<>sigmetrics<>jia wang<>
17224<>220_11<>feng wang:lixin gao:jian qiu<>on understanding of transient interdomain routing failures<>icnp<>jia wang<>
17227<>220_14<>ningning hu:li li:zhuoqing morley mao:peter steenkiste<>a measurement study of internet bottlenecks<>infocom<>jia wang<>
17232<>220_19<>zhuoqing morley mao:lili qiu:yin zhang<>on as-level path inference<>sigmetrics<>jia wang<>
17207<>221_7<>han-jen hsu:jyun-sian li<>intelligent object extraction algorithm based on foreground/background classification<>euc<>jhing-fa wang<>
11889<>224_2<>daniel gildea<>stochastic lexicalized inversion transduction grammar for alignment<>acl<>hao zhang<>
17157<>228_7<>daniela rosca:william m. tepfenhart:allen milewski:michael stoute<>an intuitive formal approach to dynamic workflow modeling and analysis<>bpm<>jiacun wang<>
17146<>229_0<>michael f. cohen<>an iterative optimization approach for unified image segmentation and matting<>iccv<>jue wang<>
17148<>229_2<>pravin bhat:alex colburn:maneesh agrawala:michael f. cohen<>interactive video cutout<>tog<>jue wang<>
17118<>230_11<>jinbo bi:yixin chen<>a sparse support vector machine approach to region-based image categorization<>cvpr<>james ze wang<>
17125<>230_18<>ritendra datta:jia li<>imagination: a robust image-based captcha generation system<>mm<>james ze wang<>
17131<>230_24<>yixin chen:robert krovetz<>clue: cluster-based retrieval of images by unsupervised learning<>tip<>james ze wang<>
17135<>230_28<>ching-chih chen:howard d. wactlar:kevin kiernan<>digital imagery for significant cultural and historical materials<>jodl<>james ze wang<>
17199<>231_2<>erdan gu:margrit betke<>mosaicshape: stochastic region grouping with shape prior<>cvpr<>jingbin wang<>
17189<>232_5<>jen-hao hsiao:ming-syan chen:chu-song chen:lee-feng chien<>constructing a wrapper-based drm system for digital content protection in digital libraries<>icadl<>jenq-haur wang<>
17195<>232_11<>derming juang:chen-yu lai:ching-chun hsieh:lee-feng chien:jan-ming ho<>resolving the unencoded character problem for chinese digital libraries<>jcdl<>jenq-haur wang<>
17161<>234_0<>jie lu<>performance modeling and analysis of web switch<>cmg<>jie wang<>
8078<>235_0<>guilin chen:mahmut t. kandemir:mustafa karakoy<>exploiting last idle periods of links for network power management<>emsoft<>feihui li<>
8079<>235_1<>jie s. hu:vijay degalahal:mahmut t. kandemir:narayanan vijaykrishnan:mary jane irwin<>compiler-directed instruction duplication for soft error detection<>date<>feihui li<>
8083<>235_5<>mahmut t. kandemir:guilin chen:guangyu chen:ozcan ozturk<>studying storage-recomputation tradeoffs in memory-constrained embedded processing<>date<>feihui li<>
8086<>235_8<>guangyu chen:mahmut t. kandemir:mary jane irwin<>compiler-directed proactive power management for networks<>cases<>feihui li<>
8089<>235_11<>guilin chen:mahmut t. kandemir<>compiler-directed voltage scaling on communication links for reducing power consumption<>iccad<>feihui li<>
8091<>235_13<>guangyu chen:mahmut t. kandemir:i. demirkiran<>increasing fpga resilience against soft errors using task duplication<>aspdac<>feihui li<>
8092<>235_14<>guilin chen:mahmut t. kandemir:r. r. brooks<>a compiler-based approach to data security<>cc<>feihui li<>
8093<>235_15<>mahmut t. kandemir<>increasing data tlb resilience to transient errors<>isvlsi<>feihui li<>
8094<>235_16<>mahmut t. kandemir<>locality-conscious workload assignment for array-based computations in mpsoc architectures<>dac<>feihui li<>
34699<>237_2<>xuemin lin:yidong yuan:hongjun lu<>stabbing the sky: efficient skyline computation over sliding windows<>icde<>wei wang<>
34707<>237_10<>yidong yuan:xuemin lin:qing liu:jeffrey xu yu:qing zhang<>efficient computation of the skyline cube<>vldb<>wei wang<>
34709<>237_12<>zheng liu:jeffrey xu yu:xuemin lin:hongjun lu<>locating motifs in time-series data<>pakdd<>wei wang<>
34694<>239_0<>zhenhui jiang:izak benbasat<>multimedia-based interactive advising technology for online consumer decision support<>cacm<>weiquan wang<>
34695<>239_1<>sherrie komiak:izak benbasat<>comparing customer trust in virtual salespersons with customer trust in human salespersons<>hicss<>weiquan wang<>
11856<>240_1<>jia shen<>k-factor-covered regular graphs<>arscom<>heping zhang<>
8115<>241_0<>yiming yang<>using recursive classification to discover predictive features<>sac<>fan li<>
8116<>241_1<>yiming yang<>analysis of recursive feature elimination methods<>sigir<>fan li<>
8117<>241_2<>yiming yang:eric xing<>from lasso regression to feature vector machine<>nips<>fan li<>
11848<>243_3<>dong xu:qing wang:hujun bao<>poisson shape interpolation<>sma<>hongxin zhang<>
8112<>244_0<>pietro perona:california institute of technology<>a bayesian hierarchical model for learning natural scene categories<>cvpr<>fei-fei li<>
8114<>244_2<>robert fergus:pietro perona:andrew zisserman<>learning object categories from google's image search<>iccv<>fei-fei li<>
39132<>245_1<>ryutaro kanno<>event-driven learning classifier systems for online soccer games<>gecco<>yuji sato<>
39134<>245_3<>nulo<>voice quality conversion using interactive evolution of prosodic control<>asc<>yuji sato<>
39136<>245_5<>ryutaro kanno<>event-driven hybrid learning classifier systems for online soccer games<>cec<>yuji sato<>
39137<>245_6<>yuko kera<>wireless access point configuration by genetic algorithm using a local rule<>cec<>yuji sato<>
11879<>246_2<>yu-shen liu:jun-hai yong:pi-qiang yu:jia-guang sun<>mesh blending<>vc<>hui zhang<>
11870<>249_2<>yong liu:weibo gong:donald f. towsley<>on the interaction between overlay routing and underlay routing<>infocom<>honggang zhang<>
11871<>249_3<>weifeng chen:yong huang:bruno f. ribeiro:kyoungwon suh:edmundo de souza e silva:james f. kurose:donald f. towsley<>exploiting the ipid field to infer network path and end-system characteristics<>pam<>honggang zhang<>
11873<>249_5<>donald f. towsley:weibo gong<>tcp connection game: a study on the selfish behavior of tcp users<>icnp<>honggang zhang<>
11876<>249_8<>yossi chait:c. v. hollot:vishal misra:donald f. towsley:yong cui<>throughput differentiation using coloring at the network edge and preferential marking at the core<>ton<>honggang zhang<>
8095<>252_0<>robert j. woodham<>analysis of player actions in selected hockey game situations<>crv<>fahong li<>
8105<>253_4<>george kollios:john w. byers:jeffrey considine:marios hadjieleftheriou<>robust aggregation in sensor networks<>debu<>feifei li<>
8106<>253_5<>dihan cheng:marios hadjieleftheriou:george kollios:shang-hua teng<>on trip planning queries in spatial databases<>ssd<>feifei li<>
38875<>255_1<>tianzi jiang:yufeng zang<>single-trial variable model for event-related fmri data analysis<>tmi<>yingli lu<>
11899<>262_2<>xiu li:wenhuang liu<>an ahp/dea methodology for 3pl vendor selection in 4pl<>cscwd<>he zhang<>
11902<>265_0<>anish arora:young-ri choi:mohamed g. gouda<>reliable bursty convergecast in wireless sensor networks<>mobihoc<>hongwei zhang<>
30834<>269_1<>sabyasachi saha<>aggressive pricing to exploit market niches in supply chains<>expert<>sandip sen<>
30838<>269_5<>sabyasachi saha<>predicting agent strategy mix of evolving populations<>atal<>sandip sen<>
30854<>269_21<>stephane airiau<>learning pareto-optimal solutions in 2x2 conflict games<>lamas<>sandip sen<>
30857<>269_24<>dipyaman banerjee:sabyasachi saha:prithviraj dasgupta<>reciprocal resource sharing in p2p environments<>atal<>sandip sen<>
30858<>269_25<>teddy candale<>effect of referrals on convergence to satisficing distributions<>atal<>sandip sen<>
30867<>269_34<>teddy candale:ikpeme erete<>using inertia and referrals to facilitate satisficing distributions<>iwdc<>sandip sen<>
30869<>269_36<>sabyasachi saha:anish biswas<>modeling opponent decision in repeated one-shot negotiations<>atal<>sandip sen<>
30877<>269_44<>teddy candale<>fast convergence to satisfying distributions<>ijcai<>sandip sen<>
30879<>269_46<>teddy candale:susnata basak<>profit sharing auction<>aaai<>sandip sen<>
30885<>269_52<>sabyasachi saha:dipyaman banerjee<>trust-based contracting in supply chains<>atal<>sandip sen<>
30886<>269_53<>stephane airiau:sabyasachi saha<>evolutionary tournament-based comparison of learning and non-learning strategies for iterated games<>flairs<>sandip sen<>
30912<>270_2<>sanguthevar rajasekaran<>pdm sorting algorithms that take a small number of passes<>ipps<>sandeep sen<>
30915<>270_5<>yogish sabharwal<>a linear time algorithm for approximate 2-means clustering<>comgeo<>sandeep sen<>
30921<>270_11<>amit kumar:yogish sabharwal<>linear time algorithms for clustering problems in any dimensions<>icalp<>sandeep sen<>
30934<>270_24<>sanguthevar rajasekaran<>a simple optimal randomized algorithm for sorting on the pdm<>isaac<>sandeep sen<>
30943<>270_33<>sanguthevar rajasekaran<>a generalization of the 0-1 principle for sorting<>ipl<>sandeep sen<>
30895<>271_1<>daniel stutzbach:reza rejaie<>characterizing unstructured overlay topologies in modern p2p file-sharing systems<>imc<>subhabrata sen<>
30896<>271_2<>william aiello:charles r. kalmanek:patrick drew mcdaniel:oliver spatscheck:jacobus e. van der merwe<>analysis of communities of interest in data networks<>pam<>subhabrata sen<>
30952<>273_2<>austin mcdonald<>the success and failure of tag-mediated evolution of cooperation<>lamas<>sandip sen<>
39270<>279_0<>bo jin:yan-qing zhang<>granular support vector machines with association rules mining for protein homology prediction<>artmed<>yuchun tang<>
39272<>279_2<>yan-qing zhang:zhen huang:xiaohua hu<>granular svm-rfe gene selection algorithm for reliable prostate cancer classification on microarray expression data<>bibe<>yuchun tang<>
39273<>279_3<>bo jin:yan-qing zhang:chung-dar lu:irene weber<>the binary multi-svm voting system for protein subcellular localization prediction<>iccsa<>yuchun tang<>
39276<>279_6<>yuanchen he:yan-qing zhang:zhen huang:xiaohua hu:rajshekhar sunderraman<>a hybrid ci-based knowledge discovery system on microarray gene expression data<>cibcb<>yuchun tang<>
39277<>279_7<>yan-qing zhang<>granular support vector machines with data cleaning for fast and accurate biomedical binary classification<>grc<>yuchun tang<>
29171<>280_12<>sencun zhu:chao yao:donggang liu:sanjeev setia<>efficient security mechanisms for overlay multicast-based content distribution<>acns<>sushil jajodia<>
29233<>280_74<>nicola zannone:fabio massacci:duminda wijesekera<>maintaining privacy on derived objects<>wpes<>sushil jajodia<>
29235<>280_76<>alberto ceselli:ernesto damiani:sabrina de capitani di vimercati:stefano paraboschi:pierangela samarati<>modeling and assessing inference exposure in encrypted databases<>tissec<>sushil jajodia<>
29247<>280_88<>claudio bettini:xiaoyang sean wang<>information release control: a learning-based architecture<>jods<>sushil jajodia<>
29256<>280_97<>ernesto damiani:sabrina de capitani di vimercati:sara foresti:stefano paraboschi:pierangela samarati<>metadata management in outsourced encrypted databases<>sdmw<>sushil jajodia<>
29291<>280_132<>claudio bettini:xiaoyang sean wang<>protecting privacy against location-based personal identification<>sdmw<>sushil jajodia<>
29293<>280_134<>donggang liu:peng ning:sencun zhu<>practical broadcast authentication in sensor networks<>mobiquitous<>sushil jajodia<>
29294<>280_135<>sabrina de capitani di vimercati:pierangela samarati<>"policies, models, and languages for access control."<>dnis<>sushil jajodia<>
29302<>280_143<>steven noel<>understanding complex network attack graphs through clustered adjacency matrices<>acsac<>sushil jajodia<>
29303<>280_144<>xinyuan wang:shiping chen<>tracking anonymous peer-to-peer voip calls on the internet<>ccs<>sushil jajodia<>
29328<>280_169<>vipin swarup:joseph pamula<>rule-based topological vulnerability analysis<>mmmacns<>sushil jajodia<>
29362<>280_203<>yingjiu li:vipin swarup<>fingerprinting relational databases: schemes and specialties<>tdsc<>sushil jajodia<>
39280<>284_0<>robert meersman<>judicial support systems: ideas for a privacy ontology-based case analyzer<>otm<>yan tang<>
39282<>285_0<>ehab s. al-shaer:raouf boutaba<>active integrated fault localization in communication networks<>im<>yongning tang<>
3765<>286_0<>ichiro fujinaga:cynthia a. leive<>the challenges in developing digital collections of phonograph records<>jcdl<>catherine lai<>
28048<>292_0<>chi zhang:arvind krishnamurthy:jaswinder pal singh<>combining flexibility and scalability in a peer-to-peer publish/subscribe system<>middleware<>randolph y. wang<>
28046<>294_0<>nolan goodnight:greg humphreys<>computation on programmable graphics hardware<>cga<>rui wang<>
25441<>300_0<>christopher a. rodger<>coloring the vertices of a graph with measurable sets in a probability space<>ejc<>peter d. johnson jr.<>
25442<>300_1<>matthew m. cropper<>problems on hall t-chromaticity<>arscom<>peter d. johnson jr.<>
18602<>303_0<>jeh-yen kang:han-wei wang:wei-ting tu:yi-jong yeh:sy-yen kuo<>automatic partitioner for behavior level distributed logic simulation<>forte<>kai-hui chang<>
18604<>303_2<>valeria bertacco:igor l. markov<>simulation-based bug trace minimization with bmc-based refinement<>iccad<>kai-hui chang<>
18544<>307_1<>bin he:zhen zhang<>toward large scale integration: building a metaquerier over databases on the web<>cidr<>kevin chen-chuan chang<>
18545<>307_2<>bin he<>making holistic schema matching robust: an ensemble approach<>kdd<>kevin chen-chuan chang<>
18560<>307_17<>chengkai li:ihab f. ilyas:sumin song<>ranksql: query algebra and optimization for relational top-k queries<>sigmod<>kevin chen-chuan chang<>
18565<>307_22<>seung-won hwang<>optimizing access cost for top-k queries over web sources: a unified cost-based approach<>icde<>kevin chen-chuan chang<>
18566<>307_23<>chengkai li:mohamed a. soliman:ihab f. ilyas<>ranksql: supporting ranking queries in relational database management systems<>vldb<>kevin chen-chuan chang<>
18569<>307_26<>bin he:zhen zhang<>metaquerier: querying structured web sources on-the-fly<>sigmod<>kevin chen-chuan chang<>
18579<>307_36<>zhen zhang:bin he<>light-weight domain-based form assistant: querying web databases on the fly<>vldb<>kevin chen-chuan chang<>
18596<>307_53<>bin he:zhen zhang<>towards building a metaquerier: extracting and matching web query interfaces<>icde<>kevin chen-chuan chang<>
7309<>309_2<>joshua j. pauli<>threat-driven architectural design of secure information systems<>iceis<>dianxiang xu<>
7313<>309_6<>junhua ding:yi deng:peter j. clarke:xudong he<>design an interoperable mobile agent system based on predicate transition net models<>seke<>dianxiang xu<>
7317<>309_10<>weifeng xu:kendall e. nygard<>a state-based approach to testing aspect-oriented programs<>seke<>dianxiang xu<>
7321<>309_14<>joshua j. pauli<>misuse case-based design and analysis of secure software architecture<>itcc<>dianxiang xu<>
7322<>309_15<>wu-jun li:chong-jun wang:bin luo:zhaojian chen<>a study on illumination invariant face recognition methods based on multiple eigenspaces<>isnn<>dianjiang xu<>
7324<>309_17<>vivek goel<>an aspect-oriented approach to mobile agent access control<>itcc<>dianxiang xu<>
7325<>309_18<>kendall e. nygard<>a threat-driven approach to modeling and verifying secure software<>kbse<>dianxiang xu<>
7333<>312_1<>paul ruth:xuxian jiang:sebastien goasguen<>virtual distributed environments in a shared infrastructure<>computer<>dongyan xu<>
7335<>315_0<>peng ning<>privacy-preserving alert correlation: a concept hierarchy based approach<>acsac<>dingbang xu<>
18607<>316_0<>kenji okuda:shun-yuan yeh:chon-in wu:hao-hua chu<>the geta sandals: a footprint location tracking system<>loca<>keng-hao chang<>
3302<>318_1<>jin zhou:chi-hung chi<>automatic keyword extraction by server log analysis<>wise<>chen ding<>
3306<>318_5<>chi-hung chi:lin liu:luwei zhang:hongguang wang<>quantitative modeling for web objects' cacheability<>waim<>chen ding<>
3308<>318_7<>shutao zhang:chi-hung chi<>content selection model for adaptive content delivery<>appt<>chen ding<>
3311<>318_10<>shutao zhang:chi-hung chi<>a framework of html content selection and adaptive delivery<>waim<>chen ding<>
3266<>319_2<>nulo<>a probabilistic model for latent semantic indexing<>jasis<>chris h. q. ding<>
3267<>319_3<>hanchuan peng:fuhui long<>"feature selection based on mutual information: criteria of max-dependency, max-relevance, and min-redundancy."<>pami<>chris h. q. ding<>
3272<>319_8<>hanchuan peng<>minimum redundancy feature selection from microarray gene expression data<>jbcb<>chris h. q. ding<>
3276<>319_12<>xiaofeng he<>cluster aggregate inequality and multi-level hierarchical clustering<>pkdd<>chris h. q. ding<>
3279<>319_15<>rong jin:feng kang<>a probabilistic approach for optimizing spectral clustering<>nips<>chris h. q. ding<>
3284<>319_20<>ya zhang:john-marc chandonia:stephen r. holbrook<>comparative mapping of sequence-based and structure-based protein domains<>bmcbi<>chris h. q. ding<>
3286<>319_22<>parry husbands:horst d. simon<>term norm distribution and its effects on latent semantic indexing<>ipm<>chris h. q. ding<>
3295<>319_31<>xiaofeng he<>on the equivalence of nonnegative matrix factorization and spectral clustering<>sdm<>chris h. q. ding<>
3298<>319_34<>andy m. yip:tony f. chan<>dynamic cluster formation using level set methods<>pakdd<>chris h. q. ding<>
7289<>320_6<>yu chen<>understanding protein dispensability through machine-learning analysis of high-throughput data<>bioinformatics<>dong xu<>
7292<>321_2<>ying-ming wang:jian-bo yang<>a preference aggregation method through the estimation of utility intervals<>cor<>dong-ling xu<>
7293<>321_3<>ying-ming wang:jian-bo yang<>a two-stage logarithmic goal programming method for generating weights from interval comparison matrices<>fss<>dong-ling xu<>
7301<>322_3<>minhong wang:huaiqing wang<>the design of intelligent workflow monitoring with agent technology<>kbs<>dongming xu<>
7304<>322_6<>xiaoyan liu:huaiqing wang<>the application of adaptive partitioned random search in feature selection problem<>adma<>dongming xu<>
7305<>322_7<>huaiqing wang:minhong wang<>a conceptual model of personalized virtual learning environments<>eswa<>dongming xu<>
9604<>323_1<>wing-kai hon:tak wah lam:kunihiko sadakane<>dynamic dictionary matching and compressed suffix trees<>soda<>ho-leung chan<>
4897<>326_0<>kin hong wong:wai man szeto<>automatic lyrics alignment on popular music<>cata<>chi hang wong<>
4883<>327_3<>john sum:kevin ho:chung w. ng:gilbert h. young<>analysis on the session life time distribution of gnutella<>pdpta<>c. s. wong<>
4909<>329_0<>chi-man pun<>a geometric invariant scheme for image classification<>vision<>chan-tang wong<>
4907<>332_0<>peter a. sims:danka vuga:james andrew mccammon:bartholomew m. sefton<>"relative contributions of desolvation, inter- and intramolecular interactions to binding affinity in protein kinase systems."<>jcc<>chung f. wong<>
23563<>333_3<>roy armoni:sergey egorov:ranan fraer:dmitry korchemny<>efficient ltl compilation for sat-based model checking<>iccad<>moshe y. vardi<>
23580<>333_20<>orna kupferman<>from complementation to certification<>tcs<>moshe y. vardi<>
23588<>333_28<>roberto sebastiani:stefano tonetta<>"symbolic systems, explicit properties: on hybrid approaches for ltl symbolic model checking."<>cav<>moshe y. vardi<>
23618<>333_58<>andrea ferrara:guoqiang pan<>treewidth in verification: local vs. global<>lpar<>moshe y. vardi<>
23658<>333_98<>cristopher moore:gabriel istrate:demetrios d. demopoulos<>a continuous-discontinuous second-order transition in the satisfiability of random horn-sat formulas<>approx<>moshe y. vardi<>
23662<>333_102<>guoqiang pan<>symbolic techniques in satisfiability solving<>jar<>moshe y. vardi<>
23664<>333_104<>orna kupferman<>complementation constructions for nondeterministic automata on infinite words<>tacas<>moshe y. vardi<>
23676<>333_116<>roy armoni:limor fix:ranan fraer:scott huddleston:nir piterman<>sat-based induction for temporal safety properties<>entcs<>moshe y. vardi<>
23677<>333_117<>doron bustan:alon flaisher:orna grumberg:orna kupferman<>regular vacuity<>charme<>moshe y. vardi<>
23701<>333_141<>tamarah arons:elad elster:limor fix:sela mador-haim:michael mishaeli:jonathan shalev:eli singerman:andreas tiemeyer:lenore d. zuck<>formal verification of backward compatibility of microcode<>cav<>moshe y. vardi<>
23711<>333_151<>orna kupferman<>from linear time to branching time<>tocl<>moshe y. vardi<>
23719<>333_159<>orna kupferman<>safraless decision procedures<>focs<>moshe y. vardi<>
23725<>333_165<>nulo<>model checking for database theoreticians<>icdt<>moshe y. vardi<>
23726<>333_166<>diego calvanese:giuseppe de giacomo<>decidable containment of recursive queries<>tcs<>moshe y. vardi<>
23731<>333_171<>deian tabakov<>experimental evaluation of classical automata constructions<>lpar<>moshe y. vardi<>
31418<>335_1<>joan feigenbaum:sampath kannan:andrew mcgregor:jian zhang<>on graph problems in a semi-streaming model<>tcs<>siddharth suri<>
31420<>335_3<>joan feigenbaum:sampath kannan:andrew mcgregor:jian zhang<>graph distances in the streaming model: the value of space<>soda<>siddharth suri<>
30462<>336_9<>vinay j. ribeiro:zhi-li zhang:christophe diot<>small-time scaling behavior of internet backbone traffic<>cn<>sue b. moon<>
30470<>338_0<>soundar r. t. kumara:timothy w. simpson<>knowledge representation for product design using techspecs concept ontology<>iri<>seung ki moon<>
34413<>340_3<>peter che bor lam<>coloring of distance graphs with intervals as distance sets<>ejc<>wensong lin<>
34415<>340_5<>peter che bor lam:zengmin song<>circular chromatic numbers of some distance graphs<>dm<>wensong lin<>
34432<>343_2<>yanxi liu:yanghai tsin<>the promise and perils of near-regular texture<>ijcv<>wen-chieh lin<>
34426<>344_9<>alexander g. hauptmann<>assessing effectiveness in video retrieval<>civr<>wei-hao lin<>
9621<>350_0<>adnan darwiche<>a distance measure for bounding probabilistic belief change<>ijar<>hei chan<>
9625<>350_4<>adnan darwiche:arthur choi<>on bayesian network approximation by edge deletion<>uai<>hei chan<>
9627<>350_6<>adnan darwiche<>sensitivity analysis in markov networks<>ijcai<>hei chan<>
9629<>350_8<>adnan darwiche<>on the revision of probabilistic beliefs using uncertain evidence<>ai<>hei chan<>
9610<>352_0<>ittai abraham:yair bartal:kedar dhamdhere:anupam gupta:jon m. kleinberg:ofer neiman:aleksandrs slivkins<>metric embeddings with relaxed guarantees<>focs<>hubert t.-h. chan<>
9613<>353_1<>adrian perrig<>pike: peer intermediaries for key establishment in sensor networks<>infocom<>haowen chan<>
9617<>353_5<>virgil d. gligor:adrian perrig:gautam muralidharan<>on the distribution and revocation of cryptographic keys in sensor networks<>tdsc<>haowen chan<>
9619<>353_7<>mark luk:adrian perrig<>using clustering information for sensor network localization<>dcoss<>haowen chan<>
33285<>355_17<>lingkun chu:kai shen:hong tang:jingyu zhou<>dependency isolation for thread-based multi-tier internet services<>infocom<>tao yang<>
33296<>355_28<>jingyu zhou:lingkun chu<>an efficient topology-adaptive membership protocol for large-scale cluster-based services<>ipps<>tao yang<>
9652<>366_4<>dit-yan yeung<>robust path-based spectral clustering with application to image segmentation<>iccv<>hong chang<>
9656<>367_1<>philippe collet<>fine-grained contract negotiation for hierarchical software components<>euromicro<>herve chang<>
33323<>371_1<>karthik sadasivam:vishal changrani<>scenario based performance evaluation of secure routing in manets<>icwn<>t. andrew yang<>
20437<>373_0<>gyungho lee<>ddos attack detection and wavelets<>telsys<>lan li<>
9657<>380_0<>vishal misra<>802.11 link interference: a simple model and a performance enhancement<>networking<>hoon chang<>
20427<>384_0<>jinzhu gao:chaoli wang:han-wei shen<>a parallel multiresolution volume rendering algorithm for large data visualization<>pc<>liya li<>
20429<>384_2<>chaoli wang:jinzhu gao:han-wei shen<>a multiresolution volume rendering framework for large-scale time-varying data visualization<>vg<>liya li<>
20420<>385_0<>david alderson:walter willinger:john c. doyle<>"understanding internet topology: principles, models, and validation."<>ton<>lun li<>
20421<>385_1<>steven h. low:john doyle:ao tang:jiantao wang<>optimization model of internet protocols<>sigmetrics<>lun li<>
20423<>385_3<>jiantao wang:steven h. low:john c. doyle<>cross-layer optimization in tcp/ip networks<>ton<>lun li<>
14659<>387_3<>ian p. goulden:jin ho kwak<>enumerating branched orientable surface coverings over a non-orientable surface<>dm<>jaeun lee<>
38357<>390_0<>salima benbernou<>representing and reasoning about privacy abstractions<>wise<>yin hua li<>
38351<>393_0<>shietung peng:wanming chu<>online adaptive fault-tolerant routing in 2d torus<>ispa<>yamin li<>
38352<>393_1<>shietung peng:wanming chu<>adaptive box-based efficient fault-tolerant routing in 3d torus<>icpads<>yamin li<>
14649<>394_3<>juyoung kang<>rule identification from web pages by the xrml approach<>dss<>jae kyu lee<>
14650<>394_4<>hyun jung lee<>an effective customization procedure with configurable standard models<>dss<>jae kyu lee<>
14637<>402_0<>kyu ho park<>delayed locking technique for improving real-time performance of embedded linux by prediction of timer interrupt<>rtas<>jupyung lee<>
14640<>405_0<>jiwoon jeon:w. bruce croft<>finding similar questions in large question and answer archives<>cikm<>joon ho lee<>
14641<>405_1<>jiwoon jeon:w. bruce croft<>finding semantically similar questions based on their answers<>sigir<>joon ho lee<>
38331<>407_0<>chuang lin:quanlin li:zhiguang shan<>performance modeling and analysis for resource scheduling in data grids<>npc<>yajuan li<>
14675<>409_2<>christa m. chewar:d. scott mccrickard<>image is everything: advancing hci knowledge and interface design using the system image<>ACMse<>jason chong lee<>
38311<>411_0<>huahai yang:h. v. jagadish<>nalix: an interactive natural language interface for querying xml<>sigmod<>yunyao li<>
14671<>412_0<>jong-seok lee:chi-hyuck jun:sooyoung kim<>classification-based collaborative filtering using market basket data<>eswa<>jaewook lee<>
38318<>413_1<>james a. landay<>informal prototyping of continuous graphical interactions by demonstration<>uist<>yang li<>
38319<>413_2<>ken hinckley:zhiwei guan:james a. landay<>experimental analysis of mode switching techniques in pen-based user interfaces<>chi<>yang li<>
38308<>415_0<>shenggui zhang:xueliang li<>rupture degree of graphs<>ijcm<>yinkui li<>
14669<>416_0<>steven dow:christopher oezbek:blair macintyre:jay david bolter:maribeth gandy<>wizard of oz interfaces for mixed reality applications<>chi<>jaemin lee<>
38298<>419_0<>yugang liu<>obstacle avoidance for redundant nonholonomic mobile modular manipulators via neural fuzzy approaches<>icnc<>yangmin li<>
38299<>419_1<>xin chen<>mobile robot navigation using particle swarm optimization and adaptive nn<>icnc<>yangmin li<>
38301<>419_3<>xin chen<>formation control for a multiple robotic system using adaptive neural network<>isnn<>yangmin li<>
38303<>419_5<>yugang liu:shaoze yan<>adaptive neural-network control for redundant nonholonomic mobile modular manipulators<>isnn<>yangmin li<>
14667<>422_1<>yann-hang lee:vikram phadke:amit deshmukh<>secure localization and location verification in sensor networks<>msn<>jin wook lee<>
22761<>424_14<>erik d. demaine:jeff erickson:ferran hurtado:john iacono:stefan langerman:henk meijer:sue whitesides<>separating point sets in polygonal environments<>ijcga<>mark h. overmars<>
22834<>424_87<>jur p. van den berg<>using workspace information as a guide to non-uniform sampling in probabilistic roadmap planners<>ijrr<>mark h. overmars<>
22873<>424_126<>mark de berg:joachim gudmundsson:matthew j. katz:christos levcopoulos:a. frank van der stappen<>tsp with neighborhoods of varying size<>jal<>mark h. overmars<>
14662<>426_1<>youngkyu choi:sekyu park:sunghyun choi:go woon lee:hanwook jung<>enhancement of a wlan-based internet service<>monet<>jaehwan lee<>
14683<>428_0<>hae-yeoun lee:heung-kyu lee<>comparison of feature extraction techniques for watermark synchronization<>kes<>junseok lee<>
38388<>429_0<>kenneth l. shepard:yannis p. tsividis<>continuous-time digital signal processors<>async<>yee william li<>
14684<>430_0<>chiu wo choi<>controlling salinity in a potable water supply system using a constraint programming approach<>ictai<>jimmy ho-man lee<>
38392<>435_1<>wen bin chu<>more golay sequences<>tit<>ying li<>
38380<>437_2<>mark hempstead:patrick mauro:david brooks:zhigang hu:kevin skadron<>power and thermal effects of sram vs. latch-mux design styles and clock gating choices<>islped<>yingmin li<>
16377<>439_2<>li-lian wang<>error analysis for mapped jacobi spectral methods<>jscic<>jie shen<>
38382<>440_0<>tie-fei liu:wing-kin sung:jian-jun liu:ankush mittal:pei-lin mao<>effective algorithms for tag snp selection<>jbcb<>yi li<>
16380<>445_1<>victor r. lesser<>communication management using abstraction in distributed bayesian networks<>atal<>jiaying shen<>
16384<>445_5<>ingo weber:victor r. lesser<>oar: a formal framework for multi-agent negotiation<>aaai<>jiaying shen<>
16364<>447_0<>nulo<>on the foundations of vision modeling ii. mining of mirror symmetry of 2-d shapes<>jvcir<>jianhong shen<>
38368<>459_0<>kai-yuan cai:t. y. chen:wei-yi ning:y. t. yu<>adaptive testing of software components<>sac<>yong-chao li<>
38359<>464_1<>jianxuan du<>optimization of antenna configuration for mimo systems<>tcom<>ye li<>
38363<>465_0<>tao li<>bioinformatics on embedded systems: a case study of computational biology applications on vliw architecture<>icess<>yue li<>
38364<>465_1<>tao li:tamer kahveci:jose a. b. fortes<>workload characterization of bioinformatics applications<>mascots<>yue li<>
5367<>466_0<>liang-tien chia:bu-sung lee<>web services discovery with daml-qos ontology<>jwsr<>chen zhou<>
5370<>466_3<>liang-tien chia:bu-sung lee<>qos measurement issues with daml-qos ontology<>icebe<>chen zhou<>
5371<>466_4<>liang-tien chia:bu-sung lee<>service discovery and measurement based on daml-qos ontology<>www<>chen zhou<>
5355<>470_1<>pedro u. lima:luos m. m. custodio:h. levent akin:adam jacoff:gerhard k. kraetzschmar:ng beng kiat:oliver obst:thomas rofer:yasutake takahashi<>"robocup 2004 competitions and symposium: a small kick for robots, a giant score for science."<>aim<>changjiu zhou<>
5362<>470_8<>zhe tang:zengqi sun<>humanoid walking gait optimization using ga-based neural network<>icnc<>changjiu zhou<>
5364<>470_10<>daroo maravall gomez-allende:javier alonso<>hybrid fuzzy control of the inverted pendulum via vertical forces<>ijis<>changjiu zhou<>
19490<>483_10<>micah adler:rakesh kumar:dan rubenstein:torsten suel:david d. yao<>optimal peer selection for p2p downloading and streaming<>infocom<>keith w. ross<>
19504<>483_24<>florence clevenot:philippe nain<>stochastic fluid models for cache clusters<>pe<>keith w. ross<>
19510<>483_30<>jian liang:rakesh kumar:y. xi<>pollution in p2p file sharing systems<>infocom<>keith w. ross<>
16867<>484_0<>tamal k. dey<>. an adaptive mls surface for reconstruction with guarantees<>sgp<>jian sun<>
19445<>485_20<>nulo<>academic dishonesty and the internet<>cacm<>kenneth a. ross<>
19452<>485_27<>john cieslewicz:jun rao:jingren zhou<>architecture sensitive database design: examples from the columbia group<>debu<>kenneth a. ross<>
19453<>485_28<>jingren zhou:john cieslewicz:mihir shah<>improving database performance on simultaneous multithreading processors<>vldb<>kenneth a. ross<>
19459<>485_34<>angel janevski:julia stoyanovich<>a faceted query engine applied to archaeology<>vldb<>kenneth a. ross<>
19511<>488_0<>nicholas bambos<>packet scheduling across networks of switches<>icn<>kevin ross<>
19512<>488_1<>geoffrey s. ryder<>a probability collectives approach to weighted clustering algorithms for ad hoc networks<>ccn<>kevin ross<>
1038<>492_6<>brian rodrigues:yi zhu<>airport gate scheduling with time windows<>air<>andrew lim<>
1039<>492_7<>zhou xu<>searching optimal resequencing and feature assignment on an automated assembly line<>ictai<>andrew lim<>
1042<>492_10<>yi zhu:q. lou:brian rodrigues<>heuristic methods for graph coloring problems<>sac<>andrew lim<>
1053<>492_21<>songshan guo:weixing li:fan wang<>the shortest route cut and fill problem in linear topological structure<>sac<>andrew lim<>
1063<>492_31<>xingwen zhang<>the container loading problem<>sac<>andrew lim<>
1068<>492_36<>fan wang<>robust graph coloring for uncertain supply chain management<>hicss<>andrew lim<>
1072<>492_40<>l. zhang:songshan guo:yunsong zhu<>a tabu search algorithm for the safe transportation of hazardous materials<>sac<>andrew lim<>
1073<>492_41<>brian rodrigues:fan wang:zhou xu<>k-center problems with minimum coverage<>tcs<>andrew lim<>
1074<>492_42<>yunsong guo:brian rodrigues:jiqing tang<>using a lagrangian heuristic for a combinatorial auction problem<>ictai<>andrew lim<>
1075<>492_43<>xingwen zhang<>a two-stage heuristic for the vehicle routing problem with time windows and a limited number of vehicles<>hicss<>andrew lim<>
1076<>492_44<>h. ding:brian rodrigues:yi zhu<>the over-constrained airport gate assignment problem<>cor<>andrew lim<>
1078<>492_46<>yunsong guo:brian rodrigues:yi zhu<>a non-exact approach and experiment studies on the combinatorial auction problem<>hicss<>andrew lim<>
13321<>494_0<>ya-xiang yuan<>on the quadratic convergence of the levenberg-marquardt method without nonsingularity assumption<>computing<>jin-yan fan<>
13315<>495_0<>ken barker:bruce w. porter<>indirect anaphora resolution as semantic path search<>kcap<>james fan<>
13305<>498_2<>yuli gao:hangzai luo:guangyou xu<>statistical modeling and conceptualization of natural images<>pr<>jianping fan<>
13308<>498_5<>hangzai luo:mohand-said hacid:elisa bertino<>a novel approach for privacy-preserving video sharing<>cikm<>jianping fan<>
11300<>501_2<>wei yuan:jianfeng gao<>an empirical study on language model adaptation using a metric of domain similarity<>ijcnlp<>hisami suzuki<>
11307<>501_9<>lucy vanderwende:gary kacmarcik:arul menezes<>mindnet: an automatically-created lexical resource<>naacl<>hisami suzuki<>
15328<>503_0<>nulo<>benefits of partial reconfigurability in circuit-switched wdm networks<>jhsn<>james martin<>
15331<>506_0<>sarkis abrilian:laurence devillers:myriam lamolle:maurizio mancini:catherine pelachaud<>levels of representation in the annotation of emotion for the specification of expressivity in ecas<>iva<>jean-claude martin<>
15334<>506_3<>sarkis abrilian:laurence devillers<>annotating multimodal behaviors occurring during non basic emotions<>acii<>jean-claude martin<>
14289<>507_1<>dmitry m. malioutov:alan s. willsky<>walk-sum interpretation and analysis of gaussian belief propagation<>nips<>jason k. johnson<>
21772<>511_0<>g. b. tanna:h. raghav rao:shambhu j. upadhyaya<>information assurance metric development framework for electronic bill presentment and payment systems using transaction and workflow analysis<>dss<>manish gupta<>
21777<>517_0<>dimitris samaras:yang wang:lei zhang 0002:sen wang<>face modeling and analysis in stony brook university<>cvpr<>mohit gupta<>
15304<>523_0<>lorenzo alvisi<>fast byzantine consensus<>dsn<>jean-philippe martin<>
15307<>523_3<>amitanand s. aiyer:lorenzo alvisi:allen clement:michael dahlin:carl porth<>bar fault tolerance for cooperative services<>sosp<>jean-philippe martin<>
14290<>524_0<>nulo<>"networks, markov lie monoids, and generalized entropy."<>mmmacns<>joseph e. johnson<>
39240<>526_0<>vijay s. mookerjee<>comparing uniform and flexible policies for software maintenance and replacement<>tse<>yong tan<>
39242<>526_2<>kamran moinzadeh:vijay s. mookerjee<>optimal processing policies for an e-commerce web server<>informs<>yong tan<>
39243<>526_3<>peng han:kartik hosanagar<>optimal rebating strategies in peer-to-peer content distribution<>icis<>yong-wah tan<>
15322<>527_10<>sameer pradhan:kadri hacioglu:valerie krugler:wayne ward:daniel jurafsky<>support vector learning for semantic argument classification<>ml<>james h. martin<>
33917<>529_12<>xiaoyan li<>novelty detection based on sentence level patterns<>cikm<>w. bruce croft<>
33918<>529_13<>trevor strohman:howard r. turtle<>optimization strategies for complex queries<>sigir<>w. bruce croft<>
33931<>529_26<>yun zhou<>document quality models for web ad hoc retrieval<>cikm<>w. bruce croft<>
33934<>529_29<>donald metzler<>a markov random field model for term dependencies<>sigir<>w. bruce croft<>
33936<>529_31<>jiwoon jeon:joon ho lee<>finding semantically similar questions based on their answers<>sigir<>w. bruce croft<>
33938<>529_33<>donald metzler<>analysis of statistical question classification for fact-based questions<>ir<>w. bruce croft<>
33941<>529_36<>donald metzler:yaniv bernstein:alistair moffat:justin zobel<>similarity measures for tracking information flow<>cikm<>w. bruce croft<>
33949<>529_44<>vanessa murdock<>a translation model for sentence retrieval<>naacl<>w. bruce croft<>
33961<>529_56<>donald metzler:yaniv bernstein:alistair moffat:justin zobel<>the recap system for identifying information flow<>sigir<>w. bruce croft<>
33963<>529_58<>xiaoyong liu:matthew b. koll<>finding experts in community-based question-answering services<>cikm<>w. bruce croft<>
33974<>529_69<>jiwoon jeon:joon ho lee<>finding similar questions in large question and answer archives<>cikm<>w. bruce croft<>
13949<>532_0<>chang-hun kim<>animating smoke with dynamic balance<>jvca<>jin-kyung hong<>
13944<>534_0<>sun-mi yoo:hong-taek ju<>web services based configuration management for ip network devices<>mmns<>james won-ki hong<>
13942<>536_4<>chang-hun kim<>discontinuous fluids<>tog<>jeong-mo hong<>
4380<>537_1<>nulo<>parameter estimation of incomplete data in competing risks using the em algorithm<>tr<>c. park<>
4382<>537_3<>w. j. padgett<>new cumulative damage models for failure using stochastic processes as initial damage<>tr<>c. park<>
4376<>539_0<>haesun park<>fingerprint classification using fast fourier transform and nonlinear discriminant analysis<>pr<>cheong hee park<>
25350<>545_3<>hisham al-mubaid<>context-based similar words detection and its application in specialized search engines<>iui<>ping chen<>
25356<>545_9<>xusheng wang:wei ding<>web-based interactive visualization of data cubes<>msv<>ping chen<>
25323<>546_0<>edmund b. nightingale:jason flinn<>speculative execution in a distributed file system<>sosp<>peter m. chen<>
25326<>546_3<>samuel t. king:zhuoqing morley mao:dominic g. lucchetti<>enriching intrusion alerts through multi-host causality<>ndss<>peter m. chen<>
25330<>546_7<>samuel t. king<>backtracking intrusions<>tocs<>peter m. chen<>
25337<>546_14<>ashlesha joshi:samuel t. king:george w. dunlap<>detecting past and present intrusions through vulnerability-specific predicates<>sosp<>peter m. chen<>
25361<>547_0<>guoli ding:jianhua chen:robert lax<>efficient learning of pseudo-boolean functions from limited training data<>ismis<>peter p. chen<>
6045<>555_1<>deep medhi<>a byzantine resilient multi-path key establishment scheme and its robustness analysis for sensor networks<>ipps<>dijiang huang<>
6047<>555_3<>m. mehta:d. medhi<>source routing based pairwise key establishment protocol for sensor networks<>ipccc<>d. huang<>
6048<>555_4<>manish mehta:lein harn<>rink-rkp: a scheme for key predistribution and shared-key discovery in sensor networks<>ipccc<>dijiang huang<>
6049<>555_5<>a. sinha:d. medhi<>a key distribution scheme for double authentication in link state routing protocol<>ipccc<>d. huang<>
6041<>558_0<>khaled ben letaief:jianhua lu<>bit-interleaved time-frequency coded modulation for ofdm systems over time-varying channels<>tcom<>defeng huang<>
6042<>558_1<>khaled ben letaief<>an interference-cancellation scheme for carrier frequency offsets correction in ofdma systems<>tcom<>defeng huang<>
21832<>566_2<>david kensche:christoph quix:mohamed amine chatti<>gerome: a generic role based metamodel for model management<>otm<>matthias jarke<>
38864<>572_0<>siwei ma:wen gao<>rate-distortion analysis for h.264/avc video coding and its application to rate control<>tcsv<>yan lu<>
38842<>581_5<>le cai<>joint power management of memory and disk<>date<>yung-hsiang lu<>
38853<>581_16<>le cai<>energy management using buffer memory for streaming data<>tcad<>yung-hsiang lu<>
6381<>587_10<>makoto murata:murali mani:kohsuke kawaguchi<>taxonomy of xml schema languages using formal language theory<>toit<>dongwon lee<>
6277<>590_4<>wayne luk:john d. villasenor:guanglie zhang:philip heng wai leong<>a hardware gaussian noise generator using the wallace method<>tvlsi<>dong-u lee<>
6279<>590_6<>guanglie zhang:philip heng wai leong:john d. villasenor:ray c. c. cheung:wayne luk<>ziggurat-based hardware gaussian random number generator<>fpl<>dong-u lee<>
6239<>591_18<>haibo hu:jianliang xu:wing sing wong:baihua zheng:wang-chien lee<>proactive caching for spatial queries in mobile environments<>icde<>dik lun lee<>
6243<>591_22<>manli zhu:haibo hu<>when location-based services meet databases<>mis<>dik lun lee<>
6251<>591_30<>manli zhu:dimitris papadias:jun zhang<>top-k spatial joins<>tkde<>dik lun lee<>
6253<>591_32<>bin liu:wang-chien lee<>distributed caching of multi-dimensional data in mobile environments<>mdm<>dik lun lee<>
6259<>591_38<>baihua zheng<>information dissemination via wireless broadcast<>cacm<>dik lun lee<>
6314<>592_4<>tsung-yi ho:yao-wen chang:sao-jie chen<>crosstalk- and performance-driven multilevel full-chip routing<>tcad<>d. t. lee<>
6321<>592_11<>tsan-sheng hsu:kuo-hui tsai:da-wei wang<>two variations of the minimum steiner problem<>jco<>d. t. lee<>
6337<>592_27<>yu-shin chen:chung-shou liao<>labeling points on a single line<>ijcga<>d. t. lee<>
28792<>593_2<>jungsook kim:hyukjae jang:su myeon kim:junehwa song:hangkyu kim:yunjoon lee<>a framework for handling dependencies among web services transactions<>www<>seunglak choi<>
28793<>593_3<>hyukjae jang:hangkyu kim:jungsook kim:su myeon kim:junehwa song:yoon-joon lee<>maintaining consistency under isolation relaxation of web services transactions<>wise<>seunglak choi<>
6294<>594_13<>keqin li 0002<>fault detection of hierarchical networks with probabilistic testing algorithms<>pts<>david lee<>
6355<>596_4<>jeong-gun lee:euiseok kim<>instruction level redundant number computations for fast data intensive processing in asynchronous processors<>jsa<>dong-ik lee<>
6365<>598_4<>jong hyuk park:heung-soo park:sangjin lee:jun choi<>intelligent multimedia service system based on context awareness in smart home<>kes<>deok-gyu lee<>
6370<>598_9<>dae-hee seo:im-yeong lee<>a study on scalable bluetooth piconet for secure ubiquitous<>human<>deok-gyu lee<>
28807<>600_2<>hongsoo kim:maengsoon baik:kwonwoo yang:heon-chang yu:chong-sun hwang<>group-based scheduling scheme for result checking in global computing systems<>iccsa<>sungjin choi<>
28809<>600_4<>maengsoon baik:chong-sun hwang:joon-min gil:heon-chang yu<>mobile agent based adaptive scheduling mechanism in peer to peer grid computing<>iccsa<>sungjin choi<>
28814<>600_9<>eunjoung byun:maengsoon baik:chong-sun hwang<>scheduling scheme based on dedication rate in volunteer computing environment<>ispdc<>sungjin choi<>
28815<>600_10<>maengsoon baik:joon-min gil:chan yeol park:soon young jung:chong-sun hwang<>dynamic scheduling mechanism for result certification in peer to peer grid computing<>gcc<>sungjin choi<>
39586<>609_0<>shijia gao:huaiqing wang:wenqi shen:siubun yeung<>web-service-agents-based family wealth management system<>eswa<>yingfeng wang<>
28801<>610_2<>h. h. cheung<>a multi-material virtual prototyping system<>cad<>s. h. choi<>
27257<>615_0<>anil k. tiwari<>optimal slope bin classification in gradient adjusted predictor for lossless compression of medical images<>icip<>r. v. raja kumar<>
34361<>616_1<>bruno levy:jean-claude paul<>mesh editing with an embedded network of curves<>smi<>wan-chiu li<>
432<>622_14<>abraham d. flaxman:michael krivelevich<>on the random 2-stage minimum spanning tree<>soda<>alan m. frieze<>
472<>622_54<>michael krivelevich:benny sudakov<>the strong chromatic index of random graphs<>siamdm<>alan m. frieze<>
491<>622_73<>nulo<>perfect matchings in random bipartite graphs with minimal degree at least 2<>rsa<>alan m. frieze<>
495<>622_77<>colin cooper<>the cover time of random regular graphs<>siamdm<>alan m. frieze<>
34326<>623_0<>daehyoung hong:demetrios kazakos:li-chun wang<>special issue: modeling and performance evaluation of radio resource qos for next-generation wireless and mobile networks<>wicomm<>wei li<>
34331<>623_5<>s. tang<>performance analysis of a channel allocation scheme with preemptive priority for integrated voice/data mobile networks<>ipccc<>w. li<>
34369<>627_2<>bor-sen chen:yu-chao wang:wei-sheng wu<>a new measure of the robustness of biochemical networks<>bioinformatics<>wen-hsiung li<>
11689<>628_5<>nulo<>efficient matching and retrieval of gene expression time series data based on spectral information<>iccsa<>hong yan<>
25621<>633_1<>josep diaz:vishal sanwalani:maria j. serna<>the chromatic and clique numbers of random scaled sector graphs<>tcs<>paul g. spirakis<>
6549<>636_17<>feng wang 0003:bo hong:scott a. brandt<>using mems-based storage to boost disk performance<>mss<>darrell d. e. long<>
12122<>638_3<>dae-hee seo:deok-gyu lee<>a study on scalable bluetooth piconet for secure ubiquitous<>human<>im-yeong lee<>
12133<>641_1<>haesun k. lee:haklin kimm<>algorithm for reducing the complexity of switching time in real-time multitask environments<>cata<>ilhyun lee<>
12137<>641_5<>narayan c. debnath:haesun k. lee:sergiu m. dascalu:john ho:mary yip<>design and implementation of a reusable software tool with application<>iri<>ilhyun lee<>
12140<>641_8<>haklin kimm:haesun k. lee<>a unified hardware/software approach for reducing context switching time with multiple tasks<>ISCApdcs<>ilhyun lee<>
18019<>647_0<>jiong-sheng li<>two sufficient conditions for a graphic sequence to have a realization with prescribed clique size<>dm<>jian-hua yin<>
18020<>648_0<>xiaodong wang:dharma p. agrawal<>impact of channel conditions on the throughput optimization in 802.11 dcf<>wicomm<>jun yin<>
18009<>649_1<>dou shen:rong pan:jian-tao sun:jeffrey junfeng pan:kangheng wu:qiang yang<>qc@ust: our winning solution to query classification in kddcup 2005<>sigkdd<>jie yin<>
18011<>649_3<>dou shen:qiang yang:ze-nian li<>activity recognition through goal-based segmentation<>aaai<>jie yin<>
18013<>649_5<>qiang yang:lionel m. ni<>adaptive temporal radio maps for indoor location estimation<>percom<>jie yin<>
18014<>649_6<>qiang yang<>integrating hidden markov models and spectral analysis for sensory time series clustering<>icdm<>jie yin<>
8881<>651_0<>veli makinen:esko ukkonen<>transposition invariant string matching<>jal<>gonzalo navarro<>
2748<>653_0<>roberta l. klatzky:damion shelton:george d. stetten<>psychophysical evaluation of in-situ ultrasound visualization<>tvcg<>bing wu<>
2746<>656_1<>jie wu:eduardo b. fernandez:spyros s. magliveras<>secure and efficient key management in mobile ad hoc networks<>ipps<>bing wu<>
11694<>658_0<>tao qin:tie-yan liu:xu-dong zhang:guang feng:wei-ying ma<>calculating webpage importance with site structure constraints<>airs<>hui-min yan<>
2737<>662_1<>ramakant nevatia<>"detection of multiple, partially occluded humans in a single image by bayesian combination of edgelet part detectors."<>iccv<>bo wu<>
11701<>663_0<>chunhong pan:gerard g. medioni:songde ma<>parametric reconstruction of generalized cylinders from limb edges<>tip<>hongping yan<>
2762<>668_2<>li zhang:zhao zhang<>the transformation graph  when =-++<>dm<>baoyindureng wu<>
2755<>669_0<>kudakwashe dube:essam mansour<>supporting collaboration and information sharing in computer-based clinical guideline management<>cbms<>bing wu<>
2752<>670_2<>brian d. davison<>identifying link farm spam pages<>www<>baoning wu<>
31821<>672_1<>arjan berkelaar:joaquim a. s. gromicho:roy kouwenberg<>a primal-dual decomposition algorithm for multistage stochastic convex programming<>mp<>shuzhong zhang<>
31819<>673_4<>vineet bafna:haixu tang<>consensus folding of unaligned rna sequences revisited<>recomb<>shaojie zhang<>
31803<>677_0<>yinkui li:xueliang li<>rupture degree of graphs<>ijcm<>shenggui zhang<>
31809<>677_6<>jun fujisawa:kiyoshi yoshimoto<>heavy cycles passing through some specified vertices in weighted graphs<>jgt<>shenggui zhang<>
29721<>686_0<>timothy baldwin<>automatic interpretation of noun compounds using wordnet similarity<>ijcnlp<>su nam kim<>
40070<>687_0<>yong ching lim<>signed power-of-two allocation scheme for the design of lattice orthogonal filter banks<>iscas<>ya jun yu<>
40072<>687_2<>k. l. teo:y. c. lim:g. h. zhao<>extrapolated impulse response filter and its application in the synthesis of digital filters using the frequency-response masking technique<>sigpro<>y. j. yu<>
29715<>690_0<>joongheon kim:wonjun lee:eunkyo kim:joonmo kim:choonhwa lee:sungjin kim<>on energy-aware dynamic clustering for hierarchical sensor networks<>euc<>sooyeon kim<>
29706<>692_0<>jongeun cha:seung man kim:sung-yeol kim:seung-uk yoon:ian oakley:jeha ryu:kwan-heng lee:woontack woo:yo-sung ho<>client system for realistic broadcasting: a first prototype<>pcm<>sehwan kim<>
29701<>694_2<>nulo<>comparison with a standard via fully sequential procedures<>tomacs<>seong-hee kim<>
29702<>694_3<>sigron andradottir:david goldsman<>finding the best in the presence of a stochastic constraint<>wsc<>seong-hee kim<>
29703<>694_4<>david goldsman:barry l. nelson<>statistical selection of the best system<>wsc<>seong-hee kim<>
29693<>696_0<>jeong-hyeon choi:hwan-gue cho<>game: a simple and efficient whole genome alignment method using maximal exact match filtering<>candc<>sun kim<>
29691<>698_3<>youngsoo kim:sunghyun choi:kyunghun jang:jin-bong chang<>a high-throughput mac strategy for next-generation wlans<>wowmom<>seongkwan kim<>
25897<>703_0<>gabriel pui cheong fung:jeffrey xu yu:hongjun lu<>parameter free bursty events detection in text streams<>vldb<>philip s. yu<>
25900<>704_1<>yu-shen liu:hui zhang:jun-hai yong:jia-guang sun<>mesh blending<>vc<>pi-qiang yu<>
11917<>708_0<>catherine plaisant:ben shneiderman<>i hear the pattern: interactive sonification of geographical data patterns<>chi<>haixia zhao<>
11920<>709_2<>xueliang li:ruying liu<>on problems and conjectures on adjointly equivalent graphs<>dm<>haixing zhao<>
11922<>710_1<>zhong guan<>a semiparametric approach for marker gene selection based on gene expression data<>bioinformatics<>hongyu zhao<>
11923<>710_2<>yin liu:nianjun liu<>inferring protein-protein interactions through high-throughput interaction data from diverse organisms<>bioinformatics<>hongyu zhao<>
11926<>710_5<>nan lin<>are scale-free networks robust to measurement errors?<>bmcbi<>hongyu zhao<>
11927<>710_6<>kui zhang:fengzhu sun<>haplore: a program for haplotype reconstruction in general pedigrees without recombination<>bioinformatics<>hongyu zhao<>
11928<>710_7<>matthew holford:naixin li:prakash m. nadkarni<>vitapad: visualization tools for the analysis of pathway data<>bioinformatics<>hongyu zhao<>
11931<>711_2<>bao-liang lu<>a general procedure for combining binary classifiers and its performance analysis<>icnc<>hai zhao<>
29653<>714_2<>a. l. narasimha reddy<>a study of analyzing network traffic as images in real-time<>infocom<>seong soo kim<>
29657<>715_3<>junghyun nam:jinwoo lee:dongho won<>ddh-based group key agreement in a mobile environment<>jss<>seungjoo kim<>
29663<>715_9<>namje park:howon kim:dongho won<>open location-based service using secure middleware infrastructure in web services<>iccsa<>seungjoo kim<>
29664<>715_10<>seokhyang cho:junghyun nam:dongho won<>an efficient dynamic group key agreement for low-power mobile devices<>iccsa<>seungjoo kim<>
29670<>715_16<>keunwoo rhee:jin kwak:dongho won<>challenge-response based rfid authentication protocol for distributed database environment<>spc<>seungjoo kim<>
29671<>715_17<>junghyun nam:hyunjue kim:dongho won:hyungkyu yang<>practical and provably-secure multicasting over high-delay networks<>iccS<>seungjoo kim<>
29672<>715_18<>yunho lee:kwang-woo lee:dongho won:hyungkyu yang<>a method for deciding quantization steps in qim watermarking schemes<>euc<>seungjoo kim<>
29675<>715_21<>namje park:howon kim:kyoil chung:dongho won<>xkms-based key management for open lbs in web services environment<>awic<>seungjoo kim<>
29677<>715_23<>namje park:kiyoung moon:kyoil chung:dongho won<>xml-based digital signature accelerator in open mobile grid computing<>gcc<>seungjoo kim<>
29678<>715_24<>junghyun nam:dongho won<>secure group communications over combined wired and wireless networks<>trustbus<>seungjoo kim<>
29681<>716_2<>padhraic smyth:hal stern:jessica turner<>parametric response surface models for analysis of multi-site fmri data<>miccai<>seyoung kim<>
29623<>722_0<>byung-seo kim<>resource allocation based on traffic load over relayed wireless access networks<>icess<>sung won kim<>
29627<>722_4<>byung-seo kim<>power-efficient packet scheduling method for ieee 802.15.3 wpan<>icess<>sung won kim<>
29644<>725_0<>jon b. weissman:darin england<>supporting the dynamic grid service lifecycle<>ccgrid<>seonho kim<>
29645<>725_1<>jon b. weissman:darin england<>a framework for dynamic service adaptation in the grid: next generation software program progress report<>ipps<>seonho kim<>
18118<>726_1<>torsten suel<>efficient query evaluation on large textual collections in a peer-to-peer environment<>p2p<>jiangong zhang<>
18129<>727_8<>l. h. you<>solid blends of high order continuity<>IEEEcgiv<>jian j. zhang<>
18136<>727_15<>lihua you<>an efficient approach for surface creation<>iccsa<>jian j. zhang<>
18140<>727_19<>x. s. yang<>realistic skeleton driven skin deformation<>iccsa<>jian j. zhang<>
18154<>730_10<>anthony man-cho so:yinyu ye<>on approximating complex quadratic optimization problems via semidefinite programming relaxations<>ipco<>jiawei zhang<>
18157<>731_0<>bo wang:anders host-madsen<>on the capacity of mimo relay channels<>tit<>junshan zhang<>
18162<>731_5<>kai bai<>opportunistic multichannel aloha for clustered ofdm wireless networks<>qshine<>junshan zhang<>
18163<>731_6<>takis konstantopoulos<>multiple-access interference processes are self-similar in multimedia cdma cellular networks<>tit<>junshan zhang<>
18166<>731_9<>dong zheng<>channel-aware weighted proportional fair medium access control in wireless lans with mimo links<>qshine<>junshan zhang<>
18210<>732_0<>shuting xu:dianwei han:jie wang<>data distortion for privacy protection in a terrorist analysis system<>isi<>jun zhang<>
18212<>732_2<>ning kang:eric s. carlson:daniel gembris<>white matter fiber tractography via anisotropic diffusion simulation in the human brain<>tmi<>jun zhang<>
18215<>732_5<>jennifer j. zhao:ning kang:fuqian yang<>a two level finite difference scheme for one dimensional pennes' bioheat equation<>amc<>jun zhang<>
18218<>732_8<>shuting xu<>matrix condition number prediction with svm regression and feature selection<>sdm<>jun zhang<>
18219<>732_9<>jing gao<>clustered svd strategies in latent semantic indexing<>ipm<>jun zhang<>
18229<>732_19<>chi shen:kai wang<>distributed block independent set algorithms and parallel multilevel ilu preconditioners<>jpdc<>jun zhang<>
18231<>732_21<>samir karaa:fuqian yang<>a numerical study of a 3d bioheat transfer problem with different spatial heating<>mcs<>jun zhang<>
18203<>733_6<>manli zhu:dimitris papadias:dik lun lee<>top-k spatial joins<>tkde<>jun zhang<>
18209<>734_3<>mark everingham:andrew zisserman:christopher k. i. williams:luc j. van gool:moray allan:christopher m. bishop:olivier chapelle:navneet dalal:thomas deselaers:gyuri dorko:stefan duffner:jan eichhorn:jason d. r. farquhar:mario fritz:christophe garcia:tom griffiths:frederic jurie:daniel keysers:markus koskela:jorma laaksonen:diane larlus:bastian leibe:hongying meng:hermann ney:bernt schiele:cordelia schmid:edgar seemann:john shawe-taylor:amos j. storkey:sandor szedmak:bill triggs:ilkay ulusoy:ville viitaniemi<>the 2005 pascal visual object classes challenge<>mlcw<>jianguo zhang<>
40002<>736_0<>lin shi<>controllable smoke animation with guiding objects<>tog<>yizhou yu<>
40006<>736_4<>lin shi:christopher wojtan:stephen chenney<>controllable motion synthesis in a gaseous medium<>vc<>yizhou yu<>
40016<>736_14<>johnny t. chang<>shadow graphs and 3d texture reconstruction<>ijcv<>yizhou yu<>
40018<>736_16<>hongcheng wang:qing wu:lin shi:narendra ahuja<>out-of-core tensor approximation of multi-dimensional matrices of visual data<>tog<>yizhou yu<>
40025<>737_0<>pak-lok poon<>designing activities for learning software quality practices<>qsic<>yuen-tak yu<>
40034<>737_9<>man fai lau<>an extended fault class hierarchy for specification-based testing<>tosem<>yuen-tak yu<>
40036<>738_1<>zifei zhong:ram keralapura:srihari nelakuditi:junling wang:chen-nee chuah:sanghwan lee<>avoiding transient loops through interface-specific forwarding<>iwqos<>yinzhe yu<>
40040<>738_5<>sanghwan lee:zhi-li zhang<>leopard: a locality aware peer-to-peer system with no hot spot<>networking<>yinzhe yu<>
40043<>740_0<>sharad malik<>validating the result of a quantified boolean formula (qbf) solver: theory and practice<>aspdac<>yinlei yu<>
40045<>740_2<>zhaohui fu:sharad malik<>considering circuit observability don't cares in cnf satisfiability<>date<>yinlei yu<>
40046<>741_0<>jianguo lu:john mylopoulos<>a lightweight approach to semantic web service synthesis<>wiri<>yijun yu<>
40051<>741_5<>jianguo lu:john mylopoulos:weiwei sun:jing-hao xue:erik h. d'hollander<>making xml document markup international<>spe<>yijun yu<>
40052<>741_6<>julio cesar sampaio do prado leite:lin liu:eric s. k. yu:john mylopoulos<>quality-based software reuse<>caise<>yijun yu<>
40059<>741_13<>yiqiao wang:john mylopoulos:sotirios liaskos:alexei lapouchnian:julio cesar sampaio do prado leite<>reverse engineering goal models from legacy code<>re<>yijun yu<>
40060<>741_14<>homayoun dayani-fard:john mylopoulos:periklis andritsos<>reducing build time through precompilations for evolving large software<>icsm<>yijun yu<>
40064<>741_18<>sotirios liaskos:alexei lapouchnian:yiqiao wang:steve m. easterbrook<>configuring common personal software: a requirements-driven approach<>re<>yijun yu<>
31951<>743_3<>yasushi okuno:gozoh tsujimoto:hiroshi mamitsuka<>a probabilistic model for mining implicit 'chemical compound-gene' relations from literature<>eccb<>shanfeng zhu<>
21563<>745_0<>nulo<>culture and indigenous knowledge systems: emergent order and the internal regulation of shared symbolic systems<>cas<>michael d. fischer<>
31897<>748_0<>zijian xu:hong chen<>a high resolution grammatical model for face representation and sketching<>cvpr<>song chun zhu<>
31898<>748_1<>yizhou wang:siavosh bahrami<>perceptual scale space and its applications<>iccv<>song chun zhu<>
31905<>748_8<>feng han<>bottom-up/top-down image parsing by attribute graph grammar<>iccv<>song chun zhu<>
31917<>748_20<>cheng-en guo:yizhou wang:zijian xu<>what are textons?<>ijcv<>song chun zhu<>
31920<>748_23<>zhuowen tu:xiangrong chen:alan l. yuille<>"image parsing: unifying segmentation, detection, and recognition."<>ijcv<>song chun zhu<>
31921<>748_24<>feng han<>cloth representation by shape from shading with shading primitives<>cvpr<>song chun zhu<>
31923<>748_26<>hong chen<>a generative model of human hair for hair sketching<>cvpr<>song chun zhu<>
31928<>748_31<>adrian barbu<>incorporating visual knowledge representation in stereo reconstruction<>iccv<>song chun zhu<>
21555<>753_8<>bengt mueck:kiran r. mahajan:michael kortenjan:christoph laroque:wilhelm dangelmaier<>multi-user support and motion planning of humans and humans driven vehicles in interactive 3d material flow simulations<>wsc<>matthias fischer<>
31957<>754_1<>wensheng zhang:hui song:guohong cao<>least privilege and privilege deprivation: towards tolerating mobile sink compromises in wireless sensor networks<>mobihoc<>sencun zhu<>
12333<>756_0<>david cameron<>machinima: digital performance and emergent authorship<>digra<>john carroll<>
12293<>759_0<>stephan oepen<>high efficiency realization for a wide-coverage unification grammar<>ijcnlp<>john a. carroll<>
12299<>759_6<>rob koeling:diana mccarthy<>domain-specific sense distributions and predominant sense acquisition<>naacl<>john carroll<>
12302<>759_9<>xinglong wang<>word sense disambiguation using sense examples automatically acquired from a second language<>naacl<>john carroll<>
19063<>766_0<>yunho lee:seungjoo kim:dongho won:hyungkyu yang<>a method for deciding quantization steps in qim watermarking schemes<>euc<>kwang-woo lee<>
20269<>767_0<>alexey zalesny:vittorio ferrari:geert caenen<>composite texture synthesis<>ijcv<>luc j. van gool<>
20270<>767_1<>pedro quelhas:florent monay:jean-marc odobez:daniel gatica-perez:tinne tuytelaars<>modeling scenes with local descriptors and latent aspects<>iccv<>luc j. van gool<>
19072<>768_0<>sang-bum han:heyi-sook suh:chong-sun hwang<>efficient mobility management for multimedia service in wireless ip networks<>ACISicis<>keun-ho lee<>
20262<>775_0<>tobias jaeggli:geert caenen:rik fransens<>analysis of human locomotion based on partial measurements<>wacv<>luc j. van gool<>
20264<>775_2<>mark everingham:andrew zisserman:christopher k. i. williams:moray allan:christopher m. bishop:olivier chapelle:navneet dalal:thomas deselaers:gyuri dorko:stefan duffner:jan eichhorn:jason d. r. farquhar:mario fritz:christophe garcia:tom griffiths:frederic jurie:daniel keysers:markus koskela:jorma laaksonen:diane larlus:bastian leibe:hongying meng:hermann ney:bernt schiele:cordelia schmid:edgar seemann:john shawe-taylor:amos j. storkey:sandor szedmak:bill triggs:ilkay ulusoy:ville viitaniemi:jianguo zhang<>the 2005 pascal visual object classes challenge<>mlcw<>luc j. van gool<>
40906<>790_0<>wenfeng zhou:xiang-sun zhang:luonan chen<>a parsimonious tree-grow method for haplotype inference<>bioinformatics<>zhen-ping li<>
40907<>790_1<>rui-sheng wang:ling-yun wu:xiang-sun zhang<>haplotype reconstruction from snp fragments by minimum error correction<>bioinformatics<>zhen-ping li<>
40904<>791_2<>guido m. schuster:aggelos k. katsaggelos<>minmax optimal video summarization<>tcsv<>zhu li<>
40905<>791_3<>guido m. schuster:aggelos k. katsaggelos:bhavan gandhi<>rate-distortion optimal video summary generation<>tip<>zhu li<>
40909<>792_0<>yanpei liu<>chromatic sums of 2-edge-connected maps on the plane<>dm<>zhaoxiang li<>
22558<>798_4<>enrique j. duarte-melo:archan misra<>an efficient and robust computational framework for studying lifetime and information capacity in sensor networks<>monet<>mingyan liu<>
22559<>798_5<>nicholas b. chang<>optimal controlled flooding search in a large wireless network<>wiopt<>mingyan liu<>
22564<>798_10<>chih-fan hsin<>partial clustering: maintaining connectivity in a low duty-cycled dense wireless sensor network<>ipps<>mingyan liu<>
2308<>799_0<>amarnath gupta:ramesh jain<>medsman: a streaming data management system over live multimedia<>mm<>bin liu<>
22547<>800_1<>nick burns:mike bradley<>applying design patterns in distributing a genetic algorithm application<>serp<>mei-ling liu<>
31634<>802_0<>osmar alessio:sueli i. rodrigues costa<>a complete and non-overlapping tracing algorithm for closed loops<>cagd<>shin-ting wu<>
31640<>803_0<>hsin-han chiang:han-tsung lin:tsu-tian lee<>neural-network-based optimal fuzzy controller design for nonlinear systems<>fss<>shinq-jen wu<>
5504<>812_0<>siddhartha shakya:john a. w. mccall<>using a markov network model in a univariate eda: an empirical cost-benefit analysis<>gecco<>deryck f. brown<>
5506<>812_2<>siddhartha shakya:john a. w. mccall<>incorporating a metropolis method in a distribution estimation using markov random field algorithm<>cec<>deryck f. brown<>
5509<>813_1<>emily w. xu:paul kearney<>the use of functional domains to improve transmembrane protein topology prediction<>apbc<>daniel g. brown<>
5484<>814_1<>scott e. page:rick l. riolo:moira zellner:william rand<>path dependence and the validation of agent-based spatial models of land use<>gis<>daniel g. brown<>
5487<>814_4<>rick l. riolo:derek t. robinson:michael north:william rand<>spatial process and data models: toward integration of agent-based models and gis<>jgs<>daniel g. brown<>
5482<>819_0<>nandini krishnamurthy:joseph m. dale:wayne christopher:kimmen sjolander<>subfamily hmms in functional genomics<>psb<>duncan brown<>
34657<>821_0<>tianwei yu:shinsheng yuan:ker-chau li<>study of coordinative gene expression at the biological process level<>bioinformatics<>wei sun<>
34645<>822_0<>nulo<>a scalable parallel algorithm for global optimization based on seed-growth techniques<>hpcc<>weitao sun<>
34647<>822_2<>nulo<>global optimization with multi-grid seed-growth parameter space division algorithm<>csc<>weitao sun<>
34648<>822_3<>jiwu shu:weimin zheng<>deterministic global optimization with a neighbourhood determination algorithm based on neural networks<>isnn<>weitao sun<>
34649<>822_4<>jiwu shu:weimin zheng<>parallel seismic propagation simulation in anisotropic media by irregular grids finite difference method on pc cluster<>iccsa<>weitao sun<>
34642<>824_1<>yijun yu:jianguo lu:john mylopoulos:jing-hao xue:erik h. d'hollander<>making xml document markup international<>spe<>weiwei sun<>
40669<>827_1<>zhenmin li:yuanyuan zhou<>mining block correlations to improve storage performance<>tos<>zhifeng chen<>
40662<>828_7<>mitsuharu kouno<>a linear-time algorithm for 7-coloring 1-plane graphs<>algorithmica<>zhi-zhong chen<>
38223<>829_0<>seungyong lee:ariel shamir:daniel cohen-or:hans-peter seidel<>mesh scissoring with minima rule and part salience<>cagd<>yunjin lee<>
38228<>829_5<>hitoshi yamauchi:seungyong lee:yutaka ohtake:alexander g. belyaev:hans-peter seidel<>feature sensitive mesh segmentation with mean shift<>smi<>yunjin lee<>
40679<>833_0<>stephen fickas<>the plain old television in a smart apartment<>colcom<>zebin chen<>
40680<>834_0<>arne storjohann<>a blas based c library for exact linear algebra on integer matrices<>issac<>zhuliang chen<>
40674<>835_0<>daniel port:yue chen:barry w. boehm<>evolving an experience base for software process research<>ispw<>zhihao chen<>
38246<>840_0<>ruei-chuan chang<>developing dynamic-reconfigurable communication protocol stacks using java<>spe<>yueh-feng lee<>
38245<>841_0<>kwang-woo lee:seungjoo kim:dongho won:hyungkyu yang<>a method for deciding quantization steps in qim watermarking schemes<>euc<>yunho lee<>
30809<>843_0<>subhasis bhattacharjee:sandip das:subhas c. nandy<>a fast algorithm for point labeling problem<>cccg<>sasanka roy<>
30787<>846_1<>eric allender:samir datta<>the directed planar reachability problem<>eccc<>sambuddha roy<>
30788<>846_2<>eric allender:samir datta<>the directed planar reachability problem<>fsttcs<>sambuddha roy<>
30793<>846_7<>eric allender:david a. mix barrington:tanmoy chakraborty:samir datta<>grid graph reachability problems<>eccc<>sambuddha roy<>
38241<>848_0<>mayssam sayyadian:anhai doan:arnon rosenthal<>tuning schema matching software using synthetic scenarios<>vldb<>yoonkyong lee<>
38237<>852_0<>hanif d. sherali:youngjin kim<>partial convexification cuts for 0-1 mixed-integer programs<>eor<>youngho lee<>
30777<>856_8<>udhav bhosle:subhasis chaudhuri<>multispectral panoramic mosaicing<>prl<>sumantra dutta roy<>
30780<>858_0<>prith banerjee<>an algorithm for trading off quantization error with hardware resources for matlab-based fpga design<>tc<>sanghamitra roy<>
30783<>858_3<>weijen chen<>convexfit: an optimal minimum-error convex fitting and smoothing algorithm with application to gate-sizing<>iccad<>sanghamitra roy<>
14203<>862_1<>kyoung-ho choi<>automatic creation of a talking head from a video sequence<>tmm<>jenq-neng hwang<>
32415<>865_0<>p. s. lai:s. s. cheng:s. y. sun:j. m. su:y. y. xu:y. h. chen:s. c. chuang:c. l. tseng:c. l. hsieh:y. l. lu:y. c. shen:j. r. chen:j. b. nie:f. p. tsai:h. c. huang:h. t. pao:hsin-chia fu<>automated information mining on multimedia tv news archives<>kes<>t. y. huang<>
39670<>871_8<>lin cai:xuemin shen:jon w. mark<>voice capacity analysis of wlan with unbalanced traffic<>qshine<>yang xiao<>
39671<>871_9<>kui wu:yong gao:fulu li<>lightweight deployment-aware scheduling for wireless sensor networks<>monet<>yang xiao<>
16296<>874_0<>francisco j. ferrer-troyano:jesus s. aguilar-ruiz<>incremental rule learning based on example nearness from numerical data streams<>sac<>joso cristobal riquelme santos<>
16306<>874_10<>raal giraldez:jesus s. aguilar-ruiz<>knowledge-based fast evaluation for evolutionary learning<>tsmc<>joso cristobal riquelme santos<>
16311<>874_15<>roberto ruiz:jesus s. aguilar-ruiz:norberto diaz-diaz<>analysis of feature rankings for classification<>ida<>joso cristobal riquelme santos<>
16325<>874_29<>roberto ruiz:jesus s. aguilar-ruiz<>heuristic search over a ranking for feature selection<>iwann<>joso cristobal riquelme santos<>
16328<>874_32<>francisco j. ferrer-troyano:jesus s. aguilar-ruiz<>incremental rule learning and border examples selection from numerical data streams<>jucs<>joso cristobal riquelme santos<>
3893<>877_3<>quamrul i. khan:tariqul hoque<>cantree: a tree structure for efficient incremental mining of frequent patterns<>icdm<>carson kai-sang leung<>
3901<>878_2<>pun-mo ho:tien-tsin wong<>compressing the illumination-adjustable images with principal component analysis<>tcsv<>chi-sing leung<>
37629<>879_0<>martha palmer<>machine translation using probabilistic synchronous dependency insertion grammars<>acl<>yuan ding<>
37634<>881_0<>volker haarslev<>towards efficient reasoning for description logics with inverse roles<>dlog<>yu ding<>
37632<>882_1<>chi yu chan:charles e. lawrence<>structure clustering features on the sfold web server<>bioinformatics<>ye ding<>
19757<>887_2<>daoqiang zhang:songcan chen<>improving the robustness of 'online agglomerative clustering method' based on kernel-induce distance measures<>npl<>keren tan<>
19758<>887_3<>songcan chen<>adaptively weighted sub-pattern pca for face recognition<>ijon<>keren tan<>
19726<>891_1<>y. j. chen:l. f. wang:d. k. liu<>intelligent sensor fusion and learning for autonomous robot navigation<>aai<>kay chen tan<>
19740<>891_15<>e. j. teoh:swee chiang chiam:chi keong goh<>adapting evolutionary dynamics of variation for multi-objective optimization<>cec<>k. cheng tan<>
19749<>892_1<>rogerio feris:ramesh raskar:longbin chen:matthew turk<>discontinuity preserving stereo with small baseline multi-flash illumination<>iccv<>kar-han tan<>
34131<>906_2<>bruce hendrickson:steven j. plimpton:lawrence rauchwerger<>finding strongly connected components in distributed graphs<>jpdc<>will mclendon iii<>
18687<>910_1<>ming-ying leung:aihua xia:louis h. y. chen<>nonrandom clusters of palindromes in herpesvirus genomes<>jcb<>kwok pui choi<>
14625<>911_3<>james fogarty:scott e. hudson:christopher g. atkeson:daniel avrahami:jodi forlizzi:sara b. kiesler:jie yang<>predicting human interruptibility with sensors<>tochi<>johnny c. lee<>
14616<>917_4<>wook shin:hong kook kim:kouichi sakurai<>procedural constraints in the extended rbac and the coloured petri net modeling<>ieicet<>jeong-gun lee<>
14618<>917_6<>euiseok kim:dong-ik lee<>instruction level redundant number computations for fast data intensive processing in asynchronous processors<>jsa<>jeong-gun lee<>
14619<>917_7<>eun-gu jung:jeong-gun lee:sang-hoon kwak:kyoung-sun jhang:dong-soo har<>high performance asynchronous on-chip bus with multiple issue and out-of-order/in-order completion<>glvlsi<>jeong-a. lee<>
12653<>919_4<>takumi endo:junichi miura:koichi nanashima:shoichi morimoto:yuichi goto<>security in persistently reactive systems<>euc<>jingde cheng<>
12657<>919_8<>nulo<>autonomous and continuous evolution of information systems<>kes<>jingde cheng<>
12665<>919_16<>nulo<>comparing persistent computing with autonomic computing<>icpads<>jingde cheng<>
12669<>919_20<>feng shang<>anticipatory agents based on anticipatory reasoning<>ismis<>jingde cheng<>
12672<>919_23<>nulo<>spatio-temporal relevant logic as the logical basis for spatio-temporal information systems<>ictai<>jingde cheng<>
12688<>927_0<>cheun ngen chong:jeroen doumen:sandro etalle:pieter h. hartel:stefan nikolaus<>streamto: streaming content using a tamper-resistant token<>sec<>jieyin cheng<>
12644<>932_1<>michael j. sweredoski:pierre baldi<>accurate prediction of protein disordered regions by mining protein structure data<>datamine<>jianlin cheng<>
12647<>932_4<>arlo z. randall:michael j. sweredoski:pierre baldi<>scratch: a protein structure and structural feature prediction server<>nar<>jianlin cheng<>
26068<>935_1<>philo juang:margaret martonosi:douglas w. clark<>voltage and frequency control with adaptive reaction time in multiple-clock-domain processors<>hpca<>qiang wu<>
26071<>935_4<>margaret martonosi:douglas w. clark:vijay janapa reddi:dan connors:youfeng wu:jin lee:david brooks<>a dynamic compilation framework for controlling microprocessor energy and performance<>micro<>qiang wu<>
26072<>935_5<>philo juang:margaret martonosi:li-shiuan peh:douglas w. clark<>formal control techniques for power-performance management<>micro<>qiang wu<>
26077<>937_4<>samuel cheng:kenneth r. castleman<>non-ubiquitous digital watermarking for record indexing and integrity protection of medical images<>icip<>qiang wu<>
26082<>937_9<>zhongmin liu:t. chen:zixiang xiong:kenneth r. castleman<>subspace-based prototyping and classification of chromosome images<>tip<>qiang wu<>
14593<>940_4<>min-soo kim 0002:kyu-young whang:min-jae lee<>n-gram/2l: a space and time efficient two-level n-gram inverted index structure<>vldb<>jae-gil lee<>
14595<>940_6<>kyu-young whang:min-jae lee:min-soo kim 0002:wook-shin han<>odysseus: a high-performance ordbms tightly-coupled with ir features<>icde<>jae-gil lee<>
18716<>942_0<>hyeong-seok ko<>research problems in clothing simulation<>cad<>kwang-jin choi<>
18713<>943_0<>jeong-hyeon choi:amit saple:zhiping wang:jason lee:sun kim<>platcom: current status and plan for the next stages<>dils<>kwangmin choi<>
18714<>943_1<>yu ma:jeong-hyeon choi:sun kim<>platcom: a platform for computational comparative genomics<>bioinformatics<>kwangmin choi<>
18696<>945_2<>wei-chung cheng:massoud pedram<>frame-based dynamic voltage and frequency scaling for an mpeg player<>jolpe<>kihwan choi<>
18698<>945_4<>kwanho kim:massoud pedram<>energy-aware mpeg-4 fgs streaming<>jolpe<>kihwan choi<>
14560<>953_1<>mei-po kwan<>emergency response after 9/11: the potential of real-time 3d gis for quick emergency response in micro-spatial environments<>urban<>jiyeong lee<>
14551<>954_4<>jung-hwan oh:sae hwang<>scenario based dynamic video abstractions using graph matching<>mm<>jeongkyu lee<>
14553<>954_6<>sae hwang:jung-hwan oh:yu cao:wallapak tavanapong:danyu liu:johnny wong:piet c. de groen<>automatic measurement of quality metrics for colonoscopy videos<>mm<>jeongkyu lee<>
14558<>954_11<>jung-hwan oh:sae hwang<>strg-index: spatio-temporal region graph indexing for large video databases<>sigmod<>jeongkyu lee<>
22893<>956_8<>ali iranli:hanif fatemi<>hebs: histogram equalization for backlight scaling<>date<>massoud pedram<>
22912<>956_27<>behnam amelifard:farzan fallah<>low-power fanout optimization using multiple threshold voltage inverters<>islped<>massoud pedram<>
22913<>956_28<>ali iranli:hanif fatemi<>lifetime-aware intrusion detection under safeguarding constraints<>ipsn<>massoud pedram<>
22916<>956_31<>shahin nazarian:emre tuncer<>an empirical study of crosstalk in vdsm technologies<>glvlsi<>massoud pedram<>
22918<>956_33<>payam heydari<>capacitive coupling noise in high-speed vlsi circuits<>tcad<>massoud pedram<>
22927<>956_42<>afshin abdollahi<>a new canonical form for fast boolean matching in logic synthesis and verification<>dac<>massoud pedram<>
22946<>956_61<>ali iranli<>dtm: dynamic tone mapping for backlight scaling<>dac<>massoud pedram<>
22958<>956_73<>shahin nazarian:emre tuncer:tao lin<>sensitivity-based gate delay propagation in static timing analysis<>isqed<>massoud pedram<>
22971<>956_86<>chang woo kang<>a leakage-aware low power technology mapping algorithm considering the hot-carrier effect<>jolpe<>massoud pedram<>
22985<>956_100<>afshin abdollahi:farzan fallah<>analysis and optimization of static power considering transition dependency of leakage current in vlsi circuits<>isqed<>massoud pedram<>
22994<>956_109<>kihwan choi:kwanho kim<>energy-aware mpeg-4 fgs streaming<>jolpe<>massoud pedram<>
22995<>956_110<>afshin abdollahi:farzan fallah<>an effective power mode transition technique in mtcmos circuits<>dac<>massoud pedram<>
23020<>956_135<>morteza maleki<>qom and lifetime-constrained random deployment of sensor networks for minimum energy consumption<>ipsn<>massoud pedram<>
23021<>956_136<>ali iranli:morteza maleki<>energy efficient strategies for deployment of a two-level wireless sensor network<>islped<>massoud pedram<>
23034<>956_149<>kihwan choi:wei-chung cheng<>frame-based dynamic voltage and frequency scaling for an mpeg player<>jolpe<>massoud pedram<>
14540<>959_1<>j. stephen downie:sally jo cunningham<>challenges in cross-cultural/multilingual music information seeking<>ismir<>jin ha lee<>
14543<>960_1<>hin-lun lai:lian-kuan chen<>a monotonic-decreasing rate scheduler for variable-bit-rate video streaming<>tcsv<>jack yiu-bun lee<>
20893<>961_1<>jennifer m. schopf:ian t. foster<>improving parallel data transfer times using predicted variances in shared networks<>ccgrid<>lingyun yang<>
3645<>962_6<>susan stepney:samuel l. braunstein:john a. clark:andrew m. tyrrell:andrew adamatzky:robert e. smith:tom addis:jonathan timmis:peter h. welch:robin milner:derek partridge<>journeys in non-classical computation i: a grand challenge for computing research<>paapp<>colin g. johnson<>
3627<>963_2<>sandra basnyat:nick chozos:philippe a. palanque<>incident and accident investigation techniques to inform model-based design of safety-critical interactive systems<>dsvis<>chris johnson<>
30732<>966_1<>harishchandra s. ramane:hanumappa b. walikar:b. devadas acharya:prabhakar ramrao hampiholi:sudhir r. jog:ivan gutman<>spectra and energies of iterated line graphs of regular graphs<>appml<>siddani bhaskara rao<>
30736<>967_0<>b. paul<>distributed clustering algorithm for finding virtual backbone in ad hoc networks<>icdcit<>s. v. rao<>
30738<>967_2<>b. paul:s. nandi<>an efficient distributed algorithm for finding virtual backbones in wireless ad-hoc networks<>hipc<>s. v. rao<>
30729<>968_6<>ashwin r. bharambe:venkata n. padmanabhan:srinivasan seshan:hui zhang<>the impact of heterogeneous bandwidth constraints on dht-based multicast protocols<>iptps<>sanjay g. rao<>
20670<>972_0<>luca de alfaro:marco faella:axel legay:pritam roy:maria sorea<>sociable interfaces<>frocos<>leandro dias da silva<>
20639<>974_0<>patricio domingues:paulo marques<>distributed data collection through remote probing in windows environments<>pdp<>luis moura silva<>
20641<>974_2<>patricio domingues:paulo marques<>resource usage of windows computer laboratories<>icppw<>luis moura silva<>
20652<>974_13<>bruno cabral:paulo marques<>rail: code instrumentation for .net<>sac<>luis moura silva<>
30740<>976_1<>allen y. yang:kun huang:wei hong:yi ma<>symmetry-based 3-d reconstruction from perspective images<>cviu<>shankar rao<>
30741<>976_2<>allen y. yang:andrew wagner:yi ma<>segmentation of hybrid motions via hybrid quadratic surface analysis<>iccv<>shankar rao<>
30742<>976_3<>allen y. yang:andrew wagner:yi ma<>segmentation of a piece-wise planar scene from perspective images<>cvpr<>shankar rao<>
10190<>978_0<>hyun-gon seo:ki-hyung kim:won-do jung:jun-sung park:seung-hwan jo:chang-min shin:seung-min park<>performance of service location protocols in manet based on reactive routing protocols<>icn<>heung-nam kim<>
10191<>978_1<>ki-hyung kim:won-do jung:jun-sung park:hyun-gon seo:seung-hwan jo:chang-min shin:seung-min park<>a resilient multipath routing protocol for wireless sensor networks<>icn<>heung-nam kim<>
10203<>981_0<>arijit sengupta:joerg evermann<>moq: web services ontologies for qos and general quality evaluations<>ecis<>henry m. kim<>
10195<>982_0<>peg howland:haesun park<>dimension reduction in text classification with support vector machines<>jmlr<>hyunsoo kim<>
10196<>982_1<>gene h. golub:haesun park<>missing value estimation for dna microarray gene expression data: local least squares imputation<>bioinformatics<>hyunsoo kim<>
10214<>983_0<>torsten braun<>efficient authentication and authorization of mobile users based on peer-to-peer network mechanisms<>hicss<>hahnsang kim<>
10240<>985_4<>tae-kyun kim:wonjun hwang:josef kittler<>component-based lda face description for image retrieval and mpeg-7 standardisation<>ivc<>hyunwoo kim<>
10219<>986_3<>sergio vicente denser pamboukian<>new public-key authentication watermarking for jbig2 resistant to parity attacks<>iwdw<>hae yong kim<>
10220<>986_4<>nulo<>a new public-key authentication watermarking for binary document images resistant to parity attacks<>icip<>hae yong kim<>
10231<>986_15<>sergio vicente denser pamboukian:ricardo l. de queiroz<>watermarking jbig2 text region for image authentication<>icip<>hae yong kim<>
10232<>986_16<>javier giacomantone:zang hee cho<>robust anisotropic diffusion to produce enhanced statistical parametric map from noisy fmri<>cviu<>hae yong kim<>
31963<>987_3<>mei feng:steve riddle:alexander romanovsky<>error recovery for a boiler system with ots pid controller<>words<>tom anderson<>
3168<>994_1<>pi-fuei hsieh:chung-hsien wu<>hand motion recognition for the vision-based taiwanese sign language interpretation<>acii<>chia-shiuan cheng<>
3170<>996_0<>keshab k. parhi<>further complexity reduction of parallel fir filters<>iscas<>chao cheng<>
11783<>1000_0<>xin bai:dan c. marinescu<>workflow management and resource discovery for an intelligent grid<>pc<>han yu<>
11764<>1002_12<>amin vahdat<>consistent and automatic replica regeneration<>tos<>haifeng yu<>
3157<>1005_1<>peter haddawy:namthip rujikeadkumjorn:khaimook dhananaiyapergse<>optimizing ad hoc trade in a commercial barter trade exchange<>ecra<>christine cheng<>
15869<>1010_0<>yijun yu:jianguo lu:weiwei sun:jing-hao xue:erik h. d'hollander<>making xml document markup international<>spe<>john mylopoulos<>
15859<>1011_1<>paolo giorgini:fabio massacci:nicola zannone<>modeling social and individual trust in requirements engineering methodologies<>itrust<>john mylopoulos<>
15863<>1011_5<>paolo giorgini:fabio massacci:nicola zannone<>"modeling security requirements through ownership, permission and delegation."<>re<>john mylopoulos<>
15812<>1013_5<>fabio massacci:nicola zannone<>minimal disclosure in hierarchical hippocratic databases with delegation<>esorics<>john mylopoulos<>
15818<>1013_11<>yannis velegrakis:renee j. miller<>representing and querying data transformations<>icde<>john mylopoulos<>
15823<>1013_16<>yuan an:alexander borgida<>constructing complex semantic mappings between xml data and ontologies<>semweb<>john mylopoulos<>
15834<>1013_27<>paolo giorgini:fabio massacci:a. siena:nicola zannone<>st-tool: a case tool for modeling and analyzing trust requirements<>itrust<>john mylopoulos<>
15845<>1013_38<>patricia rodriguez-gianolli:maddalena garzetti:lei jiang:anastasios kementsietsidis:iluju kiringa:mehedi masud:renee j. miller<>data sharing in the hyperion peer database system<>vldb<>john mylopoulos<>
15846<>1013_39<>yijun yu:yiqiao wang:sotirios liaskos:alexei lapouchnian:julio cesar sampaio do prado leite<>reverse engineering goal models from legacy code<>re<>john mylopoulos<>
15849<>1013_42<>julio cesar sampaio do prado leite:yijun yu:lin liu:eric s. k. yu<>quality-based software reuse<>caise<>john mylopoulos<>
15850<>1013_43<>nadzeya kiyavitskaya:nicola zeni:james r. cordy:luisa mich<>applying software analysis technology to lightweight semantic markup of document text<>icapr<>john mylopoulos<>
15851<>1013_44<>paolo giorgini:fabio massacci:nicola zannone<>st-tool: a case tool for security requirements engineering<>re<>john mylopoulos<>
15854<>1013_47<>yuan an:alexander borgida<>inferring complex semantic mappings between relational tables and ontologies from simple correspondences<>otm<>john mylopoulos<>
25319<>1014_0<>shang-chia chen:shih-kai lin:kun-ta wu:chao-ping huang:n. c. chen:chin-an chang:hsian-chu peng:chuang-feng shih:kuo-shung liu<>transport measurements on movpe-grown inn films<>mj<>pen-hsiu chang<>
20910<>1017_0<>xiaofeng yang:jian su<>entity-based noun phrase coreference resolution<>cicling<>lingpeng yang<>
20904<>1018_2<>chuang liu:ian t. foster<>efficient relational joins with arithmetic constraints on multiple attributes<>ideas<>lingyun yang<>
20905<>1019_0<>dazhang gu:lonnie r. welch<>"a predictive, decentralized load balancing approach."<>ipps<>lin yang<>
20895<>1020_0<>robert p. dick:haris lekatsas:srimat t. chakradhar<>crames: compressed ram for embedded systems<>codes<>lei yang<>
20898<>1021_0<>honglin hu:jinkang zhu<>performance evaluation of distributed-antenna communications systems using beam-hopping<>wicomm<>lie-liang yang<>
23555<>1022_13<>joachim hammer:oguzhan topsakal<>thalia: test harness for the assessment of legacy information integration approaches<>icde<>michael stonebraker<>
735<>1027_0<>mukul r. prasad:armin biere<>a survey of recent advances in sat-based formal verification<>sttt<>aarti gupta<>
8241<>1028_1<>mauro f. koyama:olga nabuco:khalil drira<>sharing engineering information and knowledge<>iat<>francisco edeneziano d. pereira<>
8805<>1029_0<>sungroh yoon:christine nardini:luca benini<>discovering coherent biclusters from gene expression data using zero-suppressed binary decision diagrams<>tcbb<>giovanni de micheli<>
734<>1030_2<>v. shiv naga prasad:larry s. davis<>extracting regions of symmetry<>icip<>abhinav gupta<>
8256<>1033_0<>andrew mccallum:kedar bellare<>a conditional random field for discriminatively-trained finite-state string edit distance<>uai<>fernando c. n. pereira<>
740<>1036_1<>shivkumar kalyanaraman:lingyi zhang<>a spot pricing framework for pricing intra-domain assured bandwidth services<>ijitdm<>aparna gupta<>
22025<>1047_2<>klaus jansen:andrzej lingas:eike seidel<>polynomial time approximation schemes for max-bisection on planar and geometric graphs<>siamcomp<>marek karpinski<>
22027<>1047_4<>yakov nekrich<>optimal trade-off for merkle tree traversal<>icete<>marek karpinski<>
22039<>1047_16<>yakov nekrich<>predecessor queries in constant time?<>esa<>marek karpinski<>
22040<>1047_17<>annette ebbers-baumann:ansgar grune:rolf klein:christian knauer:andrzej lingas<>embedding point sets into plane graphs of small dilation<>isaac<>marek karpinski<>
22070<>1047_47<>ion i. mandoiu:alexander olshevsky:alexander zelikovsky<>improved approximation algorithms for the quality of service multicast tree problem<>algorithmica<>marek karpinski<>
22072<>1047_49<>magnus bordewich:martin e. dyer<>path coupling using stopping times<>fct<>marek karpinski<>
22081<>1047_58<>wenceslas fernandez de la vega:ravi kannan:santosh vempala<>tensor decomposition and approximation schemes for constraint satisfaction problems<>stoc<>marek karpinski<>
22092<>1047_69<>yakov nekrich<>algorithms for construction of optimal and almost-optimal length-restricted codes<>dcc<>marek karpinski<>
22110<>1047_87<>magnus bordewich:martin e. dyer<>path coupling using stopping times and counting independent sets and colourings in hypergraphs<>eccc<>marek karpinski<>
22113<>1047_90<>piotr berman<>"8/7-approximation algorithm for (1,2)-tsp"<>eccc<>marek karpinski<>
37104<>1050_8<>john d. lafferty<>harmonic mixtures: combining mixture models and graph-based methods for inductive and scalable semi-supervised learning<>icml<>xiaojin zhu<>
37112<>1051_7<>xindong wu:ahmed k. elmagarmid:zhe feng:lide wu<>video data mining: semantic indexing and event detection from the association perspective<>tkde<>xingquan zhu<>
37116<>1051_11<>xindong wu<>cost-constrained data acquisition for intelligent data preparation<>tkde<>xingquan zhu<>
37122<>1051_17<>qijun chen:xindong wu<>scalable inductive learning on partitioned data<>ismis<>xingquan zhu<>
37123<>1051_18<>ying yang:xindong wu<>combining proactive and reactive predictions for data streams<>kdd<>xingquan zhu<>
37135<>1051_30<>yan zhang:xindong wu:jeffrey p. bond<>"ace: an aggressive classifier ensemble with error detection, correction, and cleansing."<>ictai<>xingquan zhu<>
37143<>1055_2<>bernd girod<>distributed rate allocation for multi-stream video transmission over ad hoc networks<>icip<>xiaoqing zhu<>
9350<>1057_1<>jinhui xu<>an improved approximation algorithm for uncapacitated facility location problem with penalties<>cocoon<>guang xu<>
9331<>1058_0<>zhigang zhu:xueyin lin<>efficient fourier-based approach for detecting orientations and occlusions in epipolar plane images for 3d scene modeling<>ijcv<>guangyou xu<>
9343<>1058_12<>jianping fan:yuli gao:hangzai luo<>statistical modeling and conceptualization of natural images<>pr<>guangyou xu<>
9328<>1059_1<>haihua yan:adit d. singh<>low voltage test in place of fast clock in ddsi delay test<>isqed<>gefu xu<>
9330<>1059_3<>haihua yan:adit d. singh<>delay defect characterization using low voltage test<>ats<>gefu xu<>
9310<>1060_7<>qing pan<>surface modelling using fourth order geometric flows<>IEEEcgiv<>guoliang xu<>
9314<>1060_11<>zhiqiang xu:jia-guang sun<>convergence analysis of discrete differential geometry operators over surfaces<>ima-ms<>guoliang xu<>
9318<>1060_15<>huanxi zhao<>directional smoothing of triangular meshes<>IEEEcgiv<>guoliang xu<>
9353<>1061_0<>jinhui xu<>an lp rounding algorithm for approximating uncapacitated facility location problem with penalties<>ipl<>guang xu<>
9354<>1061_1<>jinhui xu:zhenming chen:vikas singh:kenneth r. hoffmann<>efficient algorithms for determining 3-d bi-plane imaging geometry<>jco<>guang xu<>
36448<>1063_1<>ian f. akyildiz:weilin wang<>wireless mesh networks: a survey<>cn<>xudong wang<>
36433<>1065_5<>wei-ying ma:lei zhang:xing li<>multi-graph enabled active learning for multimodal web image retrieval<>mir<>xin-jing wang<>
36440<>1066_3<>chenyang lu:xenofon d. koutsoukos<>enhancing the robustness of distributed real-time middleware via end-to-end utilization control<>rtss<>xiaorui wang<>
36442<>1066_5<>guoliang xing:yuanfang zhang:chenyang lu:robert pless:christopher d. gill<>integrated coverage and connectivity configuration for energy conservation in sensor networks<>tosn<>xiaorui wang<>
36444<>1066_7<>dong jia:chenyang lu:xenofon d. koutsoukos<>decentralized utilization control in distributed real-time systems<>rtss<>xiaorui wang<>
36445<>1066_8<>chenyang lu:xenofon d. koutsoukos<>feedback utilization control in distributed real-time systems with end-to-end tasks<>tpds<>xiaorui wang<>
37054<>1068_3<>daphne der-fen liu<>multilevel distance labelings for paths and cycles<>siamdm<>xuding zhu<>
37056<>1068_5<>nulo<>circular choosability of graphs<>jgt<>xuding zhu<>
37071<>1068_20<>zhishi pan<>graphs of large girth with prescribed partial circular colourings<>gc<>xuding zhu<>
37084<>1068_33<>nulo<>circular perfect graphs<>jgt<>xuding zhu<>
37085<>1068_34<>peyman afshani:mahsa ghandehari:mahya ghandehari:hamed hatami:ruzbeh tusserkani<>circular chromatic index of graphs of maximum degree 3<>jgt<>xuding zhu<>
22138<>1072_6<>yi li:simon s. lam<>eliminating bottlenecks in overlay multicast<>networking<>min sik kim<>
30389<>1073_4<>marios savvides:anthony brockwell<>modeling phase spectra using gaussian mixture models for human face identification<>icapr<>sinjini mitra<>
30391<>1073_6<>marios savvides:b. v. k. vijaya kumar<>a one bit facial asymmetry code (fac) in fourier domain for human recognition<>avbpa<>sinjini mitra<>
30397<>1077_2<>tanay karnik:norbert seifert:ming zhang<>logic soft errors in sub-65nm technologies design and cad challenges<>dac<>subhasish mitra<>
30398<>1077_3<>t. m. mak:ming zhang<>dft assisted built-in soft error resilience<>iolts<>subhasish mitra<>
30405<>1077_10<>mehdi baradaran tahoori<>application-independent testing of fpga interconnects<>tcad<>subhasish mitra<>
30420<>1077_25<>ahmad a. al-yamani:edward j. mccluskey<>optimized reseeding by seed ordering and encoding<>tcad<>subhasish mitra<>
30435<>1077_40<>steven s. lumetta:michael mitzenmacher:nishant patil<>x-tolerant test response compaction<>dt<>subhasish mitra<>
