15774<>0_0<>peter kornerup<>choosing starting values for certain newton-raphson iterations<>tcs<>jean-michel muller<>
15782<>0_8<>nicolas brisebarre:arnaud tisserand<>computing machine-efficient polynomial approximations<>toms<>jean-michel muller<>
15795<>0_21<>peter kornerup<>leading guard digits in finite precision redundant representations<>tc<>jean-michel muller<>
5955<>2_3<>lisa bowick:marianne johnson:paul blenkhorn<>using iconicity to evaluate symbol use<>icchp<>david gareth evans<>
5945<>5_1<>lawrence leemis:john h. drew<>the distribution of order statistics for discrete random variables with applications to bootstrapping<>informs<>diane l. evans<>
5928<>7_2<>wei hu:jason hiser:daniel williams:adrian filipi:jack w. davidson:john c. knight:anh nguyen-tuong:jonathan c. rowanhill<>secure and practical defense against code-injection attacks using software dynamic translation<>vee<>david evans<>
5930<>7_4<>jinlin yang:deepali bhardwaj:thirumalesh bhat:manuvir das<>perracotta: mining temporal api rules from imperfect traces<>icse<>david evans<>
5932<>7_6<>michael peck<>inculcating invariants in introductory courses<>icse<>david evans<>
39337<>9_0<>stephan wenger:miska m. hannuksela<>system and transport interface of h.264/avc scalable extension<>icip<>ye-kui wang<>
39338<>9_1<>nulo<>avs-m: from standards to applications<>jcst<>ye-kui wang<>
39344<>9_7<>yi guo:houqiang li<>error resilient mode decision in scalable video coding<>icip<>ye-kui wang<>
39345<>9_8<>chunbo zhu:miska m. hannuksela:houqiang li<>error resilient video coding using redundant pictures<>icip<>ye-kui wang<>
39348<>10_0<>fabricio rusu-banu<>formal description of time management in real-time operating systems<>ccece<>yingxu wang<>
39349<>10_1<>vincent chiew<>design of a cognitive complexities measurement and analysis tool<>ccece<>yingxu wang<>
39353<>10_5<>cyprian f. ngolah:xinming tan<>implementing the real-time processes of rtpa using real-time java<>ccece<>yingxu wang<>
39361<>10_13<>xinming tan:cyprian f. ngolah<>design and implementation of an automatic rtpa code generator<>ccece<>yingxu wang<>
39389<>13_11<>doug beck:xuxian jiang:roussi roussev:chad verbowski:shuo chen:samuel t. king<>automated web patrol with strider honeymonkeys: finding web sites that exploit browser vulnerabilities<>ndss<>yi-min wang<>
26578<>17_25<>barbara poblete<>dynamics of the chilean web structure<>cn<>ricardo a. baeza-yates<>
10934<>21_3<>leila amgoud<>explaining qualitative decision under uncertainty by argumentation<>aaai<>henri prade<>
10935<>21_4<>jean-francois bonnefon:rui da silva neves:didier dubois<>background default knowledge and causality ascriptions<>ecai<>henri prade<>
10942<>21_11<>mathieu serrurier<>version space learning for possibilistic hypotheses<>ecai<>henri prade<>
10962<>21_31<>salem benferhat:didier dubois:souhila kaci<>"bipolar possibility theory in preference modeling: representation, fusion and optimal solutions."<>inffus<>henri prade<>
10966<>21_35<>florence dupin de saint-cyr<>possibilistic handling of uncertain default rules with applications to persistence modeling and fuzzy default reasoning<>kr<>henri prade<>
10968<>21_37<>salem benferhat<>compiling possibilistic knowledge bases<>ecai<>henri prade<>
8479<>23_1<>edwin r. hancock<>heat kernel smoothing of scalar and vector image data<>icip<>fan zhang<>
8480<>23_2<>edwin r. hancock<>riemannian graph diffusion for dt-mri regularization<>miccai<>fan zhang<>
8481<>23_3<>edwin r. hancock<>smoothing tensor-valued images using anisotropic geodesic diffusion<>sspr<>fan zhang<>
8482<>23_4<>edwin r. hancock<>edge detection and anisotropic diffusion for tensor-valued images<>icip<>fan zhang<>
8484<>23_6<>edwin r. hancock<>a riemannian weighted filter for edge-sensitive image smoothing<>icpr<>fan zhang<>
25094<>25_32<>herbert edelsbrunner:john harer:yusu wang<>extreme elevation on a 2-manifold<>dcg<>pankaj k. agarwal<>
25110<>25_48<>boris aronov:vladlen koltun<>efficient algorithms for bichromatic separability<>talg<>pankaj k. agarwal<>
25113<>25_51<>mark h. overmars:micha sharir<>computing maximally separated sets in the plane<>siamcomp<>pankaj k. agarwal<>
25121<>25_59<>nabil h. mustafa<>independent set of intersection graphs of convex objects in 2d<>comgeo<>pankaj k. agarwal<>
25153<>25_91<>yonatan bilu:rachel kolodny<>faster algorithms for optimal multiple sequence alignment based on pairwise comparisons<>tcbb<>pankaj k. agarwal<>
8514<>27_0<>andryas mawardi:eugene santos jr.:ranga pitchumani:luke e. k. achenie<>examination of load-balancing methods to improve efficiency of a composite materials manufacturing process simulation under uncertainty using distributed computing<>fgcs<>feng zhang<>
8494<>29_4<>heping zhang<>construction for bicritical graphs and -extendable bipartite graphs<>dm<>fuji zhang<>
8497<>30_0<>jianer chen:iyad a. kanj:jie meng:ge xia<>on the effective enumerability of np problems<>iwpec<>fenghui zhang<>
33449<>32_40<>taiga nakamura:lorin hochstein<>identifying domain-specific defect classes using inspections and change history<>isese<>victor r. basili<>
33467<>32_58<>lorin hochstein<>an empirical study to compare two parallel programming models<>spaa<>victor r. basili<>
38514<>33_0<>hyunseok lee:mark woh:yoav harel:scott a. mahlke:trevor n. mudge:chaitali chakrabarti:krisztian flautner<>soda: a low-power architecture for software radio<>isca<>yuan lin<>
5975<>42_2<>martin pelikan:kumara sastry:martin v. butz<>hierarchical boa on random decomposable problems<>gecco<>david e. goldberg<>
5978<>42_5<>pier luca lanzi:daniele loiacono:stewart w. wilson<>classifier prediction based on tile coding<>gecco<>david e. goldberg<>
5982<>42_9<>martin pelikan:kumara sastry<>sporadic model building for efficiency enhancement of hierarchical boa<>gecco<>david e. goldberg<>
5987<>42_14<>xavier llora:kumara sastry:francesc alias:michael welge<>analyzing active interactive genetic algorithms using visual analytics<>gecco<>david e. goldberg<>
5991<>42_18<>kumara sastry:claudio f. lima<>evaluation relaxation using substructural information and linear estimation<>gecco<>david e. goldberg<>
8052<>44_1<>kris heyrman:antonis papanikolaou:peter veelaert:koen de bosschere:wilfried philips<>energy consumption for transport of control information on a segmented software-controlled communication architecture<>arc<>francky catthoor<>
6013<>45_10<>andreas g. andreou:pedro julian:philippe o. pouliquen:laurence riddle:rich rosasco<>vlsi implementation of an energy-aware wake-up detector for an acoustic surveillance sensor network<>tosn<>david h. goldberg<>
6014<>45_11<>pedro julian:andreas g. andreou<>a low-power correlation-derivative cmos vlsi circuit for bearing estimation<>tvlsi<>david h. goldberg<>
26776<>50_7<>michael y. k. cheng<>integrating information gathering interaction into transfer of control strategies in adjustable autonomy multiagent systems<>ai<>robin cohen<>
26791<>52_2<>david peleg<>local algorithms for autonomous robot systems<>sirocco<>reuven cohen<>
26792<>52_3<>lazaros k. gallos:fredrik liljeros:panos argyrakis:armin bunde:shlomo havlin<>attack strategies on complex networks<>iccS<>reuven cohen<>
26761<>53_16<>romeo rizzi<>on the trade-off between energy and multicast efficiency in 802.16e-like mobile networks<>infocom<>reuven cohen<>
16923<>59_0<>cedric rose:francois charpillet<>a multi-hmm approach to ecg segmentation<>ictai<>julien thomas<>
27207<>76_7<>arnab sarkar:p. p. chakrabarti<>frame-based proportional round-robin<>tc<>rajeev kumar<>
27209<>76_9<>v. patil<>an efficient motion vector composition scheme for arbitrary frame down-sampling video transcoder<>tcsv<>r. kumar<>
27210<>76_10<>arnab sarkar:p. p. chakrabarti<>frame based fair multiprocessor scheduler: a fast fair algorithm for real-time embedded systems<>vlsid<>rajeev kumar<>
27221<>76_21<>nilanjan banerjee<>analysis of a multiobjective evolutionary algorithm on the 0-1 knapsack problem<>tcs<>rajeev kumar<>
27222<>76_22<>pramod kumar singh:bhargab b. bhattacharya<>biobjective evolutionary and heuristic algorithms for intersection of geometric graphs<>gecco<>rajeev kumar<>
27225<>76_25<>durga prasad mohapatra:rajib mall:d. s. kumar:mayank bhasin<>distributed dynamic slicing of java programs<>jss<>rajeev kumar<>
27226<>76_26<>ashok k. turuk<>a flexible contention resolution scheme for qos provisioning in optical burst switching networks<>comcom<>rajeev kumar<>
27236<>77_4<>arnab paul:umakishore ramachandran:david kotz<>on improving wireless broadcast reliability of sensor networks using erasure codes<>msn<>rajnish kumar<>
27237<>77_5<>umakishore ramachandran:matthew wolenetz:brian cooper:bikash agarwalla:junsuk shin:phillip w. hutto:arnab paul<>dynamic data fusion for future sensor networks<>tosn<>rajnish kumar<>
27241<>78_2<>w. qiu<>decentralized failure diagnosis of discrete event systems<>tsmc<>r. kumar<>
27245<>79_2<>david d. yao:amitabha bagchi:keith w. ross:dan rubenstein<>fluid modeling of pollution proliferation in p2p networks<>sigmetrics<>rakesh kumar<>
33378<>87_2<>kun zhang:santosh pande<>memory protection through dynamic access control<>micro<>tao zhang<>
33384<>87_8<>xiaotong zhuang:santosh pande<>compiler optimizations to reduce security overhead<>cgo<>tao zhang<>
33389<>87_13<>xiaotong zhuang:santosh pande<>using branch correlation to identify infeasible paths for anomaly detection<>micro<>tao zhang<>
33365<>93_0<>henny b. sipma:zohar manna<>decision procedures for term algebras with integer constraints<>iandc<>ting zhang<>
33390<>97_0<>marc de leenheer:farid farahmand:kejie lu:pieter thysebaert:bruno volckaert:filip de turck:bart dhoedt:piet demeester:jason p. jue<>anycast algorithms supporting optical burst switched grid networks<>icns<>tao zhang<>
10847<>99_6<>ian anderson<>exploring gsm signal strength levels in pervasive environments<>aina<>henk l. muller<>
10858<>99_17<>cliff randell:erik geelhoed:alan j. dix<>exploring the effects of target location size and position system accuracy on location based applications<>pervasive<>henk l. muller<>
10867<>99_26<>cliff randell:andrew moss<>a 10mw wearable positioning system<>iswc<>henk l. muller<>
10868<>99_27<>ian anderson<>practical context awareness for gsm cell phones<>iswc<>henk l. muller<>
10870<>99_29<>michael r. mccarthy:cliff randell<>particle filters for position sensing with asynchronous ultrasonic beacons<>loca<>henk l. muller<>
34503<>100_12<>dong-u lee:altaf abdul gaffar:ray c. c. cheung:oskar mencer:george a. constantinides<>accuracy-guaranteed bit-width optimization<>tcad<>wayne luk<>
34517<>100_26<>steve mckeever<>provably-correct hardware compilation tools based on pass separation techniques<>fac<>wayne luk<>
23394<>106_0<>yonghong wang<>trust representation and aggregation in a distributed agent system<>aaai<>munindar p. singh<>
23428<>106_34<>yathiraj b. udupi<>contract enactment in virtual organizations: a commitment-based approach<>aaai<>munindar p. singh<>
23430<>106_36<>ashok u. mallya<>specifying and resolving preferences among agent interaction patterns<>atal<>munindar p. singh<>
23463<>106_69<>yathiraj b. udupi<>multiagent policy architecture for virtual business organizations<>IEEEscc<>munindar p. singh<>
23472<>106_78<>nirmit desai:amit k. chopra<>business process adaptations via protocols<>IEEEscc<>munindar p. singh<>
23491<>110_7<>carl kingsford:elena zaslavsky<>a compact mathematical programming formulation for dna motif finding<>cpm<>mona singh<>
20443<>113_0<>yue liu:yongtian wang:yu li:jinchao lei<>key issues for ar-based digital reconstruction of yuanmingyuan garden<>presence<>liang lin<>
6617<>117_0<>nulo<>representing and reasoning with operational semantics<>cade<>dale miller<>
6618<>117_1<>gary t. leavens:jean-raymond abrial:don s. batory:michael butler:alessandro coglio:kathi fisler:eric c. r. hehner:cliff b. jones:simon l. peyton jones:murali sitaraman:douglas r. smith:aaron stump<>roadmap for enhanced languages and methods to aid verification<>gpce<>dale miller<>
6619<>117_2<>nulo<>collection analysis for horn clause programs<>ppdp<>dale miller<>
20439<>126_0<>nulo<>impact of users' expertise on the competition between proprietary and open source software<>hicss<>lihui lin<>
20440<>126_1<>nalin kulatilaka<>network effects and technology licensing<>hicss<>lihui lin<>
6576<>127_17<>nulo<>a proof theoretic approach to operational semantics<>entcs<>dale miller<>
6579<>127_20<>axelle ziegler:catuscia palamidessi<>a congruence format for name-passing calculi<>entcs<>dale miller<>
31510<>130_0<>r. michael buehrer<>multiple-access insights from bounds on sensor localization<>wowmom<>swaroop venkatesh<>
31511<>130_1<>r. michael buehrer<>a linear programming approach to nlos error mitigation in sensor networks<>ipsn<>swaroop venkatesh<>
32839<>134_0<>chen-tuo liao<>a beta<>csda<>tsai-yu lin<>
32809<>135_11<>xiaohua hu:il-yeol song:illhoi yoo:min song<>a semi-supervised efficient learning approach to extract biological relationships from web-based biomedical digital library<>wias<>t. y. lin<>
36303<>142_1<>lizheng jiang:dongqing yang:shiwei tang:dehui zhang<>mining maximal correlated member clusters in high dimensional database<>pakdd<>xiuli ma<>
36300<>143_3<>sudharshan s. vazhkudai:douglas thain:vincent w. freeh<>positioning dynamic storage caches for transient data<>cluster<>xiaosong ma<>
37241<>148_0<>wei-horng yeh<>an efficient signature extraction method for image similarity retrieval<>jise<>ye-in chang<>
37243<>149_1<>iris hui-ru jiang:song-ra pan:jing-yang jou<>reliable crosstalk-driven interconnect optimization<>todaes<>yao-wen chang<>
37246<>150_0<>tei-wei kuo:jen-wei hsieh:li-pin chang<>configurability of performance and overheads in flash management<>aspdac<>yuan-hao chang<>
5778<>153_49<>nulo<>upright-quad drawing of  -planar learning spaces<>gd<>david eppstein<>
5797<>153_68<>pablo diaz-gutierrez:m. gopi<>single triangle strip and loop on manifolds with boundaries<>sibgrapi<>david eppstein<>
5800<>153_71<>josiah carlson<>trees with convex faces and optimal angles<>gd<>david eppstein<>
5843<>153_114<>michael b. dillencourt:michael t. goodrich<>choosing colors for geometric graphs via color space embeddings<>gd<>david eppstein<>
5865<>153_136<>nulo<>quasiconvex analysis of multivariate recurrence equations for backtracking algorithms<>talg<>david eppstein<>
5883<>153_154<>josiah carlson<>the weighted maximum-mean subtree and other bicriterion subtree problems<>swat<>david eppstein<>
22319<>154_0<>veronique cortier:xavier goaoc:hyeon-suk na<>a note on maximally repeated sub-patterns of a point set<>dm<>mira lee<>
5715<>158_22<>salem benferhat:souhila kaci:henri prade<>"bipolar possibility theory in preference modeling: representation, fusion and optimal solutions."<>inffus<>didier dubois<>
5726<>158_33<>eyke hullermeier:henri prade<>fuzzy methods for case-based recommendation and decision support<>jiis<>didier dubois<>
22306<>166_1<>nulo<>a hierarchical bayesian model of human decision-making on an optimal stopping problem<>cogsci<>michael d. lee<>
40555<>172_0<>j. d. zuegel:j. r. marciante:hui wu<>"a reconfigurable, multi-gigahertz pulse shaping circuit based on distributed transversal filters."<>iscas<>y. zhu<>
40542<>174_5<>yu sheng:feng tian:jianglu wang:bing wei<>path extendability of claw-free graphs<>dm<>yongjin zhu<>
40551<>175_1<>hung-yun hsieh:kyu-han kim:raghupathy sivakumar<>a receiver-centric transport protocol for mobile hosts with heterogeneous wireless interfaces<>winet<>yujie zhu<>
41352<>177_4<>yi lu:shiyong lu:farshad fotouhi:yan sun:lily r. liang<>pdc: pattern discovery with confidence in dna sequences<>acst<>zijiang yang<>
41358<>177_10<>chao wang:franjo ivancic:aarti gupta<>disjunctive image computation for embedded software verification<>date<>zijiang yang<>
41359<>177_11<>chao wang:franjo ivancic:aarti gupta<>whodunit? causal analysis for counterexamples<>atva<>zijiang yang<>
41360<>177_12<>malay k. ganai:aarti gupta:pranav ashar<>efficient distributed sat and sat-based distributed bounded model checking<>sttt<>zijiang yang<>
41361<>177_13<>shiyong lu:ping yang<>runtime security verification for itinerary-driven mobile agents<>dasc<>zijiang yang<>
41364<>177_16<>chao wang:aarti gupta:franjo ivancic<>mixed symbolic representations for model checking software programs<>memocode<>zijiang yang<>
40523<>178_7<>hao tian:rajshekhar sunderraman:robert j. calin-jageman:hong yang:paul s. katz<>neuroql: a domain-specific query language for neuroscience data<>edbtw<>ying zhu<>
40524<>178_8<>anthony s. aquilio:jeremy c. brooks:g. scott owen<>real-time gpu-based simulation of dynamic terrain<>isvc<>ying zhu<>
40525<>179_0<>peng gu:hong jiang:jun wang<>nexus: a novel weighted-graph-based prefetching algorithm for metadata servers in petabyte-scale storage systems<>ccgrid<>yifeng zhu<>
40526<>179_1<>hong jiang:xiao qin:dan feng:david r. swanson<>exploiting redundancy to boost performance in a raid-10 style cluster-based file system<>cluster<>yifeng zhu<>
40533<>179_8<>hong jiang<>"ceft: a cost-effective, fault-tolerant parallel virtual file system."<>jpdc<>yifeng zhu<>
40534<>179_9<>xiao qin:hong jiang:david r. swanson<>improving the performance of i/o-intensive applications on clusters of workstations<>cluster<>yifeng zhu<>
8772<>180_9<>xingqin qi:jichang wu:bingqiang liu<>sorting signed permutations by fixed-length reversals<>ijfcs<>guojun li<>
8754<>182_0<>steven w. zucker<>contextual inference in contour-based stereo correspondence<>ijcv<>gang li<>
8758<>183_2<>jianhua feng:jianyong wang:yong zhang:lizhu zhou<>incremental mining of frequent query patterns from xml queries for caching<>icdm<>guoliang li<>
8751<>185_2<>min zhang:yuxi fu<>secrecy of signals by typing in signal transduction<>icnc<>guoqiang li<>
27181<>186_0<>rui camacho:ashwin srinivasan<>guest editorial<>ml<>ross king<>
41381<>193_0<>jingsong he:xin yao<>hybridisation of particle swarm optimization and fast evolutionary programming<>seal<>zhengyu yang<>
41385<>194_3<>jorma laaksonen<>a fast fixed-point algorithm for two-class discriminative feature extraction<>icann<>zhirong yang<>
41372<>199_0<>sheng zhong:rebecca n. wright<>privacy-preserving queries on encrypted data<>esorics<>zhiqiang yang<>
41374<>199_2<>rebecca n. wright:hiranmayee subramaniam<>experimental analysis of a privacy-preserving scalar product protocol<>csse<>zhiqiang yang<>
34727<>205_13<>peng wang:haixun wang:baile shi:philip s. yu<>loci: load shedding through class-preserving data acquisition<>icdm<>wei wang<>
34736<>205_22<>hye-chung kum:joong hyuk chang<>sequential pattern mining in multi-databases via multiple alignment<>datamine<>wei wang<>
34737<>205_23<>xin xu:ying lu:anthony k. h. tung<>mining shifting-and-scaling co-regulation patterns on gene expression profiles<>icde<>wei wang<>
34748<>205_34<>jinze liu:qi zhang:leonard mcmillan:jan prins<>clustering pair-wise dissimilarity data into partially ordered sets<>kdd<>wei wang<>
34756<>205_42<>xiang zhang<>mining coherent patterns from heterogeneous microarray data<>cikm<>wei wang<>
34776<>206_5<>zhihong chong:jeffrey xu yu:zhengjie zhang:xuemin lin:aoying zhou<>efficient computation of -medians over data streams under memory constraints<>jcst<>wei wang<>
34781<>210_0<>min chen<>the 2-dipath chromatic number of halin graphs<>ipl<>weifan wang<>
34785<>210_4<>yuehua bu<>some sufficient conditions for a planar graph of maximum degree six to be class 1<>dm<>weifan wang<>
34793<>210_12<>nulo<>edge-partitions of graphs of nonnegative characteristic and their game coloring numbers<>dm<>wei-fan wang<>
34794<>210_13<>yiqiao wang 0002<>"l(p, q)-labelling of k-minor free graphs."<>ipl<>weifan wang<>
34797<>210_16<>mickael montassier:andre raspaud<>bordeaux 3-color conjecture and 3-choosability<>dm<>weifan wang<>
34809<>212_3<>yang liu:helmut pottmann:johannes wallner:yong-liang yang<>geometric modeling with conical meshes and developable surfaces<>tog<>wenping wang<>
34812<>212_6<>yang liu:helmut pottmann<>constrained 3d shape reconstruction using a combination of surface fitting and registration<>cad<>wenping wang<>
34822<>212_16<>helmut pottmann:yang liu<>fitting b-spline curves to point clouds by curvature-based squared distance minimization<>tog<>wenping wang<>
34827<>213_4<>kannan ramchandran<>random distributed multiresolution representations with significance querying<>ipsn<>wei wang<>
1848<>214_0<>eckard bode:marc herbstritt:holger hermanns:sven johr:thomas peikenkamp:reza pulungan:ralf wimmer<>compositional performability evaluation for statemate<>qest<>bernd becker<>
11896<>219_0<>ruofei zhang:zhongfei (mark) zhang:mingjing li:wei-ying ma<>a probabilistic semantic model for image annotation and multi-modal image retrieval<>mms<>hongjiang zhang<>
17219<>220_6<>minho sung:abhishek kumar:erran l. li:jun xu<>scalable and efficient data streaming algorithms for detecting common content in internet traffic<>icde<>jia wang<>
17226<>220_13<>feng wang:zhuoqing morley mao:lixin gao:randy bush<>a measurement study on the impact of routing events on end-to-end internet path performance<>sigcomm<>jia wang<>
17229<>220_16<>qunfeng dong:suman banerjee:dheeraj agrawal:ashutosh shukla<>packet classifiers in ternary cams can be smaller<>sigmetrics<>jia wang<>
17200<>221_0<>jia-ching wang:cai-bei lin:kun-ting jian:wai-he kuok<>content-based audio classification using support vector machines and independent component analysis<>icpr<>jhing-fa wang<>
17206<>221_6<>chung-hsien wu:chi-chun hsia:te-hsien liu<>voice conversion using duration-embedded bi-hmms for expressive speech synthesis<>taslp<>jhing-fa wang<>
11882<>222_0<>victor r. lesser<>multi-agent based peer-to-peer information retrieval systems with concurrent search sessions<>atal<>haizheng zhang<>
11884<>222_2<>victor r. lesser<>forming and searching content-based hierarchical agent clusters in distributed information retrieval systems<>wias<>haizheng zhang<>
11887<>224_0<>daniel gildea<>inducing word alignments with bilexical synchronous trees<>acl<>hao zhang<>
11888<>224_1<>daniel gildea:giorgio satta<>factoring synchronous grammars by sorting<>acl<>hao zhang<>
11890<>224_3<>liang huang:daniel gildea:kevin knight<>synchronous binarization for machine translation<>naacl<>hao zhang<>
1843<>227_0<>alexey lastovetsky<>matrix multiplication on two interconnected processors<>cluster<>brett a. becker<>
17154<>228_4<>daniela rosca<>dynamic workflow modeling and verification<>caise<>jiacun wang<>
17107<>230_0<>ritendra datta:dhiraj joshi:jia li<>studying aesthetics in photographic images using a computational approach<>eccv<>james ze wang<>
17112<>230_5<>nozha boujemaa:alberto del bimbo:donald geman:alexander g. hauptmann:jelena tesic<>diversity in multimedia information retrieval research<>mir<>james z. wang<>
17117<>230_10<>anuj r. jaiswal:c. lee giles:prasenjit mitra<>an architecture for creating collaborative semantically capable scientific data sharing infrastructures<>widm<>james ze wang<>
17119<>230_12<>ritendra datta:weina ge:jia li<>toward bridging the annotation-retrieval gap in image search by a generative modeling approach<>mm<>james ze wang<>
17124<>230_17<>dhiraj joshi:jia li<>the story picturing engine - a system for automatic text illustration<>tomccap<>james ze wang<>
17127<>230_20<>yixin chen:jinbo bi<>miles: multiple-instance learning via embedded instance selection<>pami<>james ze wang<>
17128<>230_21<>kurt grieb:ya zhang:ching-chih chen:yixin chen:jia li<>machine annotation and retrieval for digital imagery of historical materials<>jodl<>james ze wang<>
17130<>230_23<>xiaonan lu:prasenjit mitra:c. lee giles<>automatic categorization of figures in scientific documents<>jcdl<>james ze wang<>
17134<>230_27<>jia li<>real-time computerized annotation of pictures<>mm<>james z. wang<>
17138<>230_31<>dhiraj joshi:ritendra datta:ziming zhuang:w. p. weiss:marc friedenberg:jia li<>paragrab: a comprehensive architecture for web image management and multimodal querying<>vldb<>james ze wang<>
17142<>230_35<>d. joshi:j. li<>a computationally efficient approach to the estimation of two- and three-dimensional hidden markov models<>tip<>j. z. wang<>
17198<>231_1<>vassilis athitsos:stan sclaroff:margrit betke<>detecting instances of shape classes that exhibit variable structure<>eccv<>jingbin wang<>
17187<>232_3<>hung-chi chang:chih-yuan lin:lee-feng chien<>a peer-to-peer approach to collaborative repository for digital libraries<>icadl<>jenq-haur wang<>
17191<>232_7<>jen-hao hsiao:cheng-hung li:chih-yi chiu:chu-song chen:lee-feng chien<>effective content tracking for digital rights management in digital libraries<>ercimdl<>jenq-haur wang<>
17196<>232_12<>jei-wen teng:wen-hsiang lu:lee-feng chien<>exploiting the web as the multilingual corpus for unknown query translation<>jasis<>jenq-haur wang<>
17181<>233_0<>hongqiang zhai:xiang chen:yuguang fang<>medium access control in mobile  networks: challenges and solutions<>wicomm<>jianfeng wang<>
17182<>233_1<>hongqiang zhai:yuguang fang:john m. shea:dapeng wu<>omar: utilizing multiuser diversity in wireless ad hoc networks<>tmc<>jianfeng wang<>
17183<>233_2<>yuguang fang:dapeng oliver wu<>a power-saving multi-radio multi-channel mac protocol for wireless local area networks<>infocom<>jianfeng wang<>
17162<>234_1<>zhijun yu<>a new variation of chord with novel improvement on lookup locality<>gca<>jie wang<>
17180<>234_19<>ning zhong<>efficient point coverage in wireless sensor networks<>jco<>jie wang<>
8080<>235_2<>mahmut t. kandemir:ibrahim kolcu<>exploiting software pipelining for network-on-chip architectures<>isvlsi<>feihui li<>
8081<>235_3<>guangyu chen:mahmut t. kandemir:mary jane irwin<>reducing noc energy consumption through compiler-directed channel voltage scaling<>pldi<>feihui li<>
8084<>235_6<>madhu mutyam:narayanan vijaykrishnan:mahmut t. kandemir:mary jane irwin<>compiler-directed thermal management for vliw functional units<>lctrts<>feihui li<>
8085<>235_7<>mahmut t. kandemir:guangyu chen<>maximizing data reuse for minimizing memory space requirements and execution cycles<>aspdac<>feihui li<>
8087<>235_9<>guangyu chen:mahmut t. kandemir<>compiler-directed channel allocation for saving power in on-chip networks<>popl<>feihui li<>
8088<>235_10<>chrysostomos nicopoulos:thomas d. richardson:yuan xie:narayanan vijaykrishnan:mahmut t. kandemir<>design and management of 3d chip multiprocessors using network-in-memory<>isca<>feihui li<>
34701<>237_4<>ryan h. choi:raymond k. wong<>visual specification and optimization of xquery using vxq<>dexa<>wei wang<>
34703<>237_6<>ying zhang:xuemin lin:jian xu:flip korn<>space-efficient relative error order sketch over data streams<>icde<>wei wang<>
34706<>237_9<>jian pei:yidong yuan:xuemin lin:wen jin:martin ester:qing liu:yufei tao:jeffrey xu yu:qing zhang<>towards multidimensional subspace skyline analysis<>tods<>wei wang<>
11861<>240_6<>fuji zhang<>construction for bicritical graphs and -extendable bipartite graphs<>dm<>heping zhang<>
11845<>243_0<>jin huang:xiaohan shi:xinguo liu:hujun bao<>interactive mesh deformation with pseudo material effects<>jvca<>hongxin zhang<>
11847<>243_2<>ying tang:hui zhao:hujun bao<>bernoulli embedding model and its application in texture mapping<>jcst<>hongxin zhang<>
11851<>243_6<>dong xu:wei chen:hujun bao<>multi-level differential surface representation based on local transformations<>vc<>hongxin zhang<>
11852<>243_7<>dong xu:hujun bao<>non-uniform differential mesh deformation<>cgi<>hongxin zhang<>
11853<>243_8<>dong xu:qing wang:hujun bao<>poisson shape interpolation<>cvgip<>hongxin zhang<>
8113<>244_1<>robert fergus:pietro perona<>one-shot learning of object categories<>pami<>fei-fei li<>
39131<>245_0<>yosuke akatsuka:takenori nishizono<>reward allotment in an event-driven hybrid learning classifier system for online soccer games<>gecco<>yuji sato<>
11881<>246_4<>jun-hai yong:jean-claude paul<>adaptive geometry compression based on 4-point interpolatory subdivision schemes<>iwicpas<>hui zhang<>
8120<>247_1<>lewis w. f. li:rynson w. h. lau<>a trajectory-preserving synchronization method for collaborative visualization<>tvcg<>frederick w. b. li<>
8121<>247_2<>gary k. l. cheung:rynson w. h. lau<>efficient rendering of deformable objects for real-time applications<>jvca<>frederick w. b. li<>
11868<>249_0<>james f. kurose:donald f. towsley<>can an overlay compensate for a careless underlay?<>infocom<>honggang zhang<>
8118<>250_0<>yang xiao:kui wu:kin k. leung:qiang ni<>on optimizing backoff counter reservation and classifying stations for the ieee 802.11 distributed wireless lans<>tpds<>frank haizhon li<>
8107<>253_6<>ching chang:george kollios:azer bestavros<>characterizing and exploiting reference locality in data stream applications<>icde<>feifei li<>
8110<>253_9<>marios hadjieleftheriou:george kollios:leonid reyzin<>dynamic authenticated index structures for outsourced databases<>sigmod<>feifei li<>
11901<>268_0<>hee beng kuan tan:yuan zhao<>estimating loc for information systems from their conceptual data models<>icse<>hongyu zhang<>
30847<>269_14<>doran chakraborty<>teaching new teammates<>atal<>sandip sen<>
30849<>269_16<>ikpeme erete:teddy candale<>effect of deceptive referrals on system stability<>atal<>sandip sen<>
30880<>269_47<>stephane airiau<>learning to commit in repeated games<>atal<>sandip sen<>
30881<>269_48<>teddy candale<>evaluating bidding strategies for simultaneous auctions<>atal<>sandip sen<>
30888<>269_55<>stephane airiau:prithviraj dasgupta<>effect of joining decisions on peer clusters<>atal<>sandip sen<>
30942<>270_32<>yogish sabharwal:nishant sharma<>nearest neighbors search using point location in balls with applications to approximate voronoi decompositions<>jcss<>sandeep sen<>
30944<>270_34<>akshat verma<>algorithmic ramifications of prefetching in memory hierarchy<>hipc<>sandeep sen<>
30908<>271_14<>daniel stutzbach:reza rejaie:nick g. duffield:walter willinger<>on unbiased sampling for unstructured peer-to-peer networks<>imc<>subhabrata sen<>
30959<>272_0<>dan frankowski:dan cosley:loren g. terveen:john riedl<>you are what you say: privacy risks of public mentions<>sigir<>shilad sen<>
30960<>272_1<>shyong k. lam:al mamunur rashid:dan cosley:dan frankowski:jeremy osterhouse:f. maxwell harper:john riedl<>"tagging, communities, vocabulary, evolution."<>cscw<>shilad sen<>
30961<>272_2<>werner geyer:michael muller:marty moore:beth brownholtz:eric wilcox:david r. millen<>feedme: a collaborative alert filtering system<>cscw<>shilad sen<>
30964<>274_0<>kameswari chebrolu:bhaskaran raman<>long-distance 802.11b links: performance measurements and experience<>mobicom<>sayandeep sen<>
30967<>277_0<>t. k. bhattacharyya:debashis mandal:s. k. lahiri<>development of a wireless integrated toxic and explosive mems based gas sensor<>vlsid<>shreyas sen<>
39271<>279_1<>yuanchen he:yan-qing zhang:rajshekhar sunderraman<>fuzzy-granular gene selection from microarray expression data<>icdm<>yuchun tang<>
29163<>280_4<>lingyu wang:chao yao:anoop singhal<>interactive analysis of attack graphs using relational queries<>dbsec<>sushil jajodia<>
29167<>280_8<>lingyu wang:steven noel<>minimum-cost network hardening using attack graphs<>comcom<>sushil jajodia<>
29182<>280_23<>huiping guo:yingjiu li:anyi liu<>a fragile watermarking scheme for detecting malicious modifications of database relations<>isci<>sushil jajodia<>
29187<>280_28<>anoop singhal<>data warehousing and data mining techniques for intrusion detection systems<>dpd<>sushil jajodia<>
29204<>280_45<>lei zhang:alexander brodsky<>toward information sharing: benefit and risk access control (barac)<>policy<>sushil jajodia<>
29227<>280_68<>yingjiu li:sencun zhu:xiaoyang sean wang<>looking into the seeds of time: discovering temporal patterns in large transaction sets<>isci<>sushil jajodia<>
29230<>280_71<>bo zhu:sanjeev setia<>providing witness anonymity in peer-to-peer systems<>ccs<>sushil jajodia<>
29232<>280_73<>maria calagna:huiping guo:luigi v. mancini<>a robust watermarking system based on  compression<>sac<>sushil jajodia<>
29236<>280_77<>sencun zhu:shouhuai xu:sanjeev setia<>lhap: a lightweight network access control protocol for ad hoc networks<>adhoc<>sushil jajodia<>
29243<>280_84<>sencun zhu:sanjeev setia:shouhuai xu<>gkmpan: an efficient group rekeying scheme for secure multicast in ad-hoc networks<>jcs<>sushil jajodia<>
29262<>280_103<>sergio mascetti:claudio bettini:xiaoyang sean wang<>k-anonymity in databases with timestamped data<>time<>sushil jajodia<>
29265<>280_106<>chao yao:lingyu wang:xiaoyang sean wang<>indistinguishability: the other aspect of privacy<>sdmw<>sushil jajodia<>
29266<>280_107<>david keppler:vipin swarup<>redirection policies for mission-based information sharing<>sacmat<>sushil jajodia<>
29274<>280_115<>hemant sengar:duminda wijesekera:haining wang<>voip intrusion detection through interacting protocol state machines<>dsn<>sushil jajodia<>
29275<>280_116<>sankardas roy:sanjeev setia<>attack-resilient hierarchical data aggregation in sensor networks<>sasn<>sushil jajodia<>
29315<>280_156<>lingyu wang:anyi liu<>"using attack graphs for correlating, hypothesizing, and predicting intrusion alerts."<>comcom<>sushil jajodia<>
29333<>280_174<>nicola zannone:duminda wijesekera<>creating objects in the flexible authorization framework<>dbsec<>sushil jajodia<>
39281<>283_0<>yeh lam<>a delta<>eor<>ya-yong tang<>
3766<>286_1<>ichiro fujinaga<>metadata data dictionary for analog sound recordings<>jcdl<>catherine lai<>
17433<>291_0<>cindy dooling:cathy lee<>software management<>siguccs<>jeff white<>
25440<>297_0<>franck assous<>vlasov-maxwell simulations in singular geometries<>iccS<>patrick ciarlet jr.<>
25439<>298_0<>paulo guimaraes<>improving the analyses of nestedness for large sets of matrices<>envsoft<>paulo r. guimaraes jr.<>
18598<>302_0<>ravi kannan<>the space complexity of pass-efficient algorithms for clustering<>soda<>kevin l. chang<>
18601<>304_0<>joseph e. beck:jack mostow:albert t. corbett<>a bayes net toolkit for student modeling in intelligent tutoring systems<>its<>kai-min chang<>
18550<>307_7<>bin he<>automatic complex schema matching across web query interfaces: a correlation mining approach<>tods<>kevin chen-chuan chang<>
18568<>307_25<>junghoo cho<>accessing the web: from search to integration<>sigmod<>kevin chen-chuan chang<>
18586<>307_43<>chengkai li:ihab f. ilyas<>supporting ad-hoc ranking aggregates<>sigmod<>kevin chen-chuan chang<>
7308<>309_1<>joshua j. pauli<>ensuring consistent use/misuse case decomposition for secure systems<>seke<>dianxiang xu<>
7314<>309_7<>kendall e. nygard<>threat-driven modeling and verification of secure software using aspect-oriented petri nets<>tse<>dianxiang xu<>
7316<>309_9<>vivek goel:kendall e. nygard<>an aspect-oriented approach to security requirements analysis<>compsac<>dianxiang xu<>
7318<>309_11<>joshua j. pauli<>integrating functional and security requirements with use case decomposition<>iceccs<>dianxiang xu<>
7323<>309_16<>weifeng xu<>state-based incremental testing of aspect-oriented programs<>aosd<>dianxiang xu<>
18605<>314_0<>david chenho kung<>model checking with induction<>compsac<>kuangnan chang<>
3269<>319_5<>tao li<>the relationships among various nonnegative matrix factorization methods for clustering<>icdm<>chris h. q. ding<>
3271<>319_7<>andy m. yip:tony f. chan<>dynamic cluster formation using level set methods<>pami<>chris h. q. ding<>
3285<>319_21<>tao li:wei peng<>"nonnegative matrix factorization and probabilistic latent semantic indexing: equivalence chi-square statistic, and a hybrid method."<>aaai<>chris h. q. ding<>
3290<>319_26<>chunlin wang:richard f. meraz:stephen r. holbrook<>psol: a positive sample only learning algorithm for finding non-coding rna genes<>bioinformatics<>chris h. q. ding<>
7290<>321_0<>j. b. yang:y. m. wang:k. s. chin<>the evidential reasoning approach for mada under both probabilistic and fuzzy uncertainties<>eor<>d. l. xu<>
7291<>321_1<>jian-bo yang:ying-ming wang<>the evidential reasoning approach for multi-attribute decision analysis under interval uncertainty<>eor<>dong-ling xu<>
7294<>321_4<>mccarthy:jian-bo yang<>intelligent decision system and its application in business innovation self assessment<>dss<>dong-ling xu<>
7295<>321_5<>ying-ming wang:jian-bo yang:kwai-sang chin<>the evidential reasoning approach for multiple attribute decision analysis using interval belief degrees<>eor<>dong-ling xu<>
7296<>321_6<>ying-ming wang:jian-bo yang<>environmental impact assessment using the evidential reasoning approach<>eor<>dong-ling xu<>
7299<>322_1<>shijia gao:huaiqing wang:yingfeng wang:wenqi shen:siubun yeung<>intelligent decision support for family financial planning<>hicss<>dongming xu<>
9605<>323_2<>tak wah lam:kin-shing liu<>extra unit-speed machines are almost as powerful as speedy machines for competitive flow time scheduling<>soda<>ho-leung chan<>
9608<>323_5<>tak wah lam:wing-kin sung:siu-lung tam:swee-seong wong<>compressed indexes for approximate string matching<>esa<>ho-leung chan<>
23592<>333_32<>m. armoni:s. rodger:r. verma<>automata theory: its relevance to computer science students and course contents<>sigcse<>moshe y. vardi<>
23595<>333_35<>roy armoni:dmitry korchemny:andreas tiemeyer:yael zbar<>deterministic dynamic monitors for linear-time assertions<>fates<>moshe y. vardi<>
23603<>333_43<>hana chockler:orna kupferman<>coverage metrics for temporal logic model checking<>fmsd<>moshe y. vardi<>
23640<>333_80<>ehud friedgut:orna kupferman<>buchi complementation made tighter<>ijfcs<>moshe y. vardi<>
23649<>333_89<>orna kupferman:nir piterman<>safraless compositional synthesis<>cav<>moshe y. vardi<>
23651<>333_91<>hana chockler:orna kupferman<>coverage metrics for formal verification<>sttt<>moshe y. vardi<>
23660<>333_100<>orna kupferman:shmuel safra<>relating word and tree automata<>apal<>moshe y. vardi<>
23671<>333_111<>guoqiang pan<>fixed-parameter hierarchies inside pspace<>lics<>moshe y. vardi<>
23684<>333_124<>orna kupferman:yoad lustig<>on locally checkable properties<>lpar<>moshe y. vardi<>
23689<>333_129<>guoqiang pan:ulrike sattler<>bdd-based decision procedures for the modal logic k<>jancl<>moshe y. vardi<>
23702<>333_142<>william aspray:a. frank mayadas:stuart h. zweben<>educational response to offshore outsourcing<>sigcse<>moshe y. vardi<>
23722<>333_162<>orna kupferman<>memoryful branching-time logic<>lics<>moshe y. vardi<>
31409<>334_5<>csaba d. toth:yunhong zhou<>range counting over multidimensional data streams<>dcg<>subhash suri<>
31421<>335_4<>michael s. kearns<>networks preserving evolutionary equilibria and the power of randomization<>sigecom<>siddharth suri<>
30459<>336_6<>meeyoung cha:chong-dae park:aman shaikh<>placing relay nodes for intra-domain path diversity<>infocom<>sue moon<>
30460<>336_7<>meeyoung cha:wanpracha art chaovalitwongse:zihui ge:jennifer yates<>path protection routing with srlg constraints to support iptv in wdm mesh networks<>infocom<>sue moon<>
34412<>340_2<>jianzhuan wu:peter che bor lam:guohua gu<>several parameters of generalized mycielskians<>dam<>wensong lin<>
34417<>344_0<>nulo<>identifying perspectives at the document and sentence levels using statistical models<>naacl<>wei-hao lin<>
34421<>344_4<>alexander g. hauptmann:rong yan:jun yang:robert v. baron:ming-yu chen:sean gilroy:michael d. gordon<>exploring the synergy of humans and machines in extreme video retrieval<>civr<>wei-hao lin<>
34422<>344_5<>alexander g. hauptmann:rong yan:jun yang:ming-yu chen<>extreme video retrieval: joint maximization of human and computer performance<>mm<>wei-hao lin<>
34427<>345_0<>tianping chen<>analysis of two restart algorithms<>ijon<>wei lin<>
9633<>348_1<>patrick schaumont:ingrid verbauwhede<>process isolation for reconfigurable hardware<>ersa<>herwin chan<>
9634<>348_2<>yong ki lee:ingrid verbauwhede<>throughput optimized sha-1 architecture using unfolding transformation<>asap<>herwin chan<>
9635<>348_3<>m. griot:a. vila casado:richard d. wesel:ingrid verbauwhede<>high speed channel coding architectures for the uncoordinated or channel<>asap<>herwin chan<>
9636<>349_0<>olabisi emmanuel falowo<>joint call admission control for next generation wireless network<>ccece<>h. anthony chan<>
9637<>349_1<>oladayo salami:mqhele e. dlodlo<>a scalable qos guaranteeing scheme for scheduling ip traffic<>woc<>h. anthony chan<>
9611<>352_1<>michael dinitz:anupam gupta<>spanners with slack<>esa<>hubert t.-h. chan<>
9616<>353_4<>debabrata dash:adrian perrig:hui zhang<>modeling adoptability of secure bgp protocols<>sigmetrics<>haowen chan<>
33282<>355_14<>jingyu zhou:caijie zhang:lingkun chu<>request-aware scheduling for busy internet services<>infocom<>tao yang<>
33290<>355_22<>jingyu zhou<>selective early request termination for busy internet services<>www<>tao yang<>
33319<>362_0<>minrui fei:dingyu xue:yuemei tan:xiaobing zhou<>a proposed case study for networked control system<>icic<>taicheng yang<>
9648<>366_0<>dit-yan yeung<>robust locally linear embedding<>pr<>hong chang<>
9651<>366_3<>dit-yan yeung<>locally linear metric adaptation with application to semi-supervised clustering and image retrieval<>pr<>hong chang<>
9655<>367_0<>philippe collet:alain ozanne:nicolas rivierre<>from components to autonomic elements using negotiable contracts<>atc<>herve chang<>
2495<>376_0<>matias madou:bertrand anckaert:bruno de bus:koen de bosschere:jan cappaert<>on the effectiveness of source code transformations for binary obfuscation<>serp<>bart preneel<>
20435<>377_0<>mong-li lee:wynne hsu<>rewriting queries for xml integration systems<>dexa<>ling li<>
20430<>379_0<>alfred s. l. cheng:victor x. jin:henry h. paik:meiyun fan:xiaoman li:wei zhang:jason robarge:curtis balch:ramana v. davuluri:sun kim:tim hui-ming huang:kenneth p. nephew<>a mixture model-based discriminate analysis for identifying ordered transcription factor binding site pairs in gene promoters directly regulated by estrogen receptor-alpha<>bioinformatics<>lang li<>
9658<>380_1<>vishal misra:dan rubenstein<>a general model and analysis of physical layer capture in 802.11 networks<>infocom<>hoon chang<>
20431<>381_0<>frederick w. b. li:rynson w. h. lau<>a trajectory-preserving synchronization method for collaborative visualization<>tvcg<>lewis w. f. li<>
14660<>389_0<>erwin p. gianchandani:jason a. papin<>flux balance analysis in the era of metabolomics<>bib<>jong min lee<>
38348<>391_2<>ting wang:kalina bontcheva:hamish cunningham:ji wang<>automatic extraction of hierarchical relations from text<>esws<>yaoyong li<>
38349<>391_3<>john shawe-taylor<>using kcca for japanese-english cross-language information retrieval and document classification<>jiis<>yaoyong li<>
14652<>394_6<>nobok lee<>least modification principle for case-based reasoning: a software project planning experience<>eswa<>jae kyu lee<>
38332<>399_0<>bao-liang lu:zhong-fu wu<>a hybrid method of unsupervised feature selection based on ranking<>icpr<>yun li<>
38343<>400_9<>wenan zang<>differential methods for finding independent sets in hypergraphs<>siamdm<>yusheng li<>
38344<>401_0<>tulay adali:vince d. calhoun<>sample dependence correction for order selection in fmri analysis<>isbi<>yi-ou li<>
14643<>405_3<>jiwoon jeon:w. bruce croft:soyeon park<>a framework to predict the quality of answers with non-textual features<>sigir<>joon ho lee<>
14673<>409_0<>nulo<>embracing agile development of usable software systems<>chi<>jason chong lee<>
14674<>409_1<>sarav bhatia:curtis dahn:miten sampat:d. scott mccrickard<>vtassist: a location-based feedback notification system for the disabled<>ACMse<>jason chong lee<>
14676<>409_3<>sandeep nair:anupam kumar:miten sampat:d. scott mccrickard<>alumni campus tour: capturing the fourth dimension in location based notification systems<>ACMse<>jason chong lee<>
38312<>411_1<>rajasekar krishnamurthy:shivakumar vaithyanathan:h. v. jagadish<>getting work done on the web: supporting transactional queries<>sigir<>yunyao li<>
38313<>411_2<>huahai yang:h. v. jagadish<>constructing a generic natural language interface for an xml database<>edbt<>yunyao li<>
38316<>411_5<>huahai yang:h. v. jagadish<>term disambiguation in natural language query for xml<>fqas<>yunyao li<>
38325<>413_8<>evan welbourne:james a. landay<>design and experimental analysis of continuous location tracking techniques for wizard of oz testing<>chi<>yang li<>
38300<>419_2<>xin chen<>a new stochastic pso technique for neural network training<>isnn<>yangmin li<>
38305<>420_1<>william a. p. smith:edwin r. hancock<>face recognition using patch-based spin images<>icpr<>yang li<>
38306<>420_2<>william a. p. smith:edwin r. hancock<>face recognition with region division and spin images<>ciarp<>yang li<>
14668<>421_0<>kang hoon lee<>precomputing avatar behavior from human motion data<>cvgip<>jehee lee<>
22753<>424_6<>roland geraerts<>sampling and node adding in probabilistic roadmap planners<>ras<>mark h. overmars<>
22867<>424_120<>pankaj k. agarwal:micha sharir<>computing maximally separated sets in the plane<>siamcomp<>mark h. overmars<>
38390<>433_0<>yong-duan song:tao dong<>using grid computing for distributed software testing<>pdpta<>yaohang li<>
38381<>438_0<>janelle j. harms:robert holte<>optimal traffic-oblivious energy-aware routing for multihop wireless networks<>infocom<>yuxi li<>
16375<>439_0<>david p. nicholls<>a stable high-order method for two-dimensional bounded-obstacle scattering<>siamsc<>jie shen<>
16376<>439_1<>ben-yu guo:li-lian wang<>optimal spectral-galerkin methods using generalized jacobi polynomials<>jscic<>jie shen<>
16374<>441_1<>lida li:thomas g. dietterich:jonathan l. herlocker<>a hybrid learning system for recognizing user tasks from desktop activities and email messages<>iui<>jianqiang shen<>
16382<>445_3<>victor r. lesser<>communication management using abstraction in distributed bayesian networks<>atal<>jiaying shen<>
16348<>446_0<>adrian bondy:stephan thomasse:carsten thomassen<>density conditions for triangles in multipartite graphs<>combinatorica<>jian shen<>
16366<>447_2<>sung ha kang<>video dejittering by bake and shake<>ivc<>jianhong shen<>
16369<>448_0<>starr roxanne hiltz:michael bieber<>"collaborative online examinations: impacts on interaction, learning, and student satisfaction."<>tsmc<>j. shen<>
14678<>450_0<>tsung i. lin:hsiu j. ho<>on fast supervised learning for normal mixture models with missing information<>pr<>jack c. lee<>
14681<>455_0<>michael terribilini:changhui yan:robert l. jernigan:susan carpenter<>"identifying interaction sites in ""recalcitrant"" proteins: predicted protein and rna binding sites in rev proteins of hiv-1 and eiav agree with experimental data."<>psb<>jae-hyung lee<>
38369<>456_0<>haizhou ai:chang huang:shihong lao<>robust head tracking based on a multi-state particle filter<>fgr<>yuan li<>
38370<>456_1<>haizhou ai:chang huang:shihong lao<>robust head tracking with particles based on multiple cues fusion<>eccv<>yuan li<>
38365<>462_0<>shietung peng:wanming chu<>k-mcore for multicasting on mobile ad hoc networks<>pdcat<>yamin li<>
38366<>463_0<>xiaohui tao:ning zhong:richi nayak<>automatically acquiring training sets for web information gathering<>webi<>yuefeng li<>
5372<>467_0<>liang gao:hai-bing gao:yong-ren shi<>credit scoring model based on neural network with particle swarm optimization<>icnc<>chi zhou<>
5373<>467_1<>liang gao:hai-bing gao:kun zan<>particle swarm optimization for simultaneous optimization of design and machining tolerances<>seal<>chi zhou<>
5375<>469_0<>chunming liu<>providing quality of service in ieee 802.11 wlan<>aina<>chi zhou<>
14693<>474_0<>stacy marsella<>nonverbal behavior generator for embodied conversational agents<>iva<>jina lee<>
14691<>476_0<>soojin jun:jodi forlizzi:scott e. hudson<>using kinetic typography to convey emotion in text-based interpersonal communication<>ACMdis<>joonhwan lee<>
14690<>477_0<>seung-yeon kim<>double optimization for design of protein energy function<>icic<>julian lee<>
1097<>481_5<>mark ivester<>interactive and extensible framework for execution and monitoring of wireless sensor networks<>comsware<>alvin lim<>
19491<>483_11<>rakesh kumar:david d. yao:amitabha bagchi:dan rubenstein<>fluid modeling of pollution proliferation in p2p networks<>sigmetrics<>keith w. ross<>
19446<>485_21<>john cieslewicz:jonathan w. berry:bruce hendrickson<>realizing parallelism in database operations: insights from a massively multithreaded architecture<>damon<>kenneth a. ross<>
16864<>486_0<>r. charnigo:raymond f. muzic jr.<>a semi-local paradigm for wavelet denoising<>tip<>jiayang sun<>
16863<>490_0<>ata kaban:somak raychaudhury:louisa nolan<>on class visualisation for high dimensional data: exploring scientific data sets<>dis<>jianyong sun<>
1034<>492_2<>brian rodrigues:caixia wang<>two-machine flow shop problems with a single server<>scheduling<>andrew lim<>
1037<>492_5<>b. rodrigues:x. zhang<>scheduling sports competitions at multiple venues - revisited<>eor<>a. lim<>
1043<>492_11<>qun chen:kian win ong:jiqing tang<>indexing graph-structured xml data for efficient structural join operation<>dke<>andrew lim<>
1045<>492_13<>yunsong guo:brian rodrigues:jiqing tang<>using a lagrangian heuristic for a combinatorial auction problem<>ijait<>andrew lim<>
1050<>492_18<>qun chen:kian win ong:jiqing tang<>indexing xml documents for xpath query processing in external memory<>dke<>andrew lim<>
1058<>492_26<>yunsong guo:brian rodrigues:yi zhu<>heuristics for a bidding problem<>cor<>andrew lim<>
1062<>492_30<>brian rodrigues:fei xiao<>heuristics for matrix bandwidth reduction<>eor<>andrew lim<>
1067<>492_35<>fan wang:zhou xu<>the one-commodity pickup and delivery travelling salesman problem on a path or a tree<>networks<>andrew lim<>
1082<>492_50<>gaofeng huang<>a hybrid genetic algorithm for the three-index assignment problem<>eor<>andrew lim<>
13303<>498_0<>hangzai luo<>building concept ontology for medical video annotation<>mm<>jianping fan<>
13311<>500_2<>i-fan liao:sheldon x.-d. tan:yici cai:xianlong hong<>localized on-chip power delivery network optimization via sequence of linear programming<>isqed<>jeffrey fan<>
11298<>501_0<>jianfeng gao:bin yu<>approximation lasso methods for language modeling<>acl<>hisami suzuki<>
11305<>501_7<>jianfeng gao:wei yuan<>an empirical study on language model adaptation<>talip<>hisami suzuki<>
11306<>501_8<>kristina toutanova<>learning to predict case markers in japanese<>acl<>hisami suzuki<>
13920<>504_7<>karen p. tang:pedram keyani:james fogarty<>putting people in their place: an anonymous and privacy-sensitive approach to collecting sensed data in location-based applications<>chi<>jason i. hong<>
13928<>504_15<>jeffrey wong<>marmite: end-user programming for the web<>chi<>jason i. hong<>
15335<>506_4<>jean-paul sansonnet:david leray<>architecture of a framework for generic assisting conversational agents<>iva<>jean-claude martin<>
15336<>506_5<>stephanie buisine:sarkis abrilian:radoslaw niewiadomski:laurence devillers:catherine pelachaud<>perception of blended emotions: from video corpus to expressive agent<>iva<>jean-claude martin<>
14288<>507_0<>dmitry m. malioutov:alan s. willsky<>walk-sums and belief propagation in gaussian graphical models<>jmlr<>jason k. johnson<>
39264<>509_0<>min-yen kan:dongwon lee<>search engine driven author disambiguation<>jcdl<>yee fan tan<>
15342<>513_0<>nulo<>spectral techniques for graph bisection in genetic algorithms<>gecco<>jacob g. martin<>
21773<>514_0<>david g. glynn:t. aaron gulliver<>linear transformations on codes<>dm<>manish k. gupta<>
39262<>515_1<>viet anh nguyen<>efficient block-matching motion estimation based on integral frame attributes<>tcsv<>yap-peng tan<>
21778<>517_1<>srinivasa g. narasimhan:craig donner:ravi ramamoorthi:shree k. nayar:henrik wann jensen<>acquiring scattering properties of participating media by dilution<>tog<>mohit gupta<>
21779<>521_0<>gopa r. mishra:m. suresh:k. kumaran:n. kannabiran:shubha suresh:p. bala:k. shivakumar:n. anuradha:raghunath reddy:t. madhan raghavan:shalini menon:g. hanumanthu:sapna upendran:shweta gupta:m. mahesh:bincy jacob:pinky mathew:pritam chatterjee:k. s. arun:salil sharma:k. n. chandrika:nandan deshpande:kshitish palvankar:r. raghavnath:r. krishnakanth:hiren karathia:b. rekha:rashmi nayak:g. vishnupriya:h. g. mohan kumar:m. nagini:g. s. sameer kumar:rojan jose:p. deepthi:s. sujatha mohan:t. k. b. gandhi:h. c. harsha:krishna s. deshpande:malabika sarker:t. s. keshava prasad:akhilesh pandey<>human protein reference database - 2006 update<>nar<>malvika gupta<>
15306<>523_2<>lorenzo alvisi<>fast byzantine consensus<>tdsc<>jean-philippe martin<>
14291<>528_0<>geoffrey werner-allen:konrad lorincz:matt welsh:omar marcillo:mario ruiz:jonathan lees<>deploying a wireless sensor network on an active volcano<>internet<>jeff johnson<>
33905<>529_0<>koji eguchi<>boosting relevance model performance with query term dependence<>cikm<>w. bruce croft<>
33911<>529_6<>yun zhou<>ranking robustness: a novel framework to predict query performance<>cikm<>w. bruce croft<>
33914<>529_9<>koji eguchi<>query structuring with two-stage term dependence in the japanese language<>airs<>w. bruce croft<>
33930<>529_25<>desislava petkova<>hierarchical language models for expert finding in enterprise corpora<>ictai<>w. bruce croft<>
33947<>529_42<>xing wei<>lda-based document models for ad-hoc retrieval<>sigir<>w. bruce croft<>
33952<>529_47<>jiwoon jeon:joon ho lee:soyeon park<>a framework to predict the quality of answers with non-textual features<>sigir<>w. bruce croft<>
33958<>529_53<>xiaoyong liu<>representing clusters for retrieval<>sigir<>w. bruce croft<>
33962<>529_57<>chirag shah:david jensen<>representing documents with named entities for story link detection (sld)<>cikm<>w. bruce croft<>
33972<>529_67<>steve cronen-townsend:yun zhou<>precision prediction based on ranked list coherence<>ir<>w. bruce croft<>
33975<>529_70<>donald metzler<>beyond bags of words: modeling implicit user preferences in information retrieval<>aaai<>w. bruce croft<>
4383<>537_4<>w. j. padgett<>stochastic degradation models with several accelerating variables<>tr<>c. park<>
25366<>542_0<>tsang-yi wang:yunghsiang s. han:yung-ti wang<>on the design of soft-decision fusion rule for coding approach in wireless sensor networks<>wasa<>po-ning chen<>
25348<>545_1<>rakesh m. verma<>a query-based medical information summarization system using ontology knowledge<>cbms<>ping chen<>
25349<>545_2<>hisham al-mubaid<>context-based term disambiguation in biomedical literature<>flairs<>ping chen<>
25353<>545_6<>chengmin ding<>mining executive compensation data from sec filings<>icde<>ping chen<>
25334<>546_11<>samuel t. king:yi-min wang:chad verbowski:helen j. wang:jacob r. lorch<>subvirt: implementing malware with virtual machines<>sp<>peter m. chen<>
25339<>546_16<>edmund b. nightingale:jason flinn<>speculative execution in a distributed file system<>tocs<>peter m. chen<>
32679<>553_0<>jae yeol ha:sunghyun choi:wook hyun kwon<>virtual channel management for densely deployed ieee 802.15.4 lr-wpans<>percom<>tae-hyun kim<>
32681<>556_0<>torbjorn eltoft:te-won lee<>independent vector analysis: an extension of ica to multivariate components<>ica<>taesu kim<>
39592<>568_0<>lijun bo:lidong zhang<>on the first passage times of reflected o-u processes with two-sided barriers<>questa<>yongjin wang<>
39591<>570_0<>guisseppi a. forgionne<>a decision-theoretic approach to the evaluation of information retrieval systems<>ipm<>ye diana wang<>
38865<>572_1<>mei guo:feng wu:debin zhao:wen gao<>practical wyner-ziv switching scheme for multiple bit-rate video streaming<>icip<>yan lu<>
38866<>572_2<>xun guo:feng wu:wen gao:shipeng li<>wyner-ziv video coding based on set partitioning in hierarchical tree<>icip<>yan lu<>
39584<>574_0<>kathleen a. hill:shiva singh<>mining invariants in biological sequences<>incdm<>yingwei wang<>
38863<>575_0<>ronald rosenfeld:ziv bar-joseph<>identifying cycling genes by combining sequence homology and expression data<>ismb<>yong lu<>
38861<>578_1<>mingjie lin:abbas el gamal:simon wong<>performance benefits of monolithically stacked 3d-fpga<>fpga<>yi-chang lu<>
38837<>581_0<>nathaniel pettis:jason ridenour<>automatic run-time selection of power policies for operating systems<>date<>yung-hsiang lu<>
38840<>581_3<>le cai<>power reduction of multiple disks using dynamic cache resizing and speed control<>islped<>yung-hsiang lu<>
38843<>581_6<>nathaniel pettis:le cai<>statistically optimal dynamic power management for streaming data<>tc<>yung-hsiang lu<>
38844<>581_7<>changjiu xian<>dynamic voltage scaling for multitasking real-time systems with uncertain execution time<>glvlsi<>yung-hsiang lu<>
38848<>581_11<>douglas herbert:saurabh bagchi:zhiyuan li<>detection and repair of software errors in hierarchical sensor networks<>sutc<>yung-hsiang lu<>
38854<>581_17<>yongguo mei:changjiu xian:saumitra m. das:y. charlie hu<>replacing failed sensor nodes by mobile robots<>icdcsw<>yung-hsiang lu<>
38856<>581_19<>dimitrios koutsonikolas:saumitra m. das:y. charlie hu:c. s. george lee<>cocoa: coordinated cooperative localization for mobile multi-robot ad hoc networks<>icdcsw<>yung-hsiang lu<>
38857<>581_20<>chris gniady:ali raza butt:y. charlie hu<>program counter-based prediction techniques for dynamic power management<>tc<>yung-hsiang lu<>
38859<>581_22<>changjiu xian<>energy reduction by workload adaptation in a multi-process environment<>date<>yung-hsiang lu<>
38871<>584_0<>vwani p. roychowdhury<>parallel randomized support vector machine<>pakdd<>yumao lu<>
38872<>584_1<>fuchun peng:xin li:nawaaz ahmed<>coupling feature selection and machine learning methods for navigational query identification<>cikm<>yumao lu<>
38834<>588_0<>chengjie cai:weixian liu:jeffrey shiang fu<>a new approach for ground moving target indication in foliage environment<>sigpro<>yilong lu<>
38828<>589_0<>shiyong lu:jeffrey l. ram<>fast search in dna sequence databases using punctuation and indexing<>acst<>yi lu<>
38829<>589_1<>shiyong lu:farshad fotouhi:yan sun:zijiang yang:lily r. liang<>pdc: pattern discovery with confidence in dna sequences<>acst<>yi lu<>
38830<>589_2<>shiyong lu:adrian e. platts:stephen a. krawetz<>mining correlation between motifs and gene expression<>icdm<>yi lu<>
38833<>589_5<>shiyong lu:feng cao<>pama: a fast string matching algorithm<>ijfcs<>yi lu<>
6275<>590_2<>john d. villasenor:wayne luk:philip heng wai leong<>a hardware gaussian noise generator using the box-muller method and its error analysis<>tc<>dong-u lee<>
6278<>590_5<>altaf abdul gaffar:ray c. c. cheung:oskar mencer:wayne luk:george a. constantinides<>accuracy-guaranteed bit-width optimization<>tcad<>dong-u lee<>
6227<>591_6<>baihua zheng:jianliang xu:wang-chien lee<>grid-partition index: a hybrid method for nearest-neighbor queries in wireless location-based services<>vldb<>dik lun lee<>
6250<>591_29<>yiping ke:lin deng:wilfred ng<>web dynamics and their ramifications for the development of web search engines<>cn<>dik lun lee<>
6267<>591_46<>haibo hu:jianliang xu<>fast nearest neighbor search on road networks<>edbt<>dik lun lee<>
6270<>591_49<>haibo hu:victor c. s. lee<>distance indexing on road networks<>vldb<>dik lun lee<>
28790<>593_0<>sekyung huh:su myeon kim:junehwa song:yoon-joon lee<>a scalable update management mechanism for query result caching systems at database-driven web sites<>apweb<>seunglak choi<>
6293<>594_12<>guoqiang shu<>network protocol system fingerprinting - a formal approach<>infocom<>david lee<>
6350<>597_2<>byung-won on:ergin elmacioglu:jaewoo kang:jian pei<>improving grouped-entity resolution using quasi-cliques<>icdm<>dongwon lee<>
6361<>598_0<>seo-il kang:dae-hee seo:im-yeong lee<>authentication for single/multi domain in ubiquitous computing using attribute certification<>iccsa<>deok-gyu lee<>
6363<>598_2<>seo-il kang:im-yeong lee<>an intelligent and efficient traitor tracing for ubiquitous environments<>kes<>deok-gyu lee<>
6366<>598_5<>jang-su park:im-yeong lee<>broadcast encryption using efficient key distribution and renewal for ubiquitous environments<>euc<>deok-gyu lee<>
6369<>598_8<>gwanghoon kim:soyeon hwang<>"tracking illegal system access in a ubiquitous environment - proposal for ats, a traceback system using stop."<>iccsa<>deokgyu lee<>
28806<>600_1<>maengsoon baik:joon-min gil:chan yeol park:soon young jung:chong-sun hwang<>group-based dynamic computational replication mechanism in peer-to-peer grid computing<>ccgrid<>sungjin choi<>
28808<>600_3<>maengsoon baik:joon-min gil:soon young jung:chong-sun hwang<>adaptive group scheduling mechanism using mobile agents in peer-to-peer grid computing environment<>apin<>sungjin choi<>
28810<>600_5<>insung kang:hongsoo kim:maengsoon baik:chong-sun hwang<>multi-node global directory construction in peer-to-peer systems<>aina<>sungjin choi<>
28813<>600_8<>eunjoung byun:hongsoo kim:chong-sun hwang<>probabilistic observation prediction model based e4 scheduling mechanism in peer to peer grid computing<>gcc<>sungjin choi<>
28816<>600_11<>eunjoung byun:hongsoo kim:maengsoon baik:soojin goo:joon-min gil:harksoo park:chong-sun hwang<>advanced stochastic host state modeling to reliable computation in global computing environment<>euc<>sungjin choi<>
28795<>606_0<>hojung cha:rhan ha<>a selective dvs technique based on battery residual<>mam<>sukwon choi<>
28800<>610_1<>h. h. cheung<>a topological hierarchy-based approach to toolpath planning for multi-material layered manufacturing<>cad<>s. h. choi<>
28804<>612_2<>donald yeung<>learning-based smt processor resource distribution via hill-climbing<>isca<>seungryul choi<>
27255<>614_0<>patrick traynor:hussain bin saad:guohong cao:thomas f. la porta<>liger: implementing efficient hybrid security mechanisms for heterogeneous sensor networks<>mobisys<>raju kumar<>
34360<>616_0<>bruno vallet:nicolas ray:bruno levy<>representing higher-order singularities in vector fields on piecewise linear surfaces<>tvcg<>wan-chiu li<>
34362<>616_2<>nicolas ray:bruno levy:alla sheffer:pierre alliez<>periodic global parameterization<>tog<>wan-chiu li<>
34341<>621_2<>peter van beek:pascal poupart<>performing incremental bayesian inference by dynamic model counting<>aaai<>wei li<>
424<>622_6<>k. burgin:p. chebolu:colin cooper<>hamilton cycles in random lifts of graphs<>ejc<>alan m. frieze<>
437<>622_19<>michael krivelevich<>almost universal graphs<>rsa<>alan m. frieze<>
448<>622_30<>nulo<>random graphs<>soda<>alan m. frieze<>
469<>622_51<>abraham d. flaxman:michael krivelevich<>on the random 2-stage minimum spanning tree<>rsa<>alan m. frieze<>
34328<>623_2<>shensheng tang<>modeling and analysis of hierarchical cellular networks with bidirectional overflow and take-back strategies under generally distributed cell residence times<>telsys<>wei li<>
34329<>623_3<>shensheng tang<>qos supporting and optimal energy allocation for a cluster based wireless sensor network<>comcom<>wei li<>
34330<>623_4<>stephany edosa ogbonmwan<>multi-threshold bandwidth reservation scheme of an integrated voice/data wireless network<>comcom<>wei li<>
34367<>627_0<>huai-kuang tsai:grace tzu-wei huang:meng-yuan chou:henry horng-shing lu<>method for identifying transcription factor binding sites in yeast<>bioinformatics<>wen-hsiung li<>
11686<>628_2<>xudong xie:shuanhu wu:kin-man lam<>promoterexplorer: an effective promoter identification method based on the adaboost algorithm<>bioinformatics<>hong yan<>
11690<>628_6<>mustafa sakalli:kin-man lam<>a faster converging snake algorithm to locate object boundaries<>tip<>hong yan<>
11692<>629_1<>shi-min hu:ralph martin<>skeleton-based shape deformation using simplex transformations<>cgi<>han-bing yan<>
12147<>630_0<>george j. pappas:rance cleaveland:john hatcliff:bruce h. krogh:peter lee:harvey rubin:lui sha<>high-confidence medical device software and systems<>computer<>insup lee<>
25624<>633_4<>tassos dimitriou:sotiris e. nikoletseas<>the infection time of graphs<>dam<>paul g. spirakis<>
12148<>634_0<>konrad malkowski:padma raghavan:mary jane irwin<>on improving performance and energy profiles of sparse scientific applications<>ipps<>ingyu lee<>
6535<>636_3<>bo hong:scott a. brandt:ethan l. miller:ying lin<>using mems-based storage in computer systems - device modeling and management<>tos<>darrell d. e. long<>
6536<>636_4<>bo hong:feng wang 0003:scott a. brandt:thomas j. e. schwarz<>using mems-based storage in computer systems - mems storage architectures<>tos<>darrell d. e. long<>
6538<>636_6<>sage a. weil:scott a. brandt:ethan l. miller:carlos maltzahn<>"ceph: a scalable, high-performance distributed file system."<>osdi<>darrell d. e. long<>
12119<>638_0<>deok-gyu lee:seo-il kang:dae-hee seo<>authentication for single/multi domain in ubiquitous computing using attribute certification<>iccsa<>im-yeong lee<>
12124<>638_5<>deok-gyu lee:jang-su park<>broadcast encryption using efficient key distribution and renewal for ubiquitous environments<>euc<>im-yeong lee<>
12125<>638_6<>deok-gyu lee:seo-il kang<>an intelligent and efficient traitor tracing for ubiquitous environments<>kes<>im-yeong lee<>
12134<>641_2<>cherry keahey owen:haesun k. lee<>object-oriented design and implementation of the oe-scheduler in real time environments<>cata<>ilhyun lee<>
12139<>641_7<>arthur mcdonald:haklin kimm:haesun k. lee<>applying a multi-level security mechanism to a network address translation scheduler<>cata<>ilhyun lee<>
12128<>642_1<>carl-erik w. sundberg<>reduced-complexity receiver structures for space-time bit-interleaved coded modulation systems<>tcom<>inkyu lee<>
12145<>643_0<>x. yu:james j. knierim:h. z. shouval<>simulating place field dynamics using spike timing-dependent plasticity<>ijon<>i. lee<>
12142<>644_1<>zi ling<>adaptive multi-path video streaming<>ism<>ivan lee<>
18021<>648_1<>xiaodong wang:dharma p. agrawal<>impact of bursty error rates on the performance of wireless local area network (wlan)<>adhoc<>jun yin<>
18008<>649_0<>yiqiang chen:qiang yang:xiaoyong chai<>power-efficient access-point selection for indoor location estimation<>tkde<>jie yin<>
18010<>649_2<>dou shen:rong pan:jian-tao sun:jeffrey junfeng pan:kangheng wu:qiang yang<>query enrichment for web-query classification<>tois<>jie yin<>
2747<>656_2<>jie wu<>k-anycast routing schemes for mobile ad hoc networks<>ipps<>bing wu<>
2742<>662_6<>ram nevatia<>"tracking of multiple, partially occluded humans based on static body part detection."<>cvpr<>bo wu<>
11699<>665_1<>bradley r. schmerl:jonathan aldrich:david garlan:rick kazman<>discovering architectures from running systems<>tse<>hong yan<>
2761<>668_1<>li zhang<>a note on the cover degeneracy of graphs<>jgt<>baoyindureng wu<>
2750<>670_0<>brian d. davison<>undue influence: eliminating the impact of link plagiarism on web search rankings<>sac<>baoning wu<>
2754<>670_4<>brian d. davison<>detecting semantic cloaking on the web<>www<>baoning wu<>
31815<>673_0<>banu dost:buhm han:vineet bafna<>structural alignment of pseudoknotted rna<>recomb<>shaojie zhang<>
31817<>673_2<>ilya borovok:yair aharonowitz:roded sharan:vineet bafna<>a sequence-based filtering method for ncrna identification and its application to searching for riboswitch elements<>ismb<>shaojie zhang<>
31811<>676_0<>curtis e. dyreson<>symmetrically exploiting xml<>www<>shuohao zhang<>
31812<>676_1<>curtis e. dyreson:zhe dang<>compacting xml data<>dasfaa<>shuohao zhang<>
31808<>677_5<>qilong zhang<>edge vulnerability parameters of split graphs<>appml<>shenggui zhang<>
31810<>677_7<>bing chen<>an implicit degree condition for long cycles in 2-connected graphs<>appml<>shenggui zhang<>
31801<>678_0<>feng chen:xindong wu:chengqi zhang<>identifying bridging rules between conceptual clusters<>kdd<>shichao zhang<>
31802<>678_1<>jilian zhang:xiaofeng zhu:zifang huang<>identifying follow-correlation itemset-pairs<>icdm<>shichao zhang<>
29726<>682_0<>jeong-eom lee:yong-guk kim:min-soo jang:seok-joo lee:min chul park:gwi-tae park<>head detection and tracking for the car occupant's pose recognition<>ieaaie<>sang-jun kim<>
29720<>685_1<>jaehee kim<>a chim-based interactive tchebycheff procedure for multiple objective decision making<>cor<>sheung-kown kim<>
40078<>687_8<>robert bregovic:tapio saramaki:yong ching lim<>an efficient implementation of linear-phase fir filters for a rational sampling rate conversion<>iscas<>ya jun yu<>
29716<>690_1<>johnathan m. reason:han chen:changwoo jung:sunwoo lee:danny wong:andrew kim:jihye rhim:paul b. chou:kangyoon lee<>a framework for managing the solution life cycle of event-driven pervasive applications<>euc<>sooyeon kim<>
29689<>698_1<>jongseok kim:sunghyun choi:daji qiao<>cara: collision-aware rate adaptation for ieee 802.11 wlans<>infocom<>seongkwan kim<>
29690<>698_2<>sekyu park:sunghyun choi:jaehwan lee:hanwook jung<>management and diagnosis architecture for a large-scale public wlan<>wowmom<>seongkwan kim<>
29692<>699_0<>jong sou park:dong seong kim<>a hardware implementation of lightweight block cipher for ubiquitous computing security<>kes<>sung-hwan kim<>
29687<>700_0<>young-jong cho<>a distributed collision resolution scheme for improving the performance in wireless lans<>cn<>sun-myeng kim<>
25898<>703_1<>gabriel pui cheong fung:jeffrey xu yu:hongjun lu<>text classification without negative examples revisit<>tkde<>philip s. yu<>
25901<>705_0<>patrick schaumont<>executing hardware as parallel software for picoblaze networks<>fpl<>pengyuan yu<>
11910<>706_0<>herbert pang:aiping lin:matthew holford:bradley e. enerson:bin lu:michael p. lawton:eugenia floyd<>pathway analysis using random forests classification and regression<>bioinformatics<>hongyu zhao<>
11913<>707_2<>rizos sakellariou<>advance reservation policies for workflows<>jsspp<>henan zhao<>
11914<>707_3<>rizos sakellariou<>scheduling multiple dags onto heterogeneous systems<>ipps<>henan zhao<>
11929<>711_0<>bao-liang lu<>a modular reduction method for -nn algorithm with self-recombination learning<>isnn<>hai zhao<>
29650<>713_3<>jae won lee:jong sung bae<>effect of data normalization on fuzzy clustering of dna microarray data<>bmcbi<>seo young kim<>
29651<>714_0<>a. l. narasimha reddy<>an evaluation of the effectiveness of measurement-based anomaly detection techniques<>icdcsw<>seong soo kim<>
29658<>715_4<>namje park:jin kwak:dongho won:howon kim<>security techniques based on epc gen2 tag for secure mobile rfid network services<>kes<>seungjoo kim<>
29660<>715_6<>yunho lee:heasuk jo:dongho won<>an efficient dispute resolving method for digital images<>otm<>seungjoo kim<>
29661<>715_7<>namje park:jin kwak:dongho won:howon kim<>wipi mobile platform with secure service for mobile rfid network environment<>apweb<>seungjoo kim<>
29665<>715_11<>jeeyeon kim:kilsoo chun:jaeil lee:dongho won<>group key agreement protocol among mobile devices in different cells<>ispa<>seungjoo kim<>
29679<>716_0<>padhraic smyth:hal stern<>a nonparametric bayesian approach to detecting spatial activation patterns in fmri data<>miccai<>seyoung kim<>
29680<>716_1<>padhraic smyth<>segmental hidden markov models with random effects for waveform modeling<>jmlr<>seyoung kim<>
29682<>717_0<>durai sundaramoorthi:victoria c. p. chen:jay m. rosenberger:deborah f. buckley-behan<>a data-integrated nurse activity simulation model<>wsc<>seoung b. kim<>
29683<>717_1<>zhou wang<>automatic alignment of high-resolution nmr spectra using a bayesian estimation approach<>icpr<>seoung bum kim<>
29686<>718_2<>jonathan e. clark:mark r. cutkosky<>isprawl: design and tuning for high-speed autonomous open-loop running<>ijrr<>sangbae kim<>
29624<>722_1<>nulo<>cross-layer scheduling algorithm for wlan throughput improvement<>ispa<>sung won kim<>
29626<>722_3<>nulo<>opportunistic packet scheduling over ieee 802.11 wlan<>uic<>sung won kim<>
29628<>722_5<>nulo<>multi-user diversity for ieee 802.11 infrastructure wireless lan<>euc<>sung won kim<>
29629<>723_0<>byoung-tak zhang<>human papillomavirus risk type classification from protein sequences using support vector machines<>evoW<>sun kim<>
29633<>723_4<>jae-hong eom:sun kim:byoung-tak zhang<>a tree kernel-based method for protein-protein interaction mining from biomedical literature<>pakdd<>seong-hwan kim<>
29635<>724_0<>e. james whitehead jr.<>how long did it take to fix bugs?<>msr<>sunghun kim<>
29638<>724_3<>kai pan:e. james whitehead jr.<>micro pattern evolution<>msr<>sunghun kim<>
29639<>724_4<>thomas zimmermann:andreas zeller:e. james whitehead jr.<>mining version archives for co-changed lines<>msr<>sunghun kim<>
29640<>724_5<>thomas zimmermann:kai pan:e. james whitehead jr.<>automatic identification of bug-introducing changes<>kbse<>sunghun kim<>
29642<>724_7<>kai pan:e. james whitehead jr.<>memories of bug fixes<>sigsoft<>sunghun kim<>
29643<>724_8<>kai pan:e. james whitehead jr.<>bug classification using program slicing metrics<>scam<>sunghun kim<>
18124<>727_3<>l. h. you:javier romero rodriguez<>manipulation of elastically deformable surfaces through maya plug-in<>gmai<>jian j. zhang<>
18127<>727_6<>xiaosong yang<>automatic muscle generation for character skin deformation<>jvca<>jian j. zhang<>
18135<>727_14<>xiaosong yang<>stretch it - realistic smooth skinning<>IEEEcgiv<>jian j. zhang<>
18137<>727_16<>l. h. you<>deformation of dynamic surfaces<>iccS<>jian j. zhang<>
18139<>727_18<>xiaosong yang:arun somasekharan<>curve skeleton skinning for human and creature characters<>jvca<>jian j. zhang<>
18147<>730_3<>bo chen:yinyu ye<>lot-sizing scheduling with batch setup times<>scheduling<>jiawei zhang<>
18148<>730_4<>anthony man-cho so:yinyu ye<>stochastic combinatorial optimization with controllable risk aversion level<>approx<>jiawei zhang<>
18149<>730_5<>mohammad mahdian:yinyu ye<>approximation algorithms for metric facility location problems<>siamcomp<>jiawei zhang<>
18159<>731_2<>bo wang:lizhong zheng<>achievable rates and scaling laws of power-constrained wireless sensory relay networks<>tit<>junshan zhang<>
18175<>731_18<>bo wang<>"throughput scaling of wideband sensory relay networks: cooperative relaying, power allocation and achievable rates."<>infocom<>junshan zhang<>
18221<>732_11<>jie wang:weijun zhong<>nnmf-based factorization techniques for high-accuracy privacy protection on non-negative-valued datasets<>icdm<>jun zhang<>
18226<>732_16<>wensheng shen:fuqian yang<>newton's method for steady and unsteady reacting flows<>ACMse<>jun zhang<>
18208<>734_2<>jean ponce:tamara l. berg:mark everingham:david a. forsyth:martial hebert:svetlana lazebnik:marcin marszalek:cordelia schmid:bryan c. russell:a. torralba:christopher k. i. williams:andrew zisserman<>dataset issues in object recognition<>clor<>jianguo zhang<>
40008<>736_6<>lin shi:nathan bell:wei-wen feng<>a fast multigrid algorithm for mesh deformation<>tog<>yizhou yu<>
40033<>737_8<>pak-lok poon<>procurement of enterprise resource planning systems: experiences with some hong kong companies<>icse<>yuen-tak yu<>
40049<>741_3<>alexei lapouchnian:sotirios liaskos:john mylopoulos<>requirements-driven design of autonomic application software<>cascon<>yijun yu<>
40057<>741_11<>sotirios liaskos:alexei lapouchnian:eric yu:john mylopoulos<>on goal-based variability acquisition and analysis<>re<>yijun yu<>
31952<>743_4<>keiko udaka:john sidney:alessandro sette:kiyoko f. aoki-kinoshita:hiroshi mamitsuka<>improving mhc binding peptide prediction by incorporating binding data of auxiliary mhc molecules<>bioinformatics<>shanfeng zhu<>
31940<>746_10<>tao li:mitsunori ogihara<>integrating features from different sources for music information retrieval<>icdm<>shenghuo zhu<>
31943<>746_13<>tao li:chengliang zhang<>empirical studies on multi-label classification<>ictai<>shenghuo zhu<>
31899<>748_2<>hong chen:zijian xu:ziqiang liu<>composite templates for cloth modeling and sketching<>cvpr<>song chun zhu<>
31916<>748_19<>zhuowen tu<>"parsing images into regions, curves, and curve groups."<>ijcv<>song chun zhu<>
31922<>748_25<>zhuowen tu:xiangrong chen:alan l. yuille<>"image parsing: unifying segmentation, detection, and recognition."<>clor<>song chun zhu<>
12314<>759_21<>ted briscoe:rebecca watson<>the second release of the rasp system<>acl<>john carroll<>
19067<>762_0<>aviral shrivastava:ilya issenin:nikil dutt:nalini venkatasubramanian<>mitigating soft error failures for multimedia applications by selective data protection<>cases<>kyoungwoo lee<>
19071<>769_0<>jehee lee<>precomputing avatar behavior from human motion data<>cvgip<>kang hoon lee<>
19073<>772_0<>wang-chien lee:baihua zheng:jianliang xu<>caching complementary space for location-based services<>edbt<>ken c. k. lee<>
20265<>773_0<>nico cornelis:kurt cornelis<>fast compact city modeling for navigation pre-visualization<>cvpr<>luc j. van gool<>
20263<>775_1<>till quack:vittorio ferrari<>video mining with frequent itemset configurations<>civr<>luc j. van gool<>
19077<>778_0<>younbo jung:jaywoo kim:sang ryong kim<>"are physically embodied social agents better than disembodied social agents?: the effects of physical embodiment, tactile interaction, and people's loneliness in human-robot interaction."<>ijmms<>kwan min lee<>
20063<>781_0<>kun-yan chiou:hahn-ming lee:jan-ming ho<>web appearance disambiguation of personal names based on network motif<>webi<>kai-hsiang yang<>
20066<>781_3<>jan-ming ho<>proof: a dht-based peer-to-peer search engine<>webi<>kai-hsiang yang<>
20067<>781_4<>chi-jen wu:jan-ming ho<>antsearch: an ant search algorithm in unstructured peer-to-peer networks<>iscc<>kai-hsiang yang<>
20047<>783_0<>juan a. garay:philip d. mackenzie:manoj prabhakaran<>resource fairness and composability of cryptographic protocols<>tcc<>ke yang<>
20052<>783_5<>juan a. garay:philip d. mackenzie<>strengthening zero-knowledge protocols using signatures<>joc<>ke yang<>
40911<>788_0<>stephen m. shaw:matthew j. yedwabnick:christina chan<>using a state-space model with hidden variables to infer transcription factor activities<>bioinformatics<>zheng li<>
40902<>791_0<>li gao:aggelos k. katsaggelos<>fast video shot retrieval with luminance field trace indexing and geometry matching<>icip<>zhu li<>
2312<>794_0<>andrew b. kahng:sheldon x.-d. tan<>efficient decoupling capacitor planning via convex programming methods<>ispd<>bao liu<>
22566<>798_12<>nicholas b. chang<>controlled flooding search with delay constraints<>infocom<>mingyan liu<>
22567<>798_13<>jungkeun yoon:brian noble<>a general framework to construct stationary mobility models for the simulation of mobile networks<>tmc<>mingyan liu<>
2310<>799_2<>amarnath gupta:ramesh jain<>using temporal semantics for live media stream queries<>edbtw<>bin liu<>
22546<>800_0<>james skorupski:ben weber<>"a high population, fault tolerant parallel raytracer."<>sede<>mei-ling l. liu<>
5508<>813_0<>ian m. harrower<>integer programming approaches to haplotype inference by pure parsimony<>tcbb<>daniel g. brown<>
5486<>814_3<>yichun xie<>spatial agent-based modelling<>gis<>daniel g. brown<>
5481<>818_17<>aparna s. varde:elke a. rundensteiner:carolina ruiz:mohammed maniruzzaman:richard d. sisson jr.<>designing semantics-preserving cluster representatives for scientific input conditions<>cikm<>david c. brown<>
40667<>825_0<>k. djidjeli:w. g. price<>computing lyapunov exponents based on the solution expression of the variational system<>amc<>zhiming chen<>
38219<>826_0<>john a. nelder<>fitting via alternative random-effect models<>sac<>youngjo lee<>
38244<>845_1<>rahul bhotika:paulo r. s. mendonca:saad a. sirohey:wesley d. turner:julie m. mccoy:rebecca e. b. brown:james v. miller<>part-based local shape models for colon polyp detection<>miccai<>ying-lin lee<>
30792<>846_6<>eric allender:david a. mix barrington:tanmoy chakraborty:samir datta<>grid graph reachability problems<>coco<>sambuddha roy<>
30794<>846_8<>venkatesan t. chakaravarthy<>oblivious symmetric alternation<>stacs<>sambuddha roy<>
30797<>847_2<>l. venkata subramaniam<>automatic generation of domain models for call-centers from noisy transcriptions<>acl<>shourya roy<>
30806<>851_1<>himabindu pucha:y. charlie hu<>take one get one free: leveraging p2p networks for content promotion<>infocom<>sabyasachi roy<>
30807<>851_2<>dimitrios koutsonikolas:saumitra m. das:y. charlie hu<>high-throughput multicast routing metrics in wireless mesh networks<>icdcs<>sabyasachi roy<>
30808<>851_3<>y. charlie hu:dimitrios peroulis:xiang-yang li<>minimum-energy broadcast using practical directional antennas in all-wireless networks<>infocom<>sabyasachi roy<>
30782<>858_2<>charlie chung-ping chen<>convexsmooth: a simultaneous convex fitting and smoothing algorithm for convex optimization problems<>isqed<>sanghamitra roy<>
39663<>871_1<>hui chen<>optimal callback with two-level adaptation for wireless data access<>tmc<>yang xiao<>
39665<>871_3<>hui chen:mohsen guizani<>performance evaluation of pipeline paging under paging delay constraint for wireless systems<>tmc<>yang xiao<>
39666<>871_4<>frank haizhon li:kui wu:kin k. leung:qiang ni<>on optimizing backoff counter reservation and classifying stations for the ieee 802.11 distributed wireless lans<>tpds<>yang xiao<>
39668<>871_6<>lan wang<>a survey of energy-efficient scheduling mechanisms in sensor networks<>monet<>yang xiao<>
39669<>871_7<>hui chen:xuemin shen<>update-based cache access and replacement in wireless data access<>tmc<>yang xiao<>
3895<>876_0<>stephen chi-fai chan:fu-lai chung<>a collaborative filtering framework based on fuzzy association rules and multiple-level similarity<>kais<>cane wing-ki leung<>
3889<>884_0<>shoudong huang:ngai kwok:gamini dissanayake<>planning under uncertainty using model predictive control for information gathering<>ras<>cindy leung<>
19759<>888_0<>kenneth j. turner<>graphical composition of grid services<>rise<>koon leai larry tan<>
19729<>891_4<>chi keong goh:y. j. yang:t. h. lee<>evolving better population distribution and exploration in evolutionary multi-objective optimization<>eor<>kay chen tan<>
19731<>891_6<>swee chiang chiam:abdullah al mamun<>molecular dynamics optimizer<>emo<>kay chen tan<>
19739<>891_14<>e. j. teoh:c. xiang<>a fast learning algorithm based on layered hessian approximations and the pseudoinverse<>isnn<>k. cheng tan<>
19742<>891_17<>y. j. yang:chi keong goh<>a distributed cooperative coevolutionary algorithm for multiobjective optimization<>tec<>kay chen tan<>
19745<>891_20<>eu jin teoh:cheng xiang<>estimating the number of hidden neurons in a feedforward network using the singular value decomposition<>isnn<>kay chen tan<>
39676<>893_0<>lev klebanov:alexander gordon:h. land:andrei yakovlev<>a permutation test motivated by microarray data analysis<>csda<>yuanhui xiao<>
14604<>914_6<>seon-yeong park:dawoon jung:jeong-uk kang:jinsoo kim<>cflru: a replacement algorithm for flash memory<>cases<>joonwon lee<>
14608<>914_10<>euiseong seo:yongbon koo<>dynamic repartitioning of real-time schedule on a multicore processor for energy efficiency<>euc<>joonwon lee<>
14609<>914_11<>hyun-gul roh:jinsoo kim<>how to design optimistic operations for peer-to-peer replication<>jcis<>joonwon lee<>
14610<>914_12<>jeong-uk kang:heeseung jo:jinsoo kim<>a superblock-based flash translation layer for nand flash memory<>emsoft<>joonwon lee<>
12652<>919_3<>shoichi morimoto:daisuke horie<>a security requirement management database based on iso/iec 15408<>iccsa<>jingde cheng<>