30443<>1079_1<>gregory chockler:nancy a. lynch:joshua a. tauber<>proving atomicity: an assertional approach<>wdag<>sayan mitra<>
30445<>1079_3<>ben leong:barbara liskov<>path vector face routing: geographic routing with local face information<>icnp<>sayan mitra<>
30448<>1079_6<>myla archer<>pvs strategies for proving abstraction properties of automata<>entcs<>sayan mitra<>
30449<>1079_7<>hongping lim:dilsun kirli kaynar:nancy a. lynch<>translating timed i/o automata specifications for theorem proving in pvs<>formats<>sayan mitra<>
22124<>1080_1<>sebastien valette:ho-youl jung:remy prost<>watermarking of 3d irregular meshes based on wavelet multiresolution analysis<>iwdw<>min-su kim<>
22149<>1083_3<>david notkin<>using a clone genealogy extractor for understanding and supporting evolution of code clones<>msr<>miryung kim<>
22140<>1086_1<>jeong-sik kim:yong-guk kim:soo-mi choi<>shape comparison of the hippocampus using a multiresolution representation and icp normalization<>kes<>myoung-hee kim<>
12239<>1090_16<>vinay choudhary<>valiant's holant theorem and matchgate tensors<>eccc<>jin-yi cai<>
12248<>1095_1<>jing zhang:ying huang:yanda li<>atid: a web-oriented database for collection of publicly available alternative translational initiation events<>bioinformatics<>jun cai<>
38492<>1098_0<>mirka miller:chris rodger<>all (;)-cages are -edge-connected<>jgt<>yuqing lin<>
38464<>1099_1<>chien-liang chen:jiing-yuan lin<>"integration, verification and layout of a complex multimedia soc."<>date<>youn-long lin<>
38465<>1099_2<>sheng-yu shih:cheng-ru chang<>an amba-compliant deblocking filter ip for h.264/avc<>iscas<>youn-long lin<>
38467<>1099_4<>tai-yi huang:chung-ta king:yin-tsung hwang<>the embedded software consortium of taiwan<>tecs<>youn-long steve lin<>
38470<>1099_7<>jian-wen chen:cheng-ru chang<>a hardware accelerator for context-based adaptive binary arithmetic decoding in h.264/avc<>iscas<>youn-long lin<>
38421<>1100_10<>hsien-ming tsai:ai-chun pang:yung-chun lin<>repacking on demand for hierarchical cellular networks<>winet<>yi-bing lin<>
38424<>1100_13<>hsien-ming tsai:ai-chun pang:yung-chun lin<>repacking on demand for speed-sensitive channel assignment<>cn<>yi-bing lin<>
38426<>1100_15<>ai-chun pang:herman chung-hwa rao<>impact of mobility on mobile telecommunications networks<>wicomm<>yi-bing lin<>
38432<>1100_21<>nulo<>per-user checkpointing for mobility database failure restoration<>tmc<>yi-bing lin<>
38446<>1100_35<>yuguang fang<>strongly consistent access algorithms for wireless data networks<>winet<>yi-bing lin<>
8075<>1107_2<>jaap-henk hoepman<>off-line karma: a decentralized currency for peer-to-peer and grid applications<>acns<>flavio d. garcia<>
8076<>1107_3<>ichiro hasuo:wolter pieters:peter van rossum<>provable anonymity<>ccs<>flavio d. garcia<>
28300<>1112_1<>sujata banerjee:puneet sharma:sung-ju lee<>nodewiz: peer-to-peer resource discovery for grids<>ccgrid<>sujoy basu<>
28301<>1112_2<>jiani guo:laxmi n. bhuyan:raj kumar<>qos aware job scheduling in a cluster-based web server for multimedia applications<>ipps<>sujoy basu<>
28302<>1112_3<>songqing chen:bo shen:yong yan:xiaodong zhang<>fast proxy delivery of multiple streaming sessions in shared running buffers<>tmm<>sujoy basu<>
28309<>1112_10<>rodrigo fonseca:puneet sharma:sujata banerjee:sung-ju lee<>distributed querying of internet distance information<>infocom<>sujoy basu<>
28328<>1114_1<>richard pollack:marie-francoise roy<>computing the first betti number and the connected components of semi-algebraic sets<>stoc<>saugata basu<>
9830<>1120_0<>suh-ryung kim<>a class of acyclic digraphs with interval competition graphs<>dam<>han hyuk cho<>
9831<>1120_1<>suh-ryung kim:yunsun nam<>on the trees whose 2-step competition numbers are two<>arscom<>han hyuk cho<>
9833<>1120_3<>suh-ryung kim<>the competition number of a graph having exactly one hole<>dm<>han hyuk cho<>
35395<>1121_0<>marilyn tremaine<>multimodal user input patterns in a non-visual context<>assets<>xiaoyu chen<>
35397<>1122_0<>xiaotie deng<>3-nash is ppad-complete<>eccc<>xi chen<>
35399<>1123_1<>chengcui zhang<>region-based image clustering and retrieval using multiple instance learning<>civr<>xin chen<>
35404<>1127_0<>chengcui zhang:shu-ching chen:min chen<>a latent semantic indexing based method for solving multiple instance learning problem in region-based image retrieval<>ism<>xin chen<>
3318<>1128_2<>steven w. schlosser:jiri schindler:stratos papadomanolakis:minglong shao:anastassia ailamaki:gregory r. ganger<>on multidimensional data and modern disks<>fast<>christos faloutsos<>
3323<>1128_7<>jure leskovec:jon m. kleinberg<>"graphs over time: densification laws, shrinking diameters and possible explanations."<>kdd<>christos faloutsos<>
3325<>1128_9<>arnab bhattacharya:vebjorn ljosa:jia-yu pan:mark r. verardo:hyung-jeong yang:ambuj k. singh<>vivo: visual vocabulary construction for mining biomedical images<>icdm<>christos faloutsos<>
5585<>1136_0<>daniel cohen-or:olga sorkine:sivan toledo<>algebraic analysis of high-pass quantization<>tog<>doron chen<>
6385<>1140_1<>jin hong:yongjin yeom:daewan han<>a new class of single cycle t-functions<>fse<>dong hoon lee<>
6394<>1144_0<>alexander g. gray:andrew w. moore<>dual-tree fast gauss transforms<>nips<>dongryeol lee<>
6400<>1146_0<>jonathan friedman:ilias tsigkogiannis:sophia wong:dennis chao:david levin:william j. kaiser:mani b. srivastava<>ragobot: a new platform for wireless mobile sensor networks<>dcoss<>david lee<>
15278<>1148_0<>jeneung lee:kotaro yamanouchi:akira nishizono<>a smart ambient sound aware environment for be quiet reminding<>icpads<>jianhua ma<>
15279<>1148_1<>kei nakanishi:makoto setozaki:runhe huang<>a java-based rfid service framework with semantic data binding between real and cyber spaces<>euc<>jianhua ma<>
15280<>1148_2<>akito nakamura:runhe huang<>a random id update scheme to protect location privacy in rfid-based student administration systems<>dexaw<>jianhua ma<>
15281<>1148_3<>bernady o. apduhan:laurence tianruo yang<>smart hyperspaces and project ubikids<>aina<>jianhua ma<>
15282<>1148_4<>katsuhiro takata:yusuke shina:hiraku komuro:masataka tanaka:masanobu ide<>designing a context-aware system to detect dangerous situations in school routes for kids outdoor safety care<>euc<>jianhua ma<>
15249<>1154_0<>rob a. rutenbar<>fast interval-valued statistical interconnect modeling and reduction<>ispd<>james d. z. ma<>
15253<>1154_4<>claire fang fang:rob a. rutenbar:xiaolin xie:duane s. boning<>interval-valued statistical modeling of oxide chemical-mechanical polishing<>iccad<>james d. ma<>
15227<>1156_0<>fuhai li:dezhi huang<>mfcc and svm based recognition of chinese vowels<>cis<>jinwen ma<>
15228<>1156_1<>shuqun fu<>on the correct convergence of the em algorithm for gaussian mixtures<>pr<>jinwen ma<>
15230<>1156_3<>fei ge:dengpan gao<>two adaptive matching learning algorithms for independent component analysis<>cis<>jinwen ma<>
15234<>1156_7<>fuhai li:jianfeng liu<>non-parametric statistical tests for informative gene selection<>isnn<>jinwen ma<>
15235<>1156_8<>fei ge<>an information criterion for informative gene selection<>isnn<>jinwen ma<>
15237<>1156_10<>lei xu<>asymptotic convergence properties of the em algorithm with respect to the overlap in the mixture<>ijon<>jinwen ma<>
15244<>1156_17<>zhiwu lu:qiansheng cheng<>a gradient byy harmony learning algorithm on mixture of experts for curve detection<>ideal<>jinwen ma<>
15264<>1162_0<>kei nakanishi:takahito aonuma:jeneung lee<>peer collaboration modes and private room services in tomscop<>icpads<>jianhua ma<>
15265<>1162_1<>nobuhiro nakamura:souichirou takahama:leonard barolli:kaoru sugita<>a multiplatform p2p system: its implementation and applications<>aina<>jianhua ma<>
15273<>1162_9<>nobuhiro nakamura:leonard barolli:souichirou takahama:kaoru sugita:arjan durresi<>implementation of a pure p2p collaboration multiplatform and its applications<>join<>jianhua ma<>
5574<>1165_1<>stephen john turner:wentong cai:boon-ping gan:malcolm yoke-hean low<>algorithms for hla-based distributed simulation cloning<>tomacs<>dan chen<>
5576<>1165_3<>ton oguara:georgios k. theodoropoulos:brian logan:michael lees<>an adaptive load management mechanism for distributed simulation of multi-agent systems<>dsrt<>dan chen<>
5583<>1168_0<>chen-an tsai:sue-jane wang:james j. chen<>sample size for gene expression microarray experiments<>bioinformatics<>dung-tsa chen<>
19390<>1169_0<>thomas c. s. cheah<>a practical implementation of a 3-d game engine<>IEEEcgiv<>kok-why ng<>
23525<>1170_0<>jeff ubois:benjamin m. gross<>forward thinking<>ceas<>marc a. smith<>
23514<>1175_1<>gregory d. peterson<>parallel application performance on shared high performance reconfigurable computing resources<>pe<>melissa c. smith<>
23515<>1175_2<>jeffrey s. vetter:xuejun liang<>accelerating scientific applications with the src-6 reconfigurable computer: methodologies and analysis<>ipps<>melissa c. smith<>
23516<>1175_3<>xuejun liang:jeffrey s. vetter:arthur s. bland<>balancing fpga resource utilities<>ersa<>melissa c. smith<>
23508<>1177_3<>tiffani williams<>cooperative rec-i-dcm3: a population-based approach for reconstructing phylogenies<>cibcb<>marc smith<>
23503<>1178_3<>a. j. bernheim brush:xiaoqing wang:tammara combs turner<>assessing differential usage of usenet social accounting meta-data<>chi<>marc a. smith<>
23504<>1178_4<>carman neustaedter:a. j. bernheim brush:danyel fisher<>the social network and relationship finder: social sorting for email triage<>ceas<>marc a. smith<>
19376<>1179_0<>steve benford:boriana koleva<>pins push in and pouts pop out: creating a tangible pin-board that ejects physical documents<>chi<>kher hui ng<>
19380<>1181_0<>chong li<>on best restricted range approximation in continuous complex-valued function spaces<>jat<>k. f. ng<>
19378<>1182_0<>zhongfei li<>looking for arbitrage or term structures in frictional markets<>wine<>kai w. ng<>
19383<>1184_0<>khee meng koh<>the orientation number of two complete graphs with linkages<>dm<>k. l. ng<>
19384<>1184_1<>k. m. koh<>on optimal orientation of cycle vertex multiplications<>dm<>k. l. ng<>
1573<>1191_1<>abdulkadir utku diril:yuvraj singh dhillon:abhijit chatterjee<>level-shifter free design of low power dual supply voltage cmos circuits using dual threshold voltages<>tvlsi<>adit d. singh<>
1561<>1193_6<>mohammad mursalin akon:dhrubajyoti goswami:hon fung li<>extensible parallel architectural skeletons<>hipc<>ajit singh<>
1566<>1193_11<>mohammad mursalin akon:xuemin shen:dhrubajyoti goswami:hon fung li<>developing high-performance parallel applications using epas<>ispa<>ajit singh<>
37611<>1198_6<>catuscia palamidessi<>axiomatizations for probabilistic finite-state behaviors<>fossacs<>yuxin deng<>
37613<>1198_8<>catuscia palamidessi:jun pang<>compositional reasoning for probabilistic finite-state behaviors<>birthday<>yuxin deng<>
15361<>1204_4<>christiano braga<>modular rewriting semantics in practice<>entcs<>jose meseguer<>
15362<>1204_5<>prasanna thati<>symbolic reachability analysis using narrowing and its application to verification of cryptographic protocols<>entcs<>jose meseguer<>
15374<>1204_17<>santiago escobar:prasanna thati<>natural narrowing for general term rewriting systems<>rta<>jose meseguer<>
15386<>1204_29<>prasanna thati<>complete symbolic reachability analysis using back-and-forth narrowing<>calco<>jose meseguer<>
8800<>1216_1<>chuanyi ji:vincent w. s. chan<>on the scalability of network management information for inter-domain light-path assessment<>ton<>guanglei liu<>
20132<>1222_0<>shu fan:chengxiong mao<>peak load forecasting using the self-organizing map<>isnn<>luonan chen<>
20133<>1222_1<>zhen-ping li:wenfeng zhou:xiang-sun zhang<>a parsimonious tree-grow method for haplotype inference<>bioinformatics<>luonan chen<>
20134<>1222_2<>tianshou zhou:yun tang<>protein structure alignment by deterministic annealing<>bioinformatics<>luonan chen<>
20136<>1222_4<>tianshou zhou:yun tang:xiangsun zhang<>aligning multiple protein structures by deterministic annealing<>jbcb<>luonan chen<>
20137<>1222_5<>xiang-sun zhang:yong wang:zhong-wei zhan:ling-yun wu<>exploring protein's optimal hp configurations by self-organizing mapping<>jbcb<>luonan chen<>
20114<>1223_0<>hong chen:gencai chen<>effects of local-lag mechanism on task performance in a desktop cve system<>jcst<>ling chen<>
20116<>1223_2<>bo xie:gencai chen:chun chen<>emoears: an emotion recognition system for mandarin speech<>cis<>ling chen<>
20119<>1223_5<>bo xie:gencai chen:chun chen<>statistical feature selection for mandarin speech emotion recognition<>icic<>ling chen<>
20123<>1223_9<>gencai chen<>a fuzzy dead reckoning algorithm for distributed interactive applications<>fskd<>ling chen<>
20125<>1223_11<>nulo<>effects of network characteristics on task performance in a desktop cve system<>aina<>ling chen<>
20128<>1223_14<>nulo<>an adaptive consistency maintenance approach for replicated continuous applications<>icpads<>ling chen<>
17873<>1225_1<>brian randell<>a systematic classification of cheating in online games<>netgames<>jeff jianxin yan<>
17880<>1226_3<>yun yang:ryszard kowalczyk:xuan thang nguyen<>a service workflow management framework based on peer-to-peer and agent technologies<>qsic<>jun yan<>
17888<>1227_3<>mei-ju chen:david kuo<>the bandwidth sum of join and composition of graphs<>dm<>jing-ho yan<>
25605<>1235_0<>anirban dasgupta:ravi kumar:andrew tomkins<>variable latent semantic indexing<>kdd<>prabhakar raghavan<>
25607<>1235_2<>nulo<>incentive networks<>kdd<>prabhakar raghavan<>
25608<>1235_3<>nulo<>incentive networks<>la-web<>prabhakar raghavan<>
25611<>1235_6<>vinay kakade<>encoding xml in vector spaces<>ecir<>prabhakar raghavan<>
25612<>1235_7<>nulo<>query incentive networks<>asian<>prabhakar raghavan<>
25613<>1235_8<>jon m. kleinberg<>query incentive networks<>focs<>prabhakar raghavan<>
2177<>1236_0<>xiaowen chu<>dynamic routing and wavelength assignment in the presence of wavelength conversion for all-optical networks<>ton<>bo li<>
2145<>1240_0<>zongpeng li<>probabilistic power management for wireless ad hoc networks<>monet<>baochun li<>
2149<>1240_4<>nulo<>end-to-end fair bandwidth allocation in multi-hop wireless ad hoc networks<>icdcs<>baochun li<>
2152<>1240_7<>zongpeng li:dan jiang:lap chi lau<>on achieving optimal throughput with network coding<>infocom<>baochun li<>
2154<>1240_9<>selwyn yuen<>strategyproof mechanisms towards dynamic topology formation in autonomous networks<>monet<>baochun li<>
2155<>1240_10<>mea wang:zongpeng li<>a high-throughput overlay multicast infrastructure with network coding<>iwqos<>baochun li<>
2159<>1240_14<>w. wang<>market-driven bandwidth allocation in selfish overlay networks<>infocom<>b. li<>
2162<>1240_17<>zongpeng li<>efficient and distributed computation of maximum multicast rates<>infocom<>baochun li<>
2163<>1240_18<>zongpeng li<>on increasing end-to-end throughput in wireless ad hoc networks<>qshine<>baochun li<>
2164<>1240_19<>ying zhu<>overlay networks with linear capacity constraints<>iwqos<>baochun li<>
2135<>1244_0<>mingli wu:wenjie li:qin lu<>ctemp: a chinese temporal parser for extracting and normalizing temporal information<>ijcnlp<>baoli li<>
2139<>1244_4<>wenjie li:qin lu:mingli wu<>profile-based event tracking<>sigir<>baoli li<>
34301<>1246_3<>michael bedford taylor:saman p. amarasinghe:anant agarwal<>scalar operand networks<>tpds<>walter lee<>
36404<>1247_3<>bonnie kirkpatrick:shawna l. thomas:guang song:nancy m. amato<>using motion planning to study rna folding kinetics<>jcb<>xinyu tang<>
36396<>1248_15<>jianliang xu<>qos-aware replica placement for content distribution<>tpds<>xueyan tang<>
34318<>1249_1<>andrew stephen mcgough:jeremy cohen:john darlington:eleftheria katsiri:sofia panagiotidi:yash patel<>an end-to-end workflow pipeline for large-scale grid computing<>grid<>william lee<>
36406<>1254_0<>jianzhuang liu<>evolutionary search for faces from line drawings<>pami<>xiaoou tang<>
34323<>1260_0<>baihua zheng<>dsi: a fully distributed spatial index for wireless data broadcast<>icde<>wang-chien lee<>
41224<>1263_0<>jianfeng yin<>an online multi-stroke sketch recognition method integrated with stroke segmentation<>acii<>zhengxing sun<>
41230<>1263_6<>jing liu<>informal user interface for graphical computing<>acii<>zhengxing sun<>
41200<>1264_1<>gavin r. finnie<>experience management in knowledge management<>kes<>zhaohao sun<>
41207<>1264_8<>gavin r. finnie<>a unified logical model for cbr-based e-commerce systems<>ijis<>zhaohao sun<>
41209<>1264_10<>gavin r. finnie<>mebrs: a multiagent architecture for an experience based reasoning system<>kes<>zhaohao sun<>
41210<>1264_11<>gavin r. finnie:klaus weber<>abductive case-based reasoning<>ijis<>zhaohao sun<>
19940<>1265_5<>ying kin yu:michael ming-yuen chang<>pose estimation for augmented reality applications using genetic algorithm<>tsmc<>kin-hong wong<>
19941<>1265_6<>michael ming-yuen chang<>model reconstruction and pose acquisition using extended lowe's method<>tmm<>kin-hong wong<>
19945<>1265_10<>chi hang wong:wai man szeto<>automatic lyrics alignment on popular music<>cata<>kin hong wong<>
41176<>1272_2<>weizhao wang:xiang-yang li<>design diffserv multicast with selfish agents<>aaim<>zheng sun<>
41180<>1272_6<>xiang-yang li:weizhao wang:xiaowen chu<>mechanism design for set cover games when elements are agents<>aaim<>zheng sun<>
41181<>1272_7<>philip s. yu:xiang-yang li<>iterative mining for rules with constrained antecedents<>sdm<>zheng sun<>
19843<>1276_2<>louise guthrie:wei liu:yunqing xia<>improving quality of email categorization with tournament methods<>ike<>kam-fai wong<>
19874<>1276_33<>nan tang:jeffrey xu yu:kevin lu:jianxin li<>accelerating xml structural join by partitioning<>dexa<>kam-fai wong<>
19889<>1277_8<>daniel l. moise<>extracting and representing cross-language dependencies in diverse software systems<>wcre<>kenny wong<>
19892<>1277_11<>daqing hou:h. james hoover<>what can programmer questions tell us about frameworks?<>iwpc<>kenny wong<>
19894<>1277_13<>dabo sun<>on evaluating the layout of uml class diagrams for program comprehension<>iwpc<>kenny wong<>
9703<>1282_1<>shuqing huang:liang-jie zhang<>progressive auction based resource allocation in service-oriented architecture<>IEEEscc<>huimin chen<>
9669<>1284_5<>prasant mohapatra<>a context-aware html/xml document transmission process for mobile wireless clients<>www<>huamin chen<>
9675<>1285_5<>paul jen-hwa hu:daniel dajun zeng:catherine a. larson:wei chang:chunju tseng<>evaluating an infectious disease information sharing and analysis system<>isi<>hsinchun chen<>
9678<>1285_8<>homa atabakhsh:chunju tseng:byron marshall:siddharth kaza:shauna eggers:hemanth gowda:ankit shah:tim petersen:chuck violette<>visualization in law enforcement<>dgo<>hsinchun chen<>
9681<>1285_11<>jennifer jie xu<>criminal network analysis and visualization<>cacm<>hsinchun chen<>
9683<>1285_13<>homa atabakhsh:chunju tseng:byron marshall:siddharth kaza:shauna eggers:hemanth gowda:ankit shah:tim petersen:chuck violette<>visualization in law enforcement<>chi<>hsinchun chen<>
9686<>1285_16<>zan huang:xin li<>link prediction approach to collaborative filtering<>jcdl<>hsinchun chen<>
9896<>1286_1<>david cohen-steiner:john harer<>stability of persistence diagrams<>compgeom<>herbert edelsbrunner<>
9897<>1286_2<>dominique attali:david cohen-steiner<>extraction and simplification of iso-surfaces in tandem<>sgp<>herbert edelsbrunner<>
9898<>1286_3<>david cohen-steiner<>inequalities for the curvature of curves and surfaces<>compgeom<>herbert edelsbrunner<>
12746<>1296_3<>manish agarwal:lixin gao:jie wu<>energy efficient broadcast in wireless ad hoc networks with hitch-hiking<>monet<>joon ho cho<>
12748<>1296_5<>wen gao<>continuous-time equivalents of welch bound equality sequences<>tit<>joon ho cho<>
12722<>1297_3<>feng qiu:zhenyu liu<>analysis of user web traffic with a focus on search activities<>webdb<>junghoo cho<>
12723<>1297_4<>sourashis roy:robert adams<>page quality: in search of an unbiased web ranking<>sigmod<>junghoo cho<>
12727<>1297_8<>uichin lee:zhenyu liu<>automatic identification of user goals in web search<>www<>junghoo cho<>
12728<>1297_9<>sandeep pandey:sourashis roy:christopher olston:soumen chakrabarti<>shuffling a stacked deck: the case for partially randomized ranking of search engine results<>vldb<>junghoo cho<>
12729<>1297_10<>panagiotis g. ipeirotis:alexandros ntoulas:luis gravano<>modeling and managing content changes in text databases<>icde<>junghoo cho<>
12739<>1297_20<>alexandros ntoulas:gerald chao<>the infocious web search engine: improving web searching through linguistic analysis<>www<>junghoo cho<>
9715<>1298_0<>unsang park:anil k. jain<>3d model-assisted face recognition in video<>crv<>hong chen<>
9717<>1298_2<>anil k. jain<>dental biometrics: alignment and matching of dental radiographs<>pami<>hong chen<>
9719<>1298_4<>anil k. jain<>dental biometrics: alignment and matching of dental radiographs<>wacv<>hong chen<>
29848<>1308_0<>ten-hwang lai:anish arora<>barrier coverage with wireless sensors<>mobicom<>santosh kumar<>
29849<>1308_1<>anish arora:rajiv ramnath:emre ertin:prasun sinha:sandip bapat:vinayak naik:vinod kulathumani:hongwei zhang:hui cao:mukundan sridharan:nick seddon:chris anderson:ted herman:nishank trivedi:chen zhang:mikhail nesterenko:romil shah:sandeep s. kulkarni:mahesh aramugam:limin wang:mohamed g. gouda:young-ri choi:david e. culler:prabal dutta:cory sharp:gilman tolle:mike grimmer:bill ferriera:ken parker<>exscal: elements of an extreme scale wireless sensor network<>rtcsa<>santosh kumar<>
29846<>1309_0<>patrick crowley:jonathan s. turner<>design of randomized multichannel packet storage for high performance routers<>hoti<>sailesh kumar<>
37939<>1311_0<>hsiang-cheh huang:kang k. yen:jeng-shyang pan:kuang-chih huang<>improved image coding with classified vq and side-match vq<>kes<>yu-hsiu huang<>
37940<>1312_0<>saleem n. bhatti<>resilient state management in large scale networks<>iwqos<>yangcheng huang<>
37937<>1313_0<>yi-ping you:chun-yen tseng:po-chiun huang:tingting hwang:sheng-yu hsu<>low-power techniques for network security processors<>aspdac<>yu-hui huang<>
37941<>1317_0<>yuh-jzer joung:cheng yen:chung-tang huang<>on personal data license design and negotiation<>compsac<>yi-jhan huang<>
29842<>1322_2<>milind dawande:chelliah sriskandarajah<>scheduling web advertisements: a note on the minspace problem<>scheduling<>subodha kumar<>
29617<>1327_3<>ali e. dashti:roger zimmermann<>zoned-raid for multimedia database servers<>dasfaa<>seon ho kim<>
29606<>1329_0<>hee-cheol seo:hae-chang rim:sung-hyon myaeng<>improving query translation in english-korean cross-language information retrieval<>ipm<>sang-bum kim<>
29613<>1329_7<>kyoung-soo han:young-in song:hae-chang rim<>phrase-based definitional question answering using definition terminology<>airs<>sang-bum kim<>
29601<>1330_1<>stephen p. boyd<>geometric programming for circuit optimization<>ispd<>seung-jean kim<>
29602<>1330_2<>alessandro magnani:stephen p. boyd<>robust fisher discriminant analysis<>nips<>seung-jean kim<>
9423<>1333_0<>alexandr v. kostochka<>an extremal problem for -linked graphs<>jgt<>gexin yu<>
36377<>1347_0<>rolf lakamper:longin jan latecki:diedrich wolter<>geometric robot mapping<>dgci<>xinyu sun<>
36378<>1347_1<>nulo<>wythoff's sequence and -heap wythoff's conjectures<>dm<>xinyu sun<>
4865<>1348_0<>s. r. kulkarni:h. vincent poor<>density evolution for asymmetric memoryless channels<>tit<>chih-chun wang<>
32789<>1353_1<>junhai wen:guoping han:hongbing lu:zhengrong liang<>evaluation of an efficient compensation method for quantitative fan-beam brain spect reconstruction<>tmi<>tianfang li<>
32792<>1357_0<>yue li:tamer kahveci:jose a. b. fortes<>workload characterization of bioinformatics applications<>mascots<>tao li<>
32793<>1357_1<>yue li<>bioinformatics on embedded systems: a case study of computational biology applications on vliw architecture<>icess<>tao li<>
22002<>1358_4<>manuel bodirsky:clemens gropl<>sampling unlabeled biconnected planar graphs<>isaac<>mihyun kang<>
32794<>1359_0<>xiaojie liu:hongbin li<>a new model for dynamic intrusion detection<>cans<>tao li<>
32740<>1363_2<>wei peng<>a clustering model based on matrix approximation with applications to cluster system log files<>ecml<>tao li<>
32755<>1363_17<>wei peng:sheng ma<>mining logs files for computing system management<>icac<>tao li<>
32759<>1363_21<>nulo<>on clustering binary data<>sdm<>tao li<>
32764<>1363_26<>nulo<>a general model for clustering binary data<>kdd<>tao li<>
32769<>1363_31<>chengyong yang:erliang zeng:giri narasimhan<>clustering genes using gene expression and text literature data<>csb<>tao li<>
32773<>1363_35<>nulo<>hierarchical document classification using automatically generated hierarchy<>sdm<>tao li<>
32786<>1365_3<>carla schlatter ellis:alvin r. lebeck:daniel j. sorin<>pulse: a dynamic deadlock detection mechanism using speculative execution<>usenix<>tong li<>
2798<>1371_0<>ying yang:paul k. humphreys:ronan t. mcivor<>main business service dimensions in an e-commerce environment<>icws<>biao yang<>
34395<>1374_0<>baoli li:qin lu:mingli wu<>profile-based event tracking<>sigir<>wenjie li<>
19402<>1382_5<>sunwoong choi:chong-kwon kim<>on the performance characteristics of wlans: revisited<>sigmetrics<>kihong park<>
19395<>1386_4<>eun-chan park:chong-ho choi<>robust delay estimator for playout buffering in internet audio applications<>comcom<>kyung-joon park<>
34401<>1388_0<>junzhou luo:bo liu<>distributed intelligent network management model for the large-scale computer network<>cscwd<>wei li<>
31093<>1395_3<>ki-young kim:jong-soo jang<>d-sat: detecting syn flooding attack by two-stage statistical approach<>saint<>seung-won shin<>
31101<>1399_0<>nulo<>web services<>ac<>sang shin<>
34379<>1400_6<>chris de silver:yianni attikiouzel<>simultaneous map estimation of inhomogeneity and segmentation of brain tissues from mr images<>icip<>wanqing li<>
34380<>1402_0<>man qi wu<>web search based on ant behavior: approach and implementation in case of interlegis<>seke<>weigang li<>
34381<>1402_1<>marcos vinicius pinheiro dib:alba cristina magalhaes alves de melo<>method to balance the communication among multi-agents in real time traffic synchronization<>fskd<>weigang li<>
23049<>1403_0<>seapahn megerian:farinaz koushanfar:mani b. srivastava<>worst and best-case coverage in sensor networks<>tmc<>miodrag potkonjak<>
20808<>1404_0<>jorng-tzong horng:ching-mei lin:bing-he yang<>a genetic algorithm for multiple sequence alignment<>soco<>li-cheng wu<>
20814<>1404_6<>hsien-da huang:jorng-tzong horng:shu-fen fang<>discovering common structural motifs of ribosomal rna secondary structures in prokaryotes<>ijait<>li-cheng wu<>
20817<>1405_0<>houari a. sahraoui:petko valtchev<>caribou: a supporting environment for software e-development<>eee<>lei wu<>
20818<>1405_1<>houari a. sahraoui<>accommodating software development collaboration<>apsec<>lei wu<>
20819<>1405_2<>houari a. sahraoui:petko valtchev<>coping with legacy system migration complexity<>iceccs<>lei wu<>
20825<>1408_0<>van vu<>improving the gilbert-varshamov bound for -ary codes<>tit<>lei wu<>
2593<>1424_0<>jose l. v. mejino jr.:stefan schulz:anand kumar:cornelius rosse<>anatomical information science<>cosit<>barry smith<>
29589<>1430_2<>chang-soo shin:joseph b. keller<>high-frequency asymptotics for the numerical solution of the helmholtz equation<>appml<>seongjai kim<>
29595<>1432_3<>han hyuk cho<>the competition number of a graph having exactly one hole<>dm<>suh-ryung kim<>
29598<>1432_6<>han hyuk cho:yunsun nam<>on the trees whose 2-step competition numbers are two<>arscom<>suh-ryung kim<>
29599<>1432_7<>han hyuk cho<>a class of acyclic digraphs with interval competition graphs<>dam<>suh-ryung kim<>
23207<>1433_2<>taisuke boku:kenji onuma:yoshihiro nakajima:daisuke takahashi<>grid environment for computational astrophysics driven by grape-6 with hmcs-g and omnirpc<>ipps<>mitsuhisa sato<>
23212<>1433_7<>motonori hirano:yoshio tanaka<>opengr: a directive-based grid programming environment<>pc<>mitsuhisa sato<>
23222<>1433_17<>daisuke takahashi:taisuke boku<>computation of high-precision mathematical constants in a combined cluster and grid environment<>lssc<>mitsuhisa sato<>
23226<>1433_21<>hiroshi nakashima:hiroshi nakamura:taisuke boku:satoshi matsuoka:daisuke takahashi:yoshihiko hotta<>megaproto: 1 tflops/10kw rack is feasible even with only commodity technology<>sc<>mitsuhisa sato<>
12334<>1436_0<>carl s. lebsack<>system level perspective on object locality<>oopsla<>j. morris chang<>
12345<>1436_11<>yusuf hasan<>a study of best-fit memory allocators<>cl<>j. morris chang<>
12350<>1436_16<>wei huang:jiang lin:zhao zhang<>towards pairing java applications on smt processors<>mascots<>j. morris chang<>
12354<>1436_20<>paul griffin:witawas srisa-an<>an energy efficient garbage collector for java embedded devices<>lctrts<>j. morris chang<>
12355<>1436_21<>carl s. lebsack<>using scratchpad to exploit object locality in java<>iccd<>j. morris chang<>
12356<>1436_22<>min pan:chris c. n. chu<>transition time bounded low-power clock tree construction<>iscas<>j. morris chang<>
12383<>1440_6<>won suk lee<>effect of count estimation in finding frequent itemsets over online transactional data streams<>jcst<>joong hyuk chang<>
16158<>1441_32<>sudheer sahu:peng yin<>complexity of graph self-assembly in accretive systems and self-destructible systems<>dna<>john h. reif<>
16194<>1441_68<>peng yin:sudheer sahu:andrew j. turberfield<>design of autonomous dna cellular automata<>dna<>john h. reif<>
16219<>1441_93<>sudheer sahu:peng yin<>a self-assembly model of time-dependent glue strength<>dna<>john h. reif<>
21186<>1444_0<>avik chaudhuri<>formal security analysis of basic network-attached storage<>ccs<>martin abadi<>
40654<>1449_1<>chuanyi ji<>a self-learning worm using importance scanning<>worm<>zesheng chen<>
6526<>1450_1<>artem chebotko:mustafa atay:shiyong lu:farshad fotouhi<>reconstructing xml subtrees from relational storage of xml documents<>icde<>dapeng liu<>
6529<>1452_0<>richard pon:maxim a. batalin:victor chen:aman kansal:mohammad h. rahimi:lisa shirachi:arun somasundra:yan yu:mark m. hansen:william j. kaiser:mani b. srivastava:gaurav s. sukhatme:deborah estrin<>coordinated static and mobile sensing for environmental monitoring<>dcoss<>duo liu<>
40648<>1453_4<>king ngi ngan<>joint texture-shape optimization for mpeg-4 multiple video objects<>tcsv<>zhenzhong chen<>
40610<>1454_4<>wensi xi:edward a. fox:weiguo fan:benyu zhang:jun yan:dong zhuang<>simfusion: measuring similarity using unified relationship matrix<>sigir<>zheng chen<>
40613<>1454_7<>benyu zhang:hua li:yi liu:lei ji:wensi xi:weiguo fan:wei-ying ma<>improving web search results using affinity graph<>sigir<>zheng chen<>
40621<>1454_15<>gui-rong xue:chenxi lin:qiang yang:wensi xi:hua-jun zeng:yong yu<>scalable collaborative filtering using cluster-based smoothing<>sigir<>zheng chen<>
40622<>1454_16<>tao qin:tie-yan liu:xu-dong zhang:wei-ying ma<>a study of relevance propagation for web search<>sigir<>zheng chen<>
40635<>1454_29<>jian-tao sun:dou shen:hua-jun zeng:qiang yang:yuchang lu<>web-page summarization using clickthrough data<>sigir<>zheng chen<>
40637<>1454_31<>jun yan:ning liu:benyu zhang:shuicheng yan:qiansheng cheng:weiguo fan:wei-ying ma<>ocfs: optimal orthogonal centroid feature selection for text categorization<>sigir<>zheng chen<>
40639<>1454_33<>gui-rong xue:qiang yang:hua-jun zeng:yong yu<>exploiting the hierarchical structure for link analysis<>sigir<>zheng chen<>
40651<>1455_0<>ying cai:wallapak tavanapong<>video management in peer-to-peer systems<>p2p<>zhan chen<>
8722<>1459_0<>nulo<>change management<>lisa<>gene kim<>
14485<>1460_2<>fred ma:calvin plett<>physical resource binding for a coarse-grain reconfigurable array using evolutionary algorithms<>tvlsi<>john p. knight<>
13136<>1465_15<>graham e. fagg:thara angskun:george bosilca:jelena pjesivac-grbovic<>scalable fault tolerant mpi: extending the recovery algorithm<>pvm<>jack dongarra<>
13151<>1465_30<>francine berman:henri casanova:andrew a. chien:keith d. cooper:holly dail:anshuman dasgupta:w. deng:l. johnsson:ken kennedy:charles koelbel:b. liu:xin liu:anirban mandal:gabriel marin:mark mazina:john m. mellor-crummey:celso l. mendes:alex olugbile:m. patel:daniel a. reed:zhiao shi:otto sievert:huaxia xia:asim yarkhan<>new grid scheduling and rescheduling methods in the grads project<>ijpp<>jack dongarra<>
13152<>1465_31<>zizhong chen:graham e. fagg:edgar gabriel:julien langou:thara angskun:george bosilca<>fault tolerant high performance computing by a coding approach<>ppopp<>jack dongarra<>
13157<>1465_36<>shirley moore:felix wolf:sameer shende:allen d. malony:bernd mohr<>a scalable approach to mpi application performance analysis<>pvm<>jack dongarra<>
13164<>1465_43<>stanimire tomov:julien langou:andrew canning:lin-wang wang<>comparison of nonlinear conjugate-gradient methods for computing the electronic properties of nanostructure architectures<>iccS<>jack dongarra<>
13169<>1465_48<>jelena pjesivac-grbovic:thara angskun:george bosilca:graham e. fagg:edgar gabriel<>performance analysis of mpi collective operations<>ipps<>jack dongarra<>
13171<>1465_50<>erich strohmaier:hans werner meuer:horst d. simon<>recent trends in the marketplace of high performance computing<>pc<>jack dongarra<>
13179<>1465_58<>zizhong chen<>numerically stable real number codes based on random matrices<>iccS<>jack dongarra<>
13184<>1465_63<>julien langou:george bosilca:graham e. fagg<>hash functions for datatype signatures in mpi<>pvm<>jack dongarra<>
13189<>1465_68<>nikhil bhatia:fengguang song:felix wolf:bernd mohr:shirley moore<>automatic experimental analysis of communication patterns in virtual topologies<>icpp<>jack dongarra<>
13214<>1465_93<>asim yarkhan<>biological sequence alignment on the computational grid using the grads framework<>fgcs<>jack dongarra<>
13261<>1465_140<>sathish s. vadhiyar<>self adaptivity in grid computing<>concurrency<>jack dongarra<>
13265<>1465_144<>victor eijkhout:erika fuentes:thomas eidson<>the component structure of a self-adapting numerical software system<>ijpp<>jack dongarra<>
20582<>1467_4<>rui cai:alan hanjalic<>unsupervised content discovery in composite audio<>mm<>lie lu<>
20585<>1467_7<>hongjiang zhang<>unsupervised speaker segmentation and tracking in real-time audio content analysis<>mms<>lie lu<>
20597<>1467_19<>muyuan wang:zhiwei li:wei-ying ma:naiyao zhang<>web object indexing using domain knowledge<>kdd<>lie lu<>
20601<>1468_3<>kentaro toyama:gregory d. hager<>a two level approach for scene recognition<>cvpr<>le lu<>
40563<>1470_3<>jack dongarra<>numerically stable real number codes based on random matrices<>iccS<>zizhong chen<>
40565<>1470_5<>graham e. fagg:edgar gabriel:julien langou:thara angskun:george bosilca:jack dongarra<>fault tolerant high performance computing by a coding approach<>ppopp<>zizhong chen<>
40584<>1473_6<>bin fu<>a quadratic lower bound for rocchio's similarity-based relevance feedback algorithm<>cocoon<>zhixiang chen<>
40592<>1473_14<>bin fu:yong tang:binhai zhu<>a ptas for a disc covering problem using width-bounded separators<>cocoon<>zhixiang chen<>
40603<>1473_25<>bin fu<>on the complexity of rocchio's similarity-based relevance feedback algorithm<>isaac<>zhixiang chen<>
19314<>1475_0<>jun cai:xuemin shen:jon w. mark:terence d. todd<>power allocation and scheduling for mac layer design in uwb networks<>qshine<>kuang-hao liu<>
19316<>1477_0<>weifeng su:zoltan safar<>full-rate full-diversity space-frequency codes with optimum coding advantage<>tit<>k. j. ray liu<>
19319<>1477_3<>masoud olfat:farrokh rashid-farrokhi<>power allocation for ofdm using adaptive beamforming over wireless networks<>tcom<>k. j. ray liu<>
19325<>1478_0<>yinglei song:ji-zhen zhao:chunmei liu:russell l. malmberg:liming cai<>rna structural homology search with a succinct stochastic grammar model<>jcst<>kan liu<>
19295<>1481_6<>simon tan<>enterprise infrastructure planning - modelling and simulation using the problem articulation method<>iceis<>kecheng liu<>
30211<>1485_6<>zhenghua fu:haiyun luo:petros zerfos:lixia zhang:mario gerla<>the impact of multihop wireless channel on tcp performance<>tmc<>songwu lu<>
30227<>1485_22<>hao yang:fan ye:yuan yuan:william a. arbaugh<>toward resilient security in wireless sensor networks<>mobihoc<>songwu lu<>
30263<>1488_0<>artem chebotko:yu deng:farshad fotouhi:anthony aristar<>an ontology-based multimedia annotator for the semantic web of language engineering<>ijswis<>shiyong lu<>
30273<>1488_10<>yezhou sun:mustafa atay:farshad fotouhi<>on the consistency of xml dtds<>dke<>shiyong lu<>
30286<>1488_23<>cheng-zhong xu<>"a formal framework for agent itinerary specification, security reasoning and logic analysis."<>icdcsw<>shiyong lu<>
30290<>1488_27<>artem chebotko:dapeng liu:mustafa atay:farshad fotouhi<>reconstructing xml subtrees from relational storage of xml documents<>icde<>shiyong lu<>
35715<>1497_0<>john r. birge<>quasi-monte carlo simulation in a libor market model<>wsc<>xuefeng jiang<>
12855<>1499_4<>yan zhang<>thermal-driven multilevel routing for 3-d ics<>aspdac<>jason cong<>
12860<>1499_9<>guoling han:zhiru zhang<>architecture and compilation for data bandwidth improvement in configurable embedded processors<>iccad<>jason cong<>
12876<>1499_25<>joseph r. shinnerl:min xie:tim kong:xin yuan<>large-scale circuit placement<>todaes<>jason cong<>
12908<>1499_57<>tony chan:kenton sze<>multilevel generalized force-directed method for circuit placement<>ispd<>jason cong<>
12916<>1499_65<>yiping fan:guoling han:yizhou lin:junjuan xu:zhiru zhang:xu cheng<>bitwidth-aware scheduling and binding in high-level synthesis<>aspdac<>jason cong<>
12950<>1499_99<>jie fang:min xie:yan zhang<>mars-a multilevel full-chip gridless routing system<>tcad<>jason cong<>
12958<>1499_107<>fei li:yizhou lin:lei he:deming chen<>power modeling and characteristics of field programmable gate arrays<>tcad<>jason cong<>
12967<>1499_116<>gang chen<>simultaneous timing-driven placement and duplication<>fpga<>jason cong<>
12969<>1499_118<>junjuan xu:xu cheng<>lower-bound estimation for multi-bitwidth scheduling<>iscas<>jason cong<>
35725<>1501_1<>vinh trong le:son-hong ngo:susumu horiguchi<>dynamic rwa based on the combination of mobile agents technique and genetic algorithm in wdm networks with sparse wavelength conversion<>ipps<>xiaohong jiang<>
35726<>1501_2<>janos tapolcai:pin-han ho:susumu horiguchi<>shared protection based on matrix decomposition in tropical semi-rings<>aina<>xiaohong jiang<>
35716<>1502_0<>dongyan xu:helen j. wang:eugene h. spafford<>virtual playgrounds for worm behavior investigation<>raid<>xuxian jiang<>
35722<>1502_6<>paul ruth:dongyan xu:sebastien goasguen<>virtual distributed environments in a shared infrastructure<>computer<>xuxian jiang<>
10305<>1503_3<>ilhyun lee:haklin kimm<>algorithm for reducing the complexity of switching time in real-time multitask environments<>cata<>haesun k. lee<>
10297<>1504_0<>jennifer l. welch<>randomized registers and iterative algorithms<>dc<>hyunyoung lee<>
10309<>1506_2<>chang-heng chang:li-ching hsieh:ta-yuan chen:hong-da chen:liaofu luo<>shannon information in complete genomes<>jbcb<>hoong-chien lee<>
10318<>1507_3<>weidong shi:mrinmoy ghosh:chenghuai lu:alexandra boldyreva<>high efficiency counter mode security architecture via prediction and precomputation<>isca<>hsien-hsin s. lee<>
10281<>1508_4<>sorin sav:noel e. o'connor:alan f. smeaton<>interactive object-based retrieval using relevance feedback<>acivs<>hyowon lee<>
10283<>1508_6<>cathal gurrin:gareth j. f. jones:neil o'hare:alan f. smeaton:noel murphy<>mobile access to personal digital photograph archives<>mhci<>hyowon lee<>
10289<>1508_12<>sorin sav:alan f. smeaton:noel e. o'connor<>using segmented objects in ostensive video shot retrieval<>amr<>hyowon lee<>
4868<>1514_0<>lester gilbert:yee-wai sim<>modelling the learning transaction<>icalt<>chu wang<>
7651<>1520_38<>carsten lund<>packet classification in large isps: design and evaluation of decision tree classifiers<>sigmetrics<>edith cohen<>
7664<>1520_51<>eran halperin:haim kaplan<>performance aspects of distributed caches using ttl-based consistency<>tcs<>edith cohen<>
4996<>1523_0<>song fu<>service migration in distributed virtual machines for adaptive grid computing<>icpp<>cheng-zhong xu<>
5002<>1523_6<>jianbin wei:xiaobo zhou<>robust processing rate allocation for proportional slowdown differentiation on internet servers<>tc<>cheng-zhong xu<>
5006<>1523_10<>jayashree ravi:weisong shi<>personalized email management at network edges<>internet<>cheng-zhong xu<>
5010<>1523_14<>xiliang zhong<>energy-aware modeling and scheduling of real-time tasks for dynamic voltage scaling<>rtss<>cheng-zhong xu<>
5012<>1523_16<>xiliang zhong:minghua xu:jianbin wei<>optimal time-variant resource allocation for internet servers with delay<>rtas<>cheng-zhong xu<>
35613<>1527_1<>xiangsheng chen:jiuyong li:grant daggard<>finding similar patterns in microarray data<>ausai<>xiaodi huang<>
35616<>1527_4<>peter eades:wei lai<>"a framework of filtering, clustering and dynamic layout graphs for visualization."<>acsc<>xiaodi huang<>
35623<>1529_0<>yan rui huang<>using contextual information to improve retrieval performance<>grc<>xiangji huang<>
35634<>1529_11<>yan rui huang:miao wen<>a dual index model for contextual information retrieval<>sigir<>xiangji huang<>
35639<>1529_16<>qingsong yao:aijun an<>a distance-based algorithm for clustering database user sessions<>ismis<>xiangji huang<>
35641<>1529_18<>qingsong yao:aijun an<>finding and analyzing database user sessions<>dasfaa<>xiangji huang<>
35643<>1529_20<>ying zou:aijun an<>evaluation and automatic selection of methods for handling missing data<>grc<>xiangji huang<>
18675<>1530_0<>limin xiang:mizuho iwaihara:haiyan xu:mukesh k. mohania<>time-decaying bloom filters for data streams with skewed distributions<>ride<>kai cheng<>
35646<>1531_1<>christian s. jensen:simonas saltenis<>the islands approach to nearest neighbor querying in spatial networks<>ssd<>xuegang huang<>
13424<>1536_2<>anna brunstrom<>evaluation of transport layer loss notification in wireless environments<>icn<>johan garcia<>
35649<>1537_0<>jing ma<>a sopc architecture of mimo sphere decoder for mobile communications<>ersa<>xin-ming huang<>
35650<>1537_1<>jing ma:peter m. athanas<>incremental design methodology for multimillion-gate fpgas<>jcsc<>xin-ming huang<>
35653<>1537_4<>jing ma<>a system-on-programmable chip approach for mimo sphere decoder<>fccm<>xin-ming huang<>
35655<>1537_6<>jing ma<>an application-specific routing protocol for meshed wireless sensor networks<>icwn<>xin-ming huang<>
35657<>1538_1<>jianer chen:iyad a. kanj:ge xia<>-hardness under linear fpt-reductions: structural properties and further applications<>cocoon<>xiuzhen huang<>
35661<>1538_5<>yinglei song:chunmei liu:russell l. malmberg:ying xu:liming cai<>efficient parameterized algorithm for biopolymer structure-sequence alignment<>wabi<>xiuzhen huang<>
35669<>1538_13<>jianer chen:benny chor:mike fellows:david w. juedes:iyad a. kanj:ge xia<>tight lower bounds for certain parameterized np-hard problems<>iandc<>xiuzhen huang<>
35674<>1540_1<>allan c. madoc<>investigating the transport communicating rates of wireless networks over fading channels<>kes<>xu huang<>
35676<>1540_3<>allan c. madoc:andrew d. cheetham<>image multi-noise removal by wavelet-based bayesian estimator<>iscas<>xu huang<>
28861<>1544_5<>mahesh k. marina<>a topology control approach for utilizing multiple channels in multi-radio wireless mesh networks<>broadnets<>samir ranjan das<>
28868<>1544_12<>shweta jain<>exploiting path diversity in the link layer in wireless ad hoc networks<>wowmom<>samir r. das<>
28873<>1544_17<>vishnu navda:anand kashyap<>design and evaluation of imesh: an infrastructure-mode wireless mesh network<>wowmom<>samir r. das<>
28875<>1544_19<>himanshu gupta:vishnu navda:vishal chowdhary<>efficient gathering of correlated data in sensor networks<>mobihoc<>samir r. das<>
28887<>1546_1<>himabindu pucha:y. charlie hu<>performance comparison of scalable location services for geographic ad hoc routing<>infocom<>saumitra m. das<>
28885<>1547_0<>angeliki alexiou:dan avidor:peter bosch:piyush gupta:bertrand m. hochwald:thierry e. klein:jonathan ling:angel lozano:thomas l. marzetta:sayandev mukherjee:sape j. mullender:constantinos b. papadias:reinaldo a. valenzuela:harish viswanathan<>"duplexing, resource allocation and inter-cell coordination: design recommendations for next generation wireless systems."<>wicomm<>suman das<>
40557<>1550_1<>baochun li<>overlay networks with linear capacity constraints<>iwqos<>ying zhu<>
40559<>1552_0<>jingfang xu:xing li<>an article language model for bbs search<>icwe<>yangbo zhu<>
18928<>1553_1<>joan boyar:leah epstein:lene m. favrholdt:jens s. kohrt:morten monrad pedersen:sanne wohlk<>the maximum resource bin packing problem<>fct<>kim s. larsen<>
18932<>1553_5<>lars jacobsen<>exponentially decreasing number of operations in balanced trees<>acta<>kim s. larsen<>
18948<>1553_21<>jens s. kohrt<>on-line seat reservations via off-line seating arrangements<>ijfcs<>kim s. larsen<>
18966<>1553_39<>joan boyar:lene m. favrholdt<>the relative worst order ratio applied to paging<>soda<>kim s. larsen<>
19012<>1554_44<>gerd behrmann:jacob illum rasmussen<>optimal scheduling using priced timed automata<>sigmetrics<>kim guldstrand larsen<>
19024<>1554_56<>patricia bouyer:franck cassez:emmanuel fleury<>synthesis of optimal strategies using hytech<>entcs<>kim guldstrand larsen<>
12770<>1561_0<>seungwon lee:seongje cho:yookun cho<>batch verification with dsa-type digital signatures for ubiquitous computing<>cis<>jongmoo choi<>
19090<>1563_9<>wing-ho shum:man leung wong<>co-evolutionary rule-chaining genetic programming<>ideal<>kwong-sak leung<>
19105<>1563_24<>wing-ho shum:man leung wong<>learning functional dependency networks based on genetic programming<>icdm<>kwong-sak leung<>
19122<>1563_41<>huidong jin:man leung wong<>scalable model-based clustering for large databases based on data summarization<>pami<>kwong-sak leung<>
19123<>1563_42<>huidong jin:man leung wong:zong-ben xu<>scalable model-based cluster analysis using clustering features<>pr<>kwong-sak leung<>
12751<>1565_0<>sun kim:jiong yang<>gene teams with relaxed proximity constraint<>csb<>jeong-hyeon choi<>
12752<>1565_1<>hwan-gue cho:sun kim<>game: a simple and efficient whole genome alignment method using maximal exact match filtering<>candc<>jeong-hyeon choi<>
12759<>1565_8<>kwangmin choi:amit saple:zhiping wang:jason lee:sun kim<>platcom: current status and plan for the next stages<>dils<>jeong-hyeon choi<>
12761<>1565_10<>kwangmin choi:yu ma:sun kim<>platcom: a platform for computational comparative genomics<>bioinformatics<>jeong-hyeon choi<>
28206<>1573_0<>sang yup lee:ig-jae kim:myo-taeg lim:hyoung-gon kim<>intelligent 3d video avatar for immersive telecommunication<>ausai<>sang chul ahn<>
17984<>1574_0<>chang su:yang gao:bin luo<>an efficient adaptive focused crawler based on ontology learning<>his<>jianmei yang<>
17968<>1582_0<>lei yang:ningsong peng:jianguo ling<>weighted information entropy: a method for estimating the complex degree of infrared images' backgrounds<>iciar<>jie yang<>
17971<>1584_1<>d. manivannan<>an efficient fault-tolerant distributed channel allocation algorithm for cellular networks<>tmc<>jianchang yang<>
17973<>1584_3<>qiangfeng jiang:d. manivannan:mukesh singhal<>a fault-tolerant distributed channel allocation scheme for cellular networks<>tc<>jianchang yang<>
32527<>1588_1<>m. carmen hernando:merce mora:ignacio m. pelayo:carlos seara<>"on the steiner, geodetic and hull numbers of graphs."<>dm<>tao jiang<>
32545<>1593_1<>zhongchao yu:chuk-yang seng:xue wu:william a. arbaugh<>robust routing in malicious environment for ad hoc networks<>ispec<>tao jiang<>
10730<>1595_3<>hongga li:bo huang:zhiyong huang<>two ellipse-based pruning methods for group nearest neighbor queries<>gis<>hua lu<>
10710<>1596_14<>yi-ting chiang:ching-chi lin<>orderly spanning trees with applications<>siamcomp<>hsueh-i lu<>
10723<>1596_27<>yen hung chen:chuan yi tang<>disjoint segments with maximum density<>iccS<>hsueh-i lu<>
10777<>1597_4<>lei m. li<>explore biological pathways from noisy array data by directed acyclic boolean networks<>jcb<>henry horng-shing lu<>
10771<>1599_0<>alan l. yuille<>ideal observers for detecting motion: correspondence noise<>nips<>hongjing lu<>
10760<>1600_1<>yun mao:bjorn knutsson:jonathan m. smith<>dharma: distributed home agent for robust mobile access<>infocom<>honghui lu<>
10768<>1600_9<>jin chen:baohua wu:margaret delap:bjorn knutsson:cristiana amza<>locality aware dynamic load management for massively multiplayer games<>ppopp<>honghui lu<>
10746<>1602_2<>sartaj sahni<>conflict detection and resolution in two-dimensional prefix router tables<>ton<>haibin lu<>
10751<>1602_7<>sartaj sahni<>a b-tree dynamic router-table design<>tc<>haibin lu<>
10753<>1602_9<>kun suk kim:sartaj k. sahni<>prefix and interval-partitioned dynamic ip router-tables<>tc<>haibin lu<>
10758<>1602_14<>nulo<>a novel high-order tree for secure multicast key management<>tc<>haibin lu<>
10742<>1603_4<>w. k. chan:t. y. chen<>a metamorphic approach to integration testing of context-sensitive middleware-based applications<>qsic<>heng lu<>
37347<>1605_0<>jeff w. sanders<>the weakest specifunction<>acta<>yifeng chen<>
37348<>1605_1<>jianguo zhou<>generating c code from logs specifications<>ictac<>yifeng chen<>
37371<>1606_0<>vidyasagar nookala:david j. lilja:sachin s. sapatnekar<>microarchitecture-aware floorplanning using a statistical design of experiments approach<>dac<>ying chen<>
37373<>1606_2<>resit sendag:david j. lilja<>the impact of incorrectly speculated memory operations in a multithreaded architecture<>tpds<>ying chen<>
37375<>1606_4<>dennis abts:david j. lilja<>efficiently generating test vectors with state pruning<>aspdac<>ying chen<>
37377<>1606_6<>karthik ranganathan:vasudev v. pai:david j. lilja:kia bazargan<>a novel memory structure for embedded systems: flexible sequential and random access memory<>jcst<>ying chen<>
37366<>1607_6<>kevin l. moore<>relay feedback tuning of robust pid controllers with iso-damping property<>tsmc<>yangquan chen<>
37434<>1609_1<>yao-jung chan:cheung-wo she<>enabling location-based services in wireless lan hotspots<>ijnm<>yen-cheng chen<>
13796<>1610_0<>xifeng yan:xianghong jasmine zhou<>mining closed relational graphs with connectivity constraints<>kdd<>jiawei han<>
13797<>1610_1<>xifeng yan:philip s. yu<>substructure similarity search in graph databases<>sigmod<>jiawei han<>
13798<>1610_2<>dong xin:xifeng yan:hong cheng<>mining compressed frequent-pattern sets<>vldb<>jiawei han<>
13799<>1610_3<>haiyan hu:xifeng yan:yu huang 0003:xianghong jasmine zhou<>mining coherent dense subgraphs across massive biological networks for functional discovery<>ismb<>jiawei han<>
13800<>1610_4<>xifeng yan:xianghong jasmine zhou<>mining closed relational graphs with connectivity constraints<>icde<>jiawei han<>
13801<>1610_5<>xifeng yan:philip s. yu<>graph indexing based on discriminative frequent structure analysis<>tods<>jiawei han<>
13805<>1612_0<>bir bhanu<>performance prediction for individual recognition by gait<>prl<>ju han<>
37385<>1615_0<>chen wang<>improving nearest neighbor classification with simulated gravitational collapse<>icnc<>yan qiu chen<>
37391<>1615_6<>hao du<>pattern classification using rectified nearest feature line segment<>fskd<>yan qiu chen<>
37392<>1615_7<>yun wen chen<>an evolutionary system and its application to automatic image segmentation<>icnc<>yan qiu chen<>
37394<>1615_9<>bin wang<>a genetic algorithm with chromosome-repairing technique for polygonal approximation of digital curves<>icnc<>yan qiu chen<>
37384<>1616_5<>bin zhang<>enhancing uml conceptual modeling through the use of virtual reality<>hicss<>ye-sho chen<>
37426<>1617_5<>hongcheng wang:tong fang:jason tyan<>mutual information regularized bayesian framework for multiple image restoration<>iccv<>yunqiang chen<>
37404<>1618_0<>chih-wei hsu<>subgoal ordering and granularity control for incremental planning<>ictai<>yixin chen<>
37416<>1618_12<>benjamin w. wah<>solving large-scale nonlinear programming problems by constraint partitioning<>cp<>yixin chen<>
13742<>1619_0<>zheng li:yan jin<>pattern-based specification and validation of web services interaction properties<>icsoc<>jun han<>
13744<>1619_2<>khaled m. khan<>deriving systems level security properties of component based composite systems<>aswec<>jun han<>
13749<>1619_7<>yan jin<>consistency and interoperability checking for component interaction rules<>apsec<>jun han<>
13751<>1619_9<>antony tang:muhammad ali babar:ian gorton<>a survey of the use and documentation of architecture design rationale<>wicsa<>jun han<>
13752<>1619_10<>alan w. colman<>coordination systems in role-based adaptive software<>coordination<>jun han<>
13757<>1619_15<>alan w. colman<>operational management contracts for adaptive software organisation<>aswec<>jun han<>
13758<>1619_16<>yan jin<>specifying interaction constraints of software components for better understandability and interoperability<>iccbss<>jun han<>
13765<>1619_23<>antony tang:yan jin:ann e. nicholson<>predicting change impact in architecture design with bayesian belief networks<>wicsa<>jun han<>
13776<>1619_34<>yan jin<>runtime validation of behavioural contracts for component software<>qsic<>jun han<>
13786<>1622_0<>yunhao liu:li xiao:renyi xiao:lionel m. ni<>a mutual anonymous peer-to-peer protocol design<>ipps<>jinsong han<>
13789<>1622_3<>yanmin zhu:yunhao liu:lionel m. ni:chunming hu:jinpeng huai<>trugrid: a self-sustaining trustworthy grid<>icdcsw<>jinsong han<>
13790<>1622_4<>yanmin zhu:yunhao liu:jianfeng cai:lei hu<>provide privacy for mobile p2p systems<>icdcsw<>jinsong han<>
13793<>1622_7<>yunhao liu:li lu:lei hu:abhishek p. patil<>a random walk based anonymous peer-to-peer protocol design<>iccnmc<>jinsong han<>
30537<>1627_36<>graham cormode<>substring compression problems<>soda<>s. muthukrishnan<>
30545<>1627_44<>torsten suel<>approximation algorithms for array partitioning problems<>jal<>s. muthukrishnan<>
30561<>1627_60<>a. robert calderbank:anna c. gilbert:kirill levchenko:martin strauss<>improved range-summable random variable construction algorithms<>soda<>s. muthukrishnan<>
30569<>1627_68<>graham cormode<>summarizing and mining skewed data streams<>sdm<>s. muthukrishnan<>
30578<>1627_77<>s. chen:suhas n. diggavi:s. dusad<>efficient string matching algorithms for combinatorial universal denoising<>dcc<>s. muthukrishnan<>
30582<>1627_81<>luca becchetti:stefano leonardi:alberto marchetti-spaccamela:andrea vitaletti:suhas n. diggavi:thyagarajan nandagopal<>parallel scheduling problems in next generation wireless networks<>networks<>s. muthukrishnan<>
30588<>1627_87<>graham cormode:flip korn:divesh srivastava<>effective computation of biased quantiles over data streams<>icde<>s. muthukrishnan<>
30599<>1627_98<>theodore johnson:irina rozenbaum<>sampling algorithms in a stream operator<>sigmod<>s. muthukrishnan<>
30604<>1627_103<>nulo<>subquadratic algorithms for workload-aware haar wavelet synopses<>fsttcs<>s. muthukrishnan<>
30605<>1627_104<>graham cormode<>space efficient mining of multigraph streams<>pods<>s. muthukrishnan<>
30610<>1627_109<>martin strauss:x. zheng<>workload-optimal histograms on streams<>esa<>s. muthukrishnan<>
30613<>1627_112<>anna c. gilbert:yannis kotidis:martin strauss<>domain-driven data synopses for dynamic quantiles<>tkde<>s. muthukrishnan<>
30683<>1630_0<>young-joo kim:mi-young park:yong-kee jun<>a practical tool for detecting races in openmp programs<>pact<>so-hee park<>
23777<>1635_0<>carlos bento:joao peixoto<>a case-based approach for indoor location<>iccbr<>marco veloso<>
23738<>1638_2<>maayan roth:reid g. simmons<>reasoning about joint beliefs for execution-time communication decisions<>atal<>manuela m. veloso<>
20638<>1639_0<>xi yang:byrav ramamurthy<>shared risk link group (srlg)-diverse path provisioning under hybrid service level agreements in wavelength-routed optical mesh networks<>ton<>lu shen<>
20636<>1640_2<>chokchai leangsuksun:tong liu:stephen l. scott<>achieving high availability and performance computing with an ha-oscar cluster<>fgcs<>lixin shen<>
37782<>1646_4<>jing deng:wendi rabiner heinzelman:pramod k. varshney<>scheduling sleeping nodes in high density cluster-based sensor networks<>monet<>yunghsiang s. han<>
37785<>1646_7<>jing deng<>using mds codes for the key establishment of wireless sensor networks<>msn<>yunghsiang s. han<>
37788<>1646_10<>hung-ta pai:jing-tian sung<>a simple two-dimensional coded detection scheme in wireless sensor networks<>icpads<>yunghsiang s. han<>
37792<>1646_14<>jing deng:wendi beth heinzelman:pramod k. varshney<>balanced-energy sleep scheduling scheme for high-density cluster-based sensor networks<>comcom<>yunghsiang s. han<>
16091<>1647_3<>jaesoo lee:seunghyun han:seongsoo hong<>extending software communications architecture for qos support in sdr signal processing<>rtcsa<>jiyong park<>
37795<>1648_0<>derick wood<>the generalization of generalized automata: expression automata<>ijfcs<>yo-sub han<>
37797<>1648_2<>yajun wang:derick wood<>prefix-free regular-expression matching<>cpm<>yo-sub han<>
37802<>1648_7<>derick wood<>shorter regular expressions from finite-state automata<>wia<>yo-sub han<>
37803<>1648_8<>derick wood<>outfix-free regular languages and prime outfix-free decomposition<>ictac<>yo-sub han<>
37806<>1648_11<>derick wood<>a new linearizing restriction in the pattern matching problem<>fct<>yo-sub han<>
16063<>1651_0<>bo gyeong kang:sangwoo park<>cryptanalysis of some group-oriented proxy signature schemes<>wisa<>je hong park<>
29060<>1655_1<>christoph buchheim<>crossing minimization for symmetries<>mst<>seok-hee hong<>
29072<>1657_0<>chulbum ahn:yunmook nah:lynn choi<>searching color images by emotional concepts<>human<>sungyong hong<>
20617<>1658_3<>heng huang:rong zhang:fillia makedon:bruce hettleman:justin d. pearlman<>surface alignment of 3d spherical harmonic models: application to cardiac mri analysis<>miccai<>li shen<>
20626<>1658_12<>heng huang:fillia makedon:sheng zhang:mark greenberg:ling gao:justin d. pearlman<>a clustering-based approach for prediction of cardiac resynchronization therapy<>sac<>li shen<>
29069<>1660_3<>peter eades<>"drawing planar graphs symmetrically, ii: biconnected planar graphs."<>algorithmica<>seok-hee hong<>
10116<>1665_9<>paolo favaro:roberto cipolla<>visual tracking in the presence of motion blur<>cvpr<>hailin jin<>
28638<>1671_1<>xia hong:chris j. harris<>orthogonal forward selection for constructing the radial basis function network with tunable nodes<>icic<>sheng chen<>
28639<>1671_2<>xunxian wang:chris j. harris<>a search algorithm for global optimisation<>icnc<>sheng chen<>
28621<>1673_2<>wenyu gao:jianxin wang:jianer chen<>pfed: a prediction-based fair active queue management algorithm<>icpp<>songqiao chen<>
28647<>1677_2<>george d. magoulas:dionisios dimakopoulos<>a flexible interface design for web directories to accommodate different cognitive styles<>jasis<>sherry y. chen<>
25715<>1678_7<>patrick mackey:ken perrine:james eagan:harlan foote:jim thomas<>dynamic visualization of graphs with extended labels<>infovis<>pak chung wong<>
12253<>1687_3<>daniel p. spooner:stephen a. jarvis:ligang he:graham r. nudd<>performance-aware workflow management for grid computing<>cj<>junwei cao<>
12256<>1687_6<>daniel p. spooner:stephen a. jarvis:graham r. nudd<>grid load balancing using intelligent agents<>fgcs<>junwei cao<>
12266<>1688_0<>ming lin:janna m. crews:judee k. burgoon:jay f. nunamaker jr.<>virtual interaction for effective e-learning<>icis<>jinwei cao<>
6678<>1691_12<>janos sztipanovits:gautam biswas:ken frampton:aniruddha s. gokhale:larry howard:gabor karsai:tak-john koo:xenofon koutsoukos<>introducing embedded software and systems education and advanced learning technology in an engineering curriculum<>tecs<>douglas c. schmidt<>
6679<>1691_13<>nulo<>model driven development for distributed real-time and embedded systems<>uml<>douglas c. schmidt<>
6690<>1691_24<>arvind s. krishna:emre turkay:aniruddha s. gokhale<>model-driven techniques for evaluating the qos of middleware configurations for dre systems<>rtas<>douglas c. schmidt<>
6694<>1691_28<>krishnakumar balasubramanian:jaiganesh balasubramanian:jeff parsons:aniruddha s. gokhale<>a platform-independent component modeling language for distributed real-time and embedded systems<>rtas<>douglas c. schmidt<>
6737<>1691_71<>jules white:aniruddha s. gokhale<>the j3 process for building autonomic enterprise java bean systems<>icac<>douglas c. schmidt<>
36595<>1695_0<>thomas s. huang<>face recognition with mrc-boosting<>iccv<>xun xu<>
18735<>1703_0<>hsiang-cheh huang:kang k. yen:yu-hsiu huang:jeng-shyang pan<>improved image coding with classified vq and side-match vq<>kes<>kuang-chih huang<>
18736<>1704_0<>nulo<>"supplementary proof for ""exact and approximate construction of digital phase modulations by superposition of amp"" by p. a. laurent."<>tcom<>kaibin huang<>
33673<>1707_20<>ling zhuo<>design tradeoffs for blas operations on reconfigurable hardware<>icpp<>viktor k. prasanna<>
33688<>1707_35<>jingzhao ou<>matlab/simulink based hardware/software co-simulation for designing using fpga configured soft processors<>ipps<>viktor k. prasanna<>
33699<>1707_46<>zachary k. baker<>efficient hardware data mining with the apriori algorithm on fpgas<>fccm<>viktor k. prasanna<>
33701<>1707_48<>jingzhao ou<>coma: a cooperative management scheme for energy efficient implementation of real-time operating systems on fpga based soft processors<>fccm<>viktor k. prasanna<>
33708<>1707_55<>mitali singh<>supporting topographic queries in a class of networked sensor systems<>percom<>viktor k. prasanna<>
33711<>1707_58<>jingzhao ou<>arithmetic-level instruction based energy estimation for fpga based soft processors<>jolpe<>viktor k. prasanna<>
33721<>1707_68<>cong zhang:abdollah orangi:will da sie:aditya kwatra<>modeling methodology for application development in petroleum industry<>iri<>viktor k. prasanna<>
33723<>1707_70<>ling zhuo:gerald r. morris<>designing scalable fpga-based reduction circuits using pipelined floating-point cores<>ipps<>viktor k. prasanna<>
33725<>1707_72<>yang yu<>energy-balanced task allocation for collaborative processing in wireless sensor networks<>monet<>viktor k. prasanna<>
33728<>1707_75<>zachary k. baker<>high-throughput linked-pattern matching for intrusion detection systems<>ancs<>viktor k. prasanna<>
33729<>1707_76<>ling zhuo<>sparse matrix-vector multiplication on fpgas<>fpga<>viktor k. prasanna<>
33730<>1707_77<>ling zhuo<>high performance linear algebra operations on reconfigurable systems<>sc<>viktor k. prasanna<>
33732<>1707_79<>amol bakshi:animesh pathak<>system-level support for macroprogramming of networked sensing applications<>csreaPSC<>viktor k. prasanna<>
33737<>1707_84<>gerald r. morris:ling zhuo<>high-performance fpga-based general reduction methods<>fccm<>viktor k. prasanna<>
23834<>1717_2<>huidong jin:kwong-sak leung:zong-ben xu<>scalable model-based cluster analysis using clustering features<>pr<>man leung wong<>
23836<>1717_4<>wing-ho shum:kwong-sak leung<>co-evolutionary rule-chaining genetic programming<>ideal<>man leung wong<>
23839<>1717_7<>wing-ho shum:kwong-sak leung<>learning functional dependency networks based on genetic programming<>icdm<>man leung wong<>
23846<>1717_14<>tien-tsin wong:ka-ling fok<>parallel evolutionary algorithms on graphics processing unit<>cec<>man leung wong<>
23848<>1717_16<>tuen mun<>evolving recursive programs by using adaptive grammar based genetic programming<>gpem<>man wong<>
30629<>1718_0<>shankar sastry<>tracking on a graph<>ipsn<>songhwai oh<>
30628<>1719_1<>youngho lee:youngmin park:beom-chan lee:jeung-chul park:yoo oh:seokhee lee:han oh:jeha ryu:kwan-heng lee:hong kim:yong-gu lee:jongwon kim:yo-sung ho:woontack woo<>responsive multimedia system for virtual storytelling<>pcm<>sejin oh<>
30626<>1720_0<>james m. rehg:tucker r. balch:frank dellaert<>data-driven mcmc for learning and inference in switching linear dynamic systems<>aaai<>sang min oh<>
30625<>1721_0<>heejin lee<>how technology shapes the actor-network of convergence services: a case of mobile banking<>icis<>sangjo oh<>
37949<>1728_5<>jun xie:hung-tat tsui<>segmentation of kidney from ultrasound images based on texture and shape priors<>tmi<>yifeng jiang<>
30701<>1734_0<>james v. s. watson:marty humphrey<>toward gt3 and ogsi.net interoperability: gram support on ogsi.net<>iccS<>sang-min park<>
30704<>1734_3<>marty a. humphrey:glenn s. wasson:yuliyan kiryakov:david del vecchio:norm beekwilder<>alternative software stacks for ogsa-based grids<>sc<>sang-min park<>
30716<>1741_0<>dong wan shin:byeong uk park:woo chul kim:man-suk oh<>bayesian test for asymmetry and nonstationarity in mtar model with possibly incomplete data<>csda<>soo jung park<>
29822<>1746_1<>girish gopalakrishnan:ajay narayanan:rakesh mullick<>a fast piece-wise deformable method for multi-modality image registration<>aipr<>s. v. bharath kumar<>
29820<>1748_2<>zhidong yan:c. c. jay kuo<>mesh segmentation schemes for error resilient coding of 3-d graphic models<>tcsv<>sunil kumar<>
29810<>1750_1<>silvia rossi:philip r. cohen<>distributive and collective readings in group protocols<>ijcai<>sanjeev kumar<>
29794<>1754_0<>carsten rother:vladimir kolmogorov:andrew blake<>digital tapestry<>cvpr<>sanjiv kumar<>
29795<>1754_1<>martial hebert<>a hierarchical field framework for unified context-based classification<>iccv<>sanjiv kumar<>
29800<>1754_6<>jonas august:martial hebert<>exploiting inference for approximate parameter learning in discriminative fields: an empirical study<>emmcvpr<>sanjiv kumar<>
30700<>1758_0<>je hong park:bo gyeong kang<>cryptanalysis of some group-oriented proxy signature schemes<>wisa<>sangwoo park<>
14528<>1760_0<>byung-gook lee:jaechil yoo<>an efficient scattered data approximation using multilevel b-splines based on quasi-interpolants<>3dim<>joon-jae lee<>
14529<>1760_1<>byung-gook lee:ki-ryoung kwon<>quasi-interpolants based multilevel b-spline surface reconstruction from scattered data<>iccsa<>joon-jae lee<>
14530<>1760_2<>soon-jeong ahn:jaechil yoo:byung-gook lee<>3d surface reconstruction from scattered data using moving least square method<>iciap<>joon-jae lee<>
14527<>1761_7<>jin ho kwak:moo young sohn<>bartholdi zeta functions of graph bundles having regular fibers<>ejc<>jaeun lee<>
14533<>1763_2<>ravi mazumdar:ness b. shroff<>downlink power allocation for multi-class wireless systems<>ton<>jang-won lee<>
14534<>1763_3<>ravi mazumdar:ness b. shroff<>non-convex optimization and rate control for multi-class services in the internet<>ton<>jang-won lee<>
14517<>1766_0<>yunmook nah:seungyong park:ho lee:sangwoo kim:moon-hae kim:ki-joon han<>tmo-structured distributed location information system prototype<>isorc<>joonwoo lee<>
14518<>1766_1<>yunmook nah:woon joo lee:ho lee:moon-hae kim:ki-joon han<>distributed scalable location data management system based on the galis architecture<>words<>joonwoo lee<>
40515<>1770_1<>zhushuo zhang:xuanjing huang:lide wu<>answering definition questions using web knowledge bases<>ijcnlp<>yaqian zhou<>
40512<>1772_0<>xing xie:chuang wang:yuchang gong:wei-ying ma<>hybrid index structures for location-based web search<>cikm<>yinghua zhou<>
40507<>1773_0<>pin zhou:feng qin:wei liu:josep torrellas<>efficient and flexible architectural support for dynamic monitoring<>taco<>yuanyuan zhou<>
40504<>1774_1<>w. bruce croft<>document quality models for web ad hoc retrieval<>cikm<>yun zhou<>
16387<>1778_0<>andrew parker:john riverson<>a new approach for a windows-based watershed modeling system based on a database-supporting architecture<>envsoft<>jian shen<>
36583<>1779_0<>sampath kameshwaran:lyes benyoucef<>discount auctions for procuring heterogeneous items<>ACMicec<>xiaolan xie<>
36584<>1779_1<>sampath kameshwaran:lyes benyoucef<>design of progressive auctions for procurement based on lagrangian relaxation<>wecwis<>xiaolan xie<>
36588<>1780_3<>justin werfel:h. sebastian seung<>learning curves for stochastic gradient descent in linear feedforward networks<>neco<>xiaohui xie<>
41065<>1783_1<>casar sanchez:henny b. sipma:matteo slanina<>final semantics for event-pattern reactive programs<>calco<>zohar manna<>
41066<>1783_2<>ting zhang:henny b. sipma<>decision procedures for queues with integer constraints<>fsttcs<>zohar manna<>
41069<>1783_5<>aaron r. bradley:henny b. sipma<>termination analysis of integer linear loops<>concur<>zohar manna<>
41083<>1783_19<>sriram sankaranarayanan:henny b. sipma<>scalable analysis of linear systems using mathematical programming<>vmcai<>zohar manna<>
41084<>1783_20<>casar sanchez:matteo slanina:henny b. sipma<>expressive completeness of an event-pattern reactive programming language<>forte<>zohar manna<>
41098<>1783_34<>ben d'angelo:sriram sankaranarayanan:casar sanchez:will robinson:bernd finkbeiner:henny b. sipma:sandeep mehrotra<>lola: runtime monitoring of synchronous systems<>time<>zohar manna<>
41100<>1783_36<>aaron r. bradley:henny b. sipma<>the polyranking principle<>icalp<>zohar manna<>
41109<>1783_45<>aaron r. bradley:henny b. sipma<>linear ranking with reachability<>cav<>zohar manna<>
41116<>1783_52<>casar sanchez:henny b. sipma:venkita subramonian:christopher d. gill<>thread allocation protocols for distributed real-time and embedded systems<>forte<>zohar manna<>
41118<>1783_54<>ting zhang:henny b. sipma<>the decidability of the first-order theory of knuth-bendix order<>cade<>zohar manna<>
41132<>1783_68<>aaron r. bradley:henny b. sipma<>termination of polynomial programs<>vmcai<>zohar manna<>
3919<>1784_7<>yu qing chen<>relative difference sets fixed by inversion and cayley graphs<>jct<>cai heng li<>
3904<>1785_0<>jiaheng lu:tok wang ling:tian yu:wei ni<>efficient processing of ordered xml twig pattern<>dexa<>changqing li<>
3907<>1785_3<>tok wang ling<>qed: a novel quaternary encoding to completely avoid re-labeling in xml updates<>cikm<>changqing li<>
3908<>1785_4<>tok wang ling<>an improved prefix labeling scheme: a binary string approach for dynamic ordered xml<>dasfaa<>changqing li<>
3910<>1785_6<>tok wang ling<>from xml to semantic web<>dasfaa<>changqing li<>
3911<>1785_7<>tok wang ling:jiaheng lu:tian yu<>on reducing redundancy and improving efficiency of xml labeling schemes<>cikm<>changqing li<>
3941<>1786_3<>mohamed a. soliman:kevin chen-chuan chang:ihab f. ilyas<>ranksql: supporting ranking queries in relational database management systems<>vldb<>chengkai li<>
3943<>1786_5<>kevin chen-chuan chang:ihab f. ilyas:sumin song<>ranksql: query algebra and optimization for relational top-k queries<>sigmod<>chengkai li<>
3974<>1788_1<>nulo<>guided cluster discovery with markov model<>apin<>c. h. li<>
3948<>1789_4<>foto n. afrati:paraskevas v. lekeas<>answering aggregation queries on hierarchical web sites using adaptive sampling<>cikm<>chen li<>
3957<>1789_13<>liang jin<>selectivity estimation for fuzzy string predicates in large data sets<>vldb<>chen li<>
3968<>1789_24<>liang jin:nick koudas:anthony k. h. tung<>indexing mixed types for approximate retrieval<>vldb<>chen li<>
3970<>1789_26<>xiaochun yang:ge yu:lei shi<>xguard: a system for publishing xml documents without information leakage in the presence of data inference<>icde<>chen li<>
3991<>1790_7<>nulo<>unsupervised image segmentation using gibbs sampler within a multiresolution framework<>euroimsa<>chang-tsun li<>
3982<>1791_1<>zhe dang:oscar h. ibarra:hsu-chun yen<>signaling p systems and verification problems<>icalp<>cheng li<>
8876<>1794_0<>b. miller:konstantin avrachenkov:k. stepanyan<>flow control as stochastic optimal control problem with incomplete information<>infocom<>gregory miller<>
8808<>1796_2<>steven e. pav:noel walkington<>when and why delaunay refinement algorithms work<>ijcga<>gary l. miller<>
8859<>1796_53<>bruce m. maggs:ojas parekh:r. ravi:shan leung maverick woo<>finding effective support-tree preconditioners<>spaa<>gary l. miller<>
8868<>1796_62<>david tolliver:robert t. collins<>corrected laplacians: closer cuts and segmentation with shape priors<>cvpr<>gary l. miller<>
4168<>1798_2<>graham pervan:donald mcdermid<>is/it investment evaluation and benefits realization issues in australia<>acj<>chad lin<>
36582<>1803_0<>sampath kameshwaran:lyes benyoucef<>winner determination in discount auctions<>wine<>xiaolan xie<>
36577<>1805_2<>majid mirmehdi<>localising surface defects in random colour textures using multiscale texem analysis in image eigenchannels<>icip<>xianghua xie<>
36581<>1805_6<>majid mirmehdi<>texture exemplars for defect detection on random textures<>icapr<>xianghua xie<>
4155<>1808_0<>scott a. brandt<>improving soft real-time performance through better slack reclaiming<>rtss<>caixue lin<>
36562<>1809_7<>hao liu:simon goumaz:wei-ying ma<>learning user interest for image browsing on small-form-factor devices<>chi<>xing xie<>
36563<>1809_8<>xin fan:zhiwei li:mingjing li:wei-ying ma<>photo-to-search: using multimodal queries to search the web from mobile devices<>mir<>xing xie<>
36564<>1809_9<>yu chen:wei-ying ma:hongjiang zhang<>adapting web pages for small-screen devices<>internet<>xing xie<>
36565<>1809_10<>lee wang:chuang wang:josh forman:yansheng lu:wei-ying ma:ying li<>detecting dominant locations from search queries<>sigir<>xing xie<>
36568<>1809_13<>chuang wang:lee wang:yansheng lu:wei-ying ma<>detecting geographic locations from web resources<>gir<>xing xie<>
36569<>1809_14<>chong wang 0002:li-qun chen:wei-ying ma<>an adaptive web page layout structure for small devices<>mms<>xing xie<>
36570<>1809_15<>chuang wang:lee wang:yansheng lu:wei-ying ma<>web resource geographic location classification and detection<>www<>xing xie<>
36572<>1809_17<>yinghua zhou:chuang wang:yuchang gong:wei-ying ma<>hybrid index structures for location-based web search<>cikm<>xing xie<>
4172<>1813_1<>hsu-chun yen<>on balloon drawings of rooted trees<>gd<>chun-cheng lin<>
4173<>1813_2<>hsu-chun yen<>a new force-directed graph drawing method based on edge-edge repulsion<>iv<>chun-cheng lin<>
28888<>1823_0<>sasanka roy:subhasis bhattacharjee:subhas c. nandy<>a fast algorithm for point labeling problem<>cccg<>sandip das<>
28889<>1827_0<>wook choi<>a novel framework for energy - conserving data gathering in wireless sensor networks<>infocom<>sajal k. das<>
37506<>1828_0<>junyi xie:jun yang<>on joining and caching stochastic streams<>sigmod<>yuguo chen<>
37495<>1831_0<>t. c. edwin cheng:c. t. ng:erfang shan<>a note on domination and minus domination numbers in cubic graphs<>appml<>yaojun chen<>
37483<>1837_1<>kadri hacioglu:benjamin douglas<>automatic time expression labeling for english and chinese text<>cicling<>ying chen<>
37484<>1837_2<>kadri hacioglu:benjamin douglas<>detection of entity mentions occuring in english and chinese text<>naacl<>ying chen<>
11807<>1839_3<>rouhollah rahmani:sally a. goldman:john krettek:jason e. fritts<>localized content based image retrieval<>mir<>hui zhang<>
11809<>1840_1<>liangxiao jiang:jiang su<>augmenting naive bayes for ranking<>icml<>harry zhang<>
11811<>1840_3<>liangxiao jiang:jiang su<>hidden naive bayes<>aaai<>harry zhang<>
11812<>1840_4<>jiang su<>representing conditional independence using decision trees<>aaai<>harry zhang<>
11843<>1842_0<>zhe xiang:jian huang:song song:kevin c. almeroth<>a hidden environment model for constructing indoor radio maps<>wowmom<>hangjin zhang<>
11820<>1843_0<>xin he<>"visibility representation of plane graphs via canonical ordering tree."<>ipl<>huaming zhang<>
11822<>1843_2<>xin he<>an application of well-orderly trees in graph drawing<>gd<>huaming zhang<>
11825<>1844_2<>dalong jiang:yuxiao hu:shuicheng yan:lei zhang:wen gao<>efficient 3d reconstruction for face recognition<>pr<>hongjiang zhang<>
11828<>1844_5<>dong xu:shuicheng yan:lei zhang:mingjing li:wei-ying ma:zhengkai liu<>parallel image matrix compression for face recognition<>mmm<>hongjiang zhang<>
11832<>1844_9<>xuezheng liu:lei zhang:mingjing li:dingxing wang<>boosting image classification with lda-based feature combination for digital photograph management<>pr<>hongjiang zhang<>
11833<>1844_10<>dong xu:shuicheng yan:lei zhang:zhengkai liu:heung-yeung shum<>concurrent subspaces analysis<>cvpr<>hongjiang zhang<>
11836<>1844_13<>shuicheng yan:dong xu:qiang yang:lei zhang:xiaoou tang<>discriminant analysis with tensor representation<>cvpr<>hongjiang zhang<>
11838<>1844_15<>shuicheng yan:dong xu:lei zhang:benyu zhang<>coupled kernel-based subspace learning<>cvpr<>hongjiang zhang<>
11842<>1846_2<>shell-ying huang<>a parallel bdi agent architecture<>iat<>huiliang zhang<>
37474<>1849_0<>cai heng li<>relative difference sets fixed by inversion and cayley graphs<>jct<>yu qing chen<>
37441<>1853_0<>xian-he sun:ming wu<>scalability of heterogeneous computing<>icpp<>yong chen<>
37442<>1853_1<>guoyin wang:fan jin:tianyun yan<>a novel generalized congruence neural networks<>isnn<>yong chen<>
37456<>1855_0<>david e. goldberg<>convergence time for the linkage learning genetic algorithm<>ec<>ying-ping chen<>
37532<>1859_0<>arthur l. liestman<>maintaining weakly-connected dominating sets for clustering ad hoc networks<>adhoc<>yuanzhu peter chen<>
37521<>1860_0<>zhihao chen:daniel port:barry w. boehm<>evolving an experience base for software process research<>ispw<>yue chen<>
9148<>1867_0<>jiujiang an:yu wu:quan gan<>a rule generation algorithm based on granular computing<>grc<>guoyin wang<>
38938<>1870_0<>adam tauman kalai:adam r. klivans:rocco a. servedio<>agnostically learning halfspaces<>focs<>yishay mansour<>
38952<>1870_14<>eyal kushilevitz<>computation in noisy radio networks<>siamdm<>yishay mansour<>
38958<>1870_20<>alexander kesselman<>optimizing tcp retransmission timeout<>icn<>yishay mansour<>
38962<>1870_24<>avrim blum<>from external to internal regret<>colt<>yishay mansour<>
38969<>1870_31<>alexander kesselman:rob van stee<>improved competitive guarantees for qos buffering<>algorithmica<>yishay mansour<>
38972<>1870_34<>haim kaplan:eyal kushilevitz<>learning with attribute costs<>stoc<>yishay mansour<>
38986<>1870_48<>maria-florina balcan:avrim blum:jason d. hartline<>mechanism design via machine learning<>focs<>yishay mansour<>
39006<>1870_68<>eyal even-dar:sham m. kakade<>planning in pomdps using multiplicity automata<>uai<>yishay mansour<>
39013<>1870_75<>alexander kesselman<>adaptive aimd congestion control<>algorithmica<>yishay mansour<>
39026<>1870_88<>eyal even-dar<>fast convergence of selfish rerouting<>soda<>yishay mansour<>
39036<>1870_98<>eyal even-dar:sham m. kakade<>reinforcement learning in pomdps without resets<>ijcai<>yishay mansour<>
39049<>1870_111<>nicolo cesa-bianchi:gilles stoltz<>improved second-order bounds for prediction with expert advice<>colt<>yishay mansour<>
37519<>1874_0<>kay chen tan:l. f. wang:d. k. liu<>intelligent sensor fusion and learning for autonomous robot navigation<>aai<>y. j. chen<>
37509<>1876_0<>f. maxwell harper:xin li:joseph a. konstan<>an economic model of user rating in an online recommender system<>um<>yan chen<>
37511<>1878_0<>chen zhao:dawei xu:nuermaimaiti heilili:zuoquan lin<>integrative security management for web-based enterprise applications<>waim<>yang chen<>
17798<>1883_4<>shuo chen:nithin nakka:zbigniew kalbarczyk:ravishankar k. iyer<>defeating memory corruption attacks via pointer taintedness detection<>dsn<>jun xu<>
17800<>1883_6<>peng ning:chongkyung kil:yan zhai:chris bookholt<>automatic diagnosis and response to memory corruption vulnerabilities<>ccs<>jun xu<>
17790<>1885_1<>toshihiko yamasaki:kiyoharu aizawa<>3d video segmentation using point distance histograms<>icip<>jianfeng xu<>
17779<>1887_19<>zhenming chen:vikas singh<>efficient job scheduling algorithms with multi-type contentions<>jco<>jinhui xu<>
17781<>1887_21<>lopamudra mukherjee:mingen lin:ronald berezney<>motion tracking and intensity surface recovery in microscopic nuclear images<>miccai<>jinhui xu<>
17783<>1887_23<>guang xu<>an lp rounding algorithm for approximating uncapacitated facility location problem with penalties<>ipl<>jinhui xu<>
17784<>1887_24<>zhiyong lin:mingen lin<>graph bandwidth of weighted caterpillars<>aaim<>jinhui xu<>
17787<>1887_27<>mingen lin:zhiyong lin<>almost optimal solutions for bin coloring problems<>isaac<>jinhui xu<>
17748<>1888_0<>zheng-zhong du:min xu<>edge-fault-tolerant edge-bipancyclicity of hypercubes<>ipl<>jun-ming xu<>
17751<>1888_3<>xin-min hou:min xu<>forwarding indices of folded -cubes<>dam<>jun-ming xu<>
17757<>1888_9<>min lu:meijie ma:angelika hellwig<>super connectivity of line graphs<>ipl<>jun-ming xu<>
17758<>1888_10<>min xu:xin-min hou<>fault diameter of cartesian product graphs<>ipl<>jun-ming xu<>
17759<>1888_11<>min xu:qiang zhu<>the super connectivity of shuffle-cubes<>ipl<>jun-ming xu<>
17736<>1889_8<>richard j. lipton<>on fundamental tradeoffs between delay bounds and computational complexity in packet scheduling algorithms<>ton<>jun xu<>
17737<>1889_9<>abhishek kumar:minho sung:ellen w. zegura<>a data streaming algorithm for estimating subpopulation flow size distribution<>sigmetrics<>jun xu<>
17742<>1889_14<>qi zhao:abhishek kumar:jia wang<>data streaming algorithms for accurate and efficient measurement of traffic and flow matrices<>sigmetrics<>jun xu<>
17747<>1889_19<>abhishek kumar:ellen w. zegura<>efficient and scalable query routing for unstructured peer-to-peer networks<>infocom<>jun xu<>
37548<>1892_0<>chaomei chen:russell c. maulitz<>understanding the evolution of nsaid: a knowledge domain visualization approach to evidence-based medicine<>iv<>yunan chen<>
2925<>1893_1<>nulo<>reasoning in extensional type theory with equality<>cade<>chad e. brown<>
32441<>1898_24<>yann vaxes:xiao-guang yang<>lowering eccentricity of a tree by node upgrading<>networks<>toshihide ibaraki<>
2920<>1899_2<>kang peng:slobodan vucetic:predrag radivojac:a. keith dunker:zoran obradovic<>optimizing long intrinsic disorder predictors with protein evolutionary information<>jbcb<>celeste j. brown<>
2922<>1899_4<>slobodan vucetic:zoran obradovic:vladimir vacic:predrag radivojac:kang peng:lilia m. iakoucheva:marc s. cortese:j. david lawson:jason g. sikes:crystal d. newton:a. keith dunker<>disprot: a database of protein disorder<>bioinformatics<>celeste j. brown<>
3624<>1902_0<>walt scacchi<>process modeling across the web information infrastructure<>sopr<>chris jensen<>
3622<>1904_0<>walt scacchi<>"experiences in discovering, modeling, and reenacting open source software development processes."<>ispw<>chris jensen<>
3623<>1905_0<>yuqing chen:henry h. glover<>proper actions of automorphism groups of free products of finite groups<>ijac<>craig a. jensen<>
3514<>1906_6<>jean-marc seigneur<>the claim tool kit for ad hoc recognition of peer entities<>scp<>christian damsgaard jensen<>
3527<>1906_19<>jean-marc seigneur:alan gray<>trust transfer: encouraging self-recommendations without sybil attack<>itrust<>christian damsgaard jensen<>
3552<>1907_24<>dengfeng gao:richard t. snodgrass:michael d. soo<>join operations in temporal databases<>vldb<>christian s. jensen<>
3570<>1907_42<>xuegang huang:simonas saltenis<>the islands approach to nearest neighbor querying in spatial networks<>ssd<>christian s. jensen<>
3584<>1907_56<>dieter pfoser<>trajectory indexing using movement constraints*<>geoinformatica<>christian s. jensen<>
3597<>1907_69<>philip a. bernstein:david j. dewitt:andreas heuer:zachary g. ives:holger meyer:m. tamer ozsu:richard t. snodgrass:kyu-young whang:jennifer widom<>database publication practices<>vldb<>christian s. jensen<>
3598<>1907_70<>david b. lomet:richard t. snodgrass<>using the lock manager to choose timestamps<>ideas<>christian s. jensen<>
3606<>1907_78<>philip a. bernstein:elisa bertino:andreas heuer:holger meyer:m. tamer ozsu:richard t. snodgrass:kyu-young whang<>an apples-to-apples comparison of two database journals<>sigmod<>christian s. jensen<>
37541<>1909_0<>amol ghoting:gregory buehrer:srinivasan parthasarathy:daehyun kim:anthony nguyen:pradeep dubey<>cache-conscious frequent pattern mining on a modern processor<>vldb<>yen-kuang chen<>
27293<>1915_0<>zhi zhang:zhigang wang:wei song:zhengding lu<>webpeer: a p2p-based system for publishing and discovering web services<>IEEEscc<>ruixuan li<>
27295<>1915_2<>zhi zhang:wei song:feng ke:zhengding lu<>service publishing and discovering model in a web services oriented peer-to-peer system<>icwe<>ruixuan li<>
16390<>1921_0<>stephen e. reichenbach<>"interpolation by asymmetric, two-dimensional cubic convolution."<>icip<>jiazheng shi<>
16393<>1921_3<>steve goddard:anagh lal:jason dumpert:shane farritor<>global control of robotic highway safety markers: a real-time solution<>rts<>jiazheng shi<>
16396<>1921_6<>ashok samal:david marx<>face recognition using landmark-based bidimensional regression<>icdm<>jiazheng shi<>
27279<>1922_0<>keith w. bedford:c. k. shum:xutong niu:feng zhou:vasilia velissariou:j. raul ramirez:aidong zhang<>digitalization of coastal management and decision making supported by multi-dimensional geospatial information and analysis<>dgo<>ron li<>
27280<>1922_1<>keith w. bedford:c. k. shum:xutong niu:feng zhou:vasilia velissariou:j. raul ramirez:aidong zhang<>integration of multidimensional geospatial information for coastal management and decision-making<>dgo<>ron li<>
27277<>1924_2<>du li<>commutativity-based concurrency control in groupware<>colcom<>rui li<>
27291<>1926_2<>hoang d. k. le:sebastien ourselin<>towards a visual programming environment based on itk for medical image analysis<>dicta<>rongxin li<>
39084<>1927_1<>kyu-young whang:byung suk lee:wook-shin han<>efficient evaluation of partial match queries for xml documents using information retrieval techniques<>dasfaa<>young-ho park<>
16411<>1930_0<>qingyong li:zhiping shi:zhongzhi shi<>swarm intelligence clustering algorithm based on attractor<>icnc<>jun shi<>
3723<>1942_1<>george j. davis:gayla s. domke<>ranks of regular graphs under certain unary operations<>arscom<>charles r. garner jr.<>
9466<>1943_1<>dimitrios m. thilikos:maria j. serna<>cutwidth ii: algorithms for partial w-trees of bounded degree<>jal<>hans l. bodlaender<>
9469<>1943_4<>alexander grigoriev<>algorithms for graphs embeddable with few crossings per edge<>fct<>hans l. bodlaender<>
9477<>1943_12<>alexander grigoriev:arie m. c. a. koster<>treewidth lower bounds with brambles<>esa<>hans l. bodlaender<>
9499<>1943_34<>andreas brandstadt:dieter kratsch:michael rao:jeremy spinrad<>"on algorithms for (, gem)-free graphs."<>tcs<>hans l. bodlaender<>
9505<>1943_40<>fedor v. fomin<>equitable colorings of bounded treewidth graphs<>tcs<>hans l. bodlaender<>
9523<>1943_58<>dimitrios m. thilikos:maria j. serna<>cutwidth i: a linear time fixed parameter algorithm<>jal<>hans l. bodlaender<>
9547<>1943_82<>frederic dorn:eelko penninkx:fedor v. fomin<>efficient exact algorithms on planar graphs: exploiting sphere cut branch decompositions<>esa<>hans l. bodlaender<>
9548<>1943_83<>irit katriel<>online topological ordering<>soda<>hans l. bodlaender<>
9559<>1943_94<>fedor v. fomin<>tree decompositions with small cost<>dam<>hans l. bodlaender<>
9560<>1943_95<>arie m. c. a. koster:thomas wolle<>degree-based treewidth lower bounds<>wea<>hans l. bodlaender<>
9568<>1943_103<>nulo<>discovering treewidth<>sofsem<>hans l. bodlaender<>
9571<>1943_106<>emgad h. bachoore<>new upper bound heuristics for treewidth<>wea<>hans l. bodlaender<>
26344<>1944_2<>ching-tung wu:kwang-ting cheng:yi-leh wu<>using visual features for anti-spam filtering<>icip<>qiang zhu<>
26329<>1945_18<>qiang xue:sakti pramanik:gang qian<>the hybrid digital tree: a new indexing technique for large string databases<>iceis<>qiang zhu<>
26335<>1945_24<>yingying tao:calisto zuzarte<>optimizing complex queries based on similarities of subqueries<>kais<>qiang zhu<>
34962<>1948_0<>pengyu hong<>genenotes - a novel information management software for biologists<>bmcbi<>wing hung wong<>
34961<>1949_0<>nulo<>playing with heritage: semiotics and cultural analysis of the online mahjong game in the global environment<>digra<>wendy wong<>
26354<>1950_4<>abhijit davare:john moondanos:alberto l. sangiovanni-vincentelli<>jpeg encoding on the intel mxp5800: a platform-based design case study<>estimedia<>qi zhu<>
34963<>1952_0<>john m. shea:tan f. wong<>cooperative-diversity slotted aloha<>qshine<>wing-hin wong<>
34876<>1954_1<>ganesha s. r. shanmuganathan:kang zhang:yu qi<>analyzing message-passing programs through visual slicing<>itcc<>w. eric wong<>
34881<>1954_6<>yu qi:kendra cooper<>source code-based software risk assessing<>sac<>w. eric wong<>
34883<>1954_8<>yu lei<>a novel framework for non-deterministic testing of message-passing programs<>hase<>w. eric wong<>
34889<>1954_14<>tatiana sugeta:yu qi:jose carlos maldonado<>smart debugging software architectural design in sdl<>jss<>w. eric wong<>
34892<>1954_17<>swapna s. gokhale<>static and dynamic distance metrics for feature-based code analysis<>jss<>w. eric wong<>
34897<>1954_22<>jenny li<>an integrated solution for testing and analyzing java applications in an industrial setting<>apsec<>w. eric wong<>
34899<>1954_24<>yu qi:david chenho kung<>an agent-based testing approach for web applications<>compsac<>w. eric wong<>
34900<>1954_25<>auri marcelo rizzo vincenzi:jose carlos maldonado:marcio eduardo delamaro<>coverage testing of java programs and components<>scp<>w. eric wong<>
34908<>1954_33<>j. jenny li:xiao ma:david m. weiss<>a constraint solver for code-based test data generation<>seke<>w. eric wong<>
34911<>1954_36<>victor k. y. chan<>optimizing and simplifying software metric models constructed using maximum likelihood methods<>compsac<>w. eric wong<>
34912<>1954_37<>hai hu:chang-hai jiang:kai-yuan cai<>a case study of the recursive least squares estimation approach to adaptive testing for software components<>qsic<>w. eric wong<>
34917<>1954_42<>yu lei:xiao ma<>effective generation of test sequences for structural testing of concurrent programs<>iceccs<>w. eric wong<>
34934<>1955_13<>zhenxin sun:yongxin zhu:santhosh kumar pilakkat<>design of clocked circuits using uml<>aspdac<>weng-fai wong<>
34935<>1955_14<>khaing khaing kyi win<>cooperative instruction scheduling with linear scan register allocation<>hipc<>weng-fai wong<>
34938<>1955_17<>yongxin zhu:zhenxin sun:alexander maxiaguine<>using uml 2.0 for system level design of real time soc platforms for stream processing<>rtcsa<>weng-fai wong<>
34942<>1955_21<>nulo<>targeted data prefetching<>aPcsac<>weng-fai wong<>
34949<>1957_1<>albert c. s. chung<>bayesian image segmentation using local iso-intensity structural orientation<>tip<>wilbur c. k. wong<>
31365<>1959_26<>ulisses kendi hayashida:kunio okuda:jairo panetta<>generating parallel algorithms for cluster and grid computing<>iccS<>siang wun song<>
31375<>1960_1<>chunping li<>semantic correlation network based text clustering<>ausai<>shaoxu song<>
31376<>1960_2<>chunping li<>tcuap: a novel approach of text clustering using asymmetric proximity<>iicai<>shaoxu song<>
9216<>1961_37<>gloria t. lau:kincho h. law<>analyzing government regulations using structural and domain information<>computer<>gio wiederhold<>
9220<>1961_41<>gloria t. lau:kincho h. law<>legal information retrieval and application on e-rulemaking<>icail<>gio wiederhold<>
12006<>1965_0<>zhongwei zhang:john leis<>throughput and fairness performance of multiple stt-vegas connections<>ccn<>hong zhou<>
11942<>1967_5<>ruiming chen<>efficient algorithms for buffer insertion in general circuits based on network flow<>iccad<>hai zhou<>
11947<>1967_10<>chuan lin:jia wang<>clustering for processing rate optimization<>iccad<>hai zhou<>
11951<>1967_14<>min pan:chris c. n. chu<>timing yield estimation using statistical static timing analysis<>iscas<>hai zhou<>
11952<>1967_15<>chuan lin<>trade-off between latch and flop for min-period sequential circuit designs with crosstalk<>iccad<>hai zhou<>
11954<>1967_17<>debjit sinha:narendra v. shenoy<>statistical gate sizing for timing yield optimization<>iccad<>hai zhou<>
11963<>1967_26<>nulo<>deriving a new efficient algorithm for min-period retiming<>aspdac<>hai zhou<>