12656<>919_7<>nulo<>deontic relevant logic as the logical basis for legal information systems<>sac<>jingde cheng<>
12662<>919_13<>shinsuke nara:takahiro koh:yuichi goto<>the theory grid and grid theorists<>skg<>jingde cheng<>
12666<>919_17<>nulo<>run-time detection of tasking deadlocks in real-time systems with the ada 95 annex of real-time systems<>adaEurope<>jingde cheng<>
12674<>921_1<>yin yang:wilfred ng:ho lam lau<>an efficient approach to support querying secure outsourced xml information<>caise<>james cheng<>
12675<>921_2<>yiping ke:wilfred ng<>mining quantitative correlated patterns using an information-theoretic approach<>kdd<>james cheng<>
12676<>921_3<>yiping ke:wilfred ng<>maintaining frequent itemsets over high-speed data streams<>pakdd<>james cheng<>
12677<>921_4<>yiping ke:wilfred ng<>mic framework: an information-theoretic approach to quantitative association rule mining<>icde<>james cheng<>
12679<>921_6<>wilfred ng:wai yeung lam<>comparative analysis of xml compression technologies<>www<>james cheng<>
12686<>926_0<>zheng du:norman c. beaulieu<>accurate error-rate performance analysis of ofdm on frequency-selective nakagami-m fading channels<>tcom<>julian cheng<>
26094<>931_0<>adrian james chung:guang-zhong yang<>optimal sensor placement for predictive cardiac motion modeling<>miccai<>qian wu<>
12643<>932_0<>pierre baldi<>a machine learning information retrieval approach to protein fold recognition<>bioinformatics<>jianlin cheng<>
12645<>932_2<>michael j. sweredoski:pierre baldi<>"dompro: protein domain prediction using profiles, secondary structure, relative solvent accessibility, and recursive neural networks."<>datamine<>jianlin cheng<>
12646<>932_3<>samuel a. danziger:sanjay joshua swamidass:jue zeng:lawrence r. dearth:qiang lu:jonathan h. chen:vinh p. hoang:hiroto saigo:ray luo:pierre baldi:rainer k. brachmann:richard h. lathrop<>functional census of mutation sequence spaces: the example of p53 cancer rescue mutants<>tcbb<>jianlin cheng<>
26070<>935_3<>margaret martonosi:douglas w. clark:vijay janapa reddi:dan connors:youfeng wu:jin lee:david brooks<>dynamic-compiler-driven control for microprocessor energy and performance<>micro<>qiang wu<>
26075<>937_2<>samuel cheng:hyohoon choi:kenneth r. castleman<>extended depth-of-field microscope imaging: mpp image fusion vs. wavefront coding<>icip<>qiang wu<>
26078<>937_5<>hyohoon choi:samuel cheng:kenneth r. castleman:alan c. bovik<>extended depth-of-field using adjacent plane deblurring and mpp wavelet fusion for microscope images<>isbi<>qiang wu<>
14584<>938_1<>fangzhen lin<>loop formulas for circumscription<>ai<>joohyung lee<>
14589<>940_0<>kyu-young whang<>secure query processing against encrypted xml data using query-aware decryption<>isci<>jae-gil lee<>
14591<>940_2<>ki-hoon lee:seo-young kim:euijong whang<>a practitioner's approach to normalizing xquery expressions<>dasfaa<>jae-gil lee<>
14592<>940_3<>hyo-sang lim:min-jae lee:kyu-young whang:il-yeol song<>continuous query processing in data streams using duality of data and queries<>sigmod<>jae-gil lee<>
18703<>944_1<>pum-mo ryu<>determining the specificity of terms using inside-outside information: a necessary condition of term hierarchy mining<>ipl<>key-sun choi<>
18707<>944_5<>du-seong chang<>incremental cue phrase learning and bootstrapping method for causality extraction using cue phrase and word pair probabilities<>ipm<>key-sun choi<>
18708<>944_6<>jong-hoon oh:hitoshi isahara<>a comparison of different machine transliteration models<>jair<>key-sun choi<>
18712<>944_10<>jong-hoon oh<>an ensemble of transliteration models for information retrieval<>ipm<>key-sun choi<>
26066<>946_0<>mingli song:jiajun bu:chun chen<>eigenexpress approach in recognition of facial expression using gpu<>eccv<>qi wu<>
14578<>948_0<>kideok cho:seungjae lee:taekyoung kwon:yanghee choi<>distributed and energy-efficient target localization and tracking in wireless sensor networks<>comcom<>jeongkeun lee<>
14561<>952_0<>xianghua deng:robby<>bogor/kiasan: a k-bounded symbolic execution for checking strong heap properties of open systems<>kbse<>jooyong lee<>
14555<>954_8<>nulo<>a graph-based approach for modeling and indexing video data<>ism<>jeongkyu lee<>
22904<>956_19<>shahin nazarian<>cell delay analysis based on rate-of-current change<>date<>massoud pedram<>
22944<>956_59<>chanseok hwang<>timing-driven placement based on monotone cell ordering constraints<>aspdac<>massoud pedram<>
22955<>956_70<>peng rong<>battery-aware power management based on markovian decision processes<>tcad<>massoud pedram<>
22959<>956_74<>afshin abdollahi<>analysis and synthesis of quantum circuits by using quantum decision diagrams<>date<>massoud pedram<>
22963<>956_78<>ehsan pakbaznia:farzan fallah<>charge recycling in mtcmos circuits: concept and analysis<>dac<>massoud pedram<>
22967<>956_82<>wonbok lee:kimish patel<>dynamic thermal management for mpeg-2 decoding<>islped<>massoud pedram<>
22969<>956_84<>ali iranli:wonbok lee<>backlight dimming in power-aware mobile displays<>dac<>massoud pedram<>
22973<>956_88<>soroush abbaspour:hanif fatemi<>parameterized block-based non-gaussian statistical gate timing analysis<>aspdac<>massoud pedram<>
22982<>956_97<>behnam amelifard:farzan fallah<>low-power fanout optimization using mtcmos and multi-vt techniques<>islped<>massoud pedram<>
23025<>956_140<>soroush abbaspour:hanif fatemi<>non-gaussian statistical interconnect timing analysis<>date<>massoud pedram<>
23036<>956_151<>hanif fatemi:shahin nazarian<>statistical logic cell delay analysis using a current-based model<>dac<>massoud pedram<>
23041<>956_156<>shahin nazarian:tao lin:emre tuncer<>cgta: current gain-based timing analysis for logic cells<>aspdac<>massoud pedram<>
3659<>957_1<>antonio leal duarte<>converse to the parter-wiener theorem: the case of non-trees<>dm<>c. r. johnson<>
3660<>957_2<>carlos m. saiago<>the trees for which maximum multiplicity implies the simplicity of other eigenvalues<>dm<>charles r. johnson<>
3641<>962_2<>susan stepney:samuel l. braunstein:john a. clark:andrew m. tyrrell:andrew adamatzky:robert e. smith:thomas r. addis:jonathan timmis:peter h. welch:robin milner:derek partridge<>journeys in non-classical computation ii: initial journeys and waypoints<>paapp<>colin g. johnson<>
3644<>962_5<>alex gounaropoulos<>timbre interfaces using adjectives and adverbs<>nime<>colin g. johnson<>
3646<>962_7<>alex gounaropoulos<>synthesising timbres and timbre-changes from adjectives/adverbs<>evoW<>colin g. johnson<>
3654<>965_6<>david m. weinstein<>biomedical computing and visualization<>acsc<>chris r. johnson<>
30728<>968_5<>yu-wei sung:michael bishop<>enabling contribution awareness in an overlay broadcasting system<>sigcomm<>sanjay g. rao<>
30730<>968_7<>michael bishop:kunwadee sripanidkulchai<>considering priority in overlay multicast protocols under heterogeneous environments<>infocom<>sanjay g. rao<>
20673<>970_1<>zhenhai zhu:joel r. phillips:l. miguel silveira<>"variation-aware, library compatible delay modeling strategy."<>vlsi<>luis guerra e silva<>
20642<>974_3<>henrique madeira:joao gabriel silva<>software aging and rejuvenation in a soap-based server<>nca<>luis silva<>
20649<>974_10<>patricio domingues:joao gabriel silva<>sharing checkpoints to improve turnaround time in desktop grid<>aina<>luis silva<>
20660<>974_21<>patricio domingues:paulo marques<>dgschedsim: a trace-driven simulator to evaluate scheduling algorithms for desktop grid environments<>pdp<>luis silva<>
10197<>982_2<>william hu:yuval kluger<>unraveling condition specific gene transcriptional regulatory networks in saccharomyces cerevisiae<>bmcbi<>hyunsoo kim<>
10198<>982_3<>barry l. drake:haesun park<>adaptive nonlinear discriminant analysis by regularized minimum squared errors<>tkde<>hyunsoo kim<>
10202<>982_7<>gene h. golub:haesun park<>missing value estimation for dna microarray gene expression data: local least squares imputation<>bioinformatics<>hyunsoo kim<>
10215<>983_1<>thierry turletti:amar bouali<>epspectra: a formal toolkit for developing dsp software applications<>tplp<>hahnsang kim<>
3166<>993_0<>xiaotu ma:xiting yan:fengzhu sun:lei m. li<>mard: a new method to detect differential gene expression in treatment-control time courses<>bioinformatics<>chao cheng<>
38507<>997_0<>chuan yi tang<>exposing phylogenetic relationships by genome rearrangement<>ac<>ying chih lin<>
11756<>1002_4<>nulo<>signed quorum systems<>dc<>haifeng yu<>
11757<>1002_5<>michael kaminsky:phillip b. gibbons:abraham flaxman<>sybilguard: defending against sybil attacks via social networks<>sigcomm<>haifeng yu<>
11767<>1002_15<>amin vahdat<>the costs and limits of availability for replicated services<>tocs<>haifeng yu<>
11770<>1002_18<>suman nath:phillip b. gibbons:srinivasan seshan<>subtleties in tolerating correlated failures in wide-area storage systems<>nsdi<>haifeng yu<>
15808<>1013_1<>ning su<>conceptualizing the co-evolution of organizations and information systems: an agent-oriented perspective<>er<>john mylopoulos<>
15809<>1013_2<>yuan an:alexander borgida<>building semantic mappings from databases to ontologies<>aaai<>john mylopoulos<>
15810<>1013_3<>alexei lapouchnian:yijun yu:sotirios liaskos<>requirements-driven design of autonomic application software<>cascon<>john mylopoulos<>
15821<>1013_14<>lei jiang:thodoros topaloglou:alexander borgida<>incorporating goal analysis in database design: a case study from biological data management<>re<>john mylopoulos<>
15824<>1013_17<>loris penserini:anna perini:angelo susi<>from stakeholder intentions to software agent implementations<>caise<>john mylopoulos<>
15825<>1013_18<>volha bryl:fabio massacci:nicola zannone<>designing security requirements models through planning<>caise<>john mylopoulos<>
15826<>1013_19<>paolo giorgini:fabio massacci:nicola zannone<>"requirements engineering for trust management: model, methodology, and reasoning."<>ijisec<>john mylopoulos<>
15827<>1013_20<>nadzeya kiyavitskaya:nicola zeni:luisa mich:james r. cordy<>text mining through semi automatic semantic annotation<>pakm<>john mylopoulos<>
15831<>1013_24<>yuan an:alexander borgida<>discovering the semantics of relational tables through mappings<>jods<>john mylopoulos<>
15835<>1013_28<>sotirios liaskos:alexei lapouchnian:yijun yu:eric yu<>on goal-based variability acquisition and analysis<>re<>john mylopoulos<>
15837<>1013_30<>enzo colombo<>a multi-perspective framework for organizational patterns<>er<>john mylopoulos<>
15839<>1013_32<>paolo giorgini:fabio massacci:nicola zannone<>detecting conflicts of interest<>re<>john mylopoulos<>
15841<>1013_34<>manuel kolp:paolo giorgini<>multi-agent architectures as organizational structures<>aamas<>john mylopoulos<>
15844<>1013_37<>dan zhao:iluju kiringa:verena kantere<>an eca rule rewriting mechanism for peer data management systems<>edbt<>john mylopoulos<>
15852<>1013_45<>fabio massacci:nicola zannone<>hierarchical hippocratic databases with minimal disclosure for virtual organizations<>vldb<>john mylopoulos<>
15853<>1013_46<>verena kantere:iluju kiringa:qingqing zhou:gregory mcarthur<>distributed triggers for peer data management<>otm<>john mylopoulos<>
15856<>1013_49<>lei jiang:thodoros topaloglou:alexander borgida<>incorporating goal analysis in database design: a case study from biological data management<>sebd<>john mylopoulos<>
25318<>1015_0<>nulo<>a software engineering process on group collaboration of software project documents<>acst<>peter h. chang<>
25314<>1016_1<>gul agha<>supporting reconfigurable object distribution for customizable web applications<>otm<>po-hao chang<>
20902<>1018_0<>jennifer m. schopf:catalin dumitrescu:ian t. foster<>statistical data reduction for efficient application performance monitoring<>ccgrid<>lingyun yang<>
20896<>1020_1<>haris lekatsas:robert p. dick<>high-performance operating system controlled memory compression<>dac<>lei yang<>
20897<>1020_2<>lan s. bai:robert p. dick<>automated compile-time and run-time techniques to increase usable memory in mmu-less embedded systems<>cases<>lei yang<>
20900<>1021_2<>tong-hooi liew:lajos hanzo<>systematic redundant residue number system codes: analytical upper bound and iterative decoding performance over awgn and rayleigh channels<>tcom<>lie-liang yang<>
20908<>1023_0<>yi liu:rong jin<>semi-supervised multi-label learning by constrained non-negative matrix factorization<>aaai<>liu yang<>
8220<>1031_2<>paulo gomes:nuno seco:paulo paiva:paulo carreiro:josi luis ferreira:carlos bento<>the importance of retrieval in creative design analogies<>kbs<>francisco c. pereira<>
8232<>1031_14<>amilcar cardoso<>experiments with free concept generation in divago<>kbs<>francisco c. pereira<>
739<>1036_0<>shivkumar kalyanaraman:lingyi zhang<>pricing of risk for loss guaranteed intra-domain internet service contracts<>cn<>aparna gupta<>
8259<>1045_0<>e. abreu jr.:j. douglas:f. furtado:d. marchesin<>three-phase immiscible displacement in heterogeneous petroleum reservoirs<>mcs<>f. pereira<>
36409<>1046_0<>andrew mccallum:chris pal:gregory druck<>multi-conditional learning: generative/discriminative training for clustering and classification<>aaai<>xuerui wang<>
22050<>1047_27<>piotr berman<>"8/7-approximation algorithm for (1, 2)-tsp."<>soda<>marek karpinski<>
22106<>1047_83<>lars engebretsen<>tsp with bounded metrics<>jcss<>marek karpinski<>
22107<>1047_84<>yakov nekrich<>algorithms for construction of optimal and almost-optimal length-restricted codes<>ppl<>marek karpinski<>
22108<>1047_85<>magnus bordewich:martin e. dyer<>"stopping times, metrics and approximate counting."<>icalp<>marek karpinski<>
37114<>1051_9<>yan zhang:xindong wu<>corrective classification: classifier ensembling with corrective and diverse base learners<>icdm<>xingquan zhu<>
37117<>1051_12<>xindong wu<>scalable representative instance selection and ranking<>icpr<>xingquan zhu<>
37127<>1051_22<>ying yang:xindong wu<>mining in anticipation for concept change: proactive-reactive prediction in data streams<>datamine<>xingquan zhu<>
37130<>1051_25<>xindong wu:qijun chen<>"bridging local and global data cleansing: identifying class noise in large, distributed data datasets."<>datamine<>xingquan zhu<>
37133<>1051_28<>xianhua jiang:yuichi motai:robert r. snapp<>accelerated kernel feature analysis<>cvpr<>xingquan zhu<>
37136<>1051_31<>xindong wu:ying yang<>effective classification of noisy data streams with attribute-oriented dynamic classifier selection<>kais<>xingquan zhu<>
37145<>1052_0<>zhuo wang:yazhu chen:yi-xue li:lei liu<>comparison of modularization methods in application to different biological networks<>vdmb<>xin-guang zhu<>
37142<>1055_1<>chuo-ling chang:prashant ramanathan:bernd girod<>light field compression using disparity-compensated lifting and shape adaptation<>tip<>xiaoqing zhu<>
9329<>1059_2<>adit d. singh<>output hazard-free transition tests for silicon calibrated scan based delay testing<>vts<>gefu xu<>
9307<>1060_4<>qing pan:chandrajit l. bajaj<>discrete surface modelling using partial differential equations<>cagd<>guoliang xu<>
9312<>1060_9<>yongjie zhang:chandrajit l. bajaj<>quality meshing of implicit solvation models of biomolecular structures<>cagd<>guoliang xu<>
9321<>1060_18<>nulo<>convergence analysis of a discretization scheme for gaussian curvature over triangular surfaces<>cagd<>guoliang xu<>
9323<>1060_20<>nulo<>discrete laplace-beltrami operator on sphere and optimal spherical triangulations<>ijcga<>guoliang xu<>
9326<>1060_23<>qin zhang<>minimal mean-curvature-variation surfaces and their applications in surface modeling<>gmp<>guoliang xu<>
9351<>1062_0<>liying kang:erfang shan<>acyclic domination on bipartite permutation graphs<>ipl<>guangjun xu<>
9352<>1062_1<>liying kang:erfang shan:min zhao<>power domination in block graphs<>tcs<>guangjun xu<>
36447<>1063_0<>nulo<>a capacity acquisition protocol for channel reservation in cdma networks<>cn<>xudong wang<>
36454<>1064_3<>tao tao:qiaozhu mei:chengxiang zhai<>language model information retrieval with document expansion<>naacl<>xuanhui wang<>
36455<>1064_4<>jian-tao sun:dou shen:hua-jun zeng:zheng chen<>cws: a comparative web search system<>www<>xuanhui wang<>
36456<>1064_5<>jian-tao sun:zheng chen:chengxiang zhai<>latent semantic analysis for multiple-type interrelated data objects<>sigir<>xuanhui wang<>
36457<>1064_6<>shen huang:jian-tao sun:hua-jun zeng:zheng chen<>subjectivity categorization of weblog with part-of-speech based smoothing<>icdm<>xuanhui wang<>
36430<>1065_2<>lei zhang:feng jing:wei-ying ma<>image annotation using search and mining technologies<>www<>xin-jing wang<>
36431<>1065_3<>wei-ying ma:xing li<>exploring statistical correlations for image retrieval<>mms<>xin-jing wang<>
36436<>1065_8<>lei zhang:feng jing:wei-ying ma<>annosearch: image auto-annotation by search<>cvpr<>xin-jing wang<>
37077<>1068_26<>arnaud pecher<>on the circular chromatic number of circular partitionable graphs<>jgt<>xuding zhu<>
22136<>1072_4<>taekhyun kim:yongjune shin:simon s. lam:edward j. powers<>scalable clustering of internet paths by shared congestion<>infocom<>min sik kim<>
30385<>1073_0<>marios savvides:b. v. k. vijaya kumar<>human face identification from video based on frequency domain asymmetry representation using hidden markov models<>mrcs<>sinjini mitra<>
30386<>1073_1<>marios savvides:anthony brockwell<>the role of statistical models in biometric authentication<>icb<>sinjini mitra<>
30390<>1073_5<>marios savvides<>using feature combination and statistical resampling for accurate face recognition based on frequency domain representation of facial asymmetry<>fgr<>sinjini mitra<>
30411<>1077_16<>bob mungamuru:hector garcia-molina<>how to safeguard your sensitive data<>srds<>subhasish mitra<>
30436<>1077_41<>kee sup kim<>xpand: an efficient test stimulus compression technique<>tc<>subhasish mitra<>
30438<>1077_43<>ming zhang:norbert seifert:t. m. mak:kee sup kim<>soft error resilient system design through error correction<>vlsi<>subhasish mitra<>
22126<>1078_0<>jintae kim:sooyong park<>goal and scenario based domain requirements analysis environment<>jss<>minseong kim<>
30442<>1079_0<>nancy a. lynch:daniel liberzon<>verifying average dwell time by solving optimization problems<>hybrid<>sayan mitra<>
30444<>1079_2<>myla archer:hongping lim:nancy a. lynch:shinya umeno<>specifying and proving properties of timed i/o automata in the tioa toolkit<>memocode<>sayan mitra<>
22123<>1080_0<>remy prost:hyun-yeol chung:ho-youl jung<>a blind watermarking for 3-d dynamic mesh model using distribution of temporal wavelet coefficients<>mrcs<>min-su kim<>
22125<>1080_2<>jae-won cho:remy prost:ho-youl jung<>wavelet analysis based blind watermarking for 3-d surface meshes<>iwdw<>min-su kim<>
30450<>1082_0<>rishi r. sinha:marianne winslett<>bitmap indexes for large scientific data sets: a case study<>ipps<>s. mitra<>
30451<>1082_1<>windsor w. hsu:marianne winslett<>trustworthy keyword search for regulatory-compliant record retention<>vldb<>soumyadeb mitra<>
33076<>1087_0<>guodong rong<>jump flooding in gpu with applications to voronoi diagram and distance transform<>si3d<>tiow-seng tan<>
33082<>1087_6<>guodong rong<>utilizing jump flooding in image-based soft shadows<>vrst<>tiow-seng tan<>
12228<>1090_5<>vinay choudhary<>valiant's holant theorem and matchgate tensors<>tamc<>jin-yi cai<>
12231<>1090_8<>vinay choudhary<>some results on matchgates and holographic algorithms<>icalp<>jin-yi cai<>
12235<>1090_12<>vinay choudhary<>on the theory of matchgate computations<>eccc<>jin-yi cai<>
38494<>1098_2<>camino balbuena:e. barker:mirka miller:k. a. sugeng<>consecutive magic graphs<>dm<>yuqing lin<>
38496<>1098_4<>camino balbuena:e. barker:k. c. das:mirka miller:joseph f. ryan:slamin:k. a. sugeng:michal tkac<>on the degrees of a strongly vertex-magic graph<>dm<>yuqing lin<>
38445<>1100_34<>ming-feng chen:herman chung-hwa rao:quincy wu<>a mobile service platform using proxy technology<>wicomm<>yi-bing lin<>
38506<>1101_0<>fu-ren lin<>integrating multi-agent negotiation to resolve constraints in fulfilling supply chain orders<>ecra<>you-yu lin<>
8077<>1107_4<>peter van rossum<>sound computational interpretation of symbolic hashes in the standard model<>iwsec<>flavio d. garcia<>
28346<>1111_0<>jyotishman pathak:robyn r. lutz:vasant honavar<>selecting and composing web services through iterative reformulation of functional specifications<>ictai<>samik basu<>
28307<>1112_8<>vanish talwar:bikash agarwalla:raj kumar:klara nahrstedt<>resource allocation for remote desktop sessions in utility grids<>concurrency<>sujoy basu<>
28310<>1112_11<>r. fonseca:p. sharma:s. banerjee:s.-j. lee<>distributed querying of internet distance information<>infocom<>s. basu<>
28330<>1114_3<>nulo<>computing the first few betti numbers of semi-algebraic sets in single exponential time<>jsc<>saugata basu<>
28316<>1115_2<>jyotishman pathak:vasant honavar<>modeling web services by iterative reformulation of functional and non-functional requirements<>icsoc<>samik basu<>
28317<>1115_3<>jyotishman pathak:robyn r. lutz:vasant honavar<>parallel web service composition in moscoe: a choreography-based approach<>ecows<>samik basu<>
28322<>1115_8<>c. r. ramakrishnan<>compositional analysis for verification of parameterized systems<>tcs<>samik basu<>
28323<>1115_9<>ping yang:c. r. ramakrishnan<>parameterized verification of pi-calculus systems<>tacas<>samik basu<>
28326<>1115_12<>jyotishman pathak:robyn r. lutz:vasant honavar<>moscoe: a framework for modeling web service composition and execution<>icde<>samik basu<>
35396<>1121_1<>marilyn tremaine<>patterns of multimodal input usage in non-visual information navigation<>hicss<>xiaoyu chen<>
35398<>1123_0<>chengcui zhang:wei-bang chen<>a pca-based vehicle classification framework<>icde<>xin chen<>
3324<>1128_8<>hanghang tong:jia-yu pan<>fast random walk with restart and its applications<>icdm<>christos faloutsos<>
35391<>1131_0<>jie chen:shiguang shan:shengye yan:wen gao<>modification of the adaboost-based detector for partially occluded faces<>icpr<>xilin chen<>
35392<>1131_1<>jie chen:ruiping wang:shiguang shan:wen gao<>isomap based on the image euclidean distance<>icpr<>xilin chen<>
5586<>1135_0<>m. y. chan:francis y. l. chin:cao an wang<>construction of the nearest neighbor embracing graph of a point set<>jco<>danny z. chen<>
5587<>1135_1<>ewa misiolek<>two flow network simplification algorithms<>ipl<>danny z. chen<>
6398<>1141_0<>shintaro funahashi:matthew rushworth<>neurobiology of decision making<>nn<>daeyeol lee<>
6395<>1144_1<>alexander g. gray<>faster gaussian summation: theory and experiment<>uai<>dongryeol lee<>
15283<>1147_0<>hiroyuki morohoshi:runhe huang<>a user-friendly platform for developing and accessing grid services<>isf<>jianhua ma<>
15284<>1147_1<>yoshizo ishihara:runhe huang<>a real trading model based price negotiation agents<>aina<>jianhua ma<>
15285<>1147_2<>katsuhiro takata:bernady o. apduhan<>a dangerous location aware system for assisting kids safety care<>aina<>jianhua ma<>
15286<>1147_3<>qiangfu zhao:vipin chaudhary:jingde cheng:laurence tianruo yang:runhe huang:qun jin<>ubisafe computing: vision and challenges (i)<>atc<>jianhua ma<>
15287<>1150_0<>daniel dajun zeng:hsinchun chen<>spatial-temporal cross-correlation analysis: a new measure and a case study in infectious disease informatics<>isi<>jian ma<>
15255<>1154_6<>amith singhee:claire fang fang:rob a. rutenbar<>probabilistic interval-valued computation: toward a practical surrogate for statistics inside cad tools<>dac<>james d. ma<>
15256<>1154_7<>rob a. rutenbar<>fast interval-valued statistical modeling of interconnect and effective capacitance<>tcad<>james d. ma<>
15229<>1156_2<>dengpan gao:fei ge:shun-ichi amari<>a one-bit-matching learning algorithm for independent component analysis<>ica<>jinwen ma<>
15233<>1156_6<>bin cao<>the mahalanobis distance based rival penalized competitive learning algorithm<>isnn<>jinwen ma<>
6406<>1160_0<>taehee lee:suekyung lee:ok-ran jeong:hyeonsang eom:sang-goo lee<>bestchoice: a decision support system for supplier selection in e-marketplaces<>deec<>dongjoo lee<>
15276<>1161_0<>kirill levchenko:christian kreibich:stefan savage:geoffrey m. voelker<>unexpected means of protocol inference<>imc<>justin ma<>
15277<>1161_1<>john dunagan:helen j. wang:stefan savage:geoffrey m. voelker<>finding diversity in remote code injection exploits<>imc<>justin ma<>
5577<>1165_4<>roland ewald:georgios k. theodoropoulos:michael lees:brian logan:ton oguara:adelinde uhrmacher<>performance analysis of shared data access algorithms for distributed simulation of multi-agent systems<>pads<>dan chen<>
5579<>1165_6<>georgios k. theodoropoulos:yi zhang:rob minson:stephen john turner:wentong cai:yong xie:brian logan<>large scale distributed simulation on the grid<>ccgrid<>dan chen<>
23513<>1175_0<>rajagopal subramaniyan:ian a. troxel:alan d. george<>simulative analysis of dynamic scheduling heuristics for reconfigurable computing of parallel applications<>fpga<>melissa smith<>
23506<>1177_1<>mark burgin<>from sequential processes to grid computation<>fcs<>marc smith<>
23507<>1177_2<>tiffani l. williams<>the role of diverse populations in phylogenetic analysis<>gecco<>marc l. smith<>
23509<>1177_4<>tiffani l. williams<>phylospaces: reconstructing evolutionary trees in tuple space<>ipps<>marc l. smith<>
19370<>1180_1<>hazem hiary<>automated paper-based watermark extraction and processing<>axmedis<>kia ng<>
19371<>1180_2<>a. badii:m. sailor:b. ong:r. neagle:g. quested<>axmedis programme and publication tools integration with workflow-enabled communication and process control<>axmedis<>k. ng<>
19379<>1182_1<>kenny y. f. chan:stephen m. s. lee<>minimum variance unbiased estimation based on bootstrap iterations<>sac<>kai w. ng<>
19385<>1183_0<>sze-wing wong<>a middleware framework for secure mobile grid services<>ccgrid<>kam-wing ng<>
17893<>1187_0<>ning liu:benyu zhang:qiang yang:shuicheng yan:zheng chen<>a novel scalable algorithm for supervised subspace learning<>icdm<>jun yan<>
17892<>1189_0<>david b. bracewell:fuji ren:shingo kuroiwa<>a semantic analyzer for aiding emotion recognition in chinese<>icic<>jiajun yan<>
1570<>1192_0<>mads haahr<>a peer-to-peer reference architecture<>comsware<>atul singh<>
1571<>1192_1<>mads haahr<>creating an adaptive network of hubs using schelling's model<>cacm<>atul singh<>
1576<>1195_0<>michael rabbat:jarvis haupt:robert d. nowak<>decentralized compression and predistribution via randomized gossiping<>ipsn<>aarti singh<>
37605<>1198_0<>davide sangiorgi<>towards an algebraic theory of typed mobile processes<>tcs<>yuxin deng<>
37612<>1198_7<>tom chothia:catuscia palamidessi:jun pang<>metrics for action-labelled quantitative transition systems<>entcs<>yuxin deng<>
37614<>1198_9<>davide sangiorgi<>ensuring termination by typability<>iandc<>yuxin deng<>
37626<>1201_0<>keerthi shet:haihong li:periannan kuppusamy:jay l. zweier<>real-time calculation and visualization of spectra in field-cycled dynamic nuclear polarization spectroscopy<>cmpb<>yuanmu deng<>
15369<>1204_12<>gul a. agha:koushik sen<>pmaude: rewrite-based specification language for probabilistic object systems<>entcs<>jose meseguer<>
15375<>1204_18<>grigore rosu<>the rewriting logic semantics project<>entcs<>jose meseguer<>
15385<>1204_28<>prasanna thati<>complete symbolic reachability analysis using back-and-forth narrowing<>tcs<>jose meseguer<>
20154<>1207_0<>yixin chen:yi pan:juan chen:wei liu<>partitioned optimization algorithms for multiple sequence alignment<>aina<>ling chen<>
20161<>1212_1<>pearl pu<>evaluating critiquing-based recommender agents<>aaai<>li chen<>
20162<>1212_2<>pearl pu<>trust building with explanation interfaces<>iui<>li chen<>
8796<>1218_8<>kefeng diao:dieter rautenbach:ping zhao<>a note on the least number of edges of 3-uniform hypergraphs with upper chromatic number 2<>dm<>guizhen liu<>
8798<>1219_0<>svetlana pacifico:stephen guest:jodi r. parrish:farshad fotouhi:russell l. finley jr.<>"a database and tool, im browser, for exploring and integrating emerging gene and protein interaction data for ."<>bmcbi<>guozhen liu<>
20115<>1223_1<>jun yu:gencai chen<>priority based overlay multicast for distributed interactive applications<>iscc<>ling chen<>
20117<>1223_3<>wei liu:gencai chen<>an adaptive-filtering policy for distributed virtual environments<>cscwd<>ling chen<>
20121<>1223_7<>jun yu:gencai chen<>priority based overlay multicast with filtering mechanism for distributed interactive applications<>dsrt<>ling chen<>
20122<>1223_8<>yunjun gao:gencai chen:chun chen<>an i/o optimal and scalable skyline query algorithm<>bncod<>ling chen<>
20124<>1223_10<>chengzhe xu:gencai chen<>a color bar based affective annotation method for media player<>apweb<>ling chen<>
20126<>1223_12<>yunjun gao:gencai chen:chun chen<>efficient parallel processing for -nearest-neighbor search in spatial databases<>iccsa<>ling chen<>
20127<>1223_13<>wei liu:gencai chen<>effects of filtering policies on task performance in a desktop cve system<>edutainment<>ling chen<>
20129<>1223_15<>yunjun gao:gencai chen:chun chen<>parallelizing progressive computation for skyline queries in multi-disk environment<>dexa<>ling chen<>
20130<>1223_16<>yi zhang:gencai chen<>globally synchronized dead-reckoning with local lag for continuous distributed multiplayer games<>netgames<>ling chen<>
17877<>1226_0<>jian ying zhang:jian lin:mohan baruwal chhetri:sukkeong goh:ryszard kowalczyk<>towards autonomous service level agreement negotiation for adaptive service composition<>cscwd<>jun yan<>
17879<>1226_2<>jianming yong:xiaodi huang<>wfms-based data integration for e-learning<>cscwd<>jun yan<>
17884<>1226_7<>jun shen:yun yang<>swindew-s: extending p2p workflow systems for adaptive composite web services<>aswec<>jun yan<>
27546<>1229_2<>hussein al-yaseen:tillal eldabi:david y. lees<>operational use evaluation of it investments: an investigation into potential benefits<>eor<>ray j. paul<>
2179<>1232_0<>lifeng sun:shiqiang yang<>bit rate reduction of h.264/avc video coding for mobile applications<>mmm<>bin li<>
2178<>1234_0<>richard faber:pu li:gunter wozny<>data reconciliation for real-time optimization of an industrial coke-oven-gas purification process<>simpra<>bo li<>
25606<>1235_1<>micah dubinko:ravi kumar:joseph magnani:jasmine novak:andrew tomkins<>visualizing tags over time<>www<>prabhakar raghavan<>
2172<>1238_4<>xinyu xu:jose f. florez:helen k. li<>simulation of diabetic retinopathy neovascularization in color digital fundus images<>isvc<>baoxin li<>
2173<>1238_5<>jin zhou<>image rectification for stereoscopic visualization without 3d glasses<>civr<>baoxin li<>
2151<>1240_6<>ying zhu<>overlay multicast with inferred link capacity correlations<>icdcs<>baochun li<>
2161<>1240_16<>zongpeng li:lap chi lau<>on achieving maximum multicast throughput in undirected networks<>tit<>baochun li<>
36403<>1247_2<>shawna l. thomas:lydia tapia:nancy m. amato<>simulating protein motions with rigidity analysis<>recomb<>xinyu tang<>
36381<>1248_0<>jianliang xu<>extending network lifetime for precision-constrained data aggregation in wireless sensor networks<>infocom<>xueyan tang<>
36387<>1248_6<>yuxia yao:ee-peng lim:aixin sun<>an energy-efficient and access latency optimized indexing scheme for wireless data broadcast<>tkde<>xueyan tang<>
36392<>1248_11<>jianliang xu:wang-chien lee:qing gao:shanping li<>an error-resilient and tunable distributed indexing scheme for wireless data broadcast<>tkde<>xueyan tang<>
36394<>1248_13<>minji wu:jianliang xu<>processing precision-constrained approximate queries in wireless sensor networks<>mdm<>xueyan tang<>
36395<>1248_14<>yuxia yao:ee-peng lim<>in-network processing of nearest neighbor queries for wireless sensor networks<>dasfaa<>xueyan tang<>
36398<>1248_17<>samuel t. chanson<>analysis of replica placement under expiration-based consistency management<>tpds<>xueyan tang<>
34317<>1249_0<>john darlington:jeremy cohen<>an architecture for a next-generation internet based on web services and utility computing<>wetice<>william lee<>
34310<>1253_5<>andrew soon<>facial shape and 3d skin<>jvca<>won-sook lee<>
34319<>1255_0<>ian f. akyildiz:mehmet c. vuran:shantidev mohanty<>next generation/dynamic spectrum access/cognitive radio wireless networks: a survey<>cn<>won-yeol lee<>
41215<>1261_1<>zhaoyang wu<>on the unique representability of spikes over prime fields<>dm<>zhi-wei sun<>
41220<>1261_6<>hao pan<>new identities involving bernoulli and euler polynomials<>jct<>zhi-wei sun<>
41223<>1261_9<>hao pan<>a combinatorial identity with application to catalan numbers<>dm<>zhi-wei sun<>
19965<>1262_5<>john d. dehart:fred kuhns:jyoti parwatikar:jonathan s. turner:charlie wiseman<>the open network laboratory<>sigcse<>ken wong<>
41225<>1263_1<>bin li:qiang wang:guihuan feng<>dynamic user modeling for sketch-based user interface<>edutainment<>zhengxing sun<>
41227<>1263_3<>lisha zhang:bin zhang<>online composite sketchy shape recognition based on bayesian networks<>icnc<>zhengxing sun<>
41229<>1263_5<>yan zhang:wenhui li<>creating dynamic panorama using particle swarm optimization<>icat<>zhengxing sun<>
41201<>1264_2<>gavin r. finnie<>"a unified 2d representation of fuzzy reasoning, cbr, and experience based reasoning."<>kes<>zhaohao sun<>
19938<>1265_3<>ying kin yu:michael ming-yuen chang<>merging artificial objects with marker-less video sequences based on the interacting multiple model method<>tmm<>kin-hong wong<>
19943<>1265_8<>siu-hang or:ying kin yu:michael ming-yuen chang<>resolution improvement from stereo images with 3d pose differences<>icip<>kin-hong wong<>
19947<>1265_12<>ying kin yu:siu-hang or:michael ming-yuen chang<>recursive recovery of position and orientation from stereo image sequences without three-dimensional structures<>cvpr<>kin-hong wong<>
19949<>1265_14<>ying kin yu:siu-hang or:michael ming-yuen chang<>accurate 3-d motion tracking with an application to super-resolution<>icpr<>kin-hong wong<>
19951<>1265_16<>ying kin yu:michael ming-yuen chang:siu-hang or<>computing pose sequences directly from videos<>icip<>kin-hong wong<>
41193<>1268_1<>george bebis:ronald miller<>monocular precrash vehicle detection: features and classifiers<>tip<>zehang sun<>
41182<>1272_8<>john h. reif<>on finding approximate optimal paths in weighted regions<>jal<>zheng sun<>
41185<>1272_11<>john h. reif<>on boundaries of highly visible spaces and applications<>tcs<>zheng sun<>
19842<>1276_1<>nan tang:jeffrey xu yu:haifeng jiang<>fast structural join with a location function<>dasfaa<>kam-fai wong<>
19854<>1276_13<>yunqing xia:wenjie li<>a phonetic-based approach to chinese chat text normalization<>acl<>kam-fai wong<>
19868<>1276_27<>jeffrey xu yu:nan tang<>answering xml queries using path-based indexes: a survey<>www<>kam-fai wong<>
19885<>1277_4<>daniel l. moise:h. james hoover:daqing hou<>reverse engineering scripting language extensions<>iwpc<>kenny wong<>
19887<>1277_6<>scott r. tilley:shihong huang:spencer smith<>report from the 2nd international workshop on software engineering course projects (swecp 2005)<>csee<>kenny wong<>
19904<>1277_23<>daniel l. moise<>extracting facts from perl code<>wcre<>kenny wong<>
34325<>1278_0<>ho-min lee:christian anthony l. go<>an efficient algorithm for rendering large bodies of water<>iwec<>won-hyung lee<>
9702<>1282_0<>m. yang:j. ru:x. r. li:a. bashi<>predicting internet end-to-end delay: a multiple-model approach<>infocom<>h. chen<>
9705<>1283_1<>lihua yuan:jianning mai:zhendong su:chen-nee chuah:prasant mohapatra<>fireman: a toolkit for firewall modeling and analysis<>sp<>hao chen<>
9895<>1286_0<>david cohen-steiner:dmitriy morozov<>vines and vineyards by updating persistence in linear time<>compgeom<>herbert edelsbrunner<>
12715<>1294_0<>min-su kim:remy prost:ho-youl jung<>wavelet analysis based blind watermarking for 3-d surface meshes<>iwdw<>jae-won cho<>
12718<>1294_3<>min-su kim:sebastien valette:ho-youl jung:remy prost<>3-d dynamic mesh compression using wavelet-based multiresolution analysis<>icip<>jae-won cho<>
12744<>1296_1<>yeon kyoon jeong:james s. lehnert<>an asymptotic analysis of band-limited ds/ssma communication systems<>tit<>joon ho cho<>
12721<>1297_2<>hector garcia-molina:taher h. haveliwala:wang lam:andreas paepcke:sriram raghavan:gary wesley<>stanford webbase components and applications<>toit<>junghoo cho<>
12741<>1297_22<>feng qiu<>automatic identification of user interest for personalized search<>www<>junghoo cho<>
29853<>1303_1<>s. blair hedges:joel dudley<>timetree: a public knowledge-base of divergence times among organisms<>bioinformatics<>sudhir kumar<>
29851<>1308_3<>xiaole bai:dong xuan:ziqiu yun:ten-hwang lai<>deploying wireless sensors to achieve both coverage and connectivity<>mobihoc<>santosh kumar<>
29847<>1309_1<>jonathan s. turner:john williams<>advanced algorithms for fast and scalable deep packet inspection<>ancs<>sailesh kumar<>
37942<>1318_0<>lican huang:david w. walker:omer f. rana<>dynamic workflow management using performance data<>ccgrid<>yan huang<>
29840<>1322_0<>varghese s. jacob:chelliah sriskandarajah<>scheduling advertisements on a web page to maximize revenue<>eor<>subodha kumar<>
37936<>1325_1<>jian sheng yang:ke min zhang<>a note on ramsey numbers with two parameters<>ejc<>yi ru huang<>
37932<>1326_0<>tom m. mitchell<>text clustering with extended user feedback<>sigir<>yifen huang<>
29618<>1327_4<>byunggu yu<>interpolating and using most likely trajectories in moving-objects databases<>dexa<>seon ho kim<>
29607<>1329_1<>kyoung-soo han:hae-chang rim:sung-hyon myaeng<>some effective techniques for naive bayes text classification<>tkde<>sang-bum kim<>
29600<>1330_0<>alessandro magnani:sikandar samar:stephen boyd:johan lim<>pareto optimal linear classification<>icml<>seung-jean kim<>
29603<>1330_3<>alessandro magnani:stephen boyd<>optimal kernel selection in kernel fisher discriminant analysis<>icml<>seung-jean kim<>
4864<>1346_0<>jiaping wang:xin tong:stephen lin:minghao pan:hujun bao:baining guo:heung-yeung shum<>appearance manifolds for modeling time-variant appearance of materials<>tog<>chao wang<>
36380<>1349_0<>sadaf mustafiz:jorg kienzle:hans vangheluwe<>model-driven assessment of use cases for dependable systems<>models<>ximeng sun<>
4841<>1351_0<>srinivasan parthasarathy:ruoming jin<>a decomposition-based probabilistic framework for estimating the selectivity of xml twig queries<>edbt<>chao wang<>
4842<>1351_1<>srinivasan parthasarathy<>learning approximate mrfs from large transaction data<>pkdd<>chao wang<>
4844<>1351_3<>srinivasan parthasarathy<>summarizing itemset patterns using probabilistic models<>kdd<>chao wang<>
32790<>1355_0<>ninghui li<>optimal k-anonymity with flexible generalization schemes through bottom-up searching<>icdm<>tiancheng li<>
21999<>1358_1<>youngmee koh:sangwook ree:tomasz luczak<>the connectivity threshold for the min-degree random graph process<>rsa<>mihyun kang<>
32741<>1363_3<>chang-shing perng<>kdd-2006 workshop report: theory and practice of temporal data mining<>sigkdd<>tao li<>
32742<>1363_4<>wei peng<>interval data clustering with applications<>ictai<>tao li<>
32748<>1363_10<>wei peng<>intclust: a software package for clustering replicated microarray data<>bibe<>tao li<>
32750<>1363_12<>wei peng:giri narasimhan<>mining the database of transcription binding sites<>bibe<>tao li<>
32752<>1363_14<>chris h. q. ding:wei peng<>"nonnegative matrix factorization and probabilistic latent semantic indexing: equivalence chi-square statistic, and a hybrid method."<>aaai<>tao li<>
32761<>1363_23<>chris h. q. ding<>the relationships among various nonnegative matrix factorization methods for clustering<>icdm<>tao li<>
32762<>1363_24<>fei wang:sheng ma:liuzhong yang<>recommendation on item graphs<>icdm<>tao li<>
32767<>1363_29<>ramakrishna varadarajan:vagelis hristidis<>searching the web using composed pages<>sigir<>tao li<>
32772<>1363_34<>chris h. q. ding:ya zhang:stephen r. holbrook<>biclustering protein complex interactions with a biclique finding algorithm<>icdm<>tao li<>
32774<>1363_36<>mitsunori ogihara:shenghuo zhu<>integrating features from different sources for music information retrieval<>icdm<>tao li<>
32787<>1365_4<>alvin r. lebeck:daniel j. sorin<>spin detection hardware for improved management of multithreaded systems<>tpds<>tong li<>
3758<>1367_0<>adrian perrig:jesse walker<>designing an evaluation method for security user interfaces: lessons from studying secure wireless network configuration<>interactions<>cynthia kuo<>
3759<>1367_1<>bryan parno:adrian perrig<>phoolproof phishing prevention<>fc<>cynthia kuo<>
2799<>1370_0<>glen jeh<>retroactive answering of search queries<>www<>beverly yang<>
19417<>1375_0<>sangjin hong:jun-hee mun<>design and implementation of a high-speed matrix multiplier based on word-width decomposition<>tvlsi<>kyoung-su park<>
34407<>1376_0<>youtao zhang:jun yang:lingling jin<>locating compromised sensor nodes through incremental hashing authentication<>dcoss<>weijia li<>
19408<>1380_0<>vivek s. pai<>scale and performance in the coblitz large-file distribution service<>nsdi<>kyoungsoo park<>
19410<>1380_2<>vivek s. pai:kang-won lee:seraphin b. calo<>securing web service by automatic robot detection<>usenix<>kyoungsoo park<>
34403<>1383_0<>ming liu:zhigang zhu:thomas s. huang<>ldv remote voice acquisition and enhancement<>icpr<>weihong li<>
19393<>1386_2<>hyuk lim:chong-ho choi<>stochastic analysis of packet-pair probing for network bandwidth estimation<>cn<>kyung-joon park<>
34402<>1388_1<>junzhou luo:jiuxin cao:liang ge<>integrating heterogeneous e-learning systems<>aict<>wei li<>