11964<>1967_27<>zhenyu (peter) gu:jia wang:robert p. dick<>incremental exploration of the combined physical and behavioral design space<>dac<>hai zhou<>
11972<>1967_35<>nikolaos d. liveris:prithviraj banerjee<>an efficient system-level to rtl verification framework for computation-intensive applications<>ats<>hai zhou<>
11980<>1967_43<>debjit sinha<>a unified framework for statistical timing analysis with coupling and multiple input switching<>iccad<>hai zhou<>
11983<>1967_46<>chuan lin<>wire retiming as fixpoint computation<>tvlsi<>hai zhou<>
12010<>1968_0<>ning li:jinjiang ling:zhi-hua zhou<>spiculated lesion detection in digital mammogram based on artificial neural network ensemble<>isnn<>huajie zhou<>
12013<>1969_2<>thomas m. conte<>enhancing memory-level parallelism via recovery-free value prediction<>tc<>huiyang zhou<>
12007<>1970_0<>yaoqi zhou<>spem: improving multiple sequence alignment with sequence profiles and predicted secondary structures<>bioinformatics<>hongyi zhou<>
12008<>1970_1<>chi zhang:song liu:yaoqi zhou<>"web-based toolkits for topology prediction of transmembrane helical proteins, fold recognition, structure and binding scoring, folding-kinetics analysis and comparative analysis of domain combinations."<>nar<>hongyi zhou<>
10245<>1980_0<>eugene t. lin:oriol guitart:edward j. delp<>further progress in watermark evaluation testbed (wet)<>sswmc<>hyung cook kim<>
4689<>1984_8<>aidong zhang<>interrelated two-way clustering and its application on gene expression data<>ijait<>chun tang<>
10246<>1985_0<>onur mutlu:jared stark:yale n. patt<>wish branches: combining conditional branching and predication for adaptive predicated execution<>micro<>hyesoon kim<>
10249<>1985_3<>onur mutlu:david n. armstrong:yale n. patt<>an analysis of the performance impact of wrong-path memory references on out-of-order and runahead execution processors<>tc<>hyesoon kim<>
10258<>1987_0<>hyun seok cha:jungsun kim:jin hyun son<>development of the efficient owl document management system for the embedded applications<>human<>hak soo kim<>
10259<>1987_1<>eric wang:yong se kim:jin hyun son:sanghoon lee:il hong suh<>ontology modeling and storage system for robot context understanding<>kes<>hak soo kim<>
10261<>1991_0<>junghyun nam:seungjoo kim:dongho won:hyungkyu yang<>practical and provably-secure multicasting over high-delay networks<>iccS<>hyunjue kim<>
10262<>1991_1<>namje park:seungjoo kim:dongho won<>open location-based service using secure middleware infrastructure in web services<>iccsa<>howon kim<>
10263<>1991_2<>namje park:kyoil chung:seungjoo kim:dongho won<>xkms-based key management for open lbs in web services environment<>awic<>howon kim<>
4641<>1993_6<>melissa j. buco:rong n. chang:sandhya dwarkadas:laura z. luan:edward so:christopher ward<>low traffic overlay networks with large routing tables<>sigmetrics<>chunqiang tang<>
4677<>1996_0<>pierre t. kabamba:semyon m. meerkov<>"optimal, suboptimal, and adaptive threshold policies for power efficiency of wireless networks."<>tit<>choon yik tang<>
4678<>1996_1<>pierre t. kabamba:semyon m. meerkov<>ranking and adaptive ranking cdma<>ton<>choon yik tang<>
27932<>1998_1<>pierre boulanger:daniel torres<>visualizing emotion in musical performance using a virtual character<>sg<>robyn taylor<>
27935<>2001_0<>daniel torres:pierre boulanger<>using music to interact with a virtual character<>nime<>robyn taylor<>
41531<>2005_0<>baoyindureng wu:li zhang<>the transformation graph  when =-++<>dm<>zhao zhang<>
41532<>2005_1<>jinjiang yuan<>a proof of an inequality concerning -restricted edge connectivity<>dm<>zhao zhang<>
4412<>2008_2<>catalina m. llado:ramon puigjaner<>a performance model web service<>cmg<>connie u. smith<>
4415<>2008_5<>catalina m. llado:vittorio cortellessa:antinisca di marco:lloyd g. williams<>from uml models to software performance results: an spe process based on xml interchange formats<>wosp<>connie u. smith<>
4425<>2008_15<>lloyd g. williams<>qsem: quantitative scalability evaluation method<>cmg<>connie u. smith<>
29526<>2019_16<>ge yang:seong-ook jung:kwang-hyun baek:soo hwan kim:suki kim<>a 32-bit carry lookahead adder using dual-path all-n logic<>tvlsi<>sung-mo kang<>
29480<>2020_11<>jian sun:yin li<>symmetric stereo matching for occlusion handling<>cvpr<>sing bing kang<>
29481<>2020_12<>richard i. hartley<>parameter-free radial distortion correction with centre of distortion estimation<>iccv<>sing bing kang<>
29489<>2020_20<>huiqiong wang:stephen lin:xiaopei liu<>separating reflections in human iris images for illumination estimation<>iccv<>sing bing kang<>
29558<>2025_0<>dmitri loguinov<>impact of fec overhead on scalable video streaming<>nossdav<>seong-ryong kang<>
28000<>2028_1<>amela karahasanovic:gregor e. kennedy<>an investigation into keystroke latency metrics as an indicator of programming performance<>ace<>richard c. thomas<>
27991<>2029_3<>hyungseon oh:bernard c. lesieutre:timothy mount<>a method for classifying offer strategies observed in an electricity market<>dss<>robert j. thomas<>
27945<>2031_0<>paul wollan<>an improved linear edge bound for graph linkages<>ejc<>robin thomas<>
27955<>2031_10<>xingxing yu:wenan zang<>hamilton paths in toroidal graphs<>jct<>robin thomas<>
27962<>2031_17<>gunnar brinkmann:sam greenberg:catherine s. greenhill:brendan d. mckay:paul wollan<>generation of simple quadrangulations of the sphere<>dm<>robin thomas<>
27939<>2033_0<>andrew marrington:james m. hogan<>quality assurance in a student-based agile software engineering process<>aswec<>richard thomas<>
27940<>2033_1<>james m. hogan<>developing the software engineering team<>ace<>richard thomas<>
27943<>2033_4<>sally clarke:michael adams<>developing case studies to enhance student learning<>ace<>richard thomas<>
14392<>2034_0<>woo-jae kim:joo-young baek:sun-don lee:young-joo suh:yun-sung kim<>efficient uplink scheduler architecture of subscriber station in ieee 802.16 system<>euc<>jin-a kim<>
14393<>2035_0<>henrique andrade:alan sussman<>comparing the performance of high-level middleware systems in shared and distributed memory parallel environments<>ipps<>jik-soo kim<>
39860<>2040_1<>li li:baolin wu<>agent-based approach for dynamic ontology management<>kes<>yun yang<>
39861<>2040_2<>jinjun chen<>temporal dependency for dynamic verification of fixed-date constraints in grid workflow systems<>apweb<>yun yang<>
39862<>2040_3<>jun shen:chengang wan:chuan zhu<>from bpel4ws to owl-s: integrating e-business process descriptions<>IEEEscc<>yun yang<>
39866<>2040_7<>li li:baolin wu<>agent-based ontology mapping towards ontology interoperability<>ausai<>yun yang<>
39870<>2040_11<>li li:baolin wu<>semantic mapping with multi-agent systems<>eee<>yun yang<>
39876<>2040_17<>xiaohui zhao:chengfei liu<>an organisational perspective on collaborative business processes<>bpm<>yun yang<>
39879<>2040_20<>hongchen li<>dynamic checking of temporal constraints for concurrent workflows<>ecra<>yun yang<>
39881<>2040_22<>jinjun chen<>multiple temporal consistency states for dynamical verification of upper bound constraints in grid workflow systems<>eScience<>yun yang<>
39885<>2040_26<>jun yan:ryszard kowalczyk:xuan thang nguyen<>a service workflow management framework based on peer-to-peer and agent technologies<>qsic<>yun yang<>
39824<>2041_1<>fan li<>using recursive classification to discover predictive features<>sac<>yiming yang<>
39826<>2041_3<>shinjae yoo:jian zhang:bryan kisiel<>robustness of adaptive filtering methods in a cross-benchmark evaluation<>sigir<>yiming yang<>
39841<>2041_18<>jian zhang:zoubin ghahramani<>learning multiple related tasks using latent independent component analysis<>nips<>yiming yang<>
39843<>2041_20<>fan li:eric xing<>from lasso regression to feature vector machine<>nips<>yiming yang<>
39857<>2042_3<>lei zhang:yong yu:jian zhou:chenxi lin<>an enhanced model for searching in semantic portals<>www<>yin yang<>
39858<>2042_4<>jian zhou:yong yu:lei zhang:chenxi lin<>integrating web services into ontology-based web portal<>apweb<>yin yang<>
39792<>2043_0<>hao wang:haiyong xie:lili qiu:abraham silberschatz<>optimal isp subscription for internet multihoming: algorithm design and implication analysis<>infocom<>yang richard yang<>
39794<>2043_2<>haiyong xie:hao wang:abraham silberschatz:a. krishnamurthy:yanbin liu:erran l. li<>on route selection for interdomain traffic engineering<>network<>yang richard yang<>
39795<>2043_3<>hao wang:haiyong xie ii:avi silberschatz:erran l. li:yanbin liu<>stable egress route selection for interdomain traffic engineering: model and analysis<>icnp<>yang richard yang<>
39800<>2043_8<>hao wang:haiyong xie ii:avi silberschatz:erran l. li:yanbin liu<>"on the stability of rational, heterogeneous interdomain route selection."<>icnp<>yang richard yang<>
39804<>2043_12<>david kiyoshi goldenberg:a. krishnamurthy:w. c. maness:a. young:a. stephen morse:a. savvides<>network localization in partially localizable networks<>infocom<>yang richard yang<>
39814<>2043_22<>sheng zhong:erran l. li:yanbin grace liu<>on designing incentive-compatible routing and forwarding protocols in wireless ad-hoc networks: an integrated approach using game theoretical and cryptographic techniques<>mobicom<>yang (richard) yang<>
39790<>2045_0<>david gillingwater:chris j. hinde<>a conceptual framework for society-oriented decision support<>ais<>yingjie yang<>
12043<>2049_16<>baoshan gu:s. e. george:sheng-tzong cheng<>on failure recoverability of client-server applications in mobile wireless environments<>tr<>i.-r. chen<>
12050<>2049_23<>sheng-tun li:i-ling yen<>adaptive qos control based on benefit optimization for video servers providing differentiated services<>mta<>ing-ray chen<>
14398<>2051_0<>arie segev<>a web services-enabled marketplace architecture for negotiation process management<>dss<>jin baek kim<>
11748<>2054_0<>mukesh ranjan:wim verhaegen:mengmeng ding:ranga vemuri:georges g. e. gielen<>efficient symbolic sensitivity analysis of analog circuits using element-coefficient diagrams<>aspdac<>huiying yang<>
11749<>2054_1<>anuradha agarwal:ranga vemuri<>fast analog circuit synthesis using multiparameter sensitivity analysis based on element-coefficient diagrams<>isvlsi<>huiying yang<>
32168<>2061_0<>yao-wen chang<>modern floorplanning based on fast simulated annealing<>ispd<>tung-chieh chen<>
32167<>2062_0<>daniela de venuto<>international symposium on quality electronic design<>mj<>tom chen<>
39788<>2063_4<>ganesh gopalakrishnan:gary lindstrom<>umm: an operational memory model specification framework with integrated model checking capability<>concurrency<>yue yang<>
32166<>2064_0<>jiaheng lu:tok wang ling:chee yong chan<>from region encoding to extended dewey: on efficient processing of xml twig pattern matching<>vldb<>ting chen<>
39773<>2065_0<>xindong wu:xingquan zhu<>combining proactive and reactive predictions for data streams<>kdd<>ying yang<>
39777<>2065_4<>kevin b. korb:kai ming ting:geoffrey i. webb<>ensemble selection for superparent-one-dependence estimators<>ausai<>ying yang<>
32160<>2067_0<>thomas s. huang<>region based hidden markov random field model for brain mr image segmentation<>wec<>terrence chen<>
32162<>2067_2<>thomas s. huang:wotao yin:xiang sean zhou<>a new coarse-to-fine framework for 3d brain mr image registration<>cvbia<>terrence chen<>
32163<>2067_3<>wotao yin:xiang sean zhou:dorin comaniciu:thomas s. huang<>illumination normalization for face recognition and uneven background correction using total variation based image models<>cvpr<>terrence chen<>
32158<>2068_0<>sidney fels:yuichiro kinoshita:yasufumi takama:steve yohanan:sachiyo takahashi:ashley gadd:kenji funahashi<>swimming across the pacific: a vr swimming interface<>cga<>tzu-pei grace chen<>
23527<>2077_1<>scott wigginton<>frequency hopping pattern detection in wireless ad hoc networks<>itcc<>min song<>
23529<>2077_3<>weiying zhu:andrea francini:mansoor alam<>performance analysis of large multicast switches with multicast virtual output queues<>comcom<>min song<>
23531<>2077_5<>trent allison<>frequency hopping pattern recognition algorithms for wireless sensor networks<>ISCApdcs<>min song<>
23536<>2078_2<>wil m. p. van der aalst:hajo a. reijers<>discovering social networks from event logs<>cscw<>minseok song<>
24444<>2083_0<>rui zhang:pallav gupta:lin zhong<>threshold network synthesis and optimization and its application to nanotechnologies<>tcad<>niraj k. jha<>
24459<>2083_15<>loganathan lingappan<>unsatisfiability based efficient design for testability solution for register-transfer level circuits<>vts<>niraj k. jha<>
24516<>2083_72<>le yan:lin zhong<>user-perceived latency driven voltage scaling for interactive applications<>dac<>niraj k. jha<>
24521<>2083_77<>weidong wang:anand raghunathan:ganesh lakshminarayana<>input space-adaptive optimization for embedded-software synthesis<>tcad<>niraj k. jha<>
24522<>2083_78<>lin zhong:mike sinclair<>a personal-area network of low-power wireless interfacing devices for handhelds: system and hardware design<>mhci<>niraj k. jha<>
24524<>2083_80<>fei sun:srivaths ravi:anand raghunathan<>synthesis of application-specific heterogeneous multiprocessor architectures using extensible processors<>vlsid<>niraj k. jha<>
24529<>2083_85<>chao huang:srivaths ravi:anand raghunathan<>generation of distributed logic-memory architectures through high-level synthesis<>tcad<>niraj k. jha<>
24530<>2083_86<>le yan:jiong luo<>joint dynamic voltage scaling and adaptive body biasing for heterogeneous distributed real-time embedded systems<>tcad<>niraj k. jha<>
24534<>2083_90<>kamal s. khouri:ganesh lakshminarayana<>memory binding for performance optimization of control-flow intensive behavioral descriptions<>tvlsi<>niraj k. jha<>
24548<>2083_104<>divya arora:srivaths ravi:anand raghunathan<>secure embedded processing through hardware-assisted run-time monitoring<>date<>niraj k. jha<>
24549<>2083_105<>wei zhang<>allcn: an automatic logic-to-layout tool for carbon nanotube based nanotechnology<>iccd<>niraj k. jha<>
24558<>2083_114<>lin zhong<>"energy efficiency of handheld computer interfaces: limits, characterization and practice."<>mobisys<>niraj k. jha<>
24604<>2083_160<>divya arora:anand raghunathan:srivaths ravi<>enhancing security through hardware-assisted run-time validation of program data properties<>codes<>niraj k. jha<>
24608<>2083_164<>anish muttreja:anand raghunathan:srivaths ravi<>hybrid simulation for embedded software energy estimation<>dac<>niraj k. jha<>
14445<>2086_1<>william j. dally:brian towles:amit k. gupta<>microarchitecture of a high-radix router<>isca<>john kim<>
14441<>2090_1<>thomas sikora<>gaussian scale-space dense disparity estimation with anisotropic disparity-field diffusion<>3dim<>jangheon kim<>
14442<>2090_2<>thomas sikora<>hybrid recursive energy-based method for robust optical flow on large motion fields<>icip<>jangheon kim<>
14412<>2093_3<>sung-soon choi:byung ro moon<>normalization for neural network in genetic search<>gecco<>jung hwan kim<>
14417<>2094_0<>joongheon kim:wonjun lee:eunkyo kim:choonhwa lee:sungjin kim:sooyeon kim<>on energy-aware dynamic clustering for hierarchical sensor networks<>euc<>joonmo kim<>
4219<>2104_2<>ruifang zhang:zanhua zhu:hongming zhu:tu nguyen:fengxia yao:kun xia:desheng liang<>snp cutter: a comprehensive tool for snp pcr-rflp assay design<>nar<>chunyu liu<>
4203<>2108_8<>antonio b. torralba:william t. freeman:fredo durand:edward h. adelson<>motion magnification<>tog<>ce liu<>
41555<>2109_0<>zhihong chong:jeffrey xu yu:hongjun lu:aoying zhou<>false-negative frequent items mining from data streams with bursting<>dasfaa<>zhengjie zhang<>
4209<>2110_5<>vikram iyengar:jiangfan shi:erika f. cota<>power-aware test scheduling in network-on-chip using variable-rate on-chip clocking<>vts<>chunsheng liu<>
4210<>2110_6<>kugesh veeraraghavant:vikram iyengar<>thermal-aware test scheduling and hot spot temperature minimization for core-based systems<>dft<>chunsheng liu<>
4216<>2110_12<>dhiraj k. pradhan<>ebist: a novel test generator with built-in fault detection capability<>tcad<>chunsheng liu<>
41543<>2111_1<>ruofei zhang<>fast: toward more effective and efficient image retrieval<>mms<>zhongfei (mark) zhang<>
4227<>2116_5<>xifeng yan:hwanjo yu:jiawei han:philip s. yu<>"mining behavior graphs for ""backtrace"" of noncrashing bugs."<>sdm<>chao liu<>
4231<>2116_9<>xifeng yan:long fei:jiawei han:samuel p. midkiff<>sober: statistical model-based bug localization<>sigsoft<>chao liu<>
40994<>2123_4<>peeyush sharma:jian raymond li<>integrated support for location aware security services in enterprise wireless networks<>euc<>zhaoyu liu<>
40995<>2123_5<>daoxi xiu<>a formal definition for trust in distributed systems<>isw<>zhaoyu liu<>
40997<>2123_7<>dichao peng:yuliang zheng:jeffrey liu<>communication protection in ip-based video surveillance systems<>ism<>zhaoyu liu<>
40987<>2126_4<>bin wei:bernard renger:yih-farn chen:rittwik jana:huale huang:lee begeja:david gibbon:behzad shahraray<>mediaalert: a broadcast video monitoring and alerting system for mobile users<>mobisys<>zhu liu<>
40964<>2129_3<>xiaoshan li:jifeng he<>consistency checking of uml requirements<>iceccs<>zhiming liu<>
40975<>2129_14<>jifeng he:xiaoshan li<>towards a rigorous approach to uml-based development<>entcs<>zhiming liu<>
40978<>2129_17<>jifeng he:xiaoshan li<>component-based software engineering<>ictac<>zhiming liu<>
40981<>2129_20<>quan long:xiaoshan li:jifeng he<>consistent code generation from uml models<>aswec<>zhiming liu<>
14473<>2130_0<>hak soo kim:hyun seok cha:jin hyun son<>development of the efficient owl document management system for the embedded applications<>human<>jungsun kim<>
4176<>2133_2<>shang-ming huang:zhao-ming gao<>computer-assisted item generation for listening cloze tests in english<>icalt<>chao-lin liu<>
41571<>2135_0<>jason cong:yiping fan:guoling han:ashok jagannathan:glenn reinman<>instruction set extension with shadow registers for configurable processors<>fpga<>zhiru zhang<>
41574<>2135_3<>jason cong:yiping fan:guoling han:yizhou lin:junjuan xu:xu cheng<>bitwidth-aware scheduling and binding in high-level synthesis<>aspdac<>zhiru zhang<>
41577<>2135_6<>jason cong:guoling han<>architecture and compilation for data bandwidth improvement in configurable embedded processors<>iccad<>zhiru zhang<>
40947<>2153_7<>hao-zheng li:xiang-hua zhu<>hidden markov models with factored gaussian mixtures densities<>pr<>zhi-qiang liu<>
14468<>2155_1<>thomas f. wenisch:stephen somogyi:nikolaos hardavellas:chris gniady:anastassia ailamaki:babak falsafi<>store-ordered streaming of shared memory<>IEEEpact<>jangwoo kim<>
14469<>2155_2<>thomas f. wenisch:stephen somogyi:nikolaos hardavellas:anastassia ailamaki:babak falsafi<>temporal streaming of shared memory<>isca<>jangwoo kim<>
41597<>2156_1<>nulo<>mining inter-entity semantic relations using improved transductive learning<>ijcnlp<>zhu zhang<>
41601<>2157_0<>jianxun zhang:xinzhong lu<>the relation of matching with inverse degree of a graph<>dm<>zhongfu zhang<>
41604<>2159_0<>hongyuan zha<>a domain decomposition method for fast manifold learning<>nips<>zhenyue zhang<>
41608<>2161_0<>xinyu guo:hua lu:anthony k. h. tung:nan wang<>discovering strong skyline points in high dimensional spaces<>cikm<>zhenjie zhang<>
192<>2172_0<>didier buchs<>"towards service-based business process modeling, prototyping and integration."<>rise<>ang chen<>
31281<>2175_6<>rachel cavill:andrew m. tyrrell<>multi-chromosomal genetic programming<>gecco<>stephen l. smith<>
31283<>2175_8<>rodney fry:andy m. tyrrell<>a self-adaptive mate selection model for genetic programming<>cec<>stephen l. smith<>
31287<>2175_12<>stefan leggett:andrew m. tyrrell<>an implicit context representation for evolving image processing filters<>evoW<>stephen l. smith<>
31289<>2175_14<>xinye cai:andrew m. tyrrell<>benefits of employing an implicit context representation on hardware geometry of cgp<>ices<>stephen l. smith<>
31292<>2176_2<>nulo<>development of a large word-width high-speed asynchronous multiply and accumulate unit<>integration<>s. c. smith<>
31294<>2176_4<>bonita bhaskaran:venkat satagopan<>high-speed energy estimation for delay-insensitive circuits<>cdes<>scott smith<>
31297<>2176_7<>anshul singh<>using a vhdl testbench for transistor-level simulation and energy calculation<>cdes<>scott smith<>
31300<>2176_10<>bonita bhaskaran:venkat satagopan:waleed al-assadi<>implementation of design for test for asynchronous ncl designs<>cdes<>scott smith<>
31271<>2177_4<>nulo<>using hydrophobicity correlation measures for protein family classification<>metmbs<>scott f. smith<>
41270<>2184_0<>d. w. c. ho:xiaohui liu<>variance-constrained control for uncertain stochastic systems with missing measurements<>tsmc<>zidong wang<>
41273<>2184_3<>paul o'neill:karl fraser:paul kellam:joost n. kok:xiaohui liu<>pyramidic clustering of large-scale microarray images<>cj<>zidong wang<>
41276<>2189_0<>kung-kiu lau:perla velasco elizondo<>exogenous connectors for software components<>cbse<>zheng wang<>
41277<>2189_1<>kung-kiu lau:mario ornaghi<>a software component model and its preliminary formalisation<>fmco<>zheng wang<>
41278<>2189_2<>kung-kiu lau<>a taxonomy of software component models<>euromicro<>zheng wang<>
40156<>2191_0<>zang li:wade trappe:badri nath<>robust statistical methods for securing wireless localization in sensor networks<>ipsn<>yanyong zhang<>
40160<>2191_4<>wenyuan xu:wade trappe:timothy wood<>the feasibility of launching and detecting jamming attacks in wireless networks<>mobihoc<>yanyong zhang<>
40161<>2191_5<>pandurang kamat:wade trappe:celal ozturk<>enhancing source-location privacy in sensor network routing<>icdcs<>yanyong zhang<>
40165<>2191_9<>yinglung liang:anand sivasubramaniam:ramendra k. sahoo:jose e. moreira:manish gupta<>filtering failure logs for a bluegene/l prototype<>dsn<>yanyong zhang<>
40177<>2192_1<>qiang ji<>sensor selection for active information fusion<>aaai<>yongmian zhang<>
40120<>2193_0<>yulin ding<>model updating ctl systems<>ausai<>yan zhang<>
40130<>2193_10<>yulin ding<>algorithms for ctl system modification<>kes<>yan zhang<>
40134<>2193_14<>wei qu:anna liu<>automatic performance tuning for j2ee application server systems<>wise<>yan zhang<>
40139<>2193_19<>yulin ding<>a logic approach for ltl system modification<>ismis<>yan zhang<>
40146<>2193_26<>wenhui li:yu meng:haixu chen:tong wang<>intelligent mosaics algorithm of overlapping images<>icnc<>yan zhang<>
40150<>2193_30<>norman y. foo<>a unified framework for representing logic program updates<>aaai<>yan zhang<>
40153<>2193_33<>shujing wang<>specifying distributed authorization with delegation using logic programming<>kes<>yan zhang<>
40207<>2194_13<>guoliang xing:chenyang lu:qingfeng huang:robert pless<>minimum power configuration in wireless sensor networks<>mobihoc<>ying zhang<>
23779<>2202_0<>huaiqing wang<>intelligent agent supported business process management<>hicss<>minhong wang<>
23784<>2202_5<>huaiqing wang:dongming xu<>the design of intelligent workflow monitoring with agent technology<>kbs<>minhong wang<>
40227<>2207_0<>qing ye:liang cheng<>a study on the optimal time synchronization accuracy in wireless sensor networks<>cn<>yuecheng zhang<>
23790<>2211_0<>mariusz nowostawski:martin k. purvis<>declarative agent programming support for a fipa-compliant agent platform<>promas<>mengqiu wang<>
23791<>2211_1<>heiko wolf:martin k. purvis:maryam purvis<>an agent-based collaborative framework for mobile p2p applications<>ap2pc<>mengqiu wang<>
39238<>2212_0<>david t. chen:nat natarajan<>"on the simulation, modeling, and performance analysis of an 802.16e mobile broadband wireless access system."<>ccn<>yishen sun<>
23792<>2213_0<>zhiwei li:lie lu:wei-ying ma:naiyao zhang<>web object indexing using domain knowledge<>kdd<>muyuan wang<>
23796<>2216_0<>nulo<>a growth-based address allocation scheme for ipv6<>networking<>mei wang<>
40252<>2219_0<>peter g. harrison<>delay analysis of priority queues with modulated traffic<>mascots<>y. zhang<>
40248<>2222_3<>wei liu:wenjing lou<>anonymous communications in mobile ad hoc networks<>infocom<>yanchao zhang<>
4311<>2223_0<>archana sekhar:b. s. manoj<>dynamic coverage maintenance algorithms for sensor networks with limited mobility<>percom<>c. siva ram murthy<>
4312<>2223_1<>s. sriram:tamma bheemarjuna reddy:b. s. manoj<>on the end-to-end call acceptance and the possibility of deterministic qos guarantees in ad hoc wireless networks<>mobihoc<>c. siva ram murthy<>
4317<>2223_6<>sushant sinha<>information theoretic approach to traffic adaptive wdm networks<>ton<>c. siva ram murthy<>
8724<>2224_0<>john morris:kris parker:gary a. bundell:chiou peng lam<>using symbolic execution to guide test generation<>stvr<>gareth lee<>
8728<>2224_4<>eun-jung holden:robyn a. owens<>automatic recognition of colloquial australian sign language<>wacv<>gareth lee<>
40241<>2225_0<>nulo<>towards fault tolerance for multiagent systems<>atal<>yingqian zhang<>
4285<>2226_1<>arijit bishnu:bhargab b. bhattacharya:malay k. kundu:tinku acharya<>a pipeline architecture for computing the euler number of a binary image<>jsa<>c. a. murthy<>
4305<>2226_21<>anil k. ghosh:probal chaudhuri<>on visualization and aggregation of nearest neighbor classifiers<>pami<>c. a. murthy<>
8734<>2228_0<>youngkyu choi:sekyu park:sunghyun choi:jaehwan lee:hanwook jung<>enhancement of a wlan-based internet service<>monet<>go woon lee<>
40237<>2229_2<>weirong zhu:fei chen:ziang hu:guang r. gao<>sequential consistency revisit: the sufficient condition and method to reason the consistency model of a multiprocessor-on-a-chip architecture<>pdcn<>yuan zhang<>
8738<>2234_0<>stanley y. w. su:sem lampotang<>learning object and dynamic e-learning service technologies for simulation-based medical instruction<>wise<>gilliean lee<>
26827<>2238_0<>xiangyu zhang<>matching execution histories of program versions<>sigsoft<>rajiv gupta<>
26832<>2238_5<>xiangyu zhang:haifeng he:neelam gupta<>experimental evaluation of using dynamic slices for fault location<>aadebug<>rajiv gupta<>
26834<>2238_7<>neelam gupta:haifeng he:xiangyu zhang<>locating faulty code using failure-inducing chops<>kbse<>rajiv gupta<>
40259<>2241_0<>faisal n. abu-khzam:nicole e. baldwin:elissa j. chesler:michael a. langston:nagiza f. samatova<>genome-scale computational approaches to memory-intensive applications in systems biology<>sc<>yun zhang<>
40256<>2242_2<>mao ye<>complete convergence of competitive neural networks with different time scales<>npl<>yi zhang<>
40253<>2244_0<>khaled ben letaief<>an efficient resource-allocation scheme for spatial multiuser access in mimo/ofdm systems<>tcom<>ying jun zhang<>
40261<>2245_1<>jason cong:jie fang:min xie<>mars-a multilevel full-chip gridless routing system<>tcad<>yan zhang<>
40264<>2245_4<>jason cong<>thermal-driven multilevel routing for 3-d ics<>aspdac<>yan zhang<>
40273<>2252_0<>feng xu:lei zhang:wei-ying ma<>salient feature selection for visual concept learning<>pcm<>yu-jin zhang<>
40272<>2253_0<>mengjie zhang:william d. smart<>program simplification in genetic programming for object classification<>kes<>yun zhang<>
40274<>2255_0<>stephen a. fenner<>quantum algorithms for a set of group theoretic problems<>ictcs<>yong zhang<>
40275<>2255_1<>stephen a. fenner:frederic green:steven homer<>bounds on the power of constant-depth quantum circuits<>fct<>yong zhang<>
40281<>2256_0<>kok beng chu:li zhang:chew lim tan<>a fast and stable approach for restoration of warped document images<>icdar<>yu zhang<>
40284<>2262_0<>w. nick street:samuel burer<>sharing classifiers among ensembles from related problem domains<>icdm<>yi zhang<>
40288<>2265_0<>jiangjian xiao:mubarak shah<>adaptive region-based video registration<>wacv<>yunjun zhang<>
40289<>2265_1<>jiangjian xiao:mubarak shah<>motion layer based object removal in videos<>wacv<>yunjun zhang<>
6993<>2267_15<>soundararajan srinivasan<>a schema-based model for phonemic restoration<>speech<>deliang wang<>
7012<>2268_4<>bican xia<>stability analysis of biological systems with real solution classification<>issac<>dongming wang<>
7031<>2269_1<>xiaohang ma<>semantics modeling based image retrieval system using neural networks<>icip<>dianhui wang<>
7035<>2269_5<>xiaohang ma<>a hybird image retrieval system with user's relevance feedback using neurocomputing<>informaticaSI<>dianhui wang<>
7042<>2269_12<>paul c. conilione<>e-coli promoter recognition using neural networks with feature selection<>icic<>dianhui wang<>
7047<>2271_2<>jacek becla<>lessons learned from managing a petabyte<>cidr<>daniel l. wang<>
7057<>2272_0<>bing wu:george d. stetten<>laser needle guide for the sonic flashlight<>miccai<>david wang<>
7056<>2274_7<>jeremy r. levitt<>automatic assume guarantee analysis for assertion-based formal verification<>aspdac<>dong wang<>
7061<>2276_0<>bin zhang:yongqiang ye<>wavelet transform-based frequency tuning ilc<>tsmc<>danwei wang<>
23362<>2280_2<>bruno martins:leonardo andrade ribeiro<>indexing and ranking in geo-ir systems<>gir<>mario j. silva<>
23363<>2280_3<>bruno martins<>language identification in web pages<>sac<>mario j. silva<>
23364<>2280_4<>nuno cardoso:bruno martins:marcirio silveira chaves:leonardo andrade<>the xldb group at geoclef 2005<>clef<>mario j. silva<>
23375<>2280_15<>daniel gomes<>characterizing a national community web<>toit<>mario j. silva<>
23378<>2280_18<>bruno martins:marcirio silveira chaves<>challenges and resources for evaluating geographical ir<>gir<>mario j. silva<>
19722<>2281_3<>takeshi naemura<>spatial domain analysis on the focus measurement for light field rendering<>icip<>keita takahashi<>
23393<>2284_1<>david h. laidlaw:robert m. kirby:cullen d. jackson:j. scott davidson:timothy s. miller:william h. warren:michael j. tarr<>comparing 2d vector field visualization methods: a user study<>tvcg<>marco da silva<>
3458<>2286_0<>yun-peng chiu:chin-laung lei<>secure multicast using proxy encryption<>icics<>chun-ying huang<>
3442<>2289_0<>kuan-ta chen:polly huang:chin-laung lei<>the impact of network variabilities on tcp clocking schemes<>infocom<>chun-ying huang<>
3444<>2289_2<>kuan-ta chen:polly huang:chin-laung lei<>game traffic analysis: an mmorpg perspective<>nossdav<>chun-ying huang<>
3445<>2290_0<>gang zhou:tarek f. abdelzaher:sang hyuk son:john a. stankovic<>load balancing in bounded-latency content distribution<>rtss<>chengdu huang<>
3446<>2290_1<>seejo sebastine:tarek f. abdelzaher<>"design, implementation and evaluation of a real-time active content distribution service."<>rts<>chengdu huang<>
3447<>2290_2<>tarek f. abdelzaher<>bounded-latency content distribution: feasibility and evaluation<>tc<>chengdu huang<>
3448<>2290_3<>tian he:brian m. blum:john a. stankovic:tarek f. abdelzaher<>range-free localization and its impact on large scale sensor networks<>tecs<>chengdu huang<>
41325<>2292_0<>suli zhao:arup acharya:dipankar raychaudhuri<>parma: a phy/mac aware routing metric for ad-hoc wireless networks with multi-rate radios<>wowmom<>zhibin wu<>
41324<>2293_0<>jian wu<>similarity-based web service matchmaking<>IEEEscc<>zhaohui wu<>
3472<>2298_4<>chih-pin su:chia-lung horng:cheng-wen wu<>a configurable aes processor for enhanced security<>aspdac<>chih-tsun huang<>
3478<>2298_10<>chih-pin su:chen-hsing wang:kuo-liang cheng:cheng-wen wu<>design and test of a scalable security processor<>aspdac<>chih-tsun huang<>
3482<>2298_14<>chun-chieh wang:jing-jia liou:yen-lin peng:cheng-wen wu<>a bist scheme for fpga interconnect delay faults<>vts<>chih-tsun huang<>
13472<>2299_5<>rolf niedermeier:daniel raible<>improved algorithms and complexity results for power domination in graphs<>fct<>jiong guo<>
13478<>2299_11<>rolf niedermeier:sebastian wernicke<>parameterized complexity of generalized vertex cover problems<>wads<>jiong guo<>
13479<>2299_12<>michael dom:rolf niedermeier<>bounded degree closest -tree power is np-complete<>cocoon<>jiong guo<>
13484<>2299_17<>rolf niedermeier<>fixed-parameter tractability and data reduction for multicut in trees<>networks<>jiong guo<>
13488<>2299_21<>jens gramm:falk huffner:rolf niedermeier:sebastian wernicke<>improved fixed-parameter algorithms for two feedback set problems<>wads<>jiong guo<>
13502<>2307_1<>marcel f. neuts:moshe zukerman:hai le vu<>the waiting time distribution for a tdma model with a finite buffer and state-dependent service<>tcom<>jun guo<>
27810<>2308_69<>danfeng yao:michael shin:william h. winsborough<>visualization of automated trust negotiation<>vizsec<>roberto tamassia<>
27829<>2308_88<>mikhail j. atallah:keith b. frikken:michael t. goodrich<>secure biometric authentication for weak computational devices<>fc<>roberto tamassia<>
27854<>2308_113<>michael t. goodrich:mikhail j. atallah<>indexing information for data forensics<>acns<>roberto tamassia<>
27857<>2308_116<>nikos triandopoulos<>computational bounds on hierarchical data processing with applications to information security<>icalp<>roberto tamassia<>
32075<>2310_0<>steve hranilovic:frank r. kschischang<>capacity-achieving probability measure for conditionally gaussian channels with bounded inputs<>tit<>terence h. chan<>
41302<>2311_5<>hai he:weiyi meng:clement t. yu<>wise-integrator: a system for extracting and integrating complex web search interfaces of the deep web<>vldb<>zonghuan wu<>
41308<>2311_11<>hongkun zhao:weiyi meng:vijay raghavan:clement t. yu<>fully automatic wrapper generation for search engines<>www<>zonghuan wu<>
41312<>2311_15<>hai he:weiyi meng:clement t. yu<>constructing interface schemas for search interfaces of web databases<>wise<>zonghuan wu<>
41314<>2313_0<>feng cui:robert l. jernigan<>refinement of nmr-determined protein structures with database derived distance constraints<>jbcb<>zhijun wu<>
32080<>2314_0<>andy m. yip:chris h. q. ding<>dynamic cluster formation using level set methods<>pakdd<>tony f. chan<>
41316<>2315_0<>nulo<>performance modelling of multicast groups for multiplayer games in peer-to-peer networks<>dsrt<>z. d. wu<>
32028<>2317_13<>abdullah-al mahmood<>approximating the piercing number for unit-height rectangles<>cccg<>timothy m. chan<>
32031<>2317_16<>eric y. chen<>multi-pass geometric algorithms<>compgeom<>timothy m. chan<>
32036<>2317_21<>nulo<>low-dimensional linear programming with violations<>siamcomp<>timothy m. chan<>
32042<>2317_27<>nulo<>finding the shortest bottleneck edge in a parametric minimum spanning tree<>soda<>timothy m. chan<>
32043<>2317_28<>nulo<>on levels in arrangements of surfaces in three dimensions<>soda<>timothy m. chan<>
32065<>2317_50<>eric y. chen<>space-efficient algorithms for klee's measure problem<>cccg<>timothy m. chan<>
32066<>2317_51<>peyman afshani<>approximation algorithms for maximum cliques in 3d unit-disk graphs<>cccg<>timothy m. chan<>
32068<>2317_53<>therese c. biedl:yashar ganjali:mohammad taghi hajiaghayi:david r. wood<>balanced vertex-orderings of graphs<>dam<>timothy m. chan<>
21476<>2320_0<>yun he:reginald l. lagendijk<>a fragile watermark error detection scheme for wireless video communications<>tmm<>minghua chen<>
21481<>2320_5<>wei zhang:sen-ching s. cheung<>hiding privacy information in video surveillance system<>icip<>minghua chen<>
21368<>2326_10<>jian chih ou:chang-hung lee<>web log mining with adaptive support thresholds<>www<>ming-syan chen<>
21377<>2326_19<>jen-hao hsiao:jenq-haur wang:chu-song chen:lee-feng chien<>constructing a wrapper-based drm system for digital content protection in digital libraries<>icadl<>ming-syan chen<>
21383<>2326_25<>hao-ping hung<>a general model of hybrid data dissemination<>mdm<>ming-syan chen<>
21399<>2326_41<>kun-ta chuang<>frequent pattern discovery with memory constraint<>cikm<>ming-syan chen<>
21414<>2326_56<>wen-chih peng<>design and performance studies of an adaptive cache retrieval scheme in a mobile computing environment<>tmc<>ming-syan chen<>
21417<>2326_59<>wei-guang teng:ming-jyh hsieh<>a statistical framework for mining substitution rules<>kais<>ming-syan chen<>
21426<>2326_68<>kun-ta chuang:wen-chieh yang<>progressive sampling for association rules based on sampling error estimation<>pakdd<>ming-syan chen<>
21437<>2326_79<>ming-jyh hsieh:philip s. yu<>integrating dct and dwt for approximating cube streams<>cikm<>ming-syan chen<>
21440<>2326_82<>chi-chia lin<>on controlling digital tv set-top-box by mobile devices via ip network<>ism<>ming-syan chen<>
21456<>2326_98<>wei-guang teng:cheng-yue chang<>integrating web caching and web prefetching in client-side proxies<>tpds<>ming-syan chen<>
21355<>2327_20<>nulo<>combining point clouds and volume objects in volume scene graphs<>vg<>min chen<>
26841<>2330_1<>v. raghunathan:c. l. pereira:m. b. srivastava<>energy-aware wireless systems with adaptive power-fidelity tradeoffs<>tvlsi<>r. k. gupta<>
39972<>2334_9<>anthony man-cho so:jiawei zhang<>on approximating complex quadratic optimization problems via semidefinite programming relaxations<>ipco<>yinyu ye<>
39985<>2334_22<>anthony man-cho so<>on solving coverage problems in a wireless sensor network using voronoi diagrams<>wine<>yinyu ye<>
39986<>2334_23<>anthony man-cho so<>theory of semidefinite programming for sensor network localization<>soda<>yinyu ye<>
39990<>2334_27<>kamal jain:vijay v. vazirani<>"market equilibria for homothetic, quasi-concave utilities and economies of scale in production."<>soda<>yinyu ye<>
39992<>2334_29<>bruno codenotti:amin saberi:kasturi r. varadarajan<>leontief economies encode nonzero sum two-player games<>eccc<>yinyu ye<>
39996<>2335_0<>gerhard fischer<>reuse-conducive development environments<>ase<>yunwen ye<>
21328<>2336_5<>kasun wickramaratna:shu-ching chen:mei-ling shyu<>neural network based framework for goal event detection in soccer videos<>ism<>min chen<>
21330<>2336_7<>xin chen:chengcui zhang:shu-ching chen<>a latent semantic indexing based method for solving multiple instance learning problem in region-based image retrieval<>ism<>min chen<>
7067<>2338_0<>daniel s. yeung:eric c. c. tsang:lin shi<>gene selection through sensitivity analysis of support vector machines<>complife<>defeng wang<>
7068<>2338_1<>lin shi:daniel s. yeung:pheng-ann heng:tien-tsin wong:eric c. c. tsang<>support vector clustering for brain activation detection<>miccai<>defeng wang<>
37050<>2340_1<>wei-tek tsai:yinong chen:raymond a. paul:hai huang:xiao wei<>"adaptive testing, oracle generation, and test case ranking for web services."<>compsac<>xinyu zhou<>
7063<>2342_1<>jose f. arocha:vimla l. patel<>identifying reasoning strategies in medical decision making: a methodological guide<>jbi<>dongwen wang<>
17710<>2345_0<>ruizhong wei<>an access control scheme for partially ordered set hierarchy with provable security<>sacrypt<>jiang wu<>
18028<>2349_1<>chongkwon kim<>on the hidden terminal problem in multi-rate ad hoc wireless networks<>icoin<>joon yoo<>
17704<>2350_0<>michel savoie:scott campbell:hanxi zhang:gregor von bochmann:bill st. arnaud<>customer-managed end-to-end lightpath provisioning<>ijnm<>jing wu<>
17696<>2358_1<>matthew d. mullin:james m. rehg<>linear asymmetric classifier for cascade detectors<>icml<>jianxin wu<>
18022<>2359_0<>shashi shekhar<>in-route nearest neighbor queries<>geoinformatica<>jin soung yoo<>
18024<>2359_2<>shashi shekhar:mete celik<>a join-less approach for co-location pattern mining: a summary of results<>icdm<>jin soung yoo<>
17537<>2361_0<>shuhui yang:jiannong cao<>connected k-hop clustering in ad hoc networks<>icpp<>jie wu<>
17541<>2361_4<>guojun wang:jiannong cao:lifan zhang:keith c. c. chan<>a novel qos multicast model in mobile ad hoc networks<>ipps<>jie wu<>
17551<>2361_14<>shuhui yang<>smart: a scan-based movement-assisted sensor deployment method in wireless sensor networks<>infocom<>jie wu<>
17554<>2361_17<>fei dai<>a highly reliable multi-path routing scheme for  wireless networks<>paapp<>jie wu<>
17557<>2361_20<>fei dai:qing dai<>power efficient routing trees for ad hoc wireless networks using directional antenna<>adhoc<>jie wu<>
17558<>2361_21<>mihaela cardei:fei dai:shuhui yang<>extended dominating set in ad hoc networks using cooperative communication<>networking<>jie wu<>
17559<>2361_22<>dajin wang<>fault-tolerant and deadlock-free routing in 2-d meshes using rectilinear-monotone polygonal fault blocks<>paapp<>jie wu<>
17564<>2361_27<>shuhui yang<>energy-efficient node scheduling models in sensor networks with adjustable ranges<>ijfcs<>jie wu<>
17568<>2361_31<>fei dai<>efficient broadcasting with guaranteed coverage in mobile ad hoc networks<>tmc<>jie wu<>
17581<>2361_44<>fei dai<>efficient broadcasting in ad hoc networks using directional antennas<>networking<>jie wu<>
17590<>2361_53<>dong xiang:jia-guang sun:krishnaiyan thulasiraman<>fault-tolerant routing in meshes/tori using planarly constructed fault blocks<>icpp<>jie wu<>
17593<>2361_56<>li sheng<>deadlock-free multicasting in irregular networks using prefix routing<>tjs<>jie wu<>
17596<>2361_59<>imad jawhar<>a dynamic range resource reservation protocol for qos support in wireless networks<>aiccsa<>jie wu<>
17597<>2361_60<>fang qi:weijia jia<>available bandwidth detection with improved transport control algorithm for heterogeneous networks<>icdcsw<>jie wu<>
17620<>2361_83<>bing wu:eduardo b. fernandez:spyros s. magliveras<>secure and efficient key management in mobile ad hoc networks<>ipps<>jie wu<>
17621<>2361_84<>weijia jia:wanqing tu<>hierarchical multicast tree algorithms for application layer mesh networks<>iccnmc<>jie wu<>
17622<>2361_85<>mingming lu:mihaela cardei:minglu li<>energy-efficient connected coverage of discrete targets in wireless sensor networks<>iccnmc<>jie wu<>
17623<>2361_86<>qing dai<>computation of minimal uniform transmission range in ad hoc wireless networks<>cluster<>jie wu<>
17627<>2361_90<>xiuqi li<>cluster-based intelligent searching in unstructured peer-to-peer networks<>icdcsw<>jie wu<>
17628<>2361_91<>yifeng chen:yanxiang he:jiannong cao<>a greedy algorithm for capacity-constrained surrogate placement in cdns<>npc<>jie wu<>
17637<>2361_100<>mao ye:chengfa li:guihai chen<>eecs: an energy efficient clustering scheme in wireless sensor networks<>ipccc<>jie wu<>
17640<>2361_103<>imad jawhar<>qos support in tdma-based mobile ad hoc networks<>jcst<>jie wu<>
17652<>2361_115<>zhen jiang:dajin wang<>a new fault information model for fault-tolerant adaptive and minimal routing in 3-d meshes<>icpp<>jie wu<>
17654<>2361_117<>manish agarwal:lixin gao:joon ho cho<>energy efficient broadcast in wireless ad hoc networks with hitch-hiking<>monet<>jie wu<>
17671<>2361_134<>mihaela cardei<>guest editors' introduction<>jpdc<>jie wu<>
17677<>2361_140<>fei dai<>on constructing k-connected k-dominating set in wireless networks<>ipps<>jie wu<>
35459<>2374_0<>kent vander velden:daniel f. voytas:xun gu<>: software to identify domains responsible for functional divergence in protein family<>bmcbi<>xiang gao<>
25604<>2380_0<>yuan ji:chunlei wu:jing wang:kevin r. coombes<>applications of beta-mixture models in bioinformatics<>bioinformatics<>ping liu<>
1759<>2382_9<>namas chandra<>latency tolerance through parallelization of time in scientific applications<>pc<>ashok srinivasan<>
1774<>2384_2<>v. s. anil kumar:madhav v. marathe:srinivasan parthasarathy 0002<>algorithmic aspects of capacity in wireless networks<>sigmetrics<>aravind srinivasan<>
1775<>2384_3<>v. s. anil kumar:srinivasan parthasarathy 0002:madhav v. marathe:sibylle zust<>provable algorithms for parallel sweep scheduling on unstructured meshes<>ipps<>aravind srinivasan<>
1776<>2384_4<>v. s. anil kumar:madhav v. marathe:srinivasan parthasarathy 0002<>approximation algorithms for scheduling on multiple machines<>focs<>aravind srinivasan<>
1779<>2384_7<>v. s. anil kumar:madhav v. marathe:srinivasan parthasarathy 0002<>scheduling on unrelated machines under tree-like precedence constraints<>approx<>aravind srinivasan<>
1791<>2386_11<>james h. anderson<>fair scheduling of dynamic task systems on multiprocessors<>jss<>anand srinivasan<>
35419<>2392_1<>minh duc cao<>combining contents and citations for scientific document classification<>ausai<>xiaoying gao<>
35426<>2392_8<>daniel crabtree:peter andreae<>improving web clustering by cluster selection<>webi<>xiaoying gao<>
35427<>2392_9<>daniel crabtree:peter andreae<>standardized evaluation method for web clustering results<>webi<>xiaoying gao<>
12805<>2394_29<>nulo<>computer science and bioinformatics<>cacm<>jacques cohen<>
12811<>2394_35<>nulo<>updating computer science education<>cacm<>jacques cohen<>
35439<>2395_5<>bing han:hongbing ji<>a shot boundary detection method for news video based on rough sets and fuzzy clustering<>iciar<>xinbo gao<>
35441<>2395_7<>yinshui shi:hongbing ji<>a radar target multi-feature fusion classifier based on rough neural network<>isnn<>xinbo gao<>
35443<>2395_9<>jie li:licheng jiao<>a novel typical-sample-weighted clustering algorithm for large data sets<>cis<>xinbo gao<>
35444<>2395_10<>bing han:hongbing ji<>automatic news audio classification based on selective ensemble svms<>isnn<>xinbo gao<>
35445<>2395_11<>bing han:hongbing ji<>a unified framework for shot boundary detection<>cis<>xinbo gao<>
35448<>2395_14<>tao wang:jie li<>a content-based image quality metric<>rsfdgrc<>xinbo gao<>
35449<>2395_15<>qiang sun:yuheng sha:biao hou:licheng jiao<>a fully unsupervised image segmentation algorithm based on wavelet-domain hidden markov tree models<>acivs<>xinbo gao<>
35450<>2395_16<>jie li:licheng jiao<>a novel clustering method based on svm<>isnn<>xinbo gao<>
12826<>2399_6<>nathaniel duca:krzysztof niski:jonathan bilodeau:matthew bolitho:yuan chen<>a relational debugging engine for the graphics pipeline<>tog<>jonathan d. cohen<>
12836<>2399_16<>ofri sadowsky:russell h. taylor<>rendering tetrahedral meshes with higher-order attenuation functions for digital radiograph reconstruction<>visualization<>jonathan d. cohen<>
16036<>2400_8<>harish s. krishnan<>trusted identity and session management using secure cookies<>dbsec<>joon s. park<>
16041<>2400_13<>pratheep chandramohan:ganesh devarajan:joseph giordano<>trusted component sharing by runtime test and immunization for survivable distributed systems<>sec<>joon s. park<>
16048<>2404_0<>m. chorzempa:mohamed eltoweissy<>seck: survivable and efficient clustered keying for wireless sensor networks<>ipccc<>j.-m. park<>
16049<>2404_1<>creighton t. r. hager:scott f. midkiff:thomas l. martin<>performance and energy efficiency of block ciphers in personal digital assistants<>percom<>jung min park<>
39700<>2411_17<>dahua lin:xiaoou tang:shuicheng yan<>tensor-based factor decomposition for relighting<>icip<>yingqing xu<>
39702<>2413_1<>michel benaroch<>information retrieval with a hybrid automatic query expansion and data fusion procedure<>ir<>yunjie xu<>
39703<>2413_2<>zhiwei chen<>user-oriented relevance judgment: a conceptual model<>hicss<>yunjie xu<>
39708<>2415_1<>peng wang:bo yan:juntao guo:chindo hicks<>structural genomics analysis of alternative splicing and its application in modeling structures of alternatively spliced variants<>csb<>ying xu<>
39709<>2415_2<>tema fridman:jane razumovskaya:nathan verberkmoes:greg hurst:vladimir protopopescu<>the probability distribution for a random match between an experimental-theoretical spectral pair in tandem mass spectrometry<>jbcb<>ying xu<>
39715<>2415_8<>yinglei song:chunmei liu:xiuzhen huang:russell l. malmberg:liming cai<>efficient parameterized algorithm for biopolymer structure-sequence alignment<>wabi<>ying xu<>
35289<>2421_1<>daniel shegogue<>integration of the gene ontology into an object-oriented architecture<>bmcbi<>w. jim zheng<>
27381<>2426_2<>petra berenbrink:tom friedetzky<>dynamic diffusion load balancing<>icalp<>russell a. martin<>
27335<>2427_13<>qi-xing huang:shi-min hu<>fast degree elevation and knot insertion for b-spline curves<>cagd<>ralph r. martin<>
27354<>2427_32<>yun-tao jia:shi-min hu<>video completion using tracking and fragment merging<>vc<>ralph r. martin<>
27368<>2427_46<>gershon elber:robert sayegh:gill barequet<>two-dimensional visibility charts for continuous curves<>smi<>ralph r. martin<>
3742<>2429_0<>hyeun-suk rhee:young ryu<>i am fine but you are not: optimistic bias and illusion of control on information security<>icis<>cheong-tag kim<>
37685<>2431_3<>dequan li:ruixiang sun:charles x. ling:yonggang wei:hu zhou:rong zeng:qiang yang:simin he:wen gao<>pfind: a novel database-searching software system for automated peptide and protein identification via tandem mass spectrometry<>bioinformatics<>yan fu<>
37651<>2433_0<>nulo<>on quasi-open bisimulation<>tcs<>yuxi fu<>
21484<>2437_1<>taekyoung kwon:yanghee choi<>data dissemination based on mobile agent in wireless sensor networks<>lcn<>min chen<>
39726<>2441_0<>kan-lin hsiung:xin li:ivan nausieda:stephen boyd:lawrence t. pileggi<>opera: optimization with ellipsoidal uncertainty for robust analog ic design<>dac<>yang xu<>
21493<>2442_0<>kai hwang:yu-kwong kwok:shanshan song:ying chen:runfang zhou:xiaosong lou<>gridsec: trusted grid computing with security binding and self-defense against network worms and ddos attacks<>iccS<>min cai yu chen<>
21495<>2445_1<>rakesh mohan:richard goodwin<>semantic query transformation for integrating web information sources<>iceis<>mao chen<>
3724<>2446_0<>krzysztof czarnecki:michal antkiewicz:sean lau:krzysztof pietroszek<>fmp and fmp2rsm: eclipse plug-ins for modeling features using model templates<>oopsla<>chang hwan peter kim<>
3726<>2446_2<>krzysztof czarnecki<>synchronizing cardinality-based feature models and their specializations<>ecmdafa<>chang hwan peter kim<>
3727<>2446_3<>krzysztof czarnecki:michal antkiewicz:sean lau:krzysztof pietroszek<>model-driven software product lines<>oopsla<>chang hwan peter kim<>
3736<>2448_1<>jaehyuk huh:hazim shafi:lixin zhang:doug burger:stephen w. keckler<>a nuca substrate for flexible cmp cache sharing<>ics<>changkyu kim<>
31656<>2455_0<>c. t. lin<>authors' reply<>tfs<>s. j. wu<>
31658<>2458_0<>d. clements-croome<>optimal maintenance policies under different operational schedules<>tr<>shaomin wu<>
39561<>2460_1<>bartholomew o. nnaji<>geometry-based semantic id for persistent and interoperable reference in feature-based parametric modeling<>cad<>yan wang<>
39559<>2462_0<>weizhao wang:xiang-yang li:zheng sun<>design multicast protocols for non-cooperative networks<>infocom<>yu wang<>
5350<>2463_0<>zuoning yin:hai jin:quan yuan:chucheng zhao<>adaptive query-caching in peer-to-peer systems<>npc<>chao zhang<>
5351<>2463_1<>xuping tu:hai jin:dafu deng:quan yuan<>design and deployment of locality-aware overlay multicast protocol for live streaming services<>npc<>chao zhang<>
5352<>2464_0<>joyce y. chai:rong jin<>user term feedback in interactive text-based image retrieval<>sigir<>chen zhang<>
39578<>2465_0<>nulo<>constraint-sensitive privacy management for personalized web-based systems<>um<>yang wang<>
39574<>2466_0<>adam harder:lanlan song<>towards an indoor location system using rf signal strength in ieee 802.11 networks<>itcc<>yu wang<>
39567<>2472_1<>jin ho kwak<>frobenius maps<>dm<>yan wang<>
21506<>2475_0<>nulo<>addressing social dilemmas and fostering cooperation through computer games<>digra<>mark chen<>
21507<>2475_1<>beth e. kolko:elizabeth cuddihy:eliana medina<>modeling and measuring engagement in computer games<>digra<>mark chen<>
39541<>2476_0<>qiang ji<>a dynamic conditional random field model for object segmentation in image sequences<>cvpr<>yang wang<>
39542<>2476_1<>kia-fock loe:tele tan:jian-kang wu<>spatiotemporal video segmentation based on graphical models<>tip<>yang wang<>
2911<>2479_0<>danwei wang:yongqiang ye<>wavelet transform-based frequency tuning ilc<>tsmc<>bin zhang<>
13809<>2480_0<>smita krishnaswamy:george f. viamontes:igor l. markov<>accurate reliability evaluation and enhancement via probabilistic transfer matrices<>date<>john p. hayes<>
13811<>2480_2<>nagarajan kandasamy:brian t. murray<>time-constrained failure diagnosis in distributed embedded systems: application to actuator diagnosis<>tpds<>john p. hayes<>
39553<>2483_0<>jian-cheng wu:tyne liang:jason s. chang<>web-based unsupervised learning for query formulation in question answering<>ijcnlp<>yi-chia wang<>
39557<>2484_0<>nando de freitas:maryam mahdaviani:dustin lang<>fast krylov methods for n-body learning<>nips<>yang wang<>
39555<>2485_0<>shaozhi ye:xing li<>understanding current ipv6 performance: a measurement study<>iscc<>yi wang<>
10560<>2494_0<>ling li:amrit pratap:yaser s. abu-mostafa<>improving generalization by data categorization<>pkdd<>hsuan-tien lin<>
10558<>2495_0<>izhak shafran:todd e. murphy:allison m. okamura:david d. yuh:gregory d. hager<>automatic detection and segmentation of robot-assisted surgical motions<>miccai<>henry c. lin<>
10559<>2495_1<>darius burschka:jason j. corso:maneesh dewan:william w. lau:ming li:panadda marayong:nicholas a. ramey:gregory d. hager:brian hoffman:david larkin:christopher j. hasser<>navigating inner space: 3-d assistance for minimally invasive surgery<>ras<>henry lin<>
10563<>2500_0<>rung-shiang cheng:wen-shyang hwang:ce-kuen shieh<>improving the ramping up behavior of tcp slow start<>aina<>hui-tang lin<>
10564<>2500_1<>ho-ting wu:kai-wei ke:wang-rong chang<>a switched delay line based optical switch architecture with a bypass line<>iscas<>hui-tang lin<>
12843<>2502_2<>andrew stephen mcgough:john darlington:eleftheria katsiri:william lee:sofia panagiotidi:yash patel<>an end-to-end workflow pipeline for large-scale grid computing<>grid<>jeremy cohen<>
12509<>2505_0<>sanjay joshua swamidass:yimeng dou:jocelyne bruand:pierre baldi<>chemdb: a public database of small molecules and related chemoinformatics resources<>bioinformatics<>jonathan h. chen<>
12511<>2505_2<>sanjay joshua swamidass:jocelyne bruand:peter phung:liva ralaivola:pierre baldi<>"kernels for small molecules and the prediction of mutagenicity, toxicity and anti-cancer activity."<>ismb<>jonathan h. chen<>
12507<>2506_0<>jin-ting zhang:hulin wu<>discretization approach and nonparametric modeling for long-term hiv dynamic model<>iccsa<>jianwei chen<>
12515<>2507_0<>nulo<>making subsequence time series clustering meaningful<>icdm<>jason r. chen<>
12517<>2507_2<>nulo<>constructing task-level assembly strategies in robot programming by demonstration<>ijrr<>jason r. chen<>
39524<>2510_2<>mordecai j. golin:yiu-cho leung:xuerong yong<>"counting structures in grid graphs, cylinders and tori using transfer matrices: survey and new results."<>alenex<>yajun wang<>
39526<>2510_4<>siu-wing cheng:zhuangzhi wu<>provable dimension detection using principal component analysis<>compgeom<>yajun wang<>
39527<>2510_5<>yo-sub han:derick wood<>prefix-free regular-expression matching<>cpm<>yajun wang<>
39518<>2512_1<>yijun yu:john mylopoulos:sotirios liaskos:alexei lapouchnian:julio cesar sampaio do prado leite<>reverse engineering goal models from legacy code<>re<>yiqiao wang<>
39520<>2512_3<>eleni stroulia<>structural and semantic matching for assessing web-service similarity<>ijcis<>yiqiao wang<>
39521<>2512_4<>yijun yu:john mylopoulos:sotirios liaskos:alexei lapouchnian:ying zou:martin littou:julio cesar sampaio do prado leite<>retr: reverse engineering to requirements<>wcre<>yiqiao wang<>
3404<>2513_2<>te-lung liu<>on deflection routing in optical burst-switched networks<>jhsn<>ching-fang hsu<>
3405<>2513_3<>te-lung liu:fang-sheng lin<>on dynamic routing and wavelength assignment in multi-granular all-optical networks<>icita<>ching-fang hsu<>
39498<>2515_0<>jian-bo yang:dong-ling xu<>a preference aggregation method through the estimation of utility intervals<>cor<>ying-ming wang<>
39502<>2515_4<>celik parkan<>multiple attribute decision making based on fuzzy preference information on alternatives: ranking and weighting<>fss<>ying-ming wang<>
39506<>2515_8<>richard greatbanks:jian-bo yang<>interval efficiency assessment using data envelopment analysis<>fss<>ying-ming wang<>
39508<>2515_10<>nulo<>on fuzzy multiattribute decision-making models and methods with incomplete preference information<>fss<>ying-ming wang<>
3408<>2516_0<>fu-hsing wang:jen-chih tsai<>minimal feedback vertex sets in directed split-stars<>networks<>cheng-ju hsu<>
39535<>2519_2<>margaret martonosi:li-shiuan peh<>a new scheme on link quality prediction and its applications to metric-based routing<>sensys<>yong wang<>
39532<>2520_4<>yuchou chang:yue zhou:yi hong<>a color image segmentation algorithm by using region and edge information<>ausai<>yonggang wang<>
12405<>2522_5<>iyad a. kanj:ge xia<>labeled search trees and amortized analysis: improved upper bounds for np-hard problems<>algorithmica<>jianer chen<>
12412<>2522_12<>iyad a. kanj<>on approximating minimum vertex cover for graphs with perfect matching<>tcs<>jianer chen<>
12413<>2522_13<>wenyu gao:jianxin wang:songqiao chen<>pfed: a prediction-based fair active queue management algorithm<>icpp<>jianer chen<>
12421<>2522_21<>iyad a. kanj:guojun wang<>hypercube network fault tolerance: a probabilistic approach<>join<>jianer chen<>
12433<>2522_33<>ergun akleman<>regular meshes<>sma<>jianer chen<>
12472<>2522_72<>nan zhang 0004:wei zhao<>performance measurements for privacy preserving data mining<>pakdd<>jianer chen<>
12483<>2522_83<>hongyun xu:xinwen fu:ye zhu:riccardo bettati:wei zhao<>sas: a scalar anonymous communication system<>iccnmc<>jianer chen<>
12492<>2522_92<>henning fernau:iyad a. kanj:ge xia<>parametric duality and kernelization: lower bounds and upper bounds on kernel size<>stacs<>jianer chen<>
12500<>2522_100<>benny chor:mike fellows:xiuzhen huang:david w. juedes:iyad a. kanj:ge xia<>tight lower bounds for certain parameterized np-hard problems<>iandc<>jianer chen<>
30204<>2524_0<>humphrey rutagemwa:sherman x. shen:jon w. mark:pin-han ho<>efficiency and throughput analysis of dly-ack in wpans<>broadnets<>stanley liu<>
12393<>2525_2<>ruiping wang:shengye yan:wen gao<>face detection based on the manifold<>avbpa<>jie chen<>
12394<>2525_3<>ruiping wang:shengye yan:shiguang shan:xilin chen:wen gao<>how to train a classifier based on the huge face database?<>amfg<>jie chen<>
30201<>2528_0<>yin wang:raimo kantola<>adding multi-class routing into the diffserv architecture<>icw<>shuping liu<>
39492<>2529_5<>fillia makedon:james c. ford:justin d. pearlman<>hykgene: a hybrid approach for selecting marker genes for phenotype classification using microarray gene expression data<>bioinformatics<>yuhang wang<>
39486<>2530_1<>achim g. hoffmann<>unsupervised bilingual word sense disambiguation using web statistics<>ausai<>yuanyong wang<>
30192<>2531_1<>tamer basar:r. srikant<>pitfalls in the fluid modeling of rtt variations in window-based congestion control<>infocom<>shao liu<>
30193<>2535_0<>fang liu:clement t. yu:weiyi meng:ophir frieder:david grossman<>database selection in intranet mediators for natural language queries<>cikm<>shuang liu<>
39433<>2537_16<>xintao wu<>"approximate inverse frequent itemset mining: privacy, complexity, and approximation."<>icdm<>yongge wang<>
39436<>2537_19<>xintao wu:ying wu:yingjiu li<>privacy aware market basket data set generation: a feasible approach for inverse frequent set mining<>sdm<>yongge wang<>
39437<>2537_20<>xintao wu:chintan sanghvi:yuliang zheng<>privacy aware data generation for testing database applications<>ideas<>yongge wang<>
5329<>2538_0<>hong lan:yang ye:brett d. estrade<>parallel sor iterative algorithms and performance evaluation on a linux cluster<>pdpta<>chaoyang zhang<>
5330<>2538_1<>navodit kaushik:beddhu murali:vijayaraj nagarajan:sanyogita lakhera:youping deng<>parallel virtual screening for prediction of antimicrobial activity using fourier transforms<>pdpta<>chaoyang zhang<>
5331<>2538_2<>youping deng:venkatachalam chokalingam<>markov chain correlation based clustering of gene expression data<>itcc<>chaoyang zhang<>
39407<>2539_4<>xianfeng gu:kiralee m. hayashi:tony f. chan:paul m. thompson:shing-tung yau<>brain surface parameterization using riemann surface structure<>miccai<>yalin wang<>
39409<>2539_6<>ming-chang chiang:paul m. thompson<>automated surface matching using mutual information applied to riemann surface structures<>miccai<>yalin wang<>
39412<>2539_9<>xianfeng gu:kiralee m. hayashi:tony f. chan:paul m. thompson:shing-tau yau<>brain surface conformal parameterization<>cgim<>yalin wang<>
39413<>2539_10<>ming-chang chiang:paul m. thompson<>3d surface matching with mutual information and riemann surface structures<>cgim<>yalin wang<>
39416<>2539_13<>xianfeng gu:kiralee m. hayashi:tony f. chan:paul m. thompson:shing-tung yau<>surface parameterization using riemann surface structure<>iccv<>yalin wang<>
5332<>2540_0<>wei wei:bing wang:james f. kurose:donald f. towsley<>"classification of access network types: ethernet wireless lan, adsl, cable modem or dialup?"<>infocom<>chun zhang<>
5334<>2540_2<>yong liu:weibo gong:james f. kurose:r. moll:donald f. towsley<>on optimal routing with multiple traffic matrices<>infocom<>chun zhang<>
39448<>2541_0<>mohit gupta:song zhang 0002:sen wang:xianfeng gu:dimitris samaras:peisen huang<>high resolution tracking of non-rigid 3d motion of densely sampled data using harmonic maps<>iccv<>yang wang<>
39456<>2541_8<>dimitris samaras:lei zhang 0002:sen wang:mohit gupta<>face modeling and analysis in stony brook university<>cvpr<>yang wang<>
5311<>2544_1<>jinlong shu<>a note about shortest cycle covers<>dm<>cun-quan zhang<>
5312<>2544_2<>jinlong shu<>nowhere-zero 3-flows in products of graphs<>jgt<>cun-quan zhang<>
5323<>2544_13<>rui xu<>on flows in bidirected graphs<>dm<>cun-quan zhang<>
39472<>2545_11<>pankaj k. agarwal:sariel har-peled:nabil h. mustafa<>near-linear time approximation algorithms for curve simplification<>algorithmica<>yusu wang<>
39474<>2545_13<>pankaj k. agarwal:p. brown:herbert edelsbrunner:johannes rudolph<>coarse and reliable geometric alignment for protein docking<>psb<>yusu wang<>
5342<>2546_0<>shrisha rao<>safety and hazard analysis in concurrent systems<>pdcs<>chen zhang<>
39479<>2549_0<>song chun zhu:cheng-en guo:zijian xu<>what are textons?<>ijcv<>yizhou wang<>
39482<>2549_3<>siavosh bahrami:song chun zhu<>perceptual scale space and its applications<>iccv<>yizhou wang<>
16673<>2553_2<>donald jones:naveen gudigantala<>an investigation of cognitive antecedents to satisfaction using web-based decision spport systems<>icis<>jaeki song<>
18673<>2557_3<>abraham bachrach:chris harrelson:radu mihaescu:satish rao:apurva shah<>lower bounds for maximum parsimony with gene order data<>recomb<>kevin chen<>
21072<>2558_1<>haohai ma:zhe ji:weizhong shao<>towards the uml evaluation using taxonomic patterns on meta-classes<>qsic<>lu zhang<>
21073<>2558_2<>wei zhao:hong mei:jiasu sun<>requirements guided dynamic software clustering<>icsm<>lu zhang<>
21075<>2558_4<>minghui zhou:hong mei<>a multi-property trust model for reconfiguring component software<>qsic<>lu zhang<>
21076<>2558_5<>ying jiang:shan-shan hou:jinhui shan:bing xie<>contract-based mutation for testing components<>icsm<>lu zhang<>
21077<>2558_6<>dan hao:ying pan:wei zhao:hong mei:jiasu sun<>a similarity-aware approach to testing based fault localization<>kbse<>lu zhang<>
21078<>2558_7<>frans coenen:paul h. leng<>threshold tuning for improved classification association rule mining<>pakdd<>lu zhang<>
21057<>2562_1<>haizhou ai:shengjun xin:chang huang:shuichiro tsukiji:shihong lao<>robust face alignment based on local texture classifiers<>icip<>li zhang<>
21061<>2563_3<>chew lim tan<>warped image restoration with applications to digital libraries<>icdar<>li zhang<>
21062<>2563_4<>zheng zhang 0003:chew lim tan:tao xia<>3d geometric and optical modeling of warped document images from scanners<>cvpr<>li zhang<>
21065<>2563_7<>kok beng chu:yu zhang:chew lim tan<>a fast and stable approach for restoration of warped document images<>icdar<>li zhang<>
21066<>2563_8<>xing yu qi:chew lim tan<>motion deblurring for optical character recognition<>icdar<>li zhang<>
21015<>2565_0<>baoyindureng wu:zhao zhang<>the transformation graph  when =-++<>dm<>li zhang<>
21016<>2566_0<>xiaolin wu:paul bao<>real-time lossless compression of mosaic video sequences<>rti<>lei zhang<>
21021<>2566_5<>marko j. slyz<>a block-based inter-band lossless hyperspectral image compressor<>dcc<>lei zhang<>
21022<>2566_6<>xiaolin wu<>color demosaicking via directional linear minimum mean square-error estimation<>tip<>lei zhang<>
21029<>2566_13<>paul bao:xiaolin wu<>canny edge detection enhancement by scale multiplication<>pami<>lei zhang<>
21031<>2567_0<>christian glaser:aduri pavan:alan l. selman<>redundancy in complete sets<>eccc<>liyu zhang<>
21034<>2567_3<>christian glaser:alan l. selman<>survey of disjoint np-pairs and relations to propositional proof systems<>eccc<>liyu zhang<>
21040<>2568_1<>darko marinov:sarfraz khurshid:suhabe bugrara:martin c. rinard<>optimizations for compiling declarative models into boolean formulas<>sat<>lintao zhang<>
21049<>2568_10<>manuel costa:jon crowcroft:miguel castro:antony i. t. rowstron:lidong zhou:paul barham<>vigilante: end-to-end containment of internet worms<>sosp<>lintao zhang<>
21052<>2568_13<>nulo<>on subsumption removal and on-the-fly cnf simplification<>sat<>lintao zhang<>
21053<>2568_14<>lidong zhou:frank mcsherry:nicole immorlica:manuel costa:steve chien<>a first look at peer-to-peer worms: threats and defenses<>iptps<>lintao zhang<>
26735<>2576_2<>nulo<>perfect matchings of generalized polyomino graphs<>gc<>rong-si chen<>
33331<>2579_3<>ying wu<>decentralized multiple target tracking using netted collaborative autonomous trackers<>cvpr<>ting yu<>
33333<>2579_5<>ying wu:gang hua<>a statistical field model for pedestrian detection<>cvpr<>ting yu<>
33351<>2580_16<>keith irwin<>preventing attribute information leakage in automated trust negotiation<>ccs<>ting yu<>
33353<>2581_0<>jun-jang jeng<>model driven development of business process monitoring and control systems<>iceis<>tao yu<>
33354<>2581_1<>kwei-jay lin<>service selection algorithms for web services with end-to-end qos constraints<>isem<>tao yu<>
33355<>2581_2<>kwei-jay lin:haiyin lu:chia-en tai<>a reputation and trust management broker framework for web applications<>eee<>tao yu<>
33356<>2581_3<>kwei-jay lin<>service selection algorithms for composing complex services with multiple qos constraints<>icsoc<>tao yu<>
33359<>2581_6<>kwei-jay lin<>a broker-based framework for qos-aware web service composition<>eee<>tao yu<>
26993<>2585_0<>ion muslea:virginia dignum:daniel d. corkill:catholijn m. jonker:frank dignum:silvia coradeschi:alessandro saffiotti:dan fu:jeff orkin:william cheetham:kai goebel:piero p. bonissone:leen-kiat soh:robert e. wray iii:matthias scheutz:daniela pucci de farias:shie mannor:georgios theocharou:doina precup:bamshad mobasher:sarabjot s. anand:bettina berendt:andreas hotho:hans w. guesgen:michael t. rosenstein:mohammad ghavamzadeh<>the workshop program at the nineteenth national conference on artificial intelligence<>aim<>randolph m. jones<>
26958<>2588_0<>rayid ghani:dunja mladenic<>building minority language corpora by learning to generate web search queries<>kais<>rosie jones<>
26964<>2588_6<>hema raghavan:omid madani<>interactive feature selection<>ijcai<>rosie jones<>
26967<>2590_0<>luc moreau:peter dickman<>birrell's distributed reference listing revisited<>toplas<>richard jones<>
18495<>2591_0<>wenliang chen:muhua zhu:li zhang:tianshun yao<>improving domain dictionary-based text categorization using self-partition model<>ijcpol<>jingbo zhu<>
18496<>2591_1<>wenliang chen<>improving text categorization using domain knowledge<>nldb<>jingbo zhu<>
18500<>2591_5<>yongmei tan:yao tianshun:qing chen<>applying conditional random fields to chinese shallow parsing<>cicling<>jingbo zhu<>
18501<>2591_6<>na ye:xinzhi chang:wenliang chen:benjamin k. tsou<>using multiple discriminant analysis approach for linear text segmentation<>ijcnlp<>jingbo zhu<>
18494<>2596_2<>greg n. gregoriou:komlan sedzro<>hedge fund performance appraisal using data envelopment analysis<>eor<>joe zhu<>
18483<>2598_2<>steven c. h. hoi:michael r. lyu<>cuhk at imageclef 2005: cross-language and cross-media image retrieval<>clef<>jianke zhu<>
21110<>2599_0<>hazel everett:sylvain lazard:sylvain petitjean<>an experimental assessment of the 2d visibility complex<>cccg<>linqiao zhang<>
21111<>2600_0<>nulo<>guest editor's introduction<>algorithmica<>lisa zhang<>
21098<>2608_2<>matthew andrews:antonio fernandez:ashish goel<>source routing and scheduling in packet networks<>jacm<>lisa zhang<>
21104<>2611_1<>holger hermanns:david n. jansen<>logic and model checking for hidden markov models<>forte<>lijun zhang<>
20337<>2615_0<>david a. bacigalupo:stephen a. jarvis:daniel p. spooner:donna n. dillenberger:graham r. nudd<>an investigation into the application of different performance prediction methods to distributed enterprise applications<>tjs<>ligang he<>
20338<>2615_1<>stephen a. jarvis:daniel p. spooner:graham r. nudd<>the impact of predictive inaccuracies on execution scheduling<>pe<>ligang he<>
20342<>2615_5<>stephen a. jarvis:daniel p. spooner:david a. bacigalupo:guang tan:graham r. nudd<>mapping dag-based applications to multiclusters with background workload<>ccgrid<>ligang he<>
20343<>2615_6<>daniel p. spooner:junwei cao:stephen a. jarvis:graham r. nudd<>performance-aware workflow management for grid computing<>cj<>ligang he<>
20333<>2616_0<>weiping liao:joseph m. basile<>microarchitecture-level leakage reduction with data retention<>tvlsi<>lei he<>
20334<>2616_1<>fei li:yizhou lin:deming chen:jason cong<>power modeling and characteristics of field programmable gate arrays<>tcad<>lei he<>
20336<>2616_3<>weiping liao<>microarchitecture level interconnect modeling considering layout optimization<>jolpe<>lei he<>
37916<>2623_1<>weifeng chen:bruno f. ribeiro:kyoungwon suh:honggang zhang:edmundo de souza e silva:james f. kurose:donald f. towsley<>exploiting the ipid field to infer network path and end-system characteristics<>pam<>yong huang<>
37923<>2625_3<>tinglei zhao<>"maximum genus, connectivity and minimal degree of graphs."<>dm<>yuanqiu huang<>
37890<>2629_0<>xiangji huang<>using contextual information to improve retrieval performance<>grc<>yan rui huang<>
37893<>2629_3<>xiangji huang:miao wen<>a dual index model for contextual information retrieval<>sigir<>yan rui huang<>
37902<>2630_1<>shivajit mohapatra:nalini venkatasubramanian<>an energy-efficient middleware for supporting multimedia services in mobile grid environments<>itcc<>yun huang<>
19181<>2635_4<>louis l. yu:eric g. manning<>heuristic approaches to service level agreements in packet networks<>wine<>kin f. li<>
19182<>2635_5<>yali wang:shojiro nishio:wei yu<>a formal approach to evaluate and compare internet search engines: a case study on searching the chinese web<>apweb<>kin f. li<>
19147<>2636_0<>ching-hsien hsu:guan-hao lin:chao-tung yang<>localization techniques for cluster-based data grid<>ica3pp<>kuan-ching li<>
19150<>2636_3<>shih-chang chen:ching-hsien hsu:chao-yang lan:chao-tung yang<>efficient communication scheduling methods for irregular data redistribution in parallelizing compilers<>pact<>kuan-ching li<>
19151<>2636_4<>ching-hsien hsu:shih-chang chen:chao-tung yang<>optimizations of data distribution localities in cluster grid environments<>iccsa<>kuan-ching li<>
19152<>2636_5<>chao-tung yang:chun-hsiang chen:ching-hsien hsu<>performance analysis of applying replica selection technology for data grid environments<>pact<>kuan-ching li<>
19155<>2636_8<>chao-tung yang:po-chi shih<>a high-performance computational resource broker for grid computing environments<>aina<>kuan-ching li<>
19156<>2636_9<>hsun-chang chang:yaw-ling lin:chao-tung yang:hsiao-hsi wang:liang-teh lee<>performance issues of grid computing based on different architecture cluster computing platforms<>aina<>kuan-ching li<>
19157<>2636_10<>chao-tung yang:kuan-wei cheng<>an enhanced parallel loop self-scheduling scheme for cluster environments<>aina<>kuan-ching li<>
19160<>2636_13<>chao-tung yang:kuan-wei cheng<>an enhanced parallel loop self-scheduling scheme for cluster environments<>tjs<>kuan-ching li<>
19162<>2636_15<>ssu-hsuan lu:chun-chieh yang:hsiao-hsi wang<>on design of agent home scheme for prefetching strategy in dsm systems<>aina<>kuan-ching li<>
19165<>2636_18<>hsun-chang chang:chao-tung yang:li-jen chang:hsiang-yao cheng:liang-teh lee<>implementation of visuel mpi parallel program performance analysis tool for cluster environments<>aina<>kuan-ching li<>
19168<>2636_21<>ching-hsien hsu:shih-chang chen:chao-yang lan:chao-tung yang<>scheduling convex bipartite communications toward efficient gen_block transformations<>ispa<>kuan-ching li<>
19169<>2636_22<>chao-tung yang:i-hsien yang:ching-hsien hsu<>a recursive-adjustment co-allocation scheme in data grid environments<>ica3pp<>kuan-ching li<>
19171<>2636_24<>hsiao-hsi wang:kuo-jen wang:ssu-hsuan lu:chun-chieh yang<>load balancing design issues on prefetch-based dsm systems<>appt<>kuan-ching li<>
19176<>2636_29<>chao-tung yang:shu-tzu tsai<>decision tree construction for data mining on grid computing environments<>aina<>kuan-ching li<>
19187<>2638_2<>nulo<>topological characteristics of random multihop wireless networks<>cluster<>keqin li<>
19190<>2638_5<>nulo<>scheduling dags with random parallel tasks on binarily partitionable systems<>paapp<>keqin li<>
19195<>2638_10<>nulo<>design and analysis of asymptotically optimal randomized tree embedding algorithms in static networks<>pe<>keqin li<>
19196<>2638_11<>nulo<>job scheduling and processor allocation for grid computing on metacomputers<>jpdc<>keqin li<>
12019<>2642_0<>yonggen gu:yuxi fu:farong zhong<>a generic model for analyzing security protocols<>mmmacns<>han zhu<>
19209<>2644_2<>siddhartha chattopadhyay:suchendra m. bhandarkar<>efficient compression and delivery of stored motion data for avatar animation in resource constrained devices<>vrst<>kang li<>
19212<>2647_0<>takeo kanade<>tracking of migrating and proliferating cells in phase-contrast microscopy imagery for tissue engineering<>cvbia<>kang li<>
19213<>2647_1<>xiaodong wu:danny z. chen:milan sonka<>the layered net surface problems in discrete geometry and medical image segmentation<>isaac<>kang li<>
19216<>2647_4<>steven millington:xiaodong wu:danny z. chen:milan sonka<>simultaneous segmentation of multiple closed surfaces using optimal graph searching<>ipmi<>kang li<>
19217<>2648_0<>hang cui:renxu sun:min-yen kan:tat-seng chua<>question answering passage retrieval using dependency relations<>sigir<>keya li<>
22164<>2654_0<>hartmut ehrig:benjamin braatz:fernando orejas:sonia perez:elvira pino<>object-oriented connector-component architectures<>entcs<>markus klein<>
36790<>2657_0<>jacques froment<>constrained total variation minimization and application in computerized tomography<>emmcvpr<>xiao-qun zhang<>
11643<>2666_0<>betty salzberg:gregory c. sharp:steve b. jiang:hiroki shirato:david r. kaeli<>subsequence matching on structured time series data<>sigmod<>huanmei wu<>
9372<>2674_17<>jose luis ambite:vinay k. chaudhri:richard fikes:jessica jenkins:sunil mishra:maria muslea:tomas e. uribe<>integration of heterogeneous knowledge sources in the calo query manager<>otm<>guizhen yang<>
9379<>2675_3<>volker j. schmid:brandon j. whitcher:n. jane taylor:anwar r. padhani<>statistical analysis of pharmacokinetic models in dynamic contrast-enhanced magnetic resonance imaging<>miccai<>guang-zhong yang<>
9393<>2675_17<>danail stoyanov:george p. mylonas:fani deligianni:ara darzi<>soft-tissue motion tracking and structure estimation for robotic assisted mis procedures<>miccai<>guang-zhong yang<>
9399<>2675_23<>danail stoyanov:ara darzi<>laparoscope self-calibration for robotic assisted minimally invasive surgery<>miccai<>guang-zhong yang<>
9401<>2675_25<>su-lin lee:ara darzi<>subject specific finite element modelling of the levator ani<>miccai<>guang-zhong yang<>
9402<>2675_26<>adrian james chung:fani deligianni:xiao-peng hu<>extraction of visual features with eye tracking for saliency driven 2d/3d registration<>ivc<>guang-zhong yang<>
9407<>2677_1<>ling-jyh chen:tony sun:mario gerla:m. y. sanadidi<>real-time streaming over wireless links: a comparative study<>iscc<>guang yang<>
9411<>2677_5<>ren wang:mario gerla:m. y. sanadidi<>tcp bulk repeat<>comcom<>guang yang<>
9413<>2677_7<>ling-jyh chen:tony sun:m. y. sanadidi:mario gerla<>end-to-end asymmetric link capacity estimation<>networking<>guang yang<>
9414<>2677_8<>mario gerla:ling-jyh chen:yeng-zhong lee:biao zhou:jiwei chen:shirshanka das<>dealing with node mobility in ad hoc wireless network<>sfm<>guang yang<>
11619<>2679_0<>binoy ravindran:e. douglas jensen<>"energy-efficient, utility accrual real-time scheduling under the unimodal arbitrary arrival model."<>date<>haisang wu<>
11623<>2679_4<>binoy ravindran:e. douglas jensen:peng li<>time/utility function decomposition techniques for utility accrual scheduling algorithms in real-time distributed systems<>tc<>haisang wu<>
11625<>2679_6<>umut balli:binoy ravindran:e. douglas jensen<>utility accrual real-time scheduling under variable cost functions<>rtcsa<>haisang wu<>
11635<>2680_4<>anant utgikar:nian-feng tzeng<>syn-mac: a distributed medium access control protocol for synchronized wireless networks<>monet<>hongyi wu<>
11639<>2681_2<>fenglou mao:victor olman:ying xu<>accurate prediction of orthologous gene groups in microbes<>csb<>hongwei wu<>
30993<>2683_25<>todd eisworth<>successors of singular cardinals and coloring theorems i<>aml<>saharon shelah<>
31003<>2683_35<>nulo<>two cardinals models with gap one revisited<>mlq<>saharon shelah<>
31006<>2683_38<>gabor sagi<>on topological properties of ultraproducts of finite sets<>mlq<>saharon shelah<>
31008<>2683_40<>jouko a. vaananen<>a note on extensions of infinitary logic<>aml<>saharon shelah<>
31039<>2683_71<>pater komjath<>finite subgraphs of uncountably chromatic graphs<>jgt<>saharon shelah<>
31088<>2683_120<>nulo<>middle diamond<>aml<>saharon shelah<>
23863<>2684_6<>s. shaheen fatima:nicholas r. jennings<>a comparative study of game theoretic and evolutionary models of bargaining for software agents<>air<>michael wooldridge<>
23864<>2684_7<>s. shaheen fatima:nicholas r. jennings<>an analysis of the shapley value and its uncertainty for the voting game<>eumas<>michael wooldridge<>
23866<>2684_9<>s. shaheen fatima:nicholas r. jennings<>an analysis of the shapley value and its uncertainty for the voting game<>atal<>michael wooldridge<>
23874<>2684_17<>wiebe van der hoek<>"on the dynamics of delegation, cooperation, and control: a logical account."<>atal<>michael wooldridge<>
23878<>2684_21<>paul e. dunne:michael laurence<>the complexity of contract negotiation<>ai<>michael wooldridge<>
23885<>2684_28<>wiebe van der hoek<>on obligations and normative ability: towards a logical analysis of the social contract<>japll<>michael wooldridge<>
23910<>2684_53<>paul e. dunne<>the complexity of agent design problems: determinism and history dependence<>amai<>michael wooldridge<>
23914<>2684_57<>s. shaheen fatima:nicholas r. jennings<>sequential auctions for objects with common and private values<>atal<>michael wooldridge<>
23919<>2684_62<>valentina a. m. tamma:chris aart:thierry moyaux:shamimabi paurobally:ben lithgow smith<>an ontological framework for dynamic coordination<>semweb<>michael wooldridge<>
23924<>2684_67<>s. shaheen fatima:nicholas r. jennings<>bargaining with incomplete information<>amai<>michael wooldridge<>
23940<>2684_83<>jonathan himoff:petr skobelev<>magenta technology: multi-agent systems for industrial logistics<>atal<>michael wooldridge<>
23945<>2684_88<>wiebe van der hoek:mark roberts<>knowledge and social laws<>atal<>michael wooldridge<>
23956<>2684_99<>wiebe van der hoek:wojciech jamroga<>a logic for strategic reasoning<>atal<>michael wooldridge<>
23959<>2684_102<>valentina a. m. tamma:ian blacoe:ben lithgow smith<>introducing autonomic behaviour in semantic web agents<>semweb<>michael wooldridge<>
36826<>2689_2<>yuelin li<>an exploratory study on knowledge sharing in information retrieval<>hicss<>xiangmin zhang<>
36839<>2690_1<>songqing chen:ravi s. sandhu<>enhancing data authenticity and integrity in p2p systems<>internet<>xinwen zhang<>
36831<>2691_0<>xiaowo wang:jing zhang:fei li:jin gu:tao he:yanda li<>microrna identification based on sequence and structure alignment<>bioinformatics<>xuegong zhang<>
36834<>2691_3<>keyue ding:jing zhang:kaixin zhou:yan shen<>htsnper1.0: software for haplotype block partition and htsnps selection<>bmcbi<>xuegong zhang<>
21284<>2694_0<>sven verdoolaege:kristof beyls:francky catthoor<>experiences with enumeration of integer projections of parametric polytopes<>cc<>maurice bruynooghe<>
36815<>2696_0<>katarzyna keahey:ian t. foster:timothy freeman:daniel galron<>virtual workspaces in the grid<>europar<>xuehai zhang<>
36819<>2696_4<>katarzyna keahey:ian t. foster:timothy freeman<>virtual workspaces: achieving quality of service and quality of life in the grid<>sp<>xuehai zhang<>
36800<>2697_6<>song jiang<>token-ordered lru: an effective page replacement policy and its implementation in linux systems<>pe<>xiaodong zhang<>
36801<>2697_7<>xin chen<>coordinated data prefetching for web contents<>comcom<>xiaodong zhang<>
36803<>2697_9<>lei guo:songqing chen:zhen xiao<>analysis of multimedia workloads with implications for internet streaming<>www<>xiaodong zhang<>
36808<>2697_14<>song jiang:feng chen<>clock-pro: an effective improvement of the clock replacement<>usenix<>xiaodong zhang<>
36810<>2697_16<>zhichun zhu<>look-ahead architecture adaptation to reduce processor power consumption<>micro<>xiaodong zhang<>
36820<>2702_0<>george f. riley<>performance of routing protocols in very large-scale mobile wireless ad hoc networks<>mascots<>xin zhang<>
36822<>2702_2<>george f. riley<>an on-demand bluetooth scatternet formation and routing protocol for wireless sensor networks<>snpd<>xin zhang<>
36823<>2704_0<>juan feng<>price cycles in online advertising auctions<>icis<>xiaoquan zhang<>
1818<>2706_2<>nandan paramesh:pradeep kumar ray<>similarity and logic based ontology mapping for security management<>flairs<>alfred ka yiu wong<>
3027<>2709_4<>yunan chen:russell c. maulitz<>understanding the evolution of nsaid: a knowledge domain visualization approach to evidence-based medicine<>iv<>chaomei chen<>
3028<>2709_5<>kenneth r. allendoerfer:serge aluker:gulshan panjwani:jason m. proctor:david sturtz:mirjana vukovic<>adapting the cognitive walkthrough method to assess the usability of a knowledge domain visualization<>infovis<>chaomei chen<>
3029<>2709_6<>katy borner<>from spatial proximity to semantic coherence: a quantitative approach to the study of group dynamics in collaborative virtual environments<>presence<>chaomei chen<>
3035<>2709_12<>nulo<>the centrality of pivotal points in the evolution of scientific networks<>iui<>chaomei chen<>
3039<>2709_16<>nulo<>measuring the quality of network visualization<>jcdl<>chaomei chen<>
3042<>2709_19<>nulo<>top 10 unsolved information visualization problems<>cga<>chaomei chen<>
13118<>2714_0<>anna nagurney:jose cruz:ding zhang<>"supply chain networks, electronic commerce, and supply side and demand side risk."<>eor<>june dong<>
13116<>2716_2<>robert jonathan:helen boussalis:charles liu:khosrow rad<>modeling of end-to-end transmission of astronomical images over lossy network<>ic<>jane dong<>
36851<>2717_0<>kaushik sinha:ruoming jin:gagan agrawal<>learning layouts of biological datasets semi-automatically<>dils<>xuan zhang<>
36853<>2717_2<>kaushik sinha:ruoming jin:gagan agrawal<>using data mining techniques to learn layouts of flat-file biological datasets<>bibe<>xuan zhang<>
13097<>2718_7<>shanguo chen:jun-jang jeng<>event-based blackboard architecture for multi-agent systems<>itcc<>jing dong<>
13100<>2718_10<>jun kong:kang zhang:guang-lei song<>a generative style-driven framework for software architecture design<>sew<>jing dong<>
3081<>2719_5<>hongwei xi<>meta-programming through typeful code representation<>jfp<>chiyan chen<>
3083<>2719_7<>hongwei xi<>combining programming with theorem proving<>icfp<>chiyan chen<>
13071<>2721_8<>hai wang:jing sun<>reasoning support for swrl-fol using alloy<>seke<>jin song dong<>
13076<>2721_13<>jun sun<>synthesis of distributed processes from scenario-based specifications<>fm<>jin song dong<>
13080<>2721_17<>dorel lucanu:yuan-fang li<>soundness proof of z semantics of owl using institutions<>www<>jin song dong<>
13085<>2721_22<>r. duke:p. hao<>integrating object-z with timed automata<>iceccs<>j. s. dong<>
13086<>2721_23<>hai wang:jing sun:yuan-fang li<>tcoz approach to owl-s process model design<>seke<>jin song dong<>
13089<>2721_26<>ping hao:brendan p. mahony<>formal designs for embedded and hybrid systems<>ijseke<>jin song dong<>
3092<>2724_5<>norberto de la cruz:susan bromberg:dean pasko:mary shimoyama:simon n. twigger:jiali chen:chunyu fan:cindy foote:gopal r. gopinath:glenn harris:aubrey hughes:yuan ji:weihong jin:dawei li:jedidiah mathis:natalya nenasheva:jeff nie:rajni nigam:victoria petri:dorothy reilly:weiye wang:wenhua wu:angela zuniga-meyer:lan zhao:anne e. kwitek:peter j. tonellato:howard j. jacob<>the rat genome database (rgd): developments towards a phenome database<>nar<>chin-fu chen<>
36860<>2725_0<>tahsin m. kurc:umit v. uatalyurek:joel h. saltz:ryan martino:mary f. wheeler:malgorzata peszynska:alan sussman:christian hansen:mrinal k. sen:roustam seifoullaev:paul l. stoffa:carlos torres-verdin:manish parashar<>"a simulation and data analysis system for large-scale, data-driven oil reservoir simulation studies."<>concurrency<>xi zhang<>
8887<>2734_3<>radu a. paun<>membrane computing as a framework for modeling economic processes<>synasc<>gheorghe paun<>
8914<>2734_30<>maurice margenstern:yurii rogozhin:sergey verlan<>context-free insertion-deletion systems<>tcs<>gheorghe paun<>
8930<>2734_46<>shankara narayanan krishna<>p systems with mobile membranes<>nc<>gheorghe paun<>
2787<>2736_0<>danny z. chen:michiel h. m. smid<>geometric algorithms for density-based data clustering<>ijcga<>bin xu<>
2775<>2738_1<>nulo<>on edge domination numbers of graphs<>dm<>baogen xu<>
2766<>2739_1<>lusheng wang<>decomposing toroidal graphs into circuits and edges<>dam<>baogang xu<>
2772<>2739_7<>nulo<>minimally circular-imperfect graphs with a major vertex<>dm<>baogang xu<>
7257<>2744_0<>nulo<>scaling the kowari metastore<>wise<>david wood<>
7189<>2747_3<>jan kara:jan kratochvil<>on the complexity of the balanced vertex ordering problem<>cocoon<>david r. wood<>
7192<>2747_6<>vida dujmovic:pat morin<>layout of graphs with bounded tree-width<>siamcomp<>david r. wood<>
7193<>2747_7<>jan kara:attila por<>on the chromatic number of the visibility graph of a set of points in the plane<>dcg<>david r. wood<>
7197<>2747_11<>therese c. biedl:timothy m. chan:yashar ganjali:mohammad taghi hajiaghayi<>balanced vertex-orderings of graphs<>dam<>david r. wood<>
7214<>2747_28<>prosenjit bose:vida dujmovic<>induced subgraphs of bounded degree and bounded treewidth<>wg<>david r. wood<>
7225<>2747_39<>vida dujmovic<>graph treewidth and geometric thickness parameters<>gd<>david r. wood<>
7226<>2747_40<>nulo<>grid drawings of -colourable graphs<>comgeo<>david r. wood<>
7230<>2747_44<>erik d. demaine:francisco gomez-martin:henk meijer:david rappaport:perouz taslakian:godfried t. toussaint:terry winograd<>the distance geometry of deep rhythms and scales<>cccg<>david r. wood<>
7167<>2750_14<>michael r. marty:jesse d. bingham:mark d. hill:alan j. hu:milo m. k. martin<>improving multiple-cmp systems using token coherence<>hpca<>david a. wood<>
14304<>2752_0<>jinwei cao:ming lin:janna m. crews:judee k. burgoon<>virtual interaction for effective e-learning<>icis<>jay f. nunamaker jr.<>
36872<>2756_2<>keshab k. parhi<>fast factorization architecture in soft-decision reed-solomon decoding<>tvlsi<>xinmiao zhang<>
39765<>2765_0<>nulo<>speech melody as articulatorily implemented communicative functions<>speech<>yi xu<>
39747<>2766_4<>nulo<>monomial orthogonal polynomials of several variables<>jat<>yuan xu<>
39740<>2767_2<>yannis papakonstantinou<>efficient keyword search for smallest lcas in xml databases<>sigmod<>yu xu<>
39741<>2767_3<>kevin s. beyer:donald d. chamberlin:latha s. colby:fatma ozcan:hamid pirahesh<>extending xquery for analytics<>sigmod<>yu xu<>
31103<>2771_0<>harkirat singh<>smart-aloha for multi-hop wireless networks<>monet<>suresh singh<>
31105<>2771_2<>mark d. yarvis:nandakishore kushalnagar:harkirat singh:anand rangarajan:york liu<>exploiting heterogeneity in sensor networks<>infocom<>suresh singh<>
31107<>2773_1<>matthew r. rudary:david wingate<>predictive linear-gaussian models of stochastic dynamical systems<>uai<>satinder p. singh<>
31120<>2773_14<>doina precup:richard s. sutton:cosmin paduraru:anna koop<>off-policy learning with options and recognizers<>nips<>satinder p. singh<>
31125<>2773_19<>britton wolfe:michael r. james<>learning predictive state representations in dynamical systems without reset<>icml<>satinder p. singh<>
31131<>2773_25<>yevgeniy vorobeychik:michael p. wellman<>learning payoff functions in infinite games<>ijcai<>satinder p. singh<>
31158<>2773_52<>michael r. james<>planning in models that combine memory with predictive representations of state<>aaai<>satinder p. singh<>
31159<>2773_53<>michael r. james:britton wolfe<>combining memory and landmarks with predictive state representations<>ijcai<>satinder p. singh<>
31189<>2776_0<>maneesha singh:derek partridge<>parameter optimization for image segmentation algorithms: a systematic approach<>icapr<>sameer singh<>
31199<>2776_10<>maneesha singh<>image enhancement optimization for hand-luggage screening at airports<>icapr<>sameer singh<>
31201<>2778_0<>reynold cheng:sunil prabhakar<>u-dbms: a database system for managing constantly-evolving data<>vldb<>sarvjeet singh<>
31204<>2790_0<>margaret jackson:jenny waycott:jenine p. beekhuyzen<>downloading vs purchase: music industry vs consumers<>drmtics<>supriya singh<>
31205<>2790_1<>margaret jackson:jenine p. beekhuyzen:jennifer waycott<>"drms, fair use and users' experience of sharing music."<>drm<>supriya singh<>
41234<>2795_0<>jie tang:hang li:yunbo cao<>email data cleaning<>kdd<>zhaohui tang<>
10533<>2796_0<>john h. gennari:peter mork<>knowledge transformations between frame systems and rdb systems<>kcap<>hao li<>
13466<>2797_0<>xiaowo wang:jing zhang:fei li:tao he:xuegong zhang:yanda li<>microrna identification based on sequence and structure alignment<>bioinformatics<>jin gu<>
3145<>2803_1<>bo xie:ling chen:gencai chen<>statistical feature selection for mandarin speech emotion recognition<>icic<>chun chen<>
3146<>2803_2<>bo xie:ling chen:gencai chen<>emoears: an emotion recognition system for mandarin speech<>cis<>chun chen<>
3150<>2805_0<>george a. mihaila:sriram padmanabhan:isabelle rouvellou<>query translation scheme for heterogeneous xml data sources<>widm<>cindy x. chen<>
32378<>2809_1<>chen-feng chang:yao-wen chang:sao-jie chen<>multilevel full-chip routing for the x-based architecture<>dac<>tsung-yi ho<>
3126<>2814_0<>nulo<>thai's invaluable memory celebrated via<>icadl<>ching-chih chen<>
3127<>2814_1<>howard d. wactlar:james ze wang:kevin kiernan<>digital imagery for significant cultural and historical materials<>jodl<>ching-chih chen<>
3128<>2814_2<>takashi nagatsuka<>" offers new innovative access to tsurumi's old japanese waka poems and tales, and maps ."<>icadl<>ching-chih chen<>
3118<>2816_0<>jacqueline chame:mary w. hall<>combining models and guided empirical search to optimize for multiple levels of the memory hierarchy<>cgo<>chun chen<>
3120<>2816_2<>jacqueline chame:mary w. hall:kristina lerman<>a systematic approach to model-guided empirical search for memory hierarchy optimization<>lcpc<>chun chen<>
3116<>2817_2<>yiming li<>parallelization of multiple genome alignment<>hpcc<>cheng-kai chen<>
3140<>2823_0<>rong-an shang:yen-chieh yu<>assessing the effectiveness of online asynchronous case method<>icalt<>charlie c. chen<>
3137<>2825_0<>eylem ekici<>a routing protocol for hierarchical leo/meo satellite ip networks<>winet<>chao chen<>
3134<>2827_3<>jen-hao hsiao:jenq-haur wang:ming-syan chen:lee-feng chien<>constructing a wrapper-based drm system for digital content protection in digital libraries<>icadl<>chu-song chen<>
3136<>2828_1<>nansheng chen:todd w. harris:igor antoshechkin:carol bastiani:tamberlyn bieri:darin blasiar:keith bradnam:payan canaran:juancarlos chan:wen j. chen:fiona cunningham:paul davis:eimear kenny:ranjana kishore:daniel lawson:raymond lee:hans-michael muller:cecilia nakamura:shraddha pai:philip ozersky:andrei petcherski:anthony rogers:aniko sabo:erich m. schwarz:kimberly van auken:qinghua wang:richard durbin:john spieth:paul w. sternberg:lincoln d. stein<>wormbase: a comprehensive data resource for  biology and genomics<>nar<>chao-kung chen<>
21890<>2834_0<>kevin m. indrebo:richard j. povinelli<>third-order moments of filtered speech signals for robust speech recognition<>nolisp<>michael t. johnson<>
34049<>2837_13<>j. zhou<>on short zero-sum subsequences<>arscom<>weidong gao<>
21896<>2838_0<>siwei lyu:hany farid<>steganalysis of recorded speech<>sswmc<>micah k. johnson<>
28065<>2842_3<>jaime miranda:ricardo montoya<>linear penalization support vector machines for feature selection<>premi<>richard weber<>
28068<>2842_6<>fernando crespo<>a methodology for dynamic data mining based on fuzzy clustering<>fss<>richard weber<>
28071<>2843_1<>jason m. proctor<>systematically evolving configuration parameters for computational intelligence methods<>premi<>rosina weber<>
28073<>2843_3<>ilya waldstein:amit deshpande:jason m. proctor<>integrated approach to detect inconspicuous contents<>wm<>rosina weber<>
28075<>2843_5<>maria-cleci martins<>modeling preferences online<>webist<>rosina weber<>
28076<>2843_6<>ilya waldstein:amit deshpande:jason m. proctor<>integrated approach to detect inconspicuous content<>wm<>rosina weber<>
28080<>2843_10<>jason m. proctor:ilya waldstein<>identifying facts for tcbr<>iccbr<>rosina weber<>
28096<>2845_4<>ramesh sharda:nicolas ducheneaut:j. zhao:ashish gupta<>e-mail management: a techno-managerial research perspective<>icis<>ron weber<>
21881<>2847_0<>nulo<>spatial decision support for assisted housing mobility counseling<>dss<>michael p. johnson<>
6161<>2853_0<>prasad kulkarni:stephen hines:david b. whalley:jason hiser:jack w. davidson<>fast and efficient searches for effective optimization-phase sequences<>taco<>douglas l. jones<>
21851<>2854_13<>eugene charniak<>coarse-to-fine n-best parsing and maxent discriminative reranking<>acl<>mark johnson<>
4938<>2857_0<>zhang-zhi hu:meenakshi narayanaswamy:k. e. ravikumar:k. vijay-shanker<>literature mining and database annotation of protein phosphorylation using a rule-based system<>bioinformatics<>cathy h. wu<>
4959<>2857_21<>amos bairoch:rolf apweiler:winona c. barker:brigitte boeckmann:serenella ferro:elisabeth gasteiger:hongzhan huang:rodrigo lopez:michele magrane:maria j. martin:darren a. natale:claire o'donovan:nicole redaschi:lai-su l. yeh<>the universal protein resource (uniprot)<>nar<>cathy h. wu<>
4965<>2863_0<>jung-ning huang:pi-fuei hsieh<>vision-based recognition of hand shapes in taiwanese sign language<>acii<>chung-hsien wu<>
4968<>2863_3<>shi-hou lin:pi-fuei hsieh<>facial phoneme extraction for taiwanese sign language recognition<>acii<>chung-hsien wu<>
4969<>2863_4<>chia-shiuan cheng:pi-fuei hsieh<>hand motion recognition for the vision-based taiwanese sign language interpretation<>acii<>chung-hsien wu<>
6187<>2864_0<>oswaldo cadenas:graham m. megson<>implementation of a block based neural branch predictor<>dsd<>daniel jones<>
6188<>2864_1<>oswaldo cadenas:graham m. megson<>a new organization for a perceptron-based branch predictor and its fpga implementation<>isvlsi<>daniel jones<>
6189<>2864_2<>oswaldo cadenas:graham m. megson<>fpga organization for the fast path-based neural branch predictor<>fpt<>daniel jones<>
4981<>2865_0<>c. c. jay kuo<>design of integrated multimedia compression and encryption systems<>tmm<>chung-ping wu<>
4975<>2867_2<>nulo<>on the independence of boolean functions<>ijcm<>chuan-kun wu<>
4976<>2867_3<>nulo<>hash channels<>compsec<>chuan-kun wu<>
38078<>2869_6<>yu-seung ma:jeff offutt<>mujava: an automated class mutation system<>stvr<>yong rae kwon<>
38105<>2872_0<>kirill mechitov:sameer sundresh:wooyoung kim:gul a. agha<>resilient localization for sensor networks in outdoor environments<>icdcs<>youngmin kwon<>
38109<>2872_4<>gul a. agha<>iltlchecker: a probabilistic model checker for multiple dtmcs<>qest<>youngmin kwon<>
38111<>2874_1<>jae-gon lee:wooseung yang:young-il kim:chong-min kyung<>simulation acceleration of transaction-level models for soc with rtl sub-blocks<>aspdac<>young-su kwon<>
38112<>2874_2<>chong-min kyung<>performance-driven event-based synchronization for multi-fpga simulation accelerator with event time-multiplexing bus<>tcad<>young-su kwon<>
38116<>2874_6<>c.-m. kyung<>"atomi: an algorithm for circuit partitioning into multiple fpgas using time-multiplexed, off-chip, multicasting interconnection architecture."<>tvlsi<>y.-s. kwon<>
38118<>2874_8<>payam lajevardi:anantha p. chandrakasan:frank honore:donald e. troxel<>a 3-d fpga wire resource prediction model validated using a 3-d placement and routing tool<>slip<>young-su kwon<>
38122<>2875_0<>byung ro moon<>nonlinear feature extraction using a neuro genetic hybrid<>gecco<>yung-keun kwon<>
38125<>2875_3<>sung-soon choi:byung ro moon<>stock prediction based on financial correlation<>gecco<>yung-keun kwon<>
2029<>2877_0<>pradeep sen:gaurav garg:stephen r. marschner:mark horowitz:marc levoy:hendrik p. a. lensch<>dual photography<>tog<>billy chen<>
2030<>2877_1<>eyal ofek:heung-yeung shum:marc levoy<>interactive deformation of light fields<>si3d<>billy chen<>
10492<>2878_0<>keshu zhang:tao jiang<>the regularized em algorithm<>aaai<>haifeng li<>
10487<>2883_0<>emmitt r. jolly:chen-shan chin:ira herskowitz<>genome-wide identification of the regulatory targets of a transcription factor using biochemical characterization and computational genomic analysis<>bmcbi<>hao li<>
10483<>2884_2<>jinyan li<>using fixed point theorems to model the binding in protein-protein interactions<>tkde<>haiquan li<>
10484<>2884_3<>jinyan li:limsoon wong:mengling feng:yap-peng tan<>relative risk and odds ratio: a data mining perspective<>pods<>haiquan li<>
10485<>2884_4<>jinyan li:donny soh:limsoon wong<>a correspondence between maximal complete bipartite subgraphs and closed patterns<>pkdd<>haiquan li<>
10486<>2884_5<>jinyan li<>discovery of stable and significant binding motif pairs from pdb complexes and protein interaction datasets<>bioinformatics<>haiquan li<>
10476<>2886_1<>tao li:xiaojie liu<>a new model for dynamic intrusion detection<>cans<>hongbin li<>
10467<>2888_0<>han-ying kao<>a diagnostic reasoning and optimal treatment model for bacterial infections with fuzzy information<>cmpb<>han-lin li<>
10469<>2888_2<>han-ying kao<>constrained abductive reasoning with fuzzy parameters in bayesian networks<>cor<>han-lin li<>
10472<>2888_5<>chang-jui fu<>a linear programming approach for identifying a consensus sequence on dna sequences<>bioinformatics<>han-lin li<>
37585<>2889_3<>taewhan kim:hwansoo han<>memory layout techniques for variables utilizing efficient dram access modes in embedded system design<>tcad<>yoonseo choi<>
10463<>2890_0<>li teng:wenbin chen:i-fan shen<>supervised learning on local tangent space<>isnn<>hongyu li<>
10464<>2890_1<>li teng:xuping fu:wenbin chen:i-fan shen<>dimension reduction of microarray data based on local tangent space alignment<>IEEEicci<>hongyu li<>
10465<>2890_2<>yunhua hu:yunbo cao:dmitriy meyerzon:qinghua zheng<>automatic extraction of titles from general documents using machine learning<>jcdl<>hang li<>
37594<>2891_2<>naehyuck chang:taewhan kim<>dc-dc converter-aware power management for battery-operated embedded systems<>dac<>yongseok choi<>
10460<>2892_0<>jiang gui<>threshold gradient descent method for censored data regression with applications in pharmacogenomics<>psb<>hongzhe li<>
10462<>2892_2<>jiang gui<>"penalized cox regression analysis in the high-dimensional and low-sample size settings, with applications to microarray gene expression data."<>bioinformatics<>hongzhe li<>
37596<>2893_0<>claire cardie:ellen riloff:siddharth patwardhan<>identifying sources of opinions with conditional random fields and extraction patterns<>naacl<>yejin choi<>
37598<>2893_2<>theresa wilson:paul hoffmann:swapna somasundaran:jason kessler:janyce wiebe:claire cardie:ellen riloff:siddharth patwardhan<>opinionfinder: a system for subjectivity analysis<>naacl<>yejin choi<>
10459<>2894_1<>yang xiao:c. l. philip chen:bin wang:yi pan<>proportional degradation services in wireless/mobile adaptive multimedia networks<>wicomm<>haizhon li<>
36675<>2896_1<>zvi m. kedem<>a distributed adaptive cache update algorithm for the dynamic source routing protocol<>infocom<>xin yu<>
36666<>2898_0<>ken q. pu:nick koudas<>monitoring k-nearest neighbor queries over moving objects<>icde<>xiaohui yu<>
36667<>2898_1<>calisto zuzarte:kenneth c. sevcik<>towards estimating the number of distinct value combinations for a set of attributes<>cikm<>xiaohui yu<>
36670<>2899_0<>fernando a. das neves:edward a. fox<>hard queries can be addressed with query splitting plus stepping stones and pathways<>debu<>xiaoyan yu<>
36639<>2900_0<>robin thomas:wenan zang<>hamilton paths in toroidal graphs<>jct<>xingxing yu<>
36640<>2900_1<>sean curran:orlando lee<>chain decompositions of 4-connected graphs<>siamdm<>xingxing yu<>
36642<>2900_3<>jozsef balogh:martin kochol:andras pluhar<>covering planar graphs with forests<>jct<>xingxing yu<>
36649<>2900_10<>sean curran:orlando lee<>nonseparating planar chains in 4-connected graphs<>siamdm<>xingxing yu<>
36651<>2900_12<>nulo<>"infinite paths in planar graphs ii, structures and ladder nets."<>jgt<>xingxing yu<>
26100<>2903_2<>xiaoyong chai<>multiple-goal recognition from low-level signals<>aaai<>qiang yang<>
26103<>2903_5<>rong pan:jeffrey junfeng pan:lei li<>competence driven case-base mining<>aaai<>qiang yang<>
26111<>2903_13<>jie yin:dou shen:ze-nian li<>activity recognition through goal-based segmentation<>aaai<>qiang yang<>
26124<>2903_26<>lionel m. ni:yanmin zhu:jian ma:minglu li:qiong luo:yunhao liu:s. c. cheung<>semantic sensor net: an extensible framework<>iccnmc<>qiang yang<>
26128<>2903_30<>jie yin<>integrating hidden markov models and spectral analysis for sensory time series clustering<>icdm<>qiang yang<>
26129<>2903_31<>jun yan:qiansheng cheng:benyu zhang<>an incremental subspace learning algorithm to categorize large scale text data<>apweb<>qiang yang<>
26142<>2903_44<>jian-tao sun:dou shen:hua-jun zeng:yuchang lu:zheng chen<>web-page summarization using clickthrough data<>sigir<>qiang yang<>
26150<>2903_52<>ke wang:senqiang zhou:jack man shun yeung<>mining customer value: from association rules to direct marketing<>datamine<>qiang yang<>
26151<>2903_53<>dong zhuang:benyu zhang:jun yan:zheng chen:ying chen<>efficient text classification by weighted proximal svm<>icdm<>qiang yang<>
26165<>2903_67<>xiaoyong chai<>reducing the calibration effort for location estimation using unlabeled samples<>percom<>qiang yang<>
26170<>2903_72<>yi-dong shen<>deriving a stationary dynamic bayesian network from a logic program with recursive loops<>ilp<>qiang yang<>
26177<>2903_79<>shengli sheng:charles x. ling<>simple test strategies for cost-sensitive decision trees<>ecml<>qiang yang<>
26181<>2903_83<>chenyong hu:yongji wang:benyu zhang:qing wang:jinhui zhou:ran he:yun yan<>mining quantitative associations in large database<>apweb<>qiang yang<>
26185<>2903_87<>jie yin:lionel m. ni<>adaptive temporal radio maps for indoor location estimation<>percom<>qiang yang<>
26186<>2903_88<>shuicheng yan:dong xu:lei zhang:xiaoou tang:hongjiang zhang<>discriminant analysis with tensor representation<>cvpr<>qiang yang<>
26190<>2903_92<>gui-rong xue:chenxi lin:wensi xi:hua-jun zeng:yong yu:zheng chen<>scalable collaborative filtering using cluster-based smoothing<>sigir<>qiang yang<>
26200<>2903_102<>chengqi zhang:bing liu<>guest editors' introduction: special section on intelligent data preparation<>tkde<>qiang yang<>
26205<>2903_107<>jeffrey junfeng pan:james t. kwok:yiqiang chen<>accurate and low-cost location estimation using kernels<>ijcai<>qiang yang<>
26207<>2903_109<>charles x. ling:william stafford noble<>guest editors' introduction to the special issue: machine learning for bioinformatics - part 1<>tcbb<>qiang yang<>
20108<>2907_0<>alan k. mackworth<>constraint-based inference: a bridge between constraint processing and probability inference<>cp<>le chang<>
37599<>2912_0<>byung ro moon:sang yong seo<>genetic fuzzy discretization with adaptive intervals for classification problems<>gecco<>yoon-seok choi<>
26246<>2913_0<>stefano lonardi<>a compression-boosting transform for 2d data<>dcc<>qiaofeng yang<>
26247<>2913_1<>stefano lonardi<>a parallel algorithm for clustering protein-protein interaction networks<>csb<>qiaofeng yang<>
26240<>2916_0<>lu su:quanlong li:xiaofei xu<>coverage algorithm and protocol in heterogeneous sensor networks<>iccnmc<>qing yang<>
26241<>2916_1<>lu su:quanlong li:xiaofei xu<>cooperative target localization method for heterogeneous sensor networks<>iccnmc<>qing yang<>
10518<>2917_2<>prashant j. shenoy:krithi ramamritham<>scheduling messages with deadlines in multi-hop real-time sensor networks<>rtas<>huan li<>
2033<>2918_0<>francisco j. solis:lucas jodar<>chaos in the one-dimensional wave equation<>appml<>benito chen<>
2035<>2923_0<>jeng-sheng yeh:ding-yun chen:ming ouhyoung<>a web-based three-dimensional protein retrieval system by matching visual similarity<>bioinformatics<>bing-yu chen<>
20725<>2929_0<>nulo<>error-tolerance memory microarchitecture via dynamic multithreading<>iccd<>lei wang<>
14247<>2930_1<>chengxiang zhai<>accurately extracting coherent relevant passages using hidden markov models<>cikm<>jing jiang<>
20735<>2936_6<>hui kong:eam khwang teoh:xuchun li:jian-gang wang:ronda venkateswarlu<>generalized 2d principal component analysis for face image representation and recognition<>nn<>lei wang<>
20739<>2936_10<>hui kong:eam khwang teoh:jian-gang wang:ronda venkateswarlu<>a framework of 2d fisher discriminant analysis: application to face recognition with small number of training samples<>cvpr<>lei wang<>
20743<>2938_0<>wenle wang:julie dorsey:xu yang:baining guo:heung-yeung shum<>real-time rendering of plant leaves<>tog<>lifeng wang<>
20750<>2938_7<>stephen lin:seungyong lee:baining guo:heung-yeung shum<>light field morphing using 2d features<>tvcg<>lifeng wang<>
20712<>2940_3<>ming-chi chen:yi-cheng chen<>a cross-layer cost-function based rate adaptation mechanism for the wcdma system with multi-class services by transport format selection<>wicomm<>li-chun wang<>
20713<>2940_4<>ching-hao lee<>a tcp-physical cross-layer congestion control mechanism for the multirate wcdma system using explicit rate change notification<>aina<>li-chun wang<>
20714<>2940_5<>chih-min chao:yu-chee tseng<>dynamic bandwidth allocation for multimedia traffic with rate guarantee and fair access in wcdma systems<>tmc<>li-chun wang<>
20717<>2942_0<>hao wu:da-zhong zheng<>a quantum-inspired genetic algorithm for scheduling problems<>icnc<>ling wang<>
20722<>2942_5<>bo liu:yihui jin:dexian huang<>designing neural networks using hybrid particle swarm optimization<>isnn<>ling wang<>
10501<>2943_5<>mong-li lee:wynne hsu<>a histogram-based selectivity estimator for skewed xml data<>dexa<>hanyu li<>
10502<>2943_6<>mong-li lee:wynne hsu<>a path-based labeling scheme for efficient structural join<>xsym<>hanyu li<>
20703<>2945_0<>xueliang li:cornelis hoede<>two classes of integral regular graphs<>arscom<>ligong wang<>
20704<>2945_1<>xueliang li<>integral trees with diameters 5 and 6<>dm<>ligong wang<>
924<>2946_0<>nuwee wiwatwattana<>organelle db: a cross-species database of protein localization and function<>nar<>anuj kumar<>
904<>2947_3<>chandra chekuri:anupam gupta:joseph naor:danny raz<>building edge-failure resilient networks<>algorithmica<>amit kumar<>
908<>2947_7<>yogish sabharwal:sandeep sen<>linear time algorithms for clustering problems in any dimensions<>icalp<>amit kumar<>
910<>2947_9<>chandra chekuri:anupam gupta<>on a bidirected relaxation for the multiway cut problem<>dam<>amit kumar<>
919<>2947_18<>sumit ganguly:minos n. garofalakis:rajeev rastogi<>join-distinct aggregate estimation over update streams<>pods<>amit kumar<>
958<>2948_0<>venkatesh ramaiyan:eitan altman<>"fixed point analysis of single cell ieee 802.11e wlans: uniqueness, multistability and throughput differentiation."<>sigmetrics<>anurag kumar<>
962<>2948_4<>nilesh khude:aditya karnik<>time and energy complexity of distributed computation in wireless sensor networks<>infocom<>anurag kumar<>
963<>2948_5<>arzad alam kherani<>long range dependence in network traffic and the closed loop behaviour of buffers under adaptive window control<>pe<>anurag kumar<>
964<>2948_6<>eitan altman:daniele miorandi:munish goyal<>new insights from a fixed point analysis of single cell ieee 802.11 wlans<>infocom<>anurag kumar<>
965<>2948_7<>aditya karnik<>performance of tcp congestion control with explicit rate feedback<>ton<>anurag kumar<>
969<>2948_11<>manoj k. panda:s. h. srinivasan<>saturation throughput analysis of a system of interfering ieee 802.11 wlans<>wowmom<>anurag kumar<>
928<>2949_0<>jacques wainer<>meta workflows as a control and coordination mechanism for exception handling in workflow systems<>dss<>akhil kumar<>
931<>2949_3<>rong liu<>an analysis and taxonomy of unstructured workflows<>bpm<>akhil kumar<>
939<>2949_11<>jianrui wang<>a framework for document-driven workflow systems<>bpm<>akhil kumar<>
947<>2949_19<>jacques wainer<>"a fine-grained, controllable, user-to-user delegation method in rbac."<>sacmat<>akhil kumar<>
974<>2953_0<>jun xu:ellen w. zegura<>efficient and scalable query routing for unstructured peer-to-peer networks<>infocom<>abhishek kumar<>
975<>2953_1<>vern paxson:nicholas weaver<>exploiting underlying structure for detailed reconstruction of an internet-scale event<>imc<>abhishek kumar<>
976<>2953_2<>minho sung:jun xu:ellen w. zegura<>a data streaming algorithm for estimating subpopulation flow size distribution<>sigmetrics<>abhishek kumar<>
979<>2953_5<>qi zhao:jia wang:jun xu<>data streaming algorithms for accurate and efficient measurement of traffic and flow matrices<>sigmetrics<>abhishek kumar<>
984<>2957_1<>s. kalyan krishna:raghav subbarao:santanu chaudhury<>parsing news video using integrated audio-video features<>premi<>arun kumar<>
986<>2957_3<>ashish verma<>voice fonts for individuality representation and transformation<>tslp<>arun kumar<>
39625<>2958_4<>ching-tung wu:kwang-ting cheng:qiang zhu<>using visual features for anti-spam filtering<>icip<>yi-leh wu<>
8134<>2960_0<>jae chung:mingzhe li:huahui wu:mark claypool:robert e. kinicki<>"application, network and link layer measurements of streaming video over a wireless campus network."<>pam<>feng li<>
8135<>2960_1<>mingzhe li:mark claypool:robert e. kinicki<>weather forecasting: predicting performance for streaming video over wireless lans<>nossdav<>feng li<>
39184<>2962_0<>c. wilwert:francoise simonot-lion:francoise simonot<>quantitative evaluation of the safety of x-by-wire architecture subject to emi perturbations<>etfa<>yeqiong song<>
39185<>2962_1<>r. brito<>a dispatching mechanism providing rempli applications with qos<>etfa<>yeqiong song<>
39195<>2967_3<>zhenyu liu:takeshi ikenaga:satoshi goto<>a vlsi array processing oriented fast fourier transform algorithm and hardware implementation<>glvlsi<>yang song<>
39175<>2969_0<>jotun hein<>constructing minimal ancestral recombination graphs<>jcb<>yun s. song<>
39176<>2969_1<>yufeng wu:dan gusfield<>algorithms for imperfect phylogeny haplotyping (ipph) with a single homoplasy or recombination event<>wabi<>yun s. song<>
39178<>2969_3<>rune b. lyngso:jotun hein<>minimum recombination histories by branch and bound<>wabi<>yun s. song<>
39183<>2969_8<>yufeng wu:dan gusfield<>efficient computation of close lower and upper bounds on the minimum number of recombinations in biological sequence evolution<>ismb<>yun s. song<>
8131<>2970_0<>xiaowo wang:jing zhang:jin gu:tao he:xuegong zhang:yanda li<>microrna identification based on sequence and structure alignment<>bioinformatics<>fei li<>
8132<>2972_0<>chi-wang shu<>reinterpretation and simplified implementation of a discontinuous galerkin method for hamilton-jacobi equations<>appml<>fengyan li<>
8133<>2972_1<>chi-wang shu<>locally divergence-free discontinuous galerkin methods for mhd equations<>jscic<>fengyan li<>
39198<>2974_1<>anis koubaa<>"graceful degradation of loss-tolerant qos using (m, k)-firm constraints in guaranteed rate networks."<>comcom<>yeqiong song<>
32923<>2976_0<>nulo<>a linear algorithm for polygonal approximations of thick curves<>caip<>trung nguyen<>
9985<>2981_2<>amos bairoch:rolf apweiler:cathy h. wu:winona c. barker:brigitte boeckmann:serenella ferro:elisabeth gasteiger:rodrigo lopez:michele magrane:maria j. martin:darren a. natale:claire o'donovan:nicole redaschi:lai-su l. yeh<>the universal protein resource (uniprot)<>nar<>hongzhan huang<>
9994<>2982_0<>john mullen<>impact of multipath fading in wireless ad hoc networks<>pe-wasun<>hong huang<>
9995<>2984_0<>gerard j. foschini:sape j. mullender:sivarama venkatesan:harish viswanathan<>physical-layer design for next-generation cellular wireless systems<>bell<>howard c. huang<>
9945<>2986_0<>li shen:rong zhang:fillia makedon:bruce hettleman:justin d. pearlman<>surface alignment of 3d spherical harmonic models: application to cardiac mri analysis<>miccai<>heng huang<>
9947<>2986_2<>li shen:fillia makedon:sheng zhang:mark greenberg:ling gao:justin d. pearlman<>a clustering-based approach for prediction of cardiac resynchronization therapy<>sac<>heng huang<>
9948<>2986_3<>fei xiong:james c. ford:fillia makedon:justin d. pearlman<>a new test system for stability measurement of marker gene selection in dna microarray data analysis<>pci<>heng huang<>
9950<>2986_5<>li shen:rong zhang:fillia makedon:bruce hettleman:justin d. pearlman<>a prediction framework for cardiac resynchronization therapy via 4d cardiac motion analysis<>miccai<>heng huang<>
9954<>2987_2<>kang k. yen:yu-hsiu huang:jeng-shyang pan:kuang-chih huang<>improved image coding with classified vq and side-match vq<>kes<>hsiang-cheh huang<>
9960<>2987_8<>feng-cheng chang:hsueh-ming hang<>layered access control schemes on watermarked scalable media<>iscas<>hsiang-cheh huang<>
9963<>2987_11<>yueh-hong chen:jun-min su:h.-c. fu:hsiao-tien pao<>adaptive watermarking using relationships between wavelet coefficients<>iscas<>hsiang-cheh huang<>
9964<>2987_12<>p. s. lai:s. s. cheng:s. y. sun:t. y. huang:j. m. su:y. y. xu:y. h. chen:s. c. chuang:c. l. tseng:c. l. hsieh:y. l. lu:y. c. shen:j. r. chen:j. b. nie:f. p. tsai:h. t. pao:hsin-chia fu<>automated information mining on multimedia tv news archives<>kes<>h. c. huang<>
9967<>2988_1<>jorng-tzong horng:feng-mao lin:yu-chung chang:chen-chia huang<>spliceinfo: an information repository for mrna alternative splicing in human genome<>nar<>hsien-da huang<>
9971<>2988_5<>feng-mao lin:yu-chung chang:pak-leong chan:jorng-tzong horng:ming-tat ko<>a database to aid probe design for virus identification<>apbc<>hsien-da huang<>
9975<>2988_9<>tzong-yi lee:shih-wei tzeng:jorng-tzong horng<>kinasephos: a web tool for identifying protein kinase-specific phosphorylation sites<>nar<>hsien-da huang<>
9976<>2988_10<>feng-mao lin:hsien-da huang:jorng-tzong horng<>primer design for multiplex pcr using a genetic algorithm<>gecco<>his-yuan huang<>
3886<>2993_0<>ahmed m. elgammal<>facial expression analysis using nonlinear decomposable generative models<>amfg<>chan-su lee<>
32925<>2995_0<>lihua wang:eiji okamoto:ying miao:hiroshi doi<>id-based series-parallel multisignature schemes for multi-messages from bilinear maps<>wcc<>takeshi okamoto<>
32926<>2995_1<>atsuo inomata:eiji okamoto<>a proposal of short proxy signature using pairing<>itcc<>takeshi okamoto<>
29994<>2999_1<>shanyu zheng:jim alves-foss<>performance of group key agreement protocols over multiple operations<>pdcs<>stephen s. lee<>
29896<>3001_6<>bobby bhattacharjee:suman banerjee<>efficient geographic routing in multihop wireless networks<>mobihoc<>seungjoon lee<>
29904<>3003_1<>rodrigo fonseca:puneet sharma:sujata banerjee:sujoy basu<>distributed querying of internet distance information<>infocom<>sung-ju lee<>
29910<>3003_7<>puneet sharma:sujata banerjee:sujoy basu:rodrigo fonseca<>measuring bandwidth between planetlab nodes<>pam<>sung-ju lee<>
29922<>3003_19<>sujoy basu:sujata banerjee:puneet sharma<>nodewiz: peer-to-peer resource discovery for grids<>ccgrid<>sung-ju lee<>
29926<>3003_23<>gene cheung:puneet sharma<>striping delay-sensitive packets over multiple burst-loss channels with random delays<>ism<>sung-ju lee<>
29885<>3005_1<>ara darzi:guang-zhong yang<>subject specific finite element modelling of the levator ani<>miccai<>su-lin lee<>
39221<>3023_1<>anil wipat:matthew r. pocock:p. a. lee:p. watson:k. flanagan:j. t. worthington<>a grid-based system for microbial genome comparison and analysis<>ccgrid<>yudong sun<>
29984<>3028_2<>donghyun kim:kangmin lee:hoi-jun yoo<>a reconfigurable crossbar switch with adaptive bandwidth control for networks-on-chip<>iscas<>se-joong lee<>
29985<>3028_3<>kwanho kim:kangmin lee:hoi-jun yoo<>an arbitration look-ahead scheme for reducing end-to-end latency in networks on chip<>iscas<>se-joong lee<>
29980<>3030_3<>yin leng theng:dion hoe-lian goh:schubert shou-boon foo<>subjective relevance: implications on interface design for information retrieval systems<>icadl<>shu-shing lee<>
29971<>3032_0<>yoon-hwa choi<>arms: an authenticated routing message in sensor networks<>madnes<>suk-bok lee<>
29991<>3034_0<>tania stathaki<>mammogram analysis using two-dimensional autoregressive models: sufficient or not?<>iciap<>sarah lee<>
29989<>3036_0<>eunseok lee<>context awarable self-configuration system for distributed resource management<>ieaaie<>seunghwa lee<>
29990<>3036_1<>eunseok lee<>context adaptive self-configuration system<>iccS<>seunghwa lee<>
39205<>3040_0<>ishfaq ahmad<>asynchronous rate control for multi-object videos<>tcsv<>yu sun<>
39212<>3040_7<>dongdong li:ishfaq ahmad:jiancong luo<>a rate control algorithm for wireless video transmission using perceptual tuning<>itcc<>yu sun<>
4756<>3041_0<>edgar e. vallejo<>interactions between learning and evolution in simulated avian communication<>ecal<>charles e. taylor<>
19543<>3044_24<>ripal nathuji<>reducing system level power consumption for mobile and embedded platforms<>arcs<>karsten schwan<>
19549<>3044_30<>vibhore kumar:brian f. cooper:zhongtang cai:greg eisenhauer<>resource-aware distributed stream management using dynamic overlays<>icdcs<>karsten schwan<>
19563<>3044_44<>yuan chen<>opportunistic overlays: efficient content delivery in mobile ad hoc networks<>middleware<>karsten schwan<>
19565<>3044_46<>jiantao kong<>kstreams: kernel support for efficient data streaming in proxy servers<>nossdav<>karsten schwan<>
19571<>3044_52<>ada gavrilovska:sanjay kumar:srikanth sundaragopalan<>platform overlays: enabling in-network stream processing in large-scale distributed applications<>nossdav<>karsten schwan<>
19574<>3044_55<>christian poellabauer<>flexible cross-domain event delivery for quality-managed multimedia applications<>tomccap<>karsten schwan<>
19576<>3044_57<>yair wiseman:patrick widener<>efficient end to end data exchange using configurable compression<>sigops<>karsten schwan<>
19603<>3044_84<>ripal nathuji:balasubramanian seshasayee<>combining compiler and operating system support for energy efficient i/o on embedded platforms<>scopes<>karsten schwan<>
13514<>3046_8<>aleta ricciardi<>a knowledge-theoretic analysis of uniform distributed coordination and failure detectors<>dc<>joseph y. halpern<>
13561<>3047_35<>li li:paramvir bahl:yi-min wang:roger wattenhofer<>a cone-based distributed topology-control algorithm for wireless multi-hop networks<>ton<>joseph y. halpern<>
13578<>3047_52<>riccardo pucella<>probabilistic algorithmic knowledge<>lmcs<>joseph y. halpern<>
13616<>3047_90<>kevin r. o'neill<>anonymity and information hiding in multiagent systems<>jcs<>joseph y. halpern<>
13726<>3047_200<>riccardo pucella<>evidence with uncertain likelihoods<>uai<>joseph y. halpern<>
29941<>3048_12<>hitoshi yamauchi:yunjin lee:yutaka ohtake:alexander g. belyaev:hans-peter seidel<>feature sensitive mesh segmentation with mean shift<>smi<>seungyong lee<>
29942<>3048_13<>yunjin lee:ariel shamir:daniel cohen-or:hans-peter seidel<>mesh scissoring with minima rule and part salience<>cagd<>seungyong lee<>
29949<>3048_20<>lifeng wang:stephen lin:baining guo:heung-yeung shum<>light field morphing using 2d features<>tvcg<>seungyong lee<>
29959<>3049_4<>ebrahim salehi:mahdad khatirinejad<>ic-colorings and ic-indices of graphs<>dm<>sin-min lee<>
10537<>3052_0<>matthew j. b. robshaw<>a dynamic key infrastructure for grid<>egc<>hoon wei lim<>
10538<>3052_1<>kenneth g. paterson<>identity-based cryptography for grid security<>eScience<>hoon wei lim<>
29453<>3054_0<>carles ferrer-costa:h. p. shanahan:janet m. thornton<>hthquery: a method for detecting dna-binding proteins with a helix-turn-helix structural motif<>bioinformatics<>susan jones<>
29432<>3058_0<>nigel warren:matt jones:david bainbridge<>navigation via continuously adapted music<>chi<>steve jones<>
29434<>3058_2<>matt jones:gary marsden:dynal patel:andy cockburn<>an evaluation of integrated zooming and scrolling on small screens<>ijmms<>steve jones<>
29381<>3060_4<>ralf lammel<>scrap your boilerplate with class: extensible generic functions<>icfp<>simon l. peyton jones<>
29383<>3060_6<>manuel m. t. chakravarty:gabriele keller<>associated type synonyms<>icfp<>simon l. peyton jones<>
29409<>3060_32<>tim harris:simon marlow:maurice herlihy<>composable memory transactions<>ppopp<>simon l. peyton jones<>
36638<>3061_0<>david wetherall:thomas e. anderson<>a dos-limiting network architecture<>sigcomm<>xiaowei yang<>
29445<>3063_1<>jorg sander:raymond t. ng:monica c. sleumer:man saint yuen<>a methodology for analyzing sage libraries for cancer profiling<>tois<>steven j. m. jones<>
29450<>3063_6<>chris d. bajdik:byron kuo:shawn rusaw:angela brooks-wilson<>cgmim: automated text-mining of online mendelian inheritance in man (omim) to identify genetically-associated cancers and candidate genes<>bmcbi<>steven jones<>
39617<>3070_0<>graham m. megson<>linear algorithm and hexagonal search based two-pass algorithm for motion estimation<>caip<>yunsong wu<>
39608<>3071_0<>ning-han liu:arbee l. p. chen<>efficient nn search in polyphonic music databases using a lower bounding mechanism<>mms<>yi-hung wu<>
39609<>3071_1<>chih-hsiang lin:ding-ying chiu:arbee l. p. chen<>mining frequent itemsets from data streams with a time-sensitive sliding window<>sdm<>yi-hung wu<>
39614<>3071_6<>ning-han liu:arbee l. p. chen<>an efficient approach to extracting approximate repeating patterns in music databases<>dasfaa<>yi-hung wu<>
35022<>3076_0<>nael b. abu-ghazaleh<>gps: a general peer-to-peer simulator and its use for modeling bittorrent<>mascots<>weishuai yang<>
28788<>3084_0<>riccardo bettati<>aggregated aggressiveness control on groups of tcp flows<>networking<>soohyun cho<>
2132<>3094_2<>lizy kurian john:eugene john<>architectural support for accelerating congestion control applications in network processors<>asap<>byeong kil lee<>
31565<>3095_11<>theodor richardson<>"nonrigid shape correspondence using landmark sliding, insertion and deletion."<>miccai<>song wang<>
31567<>3095_13<>toshiro kubota:jeffrey mark siskind:jun wang<>salient closed boundary extraction with ratio contour<>pami<>song wang<>
31319<>3096_1<>mehdi amirijoo:nicolas chaufette:jorgen hansson:svante gunnarsson<>generalized performance management of multi-class real-time imprecise data services<>rtss<>sang hyuk son<>
31546<>3100_1<>kunlong zhang<>searching databases with keywords<>jcst<>shan wang<>
31540<>3102_4<>shaojun wang:russell greiner:dale schuurmans:li cheng<>"exploiting syntactic, semantic and lexical regularities in language modeling via directed markov random fields."<>icml<>shaomin wang<>
31542<>3102_6<>li cheng:feng jiao:dale schuurmans<>variational bayesian image modelling<>icml<>shaojun wang<>
31544<>3102_8<>dale schuurmans:fuchun peng:yunxin zhao<>combining statistical language models via the latent maximum entropy principle<>ml<>shaojun wang<>
31532<>3104_1<>tsu-cheng jen:b. hsieh<>image contrast enhancement based on intensity-pair distribution<>icip<>sheng-jyh wang<>
31533<>3104_2<>lun-chia kuo<>a feature-based scalable codec for image compression<>aina<>sheng-jyh wang<>
31534<>3104_3<>lun-chia kuo:hsin-haw jong:zong-han wu<>representing images using points on image surfaces<>tip<>sheng-jyh wang<>
31516<>3108_3<>dong xuan:wei zhao<>analyzing and enhancing the resilience of structured peer-to-peer systems<>jpdc<>shengquan wang<>
31517<>3108_4<>sangig rho:zhibin mai:riccardo bettati:wei zhao<>real-time component-based systems<>rtas<>shengquan wang<>
31518<>3108_5<>nan zhang 0004:wei zhao<>a new scheme on privacy-preserving data classification<>kdd<>shengquan wang<>
25697<>3109_0<>jian-liang wu:anthony j. w. hilton<>two sufficient conditions for a graph to be type 1<>arscom<>ping wang<>
34098<>3112_2<>shih-fu chang<>visual cue cluster construction via information bottleneck principle and kernel density estimation<>civr<>winston h. hsu<>
34093<>3115_10<>jin antolik<>evolutionary tree genetic programming<>gecco<>william h. hsu<>
34061<>3120_1<>nulo<>a linear time algorithm for finding a maximal planar subgraph based on pc-trees<>cocoon<>wen-lian hsu<>
34063<>3120_3<>min-yuh day:chun-hung lu:jin-tan david yang:guey-fa chiou:chorng-shyong ong<>designing an ontology-based intelligent tutoring agent with instant messaging<>icalt<>wen-lian hsu<>
34067<>3120_7<>min-yuh day:tzong-han tsai:cheng-lung sung:cheng-wei lee:shih-hung wu:chorng-shyong ong<>a knowledge-based approach to citation extraction<>iri<>wen-lian hsu<>
34070<>3120_10<>kuen-pin wu:jia-ming chang:jun-bo chen:chi-fon chang:wen-jin wu:tai-huang huang:ting-yi sung<>ribra-an error-tolerant algorithm for the nmr backbone assignment problem<>recomb<>wen-lian hsu<>
34050<>3121_0<>qingbo zhu<>fossilized index: the linchpin of trustworthy non-alterable electronic records<>sigmod<>windsor w. hsu<>
34058<>3121_8<>alan jay smith:honesty c. young<>the automatic improvement of locality in storage systems<>tocs<>windsor w. hsu<>
5968<>3124_0<>bin zhang:hongjun wu:feng bao<>a fast correlation attack on the shrinking generator<>ctrsa<>dengguo feng<>
5963<>3125_2<>eduard h. hovy<>handling biographical questions with implicature<>naacl<>donghui feng<>
5964<>3125_3<>eduard h. hovy<>mre: a study on evolutionary language understanding<>nlucs<>donghui feng<>
8033<>3127_0<>seunghwa lee<>context adaptive self-configuration system<>iccS<>eunseok lee<>
8034<>3127_1<>seunghwa lee<>context awarable self-configuration system for distributed resource management<>ieaaie<>eunseok lee<>
8036<>3127_3<>seunghwa lee:hee yong youn<>context adaptive self-configuration system based on multi-agent<>context<>eunseok lee<>
8019<>3133_3<>nulo<>designing time-based interactions with multimedia<>mm<>eric lee<>
8022<>3133_6<>jan borchers<>the role of time in engineering computer music systems<>nime<>eric lee<>
8023<>3133_7<>marius wolf:jan borchers<>improving orchestral conducting systems in public spaces: examining the temporal characteristics and conceptual models of conducting gestures<>chi<>eric lee<>
8025<>3133_9<>laszlo bardos:stefan korinek:jan borchers<>bangarama: creating music with headbanging<>nime<>eric lee<>
30044<>3134_0<>jong hyuk park:heung-soo park:jun choi:deok-gyu lee<>intelligent multimedia service system based on context awareness in smart home<>kes<>sangjin lee<>
30036<>3145_0<>youngho lee:sejin oh:youngmin park:beom-chan lee:jeung-chul park:yoo oh:han oh:jeha ryu:kwan-heng lee:hong kim:yong-gu lee:jongwon kim:yo-sung ho:woontack woo<>responsive multimedia system for virtual storytelling<>pcm<>seokhee lee<>
8008<>3147_1<>haiyang zheng<>operational semantics of hybrid systems<>hybrid<>edward a. lee<>
30037<>3148_0<>xin tan:silvana trimi<>current practices of leading e-government countries<>cacm<>sang m. lee<>
30022<>3158_0<>rob kooper:andrew shirk:amy lin:robert folberg:peter bajcsy<>3d medical volume reconstruction using web services<>icws<>sang-chul lee<>
6832<>3162_0<>rakesh agrawal:ramakrishnan srikant<>privacy preserving olap<>sigmod<>dilys thomas<>
6834<>3162_2<>gagan aggarwal:mayank bawa:prasanna ganesan:hector garcia-molina:krishnaram kenthapadi:rajeev motwani:utkarsh srivastava:ying xu 0002<>two can keep a secret: a distributed architecture for secure database services<>cidr<>dilys thomas<>
6835<>3162_3<>gagan aggarwal:tomas feder:krishnaram kenthapadi:rajeev motwani:rina panigrahy:an zhu<>anonymizing tables<>icdt<>dilys thomas<>
6817<>3164_1<>nulo<>the (re) emergence of agile languages and domain-oriented programming<>jot<>dave thomas<>
6824<>3164_8<>nulo<>refactoring as meta programming<>jot<>dave a. thomas<>
6827<>3164_11<>steven fraser:djenana campara:carl chilley:richard p. gabriel:richard lopez:greg utas<>fostering software robustness in an increasingly hostile world<>oopsla<>dave a. thomas<>
30019<>3167_1<>young-mi song:young-bae ko<>ferma: an efficient geocasting protocol for wireless sensor networks with multiple target regions<>euc<>sung-hee lee<>
31215<>3169_0<>pankaj gupta:davinder bhatia<>multiparametric sensitivity analysis in programming problem with linear-plus-linear fractional objective function<>eor<>sanjeet singh<>
3865<>3171_0<>nulo<>between chaos and routine: boundary negotiating artifacts in collaboration<>ecscw<>charlotte p. lee<>
3873<>3175_0<>sudeshna ghosh<>a component-based approach for javacard runtime system development<>iceccs<>ching-cheng lee<>
5463<>3182_0<>james giles:kang-won lee:jorge lobo<>policy ratification<>policy<>dakshi agrawal<>
5459<>3183_0<>liping chen:k. selcuk candan:jun'ichi tatemura:dirceu cavendish<>on overlay schemes to support point-in-range queries for scalable grid resource discovery<>p2p<>divyakant agrawal<>
5453<>3186_8<>josyula r. rao:pankaj rohatgi:kai schramm<>templates as master keys<>ches<>dakshi agrawal<>
25702<>3188_0<>haixun wang:xiaochen wu:wei wang:baile shi<>on reducing classifier granularity in mining concept-drifting data streams<>icdm<>peng wang<>
5404<>3189_28<>mukund raghavan:anindo mukherjee:qing-an zeng<>improvement in qos for multimedia traffic in wireless lans during handoff<>icwn<>dharma p. agrawal<>
5405<>3189_29<>qi zhang<>dynamic probabilistic broadcasting in manets<>jpdc<>dharma p. agrawal<>
5406<>3189_30<>a. mukherjee:anurag gupta<>totally distributed key management for dynamic groups in manets<>ipccc<>d. p. agrawal<>
5426<>3189_50<>tarun joshi:hrishikesh gossain:carlos de m. cordeiro<>route recovery mechanisms for ad hoc networks equipped with switched single beam antennas<>anss<>dharma p. agrawal<>
25701<>3190_0<>h. d. cheng<>medical image processing<>isci<>p. paul wang<>
4322<>3195_3<>joan feigenbaum:rahul sami:scott shenker<>a bgp-based mechanism for lowest-cost routing<>dc<>christos h. papadimitriou<>
4330<>3195_11<>david ratajczak<>on a conjecture related to geometric routing<>tcs<>christos h. papadimitriou<>
4359<>3195_40<>konstantinos daskalakis<>the complexity of games on highly regular graphs<>esa<>christos h. papadimitriou<>
4364<>3196_1<>konstantinos daskalakis:paul w. goldberg<>the complexity of computing a nash equilibrium<>eccc<>christos h. papadimitriou<>
4365<>3196_2<>paul w. goldberg<>reducibility among equilibrium problems<>eccc<>christos h. papadimitriou<>
14881<>3197_5<>eamonn j. keogh:stefano lonardi<>visualizing and discovering non-trivial patterns in large time series databases<>ivs<>jessica lin<>
14884<>3197_8<>eamonn j. keogh:ada wai-chee fu<>hot sax: efficiently finding the most unusual time series subsequence<>icdm<>jessica lin<>
14885<>3197_9<>eamonn j. keogh:ada wai-chee fu:helga van herle<>approximations to magic: finding unusual medical time series<>cbms<>jessica lin<>
3860<>3204_0<>gregory gutin:ton kloks:anders yeo<>kernels in planar digraphs<>jcss<>chuan-min lee<>
14887<>3205_1<>hung-chih lee:chiang lin:tay-woei shyu<>multistar decomposition of complete multigraphs<>arscom<>jenq-jong lin<>
3837<>3206_0<>in koo kang:hae-yeoun lee:jong-tae kim:heung-kyu lee<>averaging attack resilient video fingerprinting<>iscas<>choong-hoon lee<>
3838<>3206_1<>hae-yeoun lee:heung-kyu lee:jeho nam<>feature-based image watermarking method using scale-invariant keypoints<>pcm<>choong-hoon lee<>
14889<>3207_0<>nulo<>evaluation of resources for question answering evaluation<>sigir<>jimmy j. lin<>
14893<>3207_4<>dina demner-fushman<>automatically evaluating answers to definition questions<>naacl<>jimmy j. lin<>
14900<>3207_11<>g. craig murray<>assessing the term independence assumption in blind relevance feedback<>sigir<>jimmy j. lin<>
3847<>3208_8<>yu-chi chung:chao-chun chen<>time-constrained service on air<>icdcs<>chiang lee<>
14928<>3215_0<>chien-liang chen:youn-long lin<>"integration, verification and layout of a complex multimedia soc."<>date<>jiing-yuan lin<>
39115<>3219_1<>vojtech rodl:jozef skokan<>counting small cliques in 3-uniform hypergraphs<>cpc<>yuejian peng<>
39116<>3224_0<>liu ye:chu zi:wu jiagao<>tcs-chord: an improved routing algorithm to chord based on the topology-aware clustering in self-organizing mode<>skg<>yang peng<>
14926<>3225_0<>linda k. nozick:mark a. turnquist<>inventory allocation with multi-echelon service level considerations<>iccsa<>jenn-rong lin<>
3828<>3226_1<>zhi-wei jian:lin-kai huang<>a fuzzy ontology and its application to news summarization<>tsmc<>chang-shing lee<>
3829<>3226_2<>shu-mei guo:chin-yuan hsu<>an intelligent image agent based on soft-computing techniques for color image processing<>eswa<>chang-shing lee<>
3830<>3226_3<>shu-mei guo:chin-yuan hsu<>genetic-based fuzzy image filter and its application to image processing<>tsmc<>chang-shing lee<>
31321<>3228_0<>mahmut t. kandemir:alok n. choudhary<>software-directed disk power management for scientific applications<>ipps<>seung woo son<>
31323<>3228_2<>guangyu chen:mahmut t. kandemir:alok n. choudhary<>exposing disk layout to compiler for reducing energy consumption of parallel disk based systems<>ppopp<>seung woo son<>
31325<>3228_4<>guangyu chen:mahmut t. kandemir<>power-aware code scheduling for clusters of active disks<>islped<>seung woo son<>
31328<>3228_7<>mahmut t. kandemir:guangyu chen<>an evaluation of code and data optimizations in the context of disk power reduction<>islped<>seung woo son<>
31329<>3228_8<>guangyu chen:mahmut t. kandemir<>disk layout optimization for reducing energy consumption<>ics<>seung woo son<>
31333<>3228_12<>guangyu chen:mahmut t. kandemir:alok n. choudhary<>dynamic compilation for reducing energy consumption of i/o-intensive applications<>lcpc<>seung woo son<>
31334<>3228_13<>sri hari krishna narayanan:mahmut t. kandemir:feihui li<>using loop invariants to fight soft errors in data caches<>aspdac<>seung woo son<>
39090<>3231_0<>timothy w. finin:li ding:rong pan:anupam joshi:pranam kolari:akshay java<>swoogle: searching for knowledge on the semantic web<>aaai<>yun peng<>
39092<>3231_2<>rong pan:zhongli ding:yang yu<>a bayesian network approach to ontology mapping<>semweb<>yun peng<>
39093<>3231_3<>li ding:timothy w. finin:anupam joshi:rong pan:pavan reddivari<>search on the semantic web<>computer<>yun peng<>
39099<>3231_9<>zhongli ding<>modifying bayesian networks by probability constraints<>uai<>yun peng<>
39100<>3231_10<>li ding:rong pan:timothy w. finin:anupam joshi:pranam kolari<>finding and ranking knowledge on the semantic web<>semweb<>yun peng<>
3863<>3234_0<>min-yuh day:tzong-han tsai:cheng-lung sung:shih-hung wu:chorng-shyong ong:wen-lian hsu<>a knowledge-based approach to citation extraction<>iri<>cheng-wei lee<>
14864<>3238_2<>ying guo:geoff james<>evolutionary optimisation of distributed energy resources<>ausai<>jiaming li<>
14861<>3239_0<>g. thompson<>a method to take account of inhomogeneity in mechanical component reliability calculations<>tr<>jian-ping li<>
14858<>3242_0<>nulo<>diagnosis of multiple hold-time and setup-time faults in scan chains<>tc<>james c.-m. li<>
14859<>3245_0<>jian-hua yin<>two sufficient conditions for a graphic sequence to have a realization with prescribed clique size<>dm<>jiong-sheng li<>
14869<>3247_0<>sameer agarwal:lihi zelnik-manor:pietro perona:david j. kriegman:serge belongie<>beyond pairwise clustering<>cvpr<>jongwoo lim<>
14870<>3247_1<>ming-hsuan yang<>a direct method for modeling non-rigid motion with thin plate spline<>cvpr<>jongwoo lim<>
14874<>3247_5<>jeffrey ho:ming-hsuan yang:david j. kriegman<>passive photometric stereo from motion<>iccv<>jongwoo lim<>
14855<>3248_1<>nan tang:jeffrey xu yu:kam-fai wong:kevin lu<>accelerating xml structural join by partitioning<>dexa<>jianxin li<>
25428<>3250_4<>angeliki alexiou:dan avidor:peter bosch:suman das:bertrand m. hochwald:thierry e. klein:jonathan ling:angel lozano:thomas l. marzetta:sayandev mukherjee:sape j. mullender:constantinos b. papadias:reinaldo a. valenzuela:harish viswanathan<>"duplexing, resource allocation and inter-cell coordination: design recommendations for next generation wireless systems."<>wicomm<>piyush gupta<>
25430<>3250_6<>yogesh sankarasubramaniam:alexander l. stolyar<>random-access scheduling with service differentiation in wireless networks<>infocom<>p. gupta<>
25432<>3251_0<>lei chai:ranjit noronha:g. brown:dhabaleswar k. panda<>designing a portable mpi-2 over modern interconnects using udapl interface<>pvm<>prachi gupta<>
14845<>3254_2<>ada wai-chee fu:hongxing he:jie chen:huidong jin:damien mcaullay:graham williams:ross sparks:chris kelman<>mining risk patterns in medical data<>kdd<>jiuyong li<>
27719<>3262_2<>susan v. vrbsky:allen s. parrish:huanjing wang<>strategies to improve variable selection performance<>ike<>randy k. smith<>
27721<>3262_4<>swapna gupta:j. scott hawker<>acquiring and delivering lessons learned for nasa scientists and engineers: a dynamic approach<>ACMse<>randy k. smith<>
27726<>3262_9<>huanjing wang:allen s. parrish:susan v. vrbsky<>variable selection and ranking for analyzing automobile traffic accident data<>sac<>randy k. smith<>
27727<>3262_10<>huanjing wang:allen s. parrish:susan v. vrbsky<>improved variable and value ranking techniques for mining categorical traffic accident data<>eswa<>randy k. smith<>
36235<>3265_0<>maria chudnovsky:gerard cornuejols:paul d. seymour:kristina vuskovic<>recognizing berge graphs<>combinatorica<>xinming liu<>
36232<>3267_0<>gang huang:hong mei<>feature interaction problems in middleware services<>fiw<>xuanzhe liu<>
36230<>3271_1<>qingli da<>a decision tree solution considering the decision maker's attitude<>fss<>xinwang liu<>
36241<>3277_1<>zidong wang:d. w. c. ho<>variance-constrained control for uncertain stochastic systems with missing measurements<>tsmc<>xiaohui liu<>
36242<>3277_2<>veronica vinciotti:raya khanin:david d'alimonte:n. cattini:g. hotchkiss:g. bucca:o. de jesus:j. rasaiyaah:c. p. smith:paul kellam:ernst wit<>an experimental evaluation of a loop versus a reference design for two-channel microarrays<>bioinformatics<>xiaohui liu<>
14821<>3285_2<>nulo<>a self-adjusting algorithm for driver scheduling<>heuristics<>jingpeng li<>
35687<>3289_0<>zhen qian:rui huang:dimitris n. metaxas<>deformable-model based textured object segmentation<>emmcvpr<>xiaolei huang<>
36194<>3293_6<>kun zhou:jin huang:john snyder:hujun bao:baining guo:heung-yeung shum<>large mesh deformation using the volumetric graph laplacian<>tog<>xinguo liu<>
14803<>3294_0<>nick cercone<>discovering and ranking important rules<>grc<>jiye li<>
14806<>3294_3<>nick cercone<>a rough set based model to rank the importance of association rules<>rsfdgrc<>jiye li<>
14797<>3296_0<>haiquan li:donny soh:limsoon wong<>a correspondence between maximal complete bipartite subgraphs and closed patterns<>pkdd<>jinyan li<>
14798<>3296_1<>haiquan li:limsoon wong:mengling feng:yap-peng tan<>relative risk and odds ratio: a data mining perspective<>pods<>jinyan li<>
14799<>3296_2<>haiquan li<>discovery of stable and significant binding motif pairs from pdb complexes and protein interaction datasets<>bioinformatics<>jinyan li<>
14800<>3296_3<>haiquan li<>using fixed point theorems to model the binding in protein-protein interactions<>tkde<>jinyan li<>
36209<>3297_8<>y. q. liu:h. b. zhu:e. h. wu<>real-time simulation of physically based on-surface flow<>vc<>x. h. liu<>
14790<>3298_0<>toby ehrenkranz:geoffrey h. kuenning:peter l. reiher<>simulation and analysis on the resiliency and efficiency of malnets<>pads<>jun li<>
14793<>3298_3<>dejing dou:zhen wu:shiwoong kim:vikash agarwal<>an internet routing forensics framework for discovering rules of abnormal bgp events<>ccr<>jun li<>
14794<>3298_4<>xun kang<>mssl: extending ssl to support data sharing among collaborative clients<>acsac<>jun li<>
14796<>3298_6<>xun kang<>proof of service in a hybrid p2p environment<>ispa<>jun li<>
36219<>3300_0<>christopher a. waring<>face detection using spectral histograms and svms<>tsmc<>xiuwen liu<>
36211<>3302_1<>w. bruce croft:matthew b. koll<>finding experts in community-based question-answering services<>cikm<>xiaoyong liu<>
14780<>3310_2<>son t. vuong<>a scalable semantic routing architecture for grid resource discovery<>icpads<>juan li<>
14782<>3310_4<>son t. vuong<>a semantics-based routing scheme for grid resource discovery<>eScience<>juan li<>
14785<>3310_7<>son t. vuong<>ontology-based clustering and routing in peer-to-peer networks<>pdcat<>juan li<>
14788<>3310_10<>son t. vuong<>grid resource discovery using semantic communities<>gcc<>juan li<>
14767<>3311_1<>cha zhang<>on the compression and streaming of concentric mosaic data for free wandering in a realistic environment over the internet<>tmm<>jin li<>
26055<>3316_0<>gopal gupta:michael leuschel<>towards provably correct code generation via horn logical continuation semantics<>padl<>qian wang<>
26056<>3316_1<>nulo<>integrating architecture description languages: a semantics-based approach<>icdcit<>qian wang<>
26057<>3316_2<>gopal gupta<>provably correct code generation: a case study<>entcs<>qian wang<>
26053<>3317_1<>debasis mitra<>stochastic traffic engineering for demand uncertainty and risk-aware network revenue management<>ton<>qiong wang<>
26047<>3318_0<>jianyong zhang:anand sivasubramaniam:alma riska:erik riedel<>storage performance virtualization via throughput and latency control<>mascots<>qian wang<>
26048<>3318_1<>eric anderson:susan spence:ram swaminathan:mahesh kallahalla<>quickly finding near-optimal storage designs<>tocs<>qian wang<>
26039<>3319_0<>susumu harada:tony hsieh:andreas paepcke<>visual interface and control modality: an experiment about fast photo browsing on mobile devices<>interact<>qianying wang<>
26041<>3319_2<>jiang hu:clifford nass<>natural language interface put in perspective: interaction of search method and task complexity<>nlucs<>qianying wang<>
26045<>3319_6<>clifford nass<>less visible and wireless: two experiments on the effects of microphone type on users' performance and perception<>chi<>qianying wang<>
26046<>3319_7<>clifford nass:jiang hu<>"natural language query vs. keyword search: effects of task complexity on search performance, participant perceptions, and preferences."<>interact<>qianying wang<>
26034<>3320_0<>xue liu:weiqun chen:wenbo he:marco caccamo<>building robust wireless lan for industrial control with dsss-cdma cellphone network paradigm<>rtss<>qixin wang<>
8644<>3321_0<>zhonghua yang:hao he:kiah mok goh<>coordinating multiple agents via reinforcement learning<>aamas<>gang chen<>
8645<>3321_1<>zhonghua yang:hao he:kiah mok goh<>maintaining system state information in a multiagent environment for effective learning<>ieicet<>gang chen<>
8649<>3324_3<>joel w. branch:boleslaw k. szymanski<>"local leader election, signal strength aware flooding, and routeless routing."<>ipps<>gilbert chen<>
8624<>3325_0<>mahmut t. kandemir<>runtime integrity checking for inter-object connections<>iccad<>guilin chen<>
8625<>3325_1<>konrad malkowski:mahmut t. kandemir:padma raghavan<>reducing power with performance constraints for parallel sparse applications<>ipps<>guangyu chen<>
8626<>3325_2<>sri hari krishna narayanan:mahmut t. kandemir:yuan xie<>temperature-sensitive loop parallelization for chip multiprocessors<>iccd<>guilin chen<>
8630<>3325_6<>mahmut t. kandemir:mustafa karakoy<>a data-centric approach to checksum reuse for array-intensive applications<>dsn<>guilin chen<>
8631<>3325_7<>mahmut t. kandemir<>optimizing inter-processor data locality on embedded chip multiprocessors<>emsoft<>guilin chen<>
8632<>3325_8<>mahmut t. kandemir:mustafa karakoy<>memory space conscious loop iteration duplication for reliable execution<>sas<>guilin chen<>
8633<>3325_9<>mahmut t. kandemir<>optimizing address code generation for array-intensive dsp applications<>cgo<>guilin chen<>
8636<>3325_12<>mahmut t. kandemir<>code restructuring for improving cache performance of mpsocs<>iccad<>guilin chen<>
8638<>3325_14<>mahmut t. kandemir:mary jane irwin:ibrahim kolcu<>compiler-guided leakage optimization for banked scratch-pad memories<>tvlsi<>guangyu chen<>
27733<>3334_2<>b. ravichandran:avinash gandhe<>xcs for robust automatic target recognition<>gecco<>robert e. smith<>
26063<>3336_0<>zhenfu cao<>two proxy signcryption schemes from bilinear pairings<>cans<>qin wang<>
27000<>3356_0<>jeffrey malanson<>comparison of the structure and accuracy of two land change models<>gis<>robert gilmore pontius jr.<>
27001<>3356_1<>jeffrey malanson<>comparison of the structure and accuracy of two land change models<>gis<>robert gilmore pontius jr.<>
9870<>3357_0<>yoo c. chung:soo-mook moon<>java memory allocation with lazy worst fit for small objects<>cj<>hyung-kyu choi<>
26998<>3358_0<>lizy kurian john<>improved automatic testcase synthesis for performance model validation<>ics<>robert h. bell jr.<>
35693<>3364_1<>ranga vemuri<>using gals architecture to reduce the impact of long wire delay on fpga performance<>aspdac<>xin jia<>
35694<>3364_2<>ranga vemuri<>the gapla: a globally asynchronous locally synchronous fpga architecture<>fccm<>xin jia<>
35695<>3364_3<>ranga vemuri<>a novel asynchronous fpga architecture design and its performance evaluation<>fpl<>xin jia<>
9803<>3378_0<>li-peng wang:yang yang:yong-hua song<>on the variable capacity property of cc/ds-cdma systems<>qshine<>hsiao-hwa chen<>
8652<>3385_0<>pavel sumazin:naoya hata:andrew d. smith:theresa zhang:michael q. zhang<>dwe: discriminating word enumerator<>bioinformatics<>gengxin chen<>
14867<>3387_0<>josi f. martinez<>power-performance considerations of parallel computing on chip multiprocessors<>taco<>jian li<>
16256<>3388_0<>jeremy g. frey:andy j. stanford-clark:andrew d. reynolds:bharat v. bedi<>sensor networks and grid middleware for laboratory monitoring<>eScience<>jamie m. robinson<>
38283<>3391_0<>amit k. agrawal:ramesh raskar:shree k. nayar<>removing photography artifacts using gradient projection and flash-exposure sampling<>tog<>yuanzhen li<>
38284<>3391_1<>lavanya sharan:edward h. adelson<>compressing and companding high dynamic range images with subband architectures<>tog<>yuanzhen li<>
38282<>3392_0<>xiaowo wang:jing zhang:fei li:jin gu:tao he:xuegong zhang<>microrna identification based on sequence and structure alignment<>bioinformatics<>yanda li<>
38253<>3395_0<>jun sun:hai wang:jing sun<>visualizing and simulating semantic web services ontologies<>icfem<>yuan li<>
38254<>3395_1<>jin song dong:yuzhang feng:jun sun<>a tools environment for developing and reasoning about ontologies<>apsec<>yuan-fang li<>
38256<>3395_3<>jing sun:hongyu zhang:hai wang<>formal semantics and verification for feature modeling<>iceccs<>yuan-fang li<>
38257<>3395_4<>dorel lucanu:jin song dong<>soundness proof of z semantics of owl using institutions<>www<>yuan-fang li<>
38263<>3395_10<>hai wang:jin song dong:jing sun<>tcoz approach to owl-s process model design<>seke<>yuan-fang li<>
38266<>3395_13<>dorel lucanu:jin song dong<>institution morphisms for relating owl and z<>seke<>yuan-fang li<>
9782<>3400_0<>rick kazman:hoh peter in<>from requirements negotiation to software architecture decisions<>infsof<>hong-mei chen<>
9796<>3409_0<>bo-fu liu:jian-hung chen:shiow-fen hwang:shinn-ying ho<>meswarm: memetic particle swarm optimization<>gecco<>hung-ming chen<>
1146<>3411_7<>pierre fraigniaud:david ilcinkas:guy peer:david peleg<>graph exploration by a finite automaton<>tcs<>andrzej pelc<>
1188<>3411_49<>gianluca de marco:luisa gargano:evangelos kranakis:danny krizanc:ugo vaccaro<>asynchronous deterministic rendezvous in graphs<>mfcs<>andrzej pelc<>
1220<>3411_81<>david peleg<>feasibility and complexity of broadcasting with random transmission failures<>podc<>andrzej pelc<>
1244<>3411_105<>david peleg<>broadcasting with locally bounded byzantine faults<>ipl<>andrzej pelc<>
1258<>3411_119<>dariusz r. kowalski<>broadcasting in undirected ad hoc radio networks<>dc<>andrzej pelc<>
1269<>3411_130<>nulo<>waking up anonymous ad hoc radio networks<>wdag<>andrzej pelc<>
1270<>3411_131<>dariusz r. kowalski<>time complexity of radio broadcasting: adaptiveness vs. obliviousness and randomization vs. determinism<>tcs<>andrzej pelc<>
9765<>3418_5<>nulo<>the expressive rate of constraints<>amai<>hubie chen<>
9766<>3418_6<>nulo<>parameterized compilability<>ijcai<>hubie chen<>
9753<>3421_0<>yat-wah wan<>capacity competition of make-to-order firms<>orl<>hong chen<>
9749<>3424_1<>ling chen:gencai chen<>effects of local-lag mechanism on task performance in a desktop cve system<>jcst<>hong chen<>
27414<>3434_4<>simson l. garfinkel:david margrave:jeffrey i. schiller:erik nordlander<>how to make secure email easier to use<>chi<>robert c. miller<>
1995<>3437_2<>xiaoru yuan:minh x. nguyen:david h. porter<>high dynamic range volume visualization<>visualization<>baoquan chen<>
1998<>3437_5<>xiaoru yuan:minh x. nguyen:nan zhang 0011<>stippling and silhouettes rendering in geometry-image space<>rt<>baoquan chen<>
1999<>3437_6<>minh x. nguyen:xiaoru yuan<>geometry completion and detail generation by texture synthesis<>vc<>baoquan chen<>
2005<>3437_12<>xiaoru yuan:nan zhang 0011:minh x. nguyen<>volume cutout<>vc<>baoquan chen<>
27397<>3438_0<>yannis velegrakis:john mylopoulos<>representing and querying data transformations<>icde<>renee j. miller<>
2011<>3441_1<>viacheslav fofanov:david m. kristensen:marek kimmel:olivier lichtarge:lydia e. kavraki<>algorithms for structural comparison and statistical analysis of 3d protein motifs<>psb<>brian y. chen<>
2013<>3444_1<>victor shnayder:konrad lorincz:thaddeus r. f. fulford jones:matt welsh<>sensor networks for medical care<>sensys<>bor-rong chen<>
2017<>3445_2<>lei chen 0003:yi lin:raghu ramakrishnan<>prediction cubes<>vldb<>bee-chung chen<>
50<>3448_3<>lea landucci:alessandro valli<>computer vision based system for interactive cooperation of multiple users<>caip<>alberto del bimbo<>
56<>3448_9<>marco bertini:walter nunziati<>soccer videos highlight prediction and annotation in real time<>iciap<>alberto del bimbo<>
62<>3448_15<>pietro pala<>retrieval by content similarity of 3d models using spin images<>adt<>alberto del bimbo<>
78<>3448_31<>marco bertini:rita cucchiara:andrea prati<>an integrated framework for semantic annotation and adaptation<>mta<>alberto del bimbo<>
87<>3448_40<>marco bertini:carlo torniai<>enhanced ontologies for video annotation and retrieval<>mir<>alberto del bimbo<>
96<>3448_49<>g. antini:stefano berretti:pietro pala<>curvature correlograms for content based retrieval of 3d objects<>iciap<>alberto del bimbo<>
117<>3448_70<>marco bertini:walter nunziati<>automatic annotation of sport video content<>ciarp<>alberto del bimbo<>
120<>3448_73<>walter nunziati:stan sclaroff<>an invariant representation for matching trajectories across uncalibrated video streams<>civr<>alberto del bimbo<>
129<>3448_82<>marco bertini:walter nunziati<>player identification in soccer videos<>mir<>alberto del bimbo<>
130<>3448_83<>mitra basu:horst bunke<>guest editors' introduction to the special section on syntactic and structural pattern recognition<>pami<>alberto del bimbo<>
132<>3448_85<>rita cucchiara<>guest editorial: special issue on video segmentation for semantic annotation and transcoding<>mta<>alberto del bimbo<>
137<>3448_90<>marco bertini:carlo torniai<>automatic video annotation using ontologies extended with visual information<>mm<>alberto del bimbo<>
150<>3448_103<>marco bertini:walter nunziati<>common visual cues for sports highlights modeling<>mta<>alberto del bimbo<>
157<>3448_110<>marco bertini:rita cucchiara:carlo torniai<>domain knowledge extension with pictorially enriched ontologies<>caip<>alberto del bimbo<>
164<>3448_117<>thomas m. alisi:alessandro valli<>natural interfaces to enhance visitors' experiences<>ieeemm<>alberto del bimbo<>
16686<>3449_0<>cagdas evren gerede:oscar h. ibarra:bala ravikumar<>online and minimum-cost ad hoc delegation in e-service composition<>IEEEscc<>jianwen su<>
16687<>3449_1<>bin lin<>handling frequent updates of moving objects<>cikm<>jianwen su<>
16693<>3449_7<>hoda mokhtar<>a query language for moving object trajectories<>ssdbm<>jianwen su<>
16736<>3449_50<>zhongnan shen<>web service discovery based on behavior signatures<>IEEEscc<>jianwen su<>
16747<>3449_61<>bin lin<>shapes based trajectory queries for moving objects<>gis<>jianwen su<>
16756<>3452_0<>richard anderson:ruth e. anderson:crystal hoyer:craig prince:fred videon:steven a. wolfman<>a study of diagrammatic ink in lecture<>cg<>jonathan su<>
30059<>3454_0<>feng xia:youxian sun<>neural network based feedback scheduler for networked control system with flexible workload<>icnc<>shanbin li<>
30071<>3456_8<>xuesong tan<>recursive construction of distributors by merging<>pdcn<>shuo-yen robert li<>
25461<>3458_8<>feng xue:liang-liang xie<>the transport capacity of wireless networks over fading channels<>tit<>panganamala r. kumar<>
25465<>3458_12<>vivek raghunathan<>a counterexample in congestion control of wireless networks<>mswim<>p. r. kumar<>
25466<>3458_13<>arvind giridhar<>maximizing the functional lifetime of sensor networks<>ipsn<>p. r. kumar<>
25468<>3458_15<>liang-liang xie<>an achievable rate for the multiple-level relay channel<>tit<>panganamala r. kumar<>
25447<>3459_0<>siu-wing cheng:stefan funke:mordecai j. golin:sheung-hung poon:edgar a. ramos<>curve reconstruction from noisy samples<>comgeo<>piyush kumar<>
30073<>3465_1<>klaus mueller<>"accelerated, high-quality refraction computations for volume graphics."<>vg<>shengying li<>
20411<>3471_0<>henry horng-shing lu<>explore biological pathways from noisy array data by directed acyclic boolean networks<>jcb<>lei m. li<>
20412<>3471_1<>anton valouev:yu-chi liu:david c. schwartz:yi yang:yu zhang:michael s. waterman<>alignment of optical maps<>recomb<>lei li<>
20414<>3471_3<>nulo<>an algorithm for computing exact least-trimmed squares estimate of simple linear regression with constraints<>csda<>lei m. li<>
20410<>3472_5<>michael l. littman<>lazy approximation for solving continuous finite-horizon mdps<>aaai<>lihong li<>
20399<>3474_2<>hsuan-tien lin<>infinite ensemble learning with support vector machines<>ecml<>ling li<>
20400<>3474_3<>amrit pratap:hsuan-tien lin:yaser s. abu-mostafa<>improving generalization by data categorization<>pkdd<>ling li<>
4386<>3480_0<>vanish talwar:qinyi wu:wenchang yan:gueyoung jung:dejan s. milojicic<>comparison of approaches to service deployment<>icdcs<>calton pu<>
4402<>3480_16<>ling liu:jianjun zhang:wei han:james caverlee:sungkeun park:terence critchlow:matthew coleman:david buttler<>xwrapcomposer: a multi-page data extraction service for bio-computing applications<>IEEEscc<>calton pu<>
41042<>3487_0<>nulo<>long range dependence and heavy tail distributions<>pe<>zhen liu<>
41043<>3488_0<>tien dai bui<>dynamical mobile terminal location registration in wireless pcs networks<>tmc<>zikuan liu<>
1028<>3490_0<>ileana streinu:louis theran<>finding and maintaining rigid components<>cccg<>audrey lee<>
1005<>3495_2<>catalina danis<>evolution of norms in a newly forming group<>interact<>alison lee<>
20394<>3496_0<>wu chou<>two-way web service: from interface design to interface verification<>icws<>li li<>
20396<>3496_2<>wu chou:feng liu<>web service enablement of communication services<>icws<>li li<>
26712<>3498_2<>nulo<>disease diagnosis using query-based neural networks<>isnn<>ray-i chang<>
26713<>3498_3<>shin-hung chang:jan-ming ho:yen-jen oyang<>an optimal cache algorithm for streaming vbr video over a heterogeneous network<>comcom<>ray-i chang<>
26716<>3498_6<>chih-chun chu<>an efficient anonymous scheme for mutual anonymous communications<>icn<>ray-i chang<>
26718<>3498_8<>liang-bin lai:jen-shaing kouh<>mining data by query-based error-propagation<>icnc<>ray-i chang<>
41007<>3506_0<>marta z. kwiatkowska:costas c. constantinou<>a biologically inspired congestion control routing algorithm for manets<>percom<>zhenyu liu<>
41008<>3506_1<>marta z. kwiatkowska:costas c. constantinou<>a biologically inspired qos routing algorithm for mobile ad hoc networks<>aina<>zhenyu liu<>
35463<>3508_1<>ying he:hong qin<>manifold splines<>sma<>xianfeng gu<>
35482<>3510_7<>philip s. yu:klara nahrstedt<>optimal component composition for scalable stream processing<>icdcs<>xiaohui gu<>
35470<>3512_2<>shiquan wu<>"gene network: model, dynamics and simulation."<>cocoon<>xun gu<>
41011<>3513_1<>ee-peng lim:ming yin:dion hoe-lian goh:yin leng theng:wee keong ng<>on organizing and accessing geospatial and georeferenced web resources using the g-portal system<>ipm<>zehua liu<>
41020<>3515_0<>kai zheng:bin liu<>hybrid cache architecture for high speed packet processing<>hoti<>zhen liu<>
41021<>3515_1<>kai zheng:bin liu<>high performance embedded route lookup coprocessor for network processors<>iccnmc<>zhen liu<>
41032<>3517_0<>changkang huang:keqiang fan:ping wei:hao chen:shiyong liu:jianfeng pei:lei shi:bo li:kun yang:ying liu:luhua lai<>virtual screening of novel noncovalent inhibitors for sars-cov 3c-like proteinase<>jcisd<>zhenming liu<>
41033<>3518_0<>dong xu:jianzhuang liu:xuelong li:xiaoou tang<>insignificant shadow detection for video segmentation<>tcsv<>zhengkai liu<>
41027<>3519_0<>yan-li hu:liang bai:wei ming zhang:weidong xiao<>an adaptive scheduling algorithm for molecule docking design on grid<>gcc<>zhong liu<>
24169<>3520_0<>dong guo:liang hu:zhuopeng zhang<>gcpsensor: a cpu performance tool for grid environments<>qsic<>meng zhang<>
18047<>3526_16<>gang wu:guohui lin<>application of smodels in quartet based phylogeny construction<>lpnmr<>jia-huai you<>
18074<>3526_43<>guohua liu:li-yan yuan:curtis onuczko<>lookahead in smodels compared to local consistencies in csp<>lpnmr<>jia-huai you<>
21113<>3530_0<>min zhang:shaoping ma<>the empirical impact of the nature of novelty detection<>airs<>le zhao<>
21119<>3531_3<>ravi r. iyer:srihari makineni:laxmi n. bhuyan:donald newell<>hardware support for bulk data movement in server platforms<>iccd<>li zhao<>
10681<>3534_0<>mei lu:feng tian<>two sufficient conditions for dominating cycles<>jgt<>huiqing liu<>
10684<>3534_3<>mei lu:feng tian<>fan-type theorem for long cycles containing a specified edge<>gc<>huiqing liu<>
10689<>3537_0<>geng sun<>implicit runge-kutta methods based on lobatto quadrature formula<>ijcm<>hongyu liu<>
10685<>3539_0<>j. strother moore<>executable jvm model for analytical reasoning: a study<>scp<>hanbing liu<>
21135<>3543_2<>yanchang zhao:siwei luo:chao shao<>construction algorithm of principal curves in the sense of limit<>ausai<>lianwei zhao<>
21127<>3544_3<>hiroshi nagamochi:toshihide ibaraki<>greedy splitting algorithms for approximating multiway partition problems<>mp<>liang zhao<>
34463<>3547_0<>jinglun shi:kwok ching tsui:jiming liu<>anycast-based cooperative proxy caching<>apweb<>weiping liu<>
36179<>3549_0<>pengyu hong:qing zhou:xin lu:jun s. liu:wing hung wong<>a boosting approach for motif modeling using chip-chip data<>bioinformatics<>x. shirley liu<>
36180<>3549_1<>wei li:clifford a. meyer<>a hidden markov model for analyzing chip-chip experiments on genome tiling arrays and its application to p53 binding sequences<>ismb<>x. shirley liu<>
34442<>3552_0<>nengfu xie<>an answer fusion model for web-based question answering<>skg<>wenyin liu<>
34444<>3552_2<>guanglin huang<>using web based answer hunting system to promote collaborative learning<>icwl<>wenyin liu<>
34449<>3552_7<>anthony y. fu:xiaotie deng<>a potential iri based phishing strategy<>wise<>wenyin liu<>
34438<>3554_2<>yuanyuan zhou:pin zhou:feng qin:josep torrellas<>efficient and flexible architectural support for dynamic monitoring<>taco<>wei liu<>
34440<>3554_4<>jose renau:james tuck:luis ceze:karin strauss:josep torrellas<>tasking with out-of-order spawn in tls chip multiprocessors: microarchitecture and compilation<>ics<>wei liu<>
34441<>3554_5<>jose renau:karin strauss:luis ceze:smruti r. sarangi:james tuck:josep torrellas<>thread-level speculation on a cmp can be energy efficient<>ics<>wei liu<>
36117<>3556_0<>b. chen<>delay-dependent robust h control for t-s fuzzy systems with time delay<>tfs<>x. liu<>
36118<>3556_1<>bing chen<>fuzzy guaranteed cost control for nonlinear systems with time-varying delay<>tfs<>xiaoping liu<>
36119<>3556_2<>bing chen<>fuzzy approximate disturbance decoupling of mimo nonlinear systems by backstepping and application to chemical processes<>tfs<>xiaoping liu<>
36135<>3557_1<>marta milo:neil d. lawrence:magnus rattray<>a tractable probabilistic model for affymetrix probe-level analysis across multiple chips<>bioinformatics<>xuejun liu<>
36128<>3558_0<>kaliappa nadar ravindran:dmitri loguinov<>what signals do packet-pair dispersions carry?<>infocom<>xiliang liu<>
36133<>3558_5<>kaliappa nadar ravindran:dmitri loguinov<>multi-hop probing asymptotics in available bandwidth estimation: stochastic analysis<>imc<>xiliang liu<>
36159<>3559_3<>yunhao liu:li xiao:lionel m. ni:xiaodong zhang<>location awareness in unstructured peer-to-peer systems<>tpds<>xiaomei liu<>
36137<>3560_0<>yuantao peng<>a sensitivity analysis of low-power repeater insertion<>glvlsi<>xun liu<>
36139<>3560_2<>yuantao peng<>ritc: repeater insertion with timing target compensation<>isvlsi<>xun liu<>
36140<>3560_3<>yuantao peng<>freeze: engineering a fast repeater insertion solver for power minimization using the ellipsoid method<>dac<>xun liu<>
36143<>3560_6<>marios c. papaefthymiou<>hype: hybrid power estimation for ip-based systems-on-chip<>tcad<>xun liu<>
36145<>3560_8<>zhengtao yu<>power analysis of rotary clock<>isvlsi<>xun liu<>
36153<>3560_16<>yuantao peng:marios c. papaefthymiou<>rip: an efficient hybrid repeater insertion scheme for low power<>date<>xun liu<>
36165<>3564_4<>weiguo sheng:stephen swift:leishi zhang<>a weighted sum validity function for clustering with a hybrid niching genetic algorithm<>tsmc<>xiaohui liu<>
36170<>3564_9<>allan tucker:veronica vinciotti:david garway-heath<>a spatio-temporal bayesian network classifier for understanding visual field deterioration<>artmed<>xiaohui liu<>
36177<>3564_16<>paul o'neill:karl fraser:zidong wang:paul kellam:joost n. kok<>pyramidic clustering of large-scale microarray images<>cj<>xiaohui liu<>
24174<>3566_4<>kun yu:gang guan<>resume information extraction with cascaded hybrid model<>acl<>ming zhou<>
24181<>3566_11<>kitti setavoraphan:zhimin chen<>conceptual simulation modeling of warehousing operations<>wsc<>ming zhou<>
12190<>3569_5<>richard j. nowakowski<>average independence polynomials<>jct<>jason i. brown<>
12199<>3569_14<>xiaohu li<>the strongly connected reliability of complete digraphs<>networks<>jason i. brown<>
12201<>3569_16<>richard j. nowakowski<>well-covered vector spaces of graphs<>siamdm<>jason i. brown<>
18282<>3583_0<>joan feigenbaum:sampath kannan:andrew mcgregor:siddharth suri<>graph distances in the streaming model: the value of space<>soda<>jian zhang<>
18285<>3583_3<>joan feigenbaum:sampath kannan:andrew mcgregor:siddharth suri<>on graph problems in a semi-streaming model<>tcs<>jian zhang<>
22470<>3584_5<>tomas kaiser:zdenek ryjacek:liming xiong<>hourglasses and hamilton cycles in 4-connected claw-free graphs<>jgt<>mingchu li<>
22462<>3585_0<>xiao-shan gao:jin-san cheng<>generating symbolic interpolants for scattered data with normal vectors<>jcst<>ming li<>
22459<>3586_1<>darius burschka:jason j. corso:maneesh dewan:william w. lau:henry lin:panadda marayong:nicholas a. ramey:gregory d. hager:brian hoffman:david larkin:christopher j. hasser<>navigating inner space: 3-d assistance for minimally invasive surgery<>ras<>ming li<>
22461<>3586_3<>danica kragic:panadda marayong:allison m. okamura:gregory d. hager<>human-machine collaborative systems for microsurgical applications<>ijrr<>ming li<>
22451<>3588_1<>becky jie liu:frances f. yao<>min-energy voltage allocation for tree-structured tasks<>cocoon<>minming li<>
22445<>3589_0<>feng li:jae chung:huahui wu:mark claypool:robert e. kinicki<>"application, network and link layer measurements of streaming video over a wireless campus network."<>pam<>mingzhe li<>
22448<>3589_3<>mark claypool:robert e. kinicki:james nichols<>characteristics of streaming media stored on the web<>toit<>mingzhe li<>
22449<>3589_4<>feng li:mark claypool:robert e. kinicki<>weather forecasting: predicting performance for streaming video over wireless lans<>nossdav<>mingzhe li<>
22381<>3592_0<>zhi-hua zhou<>semi-supervised regression with co-training<>ijcai<>ming li<>
22382<>3592_1<>zhi-hua zhou<>setred: self-training with editing<>pakdd<>ming li<>
22384<>3592_3<>zhi-hua zhou<>tri-training: exploiting unlabeled data using three classifiers<>tkde<>ming li<>
22395<>3594_10<>man qi:masoud rozati:bin yu<>a wsrf based shopping cart system<>egc<>maozhen li<>
29129<>3597_8<>ying-han liu:jeng-kuen chiu:ee-peng lim<>mining mobile group patterns: a trajectory-based approach<>pakdd<>san-yih hwang<>
18295<>3599_0<>mark s. ackerman<>searching for expertise in social networks: a simulation of potential strategies<>group<>jun zhang<>
18307<>3607_0<>yanxi liu<>svm decision boundary based discriminative subspace induction<>pr<>jiayong zhang<>
18304<>3609_0<>quinn hart:michael gertz<>evaluation of a dynamic tree structure for indexing query regions on streaming geospatial data<>ssd<>jie zhang<>
18311<>3614_0<>keyue ding:kaixin zhou:yan shen:xuegong zhang<>htsnper1.0: software for haplotype block partition and htsnps selection<>bmcbi<>jing zhang<>
18313<>3614_2<>xiaowo wang:fei li:jin gu:tao he:xuegong zhang:yanda li<>microrna identification based on sequence and structure alignment<>bioinformatics<>jing zhang<>
18316<>3616_1<>zhongfu zhang:xinzhong lu<>the relation of matching with inverse degree of a graph<>dm<>jianxun zhang<>
16599<>3619_8<>paul watson<>fault-tolerance in distributed query processing<>ideas<>jim smith<>
9265<>3620_0<>edward y. chang:navneet panda<>formulating distance functions via the kernel trick<>kdd<>gang wu<>
9266<>3620_1<>jia-huai you:guohui lin<>a lookahead branch-and-bound algorithm for the maximum quartet consistency problem<>wabi<>gang wu<>
9267<>3620_2<>jia-huai you:guohui lin<>application of smodels in quartet based phylogeny construction<>lpnmr<>gang wu<>
9268<>3620_3<>edward y. chang:navneet panda<>formulating context-dependent similarity functions<>mm<>gang wu<>
9270<>3620_5<>edward y. chang:zhihua zhang<>learning with non-metric proximity matrices<>mm<>gang wu<>
9274<>3620_9<>jianli liu<>dynamic zone-balancing of topology-aware peer-to-peer networks<>gcc<>gang wu<>
9277<>3620_12<>guohui lin:jia-huai you:xiaomeng wu<>faster solution to the maximum quartet consistency problem with constraint programming<>apbc<>gang wu<>
9278<>3620_13<>zhihua zhang:edward y. chang<>kronecker factorization for speeding up kernel machines<>sdm<>gang wu<>
19967<>3621_1<>edmund hui-on ng:jerry chi ling lam<>"speckle-noise reduction via ""rotated elliptical-thresholding"" in an homomorphic complex-wavelet domain."<>icip<>kainam thomas wong<>
9286<>3623_3<>nulo<>regular reals<>mlq<>guohua wu<>
9290<>3623_7<>frank stephan<>presentations of k-trivial reals and kolmogorov complexity<>cie<>guohua wu<>
9291<>3623_8<>santiago figueira:frank stephan<>randomness and universal machines<>cca<>guohua wu<>
19975<>3632_0<>alex lee<>ad hoc routing protocol performance comparisons for vehicular ad hoc networks<>cita<>k. daniel wong<>
6974<>3637_0<>bin xue<>is iddq test of microprocessors feasible?<>mtv<>d. m. h. walker<>
6975<>3637_1<>lei wu<>a fast algorithm for critical path tracing in vlsi digital circuits<>dft<>d. m. h. walker<>
9139<>3639_0<>mary jane irwin:piotr berman:haoying fu:thomas f. la porta<>optimizing sensor movement planning for energy efficiency<>islped<>guiling wang<>
9142<>3639_3<>guohong cao:thomas f. la porta:wensheng zhang<>sensor relocation in mobile sensor networks<>infocom<>guiling wang<>
9112<>3643_3<>min-hua shao:jianying zhou<>on the security of a certified e-mail scheme with temporal authentication<>iccsa<>guilin wang<>
9114<>3643_5<>bo zhu:feng bao:robert h. deng:mohan s. kankanhalli<>efficient and robust key management for large mobile ad hoc networks<>cn<>guilin wang<>
9123<>3643_14<>feng bao:kenji imamoto:kouichi sakurai<>"generic, optimistic, and efficient schemes for fair certified email delivery."<>icics<>guilin wang<>
9124<>3643_15<>nulo<>designated-verifier proxy signature schemes<>sec<>guilin wang<>
9126<>3643_17<>sihan qing<>security flaws in several group signatures proposed by popescu<>iccsa<>guilin wang<>
9129<>3643_20<>nulo<>an abuse-free fair contract signing protocol based on the rsa signature<>www<>guilin wang<>
9131<>3643_22<>helger lipmaa:feng bao<>"designated verifier signature schemes: attacks, new security notions and a new construction."<>icalp<>guilin wang<>
9106<>3650_2<>satish sivaswamy:cristinel ababei:kia bazargan:ryan kastner:eli bozorgzadeh<>harp: hard-wired routing pattern fpgas<>fpga<>gang wang<>
37174<>3651_1<>paul friedberg:jason cain:ruth wang:jan m. rabaey:costas j. spanos<>modeling within-die spatial correlation effects for process-design co-optimization<>isqed<>yu cao<>
37175<>3652_0<>wen c. tien:petros faloutsos:frederic h. pighin<>expressive speech-driven facial animation<>tog<>yong cao<>
16555<>3656_46<>jiebo luo:thomas s. huang:hongjiang zhang<>special issue on image understanding for digital photographs<>pr<>john r. smith<>
16579<>3659_0<>johan bollen:herbert van de sompel:richard luce<>toward alternative metrics of journal impact: a comparison of download and citation data<>ipm<>joan a. smith<>
16580<>3660_0<>sheldon h. jacobson<>an analysis of the alias method for discrete random-variate generation<>informs<>j. cole smith<>
16583<>3660_3<>hanif d. sherali<>a class of web-based facets for the generalized vertex packing problem<>dam<>jonathan cole smith<>
16587<>3660_7<>jennifer a. horne<>a dynamic programming algorithm for the conditional covering problem on tree graphs<>networks<>j. cole smith<>
16588<>3660_8<>jennifer a. horne<>dynamic programming algorithms for the conditional covering problem on path and extended star graphs<>networks<>j. cole smith<>
16563<>3661_4<>bing jiang:sumit roy:matthai philipose:kishore sundara-rajan:alexander mamishev<>id modulation: embedding sensor data in an rfid timeseries<>ih<>joshua r. smith<>
16569<>3662_3<>natalio krasnogor<>"a tutorial for competent memetic algorithms: model, taxonomy, and design issues."<>tec<>james smith<>
16573<>3662_7<>steve cayzer:james a. r. marshall:tim kovacs<>what have gene libraries done for ais?<>icaris<>jim smith<>
16576<>3662_10<>praminda caleb-solly<>incorporation of adaptive mutation based on subjective evaluation in an interactive evolution strategy<>cec<>jim smith<>
30088<>3669_0<>david coleman<>modeling distributed gis data production workflow<>urban<>songnian li<>
30087<>3671_1<>axel haasch:britta wrede:jannik fritsch:gerhard sagerer<>human-style interaction with a robot for cooperative learning of scene objects<>icmi<>shuyin li<>
32136<>3672_2<>tingting han:jian lu<>on the bisimulation congruence in -calculus<>fsttcs<>taolue chen<>
32139<>3672_5<>tingting han:jian lu<>structure analysis for dynamic software architecture based on spatial logic<>compsac<>taolue chen<>
32142<>3672_8<>tingting han:jian lu<>structure analysis for dynamic software architecture<>snpd<>taolue chen<>
30091<>3676_1<>chengqing li:xinxiao li:guanrong chen<>cryptanalysis of a multistage encryption system<>iscas<>shujun li<>
30092<>3676_2<>tao yang:quan pan:jing li<>real-time multiple objects tracking with occlusion handling in dynamic scenes<>cvpr<>stan z. li<>
30095<>3676_5<>chengqing li:dan zhang:guanrong chen<>chosen-plaintext cryptanalysis of a clipped-neural-network-based chaotic cipher<>isnn<>shujun li<>
32127<>3679_0<>hagen woesner:yabin ye:imrich chlamtac<>wireless gigabit ethernet extension<>broadnets<>tao chen<>
30099<>3680_0<>feng chen:william cheng-chung chu<>feature analysis for service-oriented reengineering<>apsec<>shaoyun li<>
30100<>3680_1<>feng chen:zhihong liang:hongji yang<>using feature-oriented analysis to recover legacy software design for software evolution<>seke<>shaoyun li<>
32119<>3681_8<>nen-chung wang<>optimal broadcasting on incomplete star graph interconnection networks<>jsa<>tzung-shi chen<>
32126<>3681_15<>shih-chun hsu<>mining frequent tree-like patterns in large datasets<>dasfaa<>tzung-shi chen<>
32133<>3682_0<>nulo<>letter to the editor<>nn<>tianping chen<>
13832<>3687_0<>xiaoshan li:zhiming liu<>component-based software engineering<>ictac<>jifeng he<>
3441<>3688_0<>jin he:jane xi:mansun chan:hui wan:mohan dunga:babak heydari:ali m. niknejad<>charge-based core and the model architecture of bsim5<>isqed<>chenming hu<>
32109<>3690_20<>kui zhang:zhaohui s. qin:jun s. liu:michael s. waterman:fengzhu sun<>hapblock: haplotype block partitioning and tag snp selection software using a set of dynamic programming algorithms<>bioinformatics<>ting chen<>
32110<>3690_21<>yao-ting huang:kun-mao chao<>an approximation algorithm for haplotype inference by maximum parsimony<>sac<>ting chen<>
25956<>3696_2<>yi-ping phoebe chen<>analyzing security protocols using association rule mining<>ausai<>qingfeng chen<>
30081<>3706_0<>chaoyong zhang:peigen li:yunqing rao<>a new hybrid ga/sa algorithm for the job shop scheduling problem<>evoW<>shuxia li<>
33200<>3711_1<>abhik roychoudhury<>automated path generation for software fault localization<>kbse<>tao wang<>
33207<>3712_4<>yun-ru wu:ming-chao tsai<>maze routing with opc consideration<>aspdac<>ting-chi wang<>
8454<>3714_1<>zhongwu zhou:billy d. todd<>development of chemistry portal for grid-enabled molecular science<>eScience<>feng wang<>
8448<>3718_1<>nulo<>symbolic verification of distributed real-time systems with complex synchronizations<>icfem<>farn wang<>
8451<>3719_1<>nulo<>symbolic parametric safety analysis of linear hybrid systems with bdd-like data-structures<>tse<>farn wang<>
8414<>3723_10<>peiya liu<>temporal management of rfid data<>vldb<>fusheng wang<>
8416<>3723_12<>carlo zaniolo:xin zhou:hyun j. moon<>version management and historical queries in digital libraries<>time<>fusheng wang<>
8417<>3723_13<>carlo zaniolo<>an xml-based approach to publishing and querying the history of databases<>www<>fusheng wang<>
36772<>3724_1<>jia-xi wu<>doubly stochastic matrices of trees<>appml<>xiao-dong zhang<>
36759<>3726_0<>jian zhou<>automatic identification of digital video based on shot-level sequence matching<>mm<>xiao-ping zhang<>
36763<>3726_4<>kan li<>a new lut watermarking scheme with near minimum distortion based on the statistical modeling in the wavelet domain<>icic<>xiao-ping zhang<>
35010<>3728_0<>russell tessier:david jasinski:atul maheshwari:aiyappan natarajan:wayne p. burleson<>an energy-aware active smart card<>tvlsi<>weifeng xu<>
36752<>3729_4<>neelam gupta:haifeng he:rajiv gupta<>locating faulty code using failure-inducing chops<>kbse<>xiangyu zhang<>
36754<>3729_6<>sriraman tallam:rajiv gupta<>extended whole program paths<>IEEEpact<>xiangyu zhang<>
36755<>3729_7<>rajiv gupta<>whole execution traces and their applications<>taco<>xiangyu zhang<>
36758<>3729_10<>rajiv gupta<>matching execution histories of program versions<>sigsoft<>xiangyu zhang<>
36745<>3730_1<>kousuke kawai:toshinori yoshikawa:yoshinori takei<>lossy to lossless image compression using allpass filters<>icip<>xi zhang<>
18281<>3733_0<>ricardo silva:james g. shanahan<>probabilistic workflow mining<>kdd<>jiji zhang<>
34991<>3734_5<>yue zhou:hai tao:yihong gong<>background segmentation using spatial-temporal multi-resolution mrf<>wacv<>wei xu<>
18272<>3735_0<>qing xu:liang ma:weifang nie:peng li:jizhou sun<>adaptive fuzzy weighted average filter for synthesized image<>iccsa<>jiawan zhang<>
18278<>3735_6<>jianxun zhang:jizhou sun<>accelerating footprint method based on comparability of consecutive image slices<>IEEEcgiv<>jiawan zhang<>
18280<>3735_8<>qianqian han:yang gao:jizhou sun<>improved boundary and silhouette enhancement in volume illustration<>IEEEcgiv<>jiawan zhang<>
872<>3736_1<>luiz s. oliveira:robert sabourin<>a synthetic database to assess segmentation algorithms<>icdar<>alceu de souza britto jr.<>
877<>3736_6<>luiz s. oliveira:robert sabourin<>improving cascading classifiers with particle swarm optimization<>icdar<>alceu de souza britto jr.<>
34998<>3737_2<>solomon w. golomb<>optimal 2-d interleaving with latin rectangles<>tit<>wen-qing xu<>
18267<>3741_5<>pearl pu<>effort and accuracy analysis of choice strategies for electronic product catalogs<>sac<>jiyong zhang<>
34985<>3743_3<>wade trappe:yanyong zhang:timothy wood<>the feasibility of launching and detecting jamming attacks in wireless networks<>mobihoc<>wenyuan xu<>
18253<>3746_0<>zoubin ghahramani:yiming yang<>learning multiple related tasks using latent independent component analysis<>nips<>jian zhang<>
18258<>3746_5<>rong jin<>a smoothed boosting algorithm using probabilistic output codes<>icml<>jian zhang<>
18260<>3746_7<>yiming yang:shinjae yoo:bryan kisiel<>robustness of adaptive filtering methods in a cross-benchmark evaluation<>sigir<>jian zhang<>
18249<>3748_1<>sungkeun park:ling liu:calton pu:mudhakar srivatsa<>resilient trust management for web service integration<>icws<>jianjun zhang<>
18250<>3748_2<>ling liu:wei han:calton pu:james caverlee:sungkeun park:terence critchlow:matthew coleman:david buttler<>xwrapcomposer: a multi-page data extraction service for bio-computing applications<>IEEEscc<>jianjun zhang<>
35002<>3749_3<>rui mao:smriti ramakrishnan:glen nuckolls:daniel p. miranker<>on optimizing distance-based similarity search for biological databases<>csb<>weijia xu<>
18243<>3750_0<>anand sivasubramaniam:qian wang:alma riska:erik riedel<>storage performance virtualization via throughput and latency control<>mascots<>jianyong zhang<>
18246<>3750_3<>anand sivasubramaniam:alma riska:qian wang:erik riedel<>an interposed 2-level i/o scheduling framework for performance virtualization<>sigmetrics<>jianyong zhang<>
35005<>3751_2<>dianxiang xu:kendall e. nygard<>a state-based approach to testing aspect-oriented programs<>seke<>weifeng xu<>
18234<>3756_1<>tien nhut nguyen<>a new term significance weighting approach<>jiis<>jin zhang<>
18239<>3757_1<>robert t. collins:yanxi liu<>bayesian body localization using mixture of nonlinear shape models<>iccv<>jiayong zhang<>
33221<>3759_7<>chris germano:akira k. onoma<>framework and network based multimedia object management environment<>ism<>taehyung wang<>
498<>3762_0<>inhauma neves ferraz<>lithofacies recognition hybrid bench<>his<>ana cristina bicharra garcia<>
500<>3762_2<>leandro neumann ciuffo<>applying the hyriwyg incentive mechanism in a recommender system<>webi<>ana cristina bicharra garcia<>
504<>3762_6<>cristiano maciel:jose luiz t. nogueira<>an x-ray of the brazilian e-gov web sites<>interact<>ana cristina bicharra garcia<>
514<>3763_9<>uira kulesza:claudio sant'anna:christina chavez:carlos jose pereira de lucena<>aspects in agent-oriented software engineering: lessons learned<>aose<>alessandro f. garcia<>
13953<>3766_2<>yongqiang lu:cliff n. sze:xianlong hong:qiang zhou:yici cai:liang huang<>register placement for low power clock network<>aspdac<>jiang hu<>
13959<>3766_8<>ganesh venkataraman:cliff n. sze<>skew scheduling and clock routing for improved tolerance to process variations<>aspdac<>jiang hu<>
13960<>3766_9<>di wu:rabi n. mahapatra<>coupling aware timing optimization and antenna avoidance in layer assignment<>ispd<>jiang hu<>
13963<>3766_12<>di wu:min zhao:rabi n. mahapatra<>timing driven track routing considering coupling capacitance<>aspdac<>jiang hu<>
13964<>3766_13<>rishi chaturvedi<>an efficient merging scheme for prescribed skew clock routing<>tvlsi<>jiang hu<>
13969<>3766_18<>cliff n. sze:charles j. alpert:weiping shi<>path based buffer insertion<>dac<>jiang hu<>
13973<>3766_22<>zhuo li:cliff n. sze:charles j. alpert:weiping shi<>making fast buffer insertion even faster via approximation techniques<>aspdac<>jiang hu<>
13986<>3766_35<>yongqiang lu:cliff n. sze:xianlong hong:qiang zhou:yici cai:liang huang<>navigating registers in placement for clock network minimization<>dac<>jiang hu<>
13994<>3766_43<>ke cao:puneet dhawan<>library cell layout with alt-psm compliance and composability<>aspdac<>jiang hu<>
14013<>3767_0<>damien phillips<>modelling of sack tcp and application to the http file transfer environment<>lcn<>jiankun hu<>
14019<>3767_6<>yi wang:heiko schroder<>a gradient based weighted averaging method for estimation of fingerprint orientation fields<>dicta<>jiankun hu<>
14007<>3768_11<>greg m. link:johnsy k. john:shuai wang:sotirios g. ziavras<>resource-driven optimizations for transient-fault detecting superscalar microarchitectures<>aPcsac<>jie hu<>
14009<>3768_13<>feihui li:vijay degalahal:mahmut t. kandemir:narayanan vijaykrishnan:mary jane irwin<>compiler-directed instruction duplication for soft error detection<>date<>jie s. hu<>
14010<>3768_14<>mahmut t. kandemir:narayanan vijaykrishnan:mary jane irwin<>analyzing data reuse for cache reconfiguration<>tecs<>j. hu<>
8377<>3772_116<>hon wai leong:wing-kin sung:hugo willy<>adaptive control of hybridization noise in dna sequencing-by-hybridization<>jbcb<>franco p. preparata<>
2902<>3773_0<>kyu baek hwang<>bayesian model averaging of bayesian network classifiers over multiple node-orders: application to sparse datasets<>tsmc<>byoung-tak zhang<>
2903<>3773_1<>sek won kong:kyu baek hwang:richard d. kim:steven a. greenberg:isaac s. kohane:peter j. park<>crosschip: a system supporting comparative analysis of different generations of affymetrix arrays<>bioinformatics<>byoung-tak zhang<>
2905<>3773_3<>jeong ho chang:kyu baek hwang:sok june oh<>bayesian network learning with feature abstraction for gene-drug dependency analysis<>jbcb<>byoung-tak zhang<>
2886<>3777_0<>ye-sho chen<>enhancing uml conceptual modeling through the use of virtual reality<>hicss<>bin zhang<>
2893<>3778_6<>dan pei:daniel massey:lixia zhang<>timer interaction in route flap damping<>icdcs<>beichuan zhang<>
32560<>3781_5<>jing xiao<>uncalibrated perspective reconstruction of deformable structures<>iccv<>takeo kanade<>
32569<>3781_14<>fernando de la torre<>multimodal oriented discriminant analysis<>icml<>takeo kanade<>
32571<>3781_16<>nulo<>facial expression analysis<>amfg<>takeo kanade<>
32612<>3781_57<>hua zhong:david schwartzman<>sensor guided ablation procedure of left atrial endocardium<>miccai<>takeo kanade<>
32627<>3781_72<>sundar vedula:simon baker:peter rander:robert t. collins<>three-dimensional scene flow<>pami<>takeo kanade<>
2845<>3783_3<>shuicheng yan:dong xu:lei zhang:hongjiang zhang<>coupled kernel-based subspace learning<>cvpr<>benyu zhang<>
2855<>3784_2<>wensi xi:edward a. fox:weiguo fan:zheng chen:jun yan:dong zhuang<>simfusion: measuring similarity using unified relationship matrix<>sigir<>benyu zhang<>
2864<>3784_11<>ning liu:fengshan bai:jun yan:zheng chen:wei-ying ma<>supervised semi-definite embedding for email data cleaning and visualization<>apweb<>benyu zhang<>
2866<>3784_13<>hua li:yi liu:lei ji:wensi xi:weiguo fan:zheng chen:wei-ying ma<>improving web search results using affinity graph<>sigir<>benyu zhang<>
2867<>3784_14<>ning liu:jun yan:fengshan bai:wensi xi:weiguo fan:zheng chen:lei ji:chenyong hu:wei-ying ma<>a similarity reinforcement algorithm for heterogeneous web pages<>apweb<>benyu zhang<>