31100<>1392_4<>in-hee lee:byoung-tak zhang<>microarray probe design using epsilon-multi-objective evolutionary algorithms with thermodynamic criteria<>evoW<>soo-yong shin<>
31090<>1395_0<>jaeyeon jung:hari balakrishnan<>malware prevalence in the kazaa file-sharing network<>imc<>seungwon shin<>
34373<>1400_0<>gang zheng:ce zhan<>cryptographic key generation from biometric data using lattice mapping<>icpr<>wanqing li<>
34374<>1400_1<>wenming lu:reihaneh safavi-naini:philip ogunbona<>optimal image watermark decoding<>pcm<>wanqing li<>
34375<>1400_2<>peter schenkel:wanquan liu<>feature selection for complex patterns<>adma<>wanqing li<>
34377<>1400_4<>gang zheng:philip ogunbona:liju dong:igor kharitonenko<>simulation of human motion for learning and recognition<>ausai<>wanqing li<>
34378<>1400_5<>liju dong:philip ogunbona:ge yu:linan fan:gang zheng<>a fast algorithm for color image segmentation<>icicic<>wanqing li<>
20815<>1404_7<>tzong-yi lee:jorng-tzong horng:hsueh-fen juan:hsien-da huang:meng-fong tsai:hsuan-cheng huang<>"an agent-based system to discover protein-protein interactions, identify protein complexes and proteins with multiple peptide mass fingerprints."<>jcc<>li-cheng wu<>
20816<>1404_8<>jorng-tzong horng:shir-ly huang:hsien-da huang:baw-jhiune liu<>detection of discriminative sequence motifs in proteins obtained from prokaryotes grown at various temperatures<>jcc<>li-cheng wu<>
20824<>1406_0<>lit-hsin loo:steven j. altschuler<>automated multivariate profiling of drug effects from fluorescence microscopy images<>isbi<>lani f. wu<>
2600<>1415_0<>nut taesombut:xinran (ryan) wu:andrew a. chien:atul nayak:debi kilb:thomas im:dane samilo:graham kent:john orcutt<>collaborative data visualization for earth sciences with the optiputer<>fgcs<>bridget smith<>
2595<>1422_0<>david r. kohel<>efficiently computable endomorphisms for hyperelliptic curves<>ants<>benjamin a. smith<>
29576<>1426_1<>junhua wang:david a. carrington<>verifying metamodel coverage of model transformations<>aswec<>soon-kyeong kim<>
29577<>1426_2<>david a. carrington<>a tool for a formal pattern modeling language<>icfem<>soon-kyeong kim<>
29584<>1426_9<>jsrn guy sss:tim mccomb:luke wildman:geoffrey watson<>mda-based re-engineering with object-z<>models<>soon-kyeong kim<>
29587<>1430_0<>youngjoon cha<>edge-forming methods for color image zooming<>tip<>seongjai kim<>
29591<>1430_4<>nulo<>pde-based image restoration: a hybrid model and color image denoising<>tip<>seongjai kim<>
23206<>1433_1<>taisuke boku:akira ukawa:daisuke takahashi:shinji sumimoto:kouichi kumon:takashi moriyama:masaaki shimizu<>pacs-cs: a large-scale bandwidth-aware pc cluster for scientific computations<>ccgrid<>mitsuhisa sato<>
23227<>1433_22<>yoshihiko hotta:hideaki kimura:satoshi matsuoka:taisuke boku:daisuke takahashi<>profile-based optimization of power performance by using dynamic voltage scaling on a pc cluster<>ipps<>mitsuhisa sato<>
23245<>1433_40<>yoshiaki aida:yoshihiro nakajima:tetsuya sakurai:daisuke takahashi:taisuke boku<>performance improvement by data management layer in a grid rpc system<>gpc<>mitsuhisa sato<>
23248<>1433_43<>yoshihiro nakajima:yoshiaki aida:taisuke boku:franck cappello<>integrating computing resources on multiple grid-enabled job scheduling systems through a grid rpc system<>ccgrid<>mitsuhisa sato<>
23250<>1433_45<>taisuke boku:daisuke takahashi:hiroshi nakashima:hiroshi nakamura:satoshi matsuoka:yoshihiko hotta<>megaproto/e: power-aware high-performance cluster with commodity technology<>ipps<>mitsuhisa sato<>
12336<>1436_2<>c. dan lo<>fpga-based reconfigurable computing<>mam<>j. morris chang<>
12353<>1436_19<>yusuf hasan<>a tunable hybrid memory allocator<>jss<>j. morris chang<>
12378<>1440_1<>hye-chung kum:wei wang<>sequential pattern mining in multi-databases via multiple alignment<>datamine<>joong hyuk chang<>
12382<>1440_5<>won suk lee<>"finding recently frequent itemsets adaptively over online transactional data streams."<>is<>joong hyuk chang<>
12384<>1440_7<>won suk lee<>finding frequent itemsets over online data streams<>infsof<>joong hyuk chang<>
16133<>1441_7<>sudheer sahu<>capabilities and limits of compact error resilience methods for algorithmic self-assembly in two and three dimensions<>dna<>john h. reif<>
16147<>1441_21<>urmi majumder:sudheer sahu:thomas h. labean<>design and simulation of self-repairing dna lattices<>dna<>john h. reif<>
16164<>1441_38<>sudheer sahu:bei wang<>a framework for modeling dna based molecular systems<>dna<>john h. reif<>
16204<>1441_78<>zheng sun<>on boundaries of highly visible spaces and applications<>tcs<>john h. reif<>
16212<>1441_86<>zheng sun<>on finding approximate optimal paths in weighted regions<>jal<>john h. reif<>
37808<>1442_0<>elisabetta di nitto:robert j. hall:jun han:andrea polini:kurt sandkuhl:andrea zisman<>international workshop on service oriented software engineering (iw-sose'06)<>icse<>yanbo han<>
21187<>1444_1<>avik chaudhuri<>secrecy by typing and file-access control<>csfw<>martin abadi<>
21188<>1444_2<>avik chaudhuri<>"formal analysis of dynamic, distributed file-system access controls."<>forte<>martin abadi<>
12389<>1446_0<>an-hang chen<>a sufficient condition for quasi-claw-free hamiltonian graphs<>arscom<>jou-ming chang<>
6524<>1448_1<>shyamal d. peddada:leping li:clarice r. weinberg<>phase analysis of circadian-related genes in two tissues<>bmcbi<>delong liu<>
40644<>1453_0<>king ngi ngan<>towards rate-distortion tradeoff in real-time color video coding<>iscas<>zhenzhong chen<>
40650<>1456_0<>fang yu:yanlei diao:t. v. lakshman:randy h. katz<>fast and memory-efficient regular expression matching for deep packet inspection<>ancs<>zhifeng chen<>
13159<>1465_38<>jelena pjesivac-grbovic:graham e. fagg:thara angskun:george bosilca<>mpi collective algorithm selection and quadtree encoding<>pvm<>jack dongarra<>
13178<>1465_57<>thara angskun:graham e. fagg:george bosilca:jelena pjesivac-grbovic<>scalable fault tolerant protocol for parallel runtime environments<>pvm<>jack dongarra<>
13217<>1465_96<>george bosilca:zizhong chen:victor eijkhout:graham e. fagg:erika fuentes:julien langou:piotr luszczek:jelena pjesivac-grbovic:keith seymour:haihang you:sathish s. vadhiyar<>self-adapting numerical software (sans) effort<>ibmrd<>jack dongarra<>
20580<>1467_2<>x.-s. hua:h.-j. zhang<>photo2video - a system for automatically converting photographic series into video<>tcsv<>l. lu<>
20593<>1467_15<>rui cai:alan hanjalic:hongjiang zhang:lian-hong cai<>a flexible framework for key audio effects detection and auditory context inference<>taslp<>lie lu<>
20594<>1467_16<>d. liu:hongjiang zhang<>automatic mood detection and tracking of music audio signals<>taslp<>lie lu<>
20596<>1467_18<>alan hanjalic<>"towards optimal audio ""keywords"" detection for audio content analysis and discovery."<>mm<>lie lu<>
20600<>1468_2<>xiangtian dai:gregory d. hager<>efficient particle filtering using ransac with application to 3d face tracking<>ivc<>le lu<>
40561<>1470_1<>jack dongarra:george bosilca:victor eijkhout:graham e. fagg:erika fuentes:julien langou:piotr luszczek:jelena pjesivac-grbovic:keith seymour:haihang you:sathish s. vadhiyar<>self-adapting numerical software (sans) effort<>ibmrd<>zizhong chen<>
40564<>1470_4<>jack dongarra<>algorithm-based checkpoint-free fault tolerance for parallel matrix computations on volatile resources<>ipps<>zizhong chen<>
40575<>1472_0<>nulo<>on integral sum graphs<>dm<>zhibo chen<>
40580<>1473_2<>bin fu:yong tang:binhai zhu<>a ptas for a disc covering problem using width-bounded separators<>jco<>zhixiang chen<>
40600<>1473_22<>bin fu:binhai zhu<>the approximability of the exemplar breakpoint distance problem<>aaim<>zhixiang chen<>
19315<>1474_0<>winston khoon guan seah:marcelo h. ang jr.:j. g. lim:s. v. rao<>tarantulas: mobility-enhanced wireless sensor-actuator networks<>sutc<>kevin z. liu<>
19323<>1476_0<>nael b. abu-ghazaleh:kyoung-don kang<>jits: just-in-time scheduling for real-time sensor data dissemination<>percom<>ke liu<>
19284<>1480_0<>hillol kargupta:jessica ryan<>random projection-based multiplicative data perturbation for privacy preserving distributed data mining<>tkde<>kun liu<>
19287<>1480_3<>kanishka bhaduri:kamalika das:phuong nguyen:hillol kargupta<>client-side web mining for community formation in peer-to-peer environments<>sigkdd<>kun liu<>
19288<>1480_4<>sanghamitra bandyopadhyay:chris giannella:ujjwal maulik:hillol kargupta:souptik datta<>clustering distributed data streams in peer-to-peer environments<>isci<>kun liu<>
30208<>1485_3<>starsky h. y. wong:hao yang:vaduvur bharghavan<>robust rate adaptation for 802.11 wireless networks<>mobicom<>songwu lu<>
30228<>1485_23<>vidyut samanta:ricardo oliveira:advait dixit:parixit aghera:petros zerfos<>impact of video encoding parameters on dynamic video transcoding<>comsware<>songwu lu<>
30242<>1485_37<>xiaoqiao meng:thyaga nandagopal:li li<>contour maps: monitoring and diagnosis in sensor networks<>cn<>songwu lu<>
30267<>1488_4<>arthur j. bernstein:philip m. lewis<>completeness and realizability: conditions for automatic generation of workflows<>ijfcs<>shiyong lu<>
30269<>1488_6<>yi lu:adrian e. platts:stephen a. krawetz<>mining correlation between motifs and gene expression<>icdm<>shiyong lu<>
30270<>1488_7<>cui lin:xuwei liang:jing hua<>gca: a coclustering algorithm for thalamo-cortico-thalamic connectivity analysis<>icdm<>shiyong lu<>
30277<>1488_14<>zijiang yang:ping yang<>runtime security verification for itinerary-driven mobile agents<>dasc<>shiyong lu<>
30285<>1488_22<>feng cao:yi lu<>pama: a fast string matching algorithm<>ijfcs<>shiyong lu<>
30288<>1488_25<>arthur j. bernstein:philip m. lewis<>automatic workflow verification and generation<>tcs<>shiyong lu<>
30289<>1488_26<>yi lu:jeffrey l. ram<>fast search in dna sequence databases using punctuation and indexing<>acst<>shiyong lu<>
30291<>1488_28<>yi lu:farshad fotouhi:yan sun:zijiang yang:lily r. liang<>pdc: pattern discovery with confidence in dna sequences<>acst<>shiyong lu<>
30295<>1489_1<>rafail ostrovsky:amit sahai:hovav shacham:brent waters<>sequential aggregate signatures and multisignatures without random oracles<>eurocrypt<>steve lu<>
30296<>1490_0<>chien-lung chou:kuang-jui wang:hsiao-hsi wang:kuan-ching li<>design issues of prefetching strategies for heterogeneous software dsm<>ccgrid<>ssu-hsuan lu<>
30297<>1490_1<>chun-chieh yang:hsiao-hsi wang:kuan-ching li<>on design and implementation of adaptive data classification scheme for dsm systems<>ispa<>ssu-hsuan lu<>
9003<>1492_18<>agostino dovier:enrico pontelli<>set unification<>tplp<>gianfranco rossi<>
35734<>1496_0<>ah-hwee tan<>learning and inferencing in user ontology for personalized semantic web services<>www<>xing jiang<>
35732<>1498_0<>ke yang:ke gao:jiaoying shi:hua xiong<>coarsez buffer bandwidth model in 3d rendering pipeline<>imsccs<>xiaohong jiang<>
35733<>1498_1<>zonghui wang:jiaoying shi<>a scalable hla-based distributed simulation framework for vr application<>icat<>xiaohong jiang<>
12856<>1499_5<>yiping fan:guoling han:wei jiang:zhiru zhang<>behavior and communication co-optimization for systems with sequential communication media<>dac<>jason cong<>
12868<>1499_17<>joey y. lin:deming chen<>optimal simultaneous mapping and clustering for fpga delay optimization<>dac<>jason cong<>
12872<>1499_21<>yiping fan:wei jiang<>platform-based resource binding using a distributed register-file microarchitecture<>iccad<>jason cong<>
12936<>1499_85<>zhiru zhang<>an efficient and versatile scheduling algorithm based on sdc formulation<>dac<>jason cong<>
12948<>1499_97<>gang chen<>simultaneous placement with clustering and duplication<>todaes<>jason cong<>
12977<>1499_126<>deming chen:yiping fan:junjuan xu<>optimality study of resource binding with multi-vdds<>dac<>jason cong<>
12980<>1499_129<>kirill minkovich<>optimality study of logic synthesis for lut-based fpgas<>fpga<>jason cong<>
35723<>1502_7<>yi-min wang:doug beck:roussi roussev:chad verbowski:shuo chen:samuel t. king<>automated web patrol with strider honeymonkeys: finding web sites that exploit browser vulnerabilities<>ndss<>xuxian jiang<>
10302<>1503_0<>ilhyun lee:cherry keahey owen<>object-oriented design and implementation of the oe-scheduler in real time environments<>cata<>haesun k. lee<>
10300<>1504_3<>seth voorhies:andreas klappenecker<>fair service for mice in the presence of elephants<>ipl<>hyunyoung lee<>
10279<>1508_2<>neil o'hare:saman cooray:cathal gurrin:gareth j. f. jones:jovanka malobabic:noel e. o'connor:alan f. smeaton:bartlomiej uscilowski<>mediassist: using content-based analysis and context to manage personal photo collections<>civr<>hyowon lee<>
10282<>1508_5<>alan f. smeaton:gareth j. f. jones:noel e. o'connor:sorin sav<>object-based access to tv rushes video<>ecir<>hyowon lee<>
10287<>1508_10<>bart lehane:noel e. o'connor:alan f. smeaton<>a system for event-based film browsing<>tidse<>hyowon lee<>
10276<>1509_0<>jong-chul yoon:in-kwon lee<>feature-based synchronization of video and background music<>iwicpas<>hyun-chul lee<>
10295<>1510_1<>daniel von dincklage:amer diwan:j. eliot b. moss<>understanding the behavior of compiler optimizations<>spe<>han lee<>
10291<>1511_1<>kyung c. chae:sang min lee<>on stochastic decomposition in the gi/m/1 queue with single exponential vacation<>orl<>ho woo lee<>
4867<>1512_0<>nulo<>real time sobel square edge detector for night vision analysis<>iciar<>ching wei wang<>
4872<>1517_0<>feng jing:lei zhang:hongjiang zhang<>image annotation refinement using random walk with restarts<>mm<>changhu wang<>
4873<>1517_1<>feng jing:lei zhang:hongjiang zhang<>scalable search-based image annotation of personal images<>mir<>changhu wang<>
7613<>1520_0<>balachander krishnamurthy<>a short walk in the blogistan<>cn<>edith cohen<>
7621<>1520_8<>martin j. strauss<>maintaining time-decaying stream aggregates<>jal<>edith cohen<>
4998<>1523_2<>jianbin wei<>smonitor: a non-intrusive client-perceived end-to-end performance monitor of secured internet services<>usenix<>cheng-zhong xu<>
5000<>1523_4<>jianbin wei<>eqos: provisioning of client-perceived end-to-end qos guarantees in web servers<>tc<>cheng-zhong xu<>
5005<>1523_9<>haiying shen<>hash-based proximity clustering for load balancing in heterogeneous dht networks<>ipps<>cheng-zhong xu<>
5008<>1523_12<>xiaobo zhou<>quantitative service differentiation: a square-root proportional model<>euc<>cheng-zhong xu<>
5013<>1523_17<>jianbin wei:xiaobo zhou:qing li<>a robust packet scheduling algorithm for proportional delay differentiation services<>comcom<>cheng-zhong xu<>
5015<>1523_19<>song fu<>stochastic modeling and analysis of hybrid mobility in reconfigurable distributed virtual machines<>jpdc<>cheng-zhong xu<>
5021<>1523_25<>haiying shen<>elastic routing table with provable performance for congestion control in dht networks<>icdcs<>cheng-zhong xu<>
5026<>1523_30<>song fu:brian wims:ramzi basharahil<>distributed shared arrays: a distributed virtual machine with mobility support for reconfiguration<>cluster<>cheng-zhong xu<>
18681<>1526_0<>tom chi<>safe and secure<>interactions<>kevin cheng<>
35617<>1527_5<>wei lai<>clustering graphs for visualization via node similarities<>vlc<>xiaodi huang<>
35618<>1527_6<>jianming yong:jun yan<>wfms-based data integration for e-learning<>cscwd<>xiaodi huang<>
35620<>1527_8<>a. s. m. sajeev:wei lai<>a scalable algorithm for adjusting node-node overlaps<>IEEEcgiv<>xiaodi huang<>
35624<>1529_1<>yan rui huang:miao wen:aijun an:yang liu:josiah poon<>applying data mining to pseudo-relevance feedback for high performance text retrieval<>icdm<>xiangji huang<>
35631<>1529_8<>ming zhong<>concept-based biomedical text retrieval<>sigir<>xiangji huang<>
35633<>1529_10<>yang liu:aijun an<>boosting prediction accuracy on imbalanced datasets with svm ensembles<>pakdd<>xiangji huang<>
35635<>1529_12<>miao wen:aijun an:yan rui huang<>a platform for okapi-based contextual information retrieval<>sigir<>xiangji huang<>
35636<>1529_13<>qingsong yao:aijun an<>applying language modeling to session identification from database trace logs<>kais<>xiangji huang<>
13419<>1534_0<>luis veiga:paulo ferreira<>context awareness: an experiment with hoarding<>europar<>joao garcia<>
13422<>1536_0<>stefan alfredsson:anna brunstrom<>the impact of loss generation on emulation-based protocol evaluation<>pdcn<>johan garcia<>
35651<>1537_2<>cao liang:jing ma<>an fpga based co-design architecture for mimo lattice decoders<>ersa<>xin-ming huang<>
35652<>1537_3<>cao liang:jing ma<>hardware/software co-design architecture for lattice decoding algorithms<>fccm<>xin-ming huang<>
35656<>1538_0<>liming cai<>fixed-parameter approximation: conceptual framework and approximability results<>iwpec<>xiuzhen huang<>
35660<>1538_4<>jing lai<>maximum common subgraph: upper bound and lower bound results<>imsccs<>xiuzhen huang<>
35662<>1538_6<>yuan lin:jeff jenness<>parameterized computation of lcs for two sequences<>biocomp<>xiuzhen huang<>
35663<>1538_7<>jianer chen:iyad a. kanj:ge xia<>strong computational lower bounds via parameterized complexity<>jcss<>xiuzhen huang<>
35664<>1538_8<>nulo<>lower bounds and parameterized approach for longest common subsequence<>cocoon<>xiuzhen huang<>
35666<>1538_10<>nulo<>negative-weight cycle algorithms<>fcs<>xiuzhen huang<>
35668<>1538_12<>jianer chen:iyad a. kanj:ge xia<>on the computational hardness based on linear fpt-reductions<>jco<>xiuzhen huang<>
35673<>1540_0<>allan c. madoc:dharmendra sharma<>image noise removal in nakagami fading channels via bayesian estimator<>delta<>xu huang<>
35677<>1540_4<>nulo<>an improved aloha algorithm for rfid tag identification<>kes<>xu huang<>
28862<>1544_6<>himanshu gupta:zongheng zhou:quinyi gu<>connected sensor cover: self-organization of sensor networks for efficient query execution<>ton<>samir r. das<>
28884<>1548_0<>nulo<>on measuring imprecision in human response due to respondent and attribute and its utility in questionnaire design<>ijufks<>shubhabrata das<>
40556<>1550_0<>baochun li<>overlay multicast with inferred link capacity correlations<>icdcs<>ying zhu<>
40558<>1551_0<>k. a. ariyawansa<>stochastic semidefinite programming: a new paradigm for stochastic optimization<>4or<>yuntao zhu<>
18934<>1553_7<>joan boyar:leah epstein:lene m. favrholdt:jens s. kohrt:morten monrad pedersen:sanne wohlk<>the maximum resource bin packing problem<>tcs<>kim s. larsen<>
19005<>1554_37<>gerd behrmann:patricia bouyer:radek pelanek<>lower and upper bounds in zone-based abstractions of timed automata<>sttt<>kim guldstrand larsen<>
12766<>1555_0<>philippe golle:markus jakobsson<>auditable privacy: on tamper-evident mix networks<>fc<>jong youl choi<>
12767<>1555_1<>philippe golle:markus jakobsson<>tamper-evident digital signature protecting certification authorities against malware<>dasc<>jong youl choi<>
12768<>1557_0<>andrzej szymczak:greg turk:irfan a. essa<>element-free elastic models for volume fitting and capture<>cvpr<>jaeil choi<>
19139<>1558_3<>david j. houck:peter winkler<>data synchronization methods based on shufflenet and hypercube for networked information systems<>infocom<>kin k. leung<>
19082<>1563_1<>zhenyuan wang:george j. klir<>integration on finite sets<>ijis<>kwong-sak leung<>
19099<>1563_18<>wai shing lau:kin-hong lee<>a hybridized genetic parallel programming based logic circuit synthesizer<>gecco<>kwong-sak leung<>
19101<>1563_20<>sin man cheang:kin-hong lee<>genetic parallel programming: design and implementation<>ec<>kwong-sak leung<>
19102<>1563_21<>zhenyuan wang:rong yang:pheng-ann heng<>real-valued choquet integrals with fuzzy-valued integrand<>fss<>kwong-sak leung<>
19110<>1563_29<>i. king:y. b. wong<>a probabilistic cooperative-competitive hierarchical model for global optimization<>amc<>k. s. leung<>
19119<>1563_38<>y. liang:t. s. k. mok<>a novel evolutionary drug scheduling model in cancer chemotherapy<>titb<>k.-s. leung<>
12756<>1565_5<>bin song:guangyu chen:jacek szymanski:guo-qiang zhang:anthony k. h. tung:jaewoo kang:sun kim:jiong yang<>arcs: an aggregated related column scoring scheme for aligned sequences<>bioinformatics<>jeong-hyeon choi<>
12758<>1565_7<>hee-jeong jin:hye-jung kim:hwan-gue cho<>alignscope: a visual mining tool for gene team finding with whole genome alignment<>apbc<>jeong-hyeon choi<>
12760<>1565_9<>do-hoon lee:mehmet m. dalkilic:sun kim<>compam : visualization of combining pairwise alignments for multiple genomes<>bioinformatics<>jeong-hyeon choi<>
19036<>1569_0<>gerd behrmann:alexandre david:john hakansson:paul pettersson:wang yi:martijn hendriks<>uppaal 4.0<>qest<>kim guldstrand larsen<>
19035<>1570_0<>alexandre david:john hakansson:paul pettersson<>model checking timed automata with priorities using dbm subtraction<>formats<>kim guldstrand larsen<>
28203<>1572_0<>richard m. leahy<>spatial resolution properties of nonquadratically regularized image reconstruction for pet<>isbi<>sangtae ahn<>
28204<>1572_1<>jeffrey a. fessler:doron blatt:alfred o. hero<>convergent incremental optimization transfer algorithms: application to tomography<>tmi<>sangtae ahn<>
28210<>1573_4<>kyong joon lee:hyoung-gon kim<>using a mobile device as an interface tool for hmd-based ar applications<>ACMace<>sang chul ahn<>
17982<>1575_0<>rick s. blum:james p. williams:yiyong sun:chenyang xu<>non-rigid image registration using geometric features and local salient region features<>cvpr<>jinzhong yang<>
17965<>1586_0<>can sar:dawson r. engler<>"explode: a lightweight, general system for finding serious storage system errors."<>osdi<>junfeng yang<>
32553<>1590_1<>carlo tomasi<>level-set curve particles<>eccv<>tingting jiang<>
32549<>1591_0<>ah-hwee tan<>discovering image-text associations for cross-media web information fusion<>pkdd<>tao jiang<>
32550<>1591_1<>ah-hwee tan<>mining rdf metadata for generalized association rules: knowledge discovery in the semantic web era<>www<>tao jiang<>
32546<>1593_2<>john s. baras<>trust evaluation in anarchy: a case study on autonomous networks<>infocom<>tao jiang<>
10735<>1594_0<>konstantinos n. plataniotis:anastasios n. venetsanopoulos<>multilinear principal component analysis of tensor objects for recognition<>icpr<>haiping lu<>
10737<>1594_2<>konstantinos n. plataniotis:anastasios n. venetsanopoulos<>a layered deformable model for gait analysis<>fgr<>haiping lu<>
10733<>1595_6<>zhiyong huang:christian s. jensen:beng chin ooi<>skyline queries against mobile lightweight devices in manets<>icde<>hua lu<>
10709<>1596_13<>maw-shang chang:ming-tat ko<>linear-time algorithms for tree root problems<>swat<>hsueh-i lu<>
10773<>1597_0<>jinn ho:wen-liang hwang:d. t. lee<>gridding spot centers of smoothly distorted microarray images<>tip<>henry horn-shing lu<>
10776<>1597_3<>huai-kuang tsai:grace tzu-wei huang:meng-yuan chou:wen-hsiung li<>method for identifying transcription factor binding sites in yeast<>bioinformatics<>henry horng-shing lu<>
10738<>1603_0<>w. k. chan:t. h. tse<>testing context-aware middleware-centric programs: a data flow approach and an rfid-based experimentation<>sigsoft<>heng lu<>
10739<>1603_1<>w. k. chan:t. y. chen:t. h. tse:stephen s. yau<>integration testing of context-sensitive middleware-based applications: a metamorphic approach<>ijseke<>heng lu<>
10741<>1603_3<>w. k. chan:t. h. tse<>static slicing for pervasive programs<>qsic<>heng lu<>
37350<>1605_3<>nulo<>hierarchical organisation of predicate-semantic models<>utp<>yifeng chen<>
37353<>1605_6<>jeff w. sanders<>compositional reasoning for pointer structures<>mpc<>yifeng chen<>
37361<>1607_1<>hyo-sung ahn:dingyu xue<>robust controllability of interval fractional order linear time invariant systems<>sigpro<>yangquan chen<>
37370<>1607_10<>hyo-sung ahn:igor podlubny<>robust stability check of fractional order linear time invariant systems with interval uncertainties<>sigpro<>yangquan chen<>
37438<>1614_2<>t. c. edwin cheng:c. t. ng<>a note on acyclic domination number in graphs of diameter two<>dam<>yaojun chen<>
37388<>1615_3<>cun xu<>classifying image texture with statistical landscape features<>paa<>yan chen<>
37402<>1615_17<>chang yin zhou<>improving nearest neighbor classification with cam weighted distance<>pr<>yan qiu chen<>
37421<>1617_0<>yong rui:thomas s. huang<>multicue hmm-ukf for real-time contour tracking<>pami<>yunqiang chen<>
37424<>1617_3<>hao wu:tong fang<>coupled bayesian framework for dual energy image registration<>cvpr<>yunqiang chen<>
37407<>1618_3<>guozhu dong:jiawei han:jian pei:benjamin w. wah:jianyong wang<>regression cubes with lossless compression and aggregation<>tkde<>yixin chen<>
37411<>1618_7<>yi pan:juan chen:wei liu:ling chen<>partitioned optimization algorithms for multiple sequence alignment<>aina<>yixin chen<>
37412<>1618_8<>benjamin w. wah:andrew wan<>constrained global optimization by constraint partitioning and simulated annealing<>ictai<>yixin chen<>
37415<>1618_11<>benjamin w. wah:chih-wei hsu<>temporal planning using subgoal partitioning and resolution in sgplan<>jair<>yixin chen<>
13754<>1619_12<>antony tang:muhammad ali babar:ian gorton<>a survey of architecture design rationale<>jss<>jun han<>
13760<>1619_18<>elisabetta di nitto:robert j. hall:yanbo han:andrea polini:kurt sandkuhl:andrea zisman<>international workshop on service oriented software engineering (iw-sose'06)<>icse<>jun han<>
13762<>1619_20<>zheng li:yan jin<>a runtime monitoring and validation framework for web service interactions<>aswec<>jun han<>
13763<>1619_21<>xuan thang nguyen:ryszard kowalczyk<>using dynamic asynchronous aggregate search for quality guarantees of multiple web services compositions<>icsoc<>jun han<>
13766<>1619_24<>khaled m. khan<>assessing security properties of software components: a software engineer's perspective<>aswec<>jun han<>
13767<>1619_25<>artem vorobiev<>specifying dynamic security properties of web service based systems<>skg<>jun han<>
13768<>1619_26<>muhammad ali babar:antony tang:ian gorton<>industrial perspective on the usefulness of design rationale for software maintenance: a survey<>qsic<>jun han<>
13777<>1619_35<>artem vorobiev<>security attack ontology for web services<>skg<>jun han<>
13791<>1622_5<>xiaoqiu shi<>popularity biased hybrid search in p2p systems<>gcc<>jinsong han<>
13792<>1622_6<>xiaoming chen:zhoujun li:yongzhen zhuang:lei chen 0002<>hand: an overlay optimization algorithm in peer-to-peer systems<>hpcc<>jinsong han<>
13794<>1623_0<>peter h. n. de with<>content-based model template adaptation and real-time system for behavior interpretation in sports video<>acivs<>jungong han<>
13795<>1623_1<>weilun lao:peter h. n. de with<>scene-level analysis for tennis sports video using weighted linear combination of visual cues<>euroimsa<>jungong han<>
30501<>1627_0<>flip korn:yihua wu<>modeling skew in data streams<>sigmod<>s. muthukrishnan<>
30507<>1627_6<>navin goyal:sachin lodha<>the graham-knowlton problem revisited<>mst<>s. muthukrishnan<>
30541<>1627_40<>amit chakrabarti:khanh do ba<>estimating entropy and entropy norm on data streams<>stacs<>s. muthukrishnan<>
30575<>1627_74<>gagan aggarwal:jon feldman<>bidding to the top: vcg and equilibria of position-based auctions<>waoa<>s. muthukrishnan<>
30590<>1627_89<>flip korn:yihua wu<>fractal modeling of ip network traffic at streaming speeds<>icde<>s. muthukrishnan<>
30606<>1627_105<>paolo ferragina:fabrizio luccio:giovanni manzini<>compressing and searching xml data via two zips<>www<>s. muthukrishnan<>
30614<>1627_113<>graham cormode<>combinatorial algorithms for compressed sensing<>sirocco<>s. muthukrishnan<>
30670<>1628_1<>john eisbrener:greg murphy:david eade:christopher k. pinnow:kohinoor begum:seong-moo yoo:jong-hoon youn<>recycled path routing in mobile ad hoc networks<>comcom<>seungjin park<>
30682<>1629_3<>jessica k. hodgins<>capturing and animating skin deformation in human motion<>tog<>sang il park<>
23774<>1631_0<>paul e. rybski:scott lenser:sonia chernova:douglas vail<>cmrobobits: creating an intelligent aibo robot<>aim<>manuela m. veloso<>
23775<>1633_0<>carlos vallespi:fernando de la torre:takeo kanade<>automatic clustering of faces in meetings<>icip<>manuela m. veloso<>
30690<>1636_0<>jiwoon jeon:w. bruce croft:joon ho lee<>a framework to predict the quality of answers with non-textual features<>sigir<>soyeon park<>
16087<>1645_0<>oussama khatib<>a haptic teleoperation approach based on contact force control<>ijrr<>jaeheung park<>
37781<>1646_3<>hung-ta pai:jing-tian sung<>adaptive retransmission for distributed detection in wireless sensor networks<>sutc<>yunghsiang s. han<>
37786<>1646_8<>tsang-yi wang:po-ning chen:yung-ti wang<>on the design of soft-decision fusion rule for coding approach in wireless sensor networks<>wasa<>yunghsiang s. han<>
37791<>1646_13<>hung-ta pai<>power-efficient data fusion assurance using direct voting mechanism in wireless sensor networks<>sutc<>yunghsiang s. han<>
16088<>1647_0<>jaesoo lee:seongsoo hong<>memory footprint reduction with quasi-static shared libraries in mmu-less embedded systems<>rtas<>jiyong park<>
16089<>1647_1<>saehwa kim:seongsoo hong<>scenario-based multitasking for real-time object-oriented models<>infsof<>jiyong park<>
37799<>1648_4<>kai salomaa:derick wood<>prime decompositions of regular languages<>dlt<>yo-sub han<>
37800<>1648_5<>yajun wang:derick wood<>infix-free regular expressions and languages<>ijfcs<>yo-sub han<>
37804<>1648_9<>derick wood<>overlap-free regular languages<>cocoon<>yo-sub han<>
16093<>1649_1<>james f. cremer:alberto maria segre<>visual exploration of genetic likelihood space<>sac<>juw won park<>
16073<>1653_0<>gi-ho park:sung woo chung:han-jong kim:jung-bin im:shin-dug kim:sung-bae park<>practice and experience of an embedded processor core modeling<>hpcc<>jung-wook park<>
29062<>1655_3<>brendan d. mckay:peter eades<>a linear time algorithm for constructing maximally symmetric straight line drawings of triconnected planar graphs<>dcg<>seok-hee hong<>
20613<>1656_0<>emmanuel papadakis:ioannis a. kakadiaris:i. konstantinidis:donald kouri:david hoffman<>image denoising using a tight frame<>tip<>lixin shen<>
20615<>1658_1<>moo k. chung<>large-scale modeling of parametric surfaces using spherical harmonics<>3dpvt<>li shen<>
20618<>1658_4<>heng huang:lei zhang 0002:dimitris samaras:rong zhang:fillia makedon:justin d. pearlman<>hemispherical harmonic surface description and applications to medical image analysis<>3dpvt<>li shen<>
20623<>1658_9<>heng huang:rong zhang:fillia makedon:justin d. pearlman<>a spatio-temporal modeling method for shape representation<>3dpvt<>li shen<>
20625<>1658_11<>moo k. chung:kim m. dalton:richard j. davidson<>multi-scale voxel-based morphometry via weighted spherical harmonic representation<>miar<>li shen<>
28637<>1671_0<>nulo<>local regularization assisted orthogonal least squares regression<>ijon<>s. chen<>
28651<>1676_0<>ting-lu huang<>a tight bound on remote reference time complexity of mutual exclusion in the read-modify-write model<>jpdc<>sheng-hsiung chen<>
28645<>1677_0<>gheorghita ghinea:robert d. macredie<>a cognitive approach to user perception of multimedia quality: an empirical investigation<>ijmms<>sherry y. chen<>
28650<>1677_5<>gheorghita ghinea<>perceived quality of multimedia educational content: a cognitive style approach<>mms<>sherry y. chen<>
25708<>1678_0<>harlan foote:patrick mackey:ken perrine:george chin jr.<>generating graphs for visual analytics through interactive sketching<>tvcg<>pak chung wong<>
25710<>1678_2<>harlan foote:george chin jr.:patrick mackey:ken perrine<>graph signatures for visual analytics<>tvcg<>pak chung wong<>
25718<>1678_10<>stuart j. rose:george chin jr.:deborah a. frincke:richard may:christian posse:antonio sanfilippo:jim thomas<>walking the path: a new journey to explore and discover through visual analytics<>ivs<>pak chung wong<>
28652<>1681_0<>hua-gang li:jun'ichi tatemura:divyakant agrawal:k. selcuk candan:wang-pin hsiung<>safety guarantee of continuous join queries over punctuated data streams<>vldb<>songting chen<>
12259<>1687_9<>stephen a. jarvis:daniel p. spooner:helene n. lim choi keung:subhash saini:graham r. nudd<>performance prediction and its use in parallel and distributed computing systems<>fgcs<>junwei cao<>
6741<>1690_2<>nulo<>underapproximating predicate transformers<>sas<>david a. schmidt<>
6754<>1690_15<>nulo<>comparing completeness properties of static analyses and their logics<>aplas<>david a. schmidt<>
6669<>1691_3<>gan deng:aniruddha s. gokhale:andrey nechypurenko<>modularizing variability and scalability concerns in distributed real-time and embedded systems with modeling tools and component middleware<>isorc<>douglas c. schmidt<>
6670<>1691_4<>richard p. gabriel:linda m. northrop:kevin sullivan<>ultra-large-scale systems<>oopsla<>douglas c. schmidt<>
6686<>1691_20<>arvind s. krishna:aniruddha s. gokhale<>context-specific middleware specialization techniques for optimizing software product-line architectures<>eurosys<>douglas c. schmidt<>
6700<>1691_34<>stoyan paunov:james hill:steven d. baker:john m. slaby<>domain-specific modeling languages for configuring and evaluating enterprise dre system quality of service<>ecbs<>douglas c. schmidt<>
6704<>1691_38<>richard e. schantz:joseph p. loyall:craig rodrigues<>controlling quality-of-service in distributed real-time and embedded systems via adaptive middleware<>spe<>douglas c. schmidt<>
6716<>1691_50<>andrey nechypurenko:egon wuchner:jules white<>applying model intelligence frameworks for deployment problem in real-time and embedded systems<>models<>douglas c. schmidt<>
6717<>1691_51<>adam a. porter:cemal yilmaz:atif m. memon:arvind s. krishna:aniruddha s. gokhale<>techniques and processes for improving the quality and performance of open-source software<>sopr<>douglas c. schmidt<>
6755<>1692_0<>tobias luksch:jens wettach:karsten berns<>autonomous behavior-based exploration of office environments<>icinco<>daniel schmidt<>
36597<>1695_2<>jilin tu:aleksandar ivanovic:li fei-fei:thomas s. huang<>variational shift invariant probabilistic pca for face recognition<>icpr<>xun xu<>
18371<>1698_0<>guohong cao<>vadd: vehicle-assisted data delivery in vehicular ad hoc networks<>infocom<>jing zhao<>
33662<>1707_9<>michael penner<>cache-friendly implementations of transitive closure<>jea<>viktor k. prasanna<>
33671<>1707_18<>hong-jip jung:zachary k. baker<>performance of fpga implementation of bit-split architecture for intrusion detection systems<>ipps<>viktor k. prasanna<>
33680<>1707_27<>mitali singh<>energy-efficient and fault-tolerant resolution of topographic queries in networked sensor systems<>icpads<>viktor k. prasanna<>
33684<>1707_31<>vasanth krishna namasivayam<>scalable parallel implementation of exact inference in bayesian networks<>icpads<>viktor k. prasanna<>
33686<>1707_33<>ronald scrofano:maya gokhale:frans trouw<>hardware/software approach to molecular dynamics on reconfigurable computers<>fccm<>viktor k. prasanna<>
33693<>1707_40<>ling zhuo<>scalable hybrid designs for linear algebra on reconfigurable computing systems<>icpads<>viktor k. prasanna<>
33696<>1707_43<>zachary k. baker<>automatic synthesis of efficient intrusion detection systems on fpgas<>tdsc<>viktor k. prasanna<>
33702<>1707_49<>gerald r. morris:richard d. anderson<>an fpga-based application-specific processor for efficient reduction of multiple variable-length floating-point data sets<>asap<>viktor k. prasanna<>
33714<>1707_61<>ling zhuo<>high-performance and parameterized matrix factorization on fpgas<>fpl<>viktor k. prasanna<>
33741<>1707_88<>jong-kook kim:debra a. hensgen:taylor kidd:howard jay siegel:david st. john:cynthia e. irvine:timothy e. levin:n. wayne porter:richard f. freund<>a flexible multi-dimensional qos performance measure framework for distributed heterogeneous systems<>cluster<>viktor k. prasanna<>
23855<>1713_0<>asoke k. nandi<>blind phase-amplitude modulation classification with unknown phase offset<>icpr<>m. l. dennis wong<>
16095<>1714_1<>jung hwan choi:kaushik roy<>dynamic bit-width adaptation in dct: image quality versus computation energy trade-off<>date<>jongsun park<>
23854<>1716_0<>t. y. wong:k. t. law:john c. s. lui<>an efficient distributed algorithm to identify and traceback ddos traffic<>cj<>man hon wong<>
23852<>1717_20<>nulo<>evolving recursive programs by using adaptive grammar based genetic programming<>gpem<>man wong<>
37954<>1723_0<>nulo<>per-domain packet scale rate guarantee for expedited forwarding<>ton<>yuming jiang<>
37955<>1723_1<>nulo<>a basic stochastic network calculus<>sigcomm<>yuming jiang<>
37952<>1725_0<>chong-wah ngo:wanlei zhao<>fast tracking of near-duplicate keyframes in broadcast domain with transitivity propagation<>mm<>yu-gang jiang<>
37953<>1725_1<>wanlei zhao:chong-wah ngo<>keyframe retrieval by keypoints: can point-to-point matching help?<>civr<>yu-gang jiang<>
30721<>1726_0<>hongbo yu:xiaoyun wang:aaram yun<>cryptanalysis of the full haval with 4 and 5 passes<>fse<>sangwoo park<>
37944<>1728_0<>zhijun zhang:hung-tat tsui<>consistent multi-modal non-rigid registration based on a variational approach<>prl<>yifeng jiang<>
37948<>1728_4<>jun xie:hung-tat tsui<>shape alignment by learning a landmark-pdm coupled model<>icpr<>yifeng jiang<>
30710<>1736_1<>gi-ho park:sung woo chung:han-jong kim:jung-bin im:jung-wook park:shin-dug kim<>practice and experience of an embedded processor core modeling<>hpcc<>sung-bae park<>
30715<>1742_0<>jorg denzinger:frank maurer:ehud sharlin<>an interactive speech interface for summarizing agile project planning meetings<>chi<>shelly park<>
29830<>1744_7<>michael chu:christopher j. hughes:partha kundu:anthony nguyen<>hybrid transactional memory<>ppopp<>sanjeev kumar<>
33248<>1747_0<>chinyao low:yukling yip<>modelling and heuristics of fms scheduling with multiple objectives<>cor<>tai-hsi wu<>
29809<>1750_0<>rajah annamalai subramanian:philip r. cohen<>"integrating joint intention theory, belief reasoning, and communicative action for generating team-oriented dialogue."<>aaai<>sanjeev kumar<>
29799<>1754_5<>martial hebert<>discriminative random fields<>ijcv<>sanjiv kumar<>
33247<>1756_0<>yuan xue:yi cui<>preserving traffic privacy in wireless mesh networks<>wowmom<>taojun wu<>
14532<>1763_1<>mung chiang:a. robert calderbank<>utility-optimal medium access control: reverse and forward engineering<>infocom<>jang-won lee<>
14535<>1763_4<>ao tang:jianwei huang:mung chiang:a. robert calderbank<>reverse engineering mac<>wiopt<>jang-won lee<>
14519<>1766_2<>ho lee:jaeil hwang:seungyong park:chungwoo lee:yunmook nah:segil jeon:moon-hae kim<>long-term location data management for distributed moving object databases<>isorc<>joonwoo lee<>
14508<>1768_0<>jaechan lim:sangjin hong:peom park<>algorithm for detection with localization of multi-targets in wireless acoustic sensor networks<>ictai<>jinseok lee<>
14509<>1768_1<>jaechan lim:sangjin hong:peom park<>tracking an object in 3-d space using particle filtering based on sensor array<>IEEEcit<>jinseok lee<>
40513<>1771_0<>muralidhar medidi:roger a. slaaen:christopher j. mallery:sirisha medidi<>scalable localization in wireless sensor networks<>hipc<>yuanyuan zhou<>
40511<>1773_4<>shan lu:pin zhou:wei liu:josep torrellas<>pathexpander: architectural support for increasing the path coverage of dynamic bug detection<>micro<>yuanyuan zhou<>
40506<>1774_3<>steve cronen-townsend:w. bruce croft<>precision prediction based on ranked list coherence<>ir<>yun zhou<>
40502<>1775_0<>joseph davis<>community discovery and analysis in blogspace<>www<>ying zhou<>
40501<>1776_1<>subhash suri:csaba d. toth<>range counting over multidimensional data streams<>dcg<>yunhong zhou<>
16388<>1777_0<>bin cui:gao cong:heng tao shen:cui yu<>exploring composite acoustic features for efficient music similarity query<>mm<>jialie shen<>
41067<>1783_3<>aaron r. bradley<>verification constraint problems with strengthening<>ictac<>zohar manna<>
41072<>1783_8<>ting zhang:henny b. sipma<>decision procedures for term algebras with integer constraints<>iandc<>zohar manna<>
41091<>1783_27<>casar sanchez:henny b. sipma:christopher d. gill<>distributed priority inheritance for real-time and embedded systems<>opodis<>zohar manna<>
41099<>1783_35<>sriram sankaranarayanan:henny b. sipma<>fixed point iteration for computing the time elapse operator<>hybrid<>zohar manna<>
41104<>1783_40<>casar sanchez:henny b. sipma:christopher d. gill<>efficient distributed deadlock avoidance with liveness guarantees<>emsoft<>zohar manna<>
41105<>1783_41<>sriram sankaranarayanan:michael colon:henny b. sipma<>efficient strongly relational polyhedral analysis<>vmcai<>zohar manna<>
41106<>1783_42<>matteo slanina:henny b. sipma<>proving atl* properties of infinite-state systems<>ictac<>zohar manna<>
41121<>1783_57<>aaron r. bradley:henny b. sipma<>what's decidable about arrays?<>vmcai<>zohar manna<>
3924<>1784_12<>zai ping lu:hua zhang<>tetravalent edge-transitive cayley graphs with odd number of vertices<>jct<>cai heng li<>
3905<>1785_1<>tok wang ling:min hu<>reuse or never reuse the deleted labels in xml query processing based on labeling schemes<>dasfaa<>changqing li<>
3909<>1785_5<>tok wang ling:min hu<>efficient processing of updates in dynamic xml data<>icde<>changqing li<>
3940<>1786_2<>kevin chen-chuan chang:ihab f. ilyas<>supporting ad-hoc ranking aggregates<>sigmod<>chengkai li<>
3953<>1789_9<>liang jin:sharad mehrotra<>supporting efficient record linkage for large data sets using mapping techniques<>www<>chen li<>
3961<>1789_17<>nick koudas:anthony k. h. tung:rares vernica<>relaxing join and selection queries<>vldb<>chen li<>
3962<>1789_18<>amitabha bagchi:amitabh chaudhary:michael t. goodrich:michal shmueli-scheuer<>achieving communication efficiency through push-pull partitioning of semantic spaces to disseminate dynamic information<>tkde<>chen li<>
3984<>1790_0<>chia-hung wei<>calcification descriptor and relevance feedback learning algorithms for content-based mammogram retrieval<>mammo<>chang-tsun li<>
3985<>1790_1<>chia-hung wei<>learning pathological characteristics from user's relevance feedback for content-based mammogram retrieval<>ism<>chang-tsun li<>
3996<>1792_0<>b. prabhakaran<>a novel indexing approach for efficient and fast similarity search of captured motions<>pakdd<>chuanjun li<>
8822<>1796_16<>david tolliver<>graph partitioning by spectral rounding: applications in image segmentation and clustering<>cvpr<>gary l. miller<>
8826<>1796_20<>david e. cardoze:todd phillips<>representing topological structures using cell-chains<>gmp<>gary l. miller<>
4167<>1798_1<>yao-yuan liu:koong h.-c. lin:tzu-chang yeh<>low-cost rfid identification variation<>jcis<>chad lin<>
4170<>1800_0<>nulo<>programming monads operationally with unimo<>icfp<>chuan-kai lin<>
36579<>1805_4<>majid mirmehdi:barry t. thomas<>colour tonality inspection using eigenspace features<>mva<>xianghua xie<>
36580<>1805_5<>ronghua yang:majid mirmehdi<>a charged active contour based on electrostatics<>acivs<>xianghua xie<>
4158<>1808_3<>tim kaldewey:anna povzner:scott a. brandt<>diverse soft real-time processing in an integrated system<>rtss<>caixue lin<>
36558<>1809_3<>hao liu:wei-ying ma:hongjiang zhang<>browsing large pictures under limited display sizes<>tmm<>xing xie<>
36567<>1809_12<>xin fan:wei-ying ma<>detecting the sufficient display resolution for image browsing<>mdm<>xing xie<>
1494<>1815_1<>arkadeb ghosal:christoph m. kirsch:thomas a. henzinger:daniel t. iercan<>a hierarchical coordination language for interacting real-time tasks<>emsoft<>alberto l. sangiovanni-vincentelli<>
27713<>1818_0<>jerry coakley:ana-maria fuertes<>unobserved heterogeneity in panel time series models<>csda<>ron smith<>
27689<>1820_1<>wayne piekarski<>robust gloves for 3d interaction in mobile outdoor ar environments<>ismar<>ross smith<>
37504<>1830_0<>gerald c. gannod:james s. collofello<>a software product line process simulator<>sopr<>yu chen<>
37497<>1832_1<>cheng-chung chou:xinghua lu:elizabeth h. slate:konan peck:wenying xu:eberhard o. voit:jonas s. almeida<>a multivariate prediction model for microarray cross-hybridization<>bmcbi<>yian a. chen<>
37489<>1833_0<>chetan shiva shankar:vanish talwar:subu iyer:dejan s. milojicic:roy h. campbell<>specification-enhanced policies for automated management of changes in it systems<>lisa<>yuan chen<>
37482<>1837_0<>kadri hacioglu<>exploration of coreference resolution: the ace entity detection and recognition task<>tsd<>ying chen<>
11801<>1838_0<>barbara kitchenham:hiyam al-kilidar:muhammad ali babar:mike berry:karl cox:jacky keung:felicia kurniawati:mark staples:liming zhu<>evaluating guidelines for empirical software engineering studies<>isese<>he zhang<>
11802<>1838_1<>ming huo:barbara kitchenham:d. ross jeffery<>qualitative simulation model for software engineering process<>aswec<>he zhang<>
11803<>1838_2<>barbara kitchenham<>semi-quantitative simulation modeling of software engineering process<>ispw<>he zhang<>
11804<>1839_0<>rouhollah rahmani:sharath r. cholleti:sally a. goldman<>local image representations using pruned salient points with applications to cbir<>mm<>hui zhang<>
11805<>1839_1<>sally a. goldman<>image segmentation using salient points-based object templates<>icip<>hui zhang<>
11806<>1839_2<>sharath r. cholleti:sally a. goldman:jason e. fritts<>meta-evaluation of image segmentation using machine learning<>cvpr<>hui zhang<>
11810<>1840_2<>jiang su<>a fast decision tree learning algorithm<>aaai<>harry zhang<>
11814<>1840_6<>jiang su<>full bayesian network classifiers<>icml<>harry zhang<>
11821<>1843_1<>xin he<>an application of well-orderly trees in graph drawing<>ijfcs<>huaming zhang<>
11824<>1844_1<>changhu wang:feng jing:lei zhang<>scalable search-based image annotation of personal images<>mir<>hongjiang zhang<>
11829<>1844_6<>changhu wang:feng jing:lei zhang<>image annotation refinement using random walk with restarts<>mm<>hongjiang zhang<>
11840<>1846_0<>shell-ying huang<>a general framework for parallel bdi agents<>iat<>huiliang zhang<>
11841<>1846_1<>shell-ying huang<>are parallel bdi agents really better?<>ecai<>huiliang zhang<>
37476<>1851_0<>kevin w. li:jason levy:keith w. hipel:d. marc kilgour<>rough-set multiple-criteria abc analysis<>rsctc<>ye chen<>
37477<>1851_1<>d. marc kilgour:keith w. hipel<>multiple criteria classification with an application in water resources planning<>cor<>ye chen<>
37479<>1852_1<>konstantinos kleisouris:xiaoyan li:wade trappe:richard p. martin<>the robustness of localization algorithms to signal strength attacks: a comparative study<>dcoss<>yingying chen<>
37443<>1853_2<>ming wu:xian-he sun<>qos oriented resource reservation in shared environments<>ccgrid<>yong chen<>
37457<>1855_1<>hong-wei chen<>ftxi: fault tolerance xcs in integer<>gecco<>ying-ping chen<>
37458<>1855_2<>ming-chung jian<>introducing recombination with dynamic linkage discovery to particle swarm optimization<>gecco<>ying-ping chen<>
37460<>1855_4<>tao-yang fu:tsu-yu wu:chin-te chen:kai-chu wu<>evolutionary interactive music composition<>gecco<>ying-ping chen<>
37461<>1855_5<>chao-hong chen:wei-nan liu<>adaptive discretization for probabilistic model building genetic algorithms<>gecco<>ying-ping chen<>
37469<>1855_13<>ping-chu hung<>iecga: integer extended compact genetic algorithm<>gecco<>ying-ping chen<>
37531<>1858_0<>nulo<>an efficient search algorithm for partially ordered sets<>acst<>yan chen<>
37523<>1861_1<>ling-jyh chen:tony sun<>improving bluetooth edr data throughput using fec and interleaving<>msn<>yung-chih chen<>
37529<>1863_0<>wei-ta chen:ming-syan chen<>mining frequent spatial patterns in image databases<>pakdd<>yi-ling chen<>
37530<>1864_0<>peter li:alexander romanovsky<>measuring the dependability of web services for use in e-science experiments<>isas<>yuhui chen<>
9147<>1869_0<>bo zhang:t. s. eugene ng:animesh nandi:rudolf h. riedi:peter druschel<>"measurement based analysis, modeling, and synthesis of the internet delay space."<>imc<>guohui wang<>
38963<>1870_25<>eyal even-dar:sham m. kakade:michael s. kearns<>(in)stability properties of limit order dynamics<>sigecom<>yishay mansour<>
38976<>1870_38<>shai fine:ari freund:itai jaeger:yehuda naveh:avi ziv<>harnessing machine learning to improve the success rate of stimuli generation<>tc<>yishay mansour<>
38982<>1870_44<>shai fine<>active sampling for multiple output identification<>colt<>yishay mansour<>
38985<>1870_47<>tzur sayag:shai fine<>combining multiple heuristics<>stacs<>yishay mansour<>
39009<>1870_71<>susanne albers:stefan eilts:eyal even-dar:liam roditty<>on nash equilibria for a network creation game<>soda<>yishay mansour<>
39028<>1870_90<>peter demarzo:ilan kremer<>online trading algorithms and robust option pricing<>stoc<>yishay mansour<>
39050<>1870_112<>nir andelman<>a sufficient condition for truthfulness with single parameter agents<>sigecom<>yishay mansour<>
37514<>1871_0<>wen-yen chen<>an agent-based metric for quality of services over wireless networks<>compsac<>yaw-chung chen<>
37508<>1875_1<>dheeraj reddy:george f. riley:bryan larish<>measuring and explaining differences in wireless simulation models<>mascots<>yang chen<>
17808<>1881_0<>xuemin lin:qing zhang:hongjun lu:jeffrey xu yu:xiaofang zhou:yidong yuan<>approximate processing of massive continuous quantile queries over high-speed data streams<>tkde<>jian xu<>
17791<>1885_2<>zhibo chen:yun he:junli zheng<>fast integer-pel and fractional-pel motion estimation for h.264/avc<>jvcir<>jianfeng xu<>
17792<>1885_3<>toshihiko yamasaki:kiyoharu aizawa<>motion editing in 3d video database<>3dpvt<>jianfeng xu<>
17793<>1885_4<>toshihiko yamasaki:kiyoharu aizawa<>motion composition of 3d video<>pcm<>jianfeng xu<>
17766<>1887_6<>vikas singh:lopamudra mukherjee:kenneth r. hoffmann<>solving the brachytherapy seed localization problem using geometric and linear programming techniques<>sac<>jinhui xu<>
17768<>1887_8<>mingen lin:yang yang<>improved approximation algorithms for maximum resource bin packing and lazy bin covering problems<>isaac<>jinhui xu<>
17777<>1887_17<>mingen lin:zhiyong lin<>graph bandwidth of weighted caterpillars<>tcs<>jinhui xu<>
17749<>1888_1<>chao yang<>connectivity of cartesian product graphs<>dm<>jun-ming xu<>
17752<>1888_4<>fang tian:jia huang<>distance irredundance and connected domination numbers of a graph<>dm<>jun-ming xu<>
17728<>1889_0<>qi zhao:zihui ge:jia wang<>robust traffic matrix estimation with imperfect information: making use of multiple data sources<>sigmetrics<>jun xu<>
17734<>1889_6<>ashwin lall:vyas sekar:mitsunori ogihara:hui zhang<>data streaming algorithms for estimating entropy of network traffic<>sigmetrics<>jun xu<>
17735<>1889_7<>qi zhao:zhen liu<>design of a novel statistics counter architecture with optimal space and time efficiency<>sigmetrics<>jun xu<>
17738<>1889_10<>qi zhao:mitsunori ogihara:haixun wang<>finding global icebergs over distributed data sets<>pods<>jun xu<>
17743<>1889_15<>abhishek kumar<>sketch guided sampling - using on-line estimates of flow size for adaptive data collection<>infocom<>jun xu<>
2924<>1893_0<>nulo<>combining type theory and untyped set theory<>cade<>chad e. brown<>
32431<>1898_14<>kazuhisa makino:yushi uno<>minimum edge ranking spanning trees of split graphs<>dam<>toshihide ibaraki<>
32452<>1898_35<>kouji nakamura<>packing problems with soft rectangles<>hm<>toshihide ibaraki<>
37547<>1903_0<>james ze wang:kurt grieb:ya zhang:ching-chih chen:jia li<>machine annotation and retrieval for digital imagery of historical materials<>jodl<>yixin chen<>
3518<>1906_10<>elizabeth gray:paul o'connell:stefan weber:jean-marc seigneur:yong chen<>trust evolution policies for security in collaborative ad hoc applications<>entcs<>christian damsgaard jensen<>
3522<>1906_14<>paul o'connell<>trust-based route selection in dynamic source routing<>itrust<>christian damsgaard jensen<>
3536<>1907_8<>michael h. bohlen:johann gamper<>multi-dimensional aggregation for temporal data<>edbt<>christian s. jensen<>
3540<>1907_12<>dalia tiesyte:nerius tradisauskas<>the cost benchmark-comparison and evaluation of spatio-temporal indexes<>dasfaa<>christian s. jensen<>
3544<>1907_16<>rimantas benetis:gytis karciauskas:simonas saltenis<>nearest and reverse nearest neighbor queries for moving objects<>vldb<>christian s. jensen<>
3553<>1907_25<>albrecht schmidt 0002<>efficient maintenance of ephemeral data<>dasfaa<>christian s. jensen<>
3556<>1907_28<>michael h. bohlen:johann gamper<>how would you like to aggregate your temporal data?<>time<>christian s. jensen<>
3564<>1907_36<>michael h. bohlen:johann gamper<>an algebraic framework for temporal attribute characteristics<>amai<>christian s. jensen<>
3589<>1907_61<>albrecht schmidt 0002:simonas saltenis<>expiration times for data management<>icde<>christian s. jensen<>
3611<>1907_83<>xuegang huang:simonas saltenis<>multiple k nearest neighbor query processing in spatial network databases<>adbis<>christian s. jensen<>
37539<>1920_0<>eric fleury<>duplicate address detection in wireless ad hoc networks using wireless nature<>networking<>yu chen<>
16391<>1921_1<>ashok samal:david marx<>how effective are landmarks and their geometry for face recognition?<>cviu<>jiazheng shi<>
16392<>1921_2<>stephen e. reichenbach<>spatially constrained wiener filter with markov autocorrelation modeling for image resolution enhancement<>icip<>jiazheng shi<>
16395<>1921_5<>stephen e. reichenbach<>image interpolation by two-dimensional parametric cubic convolution<>tip<>jiazheng shi<>
27286<>1922_7<>keith w. bedford:c. k. shum:xutong niu:feng zhou:vasilia velissariou:j. raul ramirez:aidong zhang<>digitalization of coastal management and decision making supported by multi-dimensional geospatial information and analysis<>dgo<>ron li<>
27289<>1926_0<>sebastien ourselin<>using marker-based deformable models for deriving anatomical models from medical image databases<>isbi<>rongxin li<>
39083<>1927_0<>kyu-young whang:byung suk lee:wook-shin han<>efficient evaluation of linear path expressions on large-scale heterogeneous xml documents using information retrieval techniques<>jss<>young-ho park<>
16412<>1928_0<>theodoros salonidis:edward w. knightly<>starvation mitigation through multi-channel coordination in csma multi-hop wireless networks<>mobihoc<>jingpu shi<>
16410<>1932_1<>nulo<>left cells containing a fully commutative element<>jct<>jian-yi shi<>
27273<>1933_5<>nulo<>a new sufficient condition for hamiltonicity of graphs<>ipl<>rao li<>
3712<>1936_0<>jan struyf:jesse davis<>an efficient approximation to lookahead in relational learners<>ecml<>c. david page jr.<>
3713<>1936_1<>irene m. ong<>experimental design of time series data for learning from dynamic bayesian networks<>psb<>c. david page jr.<>
3714<>1936_2<>filip zelezny:ashwin srinivasan<>randomised restarted search in ilp<>ml<>c. david page jr.<>
9495<>1943_30<>michael r. fellows:michael a. langston:mark a. ragan:frances a. rosamond:mark weyer<>kernelization for convex recoloring<>acid<>hans l. bodlaender<>
9519<>1943_54<>fedor v. fomin:arie m. c. a. koster:dieter kratsch:dimitrios m. thilikos<>on exact algorithms for treewidth<>esa<>hans l. bodlaender<>
9522<>1943_57<>irit katriel<>online topological ordering<>talg<>hans l. bodlaender<>
9550<>1943_85<>nulo<>"treewidth: characterizations, applications, and computations."<>wg<>hans l. bodlaender<>
9557<>1943_92<>emgad h. bachoore<>"a branch and bound algorithm for exact, upper, and lower bounds on treewidth."<>aaim<>hans l. bodlaender<>
9558<>1943_93<>arie m. c. a. koster<>safe separators for treewidth<>dm<>hans l. bodlaender<>
9586<>1943_121<>corinne feremans:alexander grigoriev:eelko penninkx:rene sitters:thomas wolle<>on the minimum corridor connection problem and other generalized geometric problems<>waoa<>hans l. bodlaender<>
26347<>1944_5<>mei-chen yeh:kwang-ting cheng:shai avidan<>fast human detection using a cascade of histograms of oriented gradients<>cvpr<>qiang zhu<>
26348<>1944_6<>mei-chen yeh:kwang-ting cheng<>multimodal fusion using learned text concepts for image categorization<>mm<>qiang zhu<>
26314<>1945_3<>gang qian:qiang xue:sakti pramanik<>dynamic indexing for multidimensional non-ordered discrete data spaces using a data-partitioning approach<>tods<>qiang zhu<>
26318<>1945_7<>gang qian:qiang xue:sakti pramanik<>a space-partitioning-based indexing method for multidimensional non-ordered discrete data spaces<>tois<>qiang zhu<>
26319<>1945_8<>zhewei jiang:cheng luo:wen-chi hou:feng yan<>estimating aggregate join queries over data streams using discrete cosine transform<>dexa<>qiang zhu<>
26326<>1945_15<>adegoke ojewole:wen-chi hou<>window join approximation over data streams with importance semantics<>cikm<>qiang zhu<>
26351<>1950_1<>nathan kitchen:andreas kuehlmann:alberto l. sangiovanni-vincentelli<>sat sweeping with local observability don't-cares<>dac<>qi zhu<>
26352<>1950_2<>abhijit davare:alberto l. sangiovanni-vincentelli<>a semantic-driven synthesis flow for platform-based design<>memocode<>qi zhu<>
34878<>1954_3<>jin zhao:victor k. y. chan<>applying statistical methodology to optimize and simplify software metric models with missing data<>sac<>w. eric wong<>
34880<>1954_5<>joao w. cangussu:kendra cooper<>multi criteria selection of components using the analytic hierarchy process<>cbse<>w. eric wong<>
34886<>1954_11<>yu qi<>effective program debugging based on execution slices and inter-block data dependency<>jss<>w. eric wong<>
34904<>1954_29<>sharath rao:john linn:james overturf<>coverage testing embedded software on symbian/omap<>seke<>w. eric wong<>
34905<>1954_30<>lirong dai:kendra cooper<>modeling and analysis of performance aspects for software architecture: a uml-based approach<>ijseke<>w. eric wong<>
34918<>1954_43<>auri marcelo rizzo vincenzi:marcio eduardo delamaro:jose carlos maldonado<>establishing structural testing criteria for java bytecode<>spe<>w. eric wong<>
34951<>1957_3<>albert c. s. chung<>augmented vessels for quantitative analysis of vascular abnormalities and endovascular treatment planning<>tmi<>wilbur c. k. wong<>
31349<>1959_10<>carlos e. r. alves:edson n. caceres<>a coarse-grained parallel algorithm for the all-substrings longest common subsequence problem<>algorithmica<>siang wun song<>
31363<>1959_24<>carlos e. r. alves:edson norberto caceres<>a bsp/cgm algorithm for finding all maximal contiguous subsequences of a sequence of numbers<>europar<>siang wun song<>
27938<>1963_0<>pierre boulanger<>deep surrender: musically controlled responsive video<>sg<>robyn taylor<>
11936<>1966_2<>simon n. foley<>a framework for establishing decentralized secure coalitions<>csfw<>hongbin zhou<>
11940<>1967_3<>debjit sinha:narendra v. shenoy<>statistical timing yield optimization by gate sizing<>tvlsi<>hai zhou<>
11943<>1967_6<>ruiming chen<>statistical timing verification for transparently latched circuits<>tcad<>hai zhou<>
11944<>1967_7<>debjit sinha<>gate-size optimization under timing constraints for coupling-noise reduction<>tcad<>hai zhou<>
11945<>1967_8<>debjit sinha:narendra v. shenoy<>advances in computation of the maximum of a set of random variables<>isqed<>hai zhou<>
11955<>1967_18<>jia wang:ping-chih wu<>processing rate optimization by sequential system floorplanning<>isqed<>hai zhou<>
11967<>1967_30<>arindam mallik:debjit sinha:prithviraj banerjee<>smart bit-width allocation for low power optimization in a systemc based asic design environment<>date<>hai zhou<>
11970<>1967_33<>debjit sinha:diaaeldin khalil:yehea i. ismail<>a timing dependent power estimation framework considering coupling<>iccad<>hai zhou<>
11973<>1967_36<>chuan lin<>optimal wire retiming without binary search<>tcad<>hai zhou<>
11977<>1967_40<>serkan ozdemir:debjit sinha:gokhan memik:jonathan adams<>yield-aware cache architectures<>micro<>hai zhou<>
11981<>1967_44<>chuan lin<>an efficient retiming algorithm under setup and hold constraints<>dac<>hai zhou<>
29093<>1974_0<>charles j. alpert:jiang hu:shrirang k. karandikar:zhuo li:weiping shi:cliff n. sze<>fast algorithms for slew constrained minimum cost buffering<>dac<>shiyan hu<>
29095<>1974_2<>qiuyang li:jiang hu:peng li<>steiner network construction for timing critical nets<>dac<>shiyan hu<>
29097<>1974_4<>zhanyuan jiang:jiang hu:zhuo li:weiping shi<>a new rlc buffer insertion algorithm<>iccad<>shiyan hu<>
29092<>1976_1<>nulo<>a case for 3d streaming on peer-to-peer networks<>vrml<>shun-yun hu<>
10241<>1977_0<>scott rixner<>tcp offload through connection handoff<>eurosys<>hyong-youb kim<>
10255<>1983_0<>taehwa hong:hyeonjoon moon:yong-guk kim:jongweon lee:seungbin moon<>face representation method using pixel-to-vertex map (pvm) for 3d model based face recognition<>eccv<>hagbae kim<>
10256<>1983_1<>taehwa hong:yang-bok lee:yong-guk kim<>facial expression recognition using active appearance model<>isnn<>hagbae kim<>
10247<>1985_1<>m. aater suleman:onur mutlu:yale n. patt<>2d-profiling: detecting input-dependent branches with a single input data set<>cgo<>hyesoon kim<>
10252<>1985_6<>jose a. joao:onur mutlu:yale n. patt<>diverge-merge processor (dmp): dynamic predicated execution of complex control-flow graphs based on frequently executed paths<>micro<>hyesoon kim<>
10253<>1985_7<>onur mutlu:yale n. patt<>address-value delta (avd) prediction: a hardware technique for efficiently parallelizing dependent cache misses<>tc<>hyesoon kim<>
4694<>1988_0<>ching-ho chen:ya-hui yu:chun-jen tsai<>visual sensitivity guided bit allocation for video coding<>tmm<>chih-wei tang<>
10264<>1991_3<>namje park:jin kwak:seungjoo kim:dongho won<>wipi mobile platform with secure service for mobile rfid network environment<>apweb<>howon kim<>
10265<>1991_4<>namje park:jin kwak:seungjoo kim:dongho won<>security techniques based on epc gen2 tag for secure mobile rfid network services<>kes<>howon kim<>
10266<>1992_0<>john lillis:milos hrkic<>techniques for improved placement-coupled logic replication<>glvlsi<>hosung (leo) kim<>
4636<>1993_1<>rongmei zhang:y. charlie hu:sonia fahmy:xiaojun lin<>impact of the inaccuracy of distance prediction algorithms on internet applications - an analytical and comparative study<>infocom<>chunqiang tang<>
4643<>1993_8<>rong n. chang:edward so<>a distributed service management infrastructure for enterprise data centers based on peer-to-peer technology<>IEEEscc<>chunqiang tang<>
27905<>1997_15<>girish suryanarayana:mamadou h. diallo:justin r. erenkrantz<>architectural support for trust models in decentralized applications<>icse<>richard n. taylor<>
41533<>2005_2<>jixiang meng<>semi-hyper-connected edge transitive graphs<>dm<>zhao zhang<>
41534<>2005_3<>jixiang meng<>restricted edge connectivity of edge transitive graphs<>arscom<>zhao zhang<>
4413<>2008_3<>daniel garcia:catalina m. llado:ramon puigjaner<>performance model interchange format: semantic validation<>icsea<>connie u. smith<>
4418<>2008_8<>lloyd g. williams<>five steps to establish software performance engineering<>cmg<>connie u. smith<>
4444<>2011_0<>d. da silva:frederic boudon:christophe godin:o. puech:h. sinoquet<>a critical appraisal of the box counting method to assess the fractal dimension of tree crowns<>isvc<>c. smith<>
29511<>2019_1<>yong sin kim:sangho shin<>a 4-gb/s/pin current mode 4-level simultaneous bidirectional i/o with current mismatch calibration<>iscas<>sung-mo kang<>
29518<>2019_8<>sangho shin:kwyro lee<>2.4ghz zigbee radio architecture with fast frequency offset cancellation loop<>iscas<>sung-mo kang<>
29473<>2020_4<>songhua xu:yingqing xu:david salesin:yunhe pan:heung-yeung shum<>animating chinese paintings through stroke-based decomposition<>tog<>sing bing kang<>
29485<>2020_16<>noah snavely:c. lawrence zitnick:michael cohen<>stylizing 2.5-d video<>npar<>sing bing kang<>
29492<>2020_23<>ce liu:william t. freeman:richard szeliski<>noise estimation from a single image<>cvpr<>sing bing kang<>
29493<>2020_24<>long quan:ping tan:gang zeng:lu yuan:jingdong wang<>image-based plant modeling<>tog<>sing bing kang<>
29495<>2020_26<>jian sun:yin li:heung-yeung shum<>flash matting<>tog<>sing bing kang<>
29506<>2020_37<>yuanjie zheng:stephen lin<>single-image vignetting correction<>cvpr<>sing bing kang<>
29564<>2024_0<>a. l. narasimha reddy<>an approach to virtual allocation in storage systems<>tos<>sukwoo kang<>
29561<>2025_3<>amit bhati:dmitri loguinov:xiliang liu<>on estimating tight-link bandwidth characteristics over multi-hop paths<>icdcs<>seong-ryong kang<>
29565<>2027_0<>jianhong shen<>video dejittering by bake and shake<>ivc<>sung ha kang<>
29566<>2027_1<>jean-francois aujol<>color image decomposition and restoration<>jvcir<>sung ha kang<>
27996<>2029_8<>hyungseon oh<>an agent-based optimal bidding function<>hicss<>robert j. thomas<>
27952<>2031_7<>zi-xia song<>the extremal function for  minors<>jct<>robin thomas<>
27958<>2031_13<>serguei norine:paul d. seymour:paul wollan<>proper minor-closed families are small<>jct<>robin thomas<>
27968<>2031_23<>serguei norine<>minimal bricks<>jct<>robin thomas<>
27982<>2031_37<>christopher carl heckman<>independent sets in triangle-free cubic planar graphs<>jct<>robin thomas<>
39863<>2040_4<>minh hong tran:gitesh k. raikundalia<>using an experimental study to develop group awareness support for real-time distributed collaborative writing<>infsof<>yun yang<>
39869<>2040_10<>jinjun chen<>assigning local fixed-time constraints in grid workflow systems<>gcc<>yun yang<>
39872<>2040_13<>baolin wu:li li<>ontological approach towards e-business process automation<>icebe<>yun yang<>
39873<>2040_14<>jun shen:jun yan<>swindew-s: extending p2p workflow systems for adaptive composite web services<>aswec<>yun yang<>
39891<>2040_32<>li li:baolin wu<>implementation of agent-based ontology mapping and integration<>icebe<>yun yang<>
39893<>2040_34<>li li<>an agent-based ontological approach for information reorganisation<>ausai<>yun yang<>
39797<>2043_5<>ronny r. dakdouk:semih salihoglu:hao wang:haiyong xie<>interdomain routing as social choice<>icdcsw<>yang richard yang<>
39798<>2043_6<>david kiyoshi goldenberg:pascal bihler:ming cao:jia fang:a. stephen morse:brian d. o. anderson<>localization in sparse networks using sweeps<>mobicom<>yang richard yang<>
39803<>2043_11<>lili qiu:yin zhang:scott shenker<>on selfish routing in internet-like environments<>ton<>yang richard yang<>
39808<>2043_16<>hao wang:haiyong xie:lili qiu:yin zhang:albert g. greenberg<>cope: traffic engineering in dynamic networks<>sigcomm<>yang richard yang<>
39809<>2043_17<>sheng zhong<>verifiable distributed oblivious transfer and mobile agent security<>monet<>yang richard yang<>
39813<>2043_21<>james aspnes:tolga eren:david kiyoshi goldenberg:a. stephen morse:walter whiteley:brian d. o. anderson:peter n. belhumeur<>a theory of network localization<>tmc<>yang richard yang<>
39818<>2044_1<>charles u. martel:zhi (judy) fu:shyhtsun felix wu<>ipsec/vpn security policy correctness and assurance<>jhsn<>yanyan yang<>
12030<>2049_3<>anh phan speer<>effect of redundancy on mean time to failure of wireless sensor networks<>aina<>ing-ray chen<>
12031<>2049_4<>wei hao:jicheng fu:jiang he:i-ling yen:farokh b. bastani<>extending proxy caching capability: issues and performance<>www<>ing-ray chen<>
12035<>2049_8<>bojan cukic<>high assurance software systems<>cj<>ing-ray chen<>
12038<>2049_11<>jin-hee cho:ding-chau wang<>performance characteristics of region-based group key management in mobile ad hoc networks<>sutc<>ing-ray chen<>
14400<>2050_0<>jung hun ohn:jihoon kim<>on the society of genome: social affiliation network analysis of microarray data<>fskd<>ju han kim<>
14403<>2050_3<>hye-sung yoon:sang-ho lee:sung-bum cho<>a novel framework for discovering robust cluster results<>dis<>ju han kim<>
11751<>2055_0<>chia-ching pan:chin-yu lin:cathy s. j. fann<>pda: pooled dna analyzer<>bmcbi<>hsin-chou yang<>
39776<>2065_3<>xingquan zhu:xindong wu<>effective classification of noisy data streams with attribute-oriented dynamic classifier selection<>kais<>ying yang<>
39778<>2065_5<>xindong wu:xingquan zhu<>mining in anticipation for concept change: proactive-reactive prediction in data streams<>datamine<>ying yang<>
39783<>2065_10<>geoffrey i. webb:jesus cerquides:kevin b. korb:janice r. boughton:kai ming ting<>to select or to weigh: a comparative study of model selection and model weighing for spode ensembles<>ecml<>ying yang<>
32161<>2067_1<>wotao yin:xiang sean zhou:dorin comaniciu:thomas s. huang<>total variation models for variable lighting face recognition<>pami<>terrence chen<>
32164<>2067_4<>thomas s. huang<>scale-driven iterative optimization for brain extraction and registration<>cvpr<>terrence chen<>
14428<>2069_0<>sung yang bang:seungjin choi<>sequence-driven features for prediction of subcellular localization of proteins<>pr<>jong kyoung kim<>
14429<>2069_1<>g. p. s. raghava:sung yang bang:seungjin choi<>prediction of subcellular localization of proteins using pairwise sequence alignment and support vector machine<>prl<>jong kyoung kim<>
14430<>2069_2<>seungjin choi<>tree-dependent components of gene expression data for clustering<>icann<>jong kyoung kim<>
14432<>2070_1<>soocheol lee:oh-cheon kwon<>integration of a structural index with a structural join for accelerating path queries<>iccsa<>jongik kim<>
14433<>2070_2<>nulo<>advanced structural joins using element distribution<>isci<>jongik kim<>
14427<>2071_0<>seongkwan kim:sunghyun choi:daji qiao<>cara: collision-aware rate adaptation for ieee 802.11 wlans<>infocom<>jongseok kim<>
23539<>2073_1<>hongbin wang<>a spike sorting framework using nonparametric detection and incremental clustering<>ijon<>mingzhou (joe) song<>
14439<>2074_0<>raj sharman:h. raghav rao:shambhu j. upadhyaya<>framework for analyzing critical incident management systems (cims)<>hicss<>jin ki kim<>
30106<>2082_0<>jong hyuk choi:hubertus franke:kurt d. zeilenga<>improving connection management of the openldap directory server<>pdcn<>sang seok lim<>
24483<>2083_39<>nachiketh r. potlapally:srivaths ravi:anand raghunathan<>a study of the energy consumption characteristics of cryptographic algorithms and security protocols<>tmc<>niraj k. jha<>
24485<>2083_41<>rui zhang<>state encoding of finite-state machines targeting threshold and majority logic based implementations with application to nanotechnologies<>vlsid<>niraj k. jha<>
24486<>2083_42<>rui zhang<>threshold/majority logic synthesis and concurrent error detection targeting nanoelectronic implementations<>glvlsi<>niraj k. jha<>
24487<>2083_43<>li shang:li-shiuan peh:amit kumar 0002<>temperature-aware on-chip networks<>micro<>niraj k. jha<>
24494<>2083_50<>divya arora:anand raghunathan:srivaths ravi:murugan sankaradass:srimat t. chakradhar<>software architecture exploration for high-performance security processing on a multiprocessor mobile soc<>dac<>niraj k. jha<>
24495<>2083_51<>li shang:li-shiuan peh<>powerherd: a distributed scheme for dynamically satisfying peak-power constraints in interconnection networks<>tcad<>niraj k. jha<>
24504<>2083_60<>chao huang:s. ravi:anand raghunathan<>use of computation-unit integrated memories in high-level synthesis<>tcad<>niraj k. jha<>
24512<>2083_68<>loganathan lingappan<>improving the performance of automatic sequential test generation by targeting hard-to-test faults<>vlsid<>niraj k. jha<>
24517<>2083_73<>anish muttreja:anand raghunathan:srivaths ravi<>active learning driven data acquisition for sensor networks<>iscc<>niraj k. jha<>
24527<>2083_83<>divya arora:anand raghunathan:srivaths ravi<>architectural support for safe software execution on embedded processors<>codes<>niraj k. jha<>
24533<>2083_89<>pallav gupta:loganathan lingappan<>test generation for combinational quantum cellular automata (qca) circuits<>date<>niraj k. jha<>
24552<>2083_108<>najwa aaraj:srivaths ravi:anand raghunathan<>architectures for efficient face authentication in embedded systems<>date<>niraj k. jha<>
24555<>2083_111<>fei sun:s. ravi:anand raghunathan<>application-specific heterogeneous multiprocessor synthesis using extensible processors<>tcad<>niraj k. jha<>
24556<>2083_112<>amit kumar 0002:li shang:li-shiuan peh<>hybdtm: a coordinated hardware-software approach for dynamic thermal management<>dac<>niraj k. jha<>
24570<>2083_126<>lin zhong:srivaths ravi:anand raghunathan<>rtl-aware cycle-accurate functional power estimation<>tcad<>niraj k. jha<>
24585<>2083_141<>keith s. vallerio:lin zhong<>energy-efficient graphical user interface design<>tmc<>niraj k. jha<>
24601<>2083_157<>lin zhong<>dynamic power optimization targeting user delays in interactive systems<>tmc<>niraj k. jha<>
24602<>2083_158<>p. gupta:abhinav agrawal<>an algorithm for synthesis of reversible logic circuits<>tcad<>niraj k. jha<>
24611<>2083_167<>fei sun:srivaths ravi:anand raghunathan<>hybrid custom instruction and co-processor synthesis methodology for extensible processors<>vlsid<>niraj k. jha<>
24615<>2083_171<>nachiketh r. potlapally:srivaths ravi:anand raghunathan:ruby b. lee<>impact of configurability and extensibility on ipsec protocol execution on embedded processors<>vlsid<>niraj k. jha<>
21511<>2085_0<>gianfranco ciardo<>a dynamic firing speculation to speedup distributed symbolic state-space generation<>ipps<>ming-ying chung<>
21513<>2085_2<>gianfranco ciardo<>a pattern recognition approach for speculative firing prediction in distributed saturation state-space generation<>entcs<>ming-ying chung<>
21514<>2085_3<>gianfranco ciardo:andy jinqing yu<>a fine-grained fullness-guided chaining heuristic for symbolic reachability analysis<>atva<>ming-ying chung<>
14444<>2086_0<>steve scott:dennis abts:william j. dally<>the blackwidow high-radix clos network<>isca<>john kim<>
14443<>2088_0<>donghui feng:erin shaw:eduard h. hovy<>learning to detect conversation focus of threaded discussions<>naacl<>jihie kim<>
14440<>2090_0<>thomas sikora<>robust anisotropic disparity estimation with perceptual maximum variation modeling<>icip<>jangheon kim<>
14408<>2092_2<>sheung-kown kim<>a chim-based interactive tchebycheff procedure for multiple objective decision making<>cor<>jaehee kim<>
14422<>2098_0<>jong c. park<>extracting contrastive information from negation patterns in biomedical literature<>talip<>jung-jae kim<>
14423<>2098_1<>zhuo zhang:jong c. park:see-kiong ng<>biocontrasts: extracting and exploiting protein-protein contrastive relations from biomedical literature<>bioinformatics<>jung-jae kim<>
41563<>2105_0<>shigang chen<>localized algorithm for aggregate fairness in wireless sensor networks<>mobicom<>zhan zhang<>
4202<>2108_7<>william t. freeman:richard szeliski:sing bing kang<>noise estimation from a single image<>cvpr<>ce liu<>
4215<>2110_11<>zach link:dhiraj k. pradhan<>reuse-based test access and integrated test scheduling for network-on-chip<>date<>chunsheng liu<>
41549<>2111_7<>ruofei zhang:mingjing li:wei-ying ma:hongjiang zhang<>a probabilistic semantic model for image annotation and multi-modal image retrieval<>mms<>zhongfei (mark) zhang<>
41552<>2111_10<>ruofei zhang:ramesh sarukkai:jyh-herng chow:wei dai<>joint categorization of queries and clips for web-based video search<>mir<>zhongfei zhang<>
41540<>2112_0<>nicholas carriero:deyou zheng:john karro:paul m. harrison:mark gerstein<>pseudopipe: an automated pseudogene identification pipeline<>bioinformatics<>zhaolei zhang<>
41539<>2113_0<>s. r. seidel<>a performance model for fine-grain accesses in upc<>ipps<>zhang zhang<>
4222<>2116_0<>long fei:xifeng yan:jiawei han:samuel p. midkiff<>statistical debugging: a hypothesis testing-based approach<>tse<>chao liu<>
4223<>2116_1<>xifeng yan:jiawei han<>mining control flow abnormality for logic error isolation<>sdm<>chao liu<>
4224<>2116_2<>chen chen:jiawei han:philip s. yu<>gplag: detection of software plagiarism by program dependence graph analysis<>kdd<>chao liu<>
4225<>2116_3<>zeng lian:jiawei han<>how bayesians debug<>icdm<>chao liu<>
4226<>2116_4<>bo zhao<>efficient sip-specific event notification<>icn<>chao liu<>
4228<>2116_6<>qiaozhu mei:hang su:chengxiang zhai<>a probabilistic approach to spatiotemporal theme pattern mining on weblogs<>www<>chao liu<>
4229<>2116_7<>jiawei han<>failure proximity: a fault localization-based approach<>sigsoft<>chao liu<>
41002<>2119_1<>nulo<>"print vs. electronic resources: a study of user perceptions, preferences, and use."<>ipm<>ziming liu<>
14477<>2124_2<>seungjoo kim:kilsoo chun:jaeil lee:dongho won<>group key agreement protocol among mobile devices in different cells<>ispa<>jeeyeon kim<>
4189<>2125_2<>ruei-sung lin:ming-hsuan yang:narendra ahuja:stephen e. levinson<>object tracking using globally coordinated nonlinear manifolds<>icpr<>che-bin liu<>
4191<>2125_4<>ruei-sung lin:ming-hsuan yang:narendra ahuja:stephen e. levinson<>learning nonlinear manifolds from time series<>eccv<>che-bin liu<>
40961<>2129_0<>jifeng he:xiaoshan li<>a theory of reactive components<>entcs<>zhiming liu<>
40979<>2129_18<>jifeng he:xiaoshan li<>rcos: a refinement calculus of object systems<>tcs<>zhiming liu<>
40951<>2131_2<>gang hua:zhengyou zhang:ying wu<>automatic business card scanning with a camera<>icip<>zicheng liu<>
40954<>2131_5<>mingli song:huiqiong wang:jiajun bu:chun chen<>subtle facial expression modeling with vector field decomposition<>icip<>zicheng liu<>
40955<>2131_6<>mingli song:baining guo<>real-time facial expression mapping for high resolution 3d meshes<>cgi<>zicheng liu<>
40960<>2131_11<>qingshan zhang:baining guo:demetri terzopoulos:heung-yeung shum<>geometry-driven photorealistic facial expression synthesis<>tvcg<>zicheng liu<>
4178<>2133_4<>yu-ting wang<>an experience in learning about learning composite concepts<>icalt<>chao-lin liu<>
4181<>2133_7<>nulo<>learning how students learn with bayes nets<>its<>chao-lin liu<>
41567<>2134_0<>haitao meng<>a flexible algorithm for extracting periodic signals<>isnn<>zhi-lin zhang<>
41568<>2134_1<>zhang yi<>robust extraction of specific signals with temporal structure<>ijon<>zhi-lin zhang<>
41569<>2134_2<>zhang yi<>extraction of a source signal whose kurtosis value lies in a specific range<>ijon<>zhi-lin zhang<>
41570<>2134_3<>zhang yi<>extraction of temporally correlated sources with its application to non-invasive fetal electrocardiogram extraction<>ijon<>zhi-lin zhang<>
14464<>2147_2<>young-jin kim:kwon-taek kwon<>energy-efficient file placement techniques for heterogeneous mobile storage systems<>emsoft<>jihong kim<>
40940<>2153_0<>sanming zhou:jian ying zhang<>"fuzzy causal networks: general model, inference, and convergence."<>tfs<>zhi-qiang liu<>
40944<>2153_4<>jian ying zhang:sanming zhou<>dynamic domination in fuzzy causal networks<>tfs<>zhi-qiang liu<>
193<>2172_1<>didier buchs<>generative business process prototyping framework<>rsp<>ang chen<>
31282<>2175_7<>xinye cai:andy m. tyrrell<>positional independence and recombination in cartesian genetic programming<>eurogp<>stephen l. smith<>
31286<>2175_11<>j. f. miller<>redundancy and computational efficiency in cartesian genetic programming<>tec<>s. l. smith<>
31302<>2176_12<>nulo<>speedup of null convention digital circuits using null cycle reduction<>jsa<>s. c. smith<>
31267<>2177_0<>nulo<>acceleration of covariance models for non-coding rna search<>biocomp<>scott smith<>
31225<>2179_9<>t. c. nicholas graham:paul curzon:gavin doherty:philippe a. palanque:richard potter:christopher roast<>usability and computer games: working group report<>dsvis<>shamus p. smith<>
31229<>2179_13<>nulo<>exploring the specification of haptic interaction<>dsvis<>shamus p. smith<>
41254<>2182_0<>kavitha balasubramanian:g. sudha anil kumar:g. manimaran<>a novel real-time mac protocol exploiting spatial and temporal channel diversity in wireless industrial networks<>hipc<>z. wang<>
41257<>2182_3<>yao ma:subbarayan pasupathy<>asymptotic performance of hybrid-selection/maximal-ratio combining over fading channels<>tcom<>zhengdao wang<>
41259<>2182_5<>wei mo:daji qiao<>lifetime maximization of sensor networks under connectivity and -coverage constraints<>dcoss<>zhengdao wang<>
41271<>2184_1<>yurong liu:xiaohui liu<>global exponential stability of generalized recurrent neural networks with discrete and distributed delays<>nn<>zidong wang<>
41274<>2184_4<>yurong liu:xiaohui liu<>on global exponential stability of generalized stochastic neural networks with mixed time-delays<>ijon<>zidong wang<>
41240<>2187_3<>rong zheng:kamal e. alameh<>an opto-vlsi based tunable fiber ring laser<>delta<>zhenglin wang<>
41247<>2188_6<>mehul p. sampat:mia k. markey:gary j. whitman:tanya w. stephens:alan c. bovik<>measuring intra- and inter-observer agreement in identifying and localizing structures in medical images<>icip<>zhou wang<>
41248<>2188_7<>guixing wu:hamid r. sheikh:eero p. simoncelli:en-hui yang:alan c. bovik<>quality-aware images<>tip<>zhou wang<>
41249<>2188_8<>seoung bum kim<>automatic alignment of high-resolution nmr spectra using a bayesian estimation approach<>icpr<>zhou wang<>
40175<>2191_19<>jaewon kang:badri nath<>analysis of resource increase and decrease algorithm in wireless sensor networks<>iscc<>yanyong zhang<>
40182<>2192_6<>q. ji<>active and dynamic information fusion for multisensor systems with dynamic bayesian networks<>tsmc<>y. zhang<>
40137<>2193_17<>wei qu:anna liu<>adaptive self-configuration architecture for j2ee-based middleware systems<>hicss<>yan zhang<>
40196<>2194_2<>qingfeng huang:juan liu<>sequential localization algorithm for active sensor network deployment<>aina<>ying zhang<>
40197<>2194_3<>shashidhar gandham:qingfeng huang<>distributed minimal time convergecast scheduling in wireless sensor networks<>icdcs<>ying zhang<>
40200<>2194_6<>juan liu:feng zhao<>robust distributed node localization with error management<>mobihoc<>ying zhang<>
40204<>2194_10<>markus p. j. fromherz<>constrained flooding: a robust and efficient routing framework for wireless sensor networks<>aina<>ying zhang<>
40192<>2195_1<>j. tinsley oden:kenneth r. diller:chandrajit l. bajaj:james c. browne:j. hazle:ivo babuska:j. bass:leszek f. demkowicz:yusheng feng:d. fuentes:serge prudhomme:m. n. rylander:r. j. stafford<>development of a computational paradigm for laser treatment of cancer<>iccS<>yongjie zhang<>
40193<>2195_2<>guoliang xu:chandrajit l. bajaj<>quality meshing of implicit solvation models of biomolecular structures<>cagd<>yongjie zhang<>
40187<>2197_0<>xiaohua hu:xiaodan zhang:illhoi yoo<>a semantic approach for mining hidden links from complementary and non-interactive biomedical literature<>sdm<>yanqing zhang<>
40185<>2198_2<>dana h. brooks:david a. boas<>a spatio-temporal reconstruction algorithm for diffuse optical tomography based on a hemodynamic response function model<>isbi<>yiheng zhang<>
23780<>2202_1<>william k. cheung:jiming liu:xiao-feng xie:zongwei luo<>e-service/process composition through multi-agent constraint management<>bpm<>minhong wang<>
40225<>2205_11<>w.-p. k. yiu:kin fung simon wong:s.-h. g. chan:wan-ching wong:qian zhang:wenwu zhu<>lateral error recovery for media streaming in application-level multicast<>tmm<>ya-qin zhang<>
40229<>2209_0<>bhaskar dasgupta:german a. enciso:eduardo d. sontag<>algorithmic and complexity results for decompositions of biological networks into monotone subsystems<>wea<>yi zhang<>
40232<>2209_3<>natalia maltsev:elizabeth m. glass:dinanath sulakhe:alexis rodriguez:mustafa h. syed:tanuja bompada:mark d'souza<>puma2 - grid-based high-throughput analysis of genomes and metabolic pathways<>nar<>yi zhang<>