2874<>3784_21<>dong zhuang:qiang yang:jun yan:zheng chen:ying chen<>efficient text classification by weighted proximal svm<>icdm<>benyu zhang<>
2876<>3784_23<>chenyong hu:yongji wang:qiang yang:qing wang:jinhui zhou:ran he:yun yan<>mining quantitative associations in large database<>apweb<>benyu zhang<>
2879<>3784_26<>jun yan:qiansheng cheng:qiang yang<>an incremental subspace learning algorithm to categorize large scale text data<>apweb<>benyu zhang<>
14033<>3789_2<>xiwei zhong:erik d. goodman<>open-ended robust design of analog filters using genetic programming<>gecco<>jianjun hu<>
14035<>3789_4<>erik d. goodman:kisung seo:zhun fan:rondal rosenberg<>the hierarchical fair competition (hfc) framework for sustainable evolutionary algorithms<>ec<>jianjun hu<>
14041<>3790_0<>hao min<>a low power and high performance analog front end for passive rfid transponder<>autoid<>jianyun hu<>
36627<>3791_6<>nulo<>surface interpolation of meshes by geometric subdivision<>cad<>xunnian yang<>
36614<>3792_0<>jian su:chew lim tan<>improving pronoun resolution using statistics-based semantic compatibility information<>acl<>xiaofeng yang<>
36615<>3792_1<>jian su:chew lim tan<>a twin-candidate model of coreference resolution with non-anaphor identification capability<>ijcnlp<>xiaofeng yang<>
36617<>3792_3<>jian su:lingpeng yang<>entity-based noun phrase coreference resolution<>cicling<>xiaofeng yang<>
36611<>3793_7<>nitin h. vaidya<>on physical carrier sensing in wireless ad hoc networks<>infocom<>xue yang<>
39899<>3794_1<>oliver brock<>efficient motion planning based on disassembly<>rss<>yuandong yang<>
39904<>3797_0<>nuno c. marques<>user group profile modeling based on user transactional data for personalized systems<>epia<>yiling yang<>
39912<>3800_1<>lei zhu:steven haker:allen tannenbaum:don p. giddens<>harmonic skeleton guided evaluation of stenoses in human coronary arteries<>miccai<>yan yang<>
39915<>3802_0<>bao-liang lu<>extracting features from protein sequences using chinese segmentation techniques for subcellular localization<>cibcb<>yang yang<>
39916<>3802_1<>bao-liang lu<>structure pruning strategies for min-max modular network<>isnn<>yang yang<>
16972<>3805_4<>nulo<>identifying direct causal effects in linear models<>aaai<>jin tian<>
16966<>3806_2<>kai-kuang ma<>a new state-space approach for super-resolution image sequence reconstruction<>icip<>jing tian<>
16967<>3806_3<>kai-kuang ma<>a mcmc approach for bayesian super-resolution image reconstruction<>icip<>jing tian<>
36631<>3822_0<>x. m. yang:k. l. teo:s. h. hou<>second order symmetric duality in non-differentiable multiobjective programming with f<>eor<>x. q. yang<>
36632<>3822_1<>x. m. yang:k. l. teo:s. h. hou<>multiobjective second-order symmetric duality with f<>eor<>x. q. yang<>
36634<>3824_0<>zhi liu<>use of satellite-derived landscape imperviousness index to characterize urban spatial growth<>urban<>xiaojun yang<>
14319<>3827_1<>sungbo seo:keun ho ryu<>multivariate stream data reduction in sensor network applications<>euc<>jaewoo kang<>
14321<>3827_3<>dongwon lee:prasenjit mitra<>identifying value mappings for data integration: an unsupervised approach<>wise<>jaewoo kang<>
14322<>3827_4<>byung-won on:dongwon lee:prasenjit mitra<>comparative study of name disambiguation problem using a scalable blocking-based framework<>jcdl<>jaewoo kang<>
14326<>3827_8<>tae sik han:dongwon lee:prasenjit mitra<>establishing value mappings using statistical models and user feedback<>cikm<>jaewoo kang<>
14327<>3827_9<>jiong yang:wanhong xu:pankaj chopra<>integrating heterogeneous microarray data sources using correlation signatures<>dils<>jaewoo kang<>
1431<>3835_0<>nulo<>on joint weibull probability density functions<>appml<>arni s. r. srinivasa rao<>
13287<>3836_1<>sebastian maneth<>the equivalence problem for deterministic mso tree transducers is decidable<>fsttcs<>joost engelfriet<>
13291<>3836_5<>andreas brandstadt:hoang-oanh le:vadim v. lozin<>clique-width for four-vertex forbidden subgraphs<>fct<>joost engelfriet<>
39936<>3843_0<>john lim<>exploring multilingual negotiation support for english-chinese dyads: an experimental study<>hicss<>yin ping yang<>
39937<>3844_0<>paul k. humphreys:ronan t. mcivor:biao yang<>main business service dimensions in an e-commerce environment<>icws<>ying yang<>
18115<>3845_2<>claude carlet:cunsheng ding<>linear codes from perfect nonlinear mappings and their secret sharing schemes<>tit<>jin yuan<>
15355<>3851_9<>najlae idrissi:driss aboutajdine<>selecting a discriminant subset of co-occurrence matrix features for texture-based image retrieval<>isvc<>jose martinez<>
36525<>3854_2<>chengqi zhang:shichao zhang<>database classification for multi-database mining<>is<>xindong wu<>
36526<>3854_3<>jiaqi wang:chengqi zhang<>support vector machines based on k-means clustering for real-time business intelligence systems<>ijbidm<>xindong wu<>
36502<>3855_1<>nulo<>efficient algorithms for intensity map splitting problems in radiation therapy<>cocoon<>xiaodong wu<>
36507<>3855_6<>danny z. chen:xiaobo sharon hu:shuang luan:cedric x. yu<>optimal terrain construction problems and applications in intensity-modulated radiation therapy<>algorithmica<>xiaodong wu<>
36510<>3855_9<>john abraham<>the intensity level reduction in radiation therapy<>sac<>xiaodong wu<>
36512<>3855_11<>kang li:steven millington:danny z. chen:milan sonka<>simultaneous segmentation of multiple closed surfaces using optimal graph searching<>ipmi<>xiaodong wu<>
36514<>3855_13<>danny z. chen:kang li:milan sonka<>the layered net surface problems in discrete geometry and medical image segmentation<>isaac<>xiaodong wu<>
36521<>3855_20<>danny z. chen:ovidiu daescu:yang dai:naoki katoh:jinhui xu<>"efficient algorithms and implementations for optimizing the sum of linear fractional functions, with applications."<>jco<>xiaodong wu<>
28702<>3856_0<>yueh-min huang:juei-nan chen:yen-ting lin<>automatic leveling system for e-learning examination pool using entropy-based decision tree<>icwl<>shu-chen cheng<>
36537<>3857_0<>guohui lin:xiu-feng wan:dong xu<>whole genome phylogeny based on clustered signature string composition<>csb<>xiaomeng wu<>
36539<>3857_2<>guohui lin<>selected string representation for whole genomes<>cibcb<>xiaomeng wu<>
28705<>3858_1<>michael p. wellman:daniel m. reeves:kevin m. lochner:rahul suri<>approximate strategic reasoning through hierarchical reduction of large symmetric games<>aaai<>shih-fen cheng<>
28708<>3858_4<>evan leung:kevin m. lochner:kevin o'malley:daniel m. reeves:l. julian schvartzman:michael p. wellman<>walverine: a walrasian trading agent<>dss<>shih-fen cheng<>
36530<>3859_2<>xiaohui xue<>directly operable image representation of multiscale primal sketch<>tmm<>xiaolin wu<>
36531<>3859_3<>lei zhang<>color demosaicking via directional linear minimum mean square-error estimation<>tip<>xiaolin wu<>
36535<>3859_7<>lei zhang:paul bao<>multiscale lmmse-based image denoising with optimal wavelet selection<>tcsv<>xiaolin wu<>
28677<>3860_0<>stefan funke:mordecai j. golin:piyush kumar:sheung-hung poon:edgar a. ramos<>curve reconstruction from noisy samples<>comgeo<>siu-wing cheng<>
28684<>3860_7<>tamal k. dey:edgar a. ramos<>manifold reconstruction from point samples<>soda<>siu-wing cheng<>
36542<>3861_0<>jorg peters<>an accurate error measure for adaptive subdivision surfaces<>smi<>xiaobin wu<>
28700<>3862_9<>i.-r. chen:baoshan gu:s. e. george<>on failure recoverability of client-server applications in mobile wireless environments<>tr<>sheng-tzong cheng<>
36541<>3863_1<>hui xu:manwoo jeon:lei shu:jinsung cho:sungyoung lee<>localized energy-aware broadcast protocol for wireless networks with directional antennas<>icess<>xiaoling wu<>
28662<>3865_5<>david garlan:bradley r. schmerl<>making self-adaptation an engineering reality<>bertinoro<>shang-wen cheng<>
28669<>3867_5<>zixiang xiong<>audio coding and image denoising based on the nonuniform modulated complex lapped transform<>tmm<>samuel cheng<>
28672<>3867_8<>vladimir stankovic:zixiang xiong<>computing the channel capacity and rate-distortion function with two-sided state information<>tit<>s. cheng<>
28675<>3867_11<>qiang wu:kenneth r. castleman<>non-ubiquitous digital watermarking for record indexing and integrity protection of medical images<>icip<>samuel cheng<>
15534<>3875_0<>pierre gerard:olivier sigaud<>combining latent learning with dynamic programming in the modular anticipatory classifier system<>eor<>jean-arcady meyer<>
27566<>3877_15<>vuk ercegovac:david j. dewitt<>the texture benchmark: measuring performance of text queries on a relational dbms<>vldb<>raghu ramakrishnan<>
27567<>3877_16<>douglas burdick:prasad deshpande:t. s. jayram:shivakumar vaithyanathan<>olap over uncertain and imprecise data<>vldb<>raghu ramakrishnan<>
6146<>3878_0<>daniel montrallo flickinger:tim stack:robert ricci:leigh stoller:russ fish:kirk webb:mark a. minor:jay lepreau<>"emulab's wireless sensor net testbed: true mobility, location precision, and remote access."<>sensys<>david johnson<>
6147<>3878_1<>daniel montrallo flickinger:tim stack:robert ricci:leigh stoller:russ fish:kirk webb:mark a. minor:jay lepreau<>robot couriers: precise mobility in a wireless network testbed<>sensys<>david johnson<>
18826<>3883_0<>matthias o. franz:bernhard scholkopf<>iterative kernel principal component analysis for image modeling<>pami<>kwang in kim<>
6129<>3886_0<>kumara sastry:hussein a. abbass:david e. goldberg<>sub-structural niching in estimation of distribution algorithms<>gecco<>d. d. johnson<>
6139<>3888_8<>elaine cohen<>distance extrema for spline models using tangent cones<>graphicsinterface<>david e. johnson<>
6143<>3889_3<>santashil palchaudhuri:rajnish kumar:richard g. baraniuk<>design of adaptive overlays for multi-scale communication in sensor networks<>dcoss<>david b. johnson<>
38183<>3892_0<>youngho lee:sejin oh:youngmin park:beom-chan lee:jeung-chul park:yoo oh:seokhee lee:han oh:jeha ryu:kwan-heng lee:hong kim:jongwon kim:yo-sung ho:woontack woo<>responsive multimedia system for virtual storytelling<>pcm<>yong-gu lee<>
38185<>3892_2<>dahee kim:youngil lim:kyuhyung kim:haesun kim:woontack woo<>dream of mee-luck: aspiration for a new dawn<>storytelling<>youngho lee<>
38144<>3894_9<>okehee goh:ziad kaakani:elliott rachlin<>a schedulable garbage collection for embedded applications in cli<>rtcsa<>yann-hang lee<>
38161<>3894_26<>vikram phadke:jin wook lee:amit deshmukh<>secure localization and location verification in sensor networks<>msn<>yann-hang lee<>
38174<>3894_39<>sandeep padmanabhan<>efficient state-saving architectures for power-mode switching<>ijseke<>yann-hang lee<>
37641<>3897_0<>nasim mahmood:james c. browne<>evolutionary performance-oriented development of parallel programs by composition of components<>wosp<>yusheng feng<>
37642<>3897_1<>nasim mahmood:james c. browne<>a case study in application family development by automated component composition: h-p adaptive finite element codes<>iccS<>yusheng feng<>
37636<>3898_1<>ming yao xu<>automorphism groups of tetravalent cayley graphs on regular -groups<>dm<>yan-quan feng<>
37646<>3899_2<>jianlin feng:huijun liu<>sentential association based text classification systems<>apweb<>yucai feng<>
38217<>3900_1<>yan luo<>application of machine shop data model in manufacturing simulation<>msv<>y. tina lee<>
38218<>3900_2<>yan luo<>data exchange for machine shop simulation<>wsc<>y. tina lee<>
38201<>3903_14<>seunglak choi:jungsook kim:hyukjae jang:su myeon kim:junehwa song:hangkyu kim<>a framework for handling dependencies among web services transactions<>www<>yunjoon lee<>
16855<>3905_0<>wanghong yuan:mahesh kallahalla:nayeem islam<>hail: a language for easy and correct device access<>emsoft<>jun sun<>
16843<>3908_4<>mo chen:hua-jun zeng:kwok-yan lam<>a practical system of keyphrase extraction for web pages<>cikm<>jian-tao sun<>
16849<>3908_10<>hua-jun zeng:huan liu:yuchang lu:zheng chen<>cubesvd: a novel approach to personalized web search<>www<>jian-tao sun<>
16860<>3911_0<>sergio a. velastin:boghos a. boghossian:b. p. l. lo:m. a. vicencio-silva<>prismatica: toward ambient intelligence in public transport environments<>tsmc<>jie sun<>
20605<>3912_1<>qian zhang:fengguang an:xiuzhen cheng<>diar: a dynamic interference aware routing protocol for ieee 802.11-based mobile ad hoc networks<>msn<>liran ma<>
16764<>3914_0<>jin song dong:yuzhang feng:yuan-fang li<>a tools environment for developing and reasoning about ontologies<>apsec<>jun sun<>
16769<>3914_5<>hai wang:jin song dong:yuan-fang li<>tcoz approach to owl-s process model design<>seke<>jing sun<>
16774<>3914_10<>jin song dong<>synthesis of distributed processes from scenario-based specifications<>fm<>jun sun<>
16781<>3914_17<>jin song dong<>model checking live sequence charts<>iceccs<>jun sun<>
16783<>3914_19<>hai wang:sasanka athauda:tazkiya sheik<>svg web environment for z specification language<>icfem<>jing sun<>
16785<>3914_21<>hai wang:jin song dong<>reasoning support for swrl-fol using alloy<>seke<>jing sun<>
16786<>3914_22<>jin song dong<>extracting fsms from object-z specifications with history invariants<>iceccs<>jun sun<>
16789<>3914_25<>hongyu zhang:yuan-fang li:hai wang<>formal semantics and verification for feature modeling<>iceccs<>jing sun<>
16793<>3914_29<>santokh singh:john c. grundy:john g. hosking<>an architecture for developing aspect-oriented web services<>icws<>jing sun<>
16795<>3914_31<>jun sun:yuan li:hai wang<>visualizing and simulating semantic web services ontologies<>icfem<>jing sun<>
16806<>3916_2<>yin li:heung-yeung shum<>video object cut and paste<>tog<>jian sun<>
16809<>3916_5<>weiwei zhang:xiaoou tang:heung-yeung shum<>bi-directional tracking using trajectory segment analysis<>iccv<>jian sun<>
16813<>3916_9<>yin li:sing bing kang<>symmetric stereo matching for occlusion handling<>cvpr<>jian sun<>
16814<>3916_10<>lu yuan:jiaya jia:heung-yeung shum<>image completion with structure propagation<>tog<>jian sun<>
16800<>3918_0<>david eppstein:michael t. goodrich<>the skip quadtree: a simple dynamic data structure for multidimensional data<>compgeom<>jonathan z. sun<>
16801<>3918_1<>michael t. goodrich:george s. lueker<>c-planarity of extrovert clustered graphs<>gd<>jonathan z. sun<>
4241<>3919_0<>yinglei song:russell l. malmberg:liming cai<>profiling and searching for rna pseudoknot structures in genomes<>iccS<>chunmei liu<>
4242<>3919_1<>yinglei song:russell l. malmberg:liming cai<>profiling and searching for rna pseudoknot structures in genomes<>tcsb<>chunmei liu<>
16824<>3920_0<>spiros papadimitriou:christos faloutsos<>online latent variable detection in sensor networks<>icde<>jimeng sun<>
16833<>3920_9<>huiming qu:deepayan chakrabarti:christos faloutsos<>neighborhood formation and anomaly detection in bipartite graphs<>icdm<>jimeng sun<>
16835<>3920_11<>spiros papadimitriou:christos faloutsos<>streaming pattern discovery in multiple time-series<>vldb<>jimeng sun<>
16838<>3920_14<>huiming qu:deepayan chakrabarti:christos faloutsos<>relevance search and anomaly detection in bipartite graphs<>sigkdd<>jimeng sun<>
4233<>3921_0<>kui wu:valerie king<>randomized coverage-preserving scheduling schemes for wireless sensor networks<>networking<>chong liu<>
4235<>3921_2<>k. wu<>performance evaluation of range-free localization methods for wireless sensor networks<>ipccc<>c. liu<>
4236<>3925_0<>w.-s. e. chen:pei-chun chang:jeremy j. w. chen<>topological-based classification using artificial gene networks<>IEEEicci<>chun-chi liu<>
6626<>3926_0<>jongman kim:chrysostomos nicopoulos:narayanan vijaykrishnan:chita r. das<>"design and analysis of an noc architecture from performance, reliability and energy perspective."<>ancs<>dongkook park<>
6627<>3926_1<>jongman kim:theo theocharides:narayanan vijaykrishnan:chita r. das<>a low latency router supporting adaptivity for on-chip interconnects<>dac<>dongkook park<>
22593<>3928_3<>eric dean tribble:jonathan s. shapiro<>concurrency among strangers<>tgc<>mark s. miller<>
22578<>3929_7<>dmitri bitouk:laurent younes<>clutter invariant atr<>pami<>michael i. miller<>
22580<>3929_9<>patrick barta:anqi qiu<>a stochastic model for studying the laminar structure of cortex from mri<>tmi<>michael i. miller<>
22582<>3929_11<>yan cao:raimond l. winslow:laurent younes<>large deformation diffeomorphic metric mapping of vector fields<>tmi<>michael i. miller<>
22589<>3929_18<>yan cao:raimond l. winslow:laurent younes<>large deformation diffeomorphic metric mapping of fiber orientations<>iccv<>michael i. miller<>
19234<>3930_10<>rajesh ramanand<>discovering the biomedical deep web<>wise<>king-ip lin<>
19237<>3930_13<>vasile rus:arthur c. graesser:philip m. mccarthy<>a study on textual entailment<>ictai<>king-ip lin<>
19222<>3931_0<>chin-teng lin:chih-hsien yang:i-fang chung:chuen-der huang:yuh-shyong yang<>protein metal binding residue prediction based on neural networks<>ijns<>ken-li lin<>
22614<>3933_0<>nitin h. vaidya<>a mac protocol to reduce sensor network energy consumption using a wakeup radio<>tmc<>matthew j. miller<>
22615<>3933_1<>cigdem sengul:indranil gupta<>exploring the energy-latency trade-off for broadcasts in energy-saving sensor networks<>icdcs<>matthew j. miller<>
22597<>3935_2<>edy tri baskoro:jozef siran:martin sutton<>complete characterization of almost moore digraphs of degree three<>jgt<>mirka miller<>
36550<>3942_0<>tong qiu<>wavelet coding of volumetric medical images for high throughput and operability<>tmi<>xiaolin wu<>
19246<>3944_5<>tao yu<>a broker-based framework for qos-aware web service composition<>eee<>kwei-jay lin<>
19249<>3944_8<>jen-yao chung:simon s. y. shim<>beyond electronic commerce<>computer<>kwei-jay lin<>
19272<>3944_31<>tao yu<>service selection algorithms for web services with end-to-end qos constraints<>isem<>kwei-jay lin<>
39942<>3945_0<>r. buckmaster:j. h. yoo:k. shin:t. sekiguchi:m. yokoyama:t. hanada:t. goto:m. cho:y. kawazoe<>gan nanodot fabrication by implant source growth<>mj<>y. yao<>
36546<>3947_1<>victor c. s. lee:joseph kee-yin ng<>a preemptive scheduling algorithm for wireless real-time on-demand data broadcast<>rtcsa<>xiao wu<>
36547<>3947_2<>victor c. s. lee<>wireless real-time on-demand data broadcast scheduling with dual deadlines<>jpdc<>xiao wu<>
32710<>3951_8<>hee-seok oh<>hybrid local polynomial wavelet shrinkage: wavelet regression with automatic boundary adjustment<>csda<>thomas c. m. lee<>
32688<>3955_1<>brian potetz<>scaling laws in natural scenes and the inference of 3d shape<>nips<>tai-sing lee<>
32692<>3955_5<>yuguo yu<>adaptive contrast gain control and information maximization<>ijon<>tai sing lee<>
32693<>3956_0<>chao-hung lin:hung-kuo chu:chih-yuan yao<>progressive mesh metamorphosis<>jvca<>tong-yee lee<>
35866<>3959_3<>jiawei han:xiaoxin yin:dong xin<>mining evolving customer-product relationships in multi-dimensional space<>icde<>xiaolei li<>
35871<>3959_8<>hwanjo yu:jiong yang:jiawei han<>making svms scalable to large data sets using hierarchical cluster indexing<>datamine<>xiaolei li<>
35841<>3962_10<>nulo<>efficient differential evolution using speciation for multimodal function optimization<>gecco<>xiaodong li<>
35852<>3968_4<>leen-kiat soh<>hybrid negotiation for resource coordination in multiagent systems<>wias<>xin li<>
35749<>3970_6<>zhiyong peng:qing li:ling feng:junqiang liu<>using object deputy model to prepare data for data warehousing<>tkde<>xuhui li<>
35755<>3970_12<>haixing zhao:ruying liu<>on problems and conjectures on adjointly equivalent graphs<>dm<>xueliang li<>
35758<>3970_15<>ligong wang<>integral trees with diameters 5 and 6<>dm<>xueliang li<>
35759<>3970_16<>wenan zang<>a combinatorial algorithm for minimum weighted colorings of claw-free perfect graphs<>jco<>xueliang li<>
35764<>3970_21<>yinkui li:shenggui zhang<>rupture degree of graphs<>ijcm<>xueliang li<>
35778<>3970_35<>victor neumann-lara:eduardo rivera-campo<>two approaches for the generalization of leaf edge exchange graphs on spanning trees to connected spanning k-edge subgraphs of a graph<>arscom<>xueliang li<>
35780<>3970_37<>ligong wang:cornelis hoede<>two classes of integral regular graphs<>arscom<>xueliang li<>
35793<>3974_6<>weizhao wang:zheng sun<>share the multicast payment fairly<>cocoon<>xiang-yang li<>
35795<>3974_8<>kousha moaveninejad:wen-zhan song<>robust position-based routing for wireless ad hoc networks<>adhoc<>xiang-yang li<>
35798<>3974_11<>peng-jun wan<>theoretically good distributed cdma/ovsf code assignment for wireless ad hoc networks<>cocoon<>xiang-yang li<>
35800<>3974_13<>kousha moaveninejad:ophir frieder<>regional gossip routing for wireless ad hoc networks<>monet<>xiang-yang li<>
35801<>3974_14<>zheng sun:philip s. yu<>iterative mining for rules with constrained antecedents<>sdm<>xiang-yang li<>
35803<>3974_16<>zheng sun:weizhao wang:xiaowen chu<>mechanism design for set cover games when elements are agents<>aaim<>xiang-yang li<>
35805<>3974_18<>ming-yang kao:weizhao wang<>towards truthful mechanisms for binary demand games: a general framework<>sigecom<>xiang-yang li<>
35809<>3974_22<>zheng sun:weizhao wang<>cost sharing and strategyproof mechanisms for set cover games<>stacs<>xiang-yang li<>
35819<>3974_32<>weizhao wang:zheng sun:yu wang<>design multicast protocols for non-cooperative networks<>infocom<>xiang-yang li<>
35822<>3974_35<>weizhao wang<>towards truthful mechanisms for binary demand games: a general framework<>aaai<>xiang-yang li<>
2381<>3975_1<>rui zhang 0003:panos kalnis:kian-lee tan<>generalized multidimensional data mapping and query processing<>tods<>beng chin ooi<>
2392<>3975_12<>yanjiang yang<>a privacy preserving rental system<>isw<>beng chin ooi<>
2394<>3975_14<>anthony k. h. tung:xin xu<>curler: finding and visualizing nonlinear correlated clusters<>sigmod<>beng chin ooi<>
2402<>3975_22<>elisa bertino:yanjiang yang:robert h. deng<>privacy and ownership preserving of outsourced medical data<>icde<>beng chin ooi<>
2407<>3975_27<>feng bao:robert h. deng:yanjiang yang<>tailored reversible watermarking schemes for authentication of electronic clinical atlas<>titb<>beng chin ooi<>
2422<>3975_42<>barbara catania:wen qiang wang:xiaoling wang<>lazy xml updates: laziness as a virtue of update and structural join efficiency<>sigmod<>beng chin ooi<>
2437<>3975_57<>heng tao shen:xiaofang zhou<>towards effective indexing for very large video sequence database<>sigmod<>beng chin ooi<>
2440<>3975_60<>h. v. jagadish:quang hieu vu<>baton: a balanced tree structure for peer-to-peer networks<>vldb<>beng chin ooi<>
2444<>3975_64<>yanfeng shu:kian-lee tan:aoying zhou<>supporting multi-dimensional range queries in peer-to-peer systems<>p2p<>beng chin ooi<>
2449<>3975_69<>yongluan zhou:kian-lee tan<>dynamic load management for distributed continuous query systems<>icde<>beng chin ooi<>
2479<>3975_99<>bin cui:jianwen su:kian-lee tan<>indexing high-dimensional data for efficient in-memory similarity search<>tkde<>beng chin ooi<>
32413<>3978_0<>jaspal subhlok<>fast pattern-based throughput prediction for tcp bulk transfers<>ccgrid<>tsung-i huang<>
37989<>3979_0<>eric wang:hak soo kim:jin hyun son:sanghoon lee:il hong suh<>ontology modeling and storage system for robot context understanding<>kes<>yong se kim<>
38003<>3980_13<>byung ro moon<>new topologies for genetic search space<>gecco<>yong-hyuk kim<>
38033<>3983_1<>jeong-sik kim:soo-mi choi:myoung-hee kim<>shape comparison of the hippocampus using a multiresolution representation and icp normalization<>kes<>yong-guk kim<>
38034<>3983_2<>sang-jun kim:jeong-eom lee:min-soo jang:seok-joo lee:gwi-tae park<>3-d pose tracking of the car occupant<>kes<>yong-guk kim<>
38035<>3983_3<>soo-mi choi<>an affective user interface based on facial expression recognition and eye-gaze tracking<>acii<>yong-guk kim<>
38038<>3983_6<>yang-bok lee:seung-bin moon<>face and facial expression recognition with an embedded system for human-robot interaction<>acii<>yong-guk kim<>
38041<>3985_0<>ilenia tinnirello:sunghyun choi<>revisit of rts/cts exchange in high-speed ieee 802.11 networks<>wowmom<>youngsoo kim<>
38012<>3990_0<>woo-jae kim:joo-young baek:sun-don lee:young-joo suh:jin-a kim<>efficient uplink scheduler architecture of subscriber station in ieee 802.16 system<>euc<>yun-sung kim<>
38027<>3993_13<>mark shaneck:karthikeyan mahadevan:vishal kher<>remote software-based attestation for wireless sensors<>esas<>yongdae kim<>
14265<>3995_2<>catherine marshall<>convergent usability evaluation: a case study from the eirs project<>chi<>jeff johnson<>
28835<>3997_0<>felix t. s. chan<>multicriterion genetic optimization for due date assigned distribution network problems<>dss<>s. h. chung<>
33194<>3998_0<>bethany r. leffler:michael l. littman:alexander l. strehl<>efficient exploration with latent structure<>rss<>thomas j. walsh<>
33195<>3998_1<>alexander borgida:haym hirsh<>towards measuring similarity in description logics<>dlog<>thomas walsh<>
33196<>3998_2<>d. richard kuhn<>challenges in securing voice over ip<>ieeesp<>thomas j. walsh<>
33108<>4000_7<>steven david prestwich:francesca rossi:kristen brent venable<>constraint-based preferential optimization<>aaai<>toby walsh<>
33125<>4000_24<>christian bessiere:emmanuel hebrard:brahim hnich:zeynep kiziltan<>filtering algorithms for the nvalue constraint<>cpaior<>toby walsh<>
33131<>4000_30<>emmanuel hebrard<>"improved algorithm for finding (a, b)-super solutions."<>cp<>toby walsh<>
33142<>4000_41<>philip kilby:john k. slaney<>the backbone of the travelling salesperson<>ijcai<>toby walsh<>
33146<>4000_45<>fahiem bacchus<>propagating logical combinations of constraints<>ijcai<>toby walsh<>
33155<>4000_54<>alan m. frisch:brahim hnich:ian miguel:barbara m. smith<>transforming and refining abstract constraint specifications<>sara<>toby walsh<>
33159<>4000_58<>claude-guy quimper<>beyond finite domains: the all different and global cardinality constraints<>cp<>toby walsh<>
33174<>4000_73<>francesca rossi:kristen brent venable<>aggregating preferences cannot be fair<>ia<>toby walsh<>
33175<>4000_74<>christian bessiere:emmanuel hebrard:brahim hnich:zeynep kiziltan<>the range and roots constraints: specifying counting and occurrence problems<>ijcai<>toby walsh<>
33181<>4000_80<>claude-guy quimper<>"the all different and global cardinality constraints on set, multiset and tuple variables."<>csclp<>toby walsh<>
33193<>4000_92<>philip kilby:john k. slaney:sylvie thiebaux<>backbones and backdoors in satisfiability<>aaai<>toby walsh<>
33094<>4001_1<>valery a. liskovets<>counting unrooted loopless planar maps<>ejc<>timothy r. s. walsh<>
33095<>4001_2<>nulo<>efficient enumeration of sensed planar maps<>dm<>timothy r. walsh<>
28848<>4003_1<>shih-chin chien<>analysis of multiservice cellular networks with asymmetrical traffic and handoff queue<>comcom<>shun-ping chung<>
28840<>4004_4<>yanjun li<>text document clustering based on frequent word sequences<>cikm<>soon myoung chung<>
34587<>4007_0<>bruno apolloni:d. iannizzi:dario malchiodi<>granular regression<>wirn<>witold pedrycz<>
34596<>4008_4<>sung-kwun oh:ho-sung park<>multi-layer hybrid fuzzy polynomial neural networks: a design in the framework of computational intelligence<>ijon<>witold pedrycz<>
34597<>4008_5<>angelo ciaramella:roberto tagliaferri<>the genetic development of ordinal sums<>fss<>witold pedrycz<>
34599<>4008_7<>keun chang kwak<>face recognition: a study in information fusion using fuzzy integral<>prl<>witold pedrycz<>
34601<>4008_9<>giancarlo succi<>genetic granular classifiers in modeling software quality<>jss<>witold pedrycz<>
23971<>4009_8<>guan-ming su<>efficient bandwidth resource allocation for low-delay multiuser video streaming<>tcsv<>min wu<>
23975<>4009_12<>shan he<>performance study on multimedia fingerprinting employing traceability codes<>iwdw<>min wu<>
23982<>4009_19<>ashwin swaminathan:yinian mao:krishnan kailas<>data hiding in compiled program binaries for enhancing computer system performance<>ih<>min wu<>
23985<>4009_22<>h. vicky zhao:z. jane wang:k. j. ray liu<>forensic analysis of nonlinear collusion attacks for multimedia fingerprinting<>tip<>min wu<>
23989<>4009_26<>yinian mao<>coordinated sensor deployment for improving secure communications and sensing coverage<>sasn<>min wu<>
24016<>4011_0<>bernhard scholkopf:gokhan h. bakir<>building sparse large margin classifiers<>icml<>mingrui wu<>
24013<>4012_2<>clifton forlines:chia shen:frederic vernier<>under my finger: human factors in pushing and rotating documents across the table<>interact<>mike wu<>
24015<>4012_4<>ronald baecker:brian richards<>participatory design of an orientation aid for amnesics<>chi<>mike wu<>
23999<>4014_0<>manuel bronstein:ziming li<>picard--vessiot extensions for linear functional systems<>issac<>min wu<>
32656<>4018_4<>hyunwoo kim:wonjun hwang:josef kittler<>component-based lda face description for image retrieval and mpeg-7 standardisation<>ivc<>tae-kyun kim<>
40332<>4027_0<>justin zobel<>effective and scalable authorship attribution using function words<>airs<>ying zhao<>
40299<>4034_1<>sumeer bhola:daniel c. sturman<>subscription propagation and content-based routing with delivery guarantees<>wdag<>yuanyuan zhao<>
40304<>4036_2<>yiyu yao<>on interactive data mining<>iicai<>yan zhao<>
40305<>4036_3<>yiyu yao:ning zhong<>multilevel web personalization<>webi<>yan zhao<>
40311<>4036_9<>yiyu yao<>interactive classification using a granule network<>IEEEicci<>yan zhao<>
19618<>4037_4<>mafruz zaman ashrafi:david taniar<>an efficient compression technique for frequent itemset generation in association rule mining<>pakdd<>kate a. smith<>
19620<>4037_6<>xiaozhe wang:rob j. hyndman<>dimension reduction for clustering time series using global characteristics<>iccS<>kate a. smith<>
19621<>4037_7<>nulo<>applications of neural networks<>cor<>kate a. smith<>
19638<>4037_24<>terence kwok<>optimization via intermittency with a self-organizing neural network<>neco<>kate a. smith<>
19640<>4037_26<>rowena chau:chung-hsing yeh<>a neural network model for hierarchical multilingual text categorization<>isnn<>kate a. smith<>
30753<>4040_0<>i. faik baskaya:sung kyu lim:david v. anderson<>hierarchical placement for large-scale fpaa<>fpl<>sasank reddy<>
30755<>4040_2<>i. faik baskaya:sung kyu lim:tyson s. hall:david v. anderson<>mapping algorithm for large-scale field programmable analog array<>ispd<>sasank reddy<>
30760<>4043_1<>janusz rajski:jerzy tyszer:chen wang<>finite memory test response compactors for embedded test applications<>tcad<>sudhakar m. reddy<>
32671<>4048_1<>mostafa h. ammar<>a comparison of heterogeneous video multicast schemes: layered encoding or stream replication<>tmm<>taehyun kim<>
15294<>4049_0<>xiaolong wu:yingtao jiang:bingmei fu:wei hang:jinsuo zhang:ning li<>instrumentation of ysz oxygen sensor calibration in liquid lead-bismuth eutectic<>iscas<>jian ma<>
15296<>4051_0<>min gao:qian zhang:lionel m. ni:wenwu zhu<>localized low-power topology control algorithms in ieee 802.15.4-based sensor networks<>icdcs<>jian ma<>
15298<>4052_0<>nulo<>smart u-things and ubiquitous intelligence<>icess<>jianhua ma<>
40347<>4059_1<>xuehong sun<>an on-chip ip address lookup algorithm<>tc<>yiqiang q. zhao<>
40349<>4059_3<>donald a. dawson:jiashan tang<>balancing queues by mean field interaction<>questa<>yiqiang q. zhao<>
40337<>4060_0<>lianwei zhao:siwei luo:chao shao<>construction algorithm of principal curves in the sense of limit<>ausai<>yanchang zhao<>
40339<>4060_2<>chengqi zhang:shichao zhang<>a recent-biased dimension reduction technique for time series data<>pakdd<>yanchang zhao<>
5555<>4062_2<>jeng-sheng yeh:bing-yu chen:ming ouhyoung<>a web-based three-dimensional protein retrieval system by matching visual similarity<>bioinformatics<>ding-yun chen<>
5556<>4063_0<>michiel h. m. smid:bin xu<>geometric algorithms for density-based data clustering<>ijcga<>danny z. chen<>
5529<>4066_0<>martin torngren:ivica crnkovic<>component-based vs. model-based development: a comparison in the context of vehicular embedded systems<>euromicro<>de-jiu chen<>
5532<>4067_2<>steven xia:david sun:chengzheng sun<>collaborative object grouping in graphics editing systems<>colcom<>david chen<>
5534<>4067_4<>steven xia:david sun:chengzheng sun<>object-associated telepointer for real-time collaborative document editing systems<>colcom<>david chen<>
5541<>4067_11<>steven xia:david sun:chengzheng sun<>supporting workspace-mediated interaction in collaborative presentations with copowerpoint<>colcom<>david chen<>
5544<>4067_14<>steven xia:david sun:chengzheng sun<>a collaborative table editing technique based on transparent adaptation<>otm<>david chen<>
5513<>4068_2<>hong-yuan mark liao:suh-yin lee<>robust video retrieval using temporal mvmb moments<>kes<>duan-yu chen<>
5519<>4069_5<>aloysius k. mok:jianliang yi:mark nixon:tom aneweer:rusty shepard<>data collection with battery and buffer consideration in a large scale sensor network<>rtcsa<>deji chen<>
33834<>4071_0<>nansheng chen:todd w. harris:igor antoshechkin:carol bastiani:tamberlyn bieri:darin blasiar:keith bradnam:payan canaran:juancarlos chan:chao-kung chen:fiona cunningham:paul davis:eimear kenny:ranjana kishore:daniel lawson:raymond lee:hans-michael muller:cecilia nakamura:shraddha pai:philip ozersky:andrei petcherski:anthony rogers:aniko sabo:erich m. schwarz:kimberly van auken:qinghua wang:richard durbin:john spieth:paul w. sternberg:lincoln d. stein<>wormbase: a comprehensive data resource for  biology and genomics<>nar<>wen j. chen<>
33620<>4072_1<>srinivasan parthasarathy 0002:madhav v. marathe:aravind srinivasan:sibylle zust<>provable algorithms for parallel sweep scheduling on unstructured meshes<>ipps<>v. s. anil kumar<>
33622<>4072_3<>madhav v. marathe:srinivasan parthasarathy 0002:aravind srinivasan<>scheduling on unrelated machines under tree-like precedence constraints<>approx<>v. s. anil kumar<>
33623<>4072_4<>madhav v. marathe:srinivasan parthasarathy 0002:aravind srinivasan<>approximation algorithms for scheduling on multiple machines<>focs<>v. s. anil kumar<>
33820<>4075_0<>l. clarke:james f. kurose:donald f. towsley<>optimizing cost-sensitive trust-negotiation protocols<>infocom<>weifeng chen<>
33822<>4075_2<>james f. kurose:donald f. towsley:zihui ge<>optimizing event distribution in publish/subscribe systems in the presence of policy-constraints and composite events<>icnp<>weifeng chen<>
33823<>4075_3<>yong huang:bruno f. ribeiro:kyoungwon suh:honggang zhang:edmundo de souza e silva:james f. kurose:donald f. towsley<>exploiting the ipid field to infer network path and end-system characteristics<>pam<>weifeng chen<>
33630<>4076_0<>rajeev alur:p. madhusudan:mahesh viswanathan<>congruences for visibly pushdown languages<>icalp<>viraj kumar<>
33631<>4076_1<>nirman kumar:mahesh viswanathan<>on the complexity of error explanation<>vmcai<>viraj kumar<>
33632<>4076_2<>mahesh viswanathan<>conformance testing in the presence of multiple faults<>soda<>viraj kumar<>
33797<>4079_2<>christian krattenthaler:arthur l. b. yang<>the flagged cauchy determinant<>gc<>william y. c. chen<>
33803<>4079_8<>qing-hu hou:yan-ping mu<>applicability of the q-analogue of zeilberger's algorithm<>jsc<>william y. c. chen<>
33805<>4079_10<>david c. torney<>equivalence classes of matchings and lattice-square designs<>dam<>william y.-c. chen<>
33635<>4080_0<>subhas c. misra:uma kumar<>a strategic modeling technique for change management in organizations undergoing bpr<>iceis<>vinod kumar<>
23268<>4085_1<>thomas behr<>topological relationships between complex lines and complex regions<>er<>markus schneider<>
23274<>4085_7<>nulo<>evaluation of spatio-temporal predicates on moving objects<>icde<>markus schneider<>
23277<>4085_10<>brian e. weinrich<>use of rational numbers in the design of robust geometric primitives for three-dimensional spatial database systems<>gis<>markus schneider<>
23288<>4085_21<>mark mckenney:alejandro pauly:reasey praing<>dimension-refined topological predicates<>gis<>markus schneider<>
23298<>4085_31<>alejandro pauly<>topological predicates between vague spatial objects<>ssd<>markus schneider<>
23299<>4085_32<>alejandro pauly<>identifying topological predicates for vague spatial objects<>sac<>markus schneider<>
23302<>4085_35<>william g. farmerie:joachim hammer:li liu:anuj sahni<>biological workflow with blastquest<>dke<>markus schneider<>
23307<>4086_3<>alassane ndiaye:patrick gebhard:michael kipp:martin klesen:wolfgang wahlster<>ambient intelligence in edutainment: tangible interaction with life-like exhibit guides<>intetain<>michael schneider<>
33841<>4088_3<>qiao lian:zheng zhang<>on the impact of replica placement to the reliability of distributed brick storage systems<>icdcs<>wei chen<>
33842<>4088_4<>shiding lin:qiao lian:zheng zhang<>sigma: a fault-tolerant mutual exclusion algorithm in dynamic distributed systems subject to process crashes and memory losses<>prdc<>wei chen<>
40498<>4089_1<>harish sethu<>on achieving fairness in the joint allocation of processing and bandwidth resources: principles and algorithms<>ton<>yunkai zhou<>
40477<>4091_0<>madhuri s. mulekar:praveen nerellapalli<>adaptive spam filtering using dynamic feature space<>ictai<>yan zhou<>
40462<>4093_2<>jialun qin:hsinchun chen:jay f. nunamaker jr.<>multilingual web retrieval: an experiment on a multilingual business intelligence portal<>hicss<>yilu zhou<>
40465<>4093_5<>edna reid:jialun qin:guanpi lai:marc sageman:gabriel weimann:hsinchun chen<>collecting and analyzing the presence of terrorists on the web: a case study of jihad websites<>isi<>yilu zhou<>
40467<>4093_7<>michael chau:jialun qin:chunju tseng:hsinchun chen<>spidersrus: automated development of vertical search engines in different domains and languages<>jcdl<>yilu zhou<>
40468<>4093_8<>edna reid:jialun qin:hsinchun chen:guanpi lai<>us domestic extremist groups on the web: link and content analysis<>expert<>yilu zhou<>
40472<>4093_12<>jialun qin:edna reid:guanpi lai:hsinchun chen<>studying the presence of terrorism on the web: an knowledge portal approach<>jcdl<>yilu zhou<>
40475<>4093_15<>jialun qin:guanpi lai:edna reid:marc sageman:hsinchun chen<>the dark web portal project: collecting and analyzing the presence of terrorist groups on the web<>isi<>yilu zhou<>
581<>4095_0<>kenneth po:kamran farhadi:zheng li:eyal de lara<>the taser intrusion recovery system<>sosp<>ashvin goel<>
40490<>4096_4<>ying yan:beng chin ooi:kian-lee tan:aoying zhou<>optimizing continuous multijoin queries over distributed streams<>cikm<>yongluan zhou<>
40492<>4096_6<>beng chin ooi:kian-lee tan<>dynamic load management for distributed continuous query systems<>icde<>yongluan zhou<>
40494<>4096_8<>beng chin ooi:kian-lee tan:wee hyong tok<>an adaptable distributed query processing architecture<>dke<>yongluan zhou<>
40482<>4098_0<>hongzhi li<>scud: fast structure clustering of decoys using reference state to remove overall rotation<>jcc<>yaoqi zhou<>
40483<>4098_1<>hongzhi li<>fold helical proteins by energy minimization in dihedral space and a dfire-based statistical energy function<>jbcb<>yaoqi zhou<>
40484<>4098_2<>hongyi zhou:chi zhang:song liu<>"web-based toolkits for topology prediction of transmembrane helical proteins, fold recognition, structure and binding scoring, folding-kinetics analysis and comparative analysis of domain combinations."<>nar<>yaoqi zhou<>
40485<>4098_3<>hongyi zhou<>spem: improving multiple sequence alignment with sequence profiles and predicted secondary structures<>bioinformatics<>yaoqi zhou<>
568<>4099_2<>wu-chang feng:david maier:wu-chi feng:jonathan walpole<>"forensix: a robust, high-performance reconstruction system."<>icdcsw<>ashvin goel<>
571<>4099_5<>gokul soundararajan:kaloian manassiev:jin chen:cristiana amza<>feedback-based scheduling for back-end databases in shared dynamic content server clusters<>icac<>ashvin goel<>
526<>4101_2<>mihaela enachescu:ramesh govindan:rajeev motwani<>scale-free aggregation in sensor networks<>tcs<>ashish goel<>
531<>4101_7<>matthew andrews:antonio fernandez:lisa zhang<>source routing and scheduling in packet networks<>jacm<>ashish goel<>
536<>4101_12<>adam meyerson:serge a. plotkin<>approximate majorization and fair online load balancing<>talg<>ashish goel<>
7685<>4102_4<>gerth stolting brodal:j. ian munro<>fast allocation and deallocation with an improved buddy system<>acta<>erik d. demaine<>
7686<>4102_5<>jeff erickson:ferran hurtado:john iacono:stefan langerman:henk meijer:mark h. overmars:sue whitesides<>separating point sets in polygonal environments<>ijcga<>erik d. demaine<>
7703<>4102_22<>martin l. demaine:david eppstein:greg n. frederickson:erich friedman<>hinged dissection of polyominoes and polyforms<>comgeo<>erik d. demaine<>
7720<>4102_39<>ilya baran<>optimal adaptive algorithms for finding the nearest and farthest point on a parametric black-box curve<>ijcga<>erik d. demaine<>
7725<>4102_44<>jonathan bredin:mohammad taghi hajiaghayi:daniela rus<>deploying sensor networks with guaranteed capacity and fault tolerance<>mobihoc<>erik d. demaine<>
7729<>4102_48<>mohammad taghi hajiaghayi:dimitrios m. thilikos<>exponential speedup of fixed-parameter algorithms for classes of graphs excluding single-crossing graphs as minors<>algorithmica<>erik d. demaine<>
7732<>4102_51<>fedor v. fomin:mohammad taghi hajiaghayi:dimitrios m. thilikos<>"fixed-parameter algorithms for (, )-center in planar graphs and map graphs."<>talg<>erik d. demaine<>
7748<>4102_67<>oswin aichholzer:david bremner:ferran hurtado:evangelos kranakis:hannes krasser:suneeta ramaswami:saurabh sethia:jorge urrutia<>games on triangulations<>tcs<>erik d. demaine<>
7751<>4102_70<>ilya baran:mihai patrascu<>subquadratic algorithms for 3sum<>wads<>erik d. demaine<>
7752<>4102_71<>timothy abbott:martin l. demaine:daniel kane:stefan langerman:jelani nelson:vincent yeung<>dynamic ham-sandwich cuts of convex polygons in the plane<>cccg<>erik d. demaine<>
7754<>4102_73<>david bremner:jeff erickson:john iacono:stefan langerman:pat morin:godfried t. toussaint<>output-sensitive algorithms for computing nearest-neighbour decision boundaries<>dcg<>erik d. demaine<>
7759<>4102_78<>martin l. demaine:jeffrey f. lindy:diane l. souvaine<>hinged dissection of polypolyhedra<>wads<>erik d. demaine<>
7771<>4102_90<>francisco gomez-martin:henk meijer:david rappaport:perouz taslakian:godfried t. toussaint:terry winograd:david r. wood<>the distance geometry of deep rhythms and scales<>cccg<>erik d. demaine<>
7776<>4102_95<>mohammad taghi hajiaghayi<>"graphs excluding a fixed minor have grids as large as treewidth, with combinatorial and algorithmic applications through bidimensionality."<>soda<>erik d. demaine<>
7780<>4102_99<>michael a. bender:david p. bunde:sandor p. fekete:vitus j. leung:henk meijer:cynthia a. phillips<>communication-aware processor allocation for supercomputers<>wads<>erik d. demaine<>
7784<>4102_103<>mohammad taghi hajiaghayi<>bidimensionality: new connections between fpt algorithms and ptass<>soda<>erik d. demaine<>
21669<>4104_8<>wenliang du<>searching for high-value rare events with uncheatable grid computing<>acns<>michael t. goodrich<>
21671<>4104_10<>nulo<>leap-frog packet linking and diverse key distributions for improved integrity in network broadcasts<>sp<>michael t. goodrich<>
21676<>4104_15<>gill barequet:prosenjit bose:matthew t. dickerson<>optimizing a constrained convex polygonal annulus<>jda<>michael t. goodrich<>
21677<>4104_16<>david eppstein:jonathan z. sun<>the skip quadtree: a simple dynamic data structure for multidimensional data<>compgeom<>michael t. goodrich<>
21679<>4104_18<>david eppstein:daniel s. hirschberg<>improved combinatorial group testing for real-world problem sizes<>wads<>michael t. goodrich<>
21680<>4104_19<>roberto tamassia:danfeng yao<>accredited domainkeys: a service architecture for improved email validation<>ceas<>michael t. goodrich<>
21685<>4104_24<>lars arge:david eppstein<>skip-webs: efficient distributed data structures for multi-dimensional data sets<>podc<>michael t. goodrich<>
21687<>4104_26<>amitabha bagchi:adam l. buchsbaum<>biased skip lists<>algorithmica<>michael t. goodrich<>
21688<>4104_27<>george s. lueker:jonathan z. sun<>c-planarity of extrovert clustered graphs<>gd<>michael t. goodrich<>
21699<>4104_38<>matthew dickerson:david eppstein:jeremy yu meng<>confluent drawings: visualizing non-planar diagrams in a planar way<>jgaa<>michael t. goodrich<>
21704<>4104_43<>amitabh chaudhary<>balanced aspect ratio trees revisited<>wads<>michael t. goodrich<>
21723<>4104_62<>mikhail j. atallah:roberto tamassia<>indexing information for data forensics<>acns<>michael t. goodrich<>
21724<>4104_63<>david eppstein:jeremy yu meng<>delta-confluent drawings<>gd<>michael t. goodrich<>
21733<>4104_72<>mikhail j. atallah:keith b. frikken:roberto tamassia<>secure biometric authentication for weak computational devices<>fc<>michael t. goodrich<>
27036<>4105_25<>eran halperin<>the minimum-entropy set cover problem<>tcs<>richard m. karp<>
27104<>4105_93<>roded sharan:trey ideker:brian p. kelley:ron shamir<>identification of protein complexes by comparative analysis of yeast and bacterial protein interaction data<>jcb<>richard m. karp<>
35526<>4111_2<>deng cai:wanli min<>statistical and computational analysis of locality preserving projection<>icml<>xiaofei he<>
35527<>4111_3<>deng cai:shuicheng yan:hongjiang zhang<>neighborhood preserving embedding<>iccv<>xiaofei he<>
35534<>4111_10<>deng cai:jiawei han<>document clustering using locality preserving indexing<>tkde<>xiaofei he<>
35535<>4111_11<>shuicheng yan:yuxiao hu:partha niyogi:hongjiang zhang<>face recognition using laplacianfaces<>pami<>xiaofei he<>
35537<>4111_13<>deng cai<>orthogonal locality preserving indexing<>sigir<>xiaofei he<>
35539<>4111_15<>deng cai:partha niyogi<>laplacian score for feature selection<>nips<>xiaofei he<>
35542<>4111_18<>deng cai:partha niyogi<>tensor subspace analysis<>nips<>xiaofei he<>
35491<>4112_0<>huaming zhang<>an application of well-orderly trees in graph drawing<>gd<>xin he<>
35496<>4112_5<>huaming zhang<>on even triangulations of 2-connected embedded graphs<>siamcomp<>xin he<>
35498<>4112_7<>huaming zhang<>improved visibility representation of plane graphs<>comgeo<>xin he<>
35505<>4112_14<>huaming zhang<>"visibility representation of plane graphs via canonical ordering tree."<>ipl<>xin he<>
1671<>4115_0<>trevor cohn:miles osborne<>logarithmic opinion pools for conditional random fields<>acl<>andrew smith<>
1672<>4115_1<>trevor cohn:miles osborne<>scaling conditional random fields using error-correcting codes<>acl<>andrew smith<>
1676<>4117_0<>marcus watson:scott watter<>leximancer concept mapping of patient case studies<>kes<>andrew smith<>
33554<>4122_4<>calin belta:joel m. esposito:jongwoo kim<>computational techniques for analysis of genetic network dynamics<>ijrr<>vijay kumar<>
31593<>4123_0<>david demirdjian<>inferring body pose using speech content<>icmi<>sy bor wang<>
31587<>4138_0<>s. k. mishra:k. k. lai<>nondifferentiable multiobjective programming under generalized d<>eor<>s. y. wang<>
31588<>4140_0<>yang wang:mohit gupta:song zhang 0002:xianfeng gu:dimitris samaras:peisen huang<>high resolution tracking of non-rigid 3d motion of densely sampled data using harmonic maps<>iccv<>sen wang<>
31589<>4140_1<>dimitris samaras:yang wang:lei zhang 0002:mohit gupta<>face modeling and analysis in stony brook university<>cvpr<>sen wang<>
30472<>4146_1<>george a. reis:jonathan chang:neil vachharajani:ram rangan:david i. august<>design and evaluation of hybrid fault-detection systems<>isca<>shubhendu s. mukherjee<>
30491<>4148_2<>stephen j. roberts:mark j. van der laan<>data-adaptive test statistics for microarray data<>eccb<>sach mukherjee<>
30494<>4148_5<>stephen j. roberts<>a theoretical analysis of the selection of differentially expressed genes<>jbcb<>sach mukherjee<>
30500<>4151_0<>i. v. ramakrishnan<>browsing fatigue in handhelds: semantic bookmarking spells relief<>www<>saikat mukherjee<>
31577<>4152_0<>changshui zhang<>network game and boosting<>ecml<>shijun wang<>
31578<>4152_1<>zhonglin lin:changshui zhang<>network boosting for bci applications<>dis<>shijun wang<>
31575<>4155_1<>yuanbo guo:abir qasem:jeff heflin<>rapid benchmarking for semantic web knowledge base systems<>semweb<>sui-yu wang<>
31576<>4155_2<>henry s. baird:michael a. moll<>scattertype: a legible but hard-to-segment captcha<>icdar<>sui-yu wang<>
31585<>4157_1<>zhenfu cao:haiyong bao<>security of an efficient id-based authenticated key agreement protocol from pairings<>ispa<>shengbao wang<>
31582<>4159_0<>joachim s. stahl<>convex grouping combining boundary and region information<>iccv<>song wang<>
31570<>4161_0<>i-tar hsu:zheng yi huang<>dynamic scheduling methods for computational grid environments<>icpads<>sheng-de wang<>
41347<>4164_0<>hans-arno jacobsen<>efficient constraint processing for location-aware computing<>mdm<>zhengdao xu<>
26307<>4166_0<>fuliang weng:lawrence cavedon:badri raghunathan:danilo mirkovic:ben bei:heather pon-barry:harry bratt:hua cheng:hauke schmidt:rohit mishra:brian lathrop:tobias scheideck:kui xu:tess hand-bender:stanley peters:liz shriberg:carsten bergmann<>a flexible conversational dialog system for mp3 player<>naacl<>qi zhang<>
6756<>4170_0<>namyoon woo:hyungsoo jung:hyuck han:heon young yeom:taesoon park<>performance evaluation of consistent recovery protocols using mpich-gf<>edcc<>dongin shin<>
6757<>4170_1<>hyungsoo jung:hyeongseog kim:hyuck han:inseon lee:heon young yeom<>dynamic failure management for parallel applications on grids<>egc<>dongin shin<>
11197<>4172_1<>sungzoon cho<>invariance of neighborhood relation under input space to feature space mapping<>prl<>hyunjung shin<>
11200<>4172_4<>koji tsuda:bernhard scholkopf<>fast protein classification with multiple networks<>eccb<>hyunjung shin<>
26305<>4181_0<>pan wang:douglas s. reeves:peng ning<>defending against sybil attacks in sensor networks<>icdcsw<>qinghua zhang<>
41341<>4185_2<>volker tresp:kai yu:shipeng yu:hans-peter kriegel<>dirichlet enhanced relational learning<>icml<>zhao xu<>
41342<>4186_0<>guoliang xu:jia-guang sun<>convergence analysis of discrete differential geometry operators over surfaces<>ima-ms<>zhiqiang xu<>
41327<>4187_0<>andrew lim<>searching optimal resequencing and feature assignment on an automated assembly line<>ictai<>zhou xu<>
41330<>4187_3<>andrew lim:brian rodrigues:fan wang<>k-center problems with minimum coverage<>tcs<>zhou xu<>
41336<>4188_1<>qingli da<>a least deviation method to obtain a priority vector of a fuzzy preference relation<>eor<>zeshui xu<>
41338<>4188_3<>nulo<>an approach based on similarity measure to multiple attribute decision making with trapezoid fuzzy linguistic variables<>fskd<>zeshui xu<>
32182<>4195_5<>ling feng<>an xml-enabled data mining query language: xml-dmql<>ijbidm<>tharam s. dillon<>
3241<>4196_9<>ching-pao chang:ching-seh wu:jia-lyn lv<>a requirement-based project estimation approach<>serp<>chih-ping chu<>
3246<>4196_14<>yi-chun chang:ching-pao chang:chiung-hui chiu:yi-chi chen<>constructing a scorm-compliant intelligent strategy repository<>icwl<>chih-ping chu<>
3247<>4197_0<>qijun gu:peng liu:wang-chien lee<>ktr: an efficient key management scheme for air access control<>mobiquitous<>chao-hsien chu<>
3250<>4197_3<>yiling chen:tracy mullen:david m. pennock<>information markets vs. opinion pools: an empirical comparison<>sigecom<>chao-hsien chu<>
3251<>4197_4<>ya zhang:hongyuan zha<>a time-series biclustering algorithm for revealing co-regulated genes<>itcc<>chao-hsien chu<>
3209<>4198_4<>zion cien shen:ying-meng li<>efficient rectilinear steiner tree construction with rectilinear blockages<>iccd<>chris c. n. chu<>
3210<>4198_5<>yiu-chung wong<>fast and accurate rectilinear steiner minimal tree algorithm for vlsi design<>ispd<>chris c. n. chu<>
3226<>4198_21<>min pan:natarajan viswanathan<>an efficient and effective detailed placement algorithm<>iccad<>chris c. n. chu<>
34030<>4202_1<>wei liu:yunhong wang:tieniu tan<>local manifold matching for face recognition<>icip<>wei fan<>
34031<>4202_2<>yunhong wang:tieniu tan<>video-based face recognition using bayesian inference model<>avbpa<>wei fan<>
33998<>4204_13<>baoping zhang:yuxin chen:edward a. fox:marcos andrc goncalves:marco cristo:pavel calado<>intelligent fusion of structural and citation-based evidence for text classification<>sigir<>weiguo fan<>
33999<>4204_14<>rao shen:marcos andrc goncalves:edward a. fox<>requirements gathering and modeling of domain-specific digital libraries with the 5s framework: an archaeological case study with etana<>ercimdl<>weiguo fan<>
34000<>4204_15<>dragomir r. radev:hong qi:harris wu:amardeep grewal<>probabilistic question answering on the web<>jasis<>weiguo fan<>
34001<>4204_16<>ananth raghavan:naga srinivas vemuri:rao shen:marcos andrc goncalves:edward a. fox<>"incremental, semi-automatic, mapping-based integration of heterogeneous collections into archaeological digital libraries: megiddo case study."<>ercimdl<>weiguo fan<>
34003<>4204_18<>baoping zhang:yuxin chen:edward a. fox:marcos andrc goncalves:marco cristo:pavel calado<>intelligent gp fusion from multiple sources for text classification<>cikm<>weiguo fan<>
34006<>4204_21<>michael d. gordon:praveen pathak<>effective profiling of consumer information retrieval needs: a unified framework and empirical comparison<>dss<>weiguo fan<>
34008<>4204_23<>wensi xi:edward a. fox:benyu zhang:zheng chen:jun yan:dong zhuang<>simfusion: measuring similarity using unified relationship matrix<>sigir<>weiguo fan<>
34010<>4204_25<>ning liu:jun yan:fengshan bai:benyu zhang:wensi xi:zheng chen:lei ji:chenyong hu:wei-ying ma<>a similarity reinforcement algorithm for heterogeneous web pages<>apweb<>weiguo fan<>
34014<>4205_2<>michael benedikt:floris geerts<>xpath satisfiability in the presence of dtds<>pods<>wenfei fan<>
34026<>4205_14<>michael benedikt:gabriel m. kuper<>structural properties of xpath fragments<>tcs<>wenfei fan<>
13054<>4206_0<>cong fu:james laudon<>"the rase (rapid, accurate simulation environment) for chip multiprocessors."<>sigarch<>john d. davis<>
13055<>4206_1<>james laudon:kunle olukotun<>maximizing cmp throughput with mediocre cores<>IEEEpact<>john d. davis<>
36711<>4209_1<>minh x. nguyen:nan zhang 0011:baoquan chen<>stippling and silhouettes rendering in geometry-image space<>rt<>xiaoru yuan<>
36715<>4209_5<>minh x. nguyen:baoquan chen<>geometry completion and detail generation by texture synthesis<>vc<>xiaoru yuan<>
36717<>4209_7<>minh x. nguyen:baoquan chen:david h. porter<>high dynamic range volume visualization<>visualization<>xiaoru yuan<>
36718<>4209_8<>nan zhang 0011:minh x. nguyen:baoquan chen<>volume cutout<>vc<>xiaoru yuan<>
36705<>4210_5<>xiaojing yuan:jian zhang:bill p. buckles<>multi-scale feature identification using evolution strategies<>ivc<>xiaohui yuan<>
36709<>4210_9<>jian zhang:bill p. buckles<>function granularity estimation for multimodal optimization<>ijait<>xiaohui yuan<>
36680<>4211_0<>amit karwande:david k. lowenthal<>an mpi prototype for compiled communication on ethernet switched clusters<>jpdc<>xin yuan<>
36693<>4211_13<>ahmad faraj<>an empirical approach for efficient all-to-all personalized communication on ethernet switched clusters<>icpp<>xin yuan<>
36696<>4211_16<>william c. kreahling:david b. whalley:mark w. bailey:gang-ryung uh:robert van engelen<>branch elimination by condition merging<>spe<>xin yuan<>
27679<>4216_2<>fernando pedone<>consistent main-memory database federations under deferred disk writes<>srds<>rodrigo schmidt<>
27682<>4216_5<>islene c. garcia:fernando pedone:luiz eduardo buzato<>optimal asynchronous garbage collection for rdt checkpointing protocols<>icdcs<>rodrigo schmidt<>
27655<>4220_2<>anwitaman datta:manfred hauswirth:renault john:karl aberer<>range queries in trie-structured overlays<>p2p<>roman schmidt<>
27660<>4220_7<>karl aberer:anwitaman datta:manfred hauswirth<>das p-grid-overlay-netzwerk: von einem einfachen prinzip zu einem komplexen system<>dbsk<>roman schmidt<>
27662<>4220_9<>karl aberer:anwitaman datta:manfred hauswirth<>indexing data-oriented overlay networks<>vldb<>roman schmidt<>
27663<>4220_10<>manfred hauswirth<>an overlay network for resource discovery in grids<>dexaw<>roman schmidt<>
36720<>4221_0<>jing peng:yasumasa nishiura<>particle swarm optimization with multiscale searching method<>cis<>xiaohui yuan<>
27652<>4222_34<>ullrich hustadt:boris konev<>deciding monodic fragments by temporal resolution<>cade<>renate a. schmidt<>
16646<>4236_5<>ji-young choi<>on the combinatorics of multi-restricted numbers<>arscom<>jonathan d. h. smith<>
16975<>4239_2<>jerod parsons:j. bradley holmes:j. maurice rojas:charlie e. m. strauss<>practical conversion from torsion space to cartesian space for  protein synthesis<>jcc<>jerry tsai<>
30328<>4241_18<>zhaohui fu:yinlei yu<>considering circuit observability don't cares in cnf satisfiability<>date<>sharad malik<>
30339<>4241_29<>david i. august:li-shiuan peh:vijay s. pai:manish vachharajani:paul willmann<>achieving structural and composable modeling of complex systems<>ijpp<>sharad malik<>
30350<>4241_40<>nulo<>a case for runtime validation of hardware<>hvc<>sharad malik<>
30371<>4241_61<>wei qin<>a study of architecture description languages from a model-based perspective<>mtv<>sharad malik<>
30380<>4241_70<>daijue tang:aarti gupta:c. norris ip<>symmetry reduction in sat-based model checking<>cav<>sharad malik<>
30382<>4242_0<>anastasios tombros:birger larsen<>report on the inex 2004 interactive track<>sigir<>saadia malik<>
30384<>4242_2<>birger larsen:anastasios tombros<>the interactive track at inex 2005<>inex<>saadia malik<>
30309<>4243_1<>abhishek ranjan:ravin balakrishnan<>interacting with large displays from a distance with vision-tracked multi-finger gestural input<>uist<>shahzad malik<>
38772<>4245_7<>zhaoxiang li<>chromatic sums of 2-edge-connected maps on the plane<>dm<>yanpei liu<>
38776<>4246_0<>rong jin:joyce y. chai<>a maximum coherence model for dictionary-based cross-language information retrieval<>sigir<>yi liu<>
38777<>4246_1<>rong jin<>query translation disambiguation as graph partitioning<>aaai<>yi liu<>
38779<>4246_3<>rong jin<>a framework for incorporating class priors into discriminative classification<>pakdd<>yi liu<>
38780<>4246_4<>benyu zhang:hua li:lei ji:wensi xi:weiguo fan:zheng chen:wei-ying ma<>improving web search results using affinity graph<>sigir<>yi liu<>
38781<>4247_0<>hui zhang:jun-hai yong:pi-qiang yu:jia-guang sun<>mesh blending<>vc<>yu-shen liu<>
38785<>4248_1<>scott f. smith<>interaction-based programming with classages<>oopsla<>yu david liu<>
38787<>4249_1<>h. conrad cunningham<>boxscript: a component-oriented language for teaching<>ACMse<>yi liu<>
38793<>4250_1<>kai tang<>an optimization algorithm for free-form surface partitioning based on weighted gaussian image<>cvgip<>yong-jin liu<>
38801<>4252_0<>shiping chen:ian gorton:anna liu<>performance prediction of component-based applications<>jss<>yan liu<>
38802<>4252_1<>alan fekete:ian gorton<>design-level performance prediction of component-based applications<>tse<>yan liu<>
38803<>4252_2<>ian gorton<>performance prediction of j2ee applications using messaging protocols<>cbse<>yan liu<>
38805<>4252_4<>liming zhu:ian gorton:ngoc bao bui<>customized benchmark generation using mda<>wicsa<>yan liu<>
38815<>4254_0<>kay connelly:dan bulwinkle:adam miller:ian bobbitt<>a toolkit for automatically constructing outdoor radio maps<>itcc<>yong liu<>
38812<>4256_1<>qun liu:shouxun lin<>log-linear models for word alignment<>acl<>yang liu<>
38052<>4265_0<>juhnyoung lee:yanggon kim:bong-hee moon<>business process integration with web services<>snpd<>yoonho kim<>
38054<>4265_2<>yeong-tae song:sribara narasimhadevara<>business process improvement using ebxml<>ACISicis<>yanggon kim<>
38045<>4269_0<>arak sutivong:mung chiang:thomas m. cover<>channel capacity and state estimation for state-dependent gaussian channels<>tit<>young-han kim<>
20873<>4272_0<>aik choon tan:daniel q. naiman:donald geman:raimond l. winslow<>robust prostate cancer marker genes emerge from direct integration of inter-study microarray data<>bioinformatics<>lei xu<>
38060<>4274_2<>mary kiemb:chulsoo park:jinyong jung:kiyoung choi<>resource sharing and pipelining in coarse-grained reconfigurable architecture for domain-specific optimization<>date<>yoonjin kim<>
16638<>4275_0<>charalambos l. iacovou:ronald thompson<>the linkage between reporting quality and performance in information systems projects<>icis<>jeff smith<>
16632<>4277_0<>sameer shivle:prasanna sugavanam:howard jay siegel:anthony a. maciejewski:tarun banka:kiran chindam:steve dussinger:andrew kutruff:prashanth penumarthy:prakash pichumani:praveen satyasekaran:david sendek:j. sousa:jayashree sridharan:jose velazco<>mapping subtasks with multiple versions on an ad hoc grid<>pc<>jay smith<>
22644<>4280_7<>eyal kaplan:omer reingold<>derandomized constructions of k-wise (almost) independent permutations<>approx<>moni naor<>
22648<>4280_11<>tal moran<>basing cryptographic protocols on tamper-evident seals<>icalp<>moni naor<>
22663<>4280_26<>udi wieder<>scalable and dynamic quorum systems<>dc<>moni naor<>
22676<>4280_39<>guy n. rothblum<>the complexity of online memory checking<>focs<>moni naor<>
22686<>4280_49<>benny pinkas<>computationally secure oblivious transfer<>joc<>moni naor<>
22687<>4280_50<>nulo<>on fairness in the carpool problem<>jal<>moni naor<>
22703<>4280_66<>danny harnik:joe kilian:omer reingold:alon rosen<>on robust combiners for oblivious transfer and other primitives<>eurocrypt<>moni naor<>
22729<>4280_92<>cynthia dwork:hoeteck wee<>pebbling and proofs of work<>crypto<>moni naor<>
38061<>4281_0<>antonio ortega<>quantizer design and distributed encoding algorithm for source localization in sensor networks<>ipsn<>yoon hak kim<>
16627<>4282_1<>lisa brownsword<>using earned value management for cots-based systems: issues and recommendations<>iccbss<>jim smith<>
16625<>4283_1<>shawn a. bohner:d. scott mccrickard<>toward introducing notification technology into distributed project teams<>ecbs<>jamie l. smith<>
38825<>4287_1<>nulo<>characterizations of maximum matching graphs of certain types<>dm<>yan liu<>
38068<>4292_0<>martin van velsen:randall w. hill jr.<>modeling dynamic perceptual attention in complex virtual environments<>iva<>youngjun kim<>
38070<>4294_0<>seongkwan kim:sunghyun choi:kyunghun jang:jin-bong chang<>a high-throughput mac strategy for next-generation wlans<>wowmom<>youngsoo kim<>
20827<>4299_1<>injong rhee<>limitations of equation-based congestion control<>sigcomm<>lisong xu<>
20839<>4301_9<>jinwen ma<>asymptotic convergence properties of the em algorithm with respect to the overlap in the mixture<>ijon<>lei xu<>
20843<>4301_13<>jinwen ma:zhiyong liu<>a further result on the ica one-bit-matching conjecture<>neco<>lei xu<>
205<>4302_5<>joseph zambreno:rahul simha:bhagirath narahari:nasir d. memon<>safe-ops: an approach to embedded software security<>tecs<>alok n. choudhary<>
208<>4302_8<>joseph zambreno:dan honbo<>exploiting multi-grained parallelism in reconfigurable sbc architectures<>fccm<>alok n. choudhary<>
216<>4302_16<>david nguyen:gokhan memik:seda ogrenci memik<>real-time feature extraction for high speed networks<>fpl<>alok n. choudhary<>
228<>4302_28<>kripashankar mohan:bhagirath narahari:rahul simha:paul ott:joseph zambreno<>performance study of a compiler/hardware approach to embedded systems security<>isi<>alok n. choudhary<>
255<>4302_55<>jayaprakash pisharath<>design of a hardware accelerator for density based clustering applications<>asap<>alok n. choudhary<>
267<>4302_67<>kenin coloma:avery ching:wei-keng liao:seung woo son:mahmut t. kandemir:lee ward<>power and performance in i/o for scientific applications<>ipps<>alok n. choudhary<>
290<>4302_90<>jayaprakash pisharath:wei-keng liao<>design and evaluation of database layouts for mems-based storage systems<>ideas<>alok n. choudhary<>
316<>4302_116<>ying liu:wei-keng liao<>a two-phase algorithm for fast discovery of high utility itemsets<>pakdd<>alok n. choudhary<>
20252<>4305_0<>ming-ying leung:kwok pui choi:aihua xia<>nonrandom clusters of palindromes in herpesvirus genomes<>jcb<>louis h. y. chen<>
20544<>4307_4<>huaikou miao<>mutation operators for object-z specification<>iceccs<>ling liu<>
20444<>4309_0<>bugra gedik<>a scalable peer-to-peer architecture for distributed information monitoring applications<>tc<>ling liu<>
20452<>4309_8<>sungkeun park:calton pu:mudhakar srivatsa:jianjun zhang<>resilient trust management for web service integration<>icws<>ling liu<>
20461<>4309_17<>li xiong:subramanyam chitti<>topk queries across multiple private databases<>icdcs<>ling liu<>
20463<>4309_19<>lakshmish ramaswamy:bugra gedik<>a distributed approach to node clustering in decentralized peer-to-peer networks<>tpds<>ling liu<>
20480<>4309_36<>daniel rocco:james caverlee:terence critchlow<>domain-specific web service discovery with service class descriptions<>icws<>ling liu<>
20490<>4309_46<>daniel rocco:james caverlee<>xpack: a high-performance web document encoding<>webist<>ling liu<>
20502<>4309_58<>aameek singh:sandeep gopisetty:linda duyanovich:kaladhar voruganti:david pease<>security vs performance: tradeoffs using a trust framework<>mss<>ling liu<>
20503<>4309_59<>aameek singh:sandeep gopisetty:kaladhar voruganti:david pease<>a hybrid access model for storage area networks<>mss<>ling liu<>
20514<>4309_70<>jianjun zhang:wei han:calton pu:james caverlee:sungkeun park:terence critchlow:matthew coleman:david buttler<>xwrapcomposer: a multi-page data extraction service for bio-computing applications<>IEEEscc<>ling liu<>
20521<>4309_77<>renato fileto:claudia bauzer medeiros:calton pu:eduardo delgado assad<>building a semantic web system for scientific applications: an engineering approach<>wise<>ling liu<>
20527<>4309_83<>mudhakar srivatsa<>securing publish-subscribe overlay services with eventguard<>ccs<>ling liu<>
20530<>4309_86<>mudhakar srivatsa:li xiong<>trustguard: countering vulnerabilities in reputation management for decentralized overlay networks<>www<>ling liu<>
20534<>4309_90<>daniel rocco:james caverlee:terence critchlow<>"exploiting the deep web with dynabot: matching, probing, and ranking."<>www<>ling liu<>
25674<>4311_0<>mikhail prokopenko:mark foreman:philip valencia:don price:geoff poulton<>on connectivity of reconfigurable impact networks in ageless aerospace vehicles<>ras<>peter wang<>
25677<>4311_3<>mikhail prokopenko:don price<>complexity metrics for self-monitoring impact sensing networks<>eh<>peter wang<>
25678<>4311_4<>mikhail prokopenko:andrew scott:vadim gerasimov:nigel hoschke:don price<>on self-organising diagnostics in impact sensing networks<>kes<>peter wang<>
25679<>4311_5<>piraveenan mahendra rajah:mikhail prokopenko:don price<>towards adaptive clustering in self-monitoring multi-agent networks<>kes<>peter wang<>
25681<>4311_7<>mikhail prokopenko:piraveenan mahendra rajah<>on convergence of dynamic cluster formation in multi-agent networks<>ecal<>peter wang<>
25683<>4311_9<>piraveenan mahendra rajah:mikhail prokopenko:don price<>on decentralised clustering in self-monitoring networks<>atal<>peter wang<>
25669<>4315_1<>chun-liang lee:chia-tai chan:hung-yi chang<>hardware-based packet classification made fast and efficient<>icpads<>pi-chung wang<>
20551<>4322_2<>bo zhang:baining guo:heung-yeung shum<>polygonal shape blending with topological evolutions<>jcst<>ligang liu<>
16294<>4325_0<>denis trystram<>a new genetic convex clustering algorithm for parallel time minimization with large communication delays<>parco<>j. e. p. sanchez<>
28130<>4326_10<>zhongfei (mark) zhang<>fast: toward more effective and efficient image retrieval<>mms<>ruofei zhang<>
28133<>4330_0<>pallav gupta:lin zhong:niraj k. jha<>threshold network synthesis and optimization and its application to nanotechnologies<>tcad<>rui zhang<>
28134<>4330_1<>pallav gupta:niraj k. jha<>"synthesis of majority and minority networks and its applications to qca, tpl and set based nanotechnologies."<>vlsid<>rui zhang<>
28138<>4332_1<>y. charlie hu<>assisted peer-to-peer search with partial indexing<>infocom<>rongmei zhang<>
28142<>4332_5<>y. charlie hu<>hyper: a hybrid approach to efficient content-based publish/subscribe<>icdcs<>rongmei zhang<>
28144<>4332_7<>ali raza butt:y. charlie hu<>topology-aware peer-to-peer on-demand streaming<>networking<>rongmei zhang<>
16279<>4333_8<>oleg starostenko:alberto chovez-aragon:yulia ostrovskaya<>a hybrid approach for image retrieval with ontological content-based indexing<>ciarp<>j. sanchez<>
16122<>4343_0<>volker reichelt:arnold reusken<>fast iterative solvers for discrete stokes equations<>siamsc<>jorg peters<>
38647<>4344_1<>matthias zimmermann:elizabeth shriberg:andreas stolcke<>toward joint segmentation and classification of dialog acts in multiparty meetings<>mlmi<>yang liu<>
38649<>4344_3<>andreas stolcke:elizabeth shriberg:mary p. harper<>using conditional random fields for sentence boundary detection in speech<>acl<>yang liu<>
38643<>4346_0<>hiroki yokota<>modeling transcriptional regulation in chondrogenesis using particle swarm optimization<>cibcb<>yunlong liu<>
38644<>4346_1<>matthew p. vincenti:hiroki yokota<>principal component analysis for predicting transcription-factor binding motifs from array-derived data<>bmcbi<>yunlong liu<>
38616<>4348_2<>yanghai tsin:wen-chieh lin<>the promise and perils of near-regular texture<>ijcv<>yanxi liu<>
38633<>4348_19<>jiayong zhang<>svm decision boundary based discriminative subspace induction<>pr<>yanxi liu<>
38641<>4348_27<>jiayong zhang:robert t. collins<>bayesian body localization using mixture of nonlinear shape models<>iccv<>yanxi liu<>
38575<>4350_3<>scott d. stoller:ning li:tom rothamel<>optimizing aggregate array computations in loops<>toplas<>yanhong a. liu<>
38610<>4350_38<>yanhong a. liu:scott d. stoller:michael gorbovitski:tom rothamel<>incrementalization across object abstraction<>oopsla<>yanni ellen liu<>
38568<>4351_0<>yang richard yang:haiyong xie:hao wang:abraham silberschatz:a. krishnamurthy:erran l. li<>on route selection for interdomain traffic engineering<>network<>yanbin liu<>
38570<>4351_2<>sheng zhong:erran l. li:yang (richard) yang<>on designing incentive-compatible routing and forwarding protocols in wireless ad-hoc networks: an integrated approach using game theoretical and cryptographic techniques<>mobicom<>yanbin grace liu<>
38571<>4351_3<>hao wang:haiyong xie ii:yang richard yang:avi silberschatz:erran l. li<>"on the stability of rational, heterogeneous interdomain route selection."<>icnp<>yanbin liu<>
38674<>4352_0<>samarjit chakraborty:wei tsang ooi<>approximate vccs: a new characterization of multimedia workloads for system-level mpsoc design<>dac<>yanhong liu<>
38677<>4352_3<>samarjit chakraborty:wei tsang ooi:ashish gupta:subramanian mohan<>workload characterization and cost-quality tradeoffs in mpeg-4 decoding on resource-constrained devices<>estimedia<>yanhong liu<>
38671<>4354_2<>huaiping yang:wenping wang<>reconstructing b-spline curves from point clouds--a tangential flow approach using least squares minimization<>smi<>yang liu<>
16117<>4355_3<>sethu vijayakumar:stefan schaal<>natural actor-critic<>ecml<>jan peters<>
38661<>4356_1<>eric p. xing:jaime g. carbonell<>predicting protein folds with structural repeats using a chain graph model<>icml<>yan liu<>
38665<>4356_5<>jaime g. carbonell:peter weigele:vanathi gopalakrishnan<>segmentation conditional random fields (scrfs): a new approach for protein fold recognition<>recomb<>yan liu<>
16119<>4357_1<>volker roth:ulrich pinsdorf<>a distributed content-based search engine based on mobile code<>sac<>jan peters<>
16120<>4357_2<>bastian emig:marten jung:stefan schmidt<>prediction of delays in public transportation using neural networks<>cimca<>jan peters<>
20078<>4364_4<>fengzhu sun:hongyu zhao<>haplore: a program for haplotype reconstruction in general pedigrees without recombination<>bioinformatics<>kui zhang<>
20079<>4364_5<>zhaohui s. qin:ting chen:jun s. liu:michael s. waterman:fengzhu sun<>hapblock: haplotype block partitioning and tag snp selection software using a set of dynamic programming algorithms<>bioinformatics<>kui zhang<>
7997<>4367_3<>greg m. link:ki hwan yum:narayanan vijaykrishnan:mahmut t. kandemir:mary jane irwin:chita r. das<>a holistic approach to designing energy-efficient cluster interconnects<>tc<>eun jung kim<>
7998<>4367_4<>ki hwan yum:chita r. das<>performance analysis of a qos capable cluster interconnect<>pe<>eun jung kim<>
7999<>4367_5<>manhee lee:mazin s. yousif<>security enhancement in infiniband architecture<>ipps<>eun jung kim<>
20105<>4372_2<>santosh pande<>efficient application migration under compiler guidance<>lctrts<>kun zhang<>
38680<>4378_1<>david tipper:peerapon siripongwutikorn<>approximating optimal spare capacity allocation by successive survivable routing<>ton<>yu liu<>
38722<>4379_5<>hector j. levesque<>tractable reasoning with incomplete first-order knowledge in dynamic systems with context-dependent actions<>ijcai<>yongmei liu<>
38723<>4379_6<>hector j. levesque<>tractable reasoning in first-order knowledge bases with disjunctive information<>aaai<>yongmei liu<>
38684<>4380_0<>jinpeng huai:yu zhang:xianxian li<>distributed access control in crown groups<>icpp<>yunhao liu<>
38694<>4380_10<>jinsong han:li xiao:renyi xiao:lionel m. ni<>a mutual anonymous peer-to-peer protocol design<>ipps<>yunhao liu<>
38698<>4380_14<>li xiao:lionel m. ni<>improving unstructured peer-to-peer systems by adaptive connection establishment<>tc<>yunhao liu<>
38699<>4380_15<>li xiao:xiaomei liu:lionel m. ni:xiaodong zhang<>location awareness in unstructured peer-to-peer systems<>tpds<>yunhao liu<>
38700<>4380_16<>chunming hu:jinpeng huai:yanmin zhu:lionel m. ni<>s-club: an overlay based efficient service discovery mechanism in crown grid<>icebe<>yunhao liu<>
38710<>4380_26<>li xiao:zhenyun zhuang<>dynamic layer management in superpeer architectures<>tpds<>yunhao liu<>
38712<>4380_28<>zongxia du:jinpeng huai:chunming hu:lei lei<>ipr: automated interaction process reconciliation<>webi<>yunhao liu<>
38716<>4380_32<>lionel m. ni:li xiao:abdol-hossein esfahanian<>approaching optimal peer-to-peer overlays<>mascots<>yunhao liu<>
38757<>4383_5<>sven koenig<>existence and finiteness conditions for risk-sensitive planning: results and conjectures<>uai<>yaxin liu<>
38759<>4383_7<>sven koenig<>risk-sensitive planning with one-switch utility functions: value iteration<>aaai<>yaxin liu<>
38761<>4383_9<>peter stone:gregory kuhlmann:matthew e. taylor<>keepaway soccer: from machine learning testbed to benchmark<>robocup<>yaxin liu<>
38762<>4383_10<>matthew e. taylor:peter stone<>value functions for rl-based behavior transfer: a comparative study<>aaai<>yaxin liu<>
8006<>4384_0<>joongheon kim:wonjun lee:joonmo kim:choonhwa lee:sungjin kim:sooyeon kim<>on energy-aware dynamic clustering for hierarchical sensor networks<>euc<>eunkyo kim<>
9244<>4388_7<>jaroslav nesetril<>graph colorings<>tcs<>gerhard j. woeginger<>
40354<>4389_0<>ken kennedy<>scalarization using loop alignment and loop skewing<>tjs<>yuan zhao<>
40361<>4391_2<>martin kardos:simon oberthur:franz j. rammig<>comprehensive verification framework for dependability of self-optimizing systems<>atva<>yuhong zhao<>
40362<>4392_0<>shaojun wang:dale schuurmans:fuchun peng<>combining statistical language models via the latent maximum entropy principle<>ml<>yunxin zhao<>
40367<>4395_0<>jack g. conrad:khalid al-kofahi:george karypis<>effective document clustering for large heterogeneous law firm collections<>icail<>ying zhao<>
40368<>4395_1<>george karypis:usama m. fayyad<>hierarchical clustering algorithms for document datasets<>datamine<>ying zhao<>
40372<>4397_0<>yu qiu:yan-qing zhang<>statistical interval-valued fuzzy systems via linear regression<>grc<>yichuan zhao<>
33894<>4399_5<>zoubin ghahramani:francesco falciani:david l. wild<>biomarker discovery in microarray gene expression data with gaussian processes<>bioinformatics<>wei chu<>
33896<>4399_7<>s. sathiya keerthi<>new approaches to support vector ordinal regression<>icml<>wei chu<>
33898<>4399_9<>zoubin ghahramani<>preference learning with gaussian processes<>icml<>wei chu<>
33899<>4399_10<>zoubin ghahramani<>gaussian processes for ordinal regression<>jmlr<>wei chu<>
33902<>4399_13<>s. sathiya keerthi<>a matching pursuit approach to sparse gaussian process regression<>nips<>wei chu<>
18098<>4401_1<>gabriel pui cheong fung:philip s. yu:hongjun lu<>parameter free bursty events detection in text streams<>vldb<>jeffrey xu yu<>
27198<>4412_0<>leif kobbelt<>graphische datenverarbeitung<>gi<>r. klein<>
28149<>4414_0<>narasimhan sundararajan:guang-bin huang:paramasivan saratchandran<>an efficient sequential rbf network for gene expression-based multi-category classification<>cibcb<>runxuan zhang<>
27186<>4415_0<>annette ebbers-baumann:ansgar grune:marek karpinski:christian knauer:andrzej lingas<>embedding point sets into plane graphs of small dilation<>isaac<>rolf klein<>
27189<>4415_3<>sandor p. fekete:andreas nuchter<>searching with an autonomous robot<>dagstuhl<>rolf klein<>
27195<>4415_9<>christian knauer:giri narasimhan:michiel h. m. smid<>"exact and approximation algorithms for computing the dilation spectrum of paths, trees, and cycles."<>isaac<>rolf klein<>
28150<>4416_0<>steve moyle:steve mckeever:stephen heisig<>ogsa-based grid workload monitoring<>ccgrid<>rui zhang<>
31734<>4418_2<>dae-eun hyun:jung-woo chang:joon-kyung seong:myung-soo kim:bert juttler<>sweep-based human deformation<>vc<>seung-hyun yoon<>
31735<>4419_0<>peter lindstrom:valerio pascucci:dinesh manocha<>cache-oblivious mesh layouts<>tog<>sung-eui yoon<>
31738<>4420_2<>robert m. gray<>feature selection based on maximizing separability in gauss mixture model and its application to image classification<>icip<>sangho yoon<>
20208<>4424_0<>sourav s. bhowmick:liang-tien chia<>mining positive and negative association rules from xml query patterns for caching<>dasfaa<>ling chen<>
20212<>4425_0<>peter fankhauser:ulrich thiel:thomas kamps<>statistical relationship determination in automatic thesaurus construction<>cikm<>libo chen<>
20214<>4425_2<>thomas kamps:richard stenzel:lothar rostek<>enterprise information integration - a semantic approach<>birthday<>libo chen<>
20215<>4425_3<>marcello l'abbate:ulrich thiel:erich j. neuhold<>the layer-seeds term clustering method: enabling proactive situation-aware product recommendations in e-commerce dialogues<>isf<>libo chen<>
20177<>4426_3<>mario gerla:yeng-zhong lee:biao zhou:jiwei chen:guang yang:shirshanka das<>dealing with node mobility in ad hoc wireless network<>sfm<>ling-jyh chen<>
20178<>4426_4<>guang yang:tony sun:mario gerla:m. y. sanadidi<>real-time streaming over wireless links: a comparative study<>iscc<>ling-jyh chen<>
20180<>4426_6<>tony sun:guang yang:m. y. sanadidi:mario gerla<>end-to-end asymmetric link capacity estimation<>networking<>ling-jyh chen<>
29047<>4429_0<>edward chan<>probabilistic continuous update scheme in location dependent continuous queries<>appt<>song han<>
29048<>4429_1<>ming xiong:kam-yiu lam<>a deferrable scheduling algorithm for real-time transactions maintaining data freshness<>rtss<>song han<>
20201<>4430_0<>hongfang liu:carol friedman<>gene name ambiguity of eukaryotic nomenclatures<>bioinformatics<>lifeng chen<>
20206<>4432_2<>yu he<>"a threshold criterion, auto-detection and its use in mst-based clustering."<>ida<>lihui chen<>
3202<>4439_0<>nulo<>cscl for community building and digital equity<>icalt<>c. candace chou<>
3196<>4440_0<>kuo-feng ssu:hewijin christine jiau<>a distributed location service for reducing query failures in geographic ad hoc routing<>prdc<>chih-hsun chou<>
3185<>4442_4<>shaleeza sohail:salil s. kanhere:sanjay jha<>on large scale deployment of parallelized file transfer protocol<>ipccc<>chun tung chou<>
3187<>4442_6<>thanh vinh nguyen:farzad safaei:paul boustead<>provisioning overlay distribution networks<>cn<>chun tung chou<>
3174<>4444_0<>wen hu:nirupama bulusu:sanjay jha:andrew taylor:van nghia tran<>a hybrid sensor network for cane-toad monitoring<>sensys<>chun tung chou<>
3175<>4444_1<>gustav rosenbaum:sanjay jha<>dynamic routing of restorable qos connections in mpls networks<>lcn<>chun tung chou<>
3176<>4444_2<>wen hu:van nghia tran:nirupama bulusu:sanjay jha:andrew taylor<>the design and evaluation of a hybrid sensor network for cane-toad monitoring<>ipsn<>chun tung chou<>
20241<>4446_2<>dayong ding:dong wang:fuzong lin:bo zhang<>ap-based borda voting method for feature extraction in trecvid-2004<>ecir<>le chen<>
20242<>4446_3<>dayong ding:bo zhang<>temporal shot clustering analysis for video concept detection<>ecir<>le chen<>
20221<>4449_0<>k. selcuk candan:jun'ichi tatemura:divyakant agrawal:dirceu cavendish<>on overlay schemes to support point-in-range queries for scalable grid resource discovery<>p2p<>liping chen<>
14754<>4452_3<>reidar conradi<>observations on versioning of off-the-shelf components in industrial projects (short paper)<>scm<>jingyue li<>
14755<>4452_4<>reidar conradi:odd petter n. slyngstad:christian bunse:umair khan:marco torchiano:maurizio morisio<>an empirical study on off-the-shelf component usage in industrial projects<>profes<>jingyue li<>
14756<>4452_5<>reidar conradi:odd petter n. slyngstad:christian bunse:umair khan:marco torchiano:maurizio morisio<>validation of new theses on off-the-shelf component based development<>metrics<>jingyue li<>
20226<>4453_0<>hongyu zhao<>negative correlation between compositional symmetries and local recombination rates<>bioinformatics<>liang chen<>
20227<>4453_1<>hongyu zhao<>integrating mrna decay information into co-regulation study<>jcst<>liang chen<>
14761<>4454_3<>nulo<>"a new degree condition for graphs to have []-factor."<>dm<>jianxiang li<>
20228<>4455_0<>ming liu:jiannong cao:hai-gang gong:xie li<>a distributed power-efficient data gathering and aggregation protocol for wireless sensor networks<>ispa<>li-jun chen<>
20229<>4455_1<>hai-gang gong:ming liu:yinchi mao:li xie<>traffic adaptive mac protocol for wireless sensor network<>iccnmc<>li-jun chen<>
14763<>4458_0<>hongji yang<>towards evolving web sites into grid services environment<>wse<>jianzhi li<>
14764<>4458_1<>zhuopeng zhang:hongji yang<>a grid oriented approach to reusing legacy code in iceni framework<>iri<>jianzhi li<>
20236<>4459_3<>i-chen wu:jui-yuan su<>on the web data extraction model<>seke<>loon-been chen<>
14708<>4461_13<>dhiraj joshi:james ze wang<>parameter estimation of multi-dimensional hidden markov models - a scalable approach<>icip<>jia li<>
14713<>4461_18<>ritendra datta:james ze wang<>content-based image retrieval: approaches and trends of the new age<>mir<>jia li<>
14715<>4461_20<>ding zhou:hongyuan zha<>a new mallows distance based metric for comparing clusterings<>icml<>jia li<>
14720<>4461_25<>ritendra datta:james ze wang<>imagination: a robust image-based captcha generation system<>mm<>jia li<>
14726<>4461_31<>nulo<>two-scale image retrieval with significant meta-information feedback<>mm<>jia li<>
14732<>4461_37<>nulo<>a mutual semantic endorsement approach to image retrieval and context provision<>mir<>jia li<>
14739<>4462_1<>ninghui li<>policy-hiding access control in open environment<>podc<>jiangtao li<>
14741<>4462_3<>mikhail j. atallah<>secure outsourcing of sequence comparisons<>ijisec<>jiangtao li<>
14746<>4462_8<>ninghui li<>oacerts: oblivious attribute certificates<>acns<>jiangtao li<>
14750<>4462_12<>ninghui li:william h. winsborough<>automated trust negotiation using cryptographic credentials<>ccs<>jiangtao li<>
34101<>4465_1<>kristopher r. beevers<>topological map merging<>ijrr<>wesley h. huang<>
34108<>4466_1<>sayantan sur:abhinav vishnu:hyun-wook jin:dhabaleswar k. panda<>can memory-less network adapters benefit next-generation infiniband systems?<>hoti<>wei huang<>
34112<>4466_5<>gopalakrishnan santhanaraman:hyun-wook jin:dhabaleswar k. panda<>scheduling of mpi-2 one sided operations over infiniband<>ipps<>wei huang<>
34113<>4466_6<>abhinav vishnu:gopalakrishnan santhanaraman:hyun-wook jin:dhabaleswar k. panda<>supporting mpi-2 one sided communication on multi-rail infiniband clusters: design challenges and performance benefits<>hipc<>wei huang<>
34114<>4466_7<>gopalakrishnan santhanaraman:hyun-wook jin:dhabaleswar k. panda<>design alternatives and performance trade-offs for implementing mpi-2 over infiniband<>pvm<>wei huang<>
34125<>4468_0<>seok-hee hong:peter eades<>layout effects on sociogram perception<>gd<>weidong huang<>
34115<>4470_0<>haihong zhang:zhiyong huang:bailing zhang<>a kernel autoassociator approach to pattern classification<>tsmc<>weimin huang<>
34121<>4471_3<>nulo<>towards context-aware knowledge management in e-enterprises<>jaciii<>weihong huang<>
34124<>4471_6<>emmanuel eze<>multi-media semantics contextualisation for knowledge-oriented e-learning<>icalt<>weihong huang<>
12641<>4472_0<>chao-kai wen:constantinos b. papadias<>asymptotic analysis of mimo wireless systems with spatial correlation at the receiver<>tcom<>jiunn-tsair chen<>
12633<>4479_0<>stephen c. jardin:h. r. strauss<>solving anisotropic transport equation on misaligned grids<>iccS<>jin chen<>
12631<>4481_0<>chun-chi liu:w.-s. e. chen:pei-chun chang<>topological-based classification using artificial gene networks<>IEEEicci<>jeremy j. w. chen<>
16487<>4483_1<>nulo<>slicing xml documents<>wwv<>josep silva<>
16447<>4486_0<>francisco duarte:jose carlos alves:g. a. pinho:jose silva matos<>a processor for testing mixed-signal cores in system-on-chip<>dsd<>jose machado da silva<>
16501<>4488_0<>jorge s. marques:joao miranda lemos<>selecting landmark points for sparse manifold learning<>nips<>jorge silva<>
16422<>4491_4<>ines lynce<>efficient data structures for backtrack search sat solvers<>amai<>joao p. marques silva<>
16428<>4491_10<>nulo<>improvements to the implementation of interpolant-based model checking<>charme<>joao p. marques silva<>
16430<>4491_12<>vasco m. manquinho<>effective lower bounding techniques for pseudo-boolean optimization<>date<>joao p. marques silva<>
16438<>4491_20<>a. morgado<>good learning and implicit model enumeration<>ictai<>joao p. marques silva<>
16441<>4491_23<>maher n. mneimneh:ines lynce:zaher s. andraus:karem a. sakallah<>a branch-and-bound algorithm for extracting smallest minimal unsatisfiable formulas<>sat<>joao p. marques silva<>
16443<>4491_25<>vasco m. manquinho<>on applying cutting planes in dll-based algorithms for pseudo-boolean optimization<>sat<>joao p. marques silva<>
28891<>4494_1<>felix c. freiling<>code stabilization<>sss<>sukumar ghosh<>
28899<>4494_9<>amlan a. bhattacharya<>self-adaptation in sensor networks via code mutation<>pdcs<>sukumar ghosh<>
28914<>4495_1<>sugato basu:nur a. touba<>synthesis of low power ced circuits based on parity codes<>vts<>shalini ghosh<>
28915<>4495_2<>sugato basu:nur a. touba<>selecting error correcting codes to minimize power in memory checker circuits<>jolpe<>shalini ghosh<>
28916<>4495_3<>f. joel ferguson<>detection probabilities of interconnect breaks: an analysis<>integration<>shalini ghosh<>
7588<>4496_0<>qiming li:mun choon chan<>on the effectiveness of ddos attacks on statistical filtering<>infocom<>ee-chien chang<>
7590<>4496_2<>sung woo choi:doyong kwon:hyungju park:chee-keng yap<>shortest path amidst disc obstacles is computable<>compgeom<>ee-chien chang<>
7595<>4496_7<>sujoy roy:k. natarajan<>a unified framework for resolving ambiguity in copy detection<>mm<>ee-chien chang<>
7604<>4496_16<>hang yu:zhiyong huang:zhijian zheng<>fast rendering of foveated volumes in wavelet-based representation<>vc<>ee-chien chang<>
7538<>4498_0<>gang wu:navneet panda<>formulating distance functions via the kernel trick<>kdd<>edward y. chang<>
7539<>4498_1<>gang wu:zhihua zhang<>learning with non-metric proximity matrices<>mm<>edward y. chang<>
7551<>4498_13<>gang wu:zhihua zhang<>kronecker factorization for speeding up kernel machines<>sdm<>edward y. chang<>
7565<>4498_27<>zoran dimitrijevic:raju rangaswami<>systems support for preemptive disk scheduling<>tc<>edward y. chang<>
7575<>4498_37<>arun qamra:yan meng<>enhanced perceptual distance functions and indexing for image replica recognition<>pami<>edward y. chang<>
7577<>4498_39<>yi wu:belle l. tseng<>multimodal metadata fusion using causal strength<>mm<>edward y. chang<>
7581<>4498_43<>gang wu:navneet panda<>formulating context-dependent similarity functions<>mm<>edward y. chang<>
7606<>4500_0<>angela bonifati:terence ho:laks v. s. lakshmanan:rachel pottinger<>heptox: marrying xml and heterogeneity in your p2p databases<>vldb<>elaine qing chang<>
28922<>4501_1<>kalyan basu:sajal k. das<>frantic: a fractal geometric framework for mesh-based wireless access networks<>icdcs<>samik ghosh<>
28925<>4501_4<>preetam ghosh:kalyan basu:sajal k. das<>gama : an evolutionary algorithmic approach for the design of mesh-based radio access networks<>lcn<>samik ghosh<>
991<>4506_2<>d. p. agrawal:s. d. joshi<>advertising data analysis using rough sets model<>ijitdm<>ashwani kumar<>
997<>4511_0<>barry smith:jose l. v. mejino jr.:stefan schulz:cornelius rosse<>anatomical information science<>cosit<>anand kumar<>
1000<>4512_2<>barry smith<>oncology ontology in the nci thesaurus<>aime<>anand kumar<>
21955<>4516_12<>chris m. miller<>texturing and hypertexturing of volumetric objects<>vg<>mark w. jones<>
21920<>4521_14<>nigel warren:steve jones:david bainbridge<>navigation via continuously adapted music<>chi<>matt jones<>
21922<>4521_16<>gary marsden<>mobile interaction design tutorial<>mhci<>matt jones<>
21927<>4521_21<>steve jones:gary marsden:dynal patel:andy cockburn<>an evaluation of integrated zooming and scrolling on small screens<>ijmms<>matt jones<>
12566<>4523_0<>ajay dholakia:evangelos eleftheriou:marc p. c. fossorier:xiao-yu hu<>reduced-complexity decoding of ldpc codes<>tcom<>jinghu chen<>
10441<>4524_0<>baojun qiu:zijing hu:dongqing yang:lv-an tang:jianjun wang:meimei li:shiwei tang<>general consistency management within the development of ontology-driven web information system<>asian<>hongyan li<>
10442<>4524_1<>ming xue:jianjun wang:shiwei tang:dongqing yang<>understanding user operations on web page in wise<>waim<>hongyan li<>
10443<>4524_2<>ting yin:zijing hu:yu fan:jianlong gao:shiwei tang<>a hybrid method for detecting data stream changes with complex semantics in intensive care unit<>asian<>hongyan li<>
10445<>4524_4<>lv-an tang:zhiyong pan:dongqing yang:meimei li:shiwei tang:ying ying<>an ontology based approach to construct behaviors in web information systems<>waim<>hongyan li<>
10447<>4524_6<>zijing hu:baojun qiu:lv-an tang:yu fan:haibin liu:jianlong gao:xinbiao zhou<>using control theory to guide load shedding in medical data stream management system<>asian<>hongyan li<>
10430<>4526_0<>suh-yin lee:man-kwan shan<>dsm-tkp: mining top-k path traversal patterns over web click-streams<>webi<>hua-fu li<>
10435<>4526_5<>suh-yin lee:man-kwan shan<>online mining (recently) maximal frequent itemsets over data streams<>ride<>hua-fu li<>
10438<>4526_8<>suh-yin lee:man-kwan shan<>online mining maximal frequent structures in continuous landmark melody streams<>prl<>hua-fu li<>
10440<>4526_10<>suh-yin lee:man-kwan shan<>online mining changes of items over continuous append-only and dynamic data streams<>jucs<>hua-fu li<>
10423<>4528_0<>bin ma<>a phonotactic-semantic paradigm for automatic spoken document classification<>sigir<>haizhou li<>
10424<>4528_1<>bin ma<>a phonotactic language model for spoken language identification<>acl<>haizhou li<>
10427<>4528_4<>hendra setiawan:min zhang:beng chin ooi<>phrase-based statistical machine translation: a level of detail approach<>ijcnlp<>haizhou li<>
10412<>4533_15<>evelyne flandrin:antoni marczyk:mariusz wozniak<>a note on a generalisation of ore's condition<>gc<>hao li<>
5302<>4534_0<>dapeng gao:hans-arno jacobsen<>generic middleware substrate through modelware<>middleware<>charles zhang<>
10391<>4536_2<>patrick c. k. hung:jia zhang:david ahn<>designing privacy policies for adopting rfid in the retail industry<>IEEEscc<>haifei li<>
10394<>4536_5<>jin du:qinghua zheng:wenbin yuan<>the research of mining association rules between personality and behavior of learner under web-based learning environment<>icwl<>haifei li<>
12588<>4537_0<>steve macdonald:diego novillo<>choosing among alternative futures<>hvc<>jun chen<>