23795<>2215_0<>jake yue chen:sarah l. pinkerton:changyu shen<>an integrated computational proteomics method to extract protein targets for fanconi anemia studies<>sac<>mu wang<>
39236<>2217_0<>xuemin shen:chuang lin:jianping pan:peter langendorfer:zhenfu cao<>wireless network security<>wicomm<>yan (lindsay) sun<>
39234<>2218_0<>kwong bor ng:paul b. kantor:tomek strzalkowski:nina wacholder:rong tang:bing bai:robert rittman:peng song<>automated judgment of document qualities<>jasis<>ying sun<>
39235<>2218_1<>paul b. kantor<>cross-evaluation: a new model for information system evaluation<>jasis<>ying sun<>
40251<>2221_0<>hong-kai zhao:jianliang qian<>high order fast sweeping methods for static hamilton-jacobi equations<>jscic<>yong-tao zhang<>
40245<>2222_0<>wei liu:wenjing lou:yuguang fang<>securing mobile ad hoc networks with certificateless public keys<>tdsc<>yanchao zhang<>
40247<>2222_2<>kui ren:wenjing lou<>leds: providing location-aware end-to-end data security in wireless sensor networks<>infocom<>yanchao zhang<>
40249<>2222_4<>wei liu:yuguang fang:kejie lu<>energy conservation through resource-aware movement in heterogeneous mobile ad hoc networks<>jco<>yanchao zhang<>
40250<>2222_5<>wei liu:wenjing lou:yuguang fang<>a robust and energy-efficient data dissemination framework for wireless sensor networks<>winet<>yanchao zhang<>
4288<>2226_4<>sarif kumar naik<>standardization of edge magnitude in color images<>tip<>c. a. murthy<>
4299<>2226_15<>b. lakshmi narayan:sankar k. pal<>maxdiff kd-trees for data condensation<>prl<>c. a. murthy<>
8742<>2235_0<>ungyeon yang:wookho son<>layered multiple displays for immersive and interactive digital contents<>iwec<>gun a. lee<>
8741<>2236_0<>v. jeyakumar:n. dinh<>characterizations of solution sets of convex vector minimization problems<>eor<>g. m. lee<>
26831<>2238_4<>xiangyu zhang:neelam gupta<>pruning dynamic slices with confidence<>pldi<>rajiv gupta<>
26835<>2238_8<>xiangyu zhang:neelam gupta<>locating faults through automated predicate switching<>icse<>rajiv gupta<>
40260<>2245_0<>jason cong:ashok jagannathan:yuchun ma:glenn reinman:jie wei<>an automated design flow for 3d microarchitecture evaluation<>aspdac<>yan zhang<>
40267<>2248_0<>raffi kamalian:alice m. agogino:carlo h. sequin<>design synthesis of microelectromechanical systems using genetic algorithms with component-based genotype representation<>gecco<>ying zhang<>
40269<>2251_0<>xuemin lin:jian xu:flip korn:wei wang<>space-efficient relative error order sketch over data streams<>icde<>ying zhang<>
40282<>2257_0<>anirban mandal:henri casanova:andrew a. chien:yang-suk kee:ken kennedy:charles koelbel<>scalable grid application scheduling via decoupled resource selection and scheduling<>ccgrid<>yang zhang<>
40280<>2259_1<>terrence fernando:hannan xiao:adrian r. l. travis<>evaluation of auditory and visual feedback on task performance in a virtual assembly environment<>presence<>ying zhang<>
40292<>2263_0<>j. f. luo:y. ji:t. x. zhong:j. z. wang:j. p. liu:n. h. niu:j. han:x. guo:g. d. shen<>ebsd measurements of elastic strain fields in a gan/sapphire structure<>mr<>y. q. zhang<>
40287<>2266_0<>jun zheng:lili zhang:yifan chen:maode ma<>modeling location management in wireless networks with generally distributed parameters<>comcom<>yan zhang<>
6980<>2267_2<>yang shao<>model-based sequential organization in cochannel speech<>taslp<>deliang wang<>
6984<>2267_6<>yipeng li<>singing voice separation from monaural recordings<>ismir<>deliang wang<>
6985<>2267_7<>soundararajan srinivasan:nicoleta roman<>binary and ratio time-frequency masks for robust speech recognition<>speech<>deliang l. wang<>
6992<>2267_14<>mingyang wu<>a two-stage algorithm for one-microphone reverberant speech enhancement<>taslp<>deliang wang<>
6995<>2267_17<>michael pedersen:jan larsen:ulrik kjems<>separating underdetermined convolutive speech mixtures<>ica<>deliang wang<>
7003<>2267_25<>x. liu<>image and texture segmentation using local spectral histograms<>tip<>d. wang<>
7032<>2269_2<>joon shik lim:yong-soo kim:sudhir gupta<>a neuro-fuzzy approach for diagnosis of antibody deficiency syndrome<>ijon<>dianhui wang<>
7034<>2269_4<>xiaodi huang:yong-soo kim:joon shik lim:myung-mook han:byung-wook lee<>a structure-based approach for multimedia information filtering<>mta<>dianhui wang<>
7039<>2269_9<>bing guo:yan shen:zhong liu<>hardware-software partitioning of real-time operating systems using hopfield neural networks<>ijon<>dianhui wang<>
7044<>2270_0<>heng-chih chou<>using conditional autoregressive range model to forecast volatility of the stock indices<>jcis<>david wang<>
7058<>2272_1<>samuel t. clanton:vikram s. chib:yoky matsuoka:george d. stetten<>optical merger of direct vision with virtual images for scaled teleoperation<>tvcg<>david c. wang<>
7059<>2277_0<>cynthia sims parr:andriy parafiynyk:joel sachs:rong pan:lushan han:li ding:tim finin<>using the semantic web to integrate ecoinformatics resources<>aaai<>david wang<>
7060<>2277_1<>cynthia sims parr:andriy parafiynyk:joel sachs:li ding:sandor dornbush:timothy w. finin:allan hollander<>integrating ecoinformatics resources on the semantic web<>www<>david wang<>
23376<>2280_16<>bruno martins:marcirio silveira chaves:ana paula afonso:nuno cardoso<>adding geographic scopes to web resources<>urban<>mario j. silva<>
23380<>2280_20<>daniel gomes:sergio freitas<>design and selection criteria for a national web archive<>ercimdl<>mario j. silva<>
23382<>2280_22<>daniel gomes:andre l. santos<>managing duplicates in a web archive<>sac<>mario j. silva<>
23385<>2280_25<>daniel gomes<>modelling information persistence on the web<>icwe<>mario j. silva<>
19721<>2281_2<>takeshi naemura<>a theory of aliasing separation for light field data<>icip<>keita takahashi<>
3459<>2286_1<>kuan-ta chen:polly huang:guo-shiuan wang:chin-laung lei<>on the sensitivity of online game playing time to network qos<>infocom<>chun-ying huang<>
3460<>2286_2<>yu-shian chen:chin-laung lei:yun-peng chiu<>confessible threshold ring signatures<>icsnc<>chun-ying huang<>
3461<>2286_3<>kuan-ta chen:polly huang:chin-laung lei<>quantifying skype user satisfaction<>sigcomm<>chun-ying huang<>
3443<>2289_1<>k.-t. chen:p. huang:c.-l. lei<>the impact of network variabilities on tcp clocking schemes<>infocom<>c.-y. huang<>
3451<>2290_6<>gang zhou:ting yan:tian he:john a. stankovic:tarek f. abdelzaher<>mmsn: multi-frequency media access control for wireless sensor networks<>infocom<>chengdu huang<>
41322<>2294_1<>chun-hung li:ji zhu:jian huang<>a semi-supervised svm for manifold learning<>icpr<>zhili wu<>
3473<>2298_5<>chen-hsing wang:chih-yen lo:min-sheng lee:jen-chieh yeh:cheng-wen wu:shi-yu huang<>a network security processor design based on an integrated soc design and test platform<>dac<>chih-tsun huang<>
3474<>2298_6<>cheng-hung lin:chang-ping jiang:shih-chieh chang<>optimization of regular expression pattern matching circuits on fpga<>date<>chih-tsun huang<>
13467<>2299_0<>rolf niedermeier<>exact algorithms and applications for tree-like weighted set cover<>jda<>jiong guo<>
13473<>2299_6<>michael dom:falk huffner:rolf niedermeier<>error compensation in leaf power problems<>algorithmica<>jiong guo<>
13474<>2299_7<>sebastian wernicke:jochen alber:jens gramm:rolf niedermeier<>the computational complexity of avoiding forbidden submatrices by row deletions<>ijfcs<>jiong guo<>
13475<>2299_8<>rolf niedermeier<>a fixed-parameter tractability result for multicommodity demand flow in trees<>ipl<>jiong guo<>
13480<>2299_13<>michael dom:falk huffner:rolf niedermeier:anke trus<>fixed-parameter tractability results for feedback set problems in tournaments<>ciac<>jiong guo<>
13482<>2299_15<>jens gramm:falk huffner:rolf niedermeier:sebastian wernicke<>compression-based fixed-parameter algorithms for feedback vertex set and edge bipartization<>jcss<>jiong guo<>
13485<>2299_18<>jens gramm:rolf niedermeier<>pattern matching for arc-annotated sequences<>talg<>jiong guo<>
13487<>2299_20<>michael dom:rolf niedermeier:sebastian wernicke<>minimum membership set covering and the consecutive ones property<>swat<>jiong guo<>
13489<>2299_22<>jens gramm:rolf niedermeier<>parameterized intractability of distinguishing substring selection<>mst<>jiong guo<>
13500<>2300_0<>jen-ho chen<>high efficiency digital halftoning with two-element error kernel<>icip<>jing-ming guo<>
13492<>2302_1<>nulo<>a transparent collaborative integration approach for ad hoc product data<>wecwis<>jingzhi guo<>
13494<>2302_3<>nulo<>inter-enterprise business document exchange<>ACMicec<>jingzhi guo<>
13495<>2302_4<>nulo<>"achieving transparent integration of information, documents and processes."<>icebe<>jingzhi guo<>
13497<>2302_6<>iok ham lam:ieong lei:xin guan:pei hin iong:meng chao ieong<>alibaba international: building a global electronic marketplace<>icebe<>jingzhi guo<>
27856<>2308_115<>danfeng yao:keith b. frikken:mikhail j. atallah<>point-based trust: define how much privacy is worth<>icics<>roberto tamassia<>
41306<>2311_9<>ronak desai:qi yang:weiyi meng:clement t. yu<>identifying redundant search engines in a very large scale metasearch engine context<>widm<>zonghuan wu<>
32074<>2312_0<>r. p. k. chan<>a simplified approach to the order conditions of integration methods<>computing<>t. m. h. chan<>
32081<>2314_1<>andy m. yip:chris h. q. ding<>dynamic cluster formation using level set methods<>pami<>tony f. chan<>
41319<>2315_3<>muhammad tanvir alam<>efficient scheduling for reducing load in the ims presence service<>woc<>zheng da wu<>
32024<>2317_9<>nulo<>dynamic subgraph connectivity with geometric applications<>siamcomp<>timothy m. chan<>
32040<>2317_25<>nulo<>all-pairs shortest paths for unweighted undirected graphs in  time<>soda<>timothy m. chan<>
32044<>2317_29<>peyman afshani<>dynamic connectivity for axis-parallel rectangles<>esa<>timothy m. chan<>
32054<>2317_39<>nulo<>three problems about simple polygons<>comgeo<>timothy m. chan<>
32056<>2317_41<>nulo<>a dynamic data structure for 3-d convex hulls and 2-d nearest neighbor queries<>soda<>timothy m. chan<>
32064<>2317_49<>hamid zarrabi-zadeh<>a randomized algorithm for online unit clustering<>waoa<>timothy m. chan<>
21482<>2320_6<>avideh zakhor<>flow control over wireless network and application layer implementation<>infocom<>minghua chen<>
21475<>2321_3<>wen-li wang:dai pan<>architecture-based software reliability modeling<>jss<>mei-hwa chen<>
21471<>2322_3<>alexander g. hauptmann:wei-hao lin:rong yan:jun yang:robert v. baron:sean gilroy:michael d. gordon<>exploring the synergy of humans and machines in extreme video retrieval<>civr<>ming-yu chen<>
21364<>2326_6<>kun-ta chuang:jiun-long huang<>on exploring the power-law relationship in the itemset support distribution<>edbt<>ming-syan chen<>
21370<>2326_12<>jiun-long huang<>on the effect of group mobility to data replication in ad hoc networks<>tmc<>ming-syan chen<>
21371<>2326_13<>bi-ru dai:jen-wei huang:mi-yen yeh<>adaptive clustering for multiple evolving streams<>tkde<>ming-syan chen<>
21376<>2326_18<>wei-ta chen:yi-ling chen<>mining frequent spatial patterns in image databases<>pakdd<>ming-syan chen<>
21335<>2327_0<>ralf p. botchen:rudy hashim:daniel weiskopf:thomas ertl:ian thornton<>visual signatures in video visualization<>tvcg<>min chen<>
21343<>2327_8<>david rodgman<>refraction in volume graphics<>cvgip<>min chen<>
21348<>2327_13<>carlos d. correa:deborah silver<>feature aligned volume manipulation for illustration and visualization<>tvcg<>min chen<>
39974<>2334_11<>nulo<>improved complexity results on solving real-number linear feasibility problems<>mp<>yinyu ye<>
39976<>2334_13<>bo chen:jiawei zhang<>lot-sizing scheduling with batch setup times<>scheduling<>yinyu ye<>
39978<>2334_15<>bruno codenotti:amin saberi:kasturi r. varadarajan<>leontief economies encode nonzero sum two-player games<>soda<>yinyu ye<>
39981<>2334_18<>pratik biswas:tzu-chen lian:ta-chung wang<>semidefinite programming based algorithms for sensor network localization<>tosn<>yinyu ye<>
39982<>2334_19<>mohammad mahdian:jiawei zhang<>approximation algorithms for metric facility location problems<>siamcomp<>yinyu ye<>
39988<>2334_25<>anthony man-cho so<>a semidefinite programming approach to tensegrity theory and realizability of graphs<>soda<>yinyu ye<>
39991<>2334_28<>anthony man-cho so:jiawei zhang<>stochastic combinatorial optimization with controllable risk aversion level<>approx<>yinyu ye<>
21326<>2336_3<>shu-ching chen:chengcui zhang:mei-ling shyu<>exciting event detection using multi-level multimodal descriptors and data classification<>ism<>min chen<>
21329<>2336_6<>mei-ling shyu:shu-ching chen:chengcui zhang:chi-min shu<>probabilistic semantic network-based image retrieval using mmm and relevance feedback<>mta<>min chen<>
21331<>2336_8<>kasturi chatterjee:khalid saleem:na zhao:shu-ching chen:shahid hamid<>modeling methodology for component reuse and system integration for hurricane loss projection application<>iri<>min chen<>
37049<>2340_0<>wei-tek tsai:xiao wei:yinong chen:bingnan xiao<>pi4soa: a policy infrastructure for verification and control of service collaboration<>icebe<>xinyu zhou<>
37048<>2341_0<>nulo<>estimates for the joint spectral radius<>amc<>xinlong zhou<>
17540<>2361_3<>fai dai<>virtual backbone construction in manets using adjustable transmission ranges<>tmc<>jie wu<>
17566<>2361_29<>fei dai<>mobility-sensitive topology control in mobile ad hoc networks<>tpds<>jie wu<>
17567<>2361_30<>wei lou:fei dai<>extended multipoint relays to determine connected dominating sets in manets<>tc<>jie wu<>
17569<>2361_32<>fei dai<>efficient broadcasting in ad hoc wireless networks using directional antennas<>tpds<>jie wu<>
17575<>2361_38<>jinling wang:jiannong cao:jing li<>achieving bounded delay on message delivery in publish/subscribe systems<>icpp<>jie wu<>
17578<>2361_41<>avinash srinivasan:joshua teitelbaum<>drbts: distributed reputation-based beacon trust system<>dasc<>jie wu<>
17580<>2361_43<>mao ye:edward chan:guihai chen<>energy efficient fractional coverage schemes for low cost wireless sensor networks<>icdcsw<>jie wu<>
17589<>2361_52<>imad jawhar<>resource allocation in wireless networks using directional antennas<>percom<>jie wu<>
17602<>2361_65<>xiuqi li<>improve searching by reinforcement learning in unstructured p2ps<>icdcsw<>jie wu<>
17608<>2361_71<>jianying zhang<>"xyz: a scalable, partially centralized lookup service for large-scale peer-to-peer systems."<>icpads<>jie wu<>
17618<>2361_81<>mihaela cardei:fei dai:shuhui yang<>extended dominating set and its applications in ad hoc networks using cooperative communication<>tpds<>jie wu<>
17625<>2361_88<>bing wu<>k-anycast routing schemes for mobile ad hoc networks<>ipps<>jie wu<>
17646<>2361_109<>mihaela cardei<>energy-efficient coverage problems in wireless ad-hoc sensor networks<>comcom<>jie wu<>
17651<>2361_114<>deke guo:honghui chen:xueshan luo<>theory and network applications of dynamic bloom filters<>infocom<>jie wu<>
17672<>2361_135<>feng li<>a probabilistic voting-based filtering scheme in wireless sensor networks<>iwcmc<>jie wu<>
17683<>2361_146<>mihaela cardei:shuhui yang<>topology control in ad hoc wireless networks using cooperative communication<>tmc<>jie wu<>
17686<>2361_149<>mingming lu<>social welfare based routing in ad hoc networks<>icpp<>jie wu<>
17692<>2361_155<>boris roussev<>distributed computing using java: a comparison of two server designs<>jsa<>jie wu<>
25595<>2363_1<>fusheng wang:shaorong liu:yijian bai<>bridging physical and virtual worlds: complex event processing for rfid data streams<>edbt<>peiya liu<>
25596<>2363_2<>shaorong liu:fusheng wang<>integrated rfid data modeling: an approach for querying physical objects in pervasive computing<>cikm<>peiya liu<>
1691<>2381_13<>arunesh mishra:vladimir brik:suman banerjee:william a. arbaugh<>a client-driven approach for channel management in wireless lans<>infocom<>aravind srinivasan<>
1704<>2381_26<>rajiv gandhi:eran halperin:samir khuller:guy kortsarz<>an improved approximation algorithm for vertex cover with hard capacities<>jcss<>aravind srinivasan<>
1731<>2381_53<>rajiv gandhi:samir khuller:nan wang<>approximation algorithms for channel allocation problems in broadcast networks<>networks<>aravind srinivasan<>
1733<>2381_55<>andris ambainis:william i. gasarch:andrey utis<>lower bounds on the deterministic and quantum communication complexities of hamming-distance problems<>isaac<>aravind srinivasan<>
1752<>2382_2<>yanan yu:namas chandra<>scalable time-parallelization of molecular dynamics simulations in nano mechanics<>icpp<>ashok srinivasan<>
1772<>2384_0<>rajiv gandhi:samir khuller:srinivasan parthasarathy 0002<>dependent rounding and its applications to approximation algorithms<>jacm<>aravind srinivasan<>
1778<>2384_6<>v. s. anil kumar:madhav v. marathe:srinivasan parthasarathy 0002:sibylle zust<>provable algorithms for parallel generalized sweep scheduling<>jpdc<>aravind srinivasan<>
1784<>2386_4<>srinivas r. kashyap:supratim deb:k. v. m. naidu:rajeev rastogi<>efficient gossip-based aggregate computation<>pods<>anand srinivasan<>
1788<>2386_8<>james h. anderson<>optimal rate-based scheduling on multiprocessors<>jcss<>anand srinivasan<>
26065<>2387_0<>xinzhi liu<>stability of nontrivial solution of delay differential equations with state-dependent impulses<>amc<>qing wang<>
35420<>2392_2<>mengjie zhang:weijun lou<>gp for object classification: brood size in brood recombination crossover<>ausai<>xiaoying gao<>
35422<>2392_4<>mengjie zhang:minh duc cao:yuejin ma<>neural networks for scientific paper classification<>icicic<>xiaoying gao<>
35424<>2392_6<>mengjie zhang:minh duc cao<>treewrapper: automatic data extraction based on tree representation<>ausai<>xiaoying gao<>
35425<>2392_7<>le phong bao vuong:mengjie zhang<>data extraction from semi-structured web pages by clustering<>webi<>xiaoying gao<>
35430<>2392_12<>mengjie zhang:weijun lou:dongping qian<>investigation of brood size in gp with brood recombination crossover for object recognition<>pricai<>xiaoying gao<>
35431<>2392_13<>daniel crabtree:peter andreae<>query directed web page clustering<>webi<>xiaoying gao<>
35432<>2392_14<>mengjie zhang:minh duc cao:yuejin ma<>modelling citation networks for improving scientific paper classification performance<>pricai<>xiaoying gao<>
35435<>2395_1<>feifei huo<>a wavelet based image watermarking scheme<>icip<>xinbo gao<>
35436<>2395_2<>liangqun li:hongbing ji<>maximum entropy fuzzy clustering with application to real-time target tracking<>sigpro<>xinbo gao<>
35438<>2395_4<>jie li:yang shi<>a video shot boundary detection algorithm based on feature tracking<>rskt<>xinbo gao<>
35447<>2395_13<>jie li:na zhang<>a cartoon video detection method based on active relevance feedback and svm<>isnn<>xinbo gao<>
35453<>2395_19<>jie li:chunna tian<>fcm-based clustering algorithm ensemble for large data sets<>fskd<>xinbo gao<>
12835<>2399_15<>ofri sadowsky:russell h. taylor<>projected tetrahedra revisited: a barycentric formulation applied to digital radiograph reconstruction using higher-order attenuation functions<>tvcg<>jonathan d. cohen<>
16030<>2400_2<>gautam jayaprakash:joseph giordano<>component integrity check and recovery against malicious codes<>aina<>joon s. park<>
12840<>2403_0<>ming yi:jay d. horton:helen h. hobbs:robert m. stephens<>wholepathwayscope: a comprehensive pathway-based analysis tool for high-throughput data<>bmcbi<>jonathan c. cohen<>
12839<>2405_1<>emmanuel jeannot:nicolas padoy:frederic wagner<>messages scheduling for parallel data redistribution between clusters<>tpds<>johanne cohen<>
14315<>2407_5<>seungwon shin:hari balakrishnan<>malware prevalence in the kazaa file-sharing network<>imc<>jaeyeon jung<>
39685<>2411_2<>lin liang:fang wen:xiaoou tang<>an integrated model for accurate shape alignment<>eccv<>ying-qing xu<>
39691<>2411_8<>daniel cohen-or:olga sorkine:ran gal:tommer leyvand<>color harmonization<>tog<>ying-qing xu<>
39694<>2411_11<>fang wen:qing luan:lin liang:heung-yeung shum<>color sketch generation<>npar<>ying-qing xu<>
39719<>2415_12<>yu xue:fengfeng zhou:chuanhai fu:xuebiao yao<>sumosp: a web server for sumoylation site prediction<>nar<>ying xu<>
31839<>2416_0<>xue-mei ning:hong-wei liu:xiang-sun zhang<>prediction of protein complexes based on protein interaction data and functional annotation data using kernel methods<>icic<>shi-hua zhang<>
31836<>2418_0<>scott oloff:nagamani sukumar:curt m. breneman:alexander tropsha<>chemometric analysis of ligand receptor complementarity: identifying complementary ligands based on receptor information (colibri)<>jcisd<>shuxing zhang<>
35291<>2423_0<>suchendra m. bhandarkar<>a boosted adaptive particle filter for face detection and tracking<>icip<>wenlong zheng<>
27377<>2425_1<>maria axenovich<>a note on short cycles in a hypercube<>dm<>ryan martin<>
27379<>2426_0<>petra berenbrink:tom friedetzky:leslie ann goldberg:paul w. goldberg:zengjian hu<>distributed selfish load balancing<>soda<>russell a. martin<>
27332<>2427_10<>yu-kun lai:qian-yi zhou:shi-min hu<>feature sensitive mesh segmentation<>sma<>ralph r. martin<>
27339<>2427_17<>shenglan liu:frank c. langbein:paul l. rosin<>segmenting reliefs on triangle meshes<>sma<>ralph r. martin<>
27343<>2427_21<>han-bing yan:shi-min hu<>skeleton-based shape deformation using simplex transformations<>cgi<>ralph martin<>
27371<>2427_49<>j. a. quinn:frank c. langbein:gershon elber<>density-controlled sampling of parametric surfaces using adaptive space-filling curves<>gmp<>ralph r. martin<>
27375<>2427_53<>ming li:frank c. langbein<>constructing regularity feature trees for solid models<>gmp<>ralph r. martin<>
37683<>2431_1<>haipeng wang:ruixiang sun:simin he:rong zeng:wen gao<>an svm scorer for more sensitive and reliable peptide identification via tandem mass spectrometry<>psb<>yan fu<>
37647<>2434_0<>n. zheng<>m-face: an appearance-based photorealistic model for multiple facial attributes rendering<>tcsv<>y. fu<>
37648<>2434_1<>thomas s. huang<>graph embedded analysis for head pose estimation<>fgr<>yun fu<>
37650<>2434_3<>zhihong zeng:glenn i. roisman:zhen wen:yuxiao hu:thomas s. huang<>one-class classification for spontaneous facial expression analysis<>fgr<>yun fu<>
39728<>2438_0<>nulo<>a gradient-based elm algorithm in regressing multi-variable functions<>isnn<>you xu<>
21487<>2439_2<>timothy sohn:alex varshavsky:anthony lamarca:tanzeem choudhury:ian smith:sunny consolvo:jeffrey hightower:william g. griswold:eyal de lara<>mobility detection using everyday gsm traces<>huc<>mike y. chen<>
21488<>2439_3<>anthony j. nicholson:yatin chawathe:brian d. noble:david wetherall<>improved access point selection<>mobisys<>mike y. chen<>
21490<>2439_5<>kayur patel:ian smith:james a. landay<>personalizing routes<>uist<>mike y. chen<>
21491<>2439_6<>timothy sohn:dmitri chmelev:dirk hahnel:jeffrey hightower:jeff hughes:anthony lamarca:fred potter:ian e. smith:alex varshavsky<>practical metropolitan-scale positioning for gsm phones<>huc<>mike y. chen<>
21496<>2445_2<>jakka sairamesh<>a knowledge model-driven recommender system for business transformation<>IEEEscc<>mao chen<>
21497<>2445_3<>anca-andreea ivan:jakka sairamesh<>"deep visibility in enterprise value networks: knowledge models, real-time monitoring and e-commerce."<>wecwis<>mao chen<>
3725<>2446_1<>krzysztof czarnecki:michal antkiewicz<>multi-level customization in application engineering<>cacm<>chang hwan peter kim<>
3737<>2448_2<>karthikeyan sankaralingam:ramadass nagarajan:robert g. mcdonald:rajagopalan desikan:saurabh drolia:m. s. govindan:paul gratz:divya gulati:heather hanson:haiming liu:nitya ranganathan:simha sethumadhavan:sadia sharif:premkishore shivakumar:stephen w. keckler:doug burger<>distributed microarchitectural protocols in the trips prototype processor<>micro<>changkyu kim<>
31657<>2453_0<>ian h. witten<>towards a digital library for language learning<>ercimdl<>shaoqun wu<>
39579<>2465_1<>alfred kobsa:andre van der hoek:jeffery white<>pla-based runtime dynamism in support of privacy-enhanced web personalization<>splc<>yang wang<>
39570<>2468_0<>kunmi otitoju:tong liu:sijung kim:doug a. bowman<>evaluating the effects of real world distraction on user performance in virtual environments<>vrst<>yi wang<>
21508<>2473_0<>weifan wang<>the 2-dipath chromatic number of halin graphs<>ipl<>min chen<>
39563<>2474_0<>qian-ping gu<>efficient algorithms for minimum congestion hypergraph embedding in a cycle<>tpds<>yong wang<>
39565<>2474_2<>qian-ping gu<>efficient algorithms for traffic grooming in sonet/wdm networks<>icpp<>yong wang<>
39543<>2477_0<>nulo<>g-networks and the modeling of adversarial agents<>icann<>yu wang<>
2914<>2481_0<>xue-quan li:hui li<>computing efficient solutions to fuzzy multiple objective linear programming problems<>fss<>bo zhang<>
39558<>2484_1<>hao jiang:mark s. drew:ze-nian li:greg mori<>unsupervised discovery of action classes<>cvpr<>yang wang<>
39549<>2486_3<>samuel t. king:peter m. chen:chad verbowski:helen j. wang:jacob r. lorch<>subvirt: implementing malware with virtual machines<>sp<>yi-min wang<>
10562<>2494_2<>ling li<>large-margin thresholded ensembles for ordinal regression: theory and practice<>alt<>hsuan-tien lin<>
10567<>2497_0<>leann myers<>power and type i error rates of goodness-of-fit statistics for binomial generalized estimating equations (gee) models<>csda<>hui-yi lin<>
10565<>2500_2<>wang-rong chang<>cornet: a scalable and bandwidth-efficient optical burst switching ring architecture for metro area networks<>icns<>hui-tang lin<>
10566<>2500_3<>rung-shiang cheng<>tcp selective negative acknowledgment over ieee 802.11 wireless networks<>icns<>hui-tang lin<>
12841<>2502_0<>john darlington:william lee<>an architecture for a next-generation internet based on web services and utility computing<>wetice<>jeremy cohen<>
12510<>2505_1<>samuel a. danziger:sanjay joshua swamidass:jue zeng:lawrence r. dearth:qiang lu:jianlin cheng:vinh p. hoang:hiroto saigo:ray luo:pierre baldi:rainer k. brachmann:richard h. lathrop<>functional census of mutation sequence spaces: the example of p53 cancer rescue mutants<>tcbb<>jonathan h. chen<>
12513<>2509_1<>xiaofeng meng:yanyan guo:stephane grumbach:hui sun<>modeling and predicting future trajectories of moving objects in a constrained network<>mdm<>jidong chen<>
12514<>2509_2<>xiaofeng meng:benzhao li:caifeng lai<>tracking network-constrained moving objects with group updates<>waim<>jidong chen<>
39522<>2510_0<>yo-sub han:derick wood<>infix-free regular expressions and languages<>ijfcs<>yajun wang<>
39512<>2514_1<>fei hu:hongyi wu<>mobile telemedicine sensor networks with low-energy data query and network lifetime considerations<>tmc<>yu wang<>
39513<>2514_2<>hongyi wu<>replication-based efficient data delivery scheme (red) for delay/fault-tolerant mobile sensor network (dft-msn)<>percom<>yu wang<>
39514<>2514_3<>hongyi wu<>dft-msn: the delay/fault-tolerant mobile sensor network for pervasive information gathering<>infocom<>yu wang<>
39516<>2514_5<>feng lin:hongyi wu<>testbed implementation of delay/fault-tolerant mobile sensor network (dft-msn)<>percom<>yu wang<>
39499<>2515_1<>j. b. yang:d. l. xu:k. s. chin<>the evidential reasoning approach for mada under both probabilistic and fuzzy uncertainties<>eor<>y. m. wang<>
39500<>2515_2<>jian-bo yang:dong-ling xu:kwai-sang chin<>the evidential reasoning approach for multiple attribute decision analysis using interval belief degrees<>eor<>ying-ming wang<>
39503<>2515_5<>taha m. s. elhag<>on the normalization of interval and fuzzy weights<>fss<>ying-ming wang<>
39504<>2515_6<>jian-bo yang:dong-ling xu<>environmental impact assessment using the evidential reasoning approach<>eor<>ying-ming wang<>
39505<>2515_7<>dong-ling xu:jian-bo yang<>the evidential reasoning approach for multi-attribute decision analysis under interval uncertainty<>eor<>ying-ming wang<>
39507<>2515_9<>taha m. s. elhag:zhongsheng hua<>a modified fuzzy logarithmic least squares method for fuzzy analytic hierarchy process<>fss<>ying-ming wang<>
39509<>2515_11<>taha m. s. elhag<>an approach to avoiding rank reversal in ahp<>dss<>ying-ming wang<>
39510<>2515_12<>celik parkan<>a general multiple attribute decision-making approach for integrating subjective preferences and objective information<>fss<>ying-ming wang<>
39537<>2518_0<>jerome p. lynch:kincho h. law<>"wireless sensing, actuation and control - with applications to civil structures."<>egice<>yang wang<>
39534<>2519_1<>margaret martonosi:li-shiuan peh<>situation-aware caching strategies in highly varying mobile networks<>mascots<>yong wang<>
39531<>2520_3<>jie yang:yuchou chang<>color-texture image segmentation by integrating directional operators into jseg method<>prl<>yonggang wang<>
5349<>2521_0<>shichao zhang:feng chen:xindong wu<>identifying bridging rules between conceptual clusters<>kdd<>chengqi zhang<>
12428<>2522_28<>iyad a. kanj:ge xia<>improved parameterized upper bounds for vertex cover<>mfcs<>jianer chen<>
12466<>2522_66<>iyad a. kanj:jie meng:ge xia:fenghui zhang<>on the effective enumerability of np problems<>iwpec<>jianer chen<>
12468<>2522_68<>ergun akleman<>regular mesh construction algorithms using regular handles<>smi<>jianer chen<>
12470<>2522_70<>xiuzhen huang:iyad a. kanj:ge xia<>strong computational lower bounds via parameterized complexity<>jcss<>jianer chen<>
12477<>2522_77<>fenghui zhang<>on product covering in 3-tier supply chain models: natural complete problems for [3] and [4]<>tcs<>jianer chen<>
12482<>2522_82<>xiuzhen huang:iyad a. kanj:ge xia<>on the computational hardness based on linear fpt-reductions<>jco<>jianer chen<>
12485<>2522_85<>yang liu 0002:songjian lu:sing-hoi sze<>greedy localization and color-coding: improved matching and packing algorithms<>iwpec<>jianer chen<>
12391<>2525_0<>shiguang shan:shengye yan:xilin chen:wen gao<>modification of the adaboost-based detector for partially occluded faces<>icpr<>jie chen<>
12395<>2525_4<>ruiping wang:shiguang shan:xilin chen:wen gao<>isomap based on the image euclidean distance<>icpr<>jie chen<>
12398<>2525_7<>ruiping wang:shiguang shan:wen gao<>enhancing training set for face detection<>icpr<>jie chen<>
30202<>2526_0<>kai-wei fan:prasun sinha<>on the potential of structure-free data aggregation in sensor networks<>infocom<>sha liu<>
30203<>2526_1<>kai-wei fan:prasun sinha<>scalable data aggregation for dynamic events in sensor networks<>sensys<>sha liu<>
39487<>2529_0<>zhifeng wang:wei zheng:james ford:fillia makedon:justin d. pearlman<>neighboring feature clustering<>setn<>yuhang wang<>
39488<>2529_1<>margaret h. dunham:donya quick:monnie mcgee:jim waddle<>visualization of dna/rna structure using temporal cgrs<>bibe<>yuhang wang<>
39485<>2530_0<>achim g. hoffmann<>bootstrapping word sense disambiguation using dynamic web knowledge<>pricai<>yuanyong wang<>
30191<>2531_0<>tamer basar:r. srikant<>tcp-illinois: a loss and delay-based congestion control algorithm for high-speed networks<>valuetools<>shao liu<>
39431<>2537_14<>yvo desmedt:mike burmester<>revisiting colored networks and privacy preserving censorship<>critis<>yongge wang<>
39434<>2537_17<>zhu zhao:zhongqi dong<>security analysis of a password-based authentication protocol proposed to ieee 1363<>tcs<>yongge wang<>
39404<>2539_1<>xianfeng gu:tony f. chan:paul m. thompson:shing-tung yau<>brain surface conformal parameterization with algebraic functions<>miccai<>yalin wang<>
5333<>2540_1<>sudarshan vasudevan:dennis goeckel:donald f. towsley<>optimal power allocation in wireless networks with transmitter-receiver power tradeoffs<>infocom<>chun zhang<>
39455<>2541_7<>sen wang:miao jin:xianfeng gu:dimitris samaras<>3d surface matching and recognition using conformal geometry<>cvpr<>yang wang<>
39461<>2545_0<>pankaj k. agarwal:herbert edelsbrunner:john harer<>extreme elevation on a 2-manifold<>dcg<>yusu wang<>
39463<>2545_2<>leonidas j. guibas<>towards unsupervised segmentation of semi-rigid low-resolution molecular surfaces<>gmp<>yusu wang<>
39464<>2545_3<>pankaj k. agarwal:hai yu<>a two-dimensional kinetic triangulation with near-quadratic topological changes<>dcg<>yusu wang<>
39466<>2545_5<>vijay natarajan:peer-timo bremer:valerio pascucci:bernd hamann<>segmenting molecular surfaces<>cagd<>yusu wang<>
5343<>2546_1<>ted herman<>localization in wireless sensor grids<>cata<>chen zhang<>
5337<>2550_0<>jian wang:shi han:mo yi:zhengyou zhang<>automatic real-time barcode localization in complex scenes<>icip<>chunhui zhang<>
39478<>2551_2<>alex acero:milind mahajan:john lee<>combining statistical and knowledge-based spoken language understanding in conditional models<>acl<>ye-yi wang<>
16676<>2555_0<>sanghyun yoo:chang-sup park:dong-hoon choi:yoon-joon lee<>the design of a grid-enabled information integration system based on mediator/wrapper architectures<>gca<>jihwan song<>
21081<>2558_10<>yan li:ying pan:bing xie:jiasu sun<>ranking component retrieval results by leveraging user history information<>seke<>lu zhang<>
21082<>2558_11<>yanzhen zou:liang-jie zhang:bing xie:hong mei<>user feedback-based refinement for web services retrieval using multiple instance learning<>icws<>lu zhang<>
21088<>2558_17<>hao zhong:hong mei<>an experimental comparison of four test suite reduction techniques<>icse<>lu zhang<>
21056<>2562_0<>haizhou ai:shihong lao<>robust face alignment based on hierarchical classifier network<>eccv<>li zhang<>
21060<>2563_2<>chew lim tan:zheng zhang 0003:tao xia<>restoring warped document images through 3d shape modeling<>pami<>li zhang<>
21019<>2566_3<>qin li:david zhang:prabir bhattacharya<>a new approach to automated retinal vessel segmentation using multiscale analysis<>icpr<>lei zhang<>
21026<>2566_10<>xiaolin wu<>improvement of color video demosaicking in temporal domain<>tip<>lei zhang<>
21027<>2566_11<>xiaolin wu<>an edge-guided image interpolation algorithm via directional filtering and data fusion<>tip<>lei zhang<>
21030<>2566_14<>xiaolin wu<>on the application of cross correlation function to subsample discrete time delay estimation<>dsp<>lei zhang<>
21032<>2567_1<>christian glaser:aduri pavan:alan l. selman<>redundancy in complete sets<>stacs<>liyu zhang<>
21033<>2567_2<>christian glaser:alan l. selman<>survey of disjoint np-pairs and relations to propositional proof systems<>birthday<>liyu zhang<>
21036<>2567_5<>christian glaser:aduri pavan:alan l. selman<>mitosis in computational complexity<>tamc<>liyu zhang<>
21039<>2568_0<>ilya mironov<>applications of sat solvers to cryptanalysis of hash functions<>sat<>lintao zhang<>
21041<>2568_2<>lucas bordeaux:youssef hamadi<>propositional satisfiability and constraint programming: a comparative survey<>csur<>lintao zhang<>
26738<>2571_0<>haibo chen:fengzhe zhang:binyu zang:pen-chung yew<>live updating operating systems using virtualization<>vee<>rong chen<>
26726<>2574_1<>yong zhang:shaojuan li:geir skogerbo:zhihua zhang:xiaopeng zhu:zefeng zhang:shiwei sun:hongchao lu:baochen shi<>phylophenetic properties of metabolic pathway topologies as revealed by global analysis<>bmcbi<>runsheng chen<>
33327<>2578_0<>yonggang xue:tom duchamp<>jet subdivision schemes on the -regular complex<>cagd<>thomas p.-y. yu<>
33329<>2579_1<>ying wu<>a field model for human detection and tracking<>pami<>ting yu<>
33335<>2580_0<>keith irwin:william h. winsborough<>on the modeling and analysis of obligations<>ccs<>ting yu<>
33338<>2580_3<>sudipto guha:h. v. jagadish:nick koudas:divesh srivastava<>integrating xml data sources using approximate joins<>tods<>ting yu<>
33348<>2580_13<>evan martin:tao xie<>defining and measuring policy coverage in testing access control policies<>icics<>ting yu<>
33358<>2581_5<>kwei-jay lin<>qcws: an implementation of qos-capable multimedia web services<>mta<>tao yu<>
33360<>2581_7<>yue zhang:kwei-jay lin<>modeling and measuring privacy risks in qos web services<>wecwis<>tao yu<>
26960<>2588_2<>ben carterette:wiley greiner:cory barr<>n semantic classes are harder than two<>acl<>rosie jones<>
26962<>2588_4<>bing liu:kristina lisa klinkner<>measuring the meaning in time series clustering of text search queries<>cikm<>rosie jones<>
26965<>2588_7<>jaime teevan:eytan adar:michael a. s. potts<>history repeats itself: repeat queries in yahoo's logs<>sigir<>rosie jones<>
26966<>2588_8<>benjamin rey:omid madani:wiley greiner<>generating query substitutions<>www<>rosie jones<>
26973<>2590_6<>nulo<>"five perspectives on modern memory management: systems, hardware and theory."<>scp<>richard jones<>
18481<>2598_0<>steven c. h. hoi:rong jin:michael r. lyu<>batch mode active learning and its application to medical image classification<>icml<>jianke zhu<>
18484<>2598_3<>steven c. h. hoi:michael r. lyu<>real-time non-rigid shape recovery via active appearance models for augmented reality<>eccv<>jianke zhu<>
21101<>2605_0<>nulo<>soa and web services<>IEEEscc<>liang-jie zhang<>
21108<>2609_0<>yan zhang:jun zheng:yifan chen:maode ma<>modeling location management in wireless networks with generally distributed parameters<>comcom<>lili zhang<>
21106<>2610_0<>ulrich kleine:yingtao jiang<>an automated design tool for analog layouts<>tvlsi<>lihong zhang<>
21107<>2610_1<>rabin raut:yingtao jiang:ulrich kleine<>placement algorithm in analog-layout designs<>tcad<>lihong zhang<>
20326<>2614_1<>cha zhang:yong rui<>light weight background blurring for video conferencing applications<>icip<>li-wei he<>
1855<>2618_4<>jeong han kim:jacques verstraete<>regular subgraphs of random graphs<>rsa<>bala bollobas<>
37915<>2623_0<>weibo gong:dev gupta<>mcmsda: a multi-channel multi-sector directional antenna wireless lan<>wowmom<>yong huang<>
37891<>2629_1<>xiangji huang:miao wen:aijun an:yang liu:josiah poon<>applying data mining to pseudo-relevance feedback for high performance text retrieval<>icdm<>yan rui huang<>
37894<>2629_4<>xiangji huang:miao wen:aijun an<>a platform for okapi-based contextual information retrieval<>sigir<>yan rui huang<>
37900<>2631_0<>m. jeng:x. xie:d.-h. chung<>siphon-based deadlock prevention policy for flexible manufacturing systems<>tsmc<>y.-s. huang<>
19178<>2635_1<>louis yu:weibin liao<>a study of chinese web characteristics and their implications on web search<>imsccs<>kin fun li<>
19180<>2635_3<>louis l. yu:eric g. manning<>the adaptability of english based web search algorithms to chinese search engines<>apweb<>kin f. li<>
19149<>2636_2<>chun-chieh yang:ssu-hsuan lu:hsiao-hsi wang<>on design and implementation of adaptive data classification scheme for dsm systems<>ispa<>kuan-ching li<>
19153<>2636_6<>hsiao-hsi wang:kuo-jen wang:ssu-hsuan lu<>on the design and implementation of an effective prefetch strategy for dsm systems<>tjs<>kuan-ching li<>
19163<>2636_16<>jason c. hung:wonjun lee:timothy k. shih<>evolution of ubi-autonomous entities<>uic<>kuan-ching li<>
19167<>2636_20<>ssu-hsuan lu:chien-lung chou:kuang-jui wang:hsiao-hsi wang<>design issues of prefetching strategies for heterogeneous software dsm<>ccgrid<>kuan-ching li<>
19172<>2636_25<>ching-hsien hsu:ming-hao chen:chao-tung yang<>optimizing communications of dynamic data redistribution on symmetrical matrices in parallelizing compilers<>tpds<>kuan-ching li<>
19194<>2638_9<>nulo<>optimal period of workload redistribution for dynamic bulk synchronous computations in heterogeneous computing systems<>tjs<>keqin li<>
19198<>2638_13<>nulo<>an average-case analysis of online non-clairvoyant scheduling of independent parallel tasks<>jpdc<>keqin li<>
19199<>2638_14<>nulo<>average-case performance analysis of scheduling random parallel tasks with precedence constraints on mesh connected multicomputer systems<>jpdc<>keqin li<>
12024<>2639_0<>francisco s. domingues:ingolf sommer:thomas lengauer<>noxclass: prediction of protein-protein interaction types<>bmcbi<>hongbo zhu<>
19214<>2647_2<>xiaodong wu:danny z. chen:milan sonka<>optimal surface segmentation in volumetric images-a graph-theoretic approach<>pami<>kang li<>
8145<>2650_0<>you-yu lin<>integrating multi-agent negotiation to resolve constraints in fulfilling supply chain orders<>ecra<>fu-ren lin<>
8144<>2651_0<>erik s. sorensen:catherine kallin:a. john berlinsky<>applications of cluster perturbation theory using quantum monte carlo data<>hpcs<>fei lin<>
11647<>2664_0<>joxan jaffar:jingling xue<>instruction scheduling with release times and deadlines on ilp processors<>rtcsa<>hui wu<>
11648<>2664_1<>sridevan parameswaran<>minimising the energy consumption of real-time tasks with precedence constraints on a single processor<>euc<>hui wu<>
11796<>2665_0<>alain girault<>a flexible method to tolerate value sensor failures<>etfa<>huafeng yu<>
11795<>2667_0<>xiaoyun wang:aaram yun:sangwoo park<>cryptanalysis of the full haval with 4 and 5 passes<>fse<>hongbo yu<>
11794<>2668_0<>daan p. geerke:haiyan liu:wilfred f. van gunsteren<>molecular dynamics simulations of liquid methanol and methanol-water mixtures with polarizable models<>jcc<>haibo yu<>
11651<>2669_0<>hong-jian lai:yehong shao:ju zhou<>"every 3-connected, essentially 11-connected line graph is hamiltonian."<>jct<>hehui wu<>
11798<>2673_0<>alberto paccanaro:valery trifonov:mark gerstein<>predicting interactions in protein networks by completing defective cliques<>bioinformatics<>haiyuan yu<>
9355<>2674_0<>michael kifer:vinay k. chaudhri<>efficiently ordering subgoals with access constraints<>pods<>guizhen yang<>
9369<>2674_14<>nulo<>computational aspects of mining maximal frequent patterns<>tcs<>guizhen yang<>
9371<>2674_16<>michael kifer<>inheritance in rule-based frame systems: semantics and inference<>jods<>guizhen yang<>
9374<>2674_19<>jose luis ambite:vinay k. chaudhri:richard fikes:jessica jenkins:sunil mishra:maria muslea:tomas e. uribe<>design and implementation of the calo query manager<>aaai<>guizhen yang<>
9385<>2675_9<>benny p. l. lo:fani deligianni<>source recovery for body sensor network<>bsn<>guang-zhong yang<>
9386<>2675_10<>karim lekadir:daniel s. elson:jose requejo-isidro:christopher dunsby:james mcginty:neil galletly:gordon stamp:paul m. w. french<>tissue characterization using dimensionality reduction and fluorescence imaging<>miccai<>guang-zhong yang<>
9387<>2675_11<>mirna lerotic<>the use of super resolution in robotic assisted minimally invasive surgery<>miccai<>guang-zhong yang<>
9389<>2675_13<>karim lekadir<>carotid artery segmentation using an outlier immune 3d active shape models framework<>miccai<>guang-zhong yang<>
9390<>2675_14<>adrian james chung:fani deligianni:pallav shah:athol wells<>patient-specific bronchoscopy visualization through brdf estimation and disocclusion correction<>tmi<>guang-zhong yang<>
9391<>2675_15<>longfei cong:su-lin lee:andrew huntbatch:tianzi jiang<>an embedding framework for myocardial velocity processing with mri<>miar<>guang-zhong yang<>
9395<>2675_19<>julian j. h. leong:marios nicolaou:louis atallah:george p. mylonas:ara darzi<>hmm assessment of quality of movement trajectory in laparoscopic surgery<>miccai<>guang-zhong yang<>
9397<>2675_21<>qian wu:adrian james chung<>optimal sensor placement for predictive cardiac motion modeling<>miccai<>guang-zhong yang<>
9406<>2677_0<>ling-jyh chen:tony sun:m. y. sanadidi:mario gerla<>monitoring access link capacity using tfrc probe<>comcom<>guang yang<>
9409<>2677_3<>ling-jyh chen:tony sun:li lao:m. y. sanadidi:mario gerla<>estimating link capacity in high speed networks<>networking<>guang yang<>
11621<>2679_2<>peng li:binoy ravindran:e. douglas jensen<>a utility accrual scheduling algorithm for real-time activities with mutual exclusion resource constraints<>tc<>haisang wu<>
11622<>2679_3<>binoy ravindran:e. douglas jensen:peng li<>"energy-efficient, utility accrual scheduling under resource constraints for mobile embedded systems."<>tecs<>haisang wu<>
11624<>2679_5<>hyeonjoong cho:binoy ravindran:e. douglas jensen<>on multiprocessor utility accrual real-time scheduling with statistical timing assurances<>euc<>haisang wu<>
11632<>2680_1<>fei hu:yu wang<>mobile telemedicine sensor networks with low-energy data query and network lifetime considerations<>tmc<>hongyi wu<>
11633<>2680_2<>yu wang<>dft-msn: the delay/fault-tolerant mobile sensor network for pervasive information gathering<>infocom<>hongyi wu<>
11642<>2682_0<>x. yuan:zhang-zhi hu:manabu torii:meenakshi narayanaswamy:k. e. ravikumar:k. vijay-shanker:cathy h. wu<>an online literature mining tool for protein phosphorylation<>bioinformatics<>h. t. wu<>
30973<>2683_5<>frank niedermeyer:karsten steffens<>the -factor problem for graphs and the hereditary property<>aml<>saharon shelah<>
31017<>2683_49<>heike mildenberger:boaz tsaban<>covering the baire space by families which are not finitely dominating<>apal<>saharon shelah<>
31019<>2683_51<>andrzej roslanowski<>how much sweetness is there in the universe?<>mlq<>saharon shelah<>
31022<>2683_54<>mirna dzamonja<>on properties of theories which preclude the existence of universal models<>apal<>saharon shelah<>
31026<>2683_58<>nulo<>more on the revised gch and the black box<>apal<>saharon shelah<>
31044<>2683_76<>jouko a. vaananen<>recursive logic frames<>mlq<>saharon shelah<>
31057<>2683_89<>sakae fuchino:noam greenberg<>models of real-valued measurability<>apal<>saharon shelah<>
23871<>2684_14<>sieuwert van otterloo:wiebe van der hoek<>knowledge condition games<>jolli<>michael wooldridge<>
23873<>2684_16<>s. shaheen fatima:nicholas r. jennings<>multi-issue negotiation with deadlines<>jair<>michael wooldridge<>
23884<>2684_27<>paul e. dunne:simon parsons<>on the complexity of linking deductive and abstract argument systems<>aaai<>michael wooldridge<>
23892<>2684_35<>rafael h. bordini:michael fisher:willem visser<>verifying multi-agent programs by model checking<>aamas<>michael wooldridge<>
23897<>2684_40<>dirk walther:carsten lutz:frank wolter<>atl satisfiability is indeed exptime-complete<>logcom<>michael wooldridge<>
23929<>2684_72<>paul e. dunne<>on the computational complexity of coalitional resource games<>ai<>michael wooldridge<>
23933<>2684_76<>thomas agotnes:wiebe van der hoek<>temporal qualitative coalitional games<>atal<>michael wooldridge<>
23942<>2684_85<>luigi sauro:jelle gerbrandy:wiebe van der hoek<>reasoning about action and cooperation<>atal<>michael wooldridge<>
23952<>2684_95<>paolo ballarini:michael fisher<>automated game analysis via probabilistic model checking: a case study<>entcs<>michael wooldridge<>
23954<>2684_97<>jomi fred hubner:rafael h. bordini<>programming declarative goals using plan patterns<>dalt<>michael wooldridge<>
23961<>2684_104<>wiebe van der hoek:alessio lomuscio<>on the complexity of practical atl model checking<>atal<>michael wooldridge<>
23962<>2684_105<>thomas agotnes:wiebe van der hoek<>on the logic of coalitional games<>atal<>michael wooldridge<>
23801<>2687_0<>kenji sagae:teruko mitamura<>"a fast, accurate deterministic parser for chinese."<>acl<>mengqiu wang<>
36838<>2690_0<>ravi s. sandhu:francesco parisi-presicce<>safety analysis of usage control authorization models<>ccs<>xinwen zhang<>
36840<>2690_2<>masayuki nakae:michael j. covington:ravi s. sandhu<>a usage-based authorization framework for collaborative computing systems<>sacmat<>xinwen zhang<>
36833<>2691_2<>chaolin zhang:xuesong lu<>significance of gene ranking for classification of microarray samples<>tcbb<>xuegong zhang<>
36835<>2691_4<>fang fang:shicai fan:michael q. zhang<>predicting methylation status of cpg islands in the human brain<>bioinformatics<>xuegong zhang<>
36830<>2692_1<>tamer kahveci<>a new approach for alignment of multiple proteins<>psb<>xu zhang<>
36816<>2696_1<>ian t. foster:timothy freeman:katarzyna keahey:d. scheftner:b. sotomayer<>virtual clusters for grid communities<>ccgrid<>xuehai zhang<>
36804<>2697_10<>feng chen:song jiang<>smartsaver: turning flash drive into a disk energy saver for mobile computers<>islped<>xiaodong zhang<>
36811<>2697_17<>shansi ren:lei guo<>asap: an as-aware peer-relay protocol for high quality voip<>icdcs<>xiaodong zhang<>
36812<>2697_18<>lei guo:enhua tan:songqing chen:zhen xiao:oliver spatscheck<>delving into internet streaming media delivery: a quality and resource utilization perspective<>imc<>xiaodong zhang<>
1811<>2705_0<>william bishop<>adaptive perceptual degradation based on video usage<>ism<>alexander wong<>
1812<>2705_1<>william bishop<>practical content-adaptive subsampling for image and video compression<>ism<>alexander wong<>
1813<>2705_2<>william bishop:jeff orchard<>efficient multi-modal least-squares alignment of medical images using quasi-orientation maps<>ipcv<>alexander wong<>
1814<>2705_3<>jeff orchard<>efficient and robust non-rigid least-squares rectification of medical images<>ipcv<>alexander wong<>
1815<>2705_4<>william bishop<>expert knowledge based automatic regions-of-interest (roi) selection in scanned documents for digital image encryption<>crv<>alexander wong<>
1816<>2706_0<>nandan paramesh:pradeep kumar ray<>towards an ontology-driven approach for the interoperability problem in security compliance<>flairs<>alfred ka yiu wong<>
1817<>2706_1<>nandan paramesh:pradeep ray<>towards an ontology mapping approach for security management<>ijait<>alfred ka yiu wong<>
3055<>2709_32<>nulo<>citespace ii: detecting and visualizing emerging trends and transient patterns in scientific literature<>jasis<>chaomei chen<>
13092<>2718_2<>sheng yang:kang zhang<>a model transformation approach for design pattern evolutions<>ecbs<>jing dong<>
13107<>2718_17<>paulo s. c. alencar:donald d. cowan<>automating the analysis of design component contracts<>spe<>jing dong<>
13111<>2718_21<>sheng yang:dushyant s. lad:yongtao sun<>service oriented evolutions and analyses of design patterns<>sose<>jing dong<>
13113<>2718_23<>sheng yang:yongtao sun:w. eric wong<>qvt based model transformation for design pattern evolutions<>imsa<>jing dong<>
3076<>2719_0<>rui shi:hongwei xi<>implementing typeful program transformations<>fuin<>chiyan chen<>
3082<>2719_6<>rui shi:hongwei xi<>distributed meta-programming<>gpce<>chiyan chen<>
13079<>2721_16<>dorel lucanu:yuan-fang li<>semantic web languages - towards an institutional perspective<>birthday<>jin song dong<>
36855<>2723_0<>ling-yun wu:ju-liang zhang<>capacitated facility location problem with general setup cost<>cor<>xiang-sun zhang<>
3090<>2724_3<>xin feng:jack szeto<>identification of critical genes in microarray experiments by a neuro-fuzzy approach<>candc<>chin-fu chen<>
3085<>2726_0<>p. p. vaidyanathan<>precoded v-blast for isi mimo channels<>iscas<>chun-yang chen<>
36858<>2727_0<>maxwell l. king:rob j. hyndman<>a bayesian approach to bandwidth selection for multivariate kernel density estimation<>csda<>xibin zhang<>
36859<>2727_1<>jun yu:zhenlin yang<>a class of nonlinear stochastic volatility models and its implications for pricing currency options<>csda<>xibin zhang<>
36843<>2729_0<>wei wang:xiaohong guan:liwei yang<>profiling program behavior for anomaly intrusion detection based on the transition and frequency property of computer audit data<>compsec<>xiangliang zhang<>
36844<>2730_0<>rory a. lewis:zbigniew w. ras<>blind signal separation of similar pitches and instruments in a noisy polyphonic domain<>ismis<>xin zhang<>
36849<>2731_0<>shi-hua zhang:xue-mei ning:hong-wei liu<>prediction of protein complexes based on protein interaction data and functional annotation data using kernel methods<>icic<>xiang-sun zhang<>
8910<>2734_26<>mario j. perez-jimenez:grzegorz rozenberg<>spike trains in spiking neural p systems<>ijfcs<>gheorghe paun<>
8977<>2734_93<>mihai ionescu:takashi yokomori<>spiking neural p systems<>fuin<>gheorghe paun<>
2789<>2735_0<>yueqi zhong<>a physically based method for triangulated surface flattening<>cad<>bugao xu<>
2778<>2738_4<>nulo<>two classes of edge domination in graphs<>dam<>baogen xu<>
2769<>2739_4<>nulo<>on 3-colorable plane graphs without 5- and 7-cycles<>jct<>baogang xu<>
7203<>2747_17<>therese c. biedl:torsten thiele<>three-dimensional orthogonal graph drawing with optimal volume<>algorithmica<>david r. wood<>
7204<>2747_18<>prosenjit bose:jurek czyzowicz:zhicheng gao:pat morin<>simultaneous diagonal flips in plane triangulations<>soda<>david r. wood<>
7211<>2747_25<>jan arne telle<>planar decompositions and the crossing number of graphs with an excluded minor<>gd<>david r. wood<>
7220<>2747_34<>vida dujmovic<>upward three-dimensional grid drawings of graphs<>order<>david r. wood<>
7221<>2747_35<>nulo<>vertex partitions of chordal graphs<>jgt<>david r. wood<>
7223<>2747_37<>prosenjit bose:ferran hurtado:eduardo rivera-campo<>partitions of complete geometric graphs into plane trees<>comgeo<>david r. wood<>
7156<>2750_3<>michelle j. moravan:jayaram bobba:kevin e. moore:luke yen:mark d. hill:ben liblit:michael m. swift<>supporting nested transactional memory in logtm<>asplos<>david a. wood<>
7159<>2750_6<>alaa r. alameldeen<>ipc considered harmful for multiprocessor workloads<>micro<>david a. wood<>
36871<>2756_1<>nulo<>partial parallel factorization in soft-decision reed-solomon decoding<>glvlsi<>xinmiao zhang<>
26097<>2758_0<>sayan mukherjee<>estimation of gradients and coordinate covariation in classification<>jmlr<>qiang wu<>
39748<>2766_5<>nulo<>a family of sobolev orthogonal polynomials on the unit ball<>jat<>yuan xu<>
39754<>2768_1<>zhongying chen:bin wu<>multilevel augmentation methods for differential equations<>adcm<>yuesheng xu<>
39757<>2768_4<>charles a. micchelli:haizhang zhang<>universal kernels<>jmlr<>yuesheng xu<>
39758<>2768_5<>qiuhui chen:norden huang:sherman riemenschneider<>a b-spline approach for empirical mode decompositions<>adcm<>yuesheng xu<>
39760<>2768_7<>reinhold schneider:aihui zhou<>an analysis of discontinuous galerkin methods for elliptic problems<>adcm<>yuesheng xu<>
10524<>2770_1<>yue zhuo:saraju p. mohanty<>a congestion driven placement algorithm for fpga synthesis<>fpl<>hao li<>
10525<>2772_0<>xinyu xu:baoxin li:jose f. florez<>simulation of diabetic retinopathy neovascularization in color digital fundus images<>isvc<>helen k. li<>
31109<>2773_3<>charles lee isbell jr.:michael j. kearns:christian r. shelton:peter stone:david p. kormann<>cobot in lambdamoo: an adaptive social statistics agent<>aamas<>satinder p. singh<>
31115<>2773_9<>britton wolfe<>predictive state representations with options<>icml<>satinder p. singh<>
31132<>2773_26<>david wingate<>kernel predictive linear gaussian models for nonlinear stochastic dynamical systems<>icml<>satinder p. singh<>
31136<>2773_30<>matthew r. rudary<>predictive linear-gaussian models of controlled stochastic dynamical systems<>icml<>satinder p. singh<>
31161<>2773_55<>david wingate<>"mixtures of predictive linear gaussian models for nonlinear, stochastic dynamical systems."<>aaai<>satinder p. singh<>
31202<>2778_1<>reynold cheng:sunil prabhakar:rahul shah:jeffrey scott vitter:yuni xia<>efficient join processing over uncertain data<>cikm<>sarvjeet singh<>
31187<>2780_10<>brennan sellner:laura m. hiatt:reid g. simmons<>attaining situational awareness for sliding autonomy<>hri<>sanjiv singh<>
31188<>2783_0<>anthony discolo:tim harris:simon marlow:simon l. peyton jones<>lock free data structures using stm in haskell<>flops<>satnam singh<>
31210<>2786_0<>yingwei wang:kathleen a. hill<>mining invariants in biological sequences<>incdm<>shiva singh<>
31207<>2790_3<>nulo<>ucd of financial services at the smart internet technology centre<>chi<>supriya singh<>
13462<>2799_1<>wei jiang:guihua er:qionghai dai<>similarity-based online feature selection in content-based image retrieval<>tip<>jinwei gu<>
13463<>2799_2<>chien-i tu:ravi ramamoorthi:peter n. belhumeur:wojciech matusik:shree k. nayar<>"time-varying surface appearance: acquisition, modeling and rendering."<>tog<>jinwei gu<>
3144<>2803_0<>yunjun gao:ling chen:gencai chen<>efficient parallel processing for -nearest-neighbor search in spatial databases<>iccsa<>chun chen<>
3147<>2803_3<>yunjun gao:gencai chen:ling chen<>parallelizing progressive computation for skyline queries in multi-disk environment<>dexa<>chun chen<>
3148<>2803_4<>yunjun gao:gencai chen:ling chen<>an i/o optimal and scalable skyline query algorithm<>bncod<>chun chen<>
3152<>2804_1<>ioannis stamos<>range image registration based on circular features<>3dpvt<>cecilia chao chen<>
3129<>2814_3<>james ze wang:kurt grieb:ya zhang:yixin chen:jia li<>machine annotation and retrieval for digital imagery of historical materials<>jodl<>ching-chih chen<>
3114<>2817_0<>yiming li:yen-yu cho<>a unified optimization framework for microelectronics industry<>gecco<>cheng-kai chen<>
3115<>2817_1<>yiming li<>a distributed simulation-based computational intelligence algorithm for nanoscale semiconductor device inverse problem<>ispa<>cheng-kai chen<>
32379<>2819_0<>muriel medard:ralf koetter:david r. karger:michelle effros:j. shi:b. leong<>a random linear network coding approach to multicast<>tit<>tracey ho<>
32381<>2819_2<>desmond s. lun:niranjan ratnakar:muriel medard:ralf koetter:david r. karger:ebad ahmed:fang zhao<>minimum-cost multicast over coded packet networks<>tit<>tracey ho<>
3141<>2824_0<>wei-nan liu:ying-ping chen<>adaptive discretization for probabilistic model building genetic algorithms<>gecco<>chao-hong chen<>
3142<>2824_1<>tao-yang fu:tsu-yu wu:kai-chu wu:ying-ping chen<>evolutionary interactive music composition<>gecco<>chin-te chen<>
3132<>2827_1<>jen-hao hsiao:lee-feng chien:ming-syan chen<>image copy detection via grouping in feature space based on virtual prior attacks<>icip<>chu-song chen<>
33640<>2831_0<>hui xiong:gaurav pandey:michael steinbach<>enhancing data analysis with noise removal<>tkde<>vipin kumar<>
21893<>2834_3<>kevin m. indrebo:richard j. povinelli<>sub-banded reconstructed phase spaces for speech recognition<>speech<>michael t. johnson<>
34039<>2837_3<>j. j. zhuang<>sequences not containing long zero-sum subsequences<>ejc<>w. d. gao<>
21879<>2849_0<>uli harder:jeremy t. bradley:william j. knottenbelt<>observing internet worm and virus attacks with a small network telescope<>entcs<>matt w. johnson<>
21847<>2854_9<>sharon goldwater:thomas l. griffiths<>contextual dependencies in unsupervised word segmentation<>acl<>mark johnson<>
21850<>2854_12<>matthew lease<>early deletion of fillers in processing conversational speech<>naacl<>mark johnson<>
21854<>2854_16<>matthew lease:eugene charniak:david mcclosky<>a look at parsing and its applications<>aaai<>mark johnson<>
21866<>2854_28<>matthew lease:eugene charniak<>recognizing disfluencies in conversational speech<>taslp<>mark johnson<>
21869<>2854_31<>david mcclosky:eugene charniak<>effective self-training for parsing<>naacl<>mark johnson<>
4948<>2857_10<>bo han:zoran obradovic:zhang-zhi hu:slobodan vucetic<>substring selection for biomedical document classification<>bioinformatics<>cathy h. wu<>
4952<>2857_14<>x. yuan:zhang-zhi hu:h. t. wu:manabu torii:meenakshi narayanaswamy:k. e. ravikumar:k. vijay-shanker<>an online literature mining tool for protein phosphorylation<>bioinformatics<>cathy h. wu<>
4954<>2857_16<>rolf apweiler:amos bairoch:darren a. natale:winona c. barker:brigitte boeckmann:serenella ferro:elisabeth gasteiger:hongzhan huang:rodrigo lopez:michele magrane:maria jesus martin:raja mazumder:claire o'donovan:nicole redaschi:baris e. suzek<>the universal protein resource (uniprot): an expanding universe of protein information<>nar<>cathy h. wu<>
4964<>2857_26<>hongfang liu:zhang-zhi hu:jian zhang<>biothesaurus: a web-based thesaurus of protein and gene names<>bioinformatics<>cathy h. wu<>
38072<>2869_0<>yu-seung ma:mary jean harrold<>evaluation of mutation testing for object-oriented programs<>icse<>yong rae kwon<>
38097<>2869_25<>yu-seung ma:jeff offutt<>mujava: a mutation system for java<>icse<>yong rae kwon<>
4985<>2870_0<>wen-lian hsu<>web directory integration using conditional random fields<>webi<>chia-wei wu<>
28050<>2871_1<>janos csirik:david s. johnson:claire kenyon:james b. orlin:peter w. shor<>on the sum-of-squares algorithm for bin packing<>jacm<>richard r. weber<>
28051<>2871_2<>j. mundinger:g. weiss<>analysis of peer-to-peer file dissemination amongst users of different upload capacities<>sigmetrics<>r. r. weber<>
28054<>2871_5<>jochen mundinger:gideon weiss<>analysis of peer-to-peer file dissemination<>sigmetrics<>richard weber<>
38107<>2872_2<>sameer sundresh:kirill mechitov:gul agha<>actornet: an actor platform for wireless sensor networks<>atal<>youngmin kwon<>
38108<>2872_3<>gul agha<>scalable modeling and performance evaluation of wireless sensor networks<>rtas<>youngmin kwon<>
4984<>2873_0<>sailesh krishnamurthy:michael j. franklin<>on-the-fly sharing for streamed aggregation<>sigmod<>chung wu<>
10493<>2878_1<>xin chen:keshu zhang:tao jiang<>a general framework for biclustering gene expression data<>jbcb<>haifeng li<>
10481<>2884_0<>jinyan li:limsoon wong<>discovering motif pairs at interaction sites from protein sequences on a proteome-wide scale<>bioinformatics<>haiquan li<>
10479<>2885_0<>isaac g. councill:wang-chien lee:c. lee giles<>citeseerx: an architecture and web service design for an academic document search engine<>www<>huajing li<>
10480<>2885_1<>isaac g. councill:ziming zhuang:sandip debnath:levent bolelli:wang-chien lee:anand sivasubramaniam:c. lee giles<>learning metadata from the evidence in an on-line citation matching scheme<>jcdl<>huajing li<>
10475<>2886_0<>rensheng wang:khaled amleh<>blind code-timing estimation for cdma systems with bandlimited chip waveforms in multipath fading channels<>tcom<>hongbin li<>
37579<>2887_0<>saewoong bahk<>selective channel feedback mechanisms for wireless multichannel scheduling<>wowmom<>young-june choi<>
37580<>2887_1<>saewoong bahk<>delay-sensitive packet scheduling for a wireless access link<>tmc<>young-june choi<>
37582<>2889_0<>hwansoo han<>optimal register reassignment for register stack overflow minimization<>taco<>yoonseo choi<>
37583<>2889_1<>hwansoo han<>protected heap sharing for memory-constrained java environments<>cases<>yoonseo choi<>
10466<>2890_3<>yunhua hu:yunbo cao:li teng:dmitriy meyerzon:qinghua zheng<>automatic extraction of titles from general documents using machine learning<>ipm<>hang li<>
36674<>2896_0<>nulo<>distributed cache updating for the dynamic source routing protocol<>tmc<>xin yu<>
36677<>2897_1<>fengling han:jiankun hu:yong feng:jie zhou<>a novel hybrid crypto-biometric authentication scheme for atm based banking applications<>icb<>xinhuo yu<>
36668<>2898_2<>nick koudas:calisto zuzarte<>hase: a hybrid approach to selectivity estimation for conjunctive predicates<>edbt<>xiaohui yu<>
36669<>2898_3<>sudipto guha:nick koudas:divesh srivastava<>reasoning about approximate match query results<>icde<>xiaohui yu<>
36671<>2899_1<>manas tungare:pardha s. pyla:pradyut bafna:vladimir glina:wenjie zheng:umut balli:steven harrison<>embodied data objects: tangible interfaces to information appliances<>ACMse<>xiaoyan yu<>
36643<>2900_4<>guantao chen:laura sheppardson:wenan zang<>"the circumference of a graph with no k-minor."<>jct<>xingxing yu<>
36646<>2900_7<>sean curran:orlando lee<>finding four independent trees<>siamcomp<>xingxing yu<>
36647<>2900_8<>guantao chen:zhicheng gao:wenan zang<>approximating longest cycles in graphs with bounded degrees<>siamcomp<>xingxing yu<>
36653<>2900_14<>xiaolong huang:zemin jin:xiaoyan zhang<>contractible cliques in -connected graphs<>gc<>xingxing yu<>
36657<>2900_18<>nulo<>"infinite paths in planar graphs iv, dividing cycles."<>jgt<>xingxing yu<>
36665<>2901_1<>robert k. montoye:kevin j. nowka:bart r. zeydel:vojin g. oklobdzija<>circuit design style for energy efficiency: lsdl and compound domino<>patmos<>xiao yan yu<>
26216<>2902_1<>nulo<>on performance of parallel iscsi protocol for networked storage systems<>aina<>qing (ken) yang<>
26221<>2902_6<>weijun xiao:jin ren<>prins: optimizing performance of reliable internet storages<>icdcs<>qing yang<>
26098<>2903_0<>charles ling:xiaoyong chai:rong pan<>test-cost sensitive classification on data with missing values<>tkde<>qiang yang<>
26099<>2903_1<>jun yan:benyu zhang:shuicheng yan:ning liu:qiansheng cheng:hua li:zheng chen:wei-ying ma<>a scalable supervised algorithm for dimensionality reduction on streaming data<>isci<>qiang yang<>
26106<>2903_8<>dou shen:jian-tao sun:zheng chen<>building bridges for web query classification<>sigir<>qiang yang<>
26109<>2903_11<>charles x. ling:victor s. sheng<>test strategies for cost-sensitive decision trees<>tkde<>qiang yang<>
26113<>2903_15<>jun yan:ning liu:benyu zhang:shuicheng yan:zheng chen<>a novel scalable algorithm for supervised subspace learning<>icdm<>qiang yang<>
26126<>2903_28<>hua li:dou shen:benyu zhang:zheng chen<>adding semantics to email clustering<>icdm<>qiang yang<>
26133<>2903_35<>jun yan:benyu zhang:ning liu:shuicheng yan:qiansheng cheng:weiguo fan:wensi xi:zheng chen<>effective and efficient dimensionality reduction for large-scale and streaming data preprocessing<>tkde<>qiang yang<>
26134<>2903_36<>charles ling<>discovering classification from data of multiple sources<>datamine<>qiang yang<>
26135<>2903_37<>dou shen:jian-tao sun:zheng chen<>a comparison of implicit and explicit links for web page classification<>www<>qiang yang<>
26153<>2903_55<>gui-rong xue:yong yu:dou shen:hua-jun zeng:zheng chen<>reinforcing web-object categorization through interrelationships<>datamine<>qiang yang<>
26159<>2903_61<>dou shen:jian-tao sun:zheng chen<>thread detection in dynamic text message streams<>sigir<>qiang yang<>
26164<>2903_66<>yonghong tian:tiejun huang:charles x. ling:wen gao<>learning contextual dependency network models for link-based classification<>tkde<>qiang yang<>
26167<>2903_69<>dou shen:jian-tao sun:zheng chen<>latent friend mining from blog data<>icdm<>qiang yang<>
26174<>2903_76<>dou shen:rong pan:jian-tao sun:jeffrey junfeng pan:kangheng wu:jie yin<>query enrichment for web-query classification<>tois<>qiang yang<>
26193<>2903_95<>yiqiang chen:jie yin:xiaoyong chai<>power-efficient access-point selection for indoor location estimation<>tkde<>qiang yang<>
26208<>2903_110<>jeffrey junfeng pan:james t. kwok:yiqiang chen<>multidimensional vector regression for accurate and low-cost location estimation in pervasive computing<>tkde<>qiang yang<>
26213<>2903_115<>jeffrey junfeng pan:hong chang:dit-yan yeung<>a manifold regularization approach to calibration reduction for sensor-network based tracking<>aaai<>qiang yang<>
26214<>2903_116<>jun yan:ning liu:benyu zhang:qiansheng cheng:zheng chen<>mining adaptive ratio rules from distributed data sources<>datamine<>qiang yang<>
20113<>2904_0<>tei-wei kuo:jen-wei hsieh:yuan-hao chang<>configurability of performance and overheads in flash management<>aspdac<>li-pin chang<>
20109<>2907_1<>alan k. mackworth<>local consistency in junction graphs for constraint-based inference<>aaai<>le chang<>
37602<>2910_0<>alberto apostolico<>textual compression by collapsible tries<>dcc<>yong wook choi<>
26249<>2913_3<>stefano lonardi:wojciech szpankowski<>finding biclusters by random projections<>tcs<>qiaofeng yang<>
26250<>2913_4<>stefano lonardi:avraham melkman<>a compression-boosting transform for two-dimensional data<>aaim<>qiaofeng yang<>
26245<>2914_0<>a. akbarzadeh:jan-michael frahm:philippos mordohai:brian clipp:c. engels:david gallup:paul merrell:m. phelps:s. sinha:b. talton:liang wang:henrik stewenius:ruigang yang:greg welch:herman towles:david nister:marc pollefeys<>towards urban 3d reconstruction from video<>3dpvt<>qingxiong yang<>
10514<>2919_0<>qingfu zhang<>a multiobjective differential evolution based on decomposition for multiobjective optimization with variable linkages<>ppsn<>hui li<>
2032<>2920_0<>bo-yin yang:chen-mou cheng:jiun-ming chen<>implementing minimized multivariate pkc on low-resource embedded systems<>spc<>bor-rong chen<>
14252<>2924_0<>chi-hung tzeng:shing-tsaan huang<>self-stabilizing asynchronous phase synchronization in general graphs<>sss<>jehn-ruey jiang<>
10520<>2925_0<>ming li:b. prabhakaran<>middleware for streaming 3d progressive meshes over lossy networks<>tomccap<>hui li<>
14251<>2927_0<>k. r. narayanan<>iterative soft-input soft-output decoding of reed-solomon codes by adapting the parity-check matrix<>tit<>j. jiang<>
20726<>2929_1<>shuo wang<>exploiting soft redundancy for error-resilient on-chip memory design<>iccad<>lei wang<>
14248<>2930_2<>chengxiang zhai<>extraction of coherent relevant passages using hidden markov models<>tois<>jing jiang<>
14249<>2930_3<>chengxiang zhai<>exploiting domain structure for named entity recognition<>naacl<>jing jiang<>
14250<>2930_4<>xu ling:xin he:qiaozhu mei:chengxiang zhai:bruce r. schatz<>automatically generating gene summaries from biomedical literature<>psb<>jing jiang<>
10504<>2931_0<>xue-quan li:bo zhang<>computing efficient solutions to fuzzy multiple objective linear programming problems<>fss<>hui li<>
2036<>2932_0<>roldano cattoni:nicola bertoldi:mauro cettolo:marcello federico<>a web-based demonstrator of a multi-lingual phrase-based translation system<>eacl<>boxing chen<>
20728<>2933_1<>behnam afsharpoya<>modeling fluid flow in fuel cells using the lattice-boltzmann approach<>mcs<>lian-ping wang<>
10512<>2935_5<>michael muskulus:lex wolters<>modeling job arrivals in a data-intensive grid<>jsspp<>hui li<>
20730<>2936_1<>xiao-dong yu:qi tian:ping xue<>a novel multi-resolution video representation scheme based on kernel pca<>vc<>lei wang<>
20738<>2936_9<>hongdong li:richard i. hartley<>video local pattern based image matching for visual mapping<>icpr<>lei wang<>
20745<>2938_2<>junfeng he:zhouchen lin:xiaoou tang<>detecting doctored jpeg images via dct coefficient analysis<>eccv<>lifeng wang<>
20709<>2940_0<>chiung-jang chen<>a unified capacity analysis for wireless systems with joint multiuser scheduling and antenna diversity in nakagami fading channels<>tcom<>li-chun wang<>
20718<>2942_1<>fuzhuo huang:bo liu<>improved differential evolution with dynamic population size<>icic<>ling wang<>
20720<>2942_3<>liang zhang:da-zhong zheng<>an effective hybrid genetic algorithm for flow shop scheduling with limited buffers<>cor<>ling wang<>
20721<>2942_4<>hui pan:bo liu<>particle swarm optimization for function optimization in noisy environment<>amc<>ling wang<>
10498<>2943_2<>mong-li lee:wynne hsu:gao cong<>an estimation system for xpath expressions<>icde<>hanyu li<>
901<>2947_0<>naveen garg<>minimizing average flow time on related machines<>stoc<>amit kumar<>
902<>2947_1<>jon m. kleinberg<>fairness measures for resource allocation<>siamcomp<>amit kumar<>
922<>2947_21<>naveen garg<>better algorithms for minimizing average flow-time on related machines<>icalp<>amit kumar<>
951<>2949_23<>shuang sun:john yen<>merging workflows: a new perspective on connecting business processes<>dss<>akhil kumar<>
899<>2950_0<>rodrigo l. carceroni:kostas daniilidis<>structure from motion with known camera positions<>cvpr<>ankita kumar<>
981<>2953_7<>minho sung:erran l. li:jia wang:jun xu<>scalable and efficient data streaming algorithms for detecting common content in internet traffic<>icde<>abhishek kumar<>
987<>2956_0<>mohab anis<>dual-vt design of fpgas for subthreshold leakage tolerance<>isqed<>akhilesh kumar<>
988<>2956_1<>mohab anis<>an analytical state dependent leakage power model for fpgas<>date<>akhilesh kumar<>
985<>2957_2<>a. karmakar:r. k. patney<>a multiresolution model of auditory excitation pattern and its application to objective evaluation of perceived speech quality<>taslp<>a. kumar<>
39619<>2961_0<>dewen hu:meiping wu:xiaoping hu<>quasi-gaussian particle filtering<>iccS<>yuanxin wu<>
39627<>2964_0<>flip korn:s. muthukrishnan<>fractal modeling of ip network traffic at streaming speeds<>icde<>yihua wu<>
39628<>2964_1<>flip korn:s. muthukrishnan<>modeling skew in data streams<>sigmod<>yihua wu<>
39196<>2965_0<>jian li<>dlb: a novel real-time qos control mechanism for multimedia transmission<>aina<>yeqiong song<>
39179<>2969_4<>rune b. lyngso:jotun hein<>counting all possible ancestral configurations of sample sequences in population genetics<>tcbb<>yun s. song<>
39181<>2969_6<>nulo<>a concise necessary and sufficient condition for the existence of a galled-tree<>tcbb<>yun s. song<>
39182<>2969_7<>zhihong ding:dan gusfield:charles h. langley:yufeng wu<>algorithms to distinguish the role of gene-conversion from single-crossover recombination in the derivation of snp sequences in populations<>recomb<>yun s. song<>
39200<>2973_0<>mor naaman:andreas paepcke:hector garcia-molina<>assigning textual names to sets of geographic coordinates<>urban<>yee jiun song<>
9996<>2975_0<>andrew s. grimshaw<>the cost of transparency: grid-based file access on the avaki data grid<>ispa<>h. howie huang<>
9999<>2977_0<>eileen m. trauth:jeria l. quesenberry<>cross-cultural influences on women in the it workforce<>sigcpr<>haiyan huang<>
10000<>2977_1<>rosalie j. ocker<>preliminary insights into the in-group/out-group effect in partially distributed teams: an analysis of participant reflections<>sigcpr<>haiyan huang<>
9982<>2980_0<>wei-tek tsai:yinong chen<>binary analysis and automated hot patching for web-based applications<>infsof<>hai huang<>
9990<>2981_7<>cathy h. wu:rolf apweiler:amos bairoch:darren a. natale:winona c. barker:brigitte boeckmann:serenella ferro:elisabeth gasteiger:rodrigo lopez:michele magrane:maria jesus martin:raja mazumder:claire o'donovan:nicole redaschi:baris e. suzek<>the universal protein resource (uniprot): an expanding universe of protein information<>nar<>hongzhan huang<>
9951<>2986_6<>lei zhang 0002:dimitris samaras:li shen:rong zhang:fillia makedon:justin d. pearlman<>hemispherical harmonic surface description and applications to medical image analysis<>3dpvt<>heng huang<>
9952<>2987_0<>shun-chin chuang:yeong-yuh xu:hsin-chia fu<>a multiple-instance neural networks based image content retrieval system<>icicic<>hsiang-cheh huang<>
9958<>2987_6<>hao luo:jeng-shyang pan:zhe-ming lu<>reversible data hiding for 3d point cloud model<>iih-msp<>hsiang-cheh huang<>
9962<>2987_10<>mei-shin lai:shu-chuan chu<>image texture segmentation with ant colony systems<>icicic<>hsiang-cheh huang<>
9978<>2988_12<>tzong-yi lee:jorng-tzong horng:hsueh-fen juan:hsien-da huang:li-cheng wu:meng-fong tsai<>"an agent-based system to discover protein-protein interactions, identify protein complexes and proteins with multiple peptide mass fingerprints."<>jcc<>hsuan-cheng huang<>
9981<>2988_15<>li-cheng wu:jorng-tzong horng:shir-ly huang:baw-jhiune liu<>detection of discriminative sequence motifs in proteins obtained from prokaryotes grown at various temperatures<>jcc<>hsien-da huang<>
3884<>2991_0<>ho lee:jaeil hwang:joonwoo lee:seungyong park:yunmook nah:segil jeon:moon-hae kim<>long-term location data management for distributed moving object databases<>isorc<>chungwoo lee<>
29889<>3000_0<>nader bagherzadeh<>increasing the throughput of an adaptive router in network-on-chip (noc)<>codes<>seung eun lee<>
29894<>3001_4<>yijie han:richard j. la:armand m. makowski<>distribution of path durations in mobile ad-hoc networks - palm's theorem to the rescue<>cn<>seungjoon lee<>
29895<>3001_5<>rob sherwood:bobby bhattacharjee<>cooperative peer groups in nice<>cn<>seungjoon lee<>
29908<>3003_5<>puneet sharma:zhichen xu:sujata banerjee<>estimating network proximity and latency<>ccr<>sung-ju lee<>
29911<>3003_8<>jayanthkumar kannan:beverly yang:scott shenker:puneet sharma:sujata banerjee:sujoy basu<>smartseer: using a dht to process continuous queries over peer-to-peer networks<>infocom<>sung-ju lee<>
29920<>3003_17<>puneet sharma:jack brassil:kang g. shin<>improving aggregated channel performance through decentralized channel monitoring<>cn<>sung-ju lee<>
29921<>3003_18<>r. fonseca:p. sharma:s. banerjee:s. basu<>distributed querying of internet distance information<>infocom<>s.-j. lee<>
29884<>3005_0<>longfei cong:andrew huntbatch:tianzi jiang:guang-zhong yang<>an embedding framework for myocardial velocity processing with mri<>miar<>su-lin lee<>
30012<>3013_1<>eamonn j. keogh:li wei:xiaopeng xi:michail vlachos<>lb_keogh supports exact indexing of shapes under rotation invariance with arbitrary representations and distance measures<>vldb<>sang-hee lee<>
30013<>3016_0<>dongjoo lee:taehee lee:suekyung lee:ok-ran jeong:hyeonsang eom<>bestchoice: a decision support system for supplier selection in e-marketplaces<>deec<>sang-goo lee<>
39224<>3023_4<>jiannong cao:alvin t. s. chan:sajal k. das:minyi guo<>a taxonomy of application scheduling tools for high performance cluster computing<>cluster<>yudong sun<>
39218<>3025_1<>c. greg plaxton:mitul tiwari:harrick vin<>reconfigurable resource scheduling<>spaa<>yu sun<>
29964<>3027_3<>hyung-min park:chandra shekhar dhir:sang-hoon oh<>a filter bank approach to independent component analysis for convolved mixtures<>ijon<>soo-young lee<>
29966<>3027_5<>hyung-min park:sang-hoon oh<>a modified infomax algorithm for blind signal separation<>ijon<>soo-young lee<>
29983<>3028_1<>kangmin lee:hoi-jun yoo<>low-power network-on-chip for high-performance soc design<>tvlsi<>se-joong lee<>
39214<>3035_0<>young-seok kim:john m. hollerbach:thenkurussi kesavadas:stephen a. mascaro<>measuring fingertip forces by imaging the fingernail<>haptics<>yu sun<>
29988<>3039_0<>honglak lee:pieter abbeel:andrew y. ng<>efficient l1 regularized logistic regression<>aaai<>su-in lee<>
39206<>3040_1<>ishfaq ahmad:dongdong li:ya-qin zhang<>region-based rate control and bit allocation for wireless video transmission<>tmm<>yu sun<>
19534<>3044_15<>zhongtang cai:vibhore kumar:brian f. cooper:greg eisenhauer:robert e. strom<>utility-driven proactive management of availability in enterprise-scale information flows<>middleware<>karsten schwan<>
19545<>3044_26<>greg eisenhauer:fabian e. bustamante<>publish-subscribe for high-performance computing<>internet<>karsten schwan<>
19551<>3044_32<>zhongtang cai:greg eisenhauer:qi he:vibhore kumar:matthew wolf<>iq-services: network-aware middleware for interactive large-data applications<>concurrency<>karsten schwan<>
19559<>3044_40<>himanshu raj:balasubramanian seshasayee:keith j. o'hara:ripal nathuji:tucker r. balch<>: using virtualization and pervasiveness to manage mobile robot software systems<>selfman<>karsten schwan<>
19609<>3044_90<>paul royal:mitch halpin:ada gavrilovska<>utilizing network processors in distributed enterprise environments<>nca<>karsten schwan<>
13533<>3047_7<>zygmunt j. haas:li li<>gossip-based ad hoc routing<>ton<>joseph y. halpern<>
13649<>3047_123<>ittai abraham:danny dolev:rica gonen<>distributed computing meets game theory: robust mechanisms for rational secret sharing and multiparty computation<>podc<>joseph y. halpern<>
13671<>3047_145<>eric j. friedman:ian a. kash<>efficiency and nash equilibria in a scrip system for p2p networks<>sigecom<>joseph y. halpern<>
13676<>3047_150<>leandro chaves rego<>reasoning about knowledge of unawareness<>kr<>joseph y. halpern<>
13679<>3047_153<>sabina petride<>a knowledge-based analysis of global function computation<>wdag<>joseph y. halpern<>
13680<>3047_154<>leandro chaves rego<>extensive games with possibly unaware players<>atal<>joseph y. halpern<>
13697<>3047_171<>lawrence e. blume:david a. easley<>redoing the foundations of decision theory<>kr<>joseph y. halpern<>
13722<>3047_196<>nulo<>"causality, responsibility, and blame: a structural-model approach."<>qest<>joseph y. halpern<>
13723<>3047_197<>riccardo pucella<>a logic for reasoning about evidence<>jair<>joseph y. halpern<>
29937<>3048_8<>minsu ahn:igor guskov<>out-of-core remeshing of large polygonal meshes<>tvcg<>seungyong lee<>
29940<>3048_11<>hyunjun lee:sungtae kwon<>real-time pencil rendering<>npar<>seungyong lee<>
29943<>3048_14<>sungyul choe:minsu ahn<>feature sensitive out-of-core chartification of large polygonal meshes<>cgi<>seungyong lee<>
29950<>3048_21<>alex ni:kyuman jeong:lee markosian<>multi-scale line drawings from 3d meshes<>si3d<>seungyong lee<>
29956<>3049_1<>gary chartrand:ping zhang<>uniformly cordial graphs<>dm<>sin-min lee<>
10536<>3050_0<>yoonsuck choe<>facilitating neural dynamics for delay compensation and prediction in evolutionary neural networks<>gecco<>heejin lim<>
29455<>3053_0<>andrea c. arpaci-dusseau:remzi h. arpaci-dusseau<>geiger: monitoring the buffer cache in a virtual machine environment<>asplos<>stephen t. jones<>
29456<>3053_1<>andrea c. arpaci-dusseau:remzi h. arpaci-dusseau<>antfarm: tracking processes in a virtual machine environment<>usenix<>stephen t. jones<>
29436<>3058_4<>fabio crestani:mark d. dunlop:matt jones:stefano mizzaro<>theme issue on interactive mobile information access<>puc<>steve jones<>
29437<>3058_5<>dynal patel:gary marsden:matt jones<>improving photo searching interfaces for small-screen mobile computers<>mhci<>steve jones<>
29438<>3058_6<>matt jones<>the music is the message<>interactions<>steve jones<>
29410<>3060_33<>ben rudiak-gould:alan mycroft<>haskell is not not ml<>esop<>simon l. peyton jones<>
29420<>3060_43<>dimitrios vytiniotis:stephanie weirich:geoffrey washburn<>simple unification-based type inference for gadts<>icfp<>simon l. peyton jones<>
14942<>3062_0<>hong-jian lai:bruce montgomery:taozhi shui:suohai fan<>conditional colorings of graphs<>dm<>jianliang lin<>
39615<>3071_7<>mark cheng-enn hsieh:arbee l. p. chen<>discovering frequent tree patterns over data streams<>sdm<>yi-hung wu<>
39596<>3073_2<>hongbing fan:ray chak-chung cheung:jiping liu<>decomposition design theory and methodology for arbitrary-shaped switch boxes<>tc<>yu-liang wu<>
35020<>3075_0<>xunnian yang<>cone spline approximation via fat conic spline fitting<>cad<>weiping yang<>
28783<>3085_2<>eunho yang:seong-il hahm:chong-kwon kim:pillwoo lee<>eimd: a new congestion control for fast long-distance networks<>icoin<>seongho cho<>
2134<>3091_0<>dudy lim:yew-soon ong:yaochu jin:bernhard sendhoff<>inverse multi-objective robust evolutionary design<>gpem<>bu-sung lee<>
31553<>3093_0<>jeff z. pan<>integrating and querying parallel leaf shape descriptions<>semweb<>shenghui wang<>
2130<>3094_0<>lizy kurian john:eugene john<>architectural enhancements for network congestion control applications<>tvlsi<>byeong kil lee<>
31556<>3095_2<>feng ge:tiecheng liu<>image-segmentation evaluation from the perspective of salient object extraction<>cvpr<>song wang<>
31559<>3095_5<>joachim s. stahl<>globally optimal grouping for symmetric boundaries<>cvpr<>song wang<>
31566<>3095_12<>theodor richardson<>open-curve shape correspondence without endpoint correspondence<>miccai<>song wang<>
31568<>3097_0<>fei xie:haitao gong:donghua deng:george t. wang:jicheng hu:phillip c.-y. sheu<>integrating semantic web services for declarative accesses in natural language<>ism<>shu wang<>
25684<>3098_0<>lam cam tran:qiang ji<>improving face recognition by online image alignment<>icpr<>peng wang<>
25686<>3098_2<>qiang ji<>performance modeling and prediction of face recognition systems<>cvpr<>peng wang<>
31536<>3102_0<>feng jiao:chi-hoon lee:russell greiner:dale schuurmans<>semi-supervised conditional random fields for improved sequence segmentation and labeling<>acl<>shaojun wang<>
31537<>3102_1<>chi-hoon lee:russ greiner<>using query-specific variance estimates to combine bayesian classifiers<>icml<>shaojun wang<>
31539<>3102_3<>shaojun wang:li cheng:russell greiner:dale schuurmans<>stochastic analysis of lexical and semantic enhanced structural language model<>icgi<>shaomin wang<>