12578<>4538_0<>thrasyvoulos n. pappas:aleksandra mojsilovic:bernice e. rogowitz<>adaptive perceptual color-texture image segmentation<>tip<>junqing chen<>
12585<>4540_1<>david tarditi<>a simple typed intermediate language for object-oriented languages<>popl<>juan chen<>
12586<>4540_2<>nulo<>decidable subclassing-bounded quantification<>tldi<>juan chen<>
12583<>4541_1<>youxian sun<>experiments study on a dynamic priority scheduling for wireless sensor networks<>msn<>jiming chen<>
5294<>4542_11<>lefteris mamatas<>the interaction between window adjustment strategies and queue management schemes<>wwic<>chi zhang<>
5275<>4543_0<>chen ying:pengwei hao<>shear-resize factorizations for fast image registration<>icip<>chao zhang<>
5276<>4543_1<>zhenghui gui<>robust active shape model construction and fitting for facial feature localization<>avbpa<>chao zhang<>
5245<>4546_10<>xin chen<>region-based image clustering and retrieval using multiple instance learning<>civr<>chengcui zhang<>
10451<>4547_3<>hailing yu:divyakant agrawal:amr el abbadi<>progressive ranking of range aggregates<>dawak<>hua-gang li<>
10452<>4547_4<>hailing yu:ping wu:divyakant agrawal:amr el abbadi<>efficient processing of distributed top- queries<>dexa<>hua-gang li<>
5258<>4548_0<>tsuhan chen<>light field capturing with lensless cameras<>icip<>cha zhang<>
10456<>4549_0<>simon thompson:claus reinke<>"the haskell refactorer, hare, and its api."<>entcs<>huiqing li<>
27318<>4552_0<>errol l. lloyd:madhav v. marathe:ram ramanathan:s. s. ravi<>algorithmic aspects of topology control problems for ad hoc networks<>monet<>rui liu<>
12533<>4553_0<>chen-an tsai:sue-jane wang:dung-tsa chen<>sample size for gene expression microarray experiments<>bioinformatics<>james j. chen<>
12530<>4556_3<>jun wu:chi-sheng shih:tei-wei kuo<>approximation algorithms for scheduling multiple feasible interval jobs<>rtcsa<>jian-jia chen<>
12551<>4560_0<>shinn-ying ho:david e. goldberg<>quality-time analysis of multi-objective evolutionary algorithms<>gecco<>jian-hung chen<>
12554<>4560_3<>bo-fu liu:hung-ming chen:shiow-fen hwang:shinn-ying ho<>meswarm: memetic particle swarm optimization<>gecco<>jian-hung chen<>
12536<>4562_0<>guoli ding:robert lax:peter p. chen<>efficient learning of pseudo-boolean functions from limited training data<>ismis<>jianhua chen<>
27311<>4563_2<>haixing zhao:xueliang li<>on problems and conjectures on adjointly equivalent graphs<>dm<>ruying liu<>
27299<>4565_0<>wan-jung lin<>adaptive sampling for thresholding in document filtering and classification<>ipm<>rey-long liu<>
27307<>4565_8<>wan-jung lin<>incremental mining of information interest for personalized web scanning<>is<>rey-long liu<>
10978<>4566_1<>egemen tanin:aaron harwood<>a distributed quadtree index for peer-to-peer settings<>icde<>hanan samet<>
10981<>4566_4<>egemen tanin:leana golubchik<>scalable data collection infrastructure for digital government applications<>dgo<>hanan samet<>
10995<>4566_18<>jagan sankaranarayanan:houman alborzi<>efficient query processing on spatial networks<>gis<>hanan samet<>
10997<>4566_20<>egemen tanin:deepa nayar<>an efficient nearest neighbor algorithm for p2p settings<>dgo<>hanan samet<>
11006<>4566_29<>michael lindenbaum:gisli r. hjaltason<>a probabilistic analysis of trie-based sorting of large collections of line segments in spatial databases<>siamcomp<>hanan samet<>
11071<>4566_94<>emanuele danovaro:leila de floriani:enrico puppo<>clustering techniques for out-of-core multi-resolution modeling<>visualization<>hanan samet<>
12607<>4567_0<>norberto de la cruz:susan bromberg:dean pasko:mary shimoyama:simon n. twigger:chin-fu chen:chunyu fan:cindy foote:gopal r. gopinath:glenn harris:aubrey hughes:yuan ji:weihong jin:dawei li:jedidiah mathis:natalya nenasheva:jeff nie:rajni nigam:victoria petri:dorothy reilly:weiye wang:wenhua wu:angela zuniga-meyer:lan zhao:anne e. kwitek:peter j. tonellato:howard j. jacob<>the rat genome database (rgd): developments towards a phenome database<>nar<>jiali chen<>
12617<>4568_0<>mario gerla:ling-jyh chen:yeng-zhong lee:biao zhou:guang yang:shirshanka das<>dealing with node mobility in ad hoc wireless network<>sfm<>jiwei chen<>
12609<>4569_1<>dana angluin:james aspnes:yinghua wu:yitong yin<>fast construction of overlay networks<>spaa<>jiang chen<>
12611<>4569_3<>dana angluin<>learning a hidden hypergraph<>colt<>jiang chen<>
12630<>4576_0<>yong guan:udo w. pooch<>customizing a geographical routing protocol for wireless sensor networks<>itcc<>jian chen<>
31672<>4577_0<>xin gui fang:jie wang:ming yao xu<>on cubic s-arc transitive cayley graphs of finite simple groups<>ejc<>shang jin xu<>
12591<>4579_2<>yun yang<>flexible temporal consistency for fixed-time constraint verification in grid workflow systems<>gcc<>jinjun chen<>
12598<>4580_0<>marshall w. bern:hao chi wong<>avoiding local optima in single particle reconstruction<>recomb<>jindong chen<>
12594<>4582_0<>gokul soundararajan:kaloian manassiev:ashvin goel:cristiana amza<>feedback-based scheduling for back-end databases in shared dynamic content server clusters<>icac<>jin chen<>
12595<>4582_1<>baohua wu:margaret delap:bjorn knutsson:honghui lu:cristiana amza<>locality aware dynamic load management for massively multiplayer games<>ppopp<>jin chen<>
7271<>4583_0<>andrew morris:jacques koreman<>mlp internal representation as discriminative features for improved speaker recognition<>nolisp<>dalei wu<>
12606<>4586_0<>wynne hsu:mong-li lee:see-kiong ng<>discovering reliable protein interactions from high-throughput experimental data using network topology<>artmed<>jin chen<>
7275<>4587_1<>ye tian:kam-wing ng<>aurelia: building locality-preserving overlay network over heterogeneous p2p environments<>ispa<>di wu<>
7272<>4589_0<>marilyn tremaine:aleksandra sarcevic:maria c. velez:bogdan dorohonceanu:allan meng krebs:ivan marsic<>size does matter in computer collaboration: heterogeneous platform effects on human-human interaction<>hicss<>dezhi wu<>
12601<>4590_0<>michael vrable:justin ma:david moore:erik vandekieft:alex c. snoeren:geoffrey m. voelker:stefan savage<>"scalability, fidelity, and containment in the potemkin virtual honeyfarm."<>sosp<>jay chen<>
12600<>4592_1<>timothy d. mount:james s. thorp:robert j. thomas<>location-based scheduling and pricing for energy and reserves: a responsive reserve market proposal<>dss<>jie chen<>
39659<>4596_0<>zhanyi hu<>geometric invariants and applications under catadioptric camera model<>iccv<>yihong wu<>
39655<>4597_0<>frank y. shih<>decomposition of binary morphological structuring elements based on genetic algorithms<>cviu<>yi-ta wu<>
39630<>4599_1<>quanzhi li:razvan stefan bot:xin chen<>domain-specific keyphrase extraction<>cikm<>yi-fang brook wu<>
39631<>4600_0<>douglas w. oard<>indexing emails and email threads for retrieval<>sigir<>yejun wu<>
39632<>4600_1<>robert b. allen:jun luo<>interactive causal schematics for qualitative scientific explanations<>icadl<>yejun wu<>
39650<>4602_0<>qiang wu:margaret martonosi:douglas w. clark:vijay janapa reddi:dan connors:jin lee:david brooks<>a dynamic compilation framework for controlling microprocessor energy and performance<>micro<>youfeng wu<>
39635<>4605_0<>qian zhang:wenwu zhu:sun-yuan kung<>bounding the power rate function of wireless ad hoc networks<>infocom<>yunnan wu<>
39637<>4605_2<>philip a. chou:sun-yuan kung<>minimum-energy multicast in mobile ad hoc networks using network coding<>tcom<>yunnan wu<>
39643<>4606_1<>jinming zhang:cong wang:sin chun ng<>linear decision fusions in multilayer perceptrons for breast cancer diagnosis<>ictai<>yunfeng wu<>
39644<>4607_0<>huamin qu:hong zhou<>psalm: a data model for pervasive visualization<>visualization<>yingcai wu<>
39648<>4608_0<>hisashi kawai:jinfu ni:ren-hua wang<>discriminative training and explicit duration modeling for hmm-based automatic segmentation<>speech<>yi-jian wu<>
14048<>4610_0<>dirk cordel:christoph meinel<>"virtual machine management for tele-lab ""it-security"" server."<>iscc<>ji hu<>
34169<>4614_0<>dong-hee kwon:young-joo suh<>fr-mac: a frame relay mac for capacity and throughput enhancements in multi-rate wireless lans<>wowmom<>woo-jae kim<>
34173<>4614_4<>joo-young baek:sun-don lee:young-joo suh:yun-sung kim:jin-a kim<>efficient uplink scheduler architecture of subscriber station in ieee 802.16 system<>euc<>woo-jae kim<>
34175<>4615_1<>youngmin kwon:kirill mechitov:sameer sundresh:gul a. agha<>resilient localization for sensor networks in outdoor environments<>icdcs<>wooyoung kim<>
34180<>4615_6<>kirill mechitov:jeung-yoon choi:soo kyung ham<>on target tracking with binary proximity sensors<>ipsn<>wooyoung kim<>
34143<>4619_3<>nulo<>on digital convergence and challenges<>jot<>won kim<>
34149<>4619_9<>nulo<>on issues with component-based software reuse<>jot<>won kim<>
34155<>4619_15<>nulo<>on metadata management technology: status and issues<>jot<>won kim<>
18732<>4620_3<>young-in song:sang-bum kim:hae-chang rim<>phrase-based definitional question answering using definition terminology<>airs<>kyoung-soo han<>
5048<>4630_5<>tzi-cker chiueh<>"an integrated pipeline of decompression, simplification and rendering for irregular volume data."<>vg<>chuan-kai yang<>
5050<>4631_0<>po-chi shih:cheng-fang lin:ching-hsien hsu:kuan-ching li<>a chronological history-based execution time estimation model for embarrassingly parallel applications on grids<>ispa<>chao-tung yang<>
5051<>4631_1<>fang-yie leu:jia-chun lin:ming-chang li:po-chi shih<>integrating grid with intrusion detection<>aina<>chao-tung yang<>
5054<>4631_4<>yu-lun kuo:chuan-lin lai<>designing computing platform for biogrid<>ijcat<>chao-tung yang<>
5055<>4631_5<>kuan-wei cheng:kuan-ching li<>an enhanced parallel loop self-scheduling scheme for cluster environments<>tjs<>chao-tung yang<>
5059<>4631_9<>chun-hsiang chen:kuan-ching li:ching-hsien hsu<>performance analysis of applying replica selection technology for data grid environments<>pact<>chao-tung yang<>
5064<>4631_14<>shu-tzu tsai:kuan-ching li<>decision tree construction for data mining on grid computing environments<>aina<>chao-tung yang<>
5066<>4631_16<>po-chi shih:kuan-ching li<>a high-performance computational resource broker for grid computing environments<>aina<>chao-tung yang<>
5068<>4631_18<>kuan-ching li:hsiang-yao cheng:ching-hsien hsu:hsiao-hsi wang:chia-wen hsu:sheng-shiang hung:chia-fu chang:chun-chieh liu:yu-hwa pan<>visuel: a novel performance monitoring and analysis toolkit for cluster and grid environments<>ica3pp<>chao-tung yang<>
5069<>4631_19<>wen-chung shih:ping-i chen:shian-shyong tseng<>a hybrid parallel loop scheduling scheme on heterogeneous pc clusters<>pdcat<>chao-tung yang<>
5070<>4631_20<>hsun-chang chang:kuan-ching li:yaw-ling lin:hsiao-hsi wang:liang-teh lee<>performance issues of grid computing based on different architecture cluster computing platforms<>aina<>chao-tung yang<>
5072<>4631_22<>fang-yie leu:jia-chun lin:ming-chang li<>a performance-based grid intrusion detection system<>compsac<>chao-tung yang<>
5073<>4631_23<>wen-chung shih:shian-shyong tseng<>a hybrid parallel loop scheduling scheme on grid environments<>gcc<>chao-tung yang<>
5074<>4631_24<>hsin-chuan ho<>a shareable e-learning platform using data grid technology<>eee<>chao-tung yang<>
5076<>4631_26<>hsin-chuan ho<>an e-learning platform based on grid architecture<>jise<>chao-tung yang<>
5077<>4631_27<>kuan-wei cheng:kuan-ching li<>an enhanced parallel loop self-scheduling scheme for cluster environments<>aina<>chao-tung yang<>
5078<>4631_28<>chuan-lin lai:kuan-ching li:ching-hsien hsu:william c. chu<>on utilization of the grid computing technology for video conversion and 3d rendering<>ispa<>chao-tung yang<>
5081<>4631_31<>ching-hsien hsu:guan-hao lin:kuan-ching li<>localization techniques for cluster-based data grid<>ica3pp<>chao-tung yang<>
5084<>4631_34<>yi-chun hsiung:heng-chuan kan<>implementation and evaluation of a java based computational grid for bioinformatics applications<>aina<>chao-tung yang<>
5089<>4631_39<>i-hsien yang:kuan-ching li:ching-hsien hsu<>a recursive-adjustment co-allocation scheme in data grid environments<>ica3pp<>chao-tung yang<>
5091<>4631_41<>kuan-ching li:hsun-chang chang:li-jen chang:hsiang-yao cheng:liang-teh lee<>implementation of visuel mpi parallel program performance analysis tool for cluster environments<>aina<>chao-tung yang<>
5092<>4631_42<>ching-hsien hsu:shih-chang chen:kuan-ching li<>optimizations of data distribution localities in cluster grid environments<>iccsa<>chao-tung yang<>
5093<>4631_43<>kuan-ching li:wen-chung chiang:po-chi shih<>design and implementation of tiger grid: an integrated metropolitan-scale grid environment<>pdcat<>chao-tung yang<>
5099<>4632_4<>ramani duraiswami:larry s. davis<>fast multiple object tracking via a hierarchical particle filter<>iccv<>changjiang yang<>
5116<>4634_14<>kar wing li<>a heuristic method based on a statistical approach for chinese text segmentation<>jasis<>christopher c. yang<>
26011<>4642_1<>malgorzata marek-sadowska<>a study of netlist structure and placement efficiency<>tcad<>qinghua liu<>
26012<>4642_2<>malgorzata marek-sadowska<>pre-layout physical connectivity prediction with application in clustering-based placement<>iccd<>qinghua liu<>
26014<>4642_4<>malgorzata marek-sadowska<>wire length prediction-based technology mapping and fanout optimization<>ispd<>qinghua liu<>
26018<>4642_8<>malgorzata marek-sadowska<>a congestion-driven placement framework with local congestion prediction<>glvlsi<>qinghua liu<>
26021<>4644_2<>yidong yuan:xuemin lin:wei wang:jeffrey xu yu:qing zhang<>efficient computation of the skyline cube<>vldb<>qing liu<>
35293<>4645_0<>wei shi<>a parallel euler approach for large-scale biological sequence assembly<>icita<>wanlei zhou<>
35295<>4645_2<>mingjun lan<>spam filtering based on preference ranking<>IEEEcit<>wanlei zhou<>
35296<>4645_3<>leanne ngo:matthew warren<>understanding transition towards information security culture change<>aism<>wanlei zhou<>
35297<>4645_4<>john casey<>reducing the bandwidth requirements of p2p keyword indexing<>ica3pp<>wanlei zhou<>
35300<>4645_7<>yang xiang<>a defense system against ddos attacks by large-scale ip traceback<>icita<>wanlei zhou<>
35306<>4645_13<>yang xiang<>intelligent ddos packet filtering in high-speed networks<>ispa<>wanlei zhou<>
35307<>4645_14<>ruth s. raitman:leanne ngo:naomi augar<>security in the online e-learning environment<>icalt<>wanlei zhou<>
35308<>4645_15<>wei shi:yang xiang<>distributed defense against distributed denial-of-service attacks<>ica3pp<>wanlei zhou<>
35309<>4645_16<>shui yu<>an efficient reliable architecture for application layer anycast service<>ica3pp<>wanlei zhou<>
35313<>4645_20<>ying zhao:yingying zhang:e. j. lanham:jiumei huang<>clock synchronization state graphs based on clock precision difference<>ica3pp<>wanlei zhou<>
26023<>4647_0<>yang liu:shouxun lin<>log-linear models for word alignment<>acl<>qun liu<>
26029<>4651_0<>robert c. mintram<>preliminary data analysis methods in software estimation<>sqj<>qin liu<>
11315<>4654_3<>koichi miura:motomu takano:reiko hamada:ichiro ide:shuichi sakai<>associating semantically structured cooking videos with their preparation steps<>scjapan<>hidehiko tanaka<>
26032<>4655_0<>deyi xiong:shuanglong li:shouxun lin:yueliang qian<>parsing the penn chinese treebank with semantic knowledge<>ijcnlp<>qun liu<>
7098<>4658_0<>christopher g. atkeson<>"simultaneous tracking and activity recognition (star) using many anonymous, binary sensors."<>pervasive<>d. h. wilson<>
7099<>4658_1<>anna c. long:chris atkeson<>a context-aware recognition survey for data collection using ubiquitous sensors in the home<>chi<>daniel h. wilson<>
36307<>4662_0<>lin cai:jianping pan:jon w. mark<>peer collaboration in wireless ad hoc networks<>networking<>xuemin shen<>
36308<>4662_1<>lin cai:jon w. mark:yang xiao<>voice capacity analysis of wlan with unbalanced traffic<>qshine<>xuemin shen<>
36313<>4662_6<>hui chen:yang xiao<>update-based cache replacement policies in wireless data access<>broadnets<>xuemin shen<>
36316<>4662_9<>fang-ming shao:pin-han ho<>reliability optimization of distributed access networks with constrained total cost<>tr<>xuemin shen<>
36318<>4662_11<>mohammad mursalin akon:ajit singh:dhrubajyoti goswami:hon fung li<>developing high-performance parallel applications using epas<>ispa<>xuemin shen<>
36319<>4662_12<>mehrdad dianati:xinhua ling:sagar naik<>a node cooperative arq scheme for wireless ad-hoc networks<>networking<>xuemin shen<>
36321<>4662_14<>lin cai:jianping pan:jon w. mark<>performance analysis of tcp-friendly aimd algorithms for multimedia applications<>tmm<>xuemin shen<>
36322<>4662_15<>jinfang zhang:jon w. mark<>an adaptive handoff priority scheme for wireless mc-cdma cellular networks supporting realtime multimedia applications<>comcom<>xuemin shen<>
36323<>4662_16<>jun cai:kuang-hao liu:jon w. mark:terence d. todd<>power allocation and scheduling for mac layer design in uwb networks<>qshine<>xuemin shen<>
36325<>4662_18<>jun ye:jon w. mark<>call admission control in wideband cdma cellular networks by using fuzzy logic<>tmc<>xuemin shen<>
31310<>4664_0<>andruid kerne:hyun choi:ross graeber:daniel caruso<>evaluating navigational surrogate formats with divergent browsing tasks<>chi<>steven m. smith<>
36328<>4665_2<>bin tan:chengxiang zhai<>implicit user modeling for personalized search<>cikm<>xuehua shen<>
36330<>4665_4<>bin tan:chengxiang zhai<>context-sensitive information retrieval using implicit feedback<>sigir<>xuehua shen<>
36333<>4665_7<>chengxiang zhai<>active feedback in ad hoc information retrieval<>sigir<>xuehua shen<>
36336<>4668_1<>chen ding<>parallelization of utility programs based on behavior phase analysis<>lcpc<>xipeng shen<>
36339<>4668_4<>yaoqing gao:chen ding:roch archambault<>lightweight reference affinity analysis<>ics<>xipeng shen<>
36341<>4668_6<>chen ding:chengliang zhang:mitsunori ogihara<>"gated memory control for memory monitoring, leak detection and garbage collection."<>ACMmsp<>xipeng shen<>
36360<>4671_13<>weifa liang<>finding multiple routing paths in wide-area wdm networks<>comcom<>xiaojun shen<>
2576<>4677_0<>haixia zhao:kent l. norman:catherine plaisant:ben shneiderman<>interactive sonification of choropleth maps<>ieeemm<>benjamin k. smith<>
2581<>4678_4<>nulo<>physical fitness in virtual worlds<>computer<>brian k. smith<>
2549<>4681_1<>alan m. frisch:brahim hnich:ian miguel:toby walsh<>transforming and refining abstract constraint specifications<>sara<>barbara m. smith<>
2563<>4681_15<>nulo<>caching search states in permutation problems<>cp<>barbara m. smith<>
2564<>4681_16<>paula sturdy<>value ordering for finding all solutions<>ijcai<>barbara m. smith<>
2569<>4681_21<>ian p. gent:tom kelsey:steve linton:iain mcdonald:ian miguel<>conditional symmetry breaking<>cp<>barbara m. smith<>
33405<>4687_0<>rajeev kumar:anil mangolia<>realization of multimethods in single dispatch object oriented languages<>sigplan<>vikram agrawal<>
2041<>4689_1<>bingsheng he:qiong luo<>cache-conscious automata for xml filtering<>icde<>byron choi<>
2046<>4689_6<>peter buneman:wenfei fan:robert hutchison:robert mann:stratis viglas<>vectorizing and querying large xml repositories<>icde<>byron choi<>
1504<>4692_5<>serge abiteboul:rakesh agrawal:philip a. bernstein:michael j. carey:stefano ceri:w. bruce croft:david j. dewitt:michael j. franklin:hector garcia-molina:dieter gawlick:jim gray:laura m. haas:alon y. halevy:joseph m. hellerstein:yannis e. ioannidis:martin l. kersten:michael j. pazzani:michael lesk:david maier:jeffrey f. naughton:hans-jorg schek:timos k. sellis:michael stonebraker:richard t. snodgrass:jeffrey d. ullman:gerhard weikum:jennifer widom:stanley b. zdonik<>the lowell database research self-assessment<>cacm<>avi silberschatz<>
1508<>4692_9<>hao wang:haiyong xie:lili qiu:yang richard yang<>optimal isp subscription for internet multihoming: algorithm design and implication analysis<>infocom<>abraham silberschatz<>
2070<>4694_1<>inseong lee:jinwoo kim:yunsuk jeon<>a qualitative cross-national study of cultural influences on mobile data service design<>chi<>boreum choi<>
2060<>4696_5<>xiaogang peng<>document classifications based on word semantic hierarchies<>aia<>ben choi<>
2062<>4696_7<>zhongmei yao<>automatically discovering the number of clusters in web page datasets<>dmin<>ben choi<>
17491<>4699_2<>weiping liao:fei li:lei he:miodrag potkonjak<>scheduling of soft real-time systems for context-aware applications<>date<>jennifer l. wong<>
17493<>4699_4<>alberto cerpa:miodrag potkonjak:deborah estrin<>temporal properties of low power wireless links: modeling and implications on multi-hop routing<>mobihoc<>jennifer l. wong<>
17501<>4699_12<>alberto cerpa:louane kuang:miodrag potkonjak:deborah estrin<>statistical model of lossy links in wireless sensor networks<>ipsn<>jennifer l. wong<>
17511<>4699_22<>farinaz koushanfar:miodrag potkonjak<>flexible asic: shared masking for multiple media processors<>dac<>jennifer l. wong<>
11297<>4700_1<>paul w.-c. kung<>urea: an  and force field study of the gas and solid phases<>jcc<>h. sun<>
17533<>4705_9<>sae hwang:jung-hwan oh:jeongkyu lee:yu cao:wallapak tavanapong:danyu liu:piet c. de groen<>automatic measurement of quality metrics for colonoscopy videos<>mm<>johnny wong<>
17534<>4707_0<>gerard cagney:hugh m. cartwright<>specalign - processing and alignment of mass spectra datasets<>bioinformatics<>jason w. h. wong<>
17535<>4707_1<>hugh m. cartwright<>deterministic projection by growing cell structure networks for visualization of high-dimensionality datasets<>jbi<>jason w. h. wong<>
17536<>4708_0<>duncan s. wong<>known session key attack against a collection of signcryption schemes<>csreaSAM<>jonathan wong<>
18835<>4711_1<>lean yu:shouyang wang<>a novel adaptive learning algorithm for stock market prediction<>isaac<>kin keung lai<>
18844<>4711_10<>lean yu:shouyang wang<>a novel nonlinear ensemble forecasting model incorporating glar and ann for foreign exchange rates<>cor<>kin keung lai<>
18845<>4711_11<>lean yu:shouyang wang<>designing a hybrid ai system as a forex trading decision support tool<>ictai<>kin keung lai<>
18849<>4711_15<>yong fang:shouyang wang<>a fuzzy mixed projects and securities portfolio selection model<>fskd<>k. k. lai<>
18829<>4713_2<>michal feldman:li zhang<>a price-anticipating resource allocation mechanism for distributed shared clusters<>sigecom<>kevin lai<>
18833<>4713_6<>shelley zhuang:ion stoica:randy h. katz:scott shenker<>host mobility using an internet indirection infrastructure<>winet<>kevin lai<>
18855<>4717_2<>zahir tari:peter bertok<>supporting user mobility through cache relocation<>mis<>kwong yuen lai<>
18856<>4717_3<>zahir tari:peter bertok<>improving data accessibility for mobile clients through cooperative hoarding<>icde<>kwong yuen lai<>
18859<>4717_6<>thi khoi anh phan:zahir tari<>efficient soap binding for mobile web services<>lcn<>kwong yuen lai<>
27585<>4718_2<>braham himed<>constrained optimal interferometric imaging of extended objects<>aipr<>raghuveer m. rao<>
27592<>4718_9<>jason tillett:t. m. rao:ferat sahin<>darwinian particle swarm optimization<>iicai<>raghuveer m. rao<>
27599<>4718_16<>david b. grimes<>bilinear sparse coding for invariant vision<>neco<>rajesh p. n. rao<>
27610<>4718_27<>deepak dewangan:vincent j. samar:peter paul<>factors influencing psycophysically valid taxonomies of image texture<>icip<>raghuveer m. rao<>
25189<>4720_2<>joachim gudmundsson:michiel h. m. smid<>constructing plane spanners of bounded degree and low weight<>algorithmica<>prosenjit bose<>
25208<>4720_21<>anthony whitehead:veronique audet<>high-speed texture-preserving digital image inpainting<>sip<>prosenjit bose<>
25213<>4720_26<>pat morin<>guest editors' foreword<>algorithmica<>prosenjit bose<>
25254<>4720_67<>vida dujmovic:david r. wood<>induced subgraphs of bounded degree and bounded treewidth<>wg<>prosenjit bose<>
25261<>4720_74<>marc j. van kreveld<>generalizing monotonicity: on recognizing special classes of polygons and polyhedra<>ijcga<>prosenjit bose<>
25280<>4720_93<>evangelos kranakis:pat morin:yihui tang<>approximate range mode and range median queries<>stacs<>prosenjit bose<>
27579<>4721_2<>sarma b. k. vrudhula<>energy optimal speed control of devices with discrete speed sets<>dac<>ravishankar rao<>
27581<>4721_4<>sarma b. k. vrudhula<>battery optimization vs energy optimization: which to choose and when?<>iccad<>ravishankar rao<>
27614<>4722_0<>imran a. tasadduq<>performance of optimum and suboptimum ofdm-cpm receivers over multipath fading channels<>wicomm<>raveendra k. rao<>
14109<>4725_1<>manfred weiler:ralf p. botchen:simon stegmaier:thomas ertl:yun jang:david s. ebert:kelly p. gaither<>hardware-assisted feature analysis and visualization of procedurally encoded multifield volumetric data<>cga<>jingshu huang<>
14104<>4726_0<>rosa laura zavala gutierrez:benito mendoza garcia:michael n. huhns<>reconciling agent ontologies for web service applications<>mates<>jingshan huang<>
14105<>4726_1<>john cheng:ray emami:larry kerschberg:eugene santos jr.:qunhua zhao:hien nguyen:hua wang:michael n. huhns:marco valtorta:jiangbo dang:hrishikesh j. goradia:sharon xi<>"omniseer: a cognitive framework for user modeling, reuse of prior and tacit knowledge, and collaborative knowledge services."<>hicss<>jingshan huang<>
14107<>4726_3<>rosa laura zavala gutierrez:benito mendoza garcia:michael n. huhns<>sharing ontology schema information for web service integration<>IEEEcit<>jingshan huang<>
31397<>4728_3<>song-shyong chen:yuan-chang chang:sheng-luen chung:tsu-tian lee<>robust static output-feedback stabilization for nonlinear discrete-time systems with time delay via fuzzy control approach<>tfs<>shun-feng su<>
31400<>4730_0<>yi-sheng su:jung-shian li<>receiver-initiated multiple access protocols for spread spectrum mobile ad hoc networks<>comcom<>szu-lin su<>
14112<>4737_2<>wen-chih peng<>an energy-conserved on-demand data broadcasting system<>mdm<>jiun-long huang<>
14114<>4737_4<>chih-chieh hung:wen-chih peng<>exploring regression for mining user moving patterns in a mobile computing system<>hpcc<>jiun-long huang<>
14121<>4738_2<>adnan darwiche<>dpll with a trace: from sat to knowledge compilation<>ijcai<>jinbo huang<>
14137<>4742_0<>dengyong zhou:bernhard scholkopf<>learning from labeled and unlabeled data on a directed graph<>icml<>jiayuan huang<>
798<>4744_1<>li ding:timothy w. finin:yun peng:rong pan:pavan reddivari<>search on the semantic web<>computer<>anupam joshi<>
799<>4744_2<>li ding:lina zhou:timothy w. finin<>how the semantic web is being used: an analysis of foaf documents<>hicss<>anupam joshi<>
802<>4744_5<>dipanjan chakraborty:timothy w. finin:yelena yesha<>service composition for mobile environments<>monet<>anupam joshi<>
805<>4744_8<>timothy w. finin:li ding:rong pan:pranam kolari:akshay java:yun peng<>swoogle: searching for knowledge on the semantic web<>aaai<>anupam joshi<>
809<>4744_12<>li ding:rong pan:timothy w. finin:yun peng:pranam kolari<>finding and ranking knowledge on the semantic web<>semweb<>anupam joshi<>
816<>4744_19<>timothy w. finin:james mayfield:r. scott cost:clay fink<>information retrieval and the semantic web<>hicss<>anupam joshi<>
826<>4744_29<>sethuram balaji kodeswaran<>using location information for scheduling in 802.15.3 mac<>broadnets<>anupam joshi<>
834<>4744_37<>filip perich:yelena yesha:timothy w. finin<>collaborative joins in a pervasive computing environment<>vldb<>anupam joshi<>
836<>4744_39<>anand patwardhan:jim parker:michaela iorga:tom karygiannis<>secure routing and intrusion detection in ad hoc networks<>percom<>anupam joshi<>
840<>4744_43<>pranam kolari:li ding:shashidhara ganjugunte:timothy w. finin:lalana kagal<>enhancing web privacy protection through declarative policies<>policy<>anupam joshi<>
865<>4746_0<>jeffrey a. davis<>wave-pipelined 2-slot time division multiplexed (wp/2-tdm) routing<>glvlsi<>ajay joshi<>
866<>4746_1<>j. a. davis<>wave-pipelined multiplexed (wpm) routing for gigascale integration (gsi)<>tvlsi<>a. j. joshi<>
869<>4747_0<>penny rheingans<>illustration-inspired techniques for visualizing time-varying data<>visualization<>alark joshi<>
10188<>4750_0<>youil kim:taisook han:hwansoo han<>a path sensitive type system for resource usage verification of c like languages<>aplas<>hyun-goo kang<>
10180<>4752_1<>wenjie he:charles k. chui:uday k. chakraborty<>interactive sketch generation<>vc<>hyung w. kang<>
10181<>4752_2<>nulo<>g-wire: a livewire segmentation algorithm based on a generalized graph formulation<>prl<>hyung woo kang<>
10187<>4752_8<>nulo<>nonphotorealistic virtual environment navigation from images<>ijig<>hyung woo kang<>
11287<>4755_2<>heesook choi:guohong cao:thomas f. la porta<>mobile multi-layered ipsec<>infocom<>hui song<>
11288<>4755_3<>guohong cao<>cache-miss-initiated prefetch in mobile environments<>comcom<>hui song<>
17465<>4758_1<>paul curzon:gill whitney<>successful strategies of older people for finding information<>iwc<>judy wilson<>
17446<>4760_4<>emily k. lada:mary ann flanigan wagner:natalie m. steiger<>introduction to modeling and generating probabilistic input processes for simulation<>wsc<>james r. wilson<>
2187<>4764_7<>daniel r. figueiredo:anja feldmann:vishal misra:donald f. towsley:walter willinger<>on tcp and self-similar traffic<>pe<>benyuan liu<>
2188<>4765_0<>philip s. yu:xin li<>adding the temporal dimension to search - a case study in publication search<>webi<>bing liu<>
2190<>4765_2<>leonardo rigutini:marco maggini<>an em based training algorithm for cross-language text categorization<>webi<>bing liu<>
2203<>4765_15<>xiaoli li<>learning from positive and unlabeled examples with different data distributions<>ecml<>bing liu<>
2209<>4765_21<>yanhong zhai<>web data extraction based on partial tree alignment<>www<>bing liu<>
2220<>4765_32<>yanhong zhai<>extracting web data using instance-based learning<>wise<>bing liu<>
2234<>4765_46<>minqing hu:junsheng cheng<>opinion observer: analyzing and comparing opinions on the web<>www<>bing liu<>
2238<>4765_50<>yanhong zhai<>net - a system for extracting web data from flat and nested data records<>wise<>bing liu<>
2263<>4766_3<>kai zheng:hao che:zhijun wang<>tcam-based distributed parallel packet classification algorithm with range-matching solution<>infocom<>bin liu<>
2264<>4766_4<>zhen liu:kai zheng<>hybrid cache architecture for high speed packet processing<>hoti<>bin liu<>
2266<>4766_6<>beibei wu:yang xu:hongbin lu<>a practical packet reordering mechanism with flow granularity for parallelism exploiting in network processors<>ipps<>bin liu<>
2267<>4766_7<>wenjie li<>spf: to improve the performance of packet-mode scheduling<>comcom<>bin liu<>
2273<>4766_13<>wenjie li:lei shi:yang xu:dapeng wu<>preemptive packet-mode scheduling to improve tcp performance<>iwqos<>bin liu<>
2274<>4766_14<>kai zheng:zhen liu<>high performance embedded route lookup coprocessor for network processors<>iccnmc<>bin liu<>
2283<>4768_0<>qinghua cui:tianzi jiang:songde ma<>characterizing the dynamic connectivity between genes by variable parameter regression and kalman filtering based on temporal gene expression data<>bioinformatics<>bing liu<>
2286<>4768_3<>jiaju zhou<>sars-cov protease inhibitors design using virtual screening method from natural products libraries<>jcc<>bing liu<>
2302<>4772_1<>wang-chien lee:dik lun lee<>supporting complex multi-dimensional queries in p2p systems<>icdcs<>bin liu<>
2304<>4772_3<>wang-chien lee:dik lun lee<>distributed caching of multi-dimensional data in mobile environments<>mdm<>bin liu<>
2305<>4773_0<>yali zhu:mariana jbantova:bradley momberger:elke a. rundensteiner<>a dynamically adaptive distributed system for processing complex continuous queries<>vldb<>bin liu<>
2307<>4773_2<>timothy m. sutherland:mariana jbantova:elke a. rundensteiner<>d-cape: distributed and self-tuned continuous query processing<>cikm<>bin liu<>
30122<>4776_4<>craig a. knoblock<>sergeant: a framework for building more flexible web agents by exploiting a search engine<>wias<>shou-de lin<>
30114<>4778_0<>dimitrios gunopulos:vana kalogeraki:stefano lonardi<>a data compression technique for sensor networks with dynamic bandwidth allocation<>time<>song lin<>
30115<>4778_1<>dimitrios gunopulos:stefano lonardi:vana kalogeraki<>applying lvq techniques to compress historical information in sensor networks<>dcc<>song lin<>
30303<>4779_1<>chunhong pan:hongping yan:gerard g. medioni<>parametric reconstruction of generalized cylinders from limb edges<>tip<>songde ma<>
6849<>4784_8<>benjamin schwarz:hao chen:jeremy lin:wei tu:geoff morrison:jacob west<>model checking an entire linux distribution for security violations<>acsac<>david wagner<>
6850<>4784_9<>david molnar:andrea soppera<>privacy for rfid through trusted computing<>wpes<>david wagner<>
6854<>4784_13<>lillie coney:joseph lorenzo hall:poorvi l. vora<>towards a privacy measurement criterion for voting systems<>dgo<>david wagner<>
6855<>4784_14<>jason waddle<>fault attacks on dual-rail encoded systems<>acsac<>david wagner<>
6900<>4786_2<>ulrik brandes:sabine cornelsen<>characterizing families of cuts that can be represented by axis-parallel rectangles<>jgaa<>dorothea wagner<>
6906<>4786_8<>rolf h. mohring:heiko schilling:birk schutz:thomas willhalm<>partitioning graphs to speed up dijkstra's algorithm<>wea<>dorothea wagner<>
6910<>4786_12<>marco gaertler<>a hybrid model for drawing dynamic and evolving graphs<>gd<>dorothea wagner<>
6911<>4786_13<>martin holzer:grigorios prasinos:frank schulz:christos d. zaroliagis<>engineering planar separator algorithms<>esa<>dorothea wagner<>
6917<>4786_19<>thomas willhalm<>drawing graphs to speed up shortest-path computations<>alenex<>dorothea wagner<>
6919<>4786_21<>thomas willhalm:christos d. zaroliagis<>geometric containers for efficient shortest-path computation<>jea<>dorothea wagner<>
6924<>4786_26<>martin holzer:frank schulz:thomas willhalm<>combining speed-up techniques for shortest-path computations<>jea<>dorothea wagner<>
6934<>4786_36<>marco gaertler<>a hybrid model for drawing dynamic and evolving graphs<>dagstuhl<>dorothea wagner<>
6940<>4786_42<>thomas schank<>approximating clustering coefficient and transitivity<>jgaa<>dorothea wagner<>
6947<>4787_0<>robert l. scot drysdale:clifford stein<>an o(nlog n) algorithm for the rectilinear minimum link-distance problem<>cccg<>david p. wagner<>
8781<>4790_0<>hans-arno jacobsen<>composite subscriptions in content-based publish/subscribe systems<>middleware<>guoli li<>
8782<>4790_1<>e. fidler:hans-arno jacobsen:serge mankovski<>the padres distributed publish/subscribe system<>fiw<>guoli li<>
11241<>4796_12<>sanjay jain:etsuji tomita<>editors' introduction<>alt<>hans-ulrich simon<>
11245<>4796_16<>erich strohmaier:jack dongarra:hans werner meuer<>recent trends in the marketplace of high performance computing<>pc<>horst d. simon<>
11226<>4797_0<>nikolas list<>general polynomial time decomposition algorithms<>colt<>hans-ulrich simon<>
11227<>4797_1<>atsuyoshi nakamura:michael schmitt:niels schmitt<>inner product spaces for bayesian networks<>jmlr<>hans-ulrich simon<>
15113<>4805_0<>bo yang:wei lu<>a web services based communication services framework for collaborative work<>csac<>jun liu<>
15110<>4808_0<>zhaoyu liu:dichao peng:yuliang zheng<>communication protection in ip-based video surveillance systems<>ism<>jeffrey liu<>
18358<>4815_2<>joseph polastre:jonathan hui:philip levis:david e. culler:scott shenker:ion stoica<>a unifying link abstraction for wireless sensor networks<>sensys<>jerry zhao<>
18321<>4816_1<>dmitri roussinov:weiguo fan<>mining context specific similarity relationships using the world wide web<>naacl<>j. leon zhao<>
18328<>4816_8<>daniel dajun zeng<>effective role resolution in workflow management<>informs<>j. leon zhao<>
18331<>4816_11<>ramesh sharda:nicolas ducheneaut:ashish gupta:ron weber<>e-mail management: a techno-managerial research perspective<>icis<>j. zhao<>
18336<>4816_16<>yongsun choi<>decomposition-based verification of cyclic workflows<>atva<>j. leon zhao<>
18340<>4816_20<>hsing kenneth cheng<>editorial on the special issue for the second workshop on e-business<>isem<>j. leon zhao<>
8472<>4821_0<>peter a. heeman:andrew l. kun:alexander shyrokov<>conventions in human-human multi-threaded dialogues: a preliminary study<>iui<>fan yang<>
31424<>4829_0<>kecheng liu<>enterprise infrastructure planning - modelling and simulation using the problem articulation method<>iceis<>simon tan<>
20315<>4837_0<>jean-daniel boissonnat:steve oudot<>learning smooth objects by probing<>compgeom<>leonidas j. guibas<>
20318<>4837_3<>jean-daniel boissonnat:steve oudot<>learning smooth objects by probing<>compgeom<>leonidas j. guibas<>
20310<>4840_1<>mark pauly:niloy j. mitra:joachim giesen:markus h. gross<>example-based 3d scan completion<>sgp<>leonidas j. guibas<>
20313<>4840_4<>natasha gelfand:niloy j. mitra:helmut pottmann<>robust global registration<>sgp<>leonidas j. guibas<>
20305<>4841_0<>gunnar carlsson:afra zomorodian:anne d. collins<>persistence barcodes for shapes<>ijsm<>leonidas j. guibas<>
20280<>4844_9<>qing fang:jie gao:v. de silva:li zhang<>glider: gradient landmark-based distributed routing for sensor networks<>infocom<>leonidas j. guibas<>
20291<>4844_20<>jie gao:an nguyen<>distributed proximity maintenance in ad hoc mobile networks<>dcoss<>leonidas j. guibas<>
20294<>4844_23<>jaewon shin:nelson lee:sebastian thrun<>lazy inference on object identities in wireless sensor networks<>ipsn<>leonidas j. guibas<>
12183<>4845_0<>mihaly barasz:andras frank<>an algorithm for source location in directed graphs<>orl<>johanna becker<>
12184<>4846_0<>pascal t. wolkotte:gerard j. m. smit<>energy-efficient noc for best-effort communication<>fpl<>jens e. becker<>
38402<>4851_0<>bamidele tayo:xueya cai:arpad kelemen<>differential and trajectory methods for time course gene expression data<>bioinformatics<>yulan liang<>
38404<>4851_2<>arpad kelemen:stan franklin<>"constraint satisfaction in ""conscious"" software agents--a practical application."<>aai<>yulan liang<>
31713<>4860_0<>a. a. alhadeed<>optimal simple step-stress plan for cumulative exposure model using log-normal distribution<>tr<>shie-shien yang<>
2937<>4862_0<>zhicheng su<>from data to knowledge: an integrated rule-based data mining system<>seke<>chien-chung chan<>
2941<>4864_0<>yu-liang wu<>on improved least flexibility first heuristics superior for packing and stock cutting problems<>saga<>chi-kong chan<>
9925<>4869_0<>per-ake larson:raghu ramakrishnan<>"caching with 'good enough' currency, consistency, and completeness."<>vldb<>hongfei guo<>
9931<>4870_2<>amanda stent<>a new data-driven approach for multimedia presentation planning<>euroimsa<>hui guo<>
10169<>4872_7<>jeffrey m. bradshaw:shriniwas kulkarni:matthew johnson:paul j. feltovich:james f. allen:larry bunch:nathanael chambers:lucian galescu:renia jeffers:niranjan suri:william taysom:andrzej uszok<>kaa: policy-based explorations of a richer model for adjustable autonomy<>atal<>hyuckchul jung<>
10175<>4873_0<>sangheon pack:taekyoung kwon:yanghee choi<>snc: a selective neighbor caching scheme for fast handoff in ieee 802.11 wireless networks<>sigmobile<>hakyung jung<>
10144<>4874_2<>elkin vumar<>degree bounds for the circumference of 3-connected graphs<>jgt<>heinz adolf jung<>
10149<>4874_7<>elkin vumar<>some degree bounds for the circumference of graphs<>dm<>heinz adolf jung<>
10156<>4875_3<>min-su kim:sebastien valette:remy prost<>watermarking of 3d irregular meshes based on wavelet multiresolution analysis<>iwdw<>ho-youl jung<>
10176<>4876_0<>milind tambe<>on communication in solving distributed constraint satisfaction problems<>ceemas<>hyuckchul jung<>
10177<>4877_0<>namyoon woo:dongin shin:hyuck han:heon young yeom:taesoon park<>performance evaluation of consistent recovery protocols using mpich-gf<>edcc<>hyungsoo jung<>
34612<>4880_5<>qi hao:zhan zhang<>an autonomous agent development environment for engineering applications<>aei<>weiming shen<>
34626<>4881_2<>xin li:anhai doan<>constraint-based entity matching<>aaai<>warren shen<>
34225<>4889_5<>david dagon:richard j. lipton<>protecting secret data from insider attacks<>fc<>wenke lee<>
34229<>4889_9<>monirul i. sharif:george f. riley<>comparative study between analytical models and packet-level worm simulations<>pads<>wenke lee<>
34260<>4889_40<>jonathon t. giffin:david dagon:somesh jha:barton p. miller<>environment-sensitive intrusion detection<>raid<>wenke lee<>
34261<>4889_41<>tao zhang:xiaotong zhuang:santosh pande<>anomalous path detection with hardware support<>cases<>wenke lee<>
34272<>4890_8<>upali sathyajith kohomban<>learning semantic classes for word sense disambiguation<>acl<>wee sun lee<>
34281<>4890_17<>dell zhang:xi chen<>text classification with kernels on the multinomial manifold<>sigir<>wee sun lee<>
34282<>4890_18<>thanh phong pham:hwee tou ng<>word sense disambiguation with semi-supervised learning<>aaai<>wee sun lee<>
34219<>4892_0<>yunmook nah:joonwoo lee:ho lee:moon-hae kim:ki-joon han<>distributed scalable location data management system based on the galis architecture<>words<>woon joo lee<>
34189<>4893_3<>baihua zheng<>dsi: a fully distributed spatial index for location-based wireless broadcast services<>icdcs<>wang-chien lee<>
34194<>4893_8<>haibo hu:jianliang xu:wing sing wong:baihua zheng:dik lun lee<>proactive caching for spatial queries in mobile environments<>icde<>wang-chien lee<>
34212<>4893_26<>bin liu:dik lun lee<>distributed caching of multi-dimensional data in mobile environments<>mdm<>wang-chien lee<>
22541<>4894_0<>yaling ma<>k-server optimal task scheduling problem with convex cost function<>wiopt<>mingjie lin<>
22537<>4896_0<>zhiyong lin:jinhui xu<>almost optimal solutions for bin coloring problems<>isaac<>mingen lin<>
22509<>4902_8<>stephane redon:nico galoppo<>adaptive dynamics of articulated bodies<>tog<>ming c. lin<>
22510<>4902_9<>miguel a. otaduy<>stable and responsive six-degree-of-freedom haptic manipulation using implicit integration<>haptics<>ming c. lin<>
22521<>4902_20<>miguel a. otaduy<>sensation-preserving haptic rendering<>cga<>ming c. lin<>
170<>4904_0<>nuno vasconcelos<>probabilistic kernels for the classification of auto-regressive visual processes<>cvpr<>antoni b. chan<>
173<>4904_3<>nuno vasconcelos<>layered dynamic textures<>nips<>antoni b. chan<>
174<>4904_4<>nuno vasconcelos<>mixtures of dynamic textures<>iccv<>antoni b. chan<>
181<>4906_1<>karon e. maclean:joanna mcgrenere<>learning and identifying haptic icons under workload<>haptics<>andrew chan<>
31711<>4909_4<>kevin r. janes:roger r. hacker<>pork farm odour modelling using multiple-component multiple-factor analysis and neural networks<>asc<>simon x. yang<>
15101<>4913_2<>pengyu hong:x. shirley liu:qing zhou:xin lu:wing hung wong<>a boosting approach for motif modeling using chip-chip data<>bioinformatics<>jun s. liu<>
31674<>4920_0<>jie wu<>smart: a scan-based movement-assisted sensor deployment method in wireless sensor networks<>infocom<>shuhui yang<>
31675<>4920_1<>jie wu:jiannong cao<>connected k-hop clustering in ad hoc networks<>icpp<>shuhui yang<>
31676<>4920_2<>jie wu:mihaela cardei:fei dai<>extended dominating set in ad hoc networks using cooperative communication<>networking<>shuhui yang<>
31680<>4923_0<>pierre-majorique leger<>network effects and the creation of shareholders' wealth in the context of software firm mergers and acquisitions<>ecis<>shinkyu yang<>
31691<>4926_1<>nulo<>population-based incremental learning with memory scheme for changing environments<>gecco<>shengxiang yang<>
31696<>4926_6<>nulo<>memory-enhanced univariate marginal distribution algorithms for dynamic optimization problems<>cec<>shengxiang yang<>
31700<>4926_10<>renato tinos<>genetic algorithms with self-organized criticality for dynamic optimization problems<>cec<>shengxiang yang<>
31701<>4926_11<>nulo<>memory-based immigrants for genetic algorithms in dynamic environments<>gecco<>shengxiang yang<>
31702<>4926_12<>jurgen branke<>evolutionary algorithms for dynamic optimization problems: workshop preface<>gecco<>shengxiang yang<>
31704<>4926_14<>xin yao<>experimental study on population-based incremental learning algorithms for dynamic optimization problems<>soco<>shengxiang yang<>
15076<>4930_1<>xiaoou tang<>evolutionary search for faces from line drawings<>pami<>jianzhuang liu<>
15080<>4930_5<>liangliang cao:xiaoou tang<>3d object reconstruction from a single 2d line drawing without hidden lines<>iccv<>jianzhuang liu<>
15081<>4930_6<>dong xu:xuelong li:zhengkai liu:xiaoou tang<>insignificant shadow detection for video segmentation<>tcsv<>jianzhuang liu<>
15055<>4934_0<>zhiyong peng:qing li:ling feng:xuhui li<>using object deputy model to prepare data for data warehousing<>tkde<>junqiang liu<>
15068<>4936_0<>nulo<>a characterization of pancyclic complements of line graphs<>dm<>jiping liu<>
13337<>4939_0<>huijun liu:yucai feng<>sentential association based text classification systems<>apweb<>jianlin feng<>
13340<>4939_3<>tieyun qian:yuanzhen wang:hao long<>2-ps based associative text classification<>dawak<>jianlin feng<>
11152<>4942_1<>haibin kan<>trellis properties of product codes<>ieicet<>hong shen<>
11163<>4942_12<>zonghua zhang<>application of online-training svms for real-time intrusion detection with different considerations<>comcom<>hong shen<>
11173<>4942_22<>gui xie<>"highly scalable, low-complexity image coding using zeroblocks of wavelet coefficients."<>tcsv<>hong shen<>
11184<>4942_33<>haibin kan<>a relation between the characteristic generators of a linear code and its dual<>tit<>hong shen<>
11136<>4943_7<>xiaofang zhou:bin cui<>indexing text and visual features for www images<>apweb<>heng tao shen<>
11138<>4943_9<>beng chin ooi:xiaofang zhou<>towards effective indexing for very large video sequence database<>sigmod<>heng tao shen<>
11140<>4943_11<>sai sun:xiaofang zhou<>semantic caching for multiresolution spatial query processing in mobile environments<>ssd<>heng tao shen<>
11194<>4945_0<>anoop sarkar<>voting between multiple data representations for text chunking<>ai<>hong shen<>
11190<>4946_3<>hantao zhang<>another complete local search method for sat<>lpar<>haiou shen<>
11193<>4946_6<>hantao zhang<>improving exact algorithms for max-2-sat<>amai<>haiou shen<>
15221<>4949_5<>jean-pierre hubaux<>joint mobility and routing for lifetime elongation in wireless sensor networks<>infocom<>jun luo<>
19806<>4951_0<>grigoris antoniou:rodney w. topor:abdul sattar<>merging and aligning ontologies in dl-programs<>ruleml<>kewen wang<>
19809<>4951_3<>lizhu zhou<>comparisons and computation of well-founded semantics for disjunctive logic programs<>tocl<>kewen wang<>
19811<>4951_5<>abdul sattar:kaile su<>a theory of forgetting in logic programming<>aaai<>kewen wang<>
19813<>4951_7<>kaile su:abdul sattar:xiangyu luo:guido governatori:vineet padmanabhan<>observation-based model for bdi-agents<>aaai<>kewen wang<>
19818<>4951_12<>yan zhang<>nested epistemic logic programs<>lpnmr<>kewen wang<>
15223<>4952_0<>xin wu:michael g. walker:liping wei<>gba server: est-based digital gene expression profiling<>nar<>jingchu luo<>
15225<>4952_2<>yunjia chen:yong zhang:yanbin yin:ge gao:songgang li:ying jiang:xiaocheng gu<>spd - a web-based secreted protein database<>nar<>jingchu luo<>
19801<>4953_2<>michael e. locasto:angelos d. keromytis:salvatore j. stolfo<>flips: hybrid adaptive intrusion prevention<>raid<>ke wang<>
19803<>4953_4<>salvatore j. stolfo:shlomo hershkop:linh h. bui:ryan ferster<>anomaly detection in computer security and an application to file system accesses<>ismis<>ke wang<>
19805<>4953_6<>gabriela cretu:salvatore j. stolfo<>anomalous payload-based worm detection and signature generation<>raid<>ke wang<>
19822<>4955_1<>benjamin c. m. fung:philip s. yu<>top-down specialization for information and privacy preservation<>icde<>ke wang<>
19826<>4955_5<>benjamin c. m. fung:philip s. yu<>template-based privacy preservation in classification problems<>icdm<>ke wang<>
35023<>4957_0<>tim s. woodall:richard l. graham:dhabaleswar k. panda<>design and implementation of open mpi over quadrics/elan4<>ipps<>weikuan yu<>
35027<>4957_4<>shuang liang:dhabaleswar k. panda<>high performance support of parallel virtual file system (pvfs2) over quadrics<>ics<>weikuan yu<>
35039<>4960_5<>david p. varodayan:john m. cioffi<>trellis and convolutional precoding for transmitter-based interference presubtraction<>tcom<>wei yu<>
35046<>4963_3<>america morales<>neural networks for the optimization of crude oil blending<>ijns<>wen yu<>
35059<>4967_1<>yan sun:k. j. ray liu<>hadof: defense against routing disruptions in mobile ad hoc networks<>infocom<>wei yu<>
35576<>4972_0<>illhoi yoo:min song:yanqing zhang:il-yeol song<>mining undiscovered public knowledge from complementary and non-interactive biomedical literature through semantic pruning<>cikm<>xiaohua hu<>
35581<>4972_5<>illhoi yoo:peter rumm:michael atwood<>mining candidate viruses as potential bio-terrorism weapons from biomedical literature<>isi<>xiaohua hu<>
35582<>4972_6<>il-yeol song:hyoil han:illhoi yoo:ann prestrud:murray f. brennan:ari d. brooks<>temporal rule induction for clinical outcome analysis<>ijbidm<>xiaohua hu<>
35587<>4972_11<>guangrong li:illhoi yoo:xiaodan zhang:xuheng xu<>a semantic-based approach for mining undiscovered public knowledge from biomedical literature<>grc<>xiaohua hu<>
35592<>4973_0<>yang yang:tong jing:xianlong hong:yu hu:qi zhu:guiying yan<>via-aware global routing for good vlsi manufacturability and high yield<>asap<>xiaodong hu<>
35593<>4973_1<>yu hu:tong jing:xianlong hong:zhe feng 0002:guiying yan<>an-oarsman: obstacle-avoiding routing tree construction with good length performance<>aspdac<>xiaodong hu<>
35602<>4975_5<>max m. louwerse:zhiqiang cai:matthew ventura:patrick jeuniaux<>the embodiment of amodal symbolic knowledge representations<>flairs<>xiangen hu<>
33025<>4985_3<>yoshitaka kameya:neng-fa zhou<>generative modeling with failure in prism<>ijcai<>taisuke sato<>
33028<>4985_6<>yoshitaka kameya<>learning through failure<>dagstuhl<>taisuke sato<>
22633<>4988_9<>david r. millen:werner geyer:eric wilcox:beth brownholtz<>patterns of media use in an activity-centric collaborative environment<>chi<>michael j. muller<>
22636<>4989_0<>michael m. resch<>the grid<>it<>matthias s. muller<>
28360<>4993_8<>mengyao ma:oscar c. au<>a new motion compensation approach for error resilient video coding<>icip<>shueng-han gary chan<>
28370<>4995_1<>jin-cheon na:christopher s. g. khoo:norraihan bte hamzah<>sentiment-based search in digital libraries<>jcdl<>syin chan<>
28378<>4997_3<>ho-pong leung:korris fu-lai chung<>on the use of hierarchical information in sequential mining-based xml document similarity computation<>kais<>stephen chi-fai chan<>
17907<>5004_4<>ying-ming wang:dong-ling xu<>a preference aggregation method through the estimation of utility intervals<>cor<>jian-bo yang<>
17909<>5004_6<>ying-ming wang:richard greatbanks<>interval efficiency assessment using data envelopment analysis<>fss<>jian-bo yang<>
17915<>5004_12<>ying-ming wang:dong-ling xu<>a two-stage logarithmic goal programming method for generating weights from interval comparison matrices<>fss<>jian-bo yang<>
17921<>5006_4<>adam silberstein:hao he:ke yi<>boxes: efficient maintenance of order-based labeling for dynamic xml data<>icde<>jun yang<>
17924<>5006_7<>hao he:haixun wang:philip s. yu<>compact reachability labeling for graph-structured data<>cikm<>jun yang<>
17929<>5006_12<>junyi xie:yuguo chen<>on joining and caching stochastic streams<>sigmod<>jun yang<>
17935<>5006_18<>pankaj k. agarwal:junyi xie:hai yu<>monitoring continuous band-join queries over dynamic data<>isaac<>jun yang<>
21993<>5012_0<>guilin chen<>optimizing address code generation for array-intensive dsp applications<>cgo<>mahmut t. kandemir<>
21997<>5012_4<>seung woo son:guangyu chen:alok n. choudhary<>exposing disk layout to compiler for reducing energy consumption of parallel disk based systems<>ppopp<>mahmut t. kandemir<>
35177<>5013_0<>nulo<>replication cache: a small fully associative cache to improve data cache reliability<>tc<>wei zhang<>
2074<>5015_0<>santiago macho-gonzalez<>open constraint programming<>ai<>boi faltings<>
35117<>5016_4<>jiangeng li:xiaogang ruan<>reinforcement learning based on multi-agent in robocup<>icic<>wei zhang<>
35118<>5016_5<>kun chen:haiyan zhao:hong mei<>an approach to constructing feature models based on requirements clustering<>re<>wei zhang<>
35129<>5016_16<>jun yan<>compiler-guided register reliability improvement against soft errors<>emsoft<>wei zhang<>
35136<>5016_23<>tingjun hou:xiaojie xu<>new born radii deriving method for generalized born model<>jcisd<>wei zhang<>
35146<>5016_33<>hong mei:haiyan zhao<>a feature-oriented approach to modeling requirements dependencies<>re<>wei zhang<>
35153<>5016_40<>zhao li:hengchang liu:baohua zhao:yugui qu<>multicast routing with minimum energy cost and minimum delay in wireless sensor networks<>euc<>wei zhang<>
35157<>5017_3<>nevin lianwen zhang<>restricted value iteration: theory and algorithms<>jair<>weihong zhang<>
35070<>5018_0<>jianhua ruan<>cager: classification analysis of gene expression regulation using multiple information sources<>bmcbi<>weixiong zhang<>
35082<>5018_12<>richard e. korf:ignacio thayer:heath hohwald<>frontier search<>jacm<>weixiong zhang<>
35088<>5018_18<>moshe looks<>a novel local search algorithm for the traveling salesman problem that exploits backbones<>ijcai<>weixiong zhang<>
35103<>5018_33<>zhao xing<>maxsolver: an efficient exact algorithm for (weighted) maximum satisfiability<>ai<>weixiong zhang<>
35110<>5018_40<>guandong wang:zhao xing:lars wittenburg<>"distributed stochastic search and distributed breakout: properties, comparison and applications to constraint optimization problems in sensor networks."<>ai<>weixiong zhang<>
35164<>5020_0<>guohong cao<>group rekeying for filtering false data in sensor networks: a predistribution and local collaboration-based approach<>infocom<>wensheng zhang<>
35166<>5020_2<>hui song:sencun zhu:guohong cao<>least privilege and privilege deprivation: towards tolerating mobile sink compromises in wireless sensor networks<>mobihoc<>wensheng zhang<>
35168<>5024_1<>yuangui li:guoli wang:yunze cai<>simplify decision function of reduced support vector machines<>micai<>weidong zhang<>
13841<>5026_6<>vern paxson:larry l. peterson:timothy roscoe:scott shenker:david wetherall<>the network oracle<>debu<>joseph m. hellerstein<>
13874<>5026_39<>yatin chawathe:sriram ramabhadran:sylvia ratnasamy:anthony lamarca:scott shenker<>a case study in building layered dht applications<>sigcomm<>joseph m. hellerstein<>
13878<>5026_43<>ryan huebsch:brent n. chun:boon thau loo:petros maniatis:timothy roscoe:scott shenker:ion stoica:aydan r. yumerefendi<>the architecture of pier: an internet-scale query processor<>cidr<>joseph m. hellerstein<>
13879<>5026_44<>boon thau loo:ion stoica:raghu ramakrishnan<>declarative routing: extensible routing with declarative queries<>sigcomm<>joseph m. hellerstein<>
13898<>5026_63<>boon thau loo:tyson condie:petros maniatis:timothy roscoe:ion stoica<>implementing declarative overlays<>sosp<>joseph m. hellerstein<>
35175<>5029_0<>tsuhan chen<>generalized optimal thresholding for biometric key generation using face images<>icip<>wende zhang<>
15213<>5034_1<>yijun yu:john mylopoulos:weiwei sun:jing-hao xue:erik h. d'hollander<>making xml document markup international<>spe<>jianguo lu<>
18646<>5035_7<>nulo<>boosting input/output hidden markov models for sequence classification<>icnc<>ke chen<>
18650<>5035_11<>nulo<>adaptive smoothing via contextual and local discontinuities<>pami<>ke chen<>
18610<>5039_2<>zhenjie huang:yumin wang<>efficient identity-based signatures and blind signatures<>cans<>kefei chen<>
18611<>5039_3<>yongguo liu:yan liu<>clustering with noising method<>adma<>kefei chen<>
18618<>5039_10<>ruishan zhang<>an efficient asynchronous proactive rsa scheme<>pdcat<>kefei chen<>
18620<>5039_12<>wei wei:xuhua ding<>multiplex encryption: a practical approach to encrypting multi-recipient emails<>icics<>kefei chen<>
18623<>5039_15<>shiqun li:jianying zhou:xiangxue li<>an authentication protocol for pervasive computing<>ispa<>kefei chen<>
18624<>5039_16<>shiqun li:xiangxue li:rongxing lu<>identity based conference key distribution scheme from parings<>iccnmc<>kefei chen<>
18626<>5039_18<>changshe ma:dong zheng:shengli liu<>efficient and proactive threshold signcryption<>isw<>kefei chen<>
18628<>5039_20<>changshe ma:shengli liu:dong zheng<>transitive signatures based on bilinear maps<>sis<>kefei chen<>
18630<>5039_22<>yongguo liu:libin wang<>a tabu search based method for minimum sum of squares clustering<>icapr<>kefei chen<>
18632<>5039_24<>yongguo liu:wei zhang:dong zheng<>a novel clustering technique based on improved noising method<>ciarp<>kefei chen<>
18633<>5039_25<>ruishan zhang<>improvements on the wtls protocol to avoid denial of service attacks<>compsec<>kefei chen<>
17725<>5042_0<>juan-ming yuan<>the effect of dissipation on solutions of the complex kdv equation<>mcs<>jiahong wu<>
17727<>5044_0<>zhaohui wu<>similarity-based web service matchmaking<>IEEEscc<>jian wu<>
17719<>5049_3<>ping wang:anthony j. w. hilton<>two sufficient conditions for a graph to be type 1<>arscom<>jian-liang wu<>
37827<>5050_0<>yi zhang:jiang guo<>on mitigating network partitioning in peer-to-peer massively multiplayer games<>iccnmc<>yuan he<>
37823<>5052_0<>gyorgy dosa<>bin packing and covering problems with rejection<>cocoon<>yong he<>
37824<>5052_1<>yiwei jiang<>preemptive online algorithms for scheduling with machine cost<>acta<>yong he<>
37825<>5052_2<>zhiyi tan<>linear time algorithms for parallel machine scheduling<>aaim<>yong he<>
37826<>5053_0<>richard r. vines:alice r. wattam:georgiy v. abramochkin:allan dickerman:j. dana eckart:bruno w. s. sobral<>piml: the pathogen information markup language<>bioinformatics<>yongqun he<>
37810<>5054_1<>xianfeng gu:hong qin<>manifold splines<>sma<>ying he<>
37811<>5054_2<>xianfeng gu:hong qin<>rational spherical splines for genus zero shape modeling<>smi<>ying he<>
37812<>5054_3<>kexiang wang:hong qin<>incorporating rigid structures in non-rigid registration using triangular b-splines<>vlsm<>ying he<>
37816<>5054_7<>miao jin:xianfeng gu:hong qin<>a c globally interpolatory spline of arbitrary topology<>vlsm<>ying he<>
37817<>5054_8<>xin li:xianfeng gu:hong qin<>brain image analysis using spherical splines<>emmcvpr<>ying he<>
37820<>5055_1<>cauligi s. raghavendra<>building programmable routing service for sensor networks<>comcom<>yu he<>
9149<>5056_0<>martin theobald:ralf schenkel<>an efficient and versatile query engine for topx search<>vldb<>gerhard weikum<>
9151<>5056_2<>martin theobald:ralf schenkel<>efficient and self-tuning incremental query expansion for top-k query processing<>sigir<>gerhard weikum<>
9157<>5056_8<>surajit chaudhuri<>foundations of automated database tuning<>sigmod<>gerhard weikum<>
9170<>5056_21<>stefan siersdorfer<>using restrictive classification and meta classification for junk elimination<>ecir<>gerhard weikum<>
9171<>5056_22<>sebastian michel:peter triantafillou<>klee: a framework for distributed top-k query algorithms<>vldb<>gerhard weikum<>
9172<>5056_23<>cliff b. jones:david b. lomet:alexander b. romanovsky:alan fekete:marie-claude gaudel:henry f. korth:rogerio de lemos:j. eliot b. moss:ravi rajwar:krithi ramamritham:brian randell:luis rodrigues<>the atomic manifesto: a story in four quarks<>sigmod<>gerhard weikum<>
9173<>5056_24<>cliff b. jones:david b. lomet:alexander b. romanovsky<>the atomic manifesto<>jucs<>gerhard weikum<>
9174<>5056_25<>cliff b. jones:david b. lomet:alexander b. romanovsky:alan fekete:marie-claude gaudel:henry f. korth:rogerio de lemos:j. eliot b. moss:ravi rajwar:krithi ramamritham:brian randell:luis rodrigues<>the atomic manifesto: a story in four quarks<>sigops<>gerhard weikum<>
9178<>5056_29<>jens graupmann:ralf schenkel<>the spheresearch engine for unified ranked retrieval of heterogeneous xml and web documents<>vldb<>gerhard weikum<>
32735<>5058_0<>peter g. harrison<>separable equilibrium state probabilities via time reversal in markovian process algebra<>tcs<>ting ting lee<>
18660<>5059_5<>chih-mao huang<>a practical aspect framework for enforcing fine-grained access control in web applications<>ispec<>kung chen<>
18661<>5061_0<>edwin hsing-mean sha:bin xiao<>universal routing in distributed networks<>icpads<>kevin f. chen<>
18662<>5061_1<>meilin liu:zili shao:chun xue:edwin hsing-mean sha<>multi-level loop fusion with minimal code size<>ISCApdcs<>kevin f. chen<>
18665<>5061_4<>meilin liu:edwin hsing-mean sha<>a feasible baseline architecture for building and evaluating distributed systems<>ISCApdcs<>kevin f. chen<>
18667<>5066_0<>nen-fu huang:whai-en chen<>fast and scalable multi-tcam classification engine for wide policy table lookup<>aina<>kwei-bor chen<>
32730<>5067_1<>ion muslea<>online query relaxation via bayesian causal structures discovery<>aaai<>thomas j. lee<>
32728<>5070_1<>andrei e. romashchenko<>resource bounded symmetry of information revisited<>tcs<>troy lee<>
24198<>5078_6<>raphael yuster<>on a hypergraph matching problem<>gc<>noga alon<>
24209<>5078_17<>konstantin makarychev:yury makarychev:assaf naor<>quadratic forms on graphs<>stoc<>noga alon<>
24241<>5078_49<>vojtech rodl<>sharp bounds for some multicolor ramsey numbers<>combinatorica<>noga alon<>
32219<>5081_29<>arindam chakrabarti:krishnendu chatterjee:orna kupferman:rupak majumdar<>verifying quantitative properties using bound functions<>charme<>thomas a. henzinger<>
32225<>5081_35<>luca de alfaro:marco faella:rupak majumdar:marielle stoelinga<>model checking discounted temporal properties<>tcs<>thomas a. henzinger<>
32250<>5081_60<>dirk beyer:ranjit jhala:rupak majumdar<>checking memory safety with blast<>fase<>thomas a. henzinger<>
32281<>5081_91<>rupak majumdar:jean-francois raskin<>a classification of symbolic transition systems<>tocl<>thomas a. henzinger<>
32283<>5081_93<>laurent doyen:jean-francois raskin<>automatic rectangular refinement of affine hybrid systems<>formats<>thomas a. henzinger<>
32287<>5081_97<>krishnendu chatterjee:luca de alfaro<>the complexity of stochastic rabin and streett games'<>icalp<>thomas a. henzinger<>
32293<>5081_103<>christoph m. kirsch:slobodan matic<>composable code generation for distributed giotto<>lctrts<>thomas a. henzinger<>
32300<>5081_110<>krishnendu chatterjee:ranjit jhala:rupak majumdar<>counterexample-guided planning<>uai<>thomas a. henzinger<>
32310<>5081_120<>ranjit jhala:rupak majumdar<>permissive interfaces<>sigsoft<>thomas a. henzinger<>
32312<>5081_122<>krishnendu chatterjee:marcin jurdzinski<>mean-payoff parity games<>lics<>thomas a. henzinger<>
32317<>5081_127<>dirk beyer:arindam chakrabarti<>web service interfaces<>www<>thomas a. henzinger<>
32333<>5081_143<>rupak majumdar:vinayak s. prabhu<>quantifying similarities between timed systems<>formats<>thomas a. henzinger<>
32348<>5081_158<>krishnendu chatterjee<>semiperfect-information games<>fsttcs<>thomas a. henzinger<>
32355<>5081_165<>christoph m. kirsch:marco a. a. sanvido<>a programmable microkernel for real-time systems<>vee<>thomas a. henzinger<>
32357<>5081_167<>slobodan matic<>trading end-to-end latency for composability<>rtss<>thomas a. henzinger<>
35180<>5082_2<>nan zhang 0004:jianer chen<>performance measurements for privacy preserving data mining<>pakdd<>wei zhao<>
35189<>5082_11<>shengquan wang:sangig rho:zhibin mai:riccardo bettati<>real-time component-based systems<>rtas<>wei zhao<>
35193<>5082_15<>nan zhang 0004<>distributed privacy preserving information sharing<>vldb<>wei zhao<>
35196<>5082_18<>rabi n. mahapatra<>an energy-efficient slack distribution technique for multimode distributed real-time embedded systems<>tpds<>wei zhao<>
35211<>5082_33<>chuan he:mi lu<>fpga-based high-order finite difference algorithm for 2d acoustic wave propagation problems<>ersa<>wei zhao<>
35238<>5082_60<>yang yang:vladimir stankovic:zixiang xiong<>on multiterminal source code design<>dcc<>wei zhao<>
35239<>5082_61<>shengquan wang:dong xuan<>analyzing and enhancing the resilience of structured peer-to-peer systems<>jpdc<>wei zhao<>
35249<>5082_71<>jianjia wu:jyh-charn liu<>on schedulability bounds of static priority schedulers<>rtas<>wei zhao<>
35251<>5082_73<>xinwen fu:ye zhu:bryan graham:riccardo bettati<>on flow marking attacks in wireless anonymous communication networks<>icdcs<>wei zhao<>
35253<>5082_75<>nan zhang 0004:shengquan wang<>a new scheme on privacy-preserving data classification<>kdd<>wei zhao<>
35254<>5082_76<>he chuan:mi lu<>time domain numerical simulation for transient waves on reconfigurable coprocessor platform<>fccm<>wei zhao<>
35280<>5084_0<>henning schulzrinne<>"enhancing service location protocol for efficiency, scalability and advanced discovery."<>jss<>weibin zhao<>
35285<>5084_5<>henning schulzrinne<>dotslash: handling web hotspots at dynamic content web sites<>infocom<>weibin zhao<>
35286<>5084_6<>henning schulzrinne<>dotslash - creating content distribution networks on demand<>dagstuhl<>weibin zhao<>
35276<>5085_0<>mostafa h. ammar:ellen w. zegura<>controlling the mobility of multiple data transport ferries in a delay-tolerant network<>infocom<>wenrui zhao<>
35279<>5085_3<>hyewon jun:mostafa h. ammar:ellen w. zegura:chungki lee<>trading latency for energy in wireless ad hoc networks using message ferrying<>percom<>wenrui zhao<>
35275<>5086_4<>barrett r. bryant:fei cao:kamal bhattacharya:rainer hauser<>transforming business process models: enabling programming at a higher level<>IEEEscc<>wei zhao<>
35261<>5087_2<>louise e. moser:p. m. melliar-smith<>a reservation-based coordination protocol for web services<>icws<>wenbing zhao<>
35269<>5087_10<>louise e. moser:p. m. melliar-smith<>deterministic scheduling for multithreaded replicas<>words<>wenbing zhao<>
35270<>5087_11<>louise e. moser:p. m. melliar-smith<>unification of transactions and replication in three-tier architectures based on corba<>tdsc<>wenbing zhao<>
3003<>5090_0<>wan-chun ma:sung-hsiang chao:yu-ting tseng:yung-yu chuang:bing-yu chen:ming ouhyoung<>level-of-detail representation of bidirectional texture functions for real-time rendering<>si3d<>chun-fa chang<>
2953<>5092_0<>carlos d. castillo<>an approach to vision-based person detection in robotic applications<>ibpria<>carolina chang<>
2966<>5093_8<>tae-hyung kim<>service-oriented design with aspects (soda)<>IEEEscc<>carl k. chang<>
2980<>5093_22<>jinchun xia:yujia ge<>an empirical performance study for validating a performance analysis approach: psim<>compsac<>carl k. chang<>
2986<>5097_2<>zhi-kai ding<>categorical data visualization and clustering using subjective factors<>dke<>chia-hui chang<>
2989<>5097_5<>chun-nan hsu:chia-hui chang:chang-huain hsieh:jiann-jyh lu<>reconfigurable web wrapper agents for biological information integration<>jasis<>chien-chi chang<>
38885<>5098_0<>jia yu:jun yang:laxmi n. bhuyan<>low power network processor design using clock gating<>dac<>yan luo<>
38884<>5099_3<>zhaohui luo<>transitivity in coercive subtyping<>iandc<>yong luo<>
38879<>5100_3<>chaichana mitrpant:a. j. han vinck:kefei chen<>some new characters on the wire-tap channel of type ii<>tit<>yuan luo<>
41138<>5103_0<>jesper jansson<>online and dynamic recognition of squarefree strings<>mfcs<>zeshan peng<>
41139<>5103_1<>nulo<>algorithms for local forest similarity<>isaac<>zeshan peng<>
41143<>5103_5<>h. f. ting<>an efficient reduction from constrained to unconstrained maximum agreement subtree<>wabi<>z. s. peng<>
9450<>5105_26<>markus krotzsch:pascal hitzler<>morphisms in context<>iccs<>guo-qiang zhang<>
41156<>5106_0<>qing li:ling feng:xuhui li:junqiang liu<>using object deputy model to prepare data for data warehousing<>tkde<>zhiyong peng<>
38891<>5113_0<>zheng liu:xuemin lin:wei wang:jeffrey xu yu<>similarity search with implicit object features<>waim<>yi luo<>
37882<>5119_0<>deepu rajan:liang-tien chia<>robust subspace analysis for detecting visual attention regions in images<>mm<>yiqun hu<>
37838<>5128_0<>hang li:yunbo cao:jun xu:shenjie li:dmitriy meyerzon<>a new approach to intranet search based on information extraction<>cikm<>yunhua hu<>
37839<>5128_1<>guomao xin:ruihua song:guoping hu:shuming shi:yunbo cao:hang li<>title extraction from bodies of html documents and its application to web page retrieval<>sigir<>yunhua hu<>
37841<>5128_3<>hang li:yunbo cao:dmitriy meyerzon:qinghua zheng<>automatic extraction of titles from general documents using machine learning<>jcdl<>yunhua hu<>
37842<>5128_4<>xia sun:qinghua zheng:haifeng dang:huixian bai<>an approach to acquire semantic relationships between words from web document<>icwl<>yunhua hu<>
37843<>5128_5<>qinghua zheng:huixian bai:xia sun:haifeng dang<>taxonomy building and machine learning based automatic classification for knowledge-oriented chinese questions<>icic<>yunhua hu<>
37832<>5129_2<>dalong jiang:shuicheng yan:lei zhang:hongjiang zhang:wen gao<>efficient 3d reconstruction for face recognition<>pr<>yuxiao hu<>
37844<>5131_0<>rongmei zhang:ali raza butt<>topology-aware peer-to-peer on-demand streaming<>networking<>y. charlie hu<>
37847<>5131_3<>shuo yang:ali raza butt:samuel p. midkiff<>trust but verify: monitoring remotely executing programs for progress and correctness<>ppopp<>y. charlie hu<>
37850<>5131_6<>ali raza butt:chris gniady<>the performance impact of kernel prefetching on buffer cache replacement algorithms<>sigmetrics<>y. charlie hu<>
37859<>5131_15<>rongmei zhang<>assisted peer-to-peer search with partial indexing<>infocom<>y. charlie hu<>
37861<>5131_17<>shuo yang:ali raza butt:samuel p. midkiff<>lightweight monitoring of the progress of remotely executing computations<>lcpc<>y. charlie hu<>
37879<>5132_1<>yang yang:tong jing:xianlong hong:qi zhu:xiaodong hu:guiying yan<>via-aware global routing for good vlsi manufacturability and high yield<>asap<>yu hu<>
37880<>5132_2<>tong jing:xianlong hong:zhe feng 0002:xiaodong hu:guiying yan<>an-oarsman: obstacle-avoiding routing tree construction with good length performance<>aspdac<>yu hu<>
10001<>5135_0<>igor zwir:eduardo a. groisman<>analysis of differentially-regulated genes within a regulatory network by gps genome navigation<>bioinformatics<>henry huang<>
10007<>5136_2<>cheng-kuan lin:lih-hsing hsu:sheng bau<>mutually independent hamiltonian paths in star networks<>networks<>hua-min huang<>
15756<>5146_0<>mary sue love<>it professionals as organizational citizens<>cacm<>jo ellen moore<>
22367<>5148_46<>nulo<>logical foundations for data integration<>sofsem<>maurizio lenzerini<>
23119<>5149_17<>fernanda lima kastensmidt:luca sterpone:luigi carro<>on the optimal design of triple modular redundancy logic for sram-based fpgas<>date<>matteo sonza reorda<>
23132<>5149_30<>paolo bernardi:leticia maria veiras bolzani:maurizio rebaudengo:fabian vargas:massimo violante<>on-line detection of control-flow errors in socs by means of an infrastructure ip core<>dsn<>matteo sonza reorda<>
23139<>5149_37<>alberto manzone:paolo bernardi:michelangelo grosso:maurizio rebaudengo:ernesto sanchez<>integrating bist techniques for on-line soc testing<>iolts<>matteo sonza reorda<>
23148<>5149_46<>luca sterpone:massimo violante<>efficient estimation of seu effects in sram-based fpgas<>iolts<>matteo sonza reorda<>
23172<>5149_70<>ernesto sanchez:massimiliano schillaci:giovanni squillero:luca sterpone:massimo violante<>new evolutionary techniques for test-program generation for complex microprocessor cores<>gecco<>matteo sonza reorda<>
23176<>5149_74<>paolo bernardi:leticia maria veiras bolzani:maurizio rebaudengo:massimo violante<>an integrated approach for increasing the soft-error detection capabilities in socs processors<>dft<>matteo sonza reorda<>
23187<>5149_85<>ernesto sanchez:giovanni squillero:massimo violante<>automatic generation of test sets for sbst of microprocessor ip cores<>sbcci<>matteo sonza reorda<>
11124<>5156_8<>tino weinkauf:holger theisel:kuangyu shi:hans-christian hege<>extracting higher order critical points and topological simplification of 3d vector fields<>visualization<>hans-peter seidel<>
21606<>5163_3<>samuel madden:joseph m. hellerstein:wei hong<>tinydb: an acquisitional query processing system for sensor networks<>tods<>michael j. franklin<>
21638<>5163_35<>alon y. halevy:david maier<>from databases to dataspaces: a new abstraction for information management<>sigmod<>michael j. franklin<>
21644<>5163_41<>shariq rizvi:shawn r. jeffery:sailesh krishnamurthy:nathan burkhart:anil edakkunni:linus liang<>events on the edge<>sigmod<>michael j. franklin<>
24106<>5167_0<>dustin e. schones:pavel sumazin<>similarity of position frequency matrices for transcription factor binding sites<>bioinformatics<>michael q. zhang<>
24112<>5167_6<>andrew d. smith:pavel sumazin:debopriya das<>mining chip-chip data for transcription factor and cofactor binding sites<>ismb<>michael q. zhang<>
24113<>5167_7<>nulo<>computational molecular biology of genome expression and regulation<>premi<>michael q. zhang<>
24117<>5167_11<>pavel sumazin:gengxin chen:naoya hata:andrew d. smith:theresa zhang<>dwe: discriminating word enumerator<>bioinformatics<>michael q. zhang<>
31847<>5170_7<>mohammad a. iranmanesh:cheryl e. praeger<>finite symmetric graphs with two-arc transitive quotients<>jct<>sanming zhou<>
31853<>5170_13<>nulo<>labelling cayley graphs on abelian groups<>siamdm<>sanming zhou<>
31865<>5172_5<>bogdan georgescu:xiang sean zhou:dorin comaniciu<>image based regression using boosting method<>iccv<>shaohua kevin zhou<>
31879<>5172_19<>jian li:rama chellappa<>appearance modeling under geometric context<>iccv<>shaohua kevin zhou<>
31881<>5172_21<>nulo<>a binary decision tree implementation of a boosted strong classifier<>amfg<>s. zhou<>
31894<>5178_1<>bruce r. childers:mary lou soffa<>planning for code buffer management in distributed virtual execution environments<>vee<>shukang zhou<>
3411<>5183_2<>jennifer c. hou<>a link-indexed statistical traffic prediction approach to improving ieee 802.11 psm<>adhoc<>chunyu hu<>
3412<>5183_3<>jennifer c. hou<>a reactive channel model for expediting wireless network simulation<>sigmetrics<>chunyu hu<>
24161<>5186_0<>jian-guang luo:li zhao:shi-qiang yang<>a peer-to-peer network for live media streaming using a push-pull approach<>mm<>meng zhang<>
24126<>5187_1<>yun zhang:william d. smart<>program simplification in genetic programming for object classification<>kes<>mengjie zhang<>
24129<>5187_4<>dong qian wang<>a new approach to multiple class pattern classification with random matrices<>jamds<>mengjie zhang<>
24153<>5187_28<>christopher fogelberg<>linear genetic programming for multi-class object classification<>ausai<>mengjie zhang<>
3436<>5192_0<>daniel a. jimenez:ulrich kremer<>toward an evaluation infrastructure for power and energy optimizations<>ipps<>chunling hu<>
3427<>5194_4<>yuan wang:yunde jia:matthew turk<>non-negative matrix factorization framework for face recognition<>ijprai<>changbo hu<>
6462<>5196_0<>nulo<>an efficient monte carlo approach to assessing statistical significance in genomic studies<>bioinformatics<>d. y. lin<>
4633<>5201_0<>v. sundramoorthy:pieter h. hartel:jerry den hartog:hans scholten<>functional principles of registry-based service discovery<>lcn<>c. tan<>
6445<>5204_5<>bin cui:kian-lee tan<>towards optimal utilization of main memory for moving object indexing<>dasfaa<>dan lin<>
6446<>5204_6<>christian s. jensen:beng chin ooi:simonas saltenis<>"efficient indexing of the historical, present, and future positions of moving objects."<>mdm<>dan lin<>
38898<>5205_2<>kun huang:wei hong<>symmetry-based photo-editing<>pr<>yi ma<>
38902<>5205_6<>rene vidal:shankar sastry<>generalized principal component analysis (gpca)<>pami<>yi ma<>
38903<>5205_7<>allen y. yang:shankar rao:andrew wagner<>segmentation of a piece-wise planar scene from perspective images<>cvpr<>yi ma<>
38906<>5205_10<>wei hong:john wright:kun huang<>a multi-scale hybrid linear model for lossy image representation<>iccv<>yi ma<>
38909<>5205_13<>allen y. yang:kun huang:shankar rao:wei hong<>symmetry-based 3-d reconstruction from perspective images<>cviu<>yi ma<>
4624<>5209_1<>xue yang:hock-hai teo:grace lin<>an empirical investigation of the auction buyer's choice to buy out or bid: cry of regret or laugh of satisfaction?<>icis<>chuan-hoo tan<>
4628<>5209_5<>yan li:hock-hai teo:alex siow<>a human capital perspective of organizational intention to adopt open source software<>icis<>chuan-hoo tan<>
22496<>5218_1<>wang yao:gokhan sahin:byrav ramamurthy<>analysis of multi-hop traffic grooming in wdm mesh networks<>broadnets<>mengke li<>
4612<>5219_1<>xiaosong hou<>a new electronic cash model<>itcc<>chik how tan<>
4615<>5219_4<>nulo<>key substitution attacks on provably secure short signature schemes<>ieicet<>chik how tan<>
4519<>5220_0<>bo yuan<>fiducial line based skew estimation<>pr<>chew lim tan<>
4526<>5220_7<>xing yu qi:li zhang<>motion deblurring for optical character recognition<>icdar<>chew lim tan<>
4531<>5220_12<>zheng-yu niu:dong-hong ji<>word sense disambiguation using label propagation based semi-supervised learning<>acl<>chew lim tan<>
4541<>5220_22<>weihua huang:wee kheng leow<>associating text and graphics for scientific chart understanding<>icdar<>chew lim tan<>
4562<>5220_43<>li zhang:zheng zhang 0003:tao xia<>3d geometric and optical modeling of warped document images from scanners<>cvpr<>chew lim tan<>
4570<>5220_51<>li zhang<>warped image restoration with applications to digital libraries<>icdar<>chew lim tan<>
4579<>5220_60<>lin lin<>text extraction from name cards with complex design<>icdar<>chew lim tan<>
4588<>5220_69<>bo yuan<>"skew estimation for scanned documents from ""noises""."<>icdar<>chew lim tan<>
4601<>5220_82<>xiaofeng yang:jian su<>improving pronoun resolution using statistics-based semantic compatibility information<>acl<>chew lim tan<>
11729<>5222_1<>sameep mehta:steve barr:tat-sang choy:srinivasan parthasarathy:raghu machiraju:john wilkins<>dynamic classification of defect structures in molecular dynamics simulation data<>sdm<>hui yang<>
34488<>5224_1<>kenneth chiu:tharaka devadithya:aleksander slominski<>a binary xml for scientific applications<>eScience<>wei lu<>
34489<>5227_0<>anthony lo:ignas g. niemegeers<>research issues in qos provisioning for personal networks<>iwqos<>weidong lu<>
11707<>5228_4<>ivana mijajlovic<>data refinement with low-level pointer operations<>aplas<>hongseok yang<>
11708<>5228_5<>oukseh lee:kwangkeun yi<>automatic verification of pointer programs using grammar-based shape analysis<>esop<>hongseok yang<>
11710<>5228_7<>oukseh lee:kwangkeun yi<>static insertion of safe and effective memory reuse commands into ml-like programs<>scp<>hongseok yang<>
11721<>5228_18<>lars birkedal:noah torp-smith<>semantics of separation-logic typing and higher-order frame rules<>lics<>hongseok yang<>
34480<>5230_1<>tianping chen<>robust stability of interval delayed neural networks<>isnn<>wenlian lu<>
34482<>5230_3<>tianping chen<>dynamical behaviors of cohen-grossberg neural networks with discontinuous activation functions<>nn<>wenlian lu<>
34483<>5230_4<>tianping chen:guanrong chen<>dynamical behaviors of a large class of general delayed neural networks<>neco<>wenlian lu<>
11744<>5231_1<>srinivasan parthasarathy:sameep mehta<>a generalized framework for mining spatio-temporal patterns in scientific data<>kdd<>hui yang<>
11745<>5232_0<>fan ye:yuan yuan:songwu lu:william a. arbaugh<>toward resilient security in wireless sensor networks<>mobihoc<>hao yang<>
11747<>5232_2<>jianguang lou:tieniu tan:weiming hu:stephen j. maybank<>3-d model-based vehicle tracking<>tip<>hao yang<>
11739<>5233_0<>jianjun pu:zhuopeng zhang:yang xu<>reusing legacy cobol code with uml collaboration diagrams via a wide spectrum language<>iri<>hongji yang<>
11741<>5235_0<>mohamed-slim alouini<>generalized switch-and-examine combining (gsec) over fading paths with unequal average snr<>tcom<>hong-chuan yang<>
11733<>5237_3<>minjie zhang<>ontology-based resource descriptions for distributed information sources<>icita<>hui yang<>
11737<>5240_0<>yang liu:wenping wang<>reconstructing b-spline curves from point clouds--a tangential flow approach using least squares minimization<>smi<>huaiping yang<>
22488<>5243_0<>baojun qiu:hongyan li:zijing hu:dongqing yang:lv-an tang:jianjun wang:shiwei tang<>general consistency management within the development of ontology-driven web information system<>asian<>meimei li<>
22490<>5243_2<>lv-an tang:hongyan li:zhiyong pan:dongqing yang:shiwei tang:ying ying<>an ontology based approach to construct behaviors in web information systems<>waim<>meimei li<>
22491<>5246_0<>li-sha huang:bo zhang<>approximation of walrasian equilibrium in single-minded auctions<>tcs<>minming li<>
22492<>5246_1<>frances f. yao<>an efficient algorithm for computing optimal discrete voltage schedules<>mfcs<>minming li<>
22493<>5246_2<>f. frances yao<>an efficient algorithm for computing optimal discrete voltage schedules<>siamcomp<>minming li<>
22478<>5248_1<>jinfeng hu:hongliang yu:haitao dong:weimin zheng<>"peerwindow: an efficient, heterogeneous, and autonomic node collection protocol."<>icpp<>ming li<>
22476<>5251_0<>xiang chen:shuming gao<>a web service for exchanging procedural cad models between heterogeneous cad systems<>cscwd<>min li<>
7348<>5253_4<>hongxin zhang:qing wang:hujun bao<>poisson shape interpolation<>sma<>dong xu<>
6471<>5259_0<>huaguang zhang:zhanshan wang<>exponential stability analysis of neural networks with multiple time delays<>isnn<>derong liu<>
6475<>5259_4<>sanqing hu:huaguang zhang<>gradient-based methods for simultaneous blind separation of mixed source signals<>iscas<>derong liu<>
6477<>5259_6<>huaguang zhang:ce ji<>robust stability analysis of a class of hopfield neural networks with multiple delays<>isnn<>derong liu<>
6487<>5263_0<>xuding zhu<>multilevel distance labelings for paths and cycles<>siamdm<>daphne der-fen liu<>
6518<>5265_2<>bernard chazelle:avner magen<>sublinear geometric algorithms<>siamcomp<>ding liu<>
6492<>5266_1<>peng ning:sencun zhu:sushil jajodia<>practical broadcast authentication in sensor networks<>mobiquitous<>donggang liu<>
6494<>5266_3<>peng ning:rongfang li<>establishing pairwise keys in distributed sensor networks<>tissec<>donggang liu<>
6497<>5266_6<>peng ning:wenliang du<>attack-resistant location estimation in sensor networks<>ipsn<>donggang liu<>
6498<>5266_7<>peng ning:wenliang du<>detecting malicious beacon nodes for secure location discovery in wireless sensor networks<>icdcs<>donggang liu<>
6499<>5266_8<>sencun zhu:chao yao:sanjeev setia:sushil jajodia<>efficient security mechanisms for overlay multicast-based content distribution<>acns<>donggang liu<>
6506<>5267_4<>sae hwang:jung-hwan oh:jeongkyu lee:yu cao:wallapak tavanapong:johnny wong:piet c. de groen<>automatic measurement of quality metrics for colonoscopy videos<>mm<>danyu liu<>
6038<>5271_0<>francois baccelli<>interaction of tcp flows as billiards<>ton<>dohy hong<>
12695<>5277_0<>jie yang:yue zhou<>a novel adaptive gaussian mixture model for background subtraction<>ibpria<>jian cheng<>
11662<>5281_0<>xiaoqin zhang<>a methodology for role-based modeling of open multi-agent software systems<>iceis<>haiping xu<>
11667<>5281_5<>zhiguo zhang:sol m. shatz<>a security based model for mobile agent software systems<>ijseke<>haiping xu<>
11674<>5283_2<>hock-hai teo<>consumers' privacy concerns toward using location-based services: an exploratory framework and research proposal<>ecis<>heng xu<>
28772<>5284_4<>avideh zakhor<>fast similarity search and clustering of video sequences on the world-wide-web<>tmm<>sen-ching s. cheung<>
28775<>5285_0<>hans van den berg:richard j. boucherie<>decomposing the queue length distribution of processor-sharing models into queue lengths of permanent customer queues<>pe<>sing-kong cheung<>
28767<>5287_1<>w. s. chan<>a bivariate threshold time series model for analyzing australian interest rates<>mcs<>s. h. cheung<>
28710<>5288_0<>dickson k. w. chiu:patrick c. k. hung:ho-fung leung<>facilitating e-negotiation processes with semantic web technologies<>hicss<>shing-chi cheung<>
28715<>5288_5<>dickson k. w. chiu:ho-fung leung<>a multi-agent infrastructure for mobile workforce management in a service oriented enterprise<>hicss<>shing-chi cheung<>
28722<>5288_12<>dickson k. w. chiu:danny kok:alex k. c. lee<>integrating legacy sites into web services with webxcript<>ijcis<>shing-chi cheung<>
28727<>5288_17<>chang xu<>inconsistency detection and resolution for context-aware middleware support<>sigsoft<>shing-chi cheung<>
28731<>5288_21<>wan-chun dou:guihai chen:jie wang:shijie cai<>a hybrid workflow paradigm for integrating self-managing domain-specific applications<>gcc<>shing-chi cheung<>
28742<>5288_32<>dickson k. w. chiu:patrick c. k. hung:sherina y. y. chiu:andriy k. k. chung<>developing e-negotiation support with a meta-modeling approach in a web services environment<>dss<>shing-chi cheung<>
28743<>5288_33<>yucong duan:xiaolan fu:yuqing gu<>a metamodel based model transformation approach<>sera<>shing-chi cheung<>
10327<>5290_0<>jae kyu lee<>an effective customization procedure with configurable standard models<>dss<>hyun jung lee<>
10321<>5291_1<>in koo kang:choong-hoon lee:hae-yeoun lee:jong-tae kim<>averaging attack resilient video fingerprinting<>iscas<>heung-kyu lee<>
10324<>5291_4<>hae-yeoun lee:junseok lee<>comparison of feature extraction techniques for watermark synchronization<>kes<>heung-kyu lee<>
10325<>5291_5<>hae-yeoun lee:choong-hoon lee:jeho nam<>feature-based image watermarking method using scale-invariant keypoints<>pcm<>heung-kyu lee<>
10326<>5291_6<>hae-yeoun lee:in koo kang:young-ho suh<>evaluation of feature extraction techniques for robust watermarking<>iwdw<>heung-kyu lee<>
10339<>5295_0<>haklin kimm:ilhyun lee<>a unified hardware/software approach for reducing context switching time with multiple tasks<>ISCApdcs<>haesun k. lee<>
10341<>5295_2<>narayan c. debnath:ilhyun lee:sergiu m. dascalu:john ho:mary yip<>design and implementation of a reusable software tool with application<>iri<>haesun k. lee<>
10335<>5296_2<>andrew y. ng<>spam deobfuscation using a hidden markov model<>ceas<>honglak lee<>
10336<>5297_0<>nulo<>seemless: distributed algorithm for topology control of survivable energy efficient multihop wireless sensor networks using adjustable transmission power<>snpd<>hwajung lee<>
15984<>5303_0<>jui-fang chang:shu-chuan chu:john f. roddick<>a parallel particle swarm optimization algorithm with communication strategies<>jise<>jeng-shyang pan<>
15990<>5303_6<>fan gu:zhe-ming lu<>multipurpose image watermarking in dct domain using subsampling<>iscas<>jeng-shyang pan<>
15976<>5305_0<>gerard j. chang<>isometric-path numbers of block graphs<>ipl<>jun-jie pan<>
15978<>5308_0<>rong pan:qiang yang:lei li<>competence driven case-base mining<>aaai<>jeffrey junfeng pan<>
15951<>5311_2<>giorgos stoilos:giorgos b. stamou:vassilis tzouvaras:ian horrocks<>the fuzzy description logic f-shin<>semweb<>jeff z. pan<>
15955<>5311_6<>ian horrocks<>owl-eu: adding customised datatypes into owl<>esws<>jeff z. pan<>
15961<>5311_12<>giorgos b. stamou:vassilis tzouvaras:ian horrocks<>f-swrl: a fuzzy extension of swrl<>icann<>jeff z. pan<>
15963<>5311_14<>nulo<>requirements for a semantic web rule language<>w3c<>jeff z. pan<>
15973<>5311_24<>giorgos stoilos:giorgos b. stamou:vassilis tzouvaras<>uncertainty and ruleml rulebases: a preliminary report<>ruleml<>jeff z. pan<>
15975<>5311_26<>giorgos b. stamou:vassilis tzouvaras:ian horrocks<>a fuzzy extension of swrl<>w3c<>jeff z. pan<>
16023<>5315_0<>jen-shiang chen<>mixed binary integer programming formulations for the reentrant job shop scheduling problem<>cor<>jason chao-hsien pan<>
16002<>5317_2<>lin cai:yiwei thomas hou:yi shi:sherman x. shen<>optimal base-station locations in two-tiered wireless sensor networks<>tmc<>jianping pan<>
16005<>5317_5<>lin cai:xuemin shen:jon w. mark<>peer collaboration in wireless ad hoc networks<>networking<>jianping pan<>
16009<>5317_9<>lin cai:xuemin shen:jon w. mark<>performance analysis of tcp-friendly aimd algorithms for multimedia applications<>tmm<>jianping pan<>
16015<>5318_5<>arnab bhattacharya:vebjorn ljosa:mark r. verardo:hyung-jeong yang:christos faloutsos:ambuj k. singh<>vivo: visual vocabulary construction for mining biomedical images<>icdm<>jia-yu pan<>
10352<>5323_0<>yunmook nah:joonwoo lee:seungyong park:sangwoo kim:moon-hae kim:ki-joon han<>tmo-structured distributed location information system prototype<>isorc<>ho lee<>
10354<>5323_2<>yunmook nah:joonwoo lee:woon joo lee:moon-hae kim:ki-joon han<>distributed scalable location data management system based on the galis architecture<>words<>ho lee<>
25628<>5325_0<>peter hawkins:vitaly lagoon<>solving set constraint satisfaction problems using robdds<>jair<>peter j. stuckey<>
15670<>5326_0<>ovidiu daescu:simeon c. ntafos:james d. palmer:chee-keng yap<>-link shortest paths in weighted subdivisions<>wads<>joseph s. b. mitchell<>
15687<>5326_17<>esther m. arkin:michael a. bender:erik d. demaine:sandor p. fekete:saurabh sethia<>optimal covering tours with turn costs<>siamcomp<>joseph s. b. mitchell<>
15727<>5326_57<>paz carmi:matthew j. katz<>the minimum-area spanning tree problem<>wads<>joseph s. b. mitchell<>
15731<>5326_61<>matthew j. katz:yuval nir<>orthogonal segment stabbing<>comgeo<>joseph s. b. mitchell<>
15732<>5326_62<>boaz ben-moshe:matthew j. katz<>a constant-factor approximation algorithm for optimal terrain guarding<>soda<>joseph s. b. mitchell<>
15595<>5327_10<>michael backes:anupam datta:ante derek:mathieu turuani<>compositional analysis of contract signing protocols<>csfw<>john c. mitchell<>
15604<>5327_19<>ninghui li:william h. winsborough<>beyond proof-of-compliance: security analysis in trust management<>jacm<>john c. mitchell<>
15609<>5327_24<>rohit chadha:andre scedrov:vitaly shmatikov<>"contract signing, optimism, and advantage."<>jlp<>john c. mitchell<>
15618<>5327_33<>anupam datta:ante derek:dusko pavlovic<>a derivation system and compositional logic for security protocols<>jcs<>john c. mitchell<>
15619<>5327_34<>anupam datta:ralf kusters:ajith ramanathan<>on the relationships between notions of simulation-based security<>tcc<>john c. mitchell<>
15637<>5327_52<>anupam datta:ante derek:vitaly shmatikov:mathieu turuani<>probabilistic polynomial-time semantics for a protocol security logic<>icalp<>john c. mitchell<>
15654<>5327_69<>changhua he<>security analysis and improvements for ieee 802.11i<>ndss<>john c. mitchell<>
2502<>5328_6<>nulo<>leonardo's laptop: human needs and the new computing technologies<>cikm<>ben shneiderman<>
2505<>5328_9<>jinwook seo<>a rank-by-feature framework for interactive exploration of multidimensional data<>ivs<>ben shneiderman<>
2509<>5328_13<>nulo<>managing design processes for successful user interfaces<>usab<>ben shneiderman<>
2510<>5328_14<>aleks aris:catherine plaisant:galit shmueli:wolfgang jank<>representing unevenly-spaced time series data for visualization and interactive exploration<>interact<>ben shneiderman<>
2512<>5328_16<>jinwook seo<>a knowledge integration framework for information visualization<>birthday<>ben shneiderman<>
2513<>5328_17<>haixia zhao:catherine plaisant<>i hear the pattern: interactive sonification of geographical data patterns<>chi<>ben shneiderman<>
2536<>5328_40<>haixia zhao<>colour-coded pixel-based highly interactive web mapping for georeferenced data exploration<>gis<>ben shneiderman<>
2543<>5328_47<>maria m. klawe<>crisis and opportunity in computer science<>cacm<>ben shneiderman<>
15748<>5332_0<>peter murray-rust:henry s. rzepa<>communication and re-use of chemical information in bioscience<>bmcbi<>john b. o. mitchell<>
15749<>5332_1<>peter murray-rust:henry s. rzepa<>chemistry in bioinformatics<>bmcbi<>john b. o. mitchell<>
15751<>5332_3<>gemma l. holliday:gail j. bartlett:daniel e. almonacid:noel m. o'boyle:peter murray-rust:janet m. thornton<>macie: a database of enzyme reaction mechanisms<>bioinformatics<>john b. o. mitchell<>
37233<>5339_2<>leslie pack kaelbling<>hedged learning: regret-minimization with learning experts<>icml<>yu-han chang<>
5206<>5340_2<>lucian popa<>semantic adaptation of schema mappings when schemas evolve<>vldb<>cong yu<>
5225<>5342_1<>nulo<>the emergence of links between lexical acquisition and object categorization: a computational study<>connection<>chen yu<>
5227<>5342_3<>dana h. ballard:richard n. aslin<>the role of embodied intention in early lexical acquisition<>cogsci<>chen yu<>
5220<>5343_5<>carlo curino:yuanyuan jia:bruce lambert:patricia m. west<>mining officially unrecognized side effects of drugs by combining web search and machine learning<>cikm<>clement t. yu<>
5222<>5343_7<>hongkun zhao:weiyi meng:zonghuan wu:vijay raghavan<>fully automatic wrapper generation for search engines<>www<>clement t. yu<>
20929<>5346_0<>feng xu:yu-jin zhang:wei-ying ma<>salient feature selection for visual concept learning<>pcm<>lei zhang<>
20939<>5346_10<>dalong jiang:yuxiao hu:shuicheng yan:hongjiang zhang:wen gao<>efficient 3d reconstruction for face recognition<>pr<>lei zhang<>
20940<>5346_11<>shuicheng yan:dong xu:qiang yang:xiaoou tang:hongjiang zhang<>discriminant analysis with tensor representation<>cvpr<>lei zhang<>
20941<>5346_12<>dong xu:shuicheng yan:mingjing li:wei-ying ma:zhengkai liu:hongjiang zhang<>parallel image matrix compression for face recognition<>mmm<>lei zhang<>
20946<>5346_17<>ying liu:tao qin:tie-yan liu:wei-ying ma<>similarity space projection for web image search and annotation<>mir<>lei zhang<>
20947<>5346_18<>xin-jing wang:wei-ying ma:xing li<>multi-graph enabled active learning for multimodal web image retrieval<>mir<>lei zhang<>
20948<>5346_19<>yanwei pang:zhengkai liu:nenghai yu:houqiang li<>neighborhood preserving projections (npp): a novel linear dimension reduction method<>icic<>lei zhang<>
20953<>5346_24<>dong xu:shuicheng yan:hongjiang zhang:zhengkai liu:heung-yeung shum<>concurrent subspaces analysis<>cvpr<>lei zhang<>
20956<>5346_27<>shuicheng yan:dong xu:benyu zhang:hongjiang zhang<>coupled kernel-based subspace learning<>cvpr<>lei zhang<>
20960<>5346_31<>xuezheng liu:mingjing li:hongjiang zhang:dingxing wang<>boosting image classification with lda-based feature combination for digital photograph management<>pr<>lei zhang<>
21001<>5352_0<>steven m. seitz<>parameter estimation for mrf stereo<>cvpr<>li zhang<>
20966<>5353_1<>john y. sayah<>on-demand business collaboration enablement with web services<>dss<>liang-jie zhang<>
20981<>5354_0<>beichuan zhang:dan pei:daniel massey<>timer interaction in route flap damping<>icdcs<>lixia zhang<>
26411<>5357_16<>kenneth l. mcmillan:doron peled<>deciding global partial-order properties<>fmsd<>rajeev alur<>
26424<>5357_29<>kousha etessami:mihalis yannakakis<>realizability and verification of msc graphs<>tcs<>rajeev alur<>
26434<>5357_39<>viraj kumar:p. madhusudan:mahesh viswanathan<>congruences for visibly pushdown languages<>icalp<>rajeev alur<>
26436<>5357_41<>p. madhusudan:wonhong nam<>symbolic compositional verification by learning assumptions<>cav<>rajeev alur<>
26438<>5357_43<>hakan yazarel:antoine girard:george j. pappas<>quantifying the gap between embedded control models and time-triggered implementations<>rtss<>rajeev alur<>
26440<>5357_45<>michael benedikt:kousha etessami:patrice godefroid:thomas w. reps:mihalis yannakakis<>analysis of recursive state machines<>toplas<>rajeev alur<>
26461<>5357_66<>pavol cerny:p. madhusudan:wonhong nam<>synthesis of interface specifications for java classes<>popl<>rajeev alur<>
26470<>5357_75<>p. madhusudan:wonhong nam<>symbolic computational techniques for solving games<>sttt<>rajeev alur<>
26477<>5357_82<>salvatore la torre:p. madhusudan<>perturbed timed automata<>hybrid<>rajeev alur<>
26503<>5357_108<>arun chandrashekharapuram<>dispatch sequences for embedded control models<>rtas<>rajeev alur<>
26510<>5357_115<>sebastian burckhardt:milo m. k. martin<>verifying safety of a token coherence implementation by parametric compositional refinement<>vmcai<>rajeev alur<>
26515<>5357_120<>swarat chaudhuri:kousha etessami:p. madhusudan<>on-the-fly reachability and cycle detection for recursive state machines<>tacas<>rajeev alur<>
16343<>5358_3<>ben shneiderman<>a rank-by-feature framework for interactive exploration of multidimensional data<>ivs<>jinwook seo<>
24630<>5359_8<>shlomi dolev:limor lahiani:seth gilbert:tina nolte<>brief announcement: virtual stationary automata for mobile networks<>podc<>nancy a. lynch<>
24662<>5359_40<>gregory chockler:sayan mitra:joshua a. tauber<>proving atomicity: an assertional approach<>wdag<>nancy a. lynch<>
24705<>5359_83<>gregory chockler:murat demirbas:seth gilbert:calvin c. newport:tina nolte<>reconciling the theory and practice of (un)reliable wireless broadcast<>icdcsw<>nancy a. lynch<>
24724<>5359_102<>shlomi dolev:limor lahiani:tina nolte<>self-stabilizing mobile node location management and message routing<>sss<>nancy a. lynch<>
24729<>5359_107<>shlomi dolev:seth gilbert:alexander a. shvartsman:jennifer l. welch<>geoquorums: implementing atomic memory in mobile  networks<>dc<>nancy a. lynch<>
24764<>5359_142<>shlomi dolev:seth gilbert:limor lahiani:tina nolte<>timed virtual stationary automata for mobile networks<>opodis<>nancy a. lynch<>
15205<>5363_0<>fabrice valois:dominique barthel<>range adjustment for broadcast protocols with a realistic radio transceiver energy model in short-range wireless networks<>msn<>jialiang lu<>
15198<>5364_1<>jamie callan<>federated search of text-based digital libraries in hierarchical peer-to-peer networks<>ecir<>jie lu<>
15192<>5365_7<>chenggen shi:guangquan zhang:da ruan<>multi-follower linear bilevel programming: model and kuhn-tucker approach<>iadis<>jie lu<>
15195<>5365_10<>fengjie wu:guangquan zhang<>development and implementation on a fuzzy multiple objective decision support system<>kes<>jie lu<>
15183<>5366_2<>konstantinos n. plataniotis:anastasios n. venetsanopoulos:jie wang<>an efficient kernel discriminant analysis method<>pr<>juwei lu<>
15184<>5366_3<>jie wang:konstantinos n. plataniotis:anastasios n. venetsanopoulos<>face recognition - combine generic and specific solutions<>iciar<>juwei lu<>
15172<>5367_0<>tok wang ling:tian yu:changqing li:wei ni<>efficient processing of ordered xml twig pattern<>dexa<>jiaheng lu<>
15174<>5367_2<>ting chen:tok wang ling<>on boosting holism in xml twig pattern matching using structural indexing techniques<>sigmod<>jiaheng lu<>
15177<>5367_5<>tok wang ling:chee yong chan:ting chen<>from region encoding to extended dewey: on efficient processing of xml twig pattern matching<>vldb<>jiaheng lu<>
15178<>5367_6<>ting chen:tok wang ling<>tjfast: effective processing of xml twig pattern matching<>www<>jiaheng lu<>
15180<>5367_8<>changqing li:tok wang ling:tian yu<>on reducing redundancy and improving efficiency of xml labeling schemes<>cikm<>jiaheng lu<>
33056<>5371_1<>reid g. simmons<>point-based pomdp algorithms: improved analysis and implementation<>uai<>trey smith<>
13429<>5372_0<>maria a. nieto-santisteban:alexander s. szalay:james annis:aniruddha r. thakar:william o'mullane<>when database systems meet the grid<>cidr<>jim gray<>
13445<>5372_16<>nulo<>"a ""measure of transaction processing"" 20 years later."<>debu<>jim gray<>
13446<>5372_17<>david t. liu:maria a. nieto-santisteban:alexander s. szalay:david j. dewitt:gerd heber<>scientific data management in the coming decade<>sigmod<>jim gray<>
8456<>5373_0<>lixin gao:jia wang:jian qiu<>on understanding of transient interdomain routing failures<>icnp<>feng wang<>
8459<>5375_0<>m. min:y. li:d. du<>on the construction of stable virtual backbones in mobile ad-hoc networks<>ipccc<>f. wang<>
14140<>5376_0<>morgan mcguire:wojciech matusik:hanspeter pfister:fredo durand<>defocus video matting<>tog<>john f. hughes<>
14155<>5376_15<>takeo igarashi:tomer moscovich<>as-rigid-as-possible shape manipulation<>tog<>john f. hughes<>
14233<>5390_1<>chao-ling hsu:hong-ru lee<>continuous hmm and its enhancement for singing/humming query retrieval<>ismir<>jyh-shing roger jang<>
14242<>5390_10<>cheng-yuan lin:tzu-ying lin<>a corpus-based singing voice synthesis system for mandarin chinese<>mm<>jyh-shing roger jang<>
25552<>5393_0<>steve zdancewic<>downgrading policies and relaxed noninterference<>popl<>peng li<>
25553<>5393_1<>steve zdancewic<>practical information-flow control in web-based information systems<>csfw<>peng li<>
25549<>5394_0<>bharadwaj veeravalli:ashraf a. kassim<>design and implementation of parallel video encoding strategies using divisible load analysis<>tcsv<>ping li<>
25572<>5395_3<>haisang wu:binoy ravindran:e. douglas jensen<>time/utility function decomposition techniques for utility accrual scheduling algorithms in real-time distributed systems<>tc<>peng li<>
25583<>5396_0<>david bodoff<>testing algorithms is like testing students<>sigir<>pu li<>
25558<>5397_2<>frank liu:xin li:lawrence t. pileggi:sani r. nassif<>modeling interconnect variability using efficient parametric model order reduction<>date<>peng li<>
25560<>5398_0<>haijing wang:tianwen zhang<>novel likelihood estimation technique based on boosting detector<>icip<>peihua li<>
25561<>5398_1<>haijing wang<>probabilistic object tracking based on machine learning and importance sampling<>ibpria<>peihua li<>
25562<>5398_2<>haijing wang:tianwen zhang<>proposal of novel histogram features for face detection<>icapr<>peihua li<>
41044<>5399_0<>henrik skibbe:hans burkhardt<>image retrieval based on a multipurpose watermarking scheme<>kes<>zhe-ming lu<>
41045<>5399_1<>bin yan:sheng-he sun:jeng-shyang pan<>speech authentication by semi-fragile watermarking<>kes<>zhe-ming lu<>
41046<>5399_2<>hui pei:hans burkhardt<>a spatial/frequency hybrid vector quantizer based on a classification in the dct domain<>cis<>zhe-ming lu<>
41049<>5399_5<>bin yan:sheng-he sun<>watermarking combined with celp speech coding for authentication<>ieicet<>zhe-ming lu<>
41050<>5399_6<>dian-guo xu:sheng-he sun<>multipurpose image watermarking algorithm based on multistage vector quantization<>tip<>zhe-ming lu<>
15877<>5401_0<>jennifer ferreira:pippin barr<>the semiotics of user interface redesign<>auic<>james noble<>
15906<>5401_29<>brian foote:ralph e. johnson<>efficient multimethods in a single dispatch language<>ecoop<>james noble<>
15915<>5401_38<>rilla khaled:robert biddle<>an analysis of persuasive technology tool strategies<>iwips<>james noble<>
23079<>5404_18<>roy friedman:achour mostefaoui<>simple and efficient oracle-based consensus protocols for asynchronous byzantine systems<>tdsc<>michel raynal<>
23056<>5405_1<>philippe raipin parvedy:corentin travers<>decision optimal early-stopping k-set agreement in synchronous systems prone to send omission failures<>prdc<>michel raynal<>
23057<>5405_2<>ajoy kumar datta:maria gradinariu<>stabilizing mobile philosophers<>ipl<>michel raynal<>
23058<>5405_3<>philippe raipin parvedy:corentin travers<>early-stopping -set agreement in synchronous systems prone to any number of process crashes<>pact<>michel raynal<>
23084<>5410_1<>paul d. ezhilchelvan:jean-michel helary<>building responsive tmr-based servers in presence of timing constraints<>isorc<>michel raynal<>
41060<>5411_2<>lawrence hunter<>go molecular function terms are predictive of subcellular localization<>psb<>z. lu<>
23101<>5414_0<>matthieu roy:ciprian tutu<>a simple protocol offering both atomic consistent read operations and sequentially consistent read operations<>aina<>michel raynal<>
41400<>5417_4<>zhiwen yu:xingshe zhou:daqing zhang:artur lugmayr<>a ubiquitous personalized multimedia service model based on fsm<>itcc<>zhiyong yu<>
41391<>5423_0<>william sears:yong guan<>an adaptive reputation-based trust framework for peer-to-peer applications<>nca<>zhen yu<>
41393<>5423_2<>yong guan<>a dynamic en-route scheme for filtering false data injection in wireless sensor networks<>sensys<>zhen yu<>
41394<>5423_3<>yong guan<>a key pre-distribution scheme using deployment knowledge for wireless sensor networks<>ipsn<>zhen yu<>
26547<>5424_25<>george danezis:chris lesniewski-laas:m. frans kaashoek<>sybil-resistant dht routing<>esorics<>ross j. anderson<>
26519<>5426_0<>julien fauqueur:nick g. kingsbury<>semantic discriminant mapping for classification and browsing of remote sensing textures and objects<>icip<>ryan anderson<>
26520<>5426_1<>nick g. kingsbury:julien fauqueur<>determining multiscale image feature angles from complex wavelet phases<>iciar<>ryan anderson<>
26521<>5426_2<>nick g. kingsbury:julien fauqueur<>coarse-level object recognition using interlevel products of complex wavelets<>icip<>ryan anderson<>
37210<>5431_9<>ming-hong hong:yi-wei ting<>web-based energy-efficient cache invalidation in wireless mobile environment<>aina<>yeim-kuan chang<>
8466<>5435_0<>tongqing qiu:yuequan chen:guihai chen<>redundancy schemes for high availability in dhts<>ispa<>fan wu<>
19514<>5438_0<>ramachandran vaidyanathan:jerry l. trahan<>configuring the circuit switched tree for multiple width communications<>ipps<>krishnendu roy<>
10910<>5445_0<>cheong hee park<>fingerprint classification using fast fourier transform and nonlinear discriminant analysis<>pr<>haesun park<>
5185<>5446_3<>rowena chau:kate a. smith<>a neural network model for hierarchical multilingual text categorization<>isnn<>chung-hsing yeh<>
5186<>5446_4<>rowena chau<>intelligent techniques for global e-business web portal development<>eee<>chung-hsing yeh<>
5194<>5446_12<>hsin-hsi lai:yang-cheng lin<>form design of product image using grey relational analysis and neural network models<>cor<>chung-hsing yeh<>
34659<>5450_1<>charles j. colbourn:yinong chen<>progressive ranking and composition of web services using covering arrays<>words<>wei-tek tsai<>
34661<>5450_3<>hai huang:raymond a. paul<>proof slicing with application to model checking web services<>isorc<>wei-tek tsai<>
34682<>5450_24<>yinong chen:raymond a. paul:hai huang:xinyu zhou:xiao wei<>"adaptive testing, oracle generation, and test case ranking for web services."<>compsac<>wei-tek tsai<>
34685<>5450_27<>yinong chen:raymond a. paul<>specification-based verification and validation of web services and service-oriented operating systems<>words<>wei-tek tsai<>
34686<>5450_28<>hai huang:raymond a. paul:yinong chen<>automated model checking and testing for composite web services<>isorc<>wei-tek tsai<>
34687<>5450_29<>lian yu:feng zhu:raymond a. paul<>rapid embedded system testing using verification patterns<>software<>wei-tek tsai<>
34692<>5450_34<>hong mei:gang huang<>towards self-healing systems via dependable architecture and<>words<>wei-tek tsai<>
4064<>5451_25<>samuel z. guyer<>error checking with client-driven pointer analysis<>scp<>calvin lin<>
15439<>5456_13<>jamal bentahar:bernard moulin<>a tableau method for verifying dialogue game protocols for agent communication<>dalt<>john-jules ch. meyer<>
15447<>5456_21<>arjen hommersom:erik p. de vink<>toward reasoning about security protocols: a semantic approach<>entcs<>john-jules ch. meyer<>
15448<>5456_22<>nulo<>programming cognitive agents<>mates<>john-jules ch. meyer<>
15451<>5456_25<>huib aldewereld:javier vazquez-salceda:frank dignum<>norm compliance of protocols in electronic institutions<>atal<>john-jules ch. meyer<>
15464<>5456_38<>davide grossi:frank dignum<>contextual terminologies<>clima<>john-jules ch. meyer<>
15466<>5456_40<>birna van riemsdijk:mehdi dastani<>semantics of declarative goals in agent programming<>atal<>john-jules ch. meyer<>
15502<>5456_76<>fernando koch:frank dignum:iyad rahwan<>programming deliberative agents for mobile services: the 3apl-m platform<>promas<>john-jules ch. meyer<>
20916<>5461_5<>huan liu<>toward integrating feature selection algorithms for classification and clustering<>tkde<>lei yu<>
20920<>5463_0<>shouyang wang:kin keung lai<>adaptive smoothing neural networks in foreign exchange rate forecasting<>iccS<>lean yu<>
20921<>5463_1<>shouyang wang:kin keung lai<>a novel adaptive learning algorithm for stock market prediction<>isaac<>lean yu<>
20922<>5463_2<>shouyang wang:kin keung lai<>mining stock market tendency using ga-based support vector machines<>wine<>lean yu<>
15531<>5464_1<>christoph bregler:clothilde castiglia:jessica devincezo:roger luke dubois:kevin feeley:tom igoe:michael naimark:alexandru postelnicu:michael rabinovich:sally rosenthal:katie salen:jeremi sudol:bo wright<>squidball: an experiment in large-scale motion capture and game design<>intetain<>jonathan meyer<>
4131<>5467_0<>hua-min huang:lih-hsing hsu:sheng bau<>mutually independent hamiltonian paths in star networks<>networks<>cheng-kuan lin<>
7531<>5468_0<>barbara catania:maria luisa damiani:paolo perlasca<>geo-rbac: a spatially aware rbac<>sacmat<>elisa bertino<>
4126<>5471_1<>hung-chih lee:jenq-jong lin:tay-woei shyu<>multistar decomposition of complete multigraphs<>arscom<>chiang lin<>
4092<>5473_3<>yaya wei:fengyuan ren:thiemo voigt<>fuzzy control for guaranteeing absolute delays in web servers<>qshine<>chuang lin<>
4097<>5473_8<>fengyuan ren:bo wei<>a robust active queue management algorithm in large delay networks<>comcom<>chuang lin<>
4101<>5473_12<>yang qu:yajuan li:zhiguang shan<>survivability analysis of grid resource management system topology<>gcc<>chuang lin<>
4103<>5473_14<>ye hong:yang qu:zhiguang shan<>performance modeling of grid resource management and scheduling systems<>skg<>chuang lin<>
4105<>5473_16<>yajuan li:quanlin li:zhiguang shan<>performance modeling and analysis for resource scheduling in data grids<>npc<>chuang lin<>
4106<>5473_17<>yaya wei:zhiguang shan<>adaptive resource management for mobile multimedia communications in asymmetric wireless network<>qshine<>chuang lin<>
4107<>5473_18<>yaya wei:xiaowen chu:zhiguang shan:fengyuan ren<>class-based latency assurances for web servers<>hpcc<>chuang lin<>
4108<>5473_19<>zhiguang shan:ting liu:yang qu:fengyuan ren<>modeling and inference of extended interval temporal logic for nondeterministic intervals<>tsmc<>chuang lin<>
4114<>5473_25<>fengyuan ren:xunhe yin<>design a congestion controller based on sliding mode variable structure control<>comcom<>chuang lin<>
4119<>5473_30<>hao yin:feng qiu:xiaowen chu:geyong min<>a key embedded video codec for secure video multicast<>cms<>chuang lin<>
4075<>5474_0<>jen-feng chung:der-jenq liu<>multiband room effect simulator for 5.1-channel sound system<>iscas<>chin-teng lin<>
4079<>5474_4<>ken-li lin:chih-hsien yang:i-fang chung:chuen-der huang:yuh-shyong yang<>protein metal binding residue prediction based on neural networks<>ijns<>chin-teng lin<>
40920<>5475_1<>mingen lin:jinhui xu<>almost optimal solutions for bin coloring problems<>isaac<>zhiyong lin<>
40924<>5477_0<>tu minh phuong:russ b. altman<>choosing snps using feature selection<>csb<>zhen lin<>
40923<>5478_1<>tor aulin<>joint source-channel coding using combined tcq/cpm: iterative decoding<>tcom<>zihuai lin<>
8155<>5482_2<>shuang liu:clement t. yu:weiyi meng:ophir frieder:david grossman<>database selection in intranet mediators for natural language queries<>cikm<>fang liu<>
8149<>5483_0<>salvatore cristiano<>on splitting public keys for the public key infrastructure<>eee<>faye f. liu<>
8161<>5484_0<>dong hua:dechang chen<>feature matrix models for information extraction<>dmin<>fang liu<>
8165<>5484_4<>fengguang an:xiuzhen cheng:qing xia:liran ma<>segrid: a secure grid infrastructure for sensor networks<>msn<>fang liu<>
8166<>5484_5<>xiuzhen cheng:dong hua:dechang chen<>tpss: a time-based positioning scheme for sensor networks with short range beacons<>iccnmc<>fang liu<>
8157<>5485_0<>li li:wu chou<>an extensible three-tier xml dialogue system architecture for multimodal interaction and automated agent services<>imsa<>feng liu<>
8159<>5485_2<>wu chou:li li<>web service for communication service management<>seke<>feng liu<>
8160<>5485_3<>wu chou:li li<>web service enablement of communication services<>icws<>feng liu<>
8167<>5487_0<>nulo<>ehrhart polynomials of cyclic polytopes<>jct<>fu liu<>
32907<>5492_0<>sebastian zander:grenville j. armitage<>self-learning ip traffic classification based on statistical flow characteristics<>pam<>thuy nguyen<>
32908<>5493_0<>jaromir nemec:martin windisch<>event-feeded dimension solution<>dawak<>tho manh nguyen<>
32910<>5493_2<>a. min tjoa:josef schiefer<>towards the stream analysis model in grid-based zero-latency data stream warehouse<>wm<>tho manh nguyen<>
30828<>5501_0<>brigitte pientka:karl crary<>small proof witnesses for lf<>iclp<>susmit sarkar<>
16885<>5510_2<>xi zhang<>effective bandwidth-based qos provisioning for real-time audio/video streaming over mimo-ofdm wireless networks<>ipps<>jia tang<>
16905<>5512_1<>li-san wang<>improving genome rearrangement phylogeny using sequence-style parsimony<>bibe<>jijun tang<>
16880<>5515_4<>hang li:yunbo cao:zhaohui tang<>email data cleaning<>kdd<>jie tang<>
16875<>5516_2<>guoliang xue:christopher chandler:weiyi zhang<>interference-aware routing in multihop wireless networks using directional antennas<>infocom<>jian tang<>
32900<>5517_1<>francois irigoin<>efficient and effective array bound checking<>toplas<>thi viet nga nguyen<>
32895<>5518_0<>sinh hoa nguyen:hung son nguyen<>rough set approach to sunspot classification problem<>rsfdgrc<>trung thanh nguyen<>
21802<>5521_1<>andy c. bavier:larry l. peterson<>an overlay data plane for planetlab<>aict<>mark huang<>
21784<>5522_3<>quang vinh nguyen:tom hintz<>attributed graph visualization of collaborative workspaces<>IEEEcgiv<>mao lin huang<>
21785<>5522_4<>wu quan<>dynamic visualization of spatially referenced information<>isvc<>mao lin huang<>
21787<>5522_6<>xiaomei cao:yuequan chen:guihai chen<>hybrid authentication and key management scheme for wsans<>ispa<>maolin huang<>
21796<>5523_0<>takuya katayama<>steering model-driven development of enterprise information system through responsibilities<>wsmai<>ming-jen huang<>
21797<>5523_1<>takuya katayama<>steering model-driven evolution by responsibilities<>iwpse<>ming-jen huang<>
37771<>5527_4<>jiaming li:geoff james<>evolutionary optimisation of distributed energy resources<>ausai<>ying guo<>
37765<>5528_3<>geoff poulton:wen lu<>finding hidden hierarchy in reinforcement learning<>kes<>ying guo<>
37745<>5531_4<>cornelis hoede:gerard j. m. smit<>a multi-pattern scheduling algorithm<>ersa<>yuanqing guo<>
37738<>5532_0<>songbo tan:xueqi cheng:bin wang:hongbo xu:moustafa ghanem<>using dragpushing to refine centroid text classifiers<>sigir<>yike guo<>
37740<>5532_2<>moustafa ghanem:alexandros chortaras:anthony rowe:jon ratcliffe<>a grid infrastructure for mixed bioinformatics data and text mining<>aiccsa<>yike guo<>
1521<>5539_0<>venancio thiago m.:ricardo demarco:katia c. p. oliveira:ana carolina quirino simoes:sergio verjovski-almeida<>genomics and gene expression management tools for the  cdna microarray project<>wob<>aline maria da silva<>
1524<>5539_3<>ana carolina quirino simoes:sergio verjovski-almeida:eduardo m. reis<>sam method as an approach to select candidates for human prostate cancer markers<>wob<>aline maria da silva<>
1510<>5542_0<>anthony brabazon:tiago ferra de sousa:michael o'neill:robin matthews:ernesto costa<>agent-based modelling of product invention<>gecco<>arlindo silva<>
18815<>5545_0<>hyun-gon seo:won-do jung:jun-sung park:seung-hwan jo:chang-min shin:seung-min park:heung-nam kim<>performance of service location protocols in manet based on reactive routing protocols<>icn<>ki-hyung kim<>
18819<>5545_4<>won-do jung:jun-sung park:hyun-gon seo:seung-hwan jo:chang-min shin:seung-min park:heung-nam kim<>a resilient multipath routing protocol for wireless sensor networks<>icn<>ki-hyung kim<>
18822<>5545_7<>hyun-gon seo<>design of a service discovery architecture for mobility-supported wired and wireless networks<>icn<>ki-hyung kim<>
18803<>5550_0<>francois baccelli:danny de vleeschauwer<>"analysis of the competition between wired, dsl and wireless users in an access network."<>infocom<>ki baek kim<>
18800<>5551_1<>thanarat h. chalidabhongse:david harwood:larry s. davis<>real-time foreground-background segmentation using codebook model<>rti<>kyungnam kim<>
18801<>5551_2<>david harwood:larry s. davis<>background updating for visual surveillance<>isvc<>kyungnam kim<>
17988<>5554_3<>ming zhang<>feature selection with adjustable criteria<>rsfdgrc<>jingtao yao<>
17992<>5554_7<>nulo<>on web-based support systems<>iicai<>jingtao yao<>
17993<>5554_8<>joseph p. herbert<>a game-theoretic approach to competitive learning in self-organizing maps<>icnc<>jingtao yao<>
17995<>5554_10<>nulo<>information granulation and granular relationships<>grc<>jingtao yao<>
28971<>5555_0<>tarang vaish:santanu chattopadhyay<>flip-flop chaining architecture for power-efficient scan during test application<>ats<>shantanu gupta<>
28959<>5556_10<>georgios varsamopoulos<>optimal offline and online registration techniques for location management with overlapping registration areas<>tmc<>sandeep k. s. gupta<>
28969<>5556_20<>qinghui tang:naveen tummala:loren schwiebert<>tara: thermal-aware routing algorithm for implanted sensor networks<>dcoss<>sandeep k. s. gupta<>
29008<>5557_0<>sunil k. saini:brent w. spranklin:zhiyang yao<>geometric algorithms for computing cutter engagement functions in 2.5d milling operations<>cad<>satyandra k. gupta<>
29021<>5557_13<>mukul karnik:edward b. magrab<>geometric algorithms for containment analysis of rotational parts<>cad<>satyandra k. gupta<>
3505<>5560_0<>masato akagi<>toward a rule-based synthesis of emotional speech on linguistic descriptions of perception<>acii<>chun-fang huang<>
18005<>5562_0<>bert willems:shmuel oren:ilan adler<>cournot equilibrium in price-capped two-settlement electricity markets<>hicss<>jian yao<>
8522<>5564_2<>guilin chen:ozcan ozturk:mahmut t. kandemir<>an adaptive locality-conscious process scheduler for embedded systems<>rtas<>guangyu chen<>
8525<>5564_5<>mahmut t. kandemir:mary jane irwin<>exploiting frequent field values in java objects for reducing heap memory requirements<>vee<>guangyu chen<>
8526<>5564_6<>seung woo son:mahmut t. kandemir:alok n. choudhary<>exposing disk layout to compiler for reducing energy consumption of parallel disk based systems<>ppopp<>guangyu chen<>
8527<>5564_7<>mahmut t. kandemir<>verifiable annotations for embedded java environments<>cases<>guangyu chen<>
8528<>5564_8<>mahmut t. kandemir<>dataflow analysis for energy-efficient scratch-pad memory management<>islped<>guangyu chen<>
8530<>5564_10<>feihui li:mahmut t. kandemir<>compiler-directed voltage scaling on communication links for reducing power consumption<>iccad<>guilin chen<>
8533<>5564_13<>ismail kadayif:anand sivasubramaniam:mahmut t. kandemir:gokul b. kandiraju<>optimizing instruction tlb energy using software and hardware techniques<>todaes<>guangyu chen<>
8534<>5564_14<>seung woo son:mahmut t. kandemir<>disk layout optimization for reducing energy consumption<>ics<>guangyu chen<>
8536<>5564_16<>seung woo son:mahmut t. kandemir<>power-aware code scheduling for clusters of active disks<>islped<>guangyu chen<>
8537<>5564_17<>mahmut t. kandemir<>improving java virtual machine reliability for memory-constrained embedded systems<>dac<>guangyu chen<>
8538<>5564_18<>mahmut t. kandemir:ismail kadayif<>compiling for memory emergency<>lctrts<>guangyu chen<>
8542<>5564_22<>feihui li:mahmut t. kandemir:mustafa karakoy<>exploiting last idle periods of links for network power management<>emsoft<>guilin chen<>
8544<>5564_24<>feihui li:mahmut t. kandemir:mary jane irwin<>compiler-directed proactive power management for networks<>cases<>guangyu chen<>
8547<>5564_27<>guilin chen:ozcan ozturk:mahmut t. kandemir<>exploiting inter-processor data sharing for improving behavior of multi-processor socs<>isvlsi<>guangyu chen<>
8548<>5564_28<>mahmut t. kandemir:seung woo son<>an evaluation of code and data optimizations in the context of disk power reduction<>islped<>guangyu chen<>
8555<>5564_35<>mahmut t. kandemir:feihui li:guilin chen:ozcan ozturk<>studying storage-recomputation tradeoffs in memory-constrained embedded processing<>date<>guangyu chen<>
8583<>5565_21<>ronald j. gould:k. kawarabayashi:florian pfender:bing wei<>graph minors and linkages<>jgt<>guantao chen<>
8594<>5567_3<>bo xie:ling chen:chun chen<>emoears: an emotion recognition system for mandarin speech<>cis<>gencai chen<>
8595<>5567_4<>hong chen:ling chen<>effects of local-lag mechanism on task performance in a desktop cve system<>jcst<>gencai chen<>
8601<>5567_10<>ling chen<>a fuzzy dead reckoning algorithm for distributed interactive applications<>fskd<>gencai chen<>
8605<>5567_14<>bo xie:ling chen:chun chen<>statistical feature selection for mandarin speech emotion recognition<>icic<>gencai chen<>
8611<>5570_5<>david kotz<>policy-driven data dissemination for context-aware applications<>percom<>guanling chen<>
31756<>5574_9<>nulo<>segmentation induced by scale invariance<>cvpr<>stella x. yu<>
37987<>5579_0<>farzin mokhtarian<>towards robust head tracking by particles<>icip<>yonggang jin<>
31761<>5580_2<>kai yu:volker tresp:hans-peter kriegel<>a probabilistic clustering-projection model for discrete data<>pkdd<>shipeng yu<>
31763<>5580_4<>zhao xu:volker tresp:kai yu:hans-peter kriegel<>dirichlet enhanced relational learning<>icml<>shipeng yu<>
31766<>5580_7<>kai yu:volker tresp<>multi-label informed latent semantic indexing<>sigir<>shipeng yu<>
31768<>5580_9<>kai yu:volker tresp<>soft clustering on graphs<>nips<>shipeng yu<>
31773<>5580_14<>kai yu:volker tresp<>multi-output regularized projection<>cvpr<>shipeng yu<>
31774<>5580_15<>yi huang:kai yu:matthias schubert:volker tresp:hans-peter kriegel<>hierarchy-regularized latent semantic indexing<>icdm<>shipeng yu<>
37959<>5588_0<>tatsuya okabe:bernhard sendhoff<>theoretical comparisons of search dynamics of genetic algorithms and evolution strategies<>cec<>yaochu jin<>
37961<>5588_2<>aimin zhou:qingfu zhang:edward p. k. tsang:tatsuya okabe<>a model-based evolutionary algorithm for bi-objective optimization<>cec<>yaochu jin<>
37963<>5588_4<>vineet r. khare:xin yao:bernhard sendhoff:heiko wersing<>co-evolutionary modular neural networks for automatic problem decomposition<>cec<>yaochu jin<>
37964<>5588_5<>bernhard sendhoff:edgar korner<>evolutionary multi-objective optimization for simultaneous generation of signal-type and symbol-type representations<>emo<>yaochu jin<>
37966<>5588_7<>nulo<>a comprehensive survey of fitness approximation in evolutionary computation<>soco<>yaochu jin<>
37969<>5588_10<>sushil j. louis:khaled rasheed<>guest editorial<>soco<>yaochu jin<>
37974<>5588_15<>tatsuya okabe:bernhard sendhoff<>a new approach to dynamics analysis of genetic algorithms without selection<>cec<>yaochu jin<>
37975<>5588_16<>michael husken:bernhard sendhoff<>structure optimization of neural networks for evolutionary design optimization<>soco<>yaochu jin<>
37979<>5588_20<>jurgen branke<>evolutionary optimization in uncertain environments-a survey<>tec<>yaochu jin<>
3484<>5591_1<>srivaths ravi:anand raghunathan:niraj k. jha<>generation of distributed logic-memory architectures through high-level synthesis<>tcad<>chao huang<>
40097<>5594_1<>krishna raman:mark panahi:juan a. colmenares:raymond klefstad<>patterns and tools for achieving predictability and performance with real-time java<>rtcsa<>yue zhang<>
40101<>5594_5<>krishna raman:mark panahi:juan a. colmenares:raymond klefstad:trevor harmon<>"rtzen: highly predictable, real-time java middleware for distributed and embedded systems, ."<>middleware<>yue zhang<>
3503<>5604_0<>yuh-jzer joung:cheng yen:yi-jhan huang<>on personal data license design and negotiation<>compsac<>chung-tang huang<>
40107<>5606_0<>sumir chandra:manish parashar:jingmei yang:salim hariri<>investigating autonomic runtime management strategies for samr applications<>ijpp<>yeliang zhang<>
35417<>5624_1<>volker haarslev:nematollaah shiri<>a resolution based framework to explain reasoning in description logics<>dlog<>xi deng<>
20349<>5628_0<>barbara m. chapman:zhenying liu<>towards a more efficient implementation of openmp for clusters via translation to global arrays<>pc<>lei huang<>
18391<>5629_0<>xin chen:zheng fu:peng nan:yang zhong:stefano lonardi:tao jiang<>assignment of orthologous genes via genome rearrangement<>tcbb<>jie zheng<>
18392<>5629_1<>xin chen:zheng fu:peng nan:yang zhong:stefano lonardi:tao jiang<>computing the assignment of orthologous genes via genome rearrangement<>apbc<>jie zheng<>
20356<>5631_0<>cheng-kiang farn:kuo-lian yin<>on initial trust building for e-commerce: revisiting from the perspective of signal theory and trust transference<>ecis<>li-ting huang<>
20359<>5633_1<>stephanie weirich<>a design for type-directed programming in java<>entcs<>liang huang<>
18386<>5635_1<>nulo<>in regression testing selection when source code is not available<>kbse<>jiang zheng<>
18389<>5635_4<>brian robinson:laurie a. williams:karen smiley<>an initial study of a lightweight process for change identification and regression test selection when source code is not available<>issre<>jiang zheng<>
36977<>5637_1<>chunping li<>text classification by markov random walks with reward<>dmin<>xueyuan zhou<>
36983<>5638_4<>takehiro ito:takao nishizeki<>partitioning graphs of supply and demand<>iscas<>xiao zhou<>
36992<>5638_13<>takehiro ito:akira kato:takao nishizeki<>algorithms for finding distance-edge-colorings of graphs<>cocoon<>xiao zhou<>
36996<>5638_17<>takao nishizeki<>orthogonal drawings of series-parallel graphs with minimum bends<>isaac<>xiao zhou<>
37001<>5638_22<>takehiro ito:takao nishizeki<>partitioning trees of supply and demand<>ijfcs<>xiao zhou<>
37003<>5638_24<>yuki matsuo:takao nishizeki<>list total colorings of series-parallel graphs<>jda<>xiao zhou<>
36908<>5639_5<>shaohua kevin zhou:bogdan georgescu:dorin comaniciu<>image based regression using boosting method<>iccv<>xiang sean zhou<>
36911<>5639_8<>terrence chen:thomas s. huang:wotao yin<>a new coarse-to-fine framework for 3d brain mr image registration<>cvbia<>xiang sean zhou<>
36912<>5639_9<>dorin comaniciu:alok gupta<>an information fusion framework for robust shape tracking<>pami<>xiang sean zhou<>
36914<>5640_1<>tian xia:cheqing jin:aoying zhou<>filtering duplicate items over distributed data streams<>waim<>xiaofang zhou<>
36930<>5640_17<>heng tao shen:beng chin ooi<>towards effective indexing for very large video sequence database<>sigmod<>xiaofang zhou<>
36934<>5640_21<>sai sun:heng tao shen<>semantic caching for multiresolution spatial query processing in mobile environments<>ssd<>xiaofang zhou<>
36936<>5640_23<>zi huang<>high dimensional indexing for protein structure matching using bowties<>apbc<>xiaofang zhou<>
36937<>5640_24<>sai sun<>semantic caching for web-based spatial applications<>apweb<>xiaofang zhou<>
36938<>5640_25<>jiyuan an:yi-ping phoebe chen:qinying xu<>a new indexing method for high dimensional dataset<>dasfaa<>xiaofang zhou<>
36948<>5640_35<>guandong xu:yanchun zhang<>using probabilistic latent semantic analysis for web page grouping<>ride<>xiaofang zhou<>
36952<>5640_39<>heng tao shen:bin cui<>indexing text and visual features for www images<>apweb<>xiaofang zhou<>
36953<>5640_40<>guandong xu:yanchun zhang<>a web recommendation technique based on probabilistic latent semantic analysis<>wise<>xiaofang zhou<>
36956<>5640_43<>guandong xu:yanchun zhang<>towards user profiling for web recommendation<>ausai<>xiaofang zhou<>
36957<>5640_44<>kai xu<>multiresolution query optimization in an online environment<>apweb<>xiaofang zhou<>
36961<>5640_48<>yijun li:jesse s. jin<>"matching commercial clips from tv streams using a unique, robust and compact signature."<>dicta<>xiaofang zhou<>
36968<>5640_55<>yanchun zhang:guandong xu<>a latent usage approach for clustering web transaction and building user profile<>adma<>xiaofang zhou<>
36974<>5640_61<>guandong xu:yanchun zhang:jiangang ma<>discovering user access pattern based on probabilistic latent factor model<>adc<>xiaofang zhou<>
37034<>5641_3<>jianbin wei:cheng-zhong xu<>robust processing rate allocation for proportional slowdown differentiation on internet servers<>tc<>xiaobo zhou<>
37040<>5641_9<>ravindra sudhindra:cheng-zhong xu:sithanshu shashidhara<>naproxi: a hash based collaborative proxy system for content adaptation<>icdcsw<>xiaobo zhou<>
37041<>5641_10<>yu cai:jianbin wei:cheng-zhong xu<>a robust application-level approach for responsiveness differentiation<>icws<>xiaobo zhou<>
37020<>5643_1<>xifeng yan:jiawei han<>mining closed relational graphs with connectivity constraints<>kdd<>xianghong jasmine zhou<>
37023<>5643_4<>haiyan hu:xifeng yan:yu huang 0003:jiawei han<>mining coherent dense subgraphs across massive biological networks for functional discovery<>ismb<>xianghong jasmine zhou<>
37024<>5643_5<>xifeng yan:jiawei han<>mining closed relational graphs with connectivity constraints<>icde<>xianghong jasmine zhou<>
37027<>5644_1<>michael kleis:eng keong lua<>hierarchical peer-to-peer networks using lightweight superpeer topologies<>iscc<>xiaoming zhou<>
37028<>5644_2<>michael kleis:eng keong lua<>a case for lightweight superpeer topologies<>kivs<>xiaoming zhou<>
37030<>5644_4<>milena janic:novi ineke:cempaka wangi:piet van mieghem<>hopcount in application layer multicast schemes<>nca<>xiaoming zhou<>
8677<>5648_20<>alex ho:shrideep pallickara:marlon e. pierce:wenjun wu<>grids for the gig and real time simulations<>dsrt<>geoffrey fox<>
8684<>5648_27<>malcolm p. atkinson:david de roure:alistair n. dunlop:peter henderson:anthony j. g. hey:norman w. paton:steven newhouse:savas parastatidis:anne e. trefethen:paul watson:jim webber<>web service grids: an evolutionary approach<>concurrency<>geoffrey fox<>
36498<>5653_0<>aaron kotranza:john quarles:benjamin lok:b. danette allen<>a pipeline for rapidly incorporating real objects into a mixed environment<>ismar<>xiyong wang<>
36005<>5655_0<>william k. cheung:jiming liu<>decomposing large-scale pomdp via belief state analysis<>iat<>xin li<>
36022<>5660_0<>dong xu:jianzhuang liu:zhengkai liu:xiaoou tang<>insignificant shadow detection for video segmentation<>tcsv<>xuelong li<>
36023<>5660_1<>dacheng tao:weiming hu:stephen j. maybank:xindong wu<>supervised tensor learning<>icdm<>xuelong li<>
36028<>5661_1<>jeff a. bilmes:jonathan malkin:kelley kilanski:richard wright:katrin kirchhoff:amar subramanya:susumu harada:james a. landay:patricia dowden:howard chizeck<>the vocal joystick: a voice-based human-computer interface for individuals with motor impairments<>naacl<>xiao li<>
36014<>5662_0<>shi-kuo chang<>a personalized e-learning system based on user profile constructed using information fusion<>dms<>xin li<>
36016<>5662_2<>chieh-chih chang:shi-kuo chang<>face alive icons<>seke<>xin li<>
36020<>5664_0<>lei wang:ping xue:kap luk chan<>a novel framework for svm-based image retrieval on large databases<>mm<>xuchun li<>
36019<>5665_2<>philip s. yu:bing liu<>adding the temporal dimension to search - a case study in publication search<>webi<>xin li<>
19054<>5669_0<>donghyun kim:se-joong lee:hoi-jun yoo<>a reconfigurable crossbar switch with adaptive bandwidth control for networks-on-chip<>iscas<>kangmin lee<>
19055<>5669_1<>kwanho kim:se-joong lee:hoi-jun yoo<>an arbitration look-ahead scheme for reducing end-to-end latency in networks on chip<>iscas<>kangmin lee<>
35959<>5670_2<>jie wu<>a hybrid searching scheme in unstructured p2p networks<>icpp<>xiuqi li<>
35960<>5670_3<>jie wu<>cluster-based intelligent searching in unstructured peer-to-peer networks<>icdcsw<>xiuqi li<>
27444<>5672_22<>shivnath babu:kamesh munagala:jennifer widom<>adaptive caching for continuous queries<>icde<>rajeev motwani<>
27449<>5672_27<>tomas feder<>finding large cycles in hamiltonian graphs<>soda<>rajeev motwani<>
27460<>5672_38<>gagan aggarwal:tomas feder:rina panigrahy:an zhu<>algorithms for the database layout problem<>icdt<>rajeev motwani<>
27481<>5672_59<>gagan aggarwal:mayank bawa:prasanna ganesan:hector garcia-molina:krishnaram kenthapadi:utkarsh srivastava:dilys thomas:ying xu 0002<>two can keep a secret: a distributed architecture for secure database services<>cidr<>rajeev motwani<>
27485<>5672_63<>surajit chaudhuri:venkatesh ganti<>robust identification of fuzzy duplicates<>icde<>rajeev motwani<>
27486<>5672_64<>kamesh munagala:shivnath babu:jennifer widom<>the pipelined set cover problem<>icdt<>rajeev motwani<>
27495<>5672_73<>gagan aggarwal:tomas feder:krishnaram kenthapadi:rina panigrahy:dilys thomas:an zhu<>anonymizing tables<>icdt<>rajeev motwani<>
27502<>5672_80<>mihaela enachescu:ashish goel:ramesh govindan<>scale-free aggregation in sensor networks<>tcs<>rajeev motwani<>
19050<>5673_0<>hong va leong:jing zhou:antonio si<>an efficient algorithm for predictive continuous nearest neighbor query processing and result maintenance<>mdm<>ken c. k. lee<>
19053<>5675_0<>youngho lee:sejin oh:youngmin park:beom-chan lee:jeung-chul park:yoo oh:seokhee lee:han oh:jeha ryu:hong kim:yong-gu lee:jongwon kim:yo-sung ho:woontack woo<>responsive multimedia system for virtual storytelling<>pcm<>kwan-heng lee<>
19045<>5677_1<>nulo<>component-based online learning for face detection and verification<>cis<>kyoung-mi lee<>
19047<>5677_3<>nulo<>a new em algorithm for resource allocation network<>icapr<>kyoung-mi lee<>
36490<>5678_0<>yiqun lisa yin:hongbo yu<>finding collisions in the full sha-1<>crypto<>xiaoyun wang<>
36493<>5680_1<>liwei wang:xuerong zhang:jufu feng<>the equivalence of two-dimensional pca to line-based pca<>prl<>xiao wang<>
36494<>5680_2<>liwei wang:jufu feng<>intrapersonal subspace analysis with application to adaptive bayesian face recognition<>pr<>xiao wang<>
36480<>5682_0<>wenjun gu:kurt schosek:sriram chellappan:dong xuan<>sensor network configuration under physical attacks<>iccnmc<>xun wang<>
9912<>5683_0<>karsten ehrig:gabriele taentzer:juan de lara:doniel varro:szilvia varro-gyapay<>termination criteria for model transformation<>dagstuhl<>hartmut ehrig<>
9913<>5683_1<>karsten ehrig:juan de lara:gabriele taentzer:doniel varro:szilvia varro-gyapay<>termination criteria for model transformation<>fase<>hartmut ehrig<>
19043<>5684_0<>woon s. gan<>adaptive filtering using constrained subband updates<>iscas<>kong a. lee<>
19037<>5687_0<>lui sha<>a dependable online testing and upgrade architecture for real-time embedded systems<>rtcsa<>kihwal lee<>
19039<>5687_2<>lui sha<>process resurrection: a fast recovery mechanism for real-time embedded systems<>rtas<>kihwal lee<>
19040<>5687_3<>hui ding:lui sha<>dependency algebra: a theoretical framework for dependency management in real-time control systems<>ecbs<>kihwal lee<>
35964<>5690_0<>soon-heng tan:see-kiong ng<>protein interaction prediction using inferred domain interactions and biologically-significant negative dataset<>iccsa<>xiaoli li<>
35971<>5690_7<>bing liu<>learning from positive and unlabeled examples with different data distributions<>ecml<>xiaoli li<>
36004<>5691_2<>xiangdong he:senmiao yuan<>a new method of learning bayesian networks structures from incomplete data<>icann<>xiaolin li<>
35998<>5693_1<>w. bruce croft<>novelty detection based on sentence level patterns<>cikm<>xiaoyan li<>
35979<>5698_0<>ding-yi chen:zhao yang dong:xia chen<>effectiveness of document representation for classification<>dawak<>xue li<>
35982<>5698_3<>yi ding<>time weight collaborative filtering<>cikm<>xue li<>
35983<>5698_4<>xingzhi sun:maria e. orlowska<>finding temporal features of event-oriented patterns<>pakdd<>xue li<>
35985<>5698_6<>zheng liu:zhaoyang dong<>direct fingerprinting on multicasting compressed video<>mmm<>xue li<>
35991<>5698_12<>mohsin ali:zhao yang dong<>efficient spatial clustering algorithm using binary tree<>ideal<>xue li<>
17306<>5700_2<>shang jin xu:xin gui fang:ming yao xu<>on cubic s-arc transitive cayley graphs of finite simple groups<>ejc<>jie wang<>
17258<>5701_3<>jason t. l. wang:jianghui liu<>xml clustering and retrieval through principal component analysis<>ijait<>junhan wang<>
17267<>5701_12<>katherine g. herbert:shashikanth pusapati:william h. piel<>lineage path integration for phylogenetic resources<>ssdbm<>jason tsong-li wang<>
17332<>5705_1<>manuel m. oliveira:arie e. kaufman<>reconstructing manifold and non-manifold surfaces from point clouds<>visualization<>jianning wang<>
17328<>5706_4<>zhenyu (peter) gu:robert p. dick:hai zhou<>incremental exploration of the combined physical and behavioral design space<>dac<>jia wang<>
17329<>5706_5<>chuan lin:hai zhou<>clustering for processing rate optimization<>iccad<>jia wang<>
17312<>5707_5<>zhidian du:pradip k. srimani<>network cache model for wireless proxy caching<>mascots<>james zijun wang<>
17317<>5707_10<>vipul bhulawala<>design and implementation of a p2p cooperative proxy cache system<>webi<>james zijun wang<>
17318<>5707_11<>farha ali<>an efficient ontology comparison tool for semantic web applications<>webi<>james zijun wang<>
17321<>5707_14<>farha ali:rashmy appaneravanda<>a web service for efficient ontology comparison<>icws<>james zijun wang<>
37182<>5709_0<>nulo<>creating reusable webquest objects with webquest authoring engine<>icalt<>yuen-yan chan<>
16111<>5710_0<>biplab sikdar<>an efficient and scalable loss-recovery scheme for video multicast<>tmm<>jun peng<>
16109<>5712_0<>chang-su kim:c. c. jay kuo<>technologies for 3d mesh compression: a survey<>jvcir<>jingliang peng<>
37190<>5714_2<>ko-cheung hui:wan-chi siu<>new adaptive partial distortion search using clustered pixel matching error characteristic<>tip<>yui-lam chan<>
35882<>5716_7<>wen-zhan song:weizhao wang<>a unified energy-efficient topology for unicast and broadcast<>mobicom<>xiang-yang li<>
35883<>5716_8<>wen-zhan song:yu wang:ophir frieder<>localized algorithms for energy efficient topology in wireless ad hoc networks<>monet<>xiang-yang li<>
37197<>5718_1<>cheng-yuan ho:chen-hua shih:yaw-chung chen<>an aided congestion avoidance mechanism for tcp vegas<>iccnmc<>yi-cheng chan<>
37198<>5718_2<>cheng-yuan hoa:yaw-chung chen<>a tcp-friendly stateless aqm scheme for fair bandwidth allocation<>icas<>yi-cheng chan<>
35898<>5722_3<>yaping zhan:andrzej j. strojwas:lawrence t. pileggi:david newmark:mahesh sharma<>correlation-aware statistical timing analysis with non-gaussian delay distributions<>dac<>xin li<>
35901<>5722_6<>jiayong le:mustafa celik:lawrence t. pileggi<>defining statistical sensitivity for timing optimization of logic circuits with large-scale process and environmental variations<>iccad<>xin li<>
35903<>5722_8<>jiayong le:lawrence t. pileggi:andrzej j. strojwas<>projection-based performance modeling for inter/intra-die variations<>iccad<>xin li<>
35910<>5722_15<>jian wang:lawrence t. pileggi:tun-shih chen:wanju chiang<>performance-centering optimization for system-level analog design exploration<>iccad<>xin li<>
35911<>5722_16<>yang xu:kan-lin hsiung:ivan nausieda:stephen boyd:lawrence t. pileggi<>opera: optimization with ellipsoidal uncertainty for robust analog ic design<>dac<>xin li<>
35912<>5722_17<>peng li:frank liu:lawrence t. pileggi:sani r. nassif<>modeling interconnect variability using efficient parametric model order reduction<>date<>xin li<>
17339<>5723_1<>matthew kam:alastair iles:eric tse:jane chiu:daniel glaser:orna tarshish:john f. canny<>livenotes: a system for cooperative and augmented note-taking in lectures<>chi<>jingtao wang<>
28488<>5724_0<>manjunath v. joshi:rajkiran panuganti<>a learning-based method for image super-resolution from zoomed observations<>tsmc<>subhasis chaudhuri<>
28491<>5724_3<>udhav bhosle:sumantra dutta roy<>multispectral panoramic mosaicing<>prl<>subhasis chaudhuri<>
28508<>5724_20<>rajashekhar<>use of contourlets for image retrieval<>premi<>subhasis chaudhuri<>
28522<>5724_34<>vinay p. namboodiri<>shock filters based on implicit cluster separation<>cvpr<>subhasis chaudhuri<>
35921<>5725_0<>quan long:zhiming liu:jifeng he<>consistent code generation from uml models<>aswec<>xiaoshan li<>
35929<>5725_8<>zhiming liu:jifeng he<>consistency checking of uml requirements<>iceccs<>xiaoshan li<>
17347<>5726_4<>bin xia<>effect of channel-estimation error on qam systems with antenna diversity<>tcom<>jiangzhou wang<>
35916<>5728_1<>hong-jian lai<>on group chromatic number of graphs<>gc<>xiangwen li<>
35920<>5728_5<>hong-jian lai:hoifung poon:yongbin ou<>spanning trails connecting given edges<>gc<>xiangwen li<>
35940<>5730_2<>nulo<>demosaicing by successive approximation<>tip<>xin li<>
35953<>5730_15<>nulo<>improved wavelet decoding via set theoretic estimation<>tcsv<>xin li<>
17360<>5733_1<>lun li:steven h. low:john c. doyle<>cross-layer optimization in tcp/ip networks<>ton<>jiantao wang<>
17363<>5733_4<>david x. wei:steven h. low<>modelling and stability of fast tcp<>infocom<>jiantao wang<>
33260<>5734_5<>takahito aoto<>dependency pairs for simply typed term rewriting<>rta<>toshiyuki yamada<>
17366<>5736_1<>xin tong:john snyder:yanyun chen:baining guo:heung-yeung shum<>capturing and rendering geometry details for btf-mapped surfaces<>vc<>jiaping wang<>
17367<>5736_2<>xin tong:stephen lin:baining guo:heung-yeung shum<>modeling and rendering of quasi-homogeneous materials<>tog<>jiaping wang<>
28538<>5739_0<>jun ge:akhilesh tyagi<>control flow based obfuscation<>drm<>soma chaudhuri<>
17373<>5741_0<>hui kong:lei wang:eam khwang teoh:ronda venkateswarlu<>a framework of 2d fisher discriminant analysis: application to face recognition with small number of training samples<>cvpr<>jian-gang wang<>
17374<>5741_1<>hui kong:lei wang:eam khwang teoh:xuchun li:ronda venkateswarlu<>generalized 2d principal component analysis for face image representation and recognition<>nn<>jian-gang wang<>
17370<>5742_1<>juwei lu:konstantinos n. plataniotis:anastasios n. venetsanopoulos<>an efficient kernel discriminant analysis method<>pr<>jie wang<>
17371<>5742_2<>juwei lu:qian gu:konstantinos n. plataniotis<>a comparative study of skin-color models<>iciar<>jie wang<>
17372<>5742_3<>konstantinos n. plataniotis:anastasios n. venetsanopoulos<>selecting discriminant eigenfaces for face recognition<>prl<>jie wang<>
17382<>5745_7<>yuanqing li<>a network model for blind source extraction in various ill-conditioned cases<>nn<>jun wang<>
34569<>5749_0<>aki p. f. chan:daniel s. yeung:eric c. c. tsang<>multiple classifier system with feature grouping for intrusion detection: mutual information approach<>kes<>wing w. y. ng<>
34570<>5749_1<>aki p. f. chan:daniel s. yeung:eric c. c. tsang<>empirical study on fusion methods using ensemble of rbfnn for network intrusion detection<>icmlc<>wing w. y. ng<>
24092<>5750_0<>yan huang:jaime kim:meejeong lee:tatsuya suda:daisuke matsubara<>an end-to-end qos framework with on-demand bandwidth reconfiguration<>comcom<>mei yang<>
24081<>5752_3<>gary marchionini<>deciphering visual gist and its implications for video retrieval and interface design<>chi<>meng yang<>
24077<>5755_1<>j. ru:x. rong li:huimin chen:a. bashi<>predicting internet end-to-end delay: a multiple-model approach<>infocom<>ming yang<>
24057<>5756_0<>william wood:mark r. cutkosky<>design information retrieval: a thesauri-based approach for reuse of informal design information<>ewc<>maria c. yang<>
17387<>5757_1<>oded berman:k. p. sapna<>optimal management of cross-trained workers in services with negligible switching costs<>eor<>jiamin wang<>
24060<>5758_1<>zongming fei<>intra-session fairness in multicast communications<>telsys<>mengkun yang<>
24061<>5758_2<>zongming fei<>cooperative failure detection in overlay multicast<>networking<>mengkun yang<>
10376<>5766_0<>jonathan goldstine:detlef wotschke<>measuring nondeterminism in pushdown automata<>jcss<>hing leung<>
10385<>5766_9<>nulo<>descriptional complexity of nfa of different ambiguity<>ijfcs<>hing leung<>
20804<>5767_0<>stanimire tomov:julien langou:andrew canning:jack dongarra<>comparison of nonlinear conjugate-gradient methods for computing the electronic properties of nanostructure architectures<>iccS<>lin-wang wang<>
24024<>5768_2<>yan-quan feng<>automorphism groups of tetravalent cayley graphs on regular -groups<>dm<>ming yao xu<>
24030<>5768_8<>shao-fei du:jin ho kwak<>2-arc-transitive regular covers of complete graphs having the covering transformation group z<>jct<>ming yao xu<>
26863<>5769_16<>arjan durresi:mukundan sridharan:sriram chellappan:hitai ozbai:leonard barolli<>control theory optimization of mecn in satellite networks<>icdcsw<>raj jain<>
24036<>5770_0<>jun-ming xu:zheng-zhong du<>edge-fault-tolerant edge-bipancyclicity of hypercubes<>ipl<>min xu<>
24037<>5770_1<>jun-ming xu:xin-min hou<>fault diameter of cartesian product graphs<>ipl<>min xu<>
24038<>5770_2<>jun-ming xu:qiang zhu<>the super connectivity of shuffle-cubes<>ipl<>min xu<>
24039<>5770_3<>xin-min hou:jun-ming xu<>forwarding indices of folded -cubes<>dam<>min xu<>
26929<>5773_0<>sonajharia minz<>dynamic rdt model for data mining<>iicai<>rajni jain<>
26930<>5773_1<>sonajharia minz<>refining decision tree classifiers using rough set tools<>ijhis<>rajni jain<>
20805<>5775_0<>zhenfu cao:xiangxue li:haifeng qian<>certificateless threshold signature schemes<>cis<>lichen wang<>
20806<>5777_0<>scott d. stoller<>static analysis of atomicity for programs with non-blocking synchronization<>ppopp<>liqiang wang<>
24042<>5785_1<>robert jackson:david pycock:mounther salous:mark knowles:stephen a. harman<>event detection and period extraction using multi-scale symmetry and entropy<>sigpro<>ming xu<>
24050<>5787_1<>milo m. k. martin:daniel j. sorin:bradford m. beckmann:michael r. marty:alaa r. alameldeen:kevin e. moore:mark d. hill:david a. wood<>multifacet's general execution-driven multiprocessor simulator (gems) toolset<>sigarch<>min xu<>
24052<>5787_3<>rastislav bodik:mark d. hill<>a serializability violation detector for shared-memory server programs<>pldi<>min xu<>
20801<>5788_1<>yan zhang:jufu feng<>on the euclidean distance of images<>pami<>liwei wang<>
24048<>5789_1<>xiliang zhong:cheng-zhong xu:jianbin wei<>optimal time-variant resource allocation for internet servers with delay<>rtas<>minghua xu<>
10362<>5790_5<>sam tak-sum wong:horace ho-shing ip<>model-based analysis of chinese calligraphy images<>iv<>howard leung<>
10369<>5792_0<>siyue chen<>ergodic chaotic parameter modulation with application to digital image watermarking<>tip<>henry leung<>
10374<>5792_5<>simin yu:jinhu lu:guanrong chen<>n-scroll chaotic attractors from a general jerk circuit<>iscas<>henry leung<>
2604<>5794_3<>kevin mccarthy:james reilly:derry o'sullivan:lorraine mcginty:david c. wilson<>case studies in association rule mining for recommender systems<>icai<>barry smyth<>
2606<>5794_5<>maurice coyle<>explaining search results<>ijcai<>barry smyth<>
2608<>5794_7<>maurice coyle<>enhancing web search result lists using interaction histories<>ecir<>barry smyth<>
2612<>5794_11<>oisin boydell:cathal gurrin:alan f. smeaton<>manipulating the relevance models of existing search engines<>ecir<>barry smyth<>
2615<>5794_14<>peter briggs<>implicit feedback in collaborative web search<>icai<>barry smyth<>
2627<>5794_26<>kevin mccarthy:james reilly:lorraine mcginty<>generating diverse compound critiques<>air<>barry smyth<>
2631<>5794_30<>kevin mccarthy:lorraine mcginty:james reilly<>a live-user evaluation of incremental dynamic critiquing<>iccbr<>barry smyth<>
2640<>5794_39<>derry o'sullivan:david c. wilson<>understanding case based recommendation: a similarity knowledge perspective<>ijait<>barry smyth<>
2641<>5794_40<>oisin boydell:cathal gurrin:alan f. smeaton<>a study of selection noise in collaborative web search<>ijcai<>barry smyth<>
2645<>5794_44<>karen church:mark t. keane<>an evaluation of gisting in mobile search<>ecir<>barry smyth<>
2647<>5794_46<>james reilly:lorraine mcginty:kevin mccarthy<>critiquing with confidence<>iccbr<>barry smyth<>
2652<>5794_51<>john o'donovan<>trust no one: evaluating trust-based filtering for recommenders<>ijcai<>barry smyth<>
2655<>5794_54<>john o'donovan<>trust in recommender systems<>iui<>barry smyth<>
2657<>5794_56<>oisin boydell:cathal gurrin:alan f. smeaton<>evaluating the impact of selection noise in community-based web search<>sigir<>barry smyth<>
2658<>5794_57<>kevin mccarthy:james reilly:lorraine mcginty<>an analysis of critique diversity in case-based recommendation<>flairs<>barry smyth<>
2659<>5794_58<>john o'donovan<>eliciting trust values from recommendation errors<>flairs<>barry smyth<>
2662<>5794_61<>james reilly:kevin mccarthy:lorraine mcginty<>incremental critiquing<>kbs<>barry smyth<>
2664<>5794_63<>kevin mccarthy:lorraine mcginty:james reilly<>on the evaluation of dynamic critiquing: a large-scale user study<>aaai<>barry smyth<>
2668<>5794_67<>lorraine mcginty:denise shanley<>using recommendation summaries for retrieval in conversational recommenders<>icai<>barry smyth<>
2677<>5794_76<>evelyn balfe:oisin boydell:keith bradley:peter briggs:maurice coyle:jill freyne<>a live-user evaluation of collaborative web search<>ijcai<>barry smyth<>
2683<>5794_82<>james reilly:kevin mccarthy:lorraine mcginty<>explaining compound critiques<>air<>barry smyth<>
2684<>5794_83<>kevin mccarthy:james reilly:lorraine mcginty<>experiments in dynamic critiquing<>iui<>barry smyth<>
2695<>5794_94<>nulo<>adaptive information access and the quest for the personalization-privacy sweetspot<>iui<>barry smyth<>
2697<>5794_96<>evelyn balfe<>an analysis of query similarity in collaborative web search<>ecir<>barry smyth<>
20788<>5796_0<>tom j. kazmierski<>vhdl-ams modeling of an automotive vibration isolation seating system<>iastedCCS<>leran wang<>
20789<>5797_0<>xiao wang:jufu feng<>intrapersonal subspace analysis with application to adaptive bayesian face recognition<>pr<>liwei wang<>
20791<>5797_2<>xiao wang:xuerong zhang:jufu feng<>the equivalence of two-dimensional pca to line-based pca<>prl<>liwei wang<>
20778<>5804_2<>baogang xu<>decomposing toroidal graphs into circuits and edges<>dam<>lusheng wang<>
4000<>5806_1<>shujun li:dan zhang:guanrong chen<>chosen-plaintext cryptanalysis of a clipped-neural-network-based chaotic cipher<>isnn<>chengqing li<>
4002<>5806_3<>xinxiao li:shujun li:guanrong chen<>cryptanalysis of a multistage encryption system<>iscas<>chengqing li<>
36462<>5807_1<>dmitri loguinov:juan casas<>graph-theoretic analysis of structured peer-to-peer systems: routing distances and fault resilience<>ton<>xiaoming wang<>
36464<>5807_3<>derek leonard:zhongmei yao:dmitri loguinov<>on static and dynamic partitioning behavior of large-scale networks<>icnp<>xiaoming wang<>
4008<>5812_0<>jun wang<>new invariant of dna sequences<>jcisd<>chun li<>
36474<>5813_0<>shiping chen:sushil jajodia<>tracking anonymous peer-to-peer voip calls on the internet<>ccs<>xinyuan wang<>
4022<>5820_0<>jundong liu:martin d. fox<>segmentation of edge preserving gradient vector flow: an approach toward automatically initializing and splitting of snakes<>cvpr<>chunming li<>
4023<>5820_1<>jundong liu:martin d. fox<>segmentation of external force field for automatic initialization and splitting of snakes<>pr<>chunming li<>
4020<>5821_0<>kuo-hsiang cheng:chih-ming chen:jin-long chen<>cluster-based self-organizing neuro-fuzzy system with hybrid learning approach for function approximation<>icnc<>chunshien li<>
4009<>5825_0<>chiung-ying wang:ren-hung hwang:yuh-shyan chen<>global connectivity for mobile ipv6-based ad hoc networks<>aina<>cheng-ying li<>
36044<>5826_0<>nulo<>self-emergence of structures in gene expression programming<>aaai<>xin li<>
36045<>5828_0<>ophir frieder:xiaohua jia:yantai shu<>monet special issue on non-cooperative wireless networking and computing<>monet<>xiang-yang li<>
4012<>5829_1<>k. f. ng<>on best restricted range approximation in continuous complex-valued function spaces<>jat<>chong li<>
4013<>5829_2<>nulo<>strong uniqueness of the restricted chebyshev center with respect to an -set in a banach space<>jat<>chong li<>
40895<>5832_0<>wade trappe:yanyong zhang:badri nath<>robust statistical methods for securing wireless localization in sensor networks<>ipsn<>zang li<>
40891<>5833_0<>pin ren:yan gao:yan chen:benjamin watson<>idgraphs: intrusion detection and analysis using histographs<>vizsec<>zhichun li<>
21179<>5838_0<>manuel costa:jon crowcroft:miguel castro:antony i. t. rowstron:lintao zhang:paul barham<>vigilante: end-to-end containment of internet worms<>sosp<>lidong zhou<>
21180<>5838_1<>dahlia malkhi:florian oprea<>meets paxos: leader election and stability without eventual timely links<>wdag<>lidong zhou<>
21181<>5838_2<>fred b. schneider<>implementing trustworthy services using replicated state machines<>ieeesp<>lidong zhou<>
21182<>5838_3<>fred b. schneider:robbert van renesse<>apss: proactive secret sharing in asynchronous systems<>tissec<>lidong zhou<>
21183<>5838_4<>lintao zhang:frank mcsherry:nicole immorlica:manuel costa:steve chien<>a first look at peer-to-peer worms: threats and defenses<>iptps<>lidong zhou<>
21173<>5840_0<>erin shaw:chin-yew lin:eduard h. hovy<>classummary: introducing discussion summarization to online classrooms<>naacl<>liang zhou<>
21178<>5840_5<>eduard h. hovy<>"digesting virtual ""geek"" culture: the summarization of technical internet relay chats."<>acl<>liang zhou<>
21169<>5841_7<>kewen wang<>comparisons and computation of well-founded semantics for disjunctive logic programs<>tocl<>lizhu zhou<>
21147<>5844_5<>li ding:timothy w. finin:anupam joshi<>how the semantic web is being used: an analysis of foaf documents<>hicss<>lina zhou<>
21148<>5844_6<>yongmei shi<>error detection using linguistic features<>naacl<>lina zhou<>
21150<>5844_8<>james n. k. liu:honghua dai<>intelligent financial news digest system<>kes<>lina zhou<>
21153<>5844_11<>azene zenebe<>modeling and handling uncertainty in deception detection<>hicss<>lina zhou<>
21154<>5844_12<>amrish vyas<>on detecting deception in agent societies<>iat<>lina zhou<>
21156<>5844_14<>simon lutterbie<>deception across cultures: bottom-up and top-down approaches<>isi<>lina zhou<>
21159<>5844_17<>robert d. nolker<>social computing and weighting to identify member roles in online communities<>webi<>lina zhou<>
40880<>5848_0<>baochun li<>probabilistic power management for wireless ad hoc networks<>monet<>zongpeng li<>
40882<>5848_2<>baochun li<>on increasing end-to-end throughput in wireless ad hoc networks<>qshine<>zongpeng li<>
40885<>5848_5<>mea wang:baochun li<>a high-throughput overlay multicast infrastructure with network coding<>iwqos<>zongpeng li<>
40887<>5848_7<>baochun li:dan jiang:lap chi lau<>on achieving optimal throughput with network coding<>infocom<>zongpeng li<>
40888<>5848_8<>baochun li<>efficient and distributed computation of maximum multicast rates<>infocom<>zongpeng li<>
6198<>5849_0<>soo-yong shin:in-hee lee:byoung-tak zhang<>multiobjective evolutionary optimization of dna sequences for reliable dna computing<>tec<>dongmin kim<>
36037<>5854_0<>jason i. brown<>the strongly connected reliability of complete digraphs<>networks<>xiaohu li<>
6213<>5857_0<>jang-se lee:jong sou park:sung-do chi<>design of intelligent security management system using simulation-based analysis<>ausai<>dong seong kim<>
36034<>5858_1<>zan huang:hsinchun chen<>link prediction approach to collaborative filtering<>jcdl<>xin li<>
36036<>5860_0<>chengqing li:shujun li:guanrong chen<>cryptanalysis of a multistage encryption system<>iscas<>xinxiao li<>
36039<>5861_0<>tapan khopkar:paul resnick<>"self-selection, slipping, salvaging, slacking, and stoning: the impacts of negative feedback at ebay."<>sigecom<>xin li<>
36040<>5861_1<>f. maxwell harper:yan chen:joseph a. konstan<>an economic model of user rating in an online recommender system<>um<>xin li<>
36041<>5862_0<>wang chen:jin rong<>sensor localization in an obstructed environment<>dcoss<>xiao li<>
36031<>5863_0<>jifeng he:zhiming liu<>component-based software engineering<>ictac<>xiaoshan li<>
36030<>5866_0<>nulo<>average degrees of critical graphs<>arscom<>xuechao li<>
40379<>5867_0<>yi liu<>video object segmentation and tracking using psi-learning classification<>tcsv<>yuan f. zheng<>
40380<>5867_1<>jianyu dong:chao he:robert l. ewing<>avp: a highly efficient transport protocol for low bit rate multimedia communications<>mta<>yuan f. zheng<>
40383<>5867_4<>eric j. balster:robert l. ewing<>feature-based wavelet shrinkage algorithm for image denoising<>tip<>yuan f. zheng<>
40448<>5868_0<>berthe y. choueiry<>applying decomposition methods to crossword puzzle problems<>cp<>yaling zheng<>
40447<>5869_4<>george almasi:philip heidelberger:charles archer:xavier martorell:c. christopher erway:jose e. moreira:burkhard d. steinmacher-burow<>optimization of mpi collective communication on bluegene/l systems<>ics<>yili zheng<>
40400<>5871_12<>xintao wu:yongge wang<>statistical database modeling for privacy preserving database generation<>ismis<>yuliang zheng<>
40414<>5871_26<>xintao wu:chintan sanghvi:yongge wang<>privacy aware data generation for testing database applications<>ideas<>yuliang zheng<>
40430<>5871_42<>namje park:kiyoung moon:kyoil chung:dongho won<>a security acceleration using xml signcryption scheme in mobile grid web services<>icwe<>yuliang zheng<>
40453<>5873_1<>yi chen:susan b. davidson<>vitex: a streaming xpath processing system<>icde<>yifeng zheng<>
40458<>5873_6<>susan b. davidson:junhyong kim<>efficiently supporting structure queries on phylogenetic trees<>ssdbm<>yifeng zheng<>
40451<>5874_1<>carlos e. saavedra<>a bpsk demodulator circuit using an anti-parallel synchronization loop<>iscas<>you zheng<>
7803<>5877_0<>baoping zhang:yuxin chen:weiguo fan:marcos andrc goncalves:marco cristo:pavel calado<>intelligent fusion of structural and citation-based evidence for text classification<>sigir<>edward a. fox<>
7810<>5877_7<>elisabeth logan<>an asian digital libraries perspective<>ipm<>edward a. fox<>
7821<>5877_18<>seonho kim:uma murthy:kapil ahuja:sandi vasile<>effectiveness of implicit rating data on characterizing users in complex information systems<>ercimdl<>edward a. fox<>
7841<>5877_38<>yannis e. ioannidis:david maier:serge abiteboul:peter buneman:susan b. davidson:alon y. halevy:craig a. knoblock:fausto rabitti:hans-jorg schek:gerhard weikum<>digital library information-technology infrastructures<>jodl<>edward a. fox<>
7852<>5877_49<>baoping zhang:yuxin chen:weiguo fan:marcos andrc goncalves:marco cristo:pavel calado<>intelligent gp fusion from multiple sources for text classification<>cikm<>edward a. fox<>
7853<>5877_50<>ricardo da silva torres:alexandre x. falcao:baoping zhang:weiguo fan:marcos andrc goncalves:pavel calado<>a new framework to combine descriptors for content-based image retrieval<>cikm<>edward a. fox<>
16684<>5887_0<>tian he:chenyang lu:tarek f. abdelzaher<>a spatiotemporal communication protocol for wireless sensor networks<>tpds<>john a. stankovic<>
35560<>5889_5<>sheng chen<>m-estimator and d-optimality model construction using orthogonal forward regression<>tsmc<>xia hong<>
35561<>5889_6<>sheng chen:chris j. harris<>orthogonal forward selection for constructing the radial basis function network with tunable nodes<>icic<>xia hong<>
35566<>5889_11<>ning zong<>on improvement of classification accuracy for stochastic discrimination<>tsmc<>xia hong<>
20755<>5893_3<>james e. davis:ruigang yang<>brdf invariant stereo using light transport constancy<>iccv<>liang wang<>
4791<>5894_22<>xue wu:woei-jyh lee<>estmapper: efficiently aligning dna sequences to genomes<>ipps<>chau-wen tseng<>
28935<>5897_3<>roman slowinski:vincent mousseau<>multi-criteria ranking of a finite set of alternatives using ordinal regression and additive utility functions - a new uta-gms method<>dagstuhl<>salvatore greco<>
28937<>5897_5<>benedetto matarazzo:roman slowinski<>generalizing rough set theory through dominance-based rough set approach<>rsfdgrc<>salvatore greco<>
28938<>5897_6<>krzysztof dembczynski:roman slowinski<>second-order rough approximations in multi-criteria classification with imprecise evaluations and assignments<>rsfdgrc<>salvatore greco<>
28947<>5897_15<>szymon wilk:roman slowinski:wojtek michalowski<>supporting triage of children with abdominal pain in the emergency room<>eor<>salvatore greco<>
28180<>5905_2<>ioana manolescu:nicoleta preda<>sharing content in structured p2p networks<>bda<>serge abiteboul<>
28181<>5905_3<>zoe abrams:stefan haar:tova milo<>diagnosis of asynchronous discrete event systems: datalog to the rescue!<>pods<>serge abiteboul<>
28183<>5905_5<>bogdan cautis:amos fiat:haim kaplan:tova milo<>secure exchange of modifiable data and queries<>bda<>serge abiteboul<>
28184<>5905_6<>tova milo:omar benjelloun<>regular rewriting of active xml and unambiguity<>pods<>serge abiteboul<>
28185<>5905_7<>rakesh agrawal:philip a. bernstein:michael j. carey:stefano ceri:w. bruce croft:david j. dewitt:michael j. franklin:hector garcia-molina:dieter gawlick:jim gray:laura m. haas:alon y. halevy:joseph m. hellerstein:yannis e. ioannidis:martin l. kersten:michael j. pazzani:michael lesk:david maier:jeffrey f. naughton:hans-jorg schek:timos k. sellis:avi silberschatz:michael stonebraker:richard t. snodgrass:jeffrey d. ullman:gerhard weikum:jennifer widom:stanley b. zdonik<>the lowell database research self-assessment<>cacm<>serge abiteboul<>
28187<>5905_9<>tova milo:bernd amann:omar benjelloun:frederic dang ngoc<>exchanging intensional xml data<>tods<>serge abiteboul<>
28188<>5905_10<>antonella poggi<>xml data integration with identification<>dbpl<>serge abiteboul<>
28189<>5905_11<>antonella poggi<>xml data integration with identification<>sebd<>serge abiteboul<>
28193<>5912_2<>ioana manolescu:nicoleta preda<>constructing and querying peer-to-peer warehouses of xml resources<>icde<>serge abiteboul<>
32935<>5913_6<>andrew gilpin:vincent conitzer<>mixed-integer programming methods for finding nash equilibria<>aaai<>tuomas sandholm<>
32943<>5913_14<>vincent conitzer<>complexity of (iterated) dominance<>sigecom<>tuomas sandholm<>
32949<>5913_20<>felix brandt<>decentralized voting with unconditional privacy<>atal<>tuomas sandholm<>
32970<>5913_41<>makoto yokoo:vincent conitzer:naoki ohta:atsushi iwasaki<>coalitional games in open anonymous environments<>ijcai<>tuomas sandholm<>
32973<>5913_44<>vincent conitzer:paolo santi<>combinatorial auctions with wise dependent valuations<>aaai<>tuomas sandholm<>
32982<>5913_53<>makoto yokoo:vincent conitzer:naoki ohta:atsushi iwasaki<>coalitional games in open anonymous environments<>aaai<>tuomas sandholm<>
32985<>5913_56<>kate larson<>mechanism design and deliberative agents<>atal<>tuomas sandholm<>
32990<>5913_61<>anton likhodedov<>approximating revenue-maximizing combinatorial auctions<>aaai<>tuomas sandholm<>
32996<>5913_67<>andrew gilpin<>optimal rhode island hold'em poker<>aaai<>tuomas sandholm<>
32999<>5913_70<>vincent conitzer<>communication complexity of common voting rules<>sigecom<>tuomas sandholm<>
33003<>5913_74<>felix brandt<>efficient privacy-preserving protocols for multi-unit auctions<>fc<>tuomas sandholm<>
33007<>5913_78<>felix brandt:yoav shoham<>spiteful bidding in sealed-bid auctions<>dagstuhl<>tuomas sandholm<>
33008<>5913_79<>nulo<>automated mechanism design<>dagstuhl<>tuomas sandholm<>
33020<>5913_91<>felix brandt<>unconditional privacy in social choice<>tark<>tuomas sandholm<>
20040<>5916_5<>kurt stockinger:john shalf:e. wes bethel<>query-driven visualization of large data sets<>visualization<>kesheng wu<>
20029<>5917_33<>shyh-kwei chen:philip s. yu<>efficient processing of continual range queries for location-aware mobile services<>isf<>kun-lung wu<>
19985<>5918_8<>tongquan wei:ramesh karri:alex orailoglu<>fault tolerant quantum cellular array (qca) design using triple modular redundancy with shifted operands<>aspdac<>kaijie wu<>
19991<>5918_14<>bo yang:ramesh karri<>secure scan: a design-for-test architecture for crypto chips<>dac<>kaijie wu<>
20886<>5920_0<>jie yang:ningsong peng:jianguo ling<>weighted information entropy: a method for estimating the complex degree of infrared images' backgrounds<>iciar<>lei yang<>
20885<>5926_1<>raimund k. ege<>dynamic integration strategy for mediation framework<>seke<>li yang<>
20880<>5927_0<>d. vaidya:jianfeng peng:jerzy w. rozenblit<>a framework for sensor management in wireless and heterogeneous sensor network<>ecbs<>lizhi yang<>
20881<>5927_1<>jianfeng peng:faisal momen:jerzy w. rozenblit<>level-of-detail based modeling of object movement in tracking and surveillance system<>wsc<>lizhi yang<>
20889<>5930_1<>naphtali rishe<>transforming sem-odm semantic schemas to dtds<>ACMse<>li yang<>
17391<>5935_0<>min song<>a new algorithm to solve synchronous consensus for dependent failures<>pdcat<>jun wang<>
17392<>5935_1<>mohammad al-laho:min song<>mobility-pattern based localization update algorithms for mobile wireless sensor networks<>msn<>jun wang<>
17425<>5939_0<>yen-ping chen<>an automated hammerstein recurrent neural network for dynamic applications<>iastedCI<>jeen-shing wang<>
17422<>5942_0<>shuting xu:jun zhang:dianwei han<>data distortion for privacy protection in a terrorist analysis system<>isi<>jie wang<>
17421<>5943_0<>sridhar hannenhalli<>generalizations of markov model to characterize biological sequences<>bmcbi<>junwen wang<>
17417<>5948_1<>song wang:toshiro kubota:jeffrey mark siskind<>salient closed boundary extraction with ratio contour<>pami<>jun wang<>
21310<>5963_1<>ruo-wei hung<>"linear-time algorithms for the hamiltonian problems on distance-hereditary graphs."<>tcs<>maw-shang chang<>
21307<>5965_1<>ying kin yu:kin-hong wong<>recursive three-dimensional model reconstruction based on kalman filtering<>tsmc<>michael ming-yuen chang<>
4512<>5966_0<>nulo<>an incremental and practical approach to enable the component run-time evolution<>apsec<>chang-ai sun<>
4514<>5966_2<>jun zhou<>rearchjbs: a tool for automated software architecture recovery of javabeans-based applications<>aswec<>chang-ai sun<>
4495<>5970_3<>richard beare:volker hilsenstein:paul t. jackway<>mosaicing of microscope images<>dicta<>changming sun<>
4496<>5970_4<>nick seow:arcot sowmya<>multi-image 2d-page feature detection<>dicta<>changming sun<>
4502<>5970_10<>ben appleton<>multiple paths extraction in images using a constrained expanded trellis<>pami<>changming sun<>
4469<>5972_4<>kai lin:david chen:r. geoff dromey<>maintaining constraints in collaborative graphic systems: the cogse approach<>ecscw<>chengzheng sun<>
21220<>5974_2<>richard szeliski:simon winder<>multi-image matching using multi-scale oriented patches<>cvpr<>matthew brown<>
21221<>5974_3<>david g. lowe<>unsupervised 3d object recognition and reconstruction in unordered datasets<>3dim<>m. brown<>
21208<>5978_6<>charles j. pisula<>conformal deskewing of non-planar documents<>cvpr<>michael s. brown<>
21211<>5978_9<>mingxuan sun:ruigang yang:yun lin:george landon:w. brent seales<>geometric and photometric restoration of distorted documents<>iccv<>michael s. brown<>
19662<>5985_0<>anton chechetka<>a decentralized variable ordering method for distributed constraint optimization<>atal<>katia p. sycara<>
19671<>5985_9<>michael n. huhns:munindar p. singh:mark h. burstein:keith s. decker:edmund h. durfee:timothy w. finin:les gasser:hrishikesh j. goradia:nicholas r. jennings:kiran lakkaraju:hideyuki nakashima:h. van dyke parunak:jeffrey s. rosenschein:alicia ruvinsky:gita sukthankar:samarth swarup:milind tambe:thomas wagner:rosa laura zavala gutierrez<>research directions for service-oriented multiagent systems<>internet<>katia p. sycara<>
19678<>5985_16<>gita sukthankar<>a cost minimization approach to human behavior recognition<>atal<>katia p. sycara<>
19706<>5985_44<>young-woo seo<>exploiting multi-agent interactions for identifying the best-payoff information source<>iat<>katia p. sycara<>
19713<>5985_51<>mary koes:illah r. nourbakhsh<>heterogeneous multirobot coordination with spatial and temporal constraints<>aaai<>katia p. sycara<>
384<>5992_2<>johannes gehrke:mirek riedewald<>semantic approximation of data stream joins<>tkde<>abhinandan das<>
25387<>5993_1<>michel gamache:renaud grimard<>a shortest-path algorithm for solving the fleet management problem in underground mines<>eor<>paul cohen<>
380<>5995_0<>mohammed i. rafiq:martin j. o'connor<>computational method for temporal pattern discovery in biomedical genomic databases<>csb<>amar k. das<>
360<>6001_0<>zhuowei li<>m of n features vs. intrusion detection<>iccsa<>amitabha das<>
364<>6001_4<>zhuowei li:sabu emmanuel<>model redundancy vs. intrusion detection<>ispec<>amitabha das<>
369<>6001_9<>zhuowei li:jianying zhou<>model generalization and its implications on intrusion detection<>acns<>amitabha das<>
22272<>6004_2<>min-soo kim 0002:kyu-young whang:jae-gil lee<>n-gram/2l: a space and time efficient two-level n-gram inverted index structure<>vldb<>min-jae lee<>
22273<>6004_3<>kyu-young whang:jae-gil lee:min-soo kim 0002:wook-shin han<>odysseus: a high-performance ordbms tightly-coupled with ir features<>icde<>min-jae lee<>
22281<>6008_7<>shan li:donald a. adjeroh<>effective invariant features for shape-based image retrieval<>jasis<>moon-chuen lee<>
22202<>6013_17<>zhou feng:wynne hsu<>efficient pattern discovery for semistructured data<>ictai<>mong-li lee<>
22206<>6013_21<>jin chen:wynne hsu:see-kiong ng<>discovering reliable protein interactions from high-throughput experimental data using network topology<>artmed<>mong-li lee<>
22207<>6013_22<>junmei wang:wynne hsu<>mining generalized spatio-temporal patterns<>dasfaa<>mong-li lee<>
22209<>6013_24<>hanyu li:wynne hsu<>a histogram-based selectivity estimator for skewed xml data<>dexa<>mong-li lee<>
22216<>6013_31<>p. m. d. s. pallawala:wynne hsu:say song goh<>automated microaneurysm segmentation and detection using generalized eigenvectors<>wacv<>mong-li lee<>
22231<>6013_46<>hanyu li:wynne hsu<>a path-based labeling scheme for efficient structural join<>xsym<>mong-li lee<>
22237<>6013_52<>ji zhang:wynne hsu<>clustering in dynamic spatial databases<>jiis<>mong-li lee<>
22240<>6013_55<>xia yang:tok wang ling:gillian dobbie<>a semantic approach to query rewriting for integrated xml data<>er<>mong-li lee<>
22246<>6013_61<>zhipeng xie:qing zhang:wynne hsu<>enhancing snnb with local accuracy estimation and ensemble techniques<>dasfaa<>mong-li lee<>
22252<>6013_67<>junmei wang:wynne hsu<>a framework for mining topological patterns in spatio-temporal databases<>cikm<>mong-li lee<>
21903<>6019_1<>kobus barnard<>word sense disambiguation with pictures<>ai<>matthew johnson<>
16416<>6021_2<>mary w. hall:jacqueline chame<>superword-level parallelism in the presence of control flow<>cgo<>jaewook shin<>
24826<>6022_18<>nulo<>short locally testable codes and proofs (survey)<>eccc<>oded goldreich<>
24858<>6022_50<>eli ben-sasson:prahladh harsha:madhu sudan:salil p. vadhan<>short pcps verifiable in polylogarithmic time<>coco<>oded goldreich<>
24877<>6022_69<>dana ron<>approximating average parameters of graphs<>eccc<>oded goldreich<>
24892<>6022_84<>nulo<>"bravely, moderately: a common theme in four recent results"<>eccc<>oded goldreich<>
15572<>6023_1<>yikun huang<>phased array processing for spike discrimination<>ijon<>john p. miller<>
15554<>6025_14<>karthik gomadam:kunal verma:amit p. sheth<>demonstrating dynamic configuration and execution of web processes<>icsoc<>john a. miller<>
15556<>6025_16<>gregory t. baramidze<>simulation and the semantic web<>wsc<>john a. miller<>
15570<>6026_3<>nulo<>the user experience<>internet<>jim miller<>
15536<>6031_1<>lawrence s. moss<>the undecidability of iterated modal relativization<>sLogica<>joseph s. miller<>
34855<>6036_0<>b. li<>market-driven bandwidth allocation in selfish overlay networks<>infocom<>w. wang<>
34868<>6040_0<>ji zhang:hai wang<>grid-odf: detecting outliers effectively and efficiently in large multi-dimensional databases<>cis<>wei wang<>
28212<>6042_0<>qunfeng dong:micah adler:archan misra<>minimum energy reliable paths using unreliable wireless links<>mobihoc<>suman banerjee<>
28221<>6042_9<>julian chesterfield:rajiv chakravorty:ian pratt:pablo rodriguez<>exploiting diversity to enhance multimedia streaming over cellular links<>infocom<>suman banerjee<>
28222<>6042_10<>vladimir brik:arunesh mishra<>"eliminating handoff latencies in 802.11 wlans using multiple radios: applications, experience, and evaluation."<>imc<>suman banerjee<>
28232<>6042_20<>samrat ganguly:akhilesh saxena:sudeept bhatnagar:rauf izmailov<>fast replication in content distribution overlays<>infocom<>suman banerjee<>
28236<>6042_24<>seungjoon lee:bobby bhattacharjee<>efficient geographic routing in multihop wireless networks<>mobihoc<>suman banerjee<>
28242<>6042_30<>rajiv chakravorty:sulabh agarwal:ian pratt<>mob: a mobile bazaar for wide-area wireless services<>mobicom<>suman banerjee<>
28243<>6042_31<>rajagopal iyengar:koushik kar<>low-coordination topologies for redundancy in sensor networks<>mobihoc<>suman banerjee<>
28246<>6042_34<>william lau:sanjay jha<>efficient bandwidth guaranteed restoration algorithms for multicast connections<>networking<>suman banerjee<>
28248<>6042_36<>qunfeng dong:micah adler:kazu hirata<>efficient probabilistic packet marking<>icnp<>suman banerjee<>
28278<>6043_1<>siddharth patwardhan:ted pedersen<>senserelate: : targetword-a generalized framework for word sense disambiguation<>aaai<>satanjeev banerjee<>
28283<>6043_6<>siddharth patwardhan:ted pedersen<>senserelate: : targetword-a generalized framework for word sense disambiguation<>acl<>satanjeev banerjee<>
28252<>6044_2<>shuju wu:xiaobing hou<>a comparison of multicast feedback control mechanisms<>anss<>sujata banerjee<>
28253<>6044_3<>gwyn chatranon:miguel a. labrador<>a credit-based active queue management (aqm) mechanism to achieve fairness in the internet<>networking<>sujata banerjee<>
28254<>6044_4<>rodrigo fonseca:puneet sharma:sung-ju lee:sujoy basu<>distributed querying of internet distance information<>infocom<>sujata banerjee<>
28273<>6044_23<>sujoy basu:puneet sharma:sung-ju lee<>nodewiz: peer-to-peer resource discovery for grids<>ccgrid<>sujata banerjee<>
34843<>6050_0<>jean-jacques e. slotine<>on partial contraction analysis for coupled nonlinear oscillators<>bc<>wei wang<>
30149<>6053_1<>wesley w. chu:ruzan shahinian<>vague content and structure (vcas) retrieval for document-centric xml collections<>webdb<>shaorong liu<>
30142<>6056_1<>barrett r. bryant:jeffrey g. gray:rajeev r. raje:andrew m. olson:mikhail auguston<>qos-uniframe: a petri net-based modeling approach to assure qos requirements of distributed real-time and embedded systems<>ecbs<>shih-hsi liu<>
30143<>6056_2<>barrett r. bryant:jeffrey g. gray:rajeev r. raje:andrew m. olson:mikhail auguston<>two-level assurance of qos requirements for distributed real-time and embedded systems<>sac<>shih-hsi liu<>
30144<>6056_3<>nulo<>a software product line architecture for distributed real-time and embedded systems: a separation of concerns approach<>oopsla<>shih-hsi liu<>
34835<>6057_0<>chong wang 0002<>using term clustering and supervised term affinity construction to boost text classification<>pakdd<>wenyuan wang<>
34836<>6057_1<>hairong lv:chong wang 0002:qing zhuo<>off-line chinese signature verification based on support vector machines<>prl<>wenyuan wang<>
34833<>6059_5<>bharat k. bhargava<>key distribution and update for secure inter-group multicast communication<>sasn<>weichao wang<>
16916<>6064_1<>nickolaos f. fragopanagos<>emotion recognition in human-computer interaction<>nn<>john g. taylor<>
30162<>6066_6<>rafael serrano-gotarredona:matthias oster:patrick lichtsteiner:alejandro linares-barranco:r. paz-vicente:f. gomez-rodriguez:havard kolle riis:tobi delbruck:s. zahnd:adrian m. whatley:rodney j. douglas:philipp hafliger:gabriel jimenez-moreno:anton civit:teresa serrano-gotarredona:a. acosta-jimenez:bernabe linares-barranco<>aer building blocks for multi-layer multi-chip neuromorphic vision systems<>nips<>shih-chii liu<>
30165<>6066_9<>matthias oster<>spiking inputs to a winner-take-all network<>nips<>shih-chii liu<>
30171<>6066_15<>lukas reichel:david liechti:karl presser<>range estimation on a robot using neuromorphic motion sensors<>ras<>shih-chii liu<>
30178<>6066_22<>andre van schaik<>aer ear: a matched silicon cochlea pair with address event representation interface<>iscas<>shih-chii liu<>
30179<>6066_23<>matthias oster:adrian m. whatley:rodney j. douglas<>a hardware/software framework for real-time spiking systems<>icann<>shih-chii liu<>
30155<>6069_0<>fumiko nagoya:yuting chen:masashi goya:john a. mcdermid<>an automated approach to specification-based program inspection<>icfem<>shaoying liu<>
34852<>6070_0<>ian f. akyildiz:xudong wang<>wireless mesh networks: a survey<>cn<>weilin wang<>
30184<>6072_1<>clement t. yu:weiyi meng<>word sense disambiguation in queries<>cikm<>shuang liu<>
30182<>6074_0<>zhenming liu:changkang huang:keqiang fan:ping wei:hao chen:jianfeng pei:lei shi:bo li:kun yang:ying liu:luhua lai<>virtual screening of novel noncovalent inhibitors for sars-cov 3c-like proteinase<>jcisd<>shiyong liu<>
34846<>6075_1<>xiang-yang li:zheng sun:yu wang<>design multicast protocols for non-cooperative networks<>infocom<>weizhao wang<>
20323<>6083_0<>mark pauly:richard keiser:bart adams:philip dutre:markus h. gross<>meshless animation of fracturing solids<>tog<>leonidas j. guibas<>
794<>6084_2<>norman w. paton<>an analysis of extensible modelling for functional genomics data<>bmcbi<>andrew r. jones<>
6763<>6091_4<>nulo<>comprehension by derivation<>iwpc<>douglas r. smith<>
3388<>6092_1<>y. t. bau:hong tat ewe<>an ant colony optimization approach to the degree-constrained minimum spanning tree problem<>cis<>chin kuan ho<>
3390<>6092_3<>hong tat ewe<>performance of an ant colony optimization (aco) algorithm on the dynamic load-balanced clustering problem in ad hoc networks<>cis<>chin kuan ho<>
25982<>6094_0<>shansi ren:haining wang:xin chen:xiaodong zhang<>analyzing object detection quality under probabilistic coverage in sensor networks<>iwqos<>qun li<>
25993<>6094_11<>shansi ren:haining wang:xin chen:xiaodong zhang<>a study on object tracking quality under probabilistic coverage in sensor networks<>sigmobile<>qun li<>
25995<>6094_13<>daniela rus<>navigation protocols in sensor networks<>tosn<>qun li<>
26000<>6095_2<>yajuan li:chuang lin:zhiguang shan<>performance modeling and analysis for resource scheduling in data grids<>npc<>quanlin li<>
26004<>6097_0<>jing chen:ling feng<>refining the results of automatic e-textbook construction by clustering<>icwl<>qing li<>
26005<>6097_1<>ling feng:allan wong<>from intra-transaction to generalized inter-transaction: landscaping multidimensional contexts in association rule mining<>isci<>qing li<>
25962<>6098_0<>jieping ye:hui xiong:haesun park:ravi janardan:vipin kumar<>idr/qr: an incremental dimension reduction algorithm via qr decomposition<>tkde<>qi li<>
25967<>6098_5<>jieping ye<>a two-stage linear discriminant analysis via qr-decomposition<>pami<>qi li<>
6800<>6101_1<>monica m. c. schraefel:alisdair owens:alistair russell:craig harris:max wilson<>the evolving mspace platform: leveraging the semantic web on the trail of the memex<>ht<>daniel a. smith<>
26006<>6105_0<>chris fraley:roger eugene bumgarner:ka yee yeung:adrian e. raftery<>"donuts, scratches and blanks: robust model-based segmentation of microarray images."<>bioinformatics<>qunhua li<>
6785<>6106_0<>noah a. smith:roy w. tromble<>context-based morphological disambiguation with random fields<>naacl<>david a. smith<>
26007<>6107_0<>zhiyong peng:ling feng:xuhui li:junqiang liu<>using object deputy model to prepare data for data warehousing<>tkde<>qing li<>
29099<>6111_1<>scott r. tilley:michael vanhilst:damiano distante<>adoption-centric software maintenance process improvement via information integration<>step<>shihong huang<>
38522<>6112_2<>yu yajie:liu wenyin<>online segmentation of freehand stroke by dynamic programming<>icdar<>yin liu<>
29109<>6113_1<>david zook:yannis smaragdakis<>statically safe program generation with safegen<>gpce<>shan shan huang<>
38530<>6114_5<>weibo gong:vishal misra:donald f. towsley<>"self-similarity and long range dependence on the internet: a second look at the evidence, origins and implications ."<>cn<>yong liu<>
38533<>6114_8<>donald f. towsley:tao ye:jean-chrysostome bolot<>an information-theoretic approach to network monitoring and measurement<>imc<>yong liu<>
38534<>6114_9<>chun zhang:weibo gong:james f. kurose:r. moll:donald f. towsley<>on optimal routing with multiple traffic matrices<>infocom<>yong liu<>
38535<>6116_0<>h. b. zhu:x. h. liu:e. h. wu<>real-time simulation of physically based on-surface flow<>vc<>y. q. liu<>
38539<>6117_0<>guohua zhang:yiyu wu<>stability and sensitivity for congestion control in wireless networks with time varying link capacities<>icnp<>yonghe liu<>
38540<>6117_1<>huadong ma<>on coverage problems of directional sensor networks<>msn<>yonghe liu<>
38543<>6117_4<>dan tao:huadong ma<>energy-efficient cooperative image processing in video sensor networks<>pcm<>yonghe liu<>
38546<>6117_7<>hong luo:jun luo<>energy efficient routing with adaptive data fusion in sensor networks<>dialm<>yonghe liu<>
38558<>6125_5<>ming lai:longzhuang li<>a three-step approach to detect and remove grid lines in well-logging digitization<>cgim<>yonghuai liu<>
38564<>6125_11<>longzhuang li:baogang wei<>evaluating collinearity constraint for automatic range image registration<>3dim<>yonghuai liu<>
33780<>6127_0<>qian zhu:jianhua yao:shengang yuan:feng li:haifeng chen:quan liao<>superstructure searching algorithm for generic reaction retrieval<>jcisd<>wei cai<>
3018<>6134_0<>shang-chia chen:shih-kai lin:kun-ta wu:chao-ping huang:pen-hsiu chang:n. c. chen:hsian-chu peng:chuang-feng shih:kuo-shung liu<>transport measurements on movpe-grown inn films<>mj<>chin-an chang<>
15118<>6140_4<>rodrigo roman:jianying zhou<>on the security of wireless sensor networks<>iccsa<>javier lopez<>
15126<>6140_12<>rodrigo roman:jianying zhou<>protection against spam using pre-challenges<>sec<>javier lopez<>
15130<>6140_16<>antonio munoz:jose antonio onieva<>on secure profiling<>dexaw<>javier lopez<>
15132<>6140_18<>rodrigo roman:jianying zhou<>casual virtual private network<>csse<>javier lopez<>
15133<>6140_19<>sokratis k. katsikas:gunther pernul<>"trust, privacy and security in e-business: requirements and solutions."<>pci<>javier lopez<>
15135<>6140_21<>kun peng:ed dawson:juanma gonzalez nieto:eiji okamoto<>a novel method to maintain privacy in mobile agent applications<>cans<>javier lopez<>
15145<>6140_31<>rolf oppliger:gunther pernul<>classifying public key certificates<>europki<>javier lopez<>
15149<>6140_35<>jose antonio onieva:jianying zhou<>attacking an asynchronous multi-party contract signing protocol<>indocrypt<>javier lopez<>
15150<>6140_36<>sokratis k. katsikas:gunther pernul<>"trust, privacy and security in digital business."<>csse<>javier lopez<>
15153<>6140_39<>isaac agudo:jose a. montenegro<>a representation model of trust relationships with delegation extensions<>itrust<>javier lopez<>
31429<>6147_2<>lv-an tang:hongyan li:zhiyong pan:dongqing yang:meimei li:ying ying<>an ontology based approach to construct behaviors in web information systems<>waim<>shiwei tang<>
31431<>6147_4<>hongyan li:ming xue:jianjun wang:dongqing yang<>understanding user operations on web page in wise<>waim<>shiwei tang<>
31433<>6147_6<>ting yin:hongyan li:zijing hu:yu fan:jianlong gao<>a hybrid method for detecting data stream changes with complex semantics in intensive care unit<>asian<>shiwei tang<>
31446<>6147_19<>junhu zhang:dongqing yang<>: an adaptive clustering-based data replication algorithm on a p2p data-store<>asian<>shiwei tang<>
31447<>6147_20<>zhi-hong deng:xin li<>an efficient approach for interactive mining of frequent itemsets<>waim<>shi-wei tang<>
31450<>6147_23<>baojun qiu:hongyan li:zijing hu:dongqing yang:lv-an tang:jianjun wang:meimei li<>general consistency management within the development of ontology-driven web information system<>asian<>shiwei tang<>
31452<>6147_25<>zhi-hong deng<>a non-vsm knn algorithm for text classification<>adma<>shi-wei tang<>
31455<>6147_28<>hui yu:jian pei:dongqing yang<>mining most general multidimensional summarization of probably groups in data warehouses<>ssdbm<>shiwei tang<>
31457<>6147_30<>peng zhang:yunhai tong:dongqing yang<>mining association rules from distorted data for privacy preservation<>kes<>shiwei tang<>
31458<>6147_31<>zhi-hong deng:ming zhang<>an efficient text categorization algorithm based on category memberships<>fskd<>shi-wei tang<>
31459<>6147_32<>peixiang zhao:ming zhang:dongqing yang<>finding hidden semantics behind reference linkages : an ontological approach for scientific digital libraries<>dasfaa<>shiwei tang<>
31464<>6147_37<>zhi-hong deng:cong-rui ji:ming zhang<>mining frequent ordered patterns<>pakdd<>shi-wei tang<>
31467<>6147_40<>aiqiang gao:dongqing yang:ming zhang<>web service composition using integer programming-based models<>icebe<>shiwei tang<>
31474<>6147_47<>peng zhang:yunhai tong:dongqing yang<>privacy preserving naive bayes classification<>adma<>shiwei tang<>
31481<>6147_54<>yunfeng liu:dongqing yang:tengjiao wang:jun gao<>validating key constraints over xml document using xpath and structure checking<>fgcs<>shiwei tang<>
31486<>6147_59<>aiqiang gao:dongqing yang:ming zhang<>web service composition using markov decision processes<>waim<>shiwei tang<>
6417<>6148_4<>rui li<>commutativity-based concurrency control in groupware<>colcom<>du li<>
6431<>6149_0<>hong-jian lai:jingzhong mao:mingquan zhan<>supereulerian planar graphs<>arscom<>deying li<>
6430<>6150_0<>eckart mayer:jorg raisch<>a new hierarchical control scheme for a class of cyclically repeated discrete-event systems<>icinco<>danjing li<>
6432<>6152_0<>hong-jian lai:mingquan zhan<>eulerian subgraphs and hamilton-connected line graphs<>dam<>dengxin li<>
6437<>6153_0<>songcan chen<>modified linear discriminant analysis<>pr<>daohong li<>
6435<>6154_0<>steven j. simske:jason s. aronoff<>a statistical method for binary classification of images<>doceng<>dalong li<>
6436<>6154_1<>russell mersereau:steven j. simske<>blur identification based on kurtosis minimization<>icip<>dalong li<>
24787<>6157_0<>eun jung kim:greg m. link:ki hwan yum:mahmut t. kandemir:mary jane irwin:chita r. das<>a holistic approach to designing energy-efficient cluster interconnects<>tc<>narayanan vijaykrishnan<>
24791<>6157_4<>suresh srinivasan:lin li<>simultaneous partitioning and frequency assignment for on-chip bus architectures<>date<>narayanan vijaykrishnan<>
24798<>6157_11<>jongman kim:dongkook park:theo theocharides:chita r. das<>a low latency router supporting adaptivity for on-chip interconnects<>dac<>narayanan vijaykrishnan<>
24800<>6157_13<>srinivasan murali:theo theocharides:mary jane irwin:luca benini:giovanni de micheli<>analysis of error recovery schemes for networks on chips<>dt<>narayanan vijaykrishnan<>
24802<>6157_15<>aman gayasen:mary jane irwin<>exploring technology alternatives for nano-scale fpga interconnects<>dac<>narayanan vijaykrishnan<>
22877<>6160_0<>young-joo kim:so-hee park:yong-kee jun<>a practical tool for detecting races in openmp programs<>pact<>mi-young park<>
12161<>6165_0<>nulo<>human symbol manipulation within an integrated cognitive architecture<>cogsci<>john r. anderson<>
12177<>6169_0<>janine bennett:kenneth i. joy<>marching diamonds for unstructured meshes<>visualization<>john c. anderson<>
20382<>6170_4<>andrew lumsdaine<>generic programming for high-performance scientific applications<>concurrency<>lie-quan lee<>
20385<>6173_1<>li-c. wang:praveen parvathala:t. m. mak<>on silicon-based speed path identification<>vts<>leonard lee<>
20387<>6173_3<>sean wu:charles h.-p. wen:li-c. wang<>on generating tests to cover diverse worst-case timing corners<>dft<>leonard lee<>
33489<>6174_4<>nulo<>optimal finite characterization of linear problems with inexact data<>rc<>vladik kreinovich<>
33491<>6174_6<>nulo<>interval methods in knowledge representation<>ijufks<>vladik kreinovich<>
33492<>6174_7<>nulo<>interval methods in knowledge representation<>ijufks<>vladik kreinovich<>
33496<>6174_11<>nulo<>interval methods in knowledge representation<>ijufks<>vladik kreinovich<>
33500<>6174_15<>nulo<>interval methods in knowledge representation<>ijufks<>vladik kreinovich<>
33509<>6174_24<>nulo<>interval methods in knowledge representation<>ijufks<>vladik kreinovich<>
33528<>6174_43<>scott ferson:lev ginzburg:luc longpre:monica aviles<>exact bounds on finite populations of interval data<>rc<>vladik kreinovich<>
33548<>6174_63<>nulo<>interval methods in knowledge representation<>ijufks<>vladik kreinovich<>
12149<>6179_0<>umar saif:anthony degangi:anant agarwal<>gigabit routing on a software-exposed tiled-microprocessor<>ancs<>james w. anderson<>
12150<>6179_1<>dejan kostic:ryan braud:charles edwin killian:erik vandekieft:alex c. snoeren:amin vahdat<>maintaining high-bandwidth under dynamic network conditions<>usenix<>james w. anderson<>
10659<>6181_1<>fouad a. tobagi<>traffic grooming in wdm sonet upsr rings with multiple line speeds<>infocom<>huan liu<>
10661<>6182_1<>xiaohua jia:deying li:chan-hee lee<>bandwidth guaranteed call admission in tdma/cdma ad hoc wireless networks<>adhoc<>hai liu<>
10663<>6182_3<>peng-jun wan:chih-wei yi:xiaohua jia:s. a. m. makki:niki pissinou<>maximal lifetime scheduling in sensor surveillance networks<>infocom<>hai liu<>
10664<>6182_4<>peng-jun wan:xiaohua jia<>fault-tolerant relay node placement in wireless sensor networks<>cocoon<>hai liu<>
10656<>6183_0<>mahesh balakrishnan:maya haridasan:prakash linga:venugopalan ramasubramanian:sean c. rhea:manpreet singh:vidhyashankar venkatraman:vivek vishnumurthy:kevin walsh:bernard wong:ming zhong<>workshop report<>iptps<>hongzhou liu<>
10657<>6184_0<>tom roeder:kevin walsh:rimon barr:emin gun sirer<>design and implementation of a single system image operating system for ad hoc networks<>mobisys<>hongzhou liu<>
10644<>6185_1<>akif gunes koru<>building effective defect-prediction models in practice<>software<>hongfang liu<>
10647<>6185_4<>lifeng chen:carol friedman<>gene name ambiguity of eukaryotic nomenclatures<>bioinformatics<>hongfang liu<>
10650<>6185_7<>zhangzhi hu:cathy h. wu<>dynamically generating a protein entity dictionary using online resources<>acl<>hongfang liu<>
10654<>6186_0<>milenko petrovic:hans-arno jacobsen<>efficient and scalable filtering of graph-based metadata<>ws<>haifeng liu<>
10655<>6186_1<>milenko petrovic:hans-arno jacobsen<>g-topss: fast filtering of graph-based metadata<>www<>haifeng liu<>
10596<>6187_28<>rong jin<>learning with labeled sessions<>ijcai<>huan liu<>
10599<>6187_31<>lei tang<>bias analysis in text classification for highly skewed data<>icdm<>huan liu<>
10601<>6187_33<>lei yu<>toward integrating feature selection algorithms for classification and clustering<>tkde<>huan liu<>
10606<>6187_38<>kari torkkola:srihari venkatesan<>sensor sequence modeling for driving<>flairs<>huan liu<>
10609<>6187_41<>rong jin<>a novel approach to model generation for heterogeneous data classification<>ijcai<>huan liu<>
10615<>6187_47<>surendra k. singhi<>error-sensitive grading for model combination<>ecml<>huan liu<>
10622<>6187_54<>prabhdeep singh:r. bhimavarapu:hasan davulcu:chitta baral:seungchan kim:michael l. bittner:i. v. ramakrishnan<>biolog: a browser based collaboration and resource navigation assistant for biomedical researchers<>dils<>huan liu<>
10636<>6188_4<>jinyan li:limsoon wong<>use of extreme patient samples for outcome prediction from gene expression data<>bioinformatics<>huiqing liu<>
10637<>6188_5<>hao han:jinyan li:limsoon wong<>dnafsminer: a web-based software toolbox to recognize two types of functional sites in dna sequences<>bioinformatics<>huiqing liu<>
10671<>6189_2<>henry lieberman<>programmatic semantics for natural language interfaces<>chi<>hugo liu<>
15922<>6190_0<>derek messie<>environment organization of roles using polymorphism<>e4mas<>jae c. oh<>
15923<>6190_1<>derek messie<>polymorphic self-* agents for stigmergic fault mitigation in large-scale real-time embedded systems<>atal<>jae c. oh<>
15926<>6190_4<>misty k. blowers<>text-independent open-set speaker identification for military missions using genetic rule-based system<>gecco<>jae c. oh<>
15927<>6190_5<>derek messie<>swarms of self-organizing polymorphic agents<>his<>jae c. oh<>
15932<>6190_10<>derek messie:mina jung:shweta shetty:steven nordstrom:michael haney<>prototype of fault adaptive embedded software for large-scale real-time systems<>ecbs<>jae c. oh<>
15936<>6191_3<>wolfgang sturzlinger<>moving objects with 2d input devices in cad systems and desktop virtual environments<>graphicsinterface<>ji-young oh<>
24302<>6192_8<>michael n. huhns:munindar p. singh:mark h. burstein:keith s. decker:edmund h. durfee:timothy w. finin:les gasser:hrishikesh j. goradia:kiran lakkaraju:hideyuki nakashima:h. van dyke parunak:jeffrey s. rosenschein:alicia ruvinsky:gita sukthankar:samarth swarup:katia p. sycara:milind tambe:thomas wagner:rosa laura zavala gutierrez<>research directions for service-oriented multiagent systems<>internet<>nicholas r. jennings<>
24307<>6192_13<>nadim haque:luc moreau<>resource allocation in communication networks using market-based agents<>kbs<>nicholas r. jennings<>
24327<>6192_33<>yan zheng wei:luc moreau<>a market-based approach to recommender systems<>tois<>nicholas r. jennings<>
24342<>6192_48<>ronald ashri:sarvapali d. ramchurn:jordi sabater:michael luck<>trust evaluation through relationship analysis<>atal<>nicholas r. jennings<>
24349<>6192_55<>partha sarathi dutta:luc moreau<>cooperative information sharing to improve distributed learning in multi-agent systems<>jair<>nicholas r. jennings<>
24351<>6192_57<>yan zheng wei:luc moreau<>learning users' interests by quality classification in market-based recommender systems<>tkde<>nicholas r. jennings<>
24365<>6192_71<>nishan c. karunatillake:iyad rahwan:timothy j. norman<>arguing and negotiating in the presence of social influences<>ceemas<>nicholas r. jennings<>
24376<>6192_82<>s. shaheen fatima:michael wooldridge<>an analysis of the shapley value and its uncertainty for the voting game<>atal<>nicholas r. jennings<>
24383<>6192_89<>nulo<>agreement technologies<>webi<>nick r. jennings<>
24390<>6192_96<>esther david:alex rogers:j. schiff:sarit kraus<>optimal design of english auctions with discrete bid levels<>sigecom<>nicholas r. jennings<>
24394<>6192_100<>shamimabi paurobally<>developing agent web service agreements<>webi<>nicholas r. jennings<>
24396<>6192_102<>thuc duong nguyen<>managing commitments in multiple concurrent negotiations<>ecra<>nicholas r. jennings<>
24397<>6192_103<>s. shaheen fatima:michael wooldridge<>bargaining with incomplete information<>amai<>nicholas r. jennings<>
24398<>6192_104<>s. shaheen fatima:michael wooldridge<>sequential auctions for objects with common and private values<>atal<>nicholas r. jennings<>
24400<>6192_106<>jigar patel:w. t. luke teacy:michael luck:stuart chalmers:nir oren:timothy j. norman:alun d. preece:peter m. d. gray:gareth shercliff:patrick j. stockreisser:jianhua shao:w. a. gray:n. j. fiddian:simon g. thompson<>agent-based virtual organisations for the grid<>atal<>nicholas r. jennings<>
24407<>6192_113<>s. shaheen fatima:michael wooldridge<>an analysis of the shapley value and its uncertainty for the voting game<>eumas<>nicholas r. jennings<>
24408<>6192_114<>jigar patel:w. t. luke teacy:michael luck<>a probabilistic trust model for handling inaccurate reputation sources<>itrust<>nicholas r. jennings<>
24425<>6192_131<>bastian blankenburg:rajdeep k. dash:sarvapali d. ramchurn:matthias klusch<>trusted kernel-based coalition formation<>atal<>nicholas r. jennings<>
24427<>6192_133<>w. t. luke teacy:jigar patel:michael luck<>coping with inaccurate reputation sources: experimental analysis of a probabilistic trust model<>atal<>nicholas r. jennings<>
24440<>6192_146<>shamimabi paurobally:jim cunningham<>a formal framework for agent interaction semantics<>atal<>nicholas r. jennings<>
9917<>6193_1<>kazuo iwama<>average-case competitive analyses for ski-rental problems<>algorithmica<>hiroshi fujiwara<>
9918<>6193_2<>kazuo iwama<>average-case competitive analyses for ski-rental problems<>dagstuhl<>hiroshi fujiwara<>
25380<>6198_2<>byungcho kim:tridas mukhopadhyay<>an economic analysis of the software market with a risk-sharing contract<>icis<>pei-yu chen<>
11353<>6201_7<>jian pei:philip s. yu<>pattern-based similarity search for microarray data<>kdd<>haixun wang<>
11354<>6201_8<>jiong yang:wei wang:philip s. yu<>an improved biclustering method for analyzing gene expression profiles<>ijait<>haixun wang<>
11355<>6201_9<>chang luo:hetal thakkar:carlo zaniolo<>a native extension of sql for mining data streams<>sigmod<>haixun wang<>
11357<>6201_11<>yun chi:philip s. yu:richard r. muntz<>loadstar: a load shedding scheme for classifying data streams<>sdm<>haixun wang<>
11360<>6201_14<>xiaofeng meng<>on the sequencing of tree structures for xml indexing<>icde<>haixun wang<>
11363<>6201_17<>hao he:jun yang:philip s. yu<>compact reachability labeling for graph-structured data<>cikm<>haixun wang<>
11365<>6201_19<>wei wang<>stay current and relevant in data mining research<>dasfaa<>haixun wang<>
11382<>6201_36<>chang-shing perng:philip s. yu<>near-neighbor search in pattern distance spaces<>sdm<>haixun wang<>
11384<>6201_38<>jian pei<>a random method for quantifying changing distributions in data streams<>pkdd<>haixun wang<>
11388<>6201_42<>yun chi:philip s. yu<>loadstar: load shedding in data stream mining<>vldb<>haixun wang<>
11395<>6201_49<>chang-shing perng:sheng ma:philip s. yu<>demand-driven frequent itemset mining using pattern structures<>kais<>haixun wang<>
11396<>6201_50<>peng wang:xiaochen wu:wei wang:baile shi<>on reducing classifier granularity in mining concept-drifting data streams<>icdm<>haixun wang<>
9944<>6203_0<>zi-cai li<>verification of reduced convergence rates<>computing<>hsin-yun hu<>
14057<>6217_1<>ramesh srinivasan<>fluid ontologies for digital museums<>jodl<>jeffrey huang<>
14091<>6219_5<>nathaniel fout:zhaohua ding<>visualization of neuronal fiber connections from dt-mri with global optimization<>sac<>jian huang<>
14093<>6219_7<>jinzhu gao:c. ryan johnson:scott atchley:james arthur kohl<>distributed data management for large volume visualization<>visualization<>jian huang<>
11439<>6220_3<>qiang huang:nikita borisov<>privacy-preserving friends troubleshooting network<>ndss<>helen j. wang<>
11442<>6220_6<>xuxian jiang:dongyan xu:eugene h. spafford<>virtual playgrounds for worm behavior investigation<>raid<>helen j. wang<>
11452<>6220_16<>qiang huang:david jao<>applications of secure electronic voting to automated privacy-preserving troubleshooting<>ccs<>helen j. wang<>
11462<>6222_5<>yoshimi egawa:shinya fujita:ken-ichi kawarabayashi<>existence of two disjoint long cycles in graphs<>dm<>hong wang<>
11478<>6222_21<>danhong zhang<>disjoint directed quadrilaterals in a directed graph<>jgt<>hong wang<>
11479<>6222_22<>nulo<>maximal total length of  disjoint cycles in bipartite graphs<>combinatorica<>hong wang<>
11480<>6224_0<>matthew horridge:alan l. rector:nick drummond:julian seidenberg<>debugging owl-dl ontologies: a heuristic approach<>semweb<>hai wang<>
11482<>6224_2<>jing sun:sasanka athauda:tazkiya sheik<>svg web environment for z specification language<>icfem<>hai wang<>
11483<>6224_3<>jing sun:hongyu zhang:yuan-fang li<>formal semantics and verification for feature modeling<>iceccs<>hai wang<>
11488<>6224_8<>jin song dong:jing sun:yuan-fang li<>tcoz approach to owl-s process model design<>seke<>hai wang<>
11492<>6224_12<>jun sun:yuan li:jing sun<>visualizing and simulating semantic web services ontologies<>icfem<>hai wang<>
11495<>6224_15<>jin song dong:jing sun<>reasoning support for swrl-fol using alloy<>seke<>hai wang<>
14077<>6225_9<>pavol hell<>a generalization of the theorem of lekkerkerker and boland<>dm<>jing huang<>
11499<>6226_2<>wei-shinn ku:roger zimmermann:chi-ngai wan<>adaptive nearest neighbor queries in travel time networks<>gis<>haojun wang<>
34632<>6228_1<>shuliang wang:hanning yuan:guoqing chen<>attribute uncertainty in gis data<>fskd<>wenzhong shi<>
11421<>6230_7<>david suter<>tracking and segmenting people with occlusions by a sample consensus based method<>icip<>hanzi wang<>
11430<>6232_3<>qing wu:lin shi:yizhou yu:narendra ahuja<>out-of-core tensor approximation of multi-dimensional matrices of visual data<>tog<>hongcheng wang<>
11431<>6232_4<>yunqiang chen:tong fang:jason tyan<>mutual information regularized bayesian framework for multiple image restoration<>iccv<>hongcheng wang<>
11432<>6232_5<>narendra ahuja<>rank-r approximation of tensors: using image-as-matrix representation<>cvpr<>hongcheng wang<>
34629<>6234_0<>zhouyi zhou:bin liang:li jiang:yeping he<>a formal description of secimos operating system<>mmmacns<>wenchang shi<>
34630<>6234_1<>bin liang:heng liu:yanjun wu<>enforcing the principle of least privilege with a state-based privilege control model<>ispec<>wenchang shi<>
10874<>6235_1<>nulo<>a soft decoding scheme for vector quantization over a cdma channel<>tcom<>ha h. nguyen<>
10884<>6240_5<>nguyen sinh hoa<>improving rough classifiers using concept ontology<>pakdd<>hung son nguyen<>
10888<>6240_9<>sinh hoa nguyen:trung thanh nguyen<>rough set approach to sunspot classification problem<>rsfdgrc<>hung son nguyen<>
10894<>6240_15<>marta luksza:ewa makosa:henryk jan komorowski<>an approach to mining data with continuous decision values<>iis<>hung son nguyen<>
20576<>6244_0<>ioannis stamos<>automatic 3d to 2d registration for the photorealistic rendering of urban scenes<>cvpr<>lingyun liu<>
36292<>6247_0<>nulo<>hybrid methods for pos guessing of chinese unknown words<>acl<>xiaofei lu<>
10901<>6248_3<>patrick thiran<>binary versus analogue path monitoring in ip networks<>pam<>hung xuan nguyen<>
36266<>6249_6<>anil k. jain<>deformation analysis for 3d face matching<>wacv<>xiaoguang lu<>
36267<>6249_7<>anil k. jain<>integrating range and texture information for 3d face recognition<>wacv<>xiaoguang lu<>
10904<>6252_0<>wei-ngan chin:shengchao qin:martin c. rinard<>memory usage verification for oo programs<>sas<>huu hai nguyen<>
10905<>6252_1<>martin c. rinard:cristian cadar<>exploring the acceptability envelope<>oopsla<>huu hai nguyen<>
10906<>6252_2<>wei-ngan chin:siau-cheng khoo:shengchao qin:corneliu popeea<>verifying safety policies with size properties and alias controls<>icse<>huu hai nguyen<>
36278<>6253_1<>alexis michael tourapis:peng yin:jill boyce<>fast mode decision and motion estimation for h.264 with a focus on mpeg-2/h.264 transcoding<>iscas<>xiaoan lu<>
40719<>6254_12<>isao sasano:mizuhito ogawa<>maximum marking problems with accumulative weight functions<>ictac<>zhenjiang hu<>
40724<>6254_17<>kiminori matsuzaki:kazuhiko kakehi:masato takeichi<>systematic derivation of tree contraction algorithms<>ppl<>zhenjiang hu<>
40741<>6257_0<>feng tian:bing wei<>hamilton connectivity of line graphs and claw-free graphs<>jgt<>zhiquan hu<>
40744<>6257_3<>xujin chen:wenan zang<>perfect circular arc coloring<>jco<>zhiquan hu<>
40749<>6258_3<>meenakshi narayanaswamy:k. e. ravikumar:k. vijay-shanker:cathy h. wu<>literature mining and database annotation of protein phosphorylation using a rule-based system<>bioinformatics<>zhang-zhi hu<>
40754<>6258_8<>hongfang liu:cathy h. wu<>dyngo: a tool for visualizing and mining of gene ontology and its associations<>bmcbi<>zhang-zhi hu<>
37150<>6259_3<>zhan chen:wallapak tavanapong<>video management in peer-to-peer systems<>p2p<>ying cai<>
37155<>6259_8<>k. a. hua:a. phillips<>leveraging 1-hop neighborhood knowledge for efficient flooding in wireless ad hoc networks<>ipccc<>y. cai<>
37157<>6259_10<>liangzhong yin:guohong cao<>a generalized target-driven cache replacement policy for mobile environments<>jpdc<>ying cai<>
37164<>6263_2<>kevin j. sullivan:william g. griswold:yuanyuan song:macneil shonle:nishit tewari:hridesh rajan<>information hiding interfaces for aspect-oriented design<>sigsoft<>yuanfang cai<>
18532<>6265_0<>lei wang:ping xue<>a criterion for optimizing kernel parameters in kbda for image retrieval<>tsmc<>kap luk chan<>
18514<>6266_2<>peng li:shankar muthu krishnan<>learning a multi-size patch-based hybrid kernel machine ensemble for abnormal region detection in colonoscopic images<>cvpr<>kap luk chan<>
18519<>6266_7<>lei wang:xuchun li:ping xue<>a novel framework for svm-based image retrieval on large databases<>mm<>kap luk chan<>
18520<>6266_8<>wei jiang:mingjing li:hongjiang zhang<>mapping low-level features to high-level semantic concepts in region-based image retrieval<>cvpr<>kap luk chan<>
36554<>6273_0<>zhongchao yu:chuk-yang seng:tao jiang:william a. arbaugh<>robust routing in malicious environment for ad hoc networks<>ispec<>xue wu<>
26287<>6278_6<>aimin zhou:yaochu jin:edward p. k. tsang:tatsuya okabe<>a model-based evolutionary algorithm for bi-objective optimization<>cec<>qingfu zhang<>
26268<>6279_10<>jian ma:min gao:lionel m. ni:wenwu zhu<>localized low-power topology control algorithms in ieee 802.15.4-based sensor networks<>icdcs<>qian zhang<>
26272<>6279_14<>yunnan wu:wenwu zhu:sun-yuan kung<>bounding the power rate function of wireless ad hoc networks<>infocom<>qian zhang<>
25911<>6282_6<>gary chartrand:varaporn saenpholphat<>resolving edge colorings in graphs<>arscom<>ping zhang<>
25913<>6282_8<>gary chartrand:ladislav nebesky<>on hamiltonian colorings of graphs<>dm<>ping zhang<>
25916<>6282_11<>gary chartrand:ladislav nebesky<>hamiltonian colorings of graphs<>dam<>ping zhang<>
25929<>6282_24<>robert c. brigham:gary chartrand:ronald d. dutton<>on the dimension of trees<>dm<>ping zhang<>
25931<>6285_0<>na li<>the importance of affective quality<>cacm<>ping zhang<>
7923<>6286_56<>yuliy m. baryshnikov:nadrian c. seeman:teddy yimwadsana<>self-correcting self-assembly: growth models and the hammersley process<>dna<>edward g. coffman jr.<>
7981<>6288_27<>sunghun kim:jennifer bevan<>analysis of signature change patterns<>msr<>e. james whitehead jr.<>
7990<>6290_1<>bogdan tomoyuki nassu:aurora trinidad ramirez pozo<>a comparison of evolutionary algorithms for system-level diagnosis<>gecco<>elias procopio duarte jr.<>
26301<>6295_0<>song gao:tien d. bui<>edge detection models<>iciar<>qing h. zhang<>
26302<>6295_1<>tien d. bui:song gao<>newimage segmentation models<>sip<>qing h. zhang<>
26303<>6295_2<>song gao:tien d. bui<>a roof edge detection model<>ibpria<>qing h. zhang<>
26293<>6296_2<>yidong yuan:xuemin lin:qing liu:wei wang:jeffrey xu yu<>efficient computation of the skyline cube<>vldb<>qing zhang<>
1495<>6297_0<>azer bestavros:ibrahim matta<>dpam: a distributed prefetching protocol for scalable asynchronous multicast in p2p systems<>infocom<>abhishek sharma<>
6839<>6303_0<>benyuan liu:peter bras:olivier dousse:philippe nain<>mobility improves coverage of sensor networks<>mobihoc<>donald f. towsley<>
6840<>6305_0<>philippe nain:benyuan liu:zhen liu<>properties of random direction models<>infocom<>donald f. towsley<>
9814<>6309_1<>xinwei shi<>quality mesh generation for molecular skin surfaces using restricted union of balls<>visualization<>ho-lun cheng<>
9821<>6309_8<>tony tan<>approximating polygonal objects by deformable smooth surfaces<>mfcs<>ho-lun cheng<>
9825<>6310_0<>p. paul wang<>medical image processing<>isci<>h. d. cheng<>
33886<>6319_0<>wen-hsiung wu:yi-hui su:tsung-li wang:te-jen su<>an investigation of a mobile learning system in a digital filter course<>icalt<>wei-fan chen<>
17859<>6325_0<>guang xu<>an improved approximation algorithm for uncapacitated facility location problem with penalties<>cocoon<>jinhui xu<>
17845<>6329_1<>haibo hu:wing sing wong:baihua zheng:dik lun lee:wang-chien lee<>proactive caching for spatial queries in mobile environments<>icde<>jianliang xu<>
17851<>6329_7<>haibo hu:dik lun lee<>a generic framework for monitoring continuous spatial queries over moving objects<>sigmod<>jianliang xu<>
17823<>6331_0<>yunbo cao:hang li:min zhao<>ranking definitions with supervised learning methods<>www<>jun xu<>
17825<>6331_2<>hang li:yunbo cao:yunhua hu:shenjie li:dmitriy meyerzon<>a new approach to intranet search based on information extraction<>cikm<>jun xu<>
17834<>6332_5<>hsinchun chen<>criminal network analysis and visualization<>cacm<>jennifer jie xu<>
17838<>6332_9<>hsinchun chen<>crimenet explorer: a framework for criminal network knowledge discovery<>tois<>jennifer jie xu<>
17839<>6332_10<>jialun qin:daning hu:marc sageman:hsinchun chen<>analyzing terrorist networks: a case study of the global salafi jihad network<>isi<>jennifer jie xu<>
33875<>6334_0<>jean-lien c. wu<>performance analysis of radio resource allocation for multimedia traffic in cellular networks<>aina<>wei-yeh chen<>
33870<>6335_1<>nulo<>probabilistic analysis of algorithms for the dutch national flag problem<>tcs<>wei-mei chen<>
33878<>6336_0<>xiao li:jin rong<>sensor localization in an obstructed environment<>dcoss<>wang chen<>
33877<>6337_0<>chun-chi liu:pei-chun chang:jeremy j. w. chen<>topological-based classification using artificial gene networks<>IEEEicci<>w.-s. e. chen<>
635<>6343_9<>umesh deshpande:anupam basu<>performance enhancement of a contract net protocol based system through instance-based learning<>tsmc<>arobinda gupta<>
639<>6343_13<>ankur jain<>a distributed self-stabilizing algorithm for finding a connected dominating set in a graph<>pdcat<>arobinda gupta<>
614<>6344_32<>smriti yamini<>spatiotemporal annotation graph (stag): a data model for composite digital objects<>icde<>amarnath gupta<>
620<>6344_38<>li chen:m. erdem kurul<>efficient algorithms for pattern matching on directed acyclic graphs<>icde<>amarnath gupta<>
13034<>6345_0<>dragomir anguelov:praveen srinivasan:daphne koller:sebastian thrun:jim rodgers<>scape: shape completion and animation of people<>tog<>james davis<>
13038<>6345_4<>diego nehab:szymon rusinkiewicz<>improved sub-pixel stereo correspondences through symmetric refinement<>iccv<>james davis<>
13041<>6345_7<>diego nehab:szymon rusinkiewicz:ravi ramamoorthi<>efficiently combining positions and normals for precise 3d geometry<>tog<>james davis<>
13046<>6345_12<>diego nehab:ravi ramamoorthi:szymon rusinkiewicz<>spacetime stereo: a unifying framework for depth from triangulation<>pami<>james davis<>
13047<>6345_13<>ruigang yang:liang wang<>brdf invariant stereo using light transport constancy<>iccv<>james e. davis<>
682<>6346_1<>martin pal<>stochastic steiner trees without a root<>icalp<>anupam gupta<>
688<>6346_7<>ittai abraham:yair bartal:hubert t.-h. chan:kedar dhamdhere:jon m. kleinberg:ofer neiman:aleksandrs slivkins<>metric embeddings with relaxed guarantees<>focs<>anupam gupta<>
695<>6346_14<>mihai badoiu:kedar dhamdhere:yuri rabinovich:harald racke:r. ravi:anastasios sidiropoulos<>approximation algorithms for low-distortion embeddings into low-dimensional spaces<>soda<>anupam gupta<>
700<>6346_19<>bruce m. maggs:florian oprea:michael k. reiter<>quorum placement in networks to minimize access delays<>podc<>anupam gupta<>
714<>6348_12<>naomi nishimura:andrzej proskurowski:prabhakar ragde<>embeddings of -connected graphs of pathwidth<>dam<>arvind gupta<>
640<>6350_0<>franjo ivancic:ilya shlyakhter:malay k. ganai<>model checking c programs using f-soft<>iccd<>aarti gupta<>
641<>6350_1<>franjo ivancic:zijiang yang:malay k. ganai:ilya shlyakhter:pranav ashar<>f-soft: software verification platform<>cav<>aarti gupta<>
642<>6350_2<>vineet kahlon:franjo ivancic<>reasoning about threads communicating via locks<>cav<>aarti gupta<>
646<>6350_6<>malay k. ganai:pranav ashar<>lazy constraints and sat heuristics for proof-based abstraction<>vlsid<>aarti gupta<>
648<>6350_8<>chao wang:franjo ivancic:malay k. ganai<>deciding separation logic formulae by sat and incremental negative cycle elimination<>lpar<>aarti gupta<>
650<>6350_10<>malay k. ganai:pranav ashar<>beyond safety: customized sat-based model checking<>dac<>aarti gupta<>
655<>6350_15<>daijue tang:sharad malik:c. norris ip<>symmetry reduction in sat-based model checking<>cav<>aarti gupta<>
656<>6350_16<>himanshu jain:franjo ivancic:malay k. ganai<>localization and register sharing for predicate abstraction<>tacas<>aarti gupta<>
659<>6350_19<>malay k. ganai:pranav ashar<>verification of embedded memory systems using efficient memory modeling<>date<>aarti gupta<>
13032<>6351_2<>elizabeth s. burnside:ines de castro dutra:david page:vitor santos costa<>an integrated approach to learning bayesian networks of rules<>ecml<>jesse davis<>
675<>6352_9<>mark terwilliger:ashfaq a. khokhar:garrison w. greenwood<>localization using evolution strategies in sensornets<>cec<>ajay gupta<>
13014<>6353_1<>simon poon:byounggu choi<>understanding information technology complementarities using an augmented endogenous growth framework<>icis<>joseph g. davis<>
722<>6356_1<>david c. noelle<>neurocomputational mechanisms for generalization during the sequential learning of multiple tasks<>iicai<>ashish gupta<>
12991<>6357_3<>mark a. keck<>a two-stage template approach to person detection in thermal imagery<>wacv<>james w. davis<>
728<>6358_4<>satwik seshasai:ashwani kumar<>an integrated and collaborative framework for business design: a knowledge engineering approach<>dke<>amar gupta<>
35337<>6359_5<>yuan zhang:fei chen:ziang hu:guang r. gao<>sequential consistency revisit: the sufficient condition and method to reason the consistency model of a multiprocessor-on-a-chip architecture<>pdcn<>weirong zhu<>
35339<>6359_7<>juan del cuvillo:ziang hu:guang r. gao<>tiny threads: a thread virtual machine for the cyclops64 cellular architecture<>ipps<>weirong zhu<>
35341<>6359_9<>yanwei niu:guang r. gao<>performance portability on earth: a case study across several parallel architectures<>ipps<>weirong zhu<>
35323<>6360_0<>nulo<>a distributed approach to estimate link-level loss rates<>ica3pp<>weiping zhu<>
35324<>6360_1<>zhi geng<>a bottom-up inference of loss rate<>comcom<>weiping zhu<>
35330<>6360_7<>nulo<>bottom up algorithm to identify link-level transition probability<>iccnmc<>weiping zhu<>
1664<>6363_3<>abdullah konak<>designing resilient networks using a hybrid genetic algorithm approach<>gecco<>alice e. smith<>
1653<>6364_1<>xavier boyen:yevgeniy dodis:jonathan katz:rafail ostrovsky<>secure remote authentication using biometric data<>eurocrypt<>adam smith<>
1657<>6364_5<>yevgeniy dodis<>entropic security and the encryption of high entropy messages<>tcc<>adam smith<>
1660<>6364_8<>yevgeniy dodis<>correcting errors without leaking partial information<>stoc<>adam smith<>
1650<>6365_1<>george a. constantinides:peter y. k. cheung<>an analytical approach to generation and exploration of reconfigurable architectures<>fpl<>alastair m. smith<>
1651<>6365_2<>nulo<>exploration of heterogeneous reconfigurable architectures<>fpl<>alastair m. smith<>
1643<>6366_2<>pavel sumazin:debopriya das:michael q. zhang<>mining chip-chip data for transcription factor and cofactor binding sites<>ismb<>andrew d. smith<>
1644<>6366_3<>andy pang:paulo a. s. nuin:elisabeth r. m. tillier<>simprot: using an empirically determined indel distribution in simulations of protein evolution<>bmcbi<>andrew d. smith<>
1647<>6366_6<>pavel sumazin:gengxin chen:naoya hata:theresa zhang:michael q. zhang<>dwe: discriminating word enumerator<>bioinformatics<>andrew d. smith<>
13051<>6369_1<>alan borning:batya friedman:peyina lin<>informing public deliberation: value sensitive design of indicators for a large-scale urban simulation<>ecscw<>janet davis<>
1586<>6370_4<>windsor w. hsu:honesty c. young<>the automatic improvement of locality in storage systems<>tocs<>alan jay smith<>
1579<>6372_2<>andreas g. veneris:moayad fahim ali:anastasios viglas<>fault diagnosis and logic debugging using boolean satisfiability<>tcad<>alexander smith<>
41621<>6377_11<>xin geng:de-chuan zhan<>supervised nonlinear dimensionality reduction for visualization and classification<>tsmc<>zhi-hua zhou<>
41622<>6377_12<>ming li<>tri-training: exploiting unlabeled data using three classifiers<>tkde<>zhi-hua zhou<>
41633<>6377_23<>yuan jiang:jinjiang ling:gang li:honghua dai<>dependency bagging<>rsfdgrc<>zhi-hua zhou<>
41636<>6377_26<>kai jiang:ming li<>multi-instance learning based web mining<>apin<>zhi-hua zhou<>
41644<>6377_34<>ming li<>setred: self-training with editing<>pakdd<>zhi-hua zhou<>
41651<>6377_41<>ning li:huajie zhou:jinjiang ling<>spiculated lesion detection in digital mammogram based on artificial neural network ensemble<>isnn<>zhi-hua zhou<>
41653<>6377_43<>ming li<>semi-supervised regression with co-training<>ijcai<>zhi-hua zhou<>
41667<>6377_57<>min-ling zhang<>a k-nearest neighbor based algorithm for multi-label classification<>grc<>zhi-hua zhou<>
41668<>6377_58<>xiao-bing xue:yuan jiang<>locating regions of interest in cbir with multi-instance learning techniques<>ausai<>zhi-hua zhou<>
41672<>6378_0<>peter damaschke<>on queuing lengths in on-line switching<>tcs<>zhen zhou<>
5606<>6379_2<>sebastian hunt:pasquale malacaria<>quantified interference for a while language<>entcs<>david clark<>
41671<>6380_0<>yew-soon ong:my hanh nguyen:dudy lim<>a study on polynomial regression and gaussian process global surrogate model in hierarchical surrogate-assisted evolutionary algorithm<>cec<>zongzhao zhou<>
18901<>6384_2<>kin-wai sze:guoping qiu<>a new key frame representation for video segment retrieval<>tcsv<>kin-man lam<>
18911<>6384_12<>kwok-wai wan:kit-chong ng<>an accurate active shape model for facial feature extraction<>prl<>kin-man lam<>
18919<>6384_20<>dang-hui liu:lan-sun shen<>illumination invariant face recognition<>pr<>kin-man lam<>
15032<>6388_3<>bo li:huai-rong shao:wenwu zhu:ya-qin zhang<>a proxy-assisted adaptation framework for object video multicasting<>tcsv<>jiangchuan liu<>
15033<>6388_4<>alan t. s. ip:john c. s. lui<>copacc: a cooperative proxy-client caching system for on-demand media streaming<>networking<>jiangchuan liu<>
15022<>6390_0<>josh dehlinger:robyn r. lutz<>safety analysis of software product lines using state-based modeling<>issre<>jing liu<>
15024<>6391_0<>daniele sacchetti:francoise sailhan:valerie issarny<>"group management for mobile ad hoc networks: design, implementation and experiment."<>mdm<>jinshan liu<>
15028<>6391_4<>sonia ben mokhtar:nikolaos georgantas:valerie issarny<>qos-aware dynamic service composition in ambient intelligence environments<>kbse<>jinshan liu<>
14966<>6393_0<>x. jin:kwok ching tsui<>autonomy-oriented computing (aoc): formulating computational systems with autonomous components<>tsmc<>jiming liu<>
14984<>6393_18<>xiaolong jin:yuanshi wang<>agent-based load balancing on homogeneous minigrids: macroscopic modeling and characterization<>tpds<>jiming liu<>
15010<>6393_44<>jinglun shi:weiping liu:kwok ching tsui<>anycast-based cooperative proxy caching<>apweb<>jiming liu<>
14958<>6394_4<>krishnan sundaresan:nihar r. mahapatra<>energy-efficient compressed address transmission<>vlsid<>jiangjiang liu<>
36293<>6398_0<>malcolm i. heywood:a. nur zincir-heywood<>evolving recurrent models using linear gp<>gecco<>xiao luo<>
30667<>6400_0<>aditya bagchi<>association against dissociation: some pragmatic considerations for frequent itemset generation under fixed and variable thresholds<>sigkdd<>sukomal pal<>
30665<>6402_0<>mainak chatterjee:sajal k. das<>a two-level resource management scheme in wireless networks based on user-satisfaction<>sigmobile<>sourav pal<>
40703<>6404_3<>byung suk lee:robert r. snapp<>self-tuning cost modeling of user-defined functions in an object-relational dbms<>tods<>zhen he<>
18743<>6411_2<>shanshan song:runfang zhou:yu-kwong kwok<>trusted p2p transactions with fuzzy reputation aggregation<>internet<>kai hwang<>
18745<>6411_4<>min cai:yu-kwong kwok:shanshan song:yu chen<>collaborative internet worm containment<>ieeesp<>kai hwang<>
18746<>6411_5<>shanshan song:yu-kwong kwok<>trusted grid computing with security binding and trust integration<>grid<>kai hwang<>
413<>6414_1<>ranadip pal:michael l. bittner:edward r. dougherty<>intervention in context-sensitive probabilistic boolean networks<>bioinformatics<>aniruddha datta<>
414<>6414_2<>ranadip pal:ivan ivanov:michael l. bittner:edward r. dougherty<>generating boolean networks with a prescribed attractor structure<>bioinformatics<>aniruddha datta<>
406<>6416_0<>michael backes:ante derek:john c. mitchell:mathieu turuani<>compositional analysis of contract signing protocols<>csfw<>anupam datta<>
410<>6416_4<>ante derek:john c. mitchell:dusko pavlovic<>a derivation system and compositional logic for security protocols<>jcs<>anupam datta<>
402<>6419_5<>maria gradinariu:michel raynal<>stabilizing mobile philosophers<>ipl<>ajoy kumar datta<>
3823<>6421_0<>louis-philippe morency:candace l. sidner:trevor darrell<>contextual recognition of head gestures<>icmi<>christopher lee<>
26653<>6425_5<>satrajit chatterjee:alan mishchenko:xinning wang:timothy kam<>reducing structural bias in technology mapping<>iccad<>robert k. brayton<>
26654<>6425_6<>alan mishchenko<>sat-based complete don't-care computation for network optimization<>date<>robert k. brayton<>
26664<>6425_16<>yinghua li:alex kondratyev<>synthesis methodology for built-in at-speed testing<>iccad<>robert k. brayton<>
26670<>6425_22<>yinghua li:alex kondratyev<>gaining predictability and noise immunity in global interconnects<>acsd<>robert k. brayton<>
26677<>6425_29<>alan mishchenko:jie-hong roland jiang:tiziano villa:nina yevtushenko<>efficient solution of language equations using partitioned representations<>date<>robert k. brayton<>
3772<>6428_3<>ryan boder<>real-time guarantee of aperiodic packets in single-hop ad hoc wireless networks<>rtcsa<>chang-gun lee<>
3776<>6428_7<>deepu c. thomas:sathish gopalakrishnan:marco caccamo<>spare cash: reclaiming holes to minimize aperiodic response times in a firm real-time environment<>ecrts<>chang-gun lee<>
3777<>6428_8<>kanghee kim:josi luis diaz:lucia lo bello:joso maroa lopez:sang lyul min<>an exact stochastic analysis of priority-driven periodic real-time systems and its approximations<>tc<>chang-gun lee<>
3782<>6428_13<>min-young nam:kanghee kim:marco caccamo<>time-parameterized sensing task model for real-time tracking<>rtss<>chang-gun lee<>
3787<>6428_18<>emad felemban:eylem ekici:ryan boder:serdar vural<>probabilistic qos guarantee in reliability and timeliness domains in wireless sensor networks<>infocom<>chang-gun lee<>
3792<>6429_4<>leonardo bonanni:ernesto arroyo:ted selker<>smart sinks: real-world opportunities for context-aware interaction<>chi<>chia-hsun lee<>
3793<>6429_5<>leonardo bonanni:ted selker<>a framework for designing intelligent task-oriented augmented reality user interfaces<>iui<>chia-hsun lee<>
3794<>6429_6<>leonardo bonanni:ted selker<>attention-based design of augmented reality interfaces<>chi<>chia-hsun lee<>
3795<>6431_0<>tiegang fang<>a moving-wall boundary layer flow of a slightly rarefied gas free stream over a moving flat plate<>appml<>chia-fon f. lee<>
3797<>6432_0<>amitabh varshney:david w. jacobs<>mesh saliency<>tog<>chang ha lee<>
10782<>6438_0<>david s. doermann<>adaptive ocr with limited user feedback<>icdar<>huanfeng ma<>
18088<>6448_0<>nicol n. schraudolph:douglas aberdeen<>fast online policy gradient learning with smd gain vector adaptation<>nips<>jin yu<>
18084<>6449_0<>jun yang:shaojie chen:yan luo:laxmi n. bhuyan<>enhancing network processor simulation speed with statistical input sampling<>hipeac<>jia yu<>
18086<>6449_2<>jun yang:youtao zhang<>a low energy cache design for multimedia applications exploiting set access locality<>jsa<>jia yu<>
18087<>6449_3<>yan luo:jun yang:laxmi n. bhuyan<>low power network processor design using clock gating<>dac<>jia yu<>
2729<>6451_3<>sudipto banerjee:robert j. kauffman<>a dynamic bayesian analysis of the drivers of internet firm survival<>ACMicec<>bin wang<>
2733<>6454_0<>dimitris papamichail:steffen mueller:steven skiena<>two proteins for the price of one: the design of maximally compressed coding sequences<>dna<>bei wang<>
2709<>6456_4<>wei wei:chun zhang:james f. kurose:donald f. towsley<>"classification of access network types: ethernet wireless lan, adsl, cable modem or dialup?"<>infocom<>bing wang<>
2714<>6457_0<>nulo<>specification of an infinite-state local model checker in rewriting logic<>seke<>bow-yaw wang<>
2717<>6457_3<>nulo<>mu-calculus model checking in maude<>entcs<>bow-yaw wang<>
37265<>6467_18<>pin ren:yan gao:zhichun li:benjamin watson<>idgraphs: intrusion detection and analysis using histographs<>vizsec<>yan chen<>
37331<>6468_1<>alexander markowetz:torsten suel:xiaohui long:bernhard seeger<>design and implementation of a geographic search engine<>webdb<>yen-yu chen<>
37325<>6469_0<>min cai:kai hwang:yu-kwong kwok:shanshan song<>collaborative internet worm containment<>ieeesp<>yu chen<>
37326<>6469_1<>kai hwang:yu-kwong kwok<>filtering of shrew ddos attacks in frequency domain<>lcn<>yu chen<>
37328<>6469_3<>kai hwang:yu-kwong kwok:shanshan song:min cai yu chen:runfang zhou:xiaosong lou<>gridsec: trusted grid computing with security binding and self-defense against network worms and ddos attacks<>iccS<>ying chen<>
37329<>6469_4<>yu-kwong kwok:kai hwang<>mafic: adaptive packet dropping for cutting malicious flows to push back ddos attacks<>icdcsw<>yu chen<>
37285<>6470_1<>wei-tek tsai:dawei zhang:hai huang<>voting multi-dimensional data with deviations for web services under group testing<>icdcsw<>yinong chen<>
37289<>6470_5<>susan b. davidson:yifeng zheng<>vitex: a streaming xpath processing system<>icde<>yi chen<>
37290<>6470_6<>wei-tek tsai:dawei zhang:raymond a. paul<>stochastic voting algorithms for web services group testing<>qsic<>yinong chen<>
37293<>6470_9<>wei-tek tsai:raymond a. paul<>specification-based verification and validation of web services and service-oriented operating systems<>words<>yinong chen<>
37300<>6470_16<>wei-tek tsai:xinxin liu:raymond a. paul<>simulation verification and validation by dynamic policy enforcement<>anss<>yinong chen<>
37306<>6470_22<>wei-tek tsai:xinxin liu<>distributed policy specification and enforcement in service-oriented business systems<>icebe<>yinong chen<>
37310<>6470_26<>hai huang:wei-tek tsai<>autonomous hot patching for web-based applications<>compsac<>yinong chen<>
37320<>6470_36<>charles j. colbourn:wei-tek tsai<>progressive ranking and composition of web services using covering arrays<>words<>yinong chen<>
37324<>6470_40<>wei-tek tsai:raymond a. paul:hai huang:xinyu zhou:xiao wei<>"adaptive testing, oracle generation, and test case ranking for web services."<>compsac<>yinong chen<>
37275<>6471_9<>dian tjondronegoro<>multi-level semantic analysis for sports video<>kes<>yi-ping phoebe chen<>
37276<>6471_10<>dian tjondronegoro:binh pham<>content-based video indexing for sports applications using integrated multi-modal approach<>mm<>yi-ping phoebe chen<>
37277<>6471_11<>jiyuan an<>yet another induction algorithm<>kes<>yi-ping phoebe chen<>
37279<>6471_13<>jiyuan an:chinnu subramaniam<>side chain conformational preferences in protein structures<>metmbs<>yi-ping phoebe chen<>
37282<>6471_16<>jiyuan an:qinying xu:xiaofang zhou<>a new indexing method for high dimensional dataset<>dasfaa<>yi-ping phoebe chen<>
37283<>6471_17<>qingfeng chen<>analyzing security protocols using association rule mining<>ausai<>yi-ping phoebe chen<>
37342<>6472_0<>hai li:kaushik roy:cheng-kok koh<>cascaded carry-select adder (csa): a new structure for low-power csa design<>islped<>yiran chen<>
37344<>6473_0<>zoltun furedi<>minimum vertex-diameter-2-critical graphs<>jgt<>ya-chen chen<>
37338<>6475_1<>sarat c. dass:anil k. jain<>fingerprint quality indices for predicting authentication performance<>avbpa<>yi chen<>
37339<>6475_2<>sarat c. dass:arun ross:anil k. jain<>fingerprint deformation models using minutiae locations and orientations<>wacv<>yi chen<>
28607<>6476_1<>anastassia ailamaki:phillip b. gibbons:todd c. mowry<>inspector joins<>vldb<>shimin chen<>
28610<>6476_4<>phillip b. gibbons:suman nath<>database-centric programming for wide-area sensor systems<>dcoss<>shimin chen<>
28601<>6480_2<>haining wang:xiaodong zhang:bo shen:susie wee<>segment-based proxy caching for internet streaming media delivery<>ieeemm<>songqing chen<>
28603<>6480_4<>xinwen zhang:ravi s. sandhu<>enhancing data authenticity and integrity in p2p systems<>internet<>songqing chen<>
25504<>6484_3<>yudong sun:anil wipat:matthew r. pocock:p. watson:k. flanagan:j. t. worthington<>a grid-based system for microbial genome comparison and analysis<>ccgrid<>p. a. lee<>
25497<>6486_0<>alexander klippel:heike tappe:lars kulik<>wayfinding choremes - a language for modeling conceptual route knowledge<>vlc<>paul u. lee<>
28596<>6487_2<>lei guo:zhen xiao:xiaodong zhang<>analysis of multimedia workloads with implications for internet streaming<>www<>songqing chen<>
28597<>6487_3<>lei guo:zhen xiao:enhua tan:xiaoning ding:xiaodong zhang<>"measurements, analysis, and modeling of bittorrent-like systems."<>imc<>songqing chen<>
28548<>6490_9<>kasun wickramaratna:min chen:mei-ling shyu<>neural network based framework for goal event detection in soccer videos<>ism<>shu-ching chen<>
28549<>6490_10<>xin chen:chengcui zhang:min chen<>a latent semantic indexing based method for solving multiple instance learning problem in region-based image retrieval<>ism<>shu-ching chen<>
28563<>6490_24<>mei-ling shyu:indika kuruppu-appuhamilage:liwu chang<>handling missing values via decomposition of the conditioned set<>iri<>shu-ching chen<>
28568<>6490_29<>mei-ling shyu:kanoksri sarinnapakorn:indika kuruppu-appuhamilage:liwu chang:thomas goldring<>handling nominal features in anomaly intrusion detection problems<>ride<>shu-ching chen<>
28574<>6490_35<>mei-ling shyu:na zhao<>an enhanced query model for soccer video retrieval using temporal relationships<>icde<>shu-ching chen<>
28582<>6490_43<>yimin zhu:mei-ling shyu<>data integration for capital projects via community-specific conceptual representations<>iri<>shu-ching chen<>
25528<>6495_16<>ajay chander:david espinosa:nayeem islam:george c. necula<>enforcing resource bounds via static verification of dynamic checks<>esop<>peter lee<>
9839<>6496_2<>ju yong lee:eunseuk oh<>hardness on ip-subnet aware routing in wdm network<>icoin<>hongsik choi<>
25542<>6499_2<>vishal misra:dan rubenstein<>distributed algorithms for secure multipath routing<>infocom<>patrick p. c. lee<>
9851<>6503_1<>vu-duc ngo:huy nam nguyen<>designing on-chip network based on optimal latency criteria<>icess<>hae-wook choi<>
9852<>6503_2<>huy nam nguyen:vu-duc ngo<>realization of video object plane decoder on on-chip network architecture<>icess<>hae-wook choi<>
9854<>6503_4<>huy nam nguyen:vu-duc ngo<>realization of video object plane decoder on mesh on-chip network architecture<>iastedCCS<>hae-wook choi<>
9855<>6503_5<>vu-duc ngo:huy nam nguyen<>analyzing the performance of mesh and fat-tree topologies for network on chip design<>euc<>hae-wook choi<>
9856<>6504_0<>william enck:jaesheung shin:patrick mcdaniel:thomas f. la porta<>secure reporting of traffic forwarding activity in mobile ad hoc networks<>mobiquitous<>heesook choi<>
9858<>6504_2<>hui song:guohong cao:thomas f. la porta<>mobile multi-layered ipsec<>infocom<>heesook choi<>
32867<>6506_2<>hwann-tzong chen:chiou-shann fuh<>learning effective image metrics from few pairwise examples<>iccv<>tyng-luh liu<>
32870<>6506_5<>yen-yu lin:hwann-tzong chen<>semantic manifold learning for image retrieval<>mm<>tyng-luh liu<>
32873<>6506_8<>yen-yu lin<>shape recognition using fast boosted filtering<>icip<>tyng-luh liu<>
32874<>6506_9<>hwann-tzong chen:huang-wei chang<>local discriminant embedding and its variants<>cvpr<>tyng-luh liu<>
32875<>6506_10<>yen-yu lin<>robust face detection with multi-class boosting<>cvpr<>tyng-luh liu<>
32878<>6506_13<>hwann-tzong chen:chiou-shann fuh<>tone reproduction: a perspective from luminance-driven perceptual grouping<>ijcv<>tyng-luh liu<>
32882<>6506_17<>hwann-tzong chen:tien-lung chang<>tone reproduction: a perspective from luminance-driven perceptual grouping<>cvpr<>tyng-luh liu<>
4026<>6507_0<>hugo zaragoza<>learning what to talk about in descriptive games<>naacl<>chi-ho li<>
32845<>6508_4<>guang feng:xu-dong zhang:tao qin:bin gao:wei-ying ma<>level-based link analysis<>apweb<>tie-yan liu<>
32848<>6508_7<>tao qin:xu-dong zhang:wei-ying ma:hongjiang zhang<>subspace clustering and label propagation for active feedback in image retrieval<>mmm<>tie-yan liu<>
32851<>6508_10<>bin gao:xin zheng:qiansheng cheng:wei-ying ma<>consistent bipartite graph co-partitioning for star-structured high-order heterogeneous data co-clustering<>kdd<>tie-yan liu<>
32854<>6508_13<>wei-ying ma<>webpage importance analysis using conditional markov random walk<>webi<>tie-yan liu<>
32856<>6508_15<>hao wan:tao qin:zheng chen:yong ren:wei-ying ma<>site abstraction for rare category classification in large-scale web directory<>www<>tie-yan liu<>
32860<>6508_19<>yiming yang:hao wan:qian zhou:bin gao:hua-jun zeng:zheng chen:wei-ying ma<>an experimental study on large-scale web categorization<>www<>tie-yan liu<>
32861<>6508_20<>wei-ying ma:hongjiang zhang<>effective feature extraction for play detection in american football video<>mmm<>tie-yan liu<>
32864<>6508_23<>hui-min yan:tao qin:xu-dong zhang:guang feng:wei-ying ma<>calculating webpage importance with site structure constraints<>airs<>tie-yan liu<>
4031<>6509_1<>lizhu zhou:chunxiao xing<>using mmq model for performance simulation of storage area network<>icde<>chao li<>
32894<>6510_0<>nanning zheng:hong cheng<>neural network based online feature selection for vehicle tracking<>isnn<>tie liu<>
36079<>6515_0<>jian fan:steven j. simske<>a comprehensive image processing suite for book re-mastering<>icdar<>xiaofan lin<>
36090<>6515_11<>nulo<>active document layout synthesis<>icdar<>xiaofan lin<>
36091<>6515_12<>simon m. lucas:alex panaretos:luis sosa:anthony tang:shirley wong:robert young:kazuki ashida:hiroki nagai:masayuki okamoto:hiroaki yamamoto:hidetoshi miyao:junmin zhu:wuwen ou:christian wolf:jean-michel jolion:leon todoran:marcel worring<>"icdar 2003 robust reading competitions: entries, results, and future directions."<>ijdar<>xiaofan lin<>
36048<>6516_1<>zheng liu:jeffrey xu yu:hongjun lu:wei wang<>locating motifs in time-series data<>pakdd<>xuemin lin<>
36050<>6516_3<>yi luo:zheng liu:wei wang:jeffrey xu yu<>similarity search with implicit object features<>waim<>xuemin lin<>
36052<>6516_5<>yidong yuan:qing liu:wei wang:jeffrey xu yu:qing zhang<>efficient computation of the skyline cube<>vldb<>xuemin lin<>
36054<>6516_7<>hongzhi wang:wei wang:jianzhong li<>labeling scheme and structural joins for graph-structured xml data<>apweb<>xuemin lin<>
36058<>6516_11<>hongzhi wang:wei wang:jianzhong li:reymond wong<>practical indexing xml document for twig query<>asian<>xuemin lin<>
36070<>6516_23<>wei wang:diep bich do<>term graph model for text classification<>adma<>xuemin lin<>
36116<>6517_0<>jiazheng zhou:chun-hsien wu:yeh-ching chung<>multicast in fat-tree-based infiniband networks<>nca<>xuan-yi lin<>
36109<>6519_0<>ness b. shroff<>simplification of network dynamics in large systems<>ton<>xiaojun lin<>
36108<>6521_2<>chris clifton:michael y. zhu<>privacy-preserving clustering with distributed em mixture modeling<>kais<>xiaodong lin<>
10104<>6529_0<>michael n. huhns<>broadening the semantic coverage of agent communicative acts<>aois<>hong jiang<>
10105<>6529_1<>michael n. huhns<>an approach to broaden the semantic coverage of acl speech acts<>er<>hong jiang<>
10098<>6531_0<>nulo<>confidence measures for speech recognition: a survey<>speech<>hui jiang<>
10100<>6532_0<>shudong jin<>adaptive strategies for efficiently locating internet-based servers in manets<>mswim<>hongbo jiang<>
28039<>6534_0<>ling-yun wu:zhen-ping li:xiang-sun zhang<>haplotype reconstruction from snp fragments by minimum error correction<>bioinformatics<>rui-sheng wang<>
10096<>6535_0<>dana angluin:james aspnes:melody chan:michael j. fischer:rene peralta<>stably computable properties of network graphs<>dcoss<>hong jiang<>
10097<>6535_1<>dana angluin:james aspnes:michael j. fischer<>self-stabilizing population protocols<>opodis<>hong jiang<>
28036<>6536_0<>nicola stokes:william p. doran:eamonn newman:john dunnion:joe carthy<>lextrim: a lexical cohesion based approach to parse-and-trim style headline generation<>cicling<>ruichao wang<>
28038<>6536_2<>nicola stokes:william p. doran:eamonn newman:joe carthy:john dunnion<>news headline generation based on linguistic methods<>aia<>ruichao wang<>
28042<>6538_1<>luonan chen:zhujun jing:kazuyuki aihara<>cooperative dynamics coordinated by stochastic noise in a multi-cell system<>iscas<>ruiqi wang<>
28043<>6538_2<>luonan chen:tianshou zhou:kazuyuki aihara<>noise-induced cooperative behavior in a multicell system<>bioinformatics<>ruiqi wang<>
29143<>6539_6<>swee leong<>stress testing a supply chain using simulation<>wsc<>sanjay jain<>
29147<>6539_10<>charles r. mclean<>integrated simulation and gaming architecture for incident management training<>wsc<>sanjay jain<>
10064<>6540_12<>nader mohamed:jameela al-jaroodi<>dependable user-level socket over dual networks<>jpdc<>hong jiang<>
10079<>6540_27<>yijun lu:dan feng<>"an efficient, low-cost inconsistency detection framework for data and service sharing in an internet-scale system."<>icebe<>hong jiang<>
10081<>6540_29<>x. qin<>improving effective bandwidth of networks on clusters using load balancing for communication-intensive applications<>ipccc<>h. jiang<>
10084<>6540_32<>jameela al-jaroodi:nader mohamed:david r. swanson<>jopi: a java object-passing interface<>concurrency<>hong jiang<>
28023<>6542_14<>chi zhang:arvind krishnamurthy<>brushwood: distributed trees in peer-to-peer systems<>iptps<>randolph y. wang<>
28032<>6548_1<>jie chen:shengye yan:wen gao<>face detection based on the manifold<>avbpa<>ruiping wang<>
28033<>6548_2<>jie chen:shengye yan:shiguang shan:xilin chen:wen gao<>how to train a classifier based on the huge face database?<>amfg<>ruiping wang<>
39295<>6550_10<>chi-fu huang<>the coverage problem in a wireless sensor network<>monet<>yu-chee tseng<>
39300<>6550_15<>chih-min chao:li-chun wang<>dynamic bandwidth allocation for multimedia traffic with rate guarantee and fair access in wcdma systems<>tmc<>yu-chee tseng<>
39327<>6550_42<>chi-fu huang:li-chu lo:wen-tsuen chen<>decentralized energy-conserving and coverage-preserving protocols for wireless sensor networks<>iscas<>yu-chee tseng<>
28477<>6553_1<>nulo<>the design of a secure and pervasive multimodal web system<>aina<>s. ernest chang<>
28470<>6556_2<>hark-chin hwang:sanghyuck park<>a two-dimensional vector packing model for the efficient use of coil cassettes<>cor<>soo y. chang<>
28471<>6556_3<>hark-chin hwang:kangbok lee<>the effect of machine availability on the worst-case performance of lpt<>dam<>soo y. chang<>
28472<>6556_4<>hark-chin hwang<>order consolidation for batch processing<>jco<>soo y. chang<>
28486<>6559_0<>ray-i chang:jan-ming ho:yen-jen oyang<>an optimal cache algorithm for streaming vbr video over a heterogeneous network<>comcom<>shin-hung chang<>
21816<>6562_6<>tao sun:morihiko tamai:keiichi yasumoto:naoki shibata:masaaki mori<>mtcast: robust and efficient p2p-based video delivery for heterogeneous users<>opodis<>minoru ito<>
40873<>6570_0<>wee keong ng:aixin sun<>web data extraction based on structural similarity<>kais<>zhao li<>
40875<>6570_2<>wee keong ng<>wdee: web data extraction by example<>dasfaa<>zhao li<>
20697<>6575_6<>jude lubega:shirley williams<>a design for generating personalised feedback in knowledge construction<>icwl<>lily sun<>
20686<>6576_8<>xue-gang chen:de-xiang ma<>a note on graphs with largest total k-domination number<>arscom<>liang sun<>
20687<>6576_9<>hua-ming xing:xue-gang chen<>on a generalization of signed total dominating functions of graphs<>arscom<>liang sun<>
40856<>6577_1<>xiang lu:wangqi qiu:d. m. h. walker:weiping shi<>longest-path selection for delay test under process variation<>tcad<>zhuo li<>
40860<>6577_5<>cliff n. sze:charles j. alpert:jiang hu:weiping shi<>making fast buffer insertion even faster via approximation techniques<>aspdac<>zhuo li<>
40866<>6578_3<>zhifeng chen:yuanyuan zhou<>mining block correlations to improve storage performance<>tos<>zhenmin li<>
40835<>6579_20<>rong xu<>a sample-based cache mapping scheme<>lctrts<>zhiyuan li<>
40839<>6579_24<>yonghong song:cheng wang<>a polynomial-time algorithm for memory space reduction<>ijpp<>zhiyuan li<>
40813<>6581_1<>xianlong hong:qiang zhou:yici cai:jinian bian:hannal yang:prashant saxena:vijay pitchumani<>a divide-and-conquer 2.5-d floorplanning algorithm based on statistical wirelength estimation<>iscas<>zhuoyuan li<>
1416<>6583_4<>yonit kesten<>a compositional approach to ctl* verification<>tcs<>amir pnueli<>
1368<>6584_82<>yonit kesten:nir piterman<>bridging the gap between fair simulation and trace inclusion<>iandc<>amir pnueli<>
39163<>6589_0<>ben leslie:peter chubb:nicholas fitzroy-dale:stefan gotz:charles gray:luke macpherson:daniel potts:kevin elphinstone:gernot heiser<>user-level device drivers: achieved performance<>jcst<>yue-ting shen<>
39156<>6591_1<>bing wang:ling feng<>efficient xpath evaluation<>adbis<>yun shen<>
39142<>6596_1<>pamela c. cosman:laurence b. milstein<>video coding for a time varying tandem channel with feedback<>dcc<>yushi shen<>
41171<>6600_0<>qingyong li:zhiping shi:jun shi<>swarm intelligence clustering algorithm based on attractor<>icnc<>zhongzhi shi<>
7120<>6601_5<>joseph k. liu:patrick p. tsang:robert w. zhu<>universal custodian-hiding verifiable encryption for discrete logarithms<>icisc<>duncan s. wong<>
7122<>6601_7<>guomin yang:xiaotie deng<>deposit-case attack against secure roaming<>acisp<>duncan s. wong<>
7125<>6601_10<>joseph k. liu:patrick p. tsang<>recoverable and untraceable e-cash<>europki<>duncan s. wong<>
7126<>6601_11<>robert w. zhu:guomin yang<>an efficient identity-based key exchange protocol with kgs forward secrecy for low-power devices<>wine<>duncan s. wong<>
7129<>6601_14<>nulo<>security analysis of two anonymous authentication protocols for distributed wireless networks<>percom<>duncan s. wong<>
7131<>6601_16<>joseph k. liu<>a restricted multi-show credential system and its application on e-voting<>ispec<>duncan s. wong<>
7135<>6601_20<>joseph k. liu:patrick p. tsang<>efficient verifiable ring encryption for ad hoc groups<>esas<>duncan s. wong<>
7136<>6601_21<>guomin yang:xiaotie deng<>efficient anonymous roaming and its security analysis<>acns<>duncan s. wong<>
7138<>6601_23<>jonathan wong<>known session key attack against a collection of signcryption schemes<>csreaSAM<>duncan s. wong<>
7146<>6601_31<>guomin yang:xiaotie deng<>analysis and improvement of a signcryption scheme with key privacy<>isw<>duncan s. wong<>
7147<>6601_32<>agnes hui chan:feng zhu<>password authenticated key exchange for resource-constrained wireless communications (extended abstract)<>icn<>duncan s. wong<>
41173<>6602_0<>wayne goddard:stephen t. hedetniemi:ken kennedy:renu laskar:alice a. mcrae<>an algorithm for partial grundy number on trees<>dm<>zhengnan shi<>
13353<>6603_1<>guorong xuan:yun q. shi:dekun zou:chengyun yang:zhenping zhang:peiqi chai:chunhua chen:wen chen<>steganalysis based on multiple features formed by statistical moments of wavelet characteristic functions<>ih<>jianjiong gao<>
13355<>6603_3<>yun q. shi:guorong xuan:chengyun yang:zhenping zhang:peiqi chai:dekun zou:chunhua chen:wen chen<>effective steganalysis based on statistical moments of wavelet characteristic function<>itcc<>jianjiong gao<>
13361<>6604_5<>jehoshua bruck:anxiao jiang<>localization and routing in sensor networks by local angle information<>mobihoc<>jie gao<>
13366<>6604_10<>jehoshua bruck:anxiao jiang<>map: medial axis based geometric routing in sensor networks<>mobicom<>jie gao<>
13367<>6604_11<>pankaj k. agarwal:mark de berg:leonidas j. guibas:sariel har-peled<>staying in the middle: exact and approximate medians in r1 and r2 for moving points<>cccg<>jie gao<>
13368<>6604_12<>qing fang:leonidas j. guibas:v. de silva:li zhang<>glider: gradient landmark-based distributed routing for sensor networks<>infocom<>jie gao<>
13371<>6604_15<>leonidas j. guibas:an nguyen<>distributed proximity maintenance in ad hoc mobile networks<>dcoss<>jie gao<>
13377<>6604_21<>li zhang<>well-separated pair decomposition for the unit-disk graph metric and its applications<>siamcomp<>jie gao<>
41165<>6606_5<>ruby b. lee:xiao yang<>single-cycle bit permutations with momr execution<>jcst<>zhijie shi<>
13391<>6609_1<>jian huang:c. ryan johnson:scott atchley:james arthur kohl<>distributed data management for large volume visualization<>visualization<>jinzhu gao<>
13394<>6609_4<>chaoli wang:liya li:han-wei shen<>a multiresolution volume rendering framework for large-scale time-varying data visualization<>vg<>jinzhu gao<>
13404<>6610_2<>jung hun oh<>peptide identification by tandem mass spectra: an efficient parallel searching<>bibe<>jean gao<>
13405<>6610_3<>young bun kim<>a new semi-supervised subspace clustering algorithm on fitting mixture models<>cibcb<>jean gao<>
13407<>6610_5<>akio kosaka:avinash c. kak<>a multi-kalman filtering approach for video tracking of human-delineated objects in cluttered environments<>cviu<>jean gao<>
13408<>6610_6<>ninad thakoor<>automatic video object shape extraction and its classification with camera in motion<>icip<>jean gao<>
7441<>6614_1<>bernhard scholkopf<>regularization on discrete spaces<>dagm<>dengyong zhou<>
7442<>6614_2<>jiayuan huang:bernhard scholkopf<>learning from labeled and unlabeled data on a directed graph<>icml<>dengyong zhou<>
7445<>6614_5<>jason weston:christina s. leslie:eugene ie:andre elisseeff:william stafford noble<>semi-supervised protein classification using cluster kernels<>bioinformatics<>dengyong zhou<>
7449<>6615_0<>zunping cheng:chen wang:jiankui guo:wei wang:baokang ding:baile shi<>clinch: clustering incomplete high-dimensional data for data mining application<>apweb<>ding zhou<>
7456<>6615_7<>jia li:hongyuan zha<>a new mallows distance based metric for comparing clusterings<>icml<>ding zhou<>
4820<>6623_11<>bing li:fabio somenzi<>abstraction refinement in symbolic model checking using satisfiability as the only decision procedure<>sttt<>chao wang<>
4825<>6623_16<>franjo ivancic:malay k. ganai:aarti gupta<>deciding separation logic formulae by sat and incremental negative cycle elimination<>lpar<>chao wang<>
4829<>6624_3<>li xiao:pei zheng<>differentiated search in hierarchical peer-to-peer networks<>icpp<>chen wang<>
31628<>6630_4<>chi k. michael tse<>optimum design of very low distortion class e power amplifiers<>iscas<>siu chung wong<>
31632<>6633_2<>roberto cipolla<>real-time adaptive hand motion recognition using a sparse bayesian classifier<>iccv<>shu-fai wong<>
31602<>6635_1<>lee middleton:michael o. jewell:john n. carter:mark s. nixon<>lightweight agent framework for camera array applications<>kes<>sylvia c. wong<>
31603<>6635_2<>michael o. jewell:lee middleton:mark s. nixon:adam prugel-bennett<>a distributed approach to musical composition<>kes<>sylvia c. wong<>
31604<>6635_3<>mark baker:aamir shafi:bryan carpenter:victor tan:weijian fang:simon miles:luc moreau<>cluster computing and grid 2005 works in progress<>dsonline<>sylvia c. wong<>
31608<>6635_7<>simon miles:weijian fang:paul t. groth:luc moreau<>provenance-based validation of e-science experiments<>semweb<>sylvia c. wong<>
31615<>6637_0<>xiaobo zhou:kuang-yu liu:pamela bradley:norbert perrimon<>towards automated cellular image segmentation for rnai genome-wide screening<>miccai<>stephen t. c. wong<>
31616<>6637_1<>tianming liu:geoffrey young:ling huang:nankuei chen<>76-space analysis of grey matter diffusivity: methods and applications<>miccai<>stephen t. c. wong<>
33230<>6642_0<>nulo<>on line graphs which are weakly maximal clique irreducible<>arscom<>tao-ming wang<>
33232<>6643_0<>anup basu:irene cheng<>balanced incomplete designs for 3d perceptual quality estimation<>icip<>tao wang<>
19780<>6647_0<>nulo<>automatic hyperparameter estimation in probabilistic image restoration algorithm based on gibbs microcanonical distribution<>scjapan<>kazuyuki tanaka<>
19781<>6647_1<>nulo<>statistical learning procedure in loopy belief propagation for probabilistic image processing<>cimca<>kazuyuki tanaka<>
19782<>6647_2<>nulo<>linear response formula in generalized belief propagation for probabilistic inference<>cimca<>kazuyuki tanaka<>
19783<>6647_3<>jun ohkubo<>preferential urn model on a random network<>cimca<>kazuyuki tanaka<>
19794<>6648_2<>susumu tachi<>tornado: omnistereo video imaging with rotating optics<>tvcg<>kenji tanaka<>
1120<>6654_0<>bianca schon:gregory m. p. o'hare:brian r. duffy:john f. bradley<>the ampere algorithm - area-based masking with the performance equation<>flairs<>alan n. martin<>
1121<>6654_1<>gregory m. p. o'hare:brian r. duffy:bianca schon:john f. bradley<>maintaining the identity of dynamically embodied agents<>iva<>alan n. martin<>
1124<>6654_4<>bianca schon:gregory m. p. o'hare:brian r. duffy:john f. bradley<>agent assistance for 3d world navigation<>iva<>alan n. martin<>
1133<>6657_1<>nulo<>mapping pdb chains to uniprotkb entries<>bioinformatics<>andrew c. r. martin<>
4265<>6660_6<>wei fan:janek mathuria<>making data mining models useful to model non-paying customers of exchange carriers<>sdm<>chang-tien lu<>
4272<>6660_13<>arnold p. boedihardjo:prajwal manalwar<>exploiting efficient data mining techniques to enhance intrusion detection systems<>iri<>chang-tien lu<>
41525<>6666_1<>jianzhi li:hongji yang<>a grid oriented approach to reusing legacy code in iceni framework<>iri<>zhuopeng zhang<>
41527<>6666_3<>ruimin liu:hongji yang<>service identification and packaging in service oriented reengineering<>seke<>zhuopeng zhang<>
41528<>6666_4<>jianjun pu:yang xu:hongji yang<>reusing legacy cobol code with uml collaboration diagrams via a wide spectrum language<>iri<>zhuopeng zhang<>
41530<>6666_6<>dong guo:liang hu:meng zhang<>gcpsensor: a cpu performance tool for grid environments<>qsic<>zhuopeng zhang<>
41506<>6668_0<>yuanyuan yang<>performance analysis of k-fold multicast networks<>tcom<>zhenghao zhang<>
41509<>6668_3<>yuanyuan yang<>a novel analytical model for electronic and optical switches with shared buffer<>infocom<>zhenghao zhang<>
41510<>6668_4<>chi ma:yuanyuan yang<>constructing battery-aware virtual backbones in sensor networks<>icpp<>zhenghao zhang<>
41511<>6668_5<>yuanyuan yang<>on-line optimal wavelength assignment in wdm networks with shared wavelength converter pool<>infocom<>zhenghao zhang<>
41517<>6668_11<>ming ma:yuanyuan yang<>energy efficient multi-hop polling in clusters of two-layered heterogeneous sensor networks<>ipps<>zhenghao zhang<>
41404<>6670_0<>bo long:philip s. yu<>combining multiple clusterings by soft correspondence<>icdm<>zhongfei (mark) zhang<>
41405<>6670_1<>jian yao<>object detection in aerial imagery based on enhanced semi-supervised learning<>iccv<>zhongfei (mark) zhang<>
41406<>6670_2<>bo long:philip s. yu<>co-clustering by block value decomposition<>kdd<>zhongfei (mark) zhang<>
41482<>6672_5<>nulo<>on the three threshold policy in the multi-server queueing system with vacations<>questa<>zhe zhang<>
41440<>6673_1<>kuai xu:supratik bhattacharyya<>profiling internet backbone traffic: behavior models and applications<>sigcomm<>zhi-li zhang<>
41442<>6673_3<>yinzhe yu:sanghwan lee<>leopard: a locality aware peer-to-peer system with no hot spot<>networking<>zhi-li zhang<>
41450<>6673_11<>jaideep chandrashekar:zhenhai duan:j. krasky<>limiting path exploration in bgp<>infocom<>zhi-li zhang<>
41453<>6673_14<>changho choi:yingfei dong<>lips: lightweight internet permit system for stopping unwanted packets<>networking<>zhi-li zhang<>
41460<>6673_21<>shu tao:kuai xu:antonio estepa:teng fei:lixin gao:roch guerin:james f. kurose:donald f. towsley<>improving voip quality through path switching<>infocom<>zhi-li zhang<>
41475<>6673_36<>zhenhai duan:yiwei thomas hou<>fundamental trade-offs in aggregate packet scheduling<>tpds<>zhi-li zhang<>
41411<>6674_1<>guodong guo:charles r. dyer<>linear combination representation for outlier detection in motion tracking<>cvpr<>zhengyou zhang<>
3674<>6675_10<>jon burton<>investigating atomicity and observability<>jucs<>cliff b. jones<>
3692<>6675_28<>david b. lomet:alexander b. romanovsky:gerhard weikum<>the atomic manifesto<>jucs<>cliff b. jones<>
3704<>6676_10<>j. mark ware<>map generalization in the web age<>gis<>christopher b. jones<>
3709<>6681_0<>ute baumann:alfred l. brown<>automated methods of predicting the function of biological sequences using go and blast<>bmcbi<>craig e. jones<>
1868<>6684_5<>nir ailon<>information theory in property testing and monotonicity testing in higher dimension<>stacs<>bernard chazelle<>
1906<>6684_43<>sanjeev arora<>is the thrill gone?<>cacm<>bernard chazelle<>
1936<>6684_73<>ding liu:avner magen<>sublinear geometric algorithms<>siamcomp<>bernard chazelle<>
1946<>6684_83<>nir ailon<>lower bounds for linear degeneracy testing<>jacm<>bernard chazelle<>
36898<>6687_0<>uwe bubeck:hans kleine buning<>quantifier rewriting and equivalence models for quantified horn formulas<>sat<>xishun zhao<>
36896<>6690_0<>ross a. lippert:liliana florea:clark mobarry:sorin istrail<>finding anchors for genomic sequence comparison<>jcb<>xiaoyue zhao<>
36887<>6692_2<>zongyan qiu:shuling wang:geguang pu<>semantics of bpel4ws-like fault and compensation handling<>fm<>xiangpeng zhao<>
4988<>6695_0<>kwang-ting cheng:qiang zhu:yi-leh wu<>using visual features for anti-spam filtering<>icip<>ching-tung wu<>
4991<>6696_1<>omer tsimhoni<>learning simulation through team projects<>wsc<>changxu wu<>
4995<>6698_0<>alan t. murray<>a cokriging method for estimating population density in urban areas<>urban<>changshan wu<>
18474<>6700_4<>kenneth a. ross:john cieslewicz:jun rao<>architecture sensitive database design: examples from the columbia group<>debu<>jingren zhou<>
18476<>6700_6<>john cieslewicz:kenneth a. ross:mihir shah<>improving database performance on simultaneous multithreading processors<>vldb<>jingren zhou<>
18467<>6702_1<>kenneth man-kin chu:joseph kee-yin ng<>an improved ellipse propagation model for location estimation in facilitating ubiquitous computing<>rtcsa<>junyang zhou<>
11658<>6705_0<>zhonghua ma:bin qiu<>a robust structure-adaptive hybrid vector filter for color image restoration<>tip<>hong ren wu<>
18405<>6710_2<>di ma:robert h. deng:hweehwa pang<>authenticating query results in data publishing<>icics<>jianying zhou<>
18407<>6710_4<>rodrigo roman:javier lopez<>on the security of wireless sensor networks<>iccsa<>jianying zhou<>
18412<>6710_9<>junghoon ha:sang-jae moon<>a robust double auction protocol based on a hybrid trust model<>iciss<>jianying zhou<>
18414<>6710_11<>kenji imamoto:kouichi sakurai<>an evenhanded certified email system for contract signing<>icics<>jianying zhou<>
18418<>6710_15<>junghoon ha:sang-jae moon<>an improved double auction protocol against false bids<>trustbus<>jianying zhou<>
18421<>6710_18<>shiqun li:xiangxue li:kefei chen<>an authentication protocol for pervasive computing<>ispa<>jianying zhou<>
18426<>6710_23<>zhuowei li:amitabha das<>model generalization and its implications on intrusion detection<>acns<>jianying zhou<>
18435<>6710_32<>rodrigo roman:javier lopez<>protection against spam using pre-challenges<>sec<>jianying zhou<>
18443<>6710_40<>tanmoy kanti das<>cryptanalysis of barni et al. watermarking scheme<>indocrypt<>jianying zhou<>
18393<>6712_0<>wentong cai:stephen john turner:bu-sung lee<>an alternative time management mechanism for distributed simulations<>tomacs<>junlan zhou<>
18400<>6712_7<>mineo takai:rajive bagrodia<>performance evaluation of directional adaptive range control in mobile ad hoc networks<>winet<>junlan zhou<>
11652<>6713_0<>yiu-ming cheung<>a new fragile mesh watermarking algorithm for authentication<>sec<>hao-tian wu<>
11653<>6713_1<>yiu-ming cheung<>a reversible data hiding approach to mesh authentication<>webi<>hao-tian wu<>
18461<>6714_3<>kendra cooper:i-ling yen:raymond a. paul<>rule-base technique for component adaptation to support qos-based reconfiguration<>isorc<>jia zhou<>
6664<>6715_0<>shie mannor:reuven y. rubinstein<>the cross entropy method for classification<>icml<>dori peleg<>
18453<>6716_4<>hanchuan peng<>toward automatic annotation of in situ mrna expression patterns of drosophila embryos<>csb<>jie zhou<>
18456<>6716_7<>giovanni pasteris<>data driven approach to designing minimum hamming distance polychotomizer<>sac<>jie zhou<>
18457<>6716_8<>ching y. suen<>unconstrained numeral pair recognition using enhanced error correcting output coding: a holistic approach<>icdar<>jie zhou<>
6641<>6719_0<>nulo<>informative labeling schemes for graphs<>tcs<>david peleg<>
6657<>6719_16<>michal katz:nir a. katz<>distance labeling schemes for well-separated graph classes<>dam<>david peleg<>
31380<>6720_2<>aman gayasen:narayanan vijaykrishnan:tim tuan<>leakage control in fpga routing fabric<>aspdac<>suresh srinivasan<>
31381<>6720_3<>lin li:narayanan vijaykrishnan<>simultaneous partitioning and frequency assignment for on-chip bus architectures<>date<>suresh srinivasan<>
31383<>6723_0<>panagiotis manolios<>a complete compositional reasoning framework for the efficient verification of pipelined machines<>iccad<>sudarshan k. srinivasan<>
31384<>6723_1<>panagiotis manolios<>verification of executable pipelined machines with bit-level interfaces<>iccad<>sudarshan k. srinivasan<>
31386<>6723_3<>panagiotis manolios<>a parameterized benchmark suite of hard pipelined-machine-verification problems<>charme<>sudarshan k. srinivasan<>
37563<>6732_0<>wai yu:tzu-chuan chou<>life is sharable: blogging life experience with rfid embedded mobile phones<>mhci<>yun-maw cheng<>
37567<>6733_2<>weihua zhuang:alberto leon-garcia:rose qingyang hu<>efficient resource allocation for sla based wireless/wireline interworking<>broadnets<>yu cheng<>
7434<>6734_0<>tor schoenmeyr<>fft-based algorithms for the string matching with mismatches problem<>jal<>david yu zhang<>
7436<>6735_0<>hong wang<>disjoint directed quadrilaterals in a directed graph<>jgt<>danhong zhang<>
7438<>6736_1<>anna nagurney:jose cruz:june dong<>"supply chain networks, electronic commerce, and supply side and demand side risk."<>eor<>ding zhang<>
29778<>6748_15<>chih-chun wang:h. vincent poor<>density evolution for asymmetric memoryless channels<>tit<>s. r. kulkarni<>
29736<>6749_5<>ali ebnenasir<>the effect of the specification model on the complexity of adding masking fault tolerance<>tdsc<>sandeep s. kulkarni<>
29739<>6749_8<>anish arora:rajiv ramnath:emre ertin:prasun sinha:sandip bapat:vinayak naik:vinod kulathumani:hongwei zhang:hui cao:mukundan sridharan:santosh kumar:nick seddon:chris anderson:ted herman:nishank trivedi:chen zhang:mikhail nesterenko:romil shah:mahesh aramugam:limin wang:mohamed g. gouda:young-ri choi:david e. culler:prabal dutta:cory sharp:gilman tolle:mike grimmer:bill ferriera:ken parker<>exscal: elements of an extreme scale wireless sensor network<>rtcsa<>sandeep s. kulkarni<>
29745<>6749_14<>limin wang<>proactive reliable bulk data dissemination in sensor networks<>pdcs<>sandeep s. kulkarni<>
29755<>6749_24<>ali ebnenasir<>complexity issues in automated synthesis of failsafe fault-tolerance<>tdsc<>sandeep s. kulkarni<>
29761<>6749_30<>ali ebnenasir<>adding fault-tolerance using pre-synthesized components<>edcc<>sandeep s. kulkarni<>
37721<>6750_3<>joseph c. culberson:calin anton<>phase transitions of dominating clique problem and their implications to heuristics in satisfiability search<>ijcai<>yong gao<>
37723<>6750_5<>joseph c. culberson<>space complexity of estimation of distribution algorithms<>ec<>yong gao<>
37724<>6750_6<>kui wu:fulu li:yang xiao<>lightweight deployment-aware scheduling for wireless sensor networks<>monet<>yong gao<>
37726<>6750_8<>joseph c. culberson<>resolution complexity of random constraint satisfaction problems: another half of the story<>dam<>yong gao<>
37727<>6751_0<>george church<>improving molecular cancer class discovery through sparse non-negative matrix factorization<>bioinformatics<>yuan gao<>
37692<>6752_1<>xun liu:dong shao:ruili wang<>feedback based dynamic autonomous web service composition<>skg<>yang gao<>
37694<>6752_3<>chang su:jianmei yang:bin luo<>an efficient adaptive focused crawler based on ontology learning<>his<>yang gao<>
37695<>6752_4<>joshua zhexue huang:hongqiang rong:daqian gu<>learning classifier system ensemble for data mining<>gecco<>yang gao<>
37696<>6752_5<>dongjun cai:zongwei luo:kun qian<>towards efficient selection of web services with reinforcement learning process<>ictai<>yang gao<>
37697<>6752_6<>ben-nian wang:zhaoqian chen:jun-yuan xie:shifu chen<>lmrl: a multi-agent reinforcement learning model and algorithm<>icita<>yang gao<>
37698<>6752_7<>daqian gu<>incremental gradient descent imputation method for missing data in learning classifier systems<>gecco<>yang gao<>
37701<>6752_10<>zongwei luo:ning li<>mapping web usage patterns to mdp model and mining with reinforcement learning<>fskd<>yang gao<>
37702<>6752_11<>dongli wang:pei yang<>applying neural network to reinforcement learning in continuous spaces<>isnn<>yang gao<>
37712<>6753_8<>michael maggs<>feature-level fusion in personal identification<>cvpr<>yongsheng gao<>
37713<>6753_9<>conrad sanderson:marc saban<>on local features for gmm based face verification<>icita<>yongsheng gao<>
37715<>6753_11<>nulo<>fast screening in large face databases using merit-based dominant points<>mmm<>yongsheng gao<>
37717<>6753_13<>yutao qi<>robust visual similarity retrieval in single model face databases<>pr<>yongsheng gao<>
2820<>6756_6<>yang xu:paul scerri:steven okamoto:michael lewis:katia p. sycara<>an integrated token-based algorithm for scalable coordination<>atal<>bin yu<>
2832<>6759_4<>seon ho kim<>an efficient zoning technique for multi-dimensional access methods<>teaa<>byunggu yu<>
2833<>6759_5<>nulo<>adaptive query processing in point-transformation schemes<>dexa<>byunggu yu<>
19328<>6761_1<>tong gan:liren zhang<>dual-plan bandwidth smoothing for layer-encoded video<>tmm<>kai-kuang ma<>
19339<>6761_12<>jing tian<>a mcmc approach for bayesian super-resolution image reconstruction<>icip<>kai-kuang ma<>
32492<>6763_0<>tokuro matsuo:toramatsu shintani<>a support method for qualitative simulation-based learning system<>ieaaie<>takayuki ito<>
32494<>6763_2<>tokuro matsuo:toramatsu shintani<>a volume discount-based allocation mechanism in group buying<>deec<>takayuki ito<>
32506<>6763_14<>tokuro matsuo:tadachika ozono:toramatsu shintani<>a strategy-proof mechanism based on multiple auction support agents<>ieaaie<>takayuki ito<>
32514<>6764_1<>akira kato:xiao zhou:takao nishizeki<>algorithms for finding distance-edge-colorings of graphs<>cocoon<>takehiro ito<>
32515<>6764_2<>xiao zhou:takao nishizeki<>partitioning trees of supply and demand<>ijfcs<>takehiro ito<>
32522<>6764_9<>xiao zhou:takao nishizeki<>partitioning graphs of supply and demand<>iscas<>takehiro ito<>
11525<>6767_10<>wei wang:ji zhang<>grid-odf: detecting outliers effectively and efficiently in large multi-dimensional databases<>cis<>hai wang<>
40806<>6770_0<>xin li:hsinchun chen<>link prediction approach to collaborative filtering<>jcdl<>zan huang<>
40788<>6771_3<>peter haase:frank van harmelen:heiner stuckenschmidt:york sure<>a framework for handling inconsistency in changing ontologies<>semweb<>zhisheng huang<>
40793<>6771_8<>heiner stuckenschmidt<>reasoning with multi-version ontologies: a temporal logic approach<>semweb<>zhisheng huang<>
40797<>6771_12<>frank van harmelen:annette ten teije<>reasoning with inconsistent ontologies<>ijcai<>zhisheng huang<>
40798<>6771_13<>frank van harmelen:annette ten teije<>reasoning with inconsistent ontologies<>bnaic<>zhisheng huang<>
40759<>6773_1<>chern-hooi chionh:kian-lee tan:zhen yao<>towards scaleable protein structure comparison and database search<>ijait<>zhiyong huang<>
40763<>6773_5<>hang yu:ee-chien chang:zhijian zheng<>fast rendering of foveated volumes in wavelet-based representation<>vc<>zhiyong huang<>
40768<>6773_10<>haihong zhang:weimin huang:bailing zhang<>a kernel autoassociator approach to pattern classification<>tsmc<>zhiyong huang<>
11542<>6774_3<>chun-hung lu:jun-yi yang:hsin-wen hu:guey-fa chiou:yueh-tzu chiang:wen-lian hsu<>an empirical exploration of using wiki in an english as a second language course<>icalt<>hao-chuan wang<>
11546<>6775_0<>ruigang yang<>towards space: time light field rendering<>si3d<>huamin wang<>
11547<>6775_1<>peter j. mucha:greg turk<>water drops on surfaces<>tog<>huamin wang<>
11530<>6776_0<>sam kwong:yaochu jin:wei wei:kim-fung man<>agent-based evolutionary approach for interpretable rule-based knowledge extraction<>tsmc<>hanli wang<>
11531<>6776_1<>sam kwong:yaochu jin:wei wei:kim-fung man<>multi-objective hierarchical genetic algorithm for interpretable fuzzy rule-based knowledge extraction<>fss<>hanli wang<>
11535<>6776_5<>chi-ho tsang:sam kwong<>anomaly intrusion detection using multi-objective genetic fuzzy system and agent-based evolutionary computation framework<>icdm<>hanli wang<>
11537<>6777_1<>kun bai:peng liu<>towards database firewalls<>dbsec<>hai wang<>
11551<>6779_2<>hung-ming yu:wei-ho tsai<>a query-by-singing technique for retrieving polyphonic objects of popular music<>airs<>hsin-min wang<>
11559<>6779_10<>wei-ho tsai:hung-ming yu<>query-by-example technique for retrieving cover versions of popular songs with similar melodies<>ismir<>hsin-min wang<>
11566<>6779_17<>chiu-yu tseng:shao-huang pin:yehlin lee:yong-cheng chen<>fluent speech prosody: framework and modeling<>speech<>hsin-min wang<>
11568<>6779_19<>wei-ho tsai<>on the extraction of vocal-related information to facilitate the management of popular music collections<>jcdl<>hsin-min wang<>
11569<>6780_0<>hiroyuki takizawa:hiroaki kobayashi<>a workflow management mechanism for peer-to-peer computing platforms<>ispa<>hong wang<>
760<>6786_0<>jitendra kumar:rajesh srivastava<>estimating groundwater pollution source location from observed breakthrough curves using neural networks<>iicai<>ashu jain<>
11579<>6790_2<>peihua li<>probabilistic object tracking based on machine learning and importance sampling<>ibpria<>haijing wang<>
11580<>6790_3<>peihua li:tianwen zhang<>proposal of novel histogram features for face detection<>icapr<>haijing wang<>
11581<>6790_4<>peihua li:tianwen zhang<>novel likelihood estimation technique based on boosting detector<>icip<>haijing wang<>
11582<>6791_0<>haiyong xie ii:yang richard yang:avi silberschatz:erran l. li:yanbin liu<>stable egress route selection for interdomain traffic engineering: model and analysis<>icnp<>hao wang<>
11583<>6791_1<>haiyong xie:lili qiu:abraham silberschatz:yang richard yang<>optimal isp subscription for internet multihoming: algorithm design and implication analysis<>infocom<>hao wang<>
11586<>6791_4<>haiyong xie ii:yang richard yang:avi silberschatz:erran l. li:yanbin liu<>"on the stability of rational, heterogeneous interdomain route selection."<>icnp<>hao wang<>
11590<>6794_0<>wei wang:xuemin lin:jianzhong li<>labeling scheme and structural joins for graph-structured xml data<>apweb<>hongzhi wang<>
11591<>6794_1<>wei wang:jianzhong li:xuemin lin:reymond wong<>practical indexing xml document for twig query<>asian<>hongzhi wang<>
11592<>6794_2<>wei wang:xuemin lin:jianzhong li<>subgraph join: efficient processing subgraph queries on graph-structured xml document<>waim<>hongzhi wang<>
21194<>6795_1<>matthias grosmann:nicola honle:uwe-philipp kappeler:daniela nicklas:thomas schwarz<>efficiently managing context information for large-scale scenarios<>percom<>martin bauer<>
11593<>6796_0<>srinivasan parthasarathy:amol ghoting:shirish tatikonda:gregory buehrer:tahsin m. kurc:joel h. saltz<>design of a next generation sampling service for large scale data analysis applications<>ics<>huai wang<>
11594<>6796_1<>amol ghoting:gregory buehrer:shirish tatikonda:srinivasan parthasarathy:tahsin m. kurc:joel h. saltz<>a services oriented framework for next generation data analysis centers<>ipps<>huai wang<>
11600<>6802_0<>edwin r. hancock<>kernel spectral correspondence matching using label consistency constraints<>iciap<>hongfang wang<>
40079<>6810_0<>zhi-hua zhou<>adapt bagging to nearest neighbor classifiers<>jcst<>yang yu<>
22179<>6812_1<>philip h. s. torr:andrew zisserman<>obj cut<>cvpr<>m. pawan kumar<>
40082<>6815_1<>georgios b. giannakis<>sicta: a 0.693 contention tree algorithm using successive interference cancellation<>infocom<>yingqun yu<>
40084<>6816_0<>rong pan:zhongli ding:yun peng<>a bayesian network approach to ontology mapping<>semweb<>yang yu<>
11606<>6817_3<>minhong wang:dongming xu<>the design of intelligent workflow monitoring with agent technology<>kbs<>huaiqing wang<>
11607<>6817_4<>minhong wang<>intelligent agent supported business process management<>hicss<>huaiqing wang<>
11612<>6818_0<>shijia gao:yingfeng wang:wenqi shen:siubun yeung<>web-service-agents-based family wealth management system<>eswa<>huaiqing wang<>
11609<>6823_0<>lei guo<>pid controller design for output pdfs of stochastic systems using linear matrix inequalities<>tsmc<>hong wang<>
20<>6826_0<>elena nabieva:kam jim:bernard chazelle:mona singh<>whole-proteome prediction of protein function via graph-theoretic analysis of interaction maps<>ismb<>amit agarwal<>
9099<>6827_0<>george g. robertson:mary czerwinski:patrick baudisch:brian meyers:daniel c. robbins:desney s. tan<>the large-display user experience<>cga<>greg smith<>
11<>6828_0<>omar banimelhem:j. william atwood<>deploying multicast communication over mpls networks using tree numbering<>iscc<>anjali agarwal<>
17<>6828_6<>omar banimelhem:j. william atwood<>a tree division approach to support local failure recovery for multicasting in mpls networks<>icw<>anjali agarwal<>
9081<>6831_16<>john derrick<>model checking downward simulations<>entcs<>graeme smith<>
9091<>6831_26<>luke wildman<>model checking z specifications using sal<>zum<>graeme smith<>
6<>6832_0<>r. shankar<>a layered architecture for noc design methodology<>pdcs<>a. agarwal<>
38129<>6835_0<>nong ye:zhibin yang:toni farley<>enhancing router qos through job scheduling with weighted shortest processing time-adjusted<>cor<>ying-cheng lai<>
38130<>6835_1<>nong ye:esma senturk gel:xueping li:toni farley<>web server qos models: applying scheduling rules from production planning<>cor<>ying-cheng lai<>
35352<>6839_2<>yi-fang brook wu<>web mining from competitors' websites<>kdd<>xin chen<>
35354<>6839_4<>razvan stefan bot:quanzhi li:yi-fang brook wu<>learning by examples: identifying key concepts from text using pre-defined inputs<>icai<>xin chen<>
35355<>6839_5<>quanzhi li:razvan stefan bot:yi-fang brook wu<>improving concept hierarchy development for web returned documents using automatic classification<>ic<>xin chen<>
35356<>6839_6<>yi-fang brook wu<>elearning assessment through textual analysis of class discussions<>icalt<>xin chen<>
35364<>6840_5<>jie zheng:zheng fu:peng nan:yang zhong:stefano lonardi:tao jiang<>assignment of orthologous genes via genome rearrangement<>tcbb<>xin chen<>
35371<>6840_12<>jie zheng:zheng fu:peng nan:yang zhong:stefano lonardi:tao jiang<>computing the assignment of orthologous genes via genome rearrangement<>apbc<>xin chen<>
35372<>6840_13<>zheng liu:james borneman:tao jiang<>a fast algorithm for approximate string matching on gene sequences<>cpm<>xin chen<>
7415<>6845_4<>xi chen:wee sun lee<>text classification with kernels on the multinomial manifold<>sigir<>dell zhang<>
7375<>6846_6<>tian xia<>improving the r*-tree with outlier handling techniques<>gis<>donghui zhang<>
7376<>6846_7<>tian xia:evangelos kanoulas:yang du<>on computing top-t most influential spatial sites<>vldb<>donghui zhang<>
7379<>6846_10<>yang du:tian xia<>the optimal-location query<>ssd<>donghui zhang<>
7382<>6846_13<>panfeng zhou:betty salzberg:gene cooperman:george kollios<>close pair queries in moving object databases<>gis<>donghui zhang<>
7393<>6846_24<>vassilis j. tsotras<>optimizing spatial min/max aggregations<>vldb<>donghui zhang<>
7395<>6847_1<>nulo<>negotiation mechanism for tac scm component market<>atal<>dongmo zhang<>
7402<>6847_8<>n. foo<>frame problem in dynamic logic<>jancl<>d. zhang<>
7429<>6848_0<>marc al-hames:alfred dielmann:daniel gatica-perez:stephan reiter:steve renals:gerhard rigoll<>multimodal integration for meeting group action segmentation and recognition<>mlmi<>dong zhang<>
5181<>6860_0<>bruce e. shapiro:eric mjolsness:g. wesley hatfield<>an enzyme mechanism language for the mathematical modeling of metabolic pathways<>bioinformatics<>chin-rang yang<>
7350<>6861_1<>aiqiang gao:shiwei tang:ming zhang<>web service composition using integer programming-based models<>icebe<>dongqing yang<>
7352<>6861_3<>yunfeng liu:shiwei tang:tengjiao wang:jun gao<>validating key constraints over xml document using xpath and structure checking<>fgcs<>dongqing yang<>
7362<>6861_13<>aiqiang gao:shiwei tang:ming zhang<>web service composition using markov decision processes<>waim<>dongqing yang<>
8070<>6866_0<>song jiang:xiaodong zhang<>clock-pro: an effective improvement of the clock replacement<>usenix<>feng chen<>
35376<>6869_1<>patrick j. flynn:kevin w. bowyer<>fully automated facial symmetry axis detection in frontal color images<>autoid<>xin chen<>
35387<>6870_4<>jia yu:wei wu:harry hsieh:jun yang:felice balarin<>assertion-based design exploration of dvs in network processor architectures<>date<>xi chen<>
35390<>6870_7<>abhijit davare:harry hsieh:alberto l. sangiovanni-vincentelli:yosinori watanabe<>simulation based deadlock analysis for system level designs<>dac<>xi chen<>
22543<>6873_1<>jinwei cao:janna m. crews:judee k. burgoon:jay f. nunamaker jr.<>virtual interaction for effective e-learning<>icis<>ming lin<>
5173<>6885_3<>sylvain letourneau<>learning to predict train wheel failures<>kdd<>chunsheng yang<>
2346<>6889_33<>stephanie balzer:patrick th. eugster<>can aspects implement contracts?<>rise<>bertrand meyer<>
14369<>6894_0<>dongkook park:chrysostomos nicopoulos:narayanan vijaykrishnan:chita r. das<>"design and analysis of an noc architecture from performance, reliability and energy perspective."<>ancs<>jongman kim<>
14372<>6894_3<>dongkook park:theo theocharides:narayanan vijaykrishnan:chita r. das<>a low latency router supporting adaptivity for on-chip interconnects<>dac<>jongman kim<>
14359<>6896_1<>geoffrey fox<>scalable hybrid search on distributed databases<>iccS<>jungkee kim<>
14361<>6896_3<>geoffrey fox:seong joon yoo<>data integration hub for a hybrid paper search<>kes<>jungkee kim<>
14335<>6900_1<>alex mitchell:anna divoli:melanie hilario:i. selimas:teresa k. attwood<>metis: multiple extraction techniques for informative sentences<>bioinformatics<>jee-hyub kim<>
14337<>6900_3<>melanie hilario<>learning information extraction rules for protein annotation from unannotated corpora<>cicling<>jee-hyub kim<>
17023<>6903_20<>lipyeow lim:min wang<>cxhist : an on-line classification-based histogram for xml string selectivity estimation<>vldb<>jeffrey scott vitter<>
17065<>6903_62<>roberto grossi<>compressed suffix arrays and suffix trees with applications to text indexing and string matching<>siamcomp<>jeffrey scott vitter<>
2122<>6905_0<>li-c. wang:magdy s. abadir<>reducing pattern delay variations for screening frequency dependent defects<>vts<>benjamin n. lee<>
2125<>6906_0<>joon-jae lee:ki-ryoung kwon<>quasi-interpolants based multilevel b-spline surface reconstruction from scattered data<>iccsa<>byung-gook lee<>
2128<>6906_3<>joon-jae lee:jaechil yoo<>an efficient scattered data approximation using multilevel b-splines based on quasi-interpolants<>3dim<>byung-gook lee<>
2086<>6908_0<>sung won kim<>resource allocation based on traffic load over relayed wireless access networks<>icess<>byung-seo kim<>
2087<>6908_1<>sung won kim<>power-efficient packet scheduling method for ieee 802.15.3 wpan<>icess<>byung-seo kim<>
2078<>6913_0<>hyo jin kang:kyoung oak choi:sangsoo kim:young joo kim<>fesd: a functional element snps database in human<>nar<>byung-dong kim<>
2102<>6916_9<>wissam chedid:chansu yu<>power analysis and optimization techniques for energy efficient computer systems<>ac<>ben lee<>
2112<>6918_1<>yunmook nah:jungsun kim<>visual media retrieval framework using web service<>human<>bogju lee<>
2107<>6919_4<>cynthia sims parr:catherine plaisant:benjamin b. bederson<>visualizing graphs as trees: plant a seed and watch it grow<>gd<>bongshin lee<>
2109<>6919_6<>mary czerwinski:george g. robertson:benjamin b. bederson<>understanding research trends in conferences using paperlens<>chi<>bongshin lee<>
2117<>6920_0<>youngho lee:sejin oh:youngmin park:jeung-chul park:yoo oh:seokhee lee:han oh:jeha ryu:kwan-heng lee:hong kim:yong-gu lee:jongwon kim:yo-sung ho:woontack woo<>responsive multimedia system for virtual storytelling<>pcm<>beom-chan lee<>