31535<>3104_4<>tzu-cheng jen<>generalized histogram equalization based on local characteristics<>icip<>sheng-jyh wang<>
31529<>3106_8<>mohamed bouguessa:haojun sun<>an objective approach to cluster validation<>prl<>shengrui wang<>
31513<>3108_0<>zhibin mai:dong xuan:wei zhao<>design and implementation of qos-provisioning system for voice over ip<>tpds<>shengquan wang<>
31515<>3108_2<>riccardo bettati<>delay analysis in temperature-constrained hard real-time systems with general task arrivals<>rtss<>shengquan wang<>
34097<>3112_1<>lyndon s. kennedy:shih-fu chang<>video search reranking via information bottleneck principle<>mm<>winston h. hsu<>
34060<>3120_0<>ching-tai chen:hsin-nan lin:kuen-pin wu:ting-yi sung<>a knowledge-based approach to protein local structure prediction<>apbc<>wen-lian hsu<>
34068<>3120_8<>richard tzong-han tsai:shih-hung wu:wen-chi chou:yu-chun lin:ding he:jieh hsiang:ting-yi sung<>various criteria in the evaluation of biomedical named entity recognition<>bmcbi<>wen-lian hsu<>
34069<>3120_9<>chun-hung lu:guey-fa chiou:min-yuh day:chorng-shyong ong<>using instant messaging to provide an intelligent learning environment<>its<>wen-lian hsu<>
34059<>3121_9<>soumyadeb mitra:marianne winslett<>trustworthy keyword search for regulatory-compliant record retention<>vldb<>windsor w. hsu<>
5962<>3125_1<>deepak ravichandran:eduard h. hovy<>mining and re-ranking for answering biographical queries on the web<>aaai<>donghui feng<>
5965<>3125_4<>jihie kim:erin shaw:eduard h. hovy<>towards modeling threaded discussions using induced ontology knowledge<>aaai<>donghui feng<>
5966<>3125_5<>erin shaw:jihie kim:eduard h. hovy<>an intelligent discussion-bot for answering student queries in threaded discussions<>iui<>donghui feng<>
5967<>3125_6<>erin shaw:jihie kim:eduard h. hovy<>learning to detect conversation focus of threaded discussions<>naacl<>donghui feng<>
8035<>3127_2<>jaewoo cho:seunghwa lee<>multi-agent based hybrid system for dynamic web-content adaptation<>ideal<>eunseok lee<>
8040<>3131_0<>j. j. heys:thomas a. manteuffel:stephen f. mccormick<>on mass-conserving least-squares methods<>siamsc<>e. lee<>
8020<>3133_4<>ingo grull:henning kiel:jan borchers<>conga: a framework for adaptive conducting gesture analysis<>nime<>eric lee<>
30045<>3136_0<>kyung c. chae:ho woo lee<>on stochastic decomposition in the gi/m/1 queue with single exponential vacation<>orl<>sang min lee<>
30041<>3138_0<>jeongkeun lee:kideok cho:taekyoung kwon:yanghee choi<>distributed and energy-efficient target localization and tracking in wireless sensor networks<>comcom<>seungjae lee<>
8032<>3139_0<>nulo<>subvarieties of the variety generated by the five-element brandt semigroup<>ijac<>edmond w. h. lee<>
30039<>3141_1<>jane hwang:jaehoon jung:sunghoon yim:jaeyoung cheon:seungmoon choi:gerard jounghyun kim<>"requirements, implementation and applications of hand-held virtual reality."<>ijvr<>sungkil lee<>
36255<>3144_1<>lusheng wang:yu lin<>approximation algorithms for bi-clustering problems<>wabi<>xiaowen liu<>
8015<>3147_8<>nulo<>the problem with threads<>computer<>edward a. lee<>
36252<>3149_0<>nulo<>weights modulo a prime power in divisible codes and a related bound<>tit<>x. liu<>
36256<>3150_0<>qing wang<>stability of nontrivial solution of delay differential equations with state-dependent impulses<>amc<>xinzhi liu<>
36258<>3150_2<>bingji xu:xiaoxin liao<>global exponential stability of high order hopfield type neural networks<>amc<>xinzhi liu<>
36259<>3151_0<>neeraj korde:ursula jakob:lars i. leichert<>cosmos: conserved sequence motif search in the proteome<>bmcbi<>xiao i. liu<>
30034<>3156_0<>jing sun:gillian dobbie:yuan-fang li<>a z approach in validating ora-ss data models<>entcs<>scott uk-jin lee<>
30035<>3156_1<>gillian dobbie:jing sun:lindsay groves<>a pvs approach to verifying ora-ss data models<>seke<>scott uk-jin lee<>
30021<>3157_0<>helene brashear:valerie henderson:kwang-hyun park:harley hamilton:thad starner<>american sign language recognition in game development for deaf children<>assets<>seungyon lee<>
30024<>3158_2<>peter bajcsy<>spatial intensity correction of fluorescent confocal laser scanning microscope images<>eccv<>sang-chul lee<>
30025<>3158_3<>peter bajcsy<>three-dimensional volume reconstruction based on trajectory fusion from confocal laser scanning microscope images<>cvpr<>sang-chul lee<>
30026<>3159_0<>bin lu:xin-yuan song<>assessing local influence for nonlinear structural equation models with ignorable missing data<>csda<>sik-yum lee<>
30027<>3159_1<>liang xu:wai-yin poon<>deletion measures for generalized linear mixed effects models<>csda<>sik-yum lee<>
6833<>3162_1<>gagan aggarwal:tomas feder:krishnaram kenthapadi:samir khuller:rina panigrahy:an zhu<>achieving anonymity via clustering<>pods<>dilys thomas<>
6816<>3164_0<>nulo<>programming with models? modeling with code. the role of models in software development<>jot<>dave thomas<>
6820<>3164_4<>nulo<>on the next move in programming<>jot<>dave thomas<>
30020<>3167_2<>young-bae ko<>an efficient neighbor knowledge based broadcasting for mobile ad hoc networks<>iccS<>sung-hee lee<>
3866<>3171_1<>paul dourish:gloria mark<>the human infrastructure of cyberinfrastructure<>cscw<>charlotte p. lee<>
3868<>3178_1<>ahmed m. elgammal<>human motion synthesis by motion manifold learning and motion primitive segmentation<>amdo<>chan-su lee<>
3870<>3180_0<>cindy dooling:jeff white<>software management<>siguccs<>cathy lee<>
5461<>3184_1<>arunesh mishra:vivek shrivastava:suman banerjee:samrat ganguly<>distributed channel management in uncoordinated wireless environments<>mobicom<>dheeraj agrawal<>
5462<>3184_2<>qunfeng dong:suman banerjee:jia wang:ashutosh shukla<>packet classifiers in ternary cams can be smaller<>sigmetrics<>dheeraj agrawal<>
25703<>3188_1<>haixun wang:wei wang:baile shi:philip s. yu<>loci: load shedding through class-preserving data acquisition<>icdm<>peng wang<>
5383<>3189_7<>carlos cordeiro:sachin abhyankar<>scalable and qos-aware dynamic slot assignment and piconet partitioning to enhance the performance of bluetooth ad hoc networks<>tmc<>dharma p. agrawal<>
5384<>3189_8<>hrishikesh gossain:tarun joshi:carlos de m. cordeiro<>drp: an efficient directional routing protocol for mobile ad hoc networks<>tpds<>dharma p. agrawal<>
5385<>3189_9<>jun yin:xiaodong wang<>impact of bursty error rates on the performance of wireless local area network (wlan)<>adhoc<>dharma p. agrawal<>
5390<>3189_14<>ratnabali biswas:vivek jain:chittabrata ghosh<>on-demand reliable medium access in sensor networks<>wowmom<>dharma p. agrawal<>
5399<>3189_23<>lakshmi santhanam:nagesh nandiraju:younghwan yoo<>distributed self-policing architecture for fostering node cooperation in wireless mesh networks<>ifip6-8<>dharma p. agrawal<>
5416<>3189_40<>yi cheng<>energy efficient session key establishment in wireless sensor networks<>icwn<>dharma p. agrawal<>
5420<>3189_44<>tarun joshi:anindo mukherjee<>exploiting mobility patterns to reduce re-authentication overheads in infrastructure wlan networks<>ccece<>dharma p. agrawal<>
5430<>3189_54<>abinash mahapatra:kumar anand<>qos and energy aware routing for real-time traffic in wireless sensor networks<>comcom<>dharma p. agrawal<>
5434<>3189_58<>hrishikesh gossain:carlos cordeiro<>minimizing the effect of deafness and hidden terminal problem in wireless ad hoc networks using directional antennas<>wicomm<>dharma p. agrawal<>
5441<>3189_65<>yi cheng<>distributed pairwise key establishment in wireless sensor networks<>csreaPSC<>dharma p. agrawal<>
4333<>3195_14<>milena mihail:amin saberi<>on certain connectivity properties of the internet topology<>jcss<>christos h. papadimitriou<>
4335<>3195_16<>zhi-zhong chen:michelangelo grigni<>recognizing hole-free 4-map graphs in cubic time<>algorithmica<>christos h. papadimitriou<>
4341<>3195_22<>santosh vempala<>on the approximability of the traveling salesman problem<>combinatorica<>christos h. papadimitriou<>
4363<>3196_0<>constantinos daskalakis:paul w. goldberg<>the complexity of computing a nash equilibrium<>stoc<>christos h. papadimitriou<>
4366<>3196_3<>paul w. goldberg<>reducibility among equilibrium problems<>stoc<>christos h. papadimitriou<>
14877<>3197_1<>eamonn j. keogh<>group sax: extending the notion of contrast sets to time series and multimedia data<>pkdd<>jessica lin<>
14879<>3197_3<>ada wai-chee fu:oscar tat-wing leung:eamonn j. keogh<>finding time series discords based on haar transform<>adma<>jessica lin<>
14920<>3203_0<>been-chian chien:wei-pang yang<>a classification tree based on discriminant functions<>jise<>jung-yi lin<>
3861<>3204_1<>maw-shang chang<>distance-hereditary graphs are clique-perfect<>dam<>chuan-min lee<>
3862<>3204_2<>ton kloks:dieter kratsch:jiping liu<>improved bottleneck domination algorithms<>dam<>chuan-min lee<>
14891<>3207_2<>nulo<>the role of information retrieval in answering complex questions<>acl<>jimmy j. lin<>
14897<>3207_8<>dina demner-fushman<>"answer extraction, semantic clustering, and extractive summarization for clinical question answering."<>acl<>jimmy j. lin<>
14901<>3207_12<>dina demner-fushman<>the role of knowledge in conceptual retrieval: a study in the domain of clinical medicine<>sigir<>jimmy j. lin<>
14904<>3207_15<>g. craig murray:bonnie j. dorr:jan hajic:pavel pecina<>leveraging reusability: cost-effective lexical acquisition for large-scale ontology translation<>acl<>jimmy j. lin<>
14905<>3207_16<>dina demner-fushman<>will pyramids built of nuggets topple over?<>naacl<>jimmy j. lin<>
14911<>3207_22<>dina demner-fushman<>methods for automatically evaluating answers to complex questions<>ir<>jimmy j. lin<>
14912<>3207_23<>philip wu:dina demner-fushman:eileen g. abels<>exploring the limits of single-iteration clarification dialogs<>sigir<>jimmy j. lin<>
14913<>3207_24<>boris katz<>building a reusable test collection for question answering<>jasis<>jimmy j. lin<>
3842<>3208_3<>yu-chi chung:chao-chun chen<>design and performance evaluation of broadcast algorithms for time-constrained data retrieval<>tkde<>chiang lee<>
39117<>3210_0<>ingrid violet<>example of supersonic solutions to a steady state euler-poisson system<>appml<>yue-jun peng<>
3825<>3221_0<>cheng-chang lien:ren-zhuang huang<>automatic recognition of birdsongs using mel-frequency cepstral coefficients and vector quantization<>imecs<>chang-hsing lee<>
3826<>3221_1<>chih-hsun chou:chin-chuan han:ren-zhuang huang<>automatic recognition of animal vocalizations using averaged mfcc and linear discriminant analysis<>prl<>chang-hsing lee<>
31335<>3223_0<>sander klous:jaime frey:douglas thain:alain roy:miron livny:jo van den brand<>transparent access to grid resources for user software<>concurrency<>se-chang son<>
3834<>3226_7<>chun-chih jiang:tung-cheng hsieh<>a genetic fuzzy agent using ontology model for meeting scheduling system<>isci<>chang-shing lee<>
31322<>3228_1<>mahmut t. kandemir<>reducing power through compiler-directed barrier synchronization elimination<>islped<>seung woo son<>
31326<>3228_5<>guangyu chen:mahmut t. kandemir<>a compiler-guided approach for reducing disk power consumption by exploiting disk access locality<>cgo<>seung woo son<>
31327<>3228_6<>mahmut t. kandemir<>energy-aware data prefetching for multi-speed disks<>cf<>seung woo son<>
31330<>3228_9<>konrad malkowski:guilin chen:mahmut t. kandemir:padma raghavan<>integrated link/cpu voltage scaling for reducing energy consumption of parallel sparse matrix applications<>ipps<>seung woo son<>
31332<>3228_11<>guangyu chen:mahmut t. kandemir:feihui li<>energy savings through embedded processing on disk system<>aspdac<>seung woo son<>
39111<>3230_6<>g. c. lau<>chromaticity of certain tripartite graphs identified with a path<>dm<>y. h. peng<>
389<>3237_0<>ross folland:n. g. stocks:evor l. hines<>stimulus reconstruction from neural spike trains: are conventional filters suitable for both periodic and aperiodic stimuli?<>sigpro<>aruneema das<>
14856<>3246_0<>masato akagi:yoiti suzuki<>multi-channel noise reduction in noisy environments<>iscslp<>junfeng li<>
14872<>3247_3<>jeffrey ho:ming-hsuan yang:david j. kriegman<>integrating surface normal vectors using fast marching method<>eccv<>jongwoo lim<>
14854<>3248_0<>chengfei liu<>designing quality xml schemas from e-r diagrams<>waim<>jianxin li<>
25429<>3250_5<>s. bhadra:s. shakkottai<>min-cost selfish multicast with network coding<>tit<>p. gupta<>
14843<>3254_0<>nulo<>on optimal rule discovery<>tkde<>jiuyong li<>
14847<>3254_4<>raymond chi-wing wong:ada wai-chee fu:jian pei<>achieving -anonymity by clustering in attribute hierarchical structures<>dawak<>jiuyong li<>
14849<>3254_6<>raymond chi-wing wong:ada wai-chee fu:ke wang<>"(alpha, k)-anonymity: an enhanced k-anonymity model for privacy preserving data publishing."<>kdd<>jiuyong li<>
14840<>3256_0<>yeqiong song<>dlb: a novel real-time qos control mechanism for multimedia transmission<>aina<>jian li<>
14838<>3257_0<>xin li:hua su:hsinchun chen:david w. galbraith<>a framework of integrating gene relations from heterogeneous data sources: an experiment on<>bioinformatics<>jiexun li<>
14835<>3259_0<>david m. weiss:howell yee<>code-coverage guided prioritized test generation<>infsof<>j. jenny li<>
14833<>3261_0<>boyu yang:tian xue:jing zhao:chaitanya kommidi:jeetendra soneja:rebecca will:bruce sharp:ron kenyon:oswald crasta:bruno w. s. sobral<>bioinformatics web services<>biocomp<>jian li<>
27725<>3262_8<>niveditha thagarapu:tilak mulukalapally:sachin lad<>nasa's standards advisor pilot: search solutions for an intranet<>ACMse<>randy k. smith<>
36239<>3265_4<>michele conforti:gerard cornuejols:kristina vuskovic:giacomo zambelli<>odd hole recognition in graphs of bounded clique size<>siamdm<>xinming liu<>
36233<>3267_1<>gang huang:hong mei<>towards service discovery and subscription based on community-of-interest<>sose<>xuanzhe liu<>
36234<>3267_2<>gang huang:li zhou:hong mei:shing-chi cheung<>performance aware service pool in dependable service oriented architecture<>jcst<>xuanzhe liu<>
14829<>3268_0<>yu gu:wei zhang:baohua zhao<>mimo techniques in cluster-based wireless sensor networks<>apweb<>jing li<>
36240<>3277_0<>yurong liu:zidong wang<>on global exponential stability of generalized stochastic neural networks with mixed time-delays<>ijon<>xiaohui liu<>
36243<>3277_3<>yurong liu:zidong wang<>global exponential stability of generalized recurrent neural networks with discrete and distributed delays<>nn<>xiaohui liu<>
14818<>3280_1<>miguel r. visbal<>high-order compact schemes for nonlinear dispersive waves<>jscic<>jichun li<>
14823<>3283_0<>maosong sun:xian zhang<>a comparison and semi-quantitative analysis of words and character-bigrams as features in chinese text categorization<>acl<>jingyang li<>
14822<>3285_3<>uwe aickelin:edmund k. burke<>improved squeaky wheel optimisation for driver scheduling<>ppsn<>jingpeng li<>
36192<>3293_4<>jin huang:hongxin zhang:xiaohan shi:hujun bao<>interactive mesh deformation with pseudo material effects<>jvca<>xinguo liu<>
36193<>3293_5<>jin huang:hujun bao:baining guo:heung-yeung shum<>an efficient large deformation method using domain decomposition<>cg<>xinguo liu<>
36196<>3293_8<>jin huang:xiaohan shi:kun zhou:li-yi wei:shang-hua teng:hujun bao:baining guo:heung-yeung shum<>subspace gradient domain mesh deformation<>tog<>xinguo liu<>
14804<>3294_1<>nick cercone<>introducing a rule importance measure<>trs<>jiye li<>
36185<>3295_2<>sai shankar n.<>sensing-based opportunistic channel access<>monet<>xin liu<>
14802<>3296_5<>haiquan li:limsoon wong<>discovering motif pairs at interaction sites from protein sequences on a proteome-wide scale<>bioinformatics<>jinyan li<>
36205<>3297_4<>hongbin zhu:youquan liu:enhua wu<>simulation of miscible binary mixtures based on lattice boltzmann method<>jvca<>xuehui liu<>
36215<>3302_5<>w. bruce croft<>representing clusters for retrieval<>sigir<>xiaoyong liu<>
14814<>3303_2<>rong zheng:hsinchun chen<>from fingerprint to writeprint<>cacm<>jiexun li<>
14787<>3310_9<>son t. vuong<>grid resource discovery based on semantic p2p communities<>sac<>juan li<>
26060<>3313_0<>yaoyao zhu:liang cheng<>reprogramming wireless sensor networks: challenges and approaches<>network<>qiang wang<>
26049<>3318_2<>yiyu chen:amitayu das:anand sivasubramaniam:r. harper:m. bland<>consolidating clients on back-end servers with co-location and frequency control<>sigmetrics<>qian wang<>
26051<>3318_4<>jianyong zhang:anand sivasubramaniam:alma riska:erik riedel<>storage performance virtualization via throughput and latency control<>tos<>qian wang<>
26042<>3319_3<>maria danninger:erica robles:leila takayama:tobias kluge:rainer stiefelhagen:clifford nass<>the connector service-predicting availability in mobile contexts<>mlmi<>qianying wang<>
26044<>3319_5<>tony hsieh:meredith ringel morris:andreas paepcke<>virtual information piles for small screen devices<>chi<>qianying wang<>
26036<>3320_2<>xue liu:wenbo he:marco caccamo:lui sha<>optimal real-time sampling rate assignment for wireless sensor networks<>tosn<>qixin wang<>
8627<>3325_3<>mahmut t. kandemir:feihui li<>energy-aware computation duplication for improving reliability in embedded chip multiprocessors<>aspdac<>guilin chen<>
8629<>3325_5<>mahmut t. kandemir:mary jane irwin:j. ramanujam<>reducing code size through address register assignment<>tecs<>guilin chen<>
8635<>3325_11<>mahmut t. kandemir:ibrahim kolcu<>memory-conscious reliable execution on embedded chip multiprocessors<>dsn<>guangyu chen<>
27735<>3333_0<>jonathan w. kelly:andrew c. beall:jack m. loomis:kristen l. macuga<>simultaneous measurement of steering performance and perceived heading on a curving path<>tap<>roy s. smith<>
41289<>3340_0<>wei zheng:yuhang wang:james ford:fillia makedon:justin d. pearlman<>neighboring feature clustering<>setn<>zhifeng wang<>
38297<>3346_0<>ge wang:wenxiang cong:weimin han:durai kumar:xin qian:haiou shen<>recent development in bioluminescence tomography<>isbi<>yi li<>
41294<>3348_0<>sheng xu<>systematic derivation of jump conditions for the immersed interface method in three-dimensional flow simulation<>siamsc<>z. jane wang<>
30812<>3350_0<>rana barua:satya r. chakravarty<>on the coleman indices of voting power<>eor<>sonali roy<>
27008<>3352_1<>hien m. nguyen:bradley p. sutton:minh n. do<>joint estimation in mri using harmonic retrieval methods<>isbi<>robert l. morrison jr.<>
27004<>3356_4<>mang lung cheuk<>a generalized cross-tabulation matrix to compare soft-classified maps at multiple resolutions<>gis<>robert gilmore pontius jr.<>
35699<>3366_3<>robert b. ellis:catherine h. yan<>on random points in the unit disk<>rsa<>xingde jia<>
35700<>3366_4<>weizhen gu:d. frank hsu<>on a network sensing problem<>join<>xingde jia<>
35714<>3374_0<>xiuzhen cheng:min ding:david hongwei du<>virtual backbone construction in multihop  wireless networks<>wicomm<>xiaohua jia<>
35703<>3375_0<>wenfei fan:floris geerts:anastasios kementsietsidis<>smoqe: a system for providing secure access to xml<>vldb<>xibei jia<>
16251<>3381_0<>joseph camp:christopher steger:edward w. knightly<>measurement driven deployment of a two-tier urban mesh access network<>mobisys<>joshua robinson<>
38267<>3394_0<>songtao guo:xintao wu<>on the lower bound of reconstruction error for spectral filtering based privacy preserving data mining<>pkdd<>yingjiu li<>
38268<>3394_1<>ling qiu:xintao wu<>an approach to outsourcing data mining tasks while protecting business intelligence and customer privacy<>icdm<>yingjiu li<>
38269<>3394_2<>robert huijie deng<>publicly verifiable ownership protection for relational databases<>ccs<>yingjiu li<>
38273<>3394_6<>haibing lu:robert h. deng<>practical inference control for data cubes (extended abstract)<>sp<>yingjiu li<>
38274<>3394_7<>songtao guo:xintao wu<>deriving private information from perturbed data using iqr based approach<>icde<>yingjiu li<>
38275<>3394_8<>haibing lu:xintao wu<>disclosure risk in dynamic two-dimensional contingency tables (extended abstract)<>iciss<>yingjiu li<>
38276<>3394_9<>jie guo:robert h. deng:kefei chen<>rights protection for data cubes<>isw<>yingjiu li<>
38277<>3394_10<>haibing lu:xintao wu<>disclosure analysis for two-way contingency tables<>psd<>yingjiu li<>
38259<>3395_6<>dorel lucanu:jin song dong<>semantic web languages - towards an institutional perspective<>birthday<>yuan-fang li<>
38261<>3395_8<>jing sun:gillian dobbie:jun sun:hai h. wang<>validating semistructured data using owl<>waim<>yuan-fang li<>
38262<>3395_9<>jing sun:gillian dobbie:hai h. wang:jun sun<>reasoning about ora-ss data models using the semantic web<>jods<>yuan-fang li<>
38264<>3395_11<>scott uk-jin lee:jing sun:gillian dobbie<>a z approach in validating ora-ss data models<>entcs<>yuan-fang li<>
38265<>3395_12<>gillian dobbie:jing sun:scott uk-jin lee<>research into verifying semistructured data<>icdcit<>yuan-fang li<>
9784<>3400_2<>aditya garg:rick kazman<>interface descriptions for enterprise architecture<>scp<>hong-mei chen<>
9801<>3406_0<>ying-ping chen<>ftxi: fault tolerance xcs in integer<>gecco<>hong-wei chen<>
9794<>3410_1<>shuoi wang<>near-optimal data allocation over multiple broadcast channels<>comcom<>hsing-lung chen<>
1148<>3411_9<>anders dessmark:pierre fraigniaud:dariusz r. kowalski<>deterministic rendezvous in graphs<>algorithmica<>andrzej pelc<>
1158<>3411_19<>michel paquette<>fast broadcasting with byzantine faults<>ijfcs<>andrzej pelc<>
1163<>3411_24<>michel paquette<>optimal decision strategies in byzantine environments<>jpdc<>andrzej pelc<>
1191<>3411_52<>nulo<>voting mechanisms in asynchronous byzantine environments<>ppl<>andrzej pelc<>
1192<>3411_53<>jurek czyzowicz:dariusz r. kowalski:euripides markou<>complexity of searching for a black hole<>fuin<>andrzej pelc<>
1199<>3411_60<>jurek czyzowicz:leszek gasieniec<>gathering few fat mobile robots in the plane<>opodis<>andrzej pelc<>
1216<>3411_77<>pierre fraigniaud:david ilcinkas<>tree exploration with an oracle<>mfcs<>andrzej pelc<>
1242<>3411_103<>leszek gasieniec:evangelos kranakis:qin xin<>deterministic m2m multicast in radio networks<>tcs<>andrzej pelc<>
1249<>3411_110<>tiziana calamoneri:rossella petreschi<>labeling trees with a condition at distance two<>dm<>andrzej pelc<>
1252<>3411_113<>pierre fraigniaud:leszek gasieniec:dariusz r. kowalski<>collective tree exploration<>networks<>andrzej pelc<>
1254<>3411_115<>gianluca de marco:luisa gargano:evangelos kranakis:danny krizanc:ugo vaccaro<>asynchronous deterministic rendezvous in graphs<>tcs<>andrzej pelc<>
1278<>3412_0<>ralf klasing:euripides markou<>gathering asynchronous oblivious mobile robots in a ring<>isaac<>andrzej pelc<>
9738<>3413_0<>ninghui li<>constraint generation for separation of duty<>sacmat<>hong chen<>
9732<>3414_0<>zoe abrams:leonidas j. guibas:jie liu:feng zhao<>kinetically stable task assignment for networks of microservers<>ipsn<>ho-lin chen<>
9734<>3414_2<>tim roughgarden<>network design with weighted players<>spaa<>ho-lin chen<>
9750<>3423_0<>zhaohui wu:heng wang:yuxin mao<>rdf/rdfs-based relational database integration<>icde<>huajun chen<>
27419<>3430_0<>erik g. learned-miller:qifeng lu:angela paisley:peter trainer:volker blanz:katrin dedden<>detecting acromegaly: screening for disease with a morphable model<>miccai<>ralph miller<>
1981<>3433_1<>nulo<>voice retrieval of mandarin broadcast news speech<>ijprai<>berlin chen<>
27400<>3438_3<>ariel fuxman:mauricio a. hernandez:c. t. howard ho:paolo papotti:lucian popa<>nested mappings: schema mapping reloaded<>vldb<>renee j. miller<>
1987<>3439_3<>yinyu ye:jiawei zhang<>lot-sizing scheduling with batch setup times<>scheduling<>bo chen<>
2010<>3441_0<>viacheslav fofanov:drew h. bryant:bradley d. dodson:david m. kristensen:andreas m. lisewski:marek kimmel:olivier lichtarge:lydia e. kavraki<>geometric sieving: automated distributed optimization of 3d motifs for protein function prediction<>recomb<>brian y. chen<>
2008<>3442_0<>george s. avrunin:lori a. clarke:leon j. osterweil<>automatic fault tree derivation from little-jil process definitions<>ispw<>bin chen<>
2009<>3442_1<>mohammad s. raunak:amr elssamadisy:lori a. clarke:leon j. osterweil<>definition and analysis of election processes<>ispw<>bin chen<>
2015<>3445_0<>lei chen 0003:raghu ramakrishnan:paul barford:vinod yegneswaran<>composite subset measures<>vldb<>bee-chung chen<>
2016<>3445_1<>raghu ramakrishnan:jude w. shavlik:pradeep tamma<>bellwether analysis: predicting global aggregates from local regions<>vldb<>bee-chung chen<>
2018<>3445_3<>vinod yegneswaran:paul barford:raghu ramakrishnan<>toward a query language for network attack data<>icde<>bee-chung chen<>
52<>3448_5<>marco bertini:walter nunziati<>video clip matching using mpeg-7 descriptors and edit distance<>civr<>alberto del bimbo<>
55<>3448_8<>marco bertini:carlo torniai<>automatic annotation and semantic retrieval of video sequences using multimedia ontologies<>mm<>alberto del bimbo<>
69<>3448_22<>lea landucci:alessandro valli<>multi-user natural interaction system based on real-time hand tracking and gesture recognition<>icpr<>alberto del bimbo<>
72<>3448_25<>carlo colombo:dario comanducci<>camera calibration with two arbitrary coaxial circles<>eccv<>alberto del bimbo<>
73<>3448_26<>marco bertini:g. d'amico:carlo torniai<>using knowledge representation languages for video annotation and retrieval<>fqas<>alberto del bimbo<>
89<>3448_42<>marco bertini:carlo torniai:rita cucchiara:costantino grana<>mom: multimedia ontology manager. a framework for automatic annotation and semantic retrieval of video sequences<>mm<>alberto del bimbo<>
91<>3448_44<>marco bertini:walter nunziati<>automatic detection of player's identity in soccer videos using faces and text cues<>mm<>alberto del bimbo<>
98<>3448_51<>stefano berretti:pietro pala<>automatic partitioning of 3d meshes<>ircdl<>alberto del bimbo<>
99<>3448_52<>pietro pala<>content-based retrieval of 3d models<>tomccap<>alberto del bimbo<>
100<>3448_53<>marco bertini:carlo torniai<>video annotation and retrieval with pictorially enriched ontologies<>ircdl<>alberto del bimbo<>
102<>3448_55<>federico pernici<>towards on-line saccade planning for high-resolution image sensing<>prl<>alberto del bimbo<>
103<>3448_56<>carlo colombo:dario comanducci<>a desktop 3d scanner exploiting rotation and visual rectification of laser profiles<>icvs<>alberto del bimbo<>
112<>3448_65<>marco bertini:rita cucchiara:andrea prati<>semantic adaptation of sport videos with user-centred performance analysis<>tmm<>alberto del bimbo<>
113<>3448_66<>david garcea-perez:antonio mosquera:stefano berretti<>object-based image retrieval using active nets<>icpr<>alberto del bimbo<>
119<>3448_72<>andrew d. bagdanov:walter nunziati<>improving evidential quality of surveillance imagery through active face tracking<>icpr<>alberto del bimbo<>
127<>3448_80<>stefano berretti<>modeling spatial relationships between 3d objects<>icpr<>alberto del bimbo<>
142<>3448_95<>david garcea-perez:stefano berretti:antonio mosquera<>topological active nets for object-based image retrieval<>iciar<>alberto del bimbo<>
151<>3448_104<>james z. wang:nozha boujemaa:donald geman:alexander g. hauptmann:jelena tesic<>diversity in multimedia information retrieval research<>mir<>alberto del bimbo<>
166<>3448_119<>stefano berretti:pietro pala<>description and retrieval of 3d face models using iso-geodesic stripes<>mir<>alberto del bimbo<>
30058<>3453_0<>qun liu<>interactive ground water (igw)<>envsoft<>shu-guang li<>
30060<>3454_1<>dominique sauter:christophe aubrun<>robust fault isolation filter design for networked control systems<>etfa<>shanbin li<>
30062<>3455_0<>guangzhong sun:guoliang chen<>improved algorithm for finding next-to-shortest paths<>ipl<>shisheng li<>
30067<>3456_4<>xuesong tan<>mixed preservation of conditionally nonblocking switches under 2-stage interconnection<>pdcat<>shuo-yen robert li<>
25457<>3458_4<>feng xue<>on the theta-coverage and connectivity of large random networks<>tit<>p. r. kumar<>
25448<>3459_1<>olaf hall-holt:matthew j. katz:joseph s. b. mitchell:arik sityon<>finding large sticks and potatoes in polygons<>soda<>piyush kumar<>
25446<>3460_0<>reza omrani<>codes for optical cdma<>seta<>p. vijay kumar<>
30072<>3465_0<>klaus mueller:marcel jackowski:donald p. dione:lawrence h. staib<>fast marching method to correct for refraction in ultrasound computed tomography<>isbi<>shengying li<>
30074<>3466_0<>xiangfeng wang:hang he:lei li:runsheng chen:xing wang deng<>nmpp: a user-customized nimblegen microarray data processing pipeline<>bioinformatics<>songgang li<>
30075<>3467_0<>ladan tahvildari<>a service-oriented componentization framework for java software systems<>wcre<>shimin li<>
30076<>3467_1<>mazeiar salehie:ladan tahvildari<>a metric-based heuristic framework to detect object-oriented design flaws<>iwpc<>shimin li<>
30077<>3467_2<>ladan tahvildari<>jcomp: a reuse-driven componentization framework for java applications<>iwpc<>shimin li<>
6018<>3470_0<>hanseok ko<>svm-based phoneme classification and lip shape refinement in real-time lip-synch system<>ijprai<>david k. han<>
20413<>3471_2<>chao cheng:xiaotu ma:xiting yan:fengzhu sun<>mard: a new method to detect differential gene expression in treatment-control time courses<>bioinformatics<>lei m. li<>
20405<>3472_0<>alexander l. strehl:eric wiewiora:john langford:michael l. littman<>pac model-free reinforcement learning<>icml<>lihong li<>
20406<>3472_1<>alexander l. strehl:michael l. littman<>incremental model-based learners with formal learning-time guarantees<>uai<>lihong li<>
20398<>3474_1<>nulo<>multiclass boosting with repartitioning<>icml<>ling li<>
20401<>3474_4<>hsuan-tien lin<>large-margin thresholded ensembles for ordinal regression: theory and practice<>alt<>ling li<>
20419<>3477_3<>weichun huang:david m. umbach<>accurate anchoring alignment of divergent sequences<>bioinformatics<>leping li<>
1029<>3478_0<>todd p. coleman:muriel medard:michelle effros<>low-complexity approaches to slepian-wolf near-lossless distributed data compression<>tit<>anna h. lee<>
20415<>3479_0<>xiangfeng wang:hang he:runsheng chen:xing wang deng:songgang li<>nmpp: a user-customized nimblegen microarray data processing pipeline<>bioinformatics<>lei li<>
4388<>3480_2<>wilfried jouve:julien lancia:charles consel<>a multimedia-specific approach to ws-agreement<>ecows<>calton pu<>
41034<>3481_0<>james broberg:cathy h. xia:li zhang<>a multicommodity flow model for distributed stream processing<>sigmetrics<>zhen liu<>
41035<>3481_1<>cathy h. xia:james broberg:li zhang<>distributed resource allocation in stream processing systems<>wdag<>zhen liu<>
41037<>3483_0<>zhiyun xue:rick blum:robert laganiere<>concealed weapon detection and visualization in a synthesized image<>paa<>zheng liu<>
19611<>3492_1<>jungeun kim:seonggun kim:hwansoo han<>restructuring field layouts for embedded memory systems<>date<>keoncheol shin<>
20390<>3494_0<>rahman azari:chih-ling tsai<>longitudinal data model selection<>csda<>lexin li<>
20393<>3494_3<>nulo<>survival prediction of diffuse large-b-cell lymphoma based on both clinical and gene expression information<>bioinformatics<>lexin li<>
35489<>3499_0<>ge gao:yingfu zhong:anyuan guo:qihui zhu:wen tang:weimou zheng:liping wei:jingchu luo<>drtf: a database of rice transcription factors<>bioinformatics<>xiaocheng gu<>
35465<>3507_0<>zefir kurtisi:lars c. wolf<>enabling network-centric music performance in wide-area networks<>cacm<>xiaoyuan gu<>
35466<>3507_1<>k. farkas:oliver wellnitz:matthias dick:marcel busse:wolfgang effelsberg:yacine rebahi:dorgham sisalem:dan grigoras:k. stefanidis:dimitrios n. serpanos<>real-time service provisioning for mobile and wireless networks<>comcom<>x. gu<>
35467<>3507_2<>pengfei di:lars c. wolf<>performance evaluation of dccp: a focus on smoothness and tcp-friendliness<>adt<>xiaoyuan gu<>
35462<>3508_0<>ying he:hong qin<>manifold splines<>cvgip<>xianfeng gu<>
35464<>3508_2<>miao jin:feng luo 0002<>computing surface hyperbolic structure and real projective structure<>sma<>xianfeng gu<>
35477<>3510_2<>thomas repantis:vana kalogeraki<>synergy: sharing-aware component composition for distributed stream processing systems<>middleware<>xiaohui gu<>
35484<>3510_9<>klara nahrstedt<>on composing stream applications in peer-to-peer environments<>tpds<>xiaohui gu<>
35485<>3516_0<>david r. gilbert:hendrik fus:richard j. orton:steve robinson:vladislav vyshemirsky:mary jo kurth:c. stephen downes:werner dubitzky<>"computational methodologies for modelling, analysis and simulation of signalling networks."<>bib<>xu gu<>
18068<>3526_37<>tomi janhunen:ilkka niemela:dietmar seipel:patrik simons<>unfolding partiality and disjunctions in stable model semantics<>tocl<>jia-huai you<>
10694<>3528_1<>micah beck:jian huang<>dynamic co-scheduling of distributed computation and replication<>ccgrid<>huadong liu<>
21115<>3530_2<>min zhang:shaoping ma<>the nature of novelty detection<>ir<>le zhao<>
21116<>3531_0<>srihari makineni:ravishankar r. iyer:partha sarangam:donald newell:ramesh illikkal:jaideep moses<>receive side coalescing for accelerating tcp/ip processing<>hipc<>li zhao<>
21118<>3531_2<>ravi r. iyer:mahesh bhat:ramesh illikkal:srihari makineni:michael jones:kumar shiv:donald newell<>exploring small-scale and large-scale cmp architectures for commercial java servers<>iiswc<>li zhao<>
21123<>3532_2<>jiu ding<>a strict approach to approximating lognormal sum distributions<>ccece<>lian zhao<>
10683<>3534_2<>mei lu:feng tian<>trees of extremal connectivity index<>dam<>huiqing liu<>
10690<>3537_1<>r. p. k. chan:geng sun<>efficient symplectic runge-kutta methods<>amc<>hongyu liu<>
21133<>3543_0<>siwei luo:yanchang zhao:lingzhi liao:zhihai wang<>regularized semi-supervised classification on manifold<>pakdd<>lianwei zhao<>
21134<>3543_1<>yanchang zhao:chengqi zhang:shichao zhang<>adapting k-means algorithm for discovering clusters in subspaces<>apweb<>lianwei zhao<>
21131<>3544_7<>keizo miyata:shigeru masuyama:shin-ichi nakayama<>np-hardness proof and an approximation algorithm for the minimum vertex ranking spanning tree problem<>dam<>liang zhao<>
21136<>3546_0<>suvrajeet sen<>a comparison of sample-path-based simulation-optimization and stochastic decomposition for multi-location transshipment problems<>wsc<>lei zhao<>
34453<>3552_11<>xiaotie deng:guanglin huang:anthony y. fu<>an antiphishing strategy based on visual similarity assessment<>internet<>wenyin liu<>
34436<>3554_0<>jose renau:karin strauss:luis ceze:smruti r. sarangi:james tuck:josep torrellas<>energy-efficient thread-level speculation<>micro<>wei liu<>
34439<>3554_3<>shan lu:pin zhou:yuanyuan zhou:josep torrellas<>pathexpander: architectural support for increasing the path coverage of dynamic bug detection<>micro<>wei liu<>
36134<>3557_0<>marta milo:neil d. lawrence:magnus rattray<>probe-level measurement error improves accuracy in detecting differential gene expression<>bioinformatics<>xuejun liu<>
36136<>3557_2<>magnus rattray:guido sanguinetti:marta milo:neil d. lawrence<>propagating uncertainty in microarray data analysis<>bib<>xuejun liu<>
36132<>3558_4<>seong-ryong kang:amit bhati:dmitri loguinov<>on estimating tight-link bandwidth characteristics over multi-hop paths<>icdcs<>xiliang liu<>
36156<>3559_0<>yunhao liu:li xiao<>improving query response delivery quality in peer-to-peer systems<>tpds<>xiaomei liu<>
36158<>3559_2<>li xiao:yunhao liu:wenjun gu:dong xuan<>mutual anonymous overlay multicast<>jpdc<>xiaomei liu<>
36160<>3559_4<>li xiao:wenjun gu:dong xuan:yunhao liu<>a design of overlay anonymous multicast protocol<>ipps<>xiaomei liu<>
36144<>3560_7<>yuantao peng<>low-power repeater insertion with both delay and slew rate constraints<>dac<>xun liu<>
36151<>3560_14<>yuantao peng:marios c. papaefthymiou<>practical repeater insertion for low power: what repeater library do we need?<>tcad<>xun liu<>
34465<>3561_0<>ken-hao liu:ming-syan chen<>hardware enhanced mining for association rules<>pakdd<>wei-chuan liu<>
36161<>3564_0<>veronica vinciotti:rolf turk:emile j. de meijer:peter a. c. 't hoen<>exploiting the full power of temporal gene expression profiling through a new statistical test: application to the analysis of muscular dystrophy data<>bmcbi<>xiaohui liu<>
36166<>3564_5<>michael hirsch:allan tucker:stephen swift:nigel j. martin:christine a. orengo:paul kellam<>improved robustness in time series analysis of gene expression data by polynomial model based clustering<>complife<>xiaohui liu<>
36169<>3564_8<>stephen swift:joost n. kok<>learning short multivariate time series models through evolutionary and sparse matrix computation<>nc<>xiaohui liu<>
36171<>3564_10<>weiguo sheng<>a genetic -medoids clustering algorithm<>heuristics<>xiaohui liu<>
24176<>3566_6<>yi chen:shilong wang<>reranking answers for definitional qa using language modeling<>acl<>ming zhou<>
24178<>3566_8<>qun zhang:zhimin chen<>what can be done to automate conceptual simulation modeling?<>wsc<>ming zhou<>
24179<>3566_9<>mu li:muhua zhu:yang zhang<>exploring distributional similarity based models for query spelling correction<>acl<>ming zhou<>
12215<>3568_0<>jeremy r. reynolds:todd s. braver:stefan van der stigchel<>computational and neural mechanisms of task switching<>ijon<>joshua w. brown<>
12216<>3578_0<>thomas l. vincent<>-functions for the hermeneutic circle of evolution<>cor<>joel s. brown<>
18284<>3583_2<>joan feigenbaum<>finding highly correlated pairs efficiently with powerful pruning<>cikm<>jian zhang<>
22472<>3584_7<>nulo<>circumferences of regular claw-free graphs<>dm<>mingchu li<>
22455<>3587_2<>baijian yang<>a survey on topology issues in wireless sensor network<>icwn<>mo li<>
22457<>3587_4<>jianfeng cai:yunhuai liu:jie lian:udo w. pooch:lionel m. ni<>truthful topology control inwireless ad hoc networks with selfish nodes<>icpp<>mo li<>
22450<>3588_0<>becky jie liu:frances f. yao<>min-energy voltage allocation for tree-structured tasks<>jco<>minming li<>
22383<>3592_2<>yuan jiang:zhi-hua zhou<>generation of comprehensible hypotheses from gene expression data<>pakdd<>ming li<>
22385<>3594_0<>vijay sahota:wenming guo<>resource monitoring with globus toolkit 4<>skg<>maozhen li<>
22389<>3594_4<>bin yu:chang huang:yong-hua song<>service matchmaking with rough sets<>ccgrid<>maozhen li<>
22392<>3594_7<>bin yu:man qi<>pgga: a predictable and grouped genetic algorithm for job scheduling<>fgcs<>maozhen li<>
22393<>3594_8<>bartosz kryza:lukasz skital:jacek kitowski:takebumi itagaki<>analysis of interoperability issues between egee and vega grid infrastructures<>hpcc<>maozhen li<>
22398<>3594_13<>bin yu:wenming guo:yong-hua song:peter hobson:man qi<>service matchmaking and discovery with rough sets<>skg<>maozhen li<>
18291<>3600_1<>betty h. c. cheng<>using temporal logic to specify adaptive program semantics<>jss<>ji zhang<>
18301<>3602_0<>guohong cao:dapeng wu:hongyi wu<>guest editorial<>monet<>junshan zhang<>
18303<>3605_0<>daniel caldeweyher:binh pham<>opencis - open source gis-based web community information system<>gis<>jinglan zhang<>
18305<>3609_1<>michael gertz:quinn hart:carlos rueda:shefali singhal<>a data and query model for streaming geospatial image data<>edbtw<>jie zhang<>
18308<>3611_0<>malgorzata chrzanowska-jeske:alan mishchenko:jerry r. burch<>linear cofactor relationships in boolean functions<>tcad<>jin s. zhang<>
18309<>3612_0<>ling-yun wu:xiang-sun zhang<>capacitated facility location problem with general setup cost<>cor<>ju-liang zhang<>
16600<>3619_9<>sandra de f. mendes sampaio:norman w. paton:paul watson<>measuring and modelling the performance of a parallel odmg compliant object database server<>concurrency<>jim smith<>
9271<>3620_6<>edwin k. p. chong:robert givan<>predictive buffer control in delivering remotely stored video using proxy servers<>cn<>gang wu<>
9275<>3620_10<>navneet panda:edward y. chang<>concept boundary detection for speeding up svms<>icml<>gang wu<>
9276<>3620_11<>kuo zhang:can liu:juan-zi li<>adapting prime number labeling scheme for directed acyclic graphs<>dasfaa<>gang wu<>
18319<>3622_0<>gang ding:zafer sahinoglu:philip v. orlik:bharat k. bhargava<>tree-based data broadcast in ieee 802.15.4 and zigbee networks<>tmc<>jinyun zhang<>
9285<>3623_2<>angsheng li:yan song<>universal cupping degrees<>tamc<>guohua wu<>
9289<>3623_6<>keng meng ng:frank stephan<>degrees of weakly computable reals<>cie<>guohua wu<>
9292<>3623_9<>angsheng li:yue yang<>on the quotient structure of computably enumerable degrees modulo the noncuppable ideal<>tamc<>guohua wu<>
9293<>3623_10<>nulo<>1-generic splittings of computably enumerable degrees<>apal<>guohua wu<>
9295<>3623_12<>zaiyue zhang:yuefei sui:cungen cao<>a formal fuzzy reasoning system and reasoning mechanism based on propositional modal logic<>tcs<>guohua wu<>
9296<>3623_13<>santiago figueira:frank stephan<>randomness and universal machines<>jc<>guohua wu<>
9299<>3623_16<>angsheng li:yue yang<>bounding computably enumerable degrees in the ershov hierarchy<>apal<>guohua wu<>
19970<>3624_0<>shu-fai wong:roberto cipolla<>robust appearance-based tracking using a sparse bayesian classifier<>icpr<>kwan-yee kenneth wong<>
18317<>3628_0<>shichao zhang:xiaofeng zhu:zifang huang<>identifying follow-correlation itemset-pairs<>icdm<>jilian zhang<>
19973<>3630_0<>minas e. spetsakis<>tracking based motion segmentation under relaxed statistical assumptions<>cviu<>king yuen wong<>
19974<>3633_0<>edward c. w. lee:l. m. cheng:xiaofeng liao<>fast elliptic scalar multiplication using new double-base chain and point halving<>amc<>k. w. wong<>
6976<>3638_0<>a. m. albadri:r. d. schrimpf:k. f. galloway<>single event burnout in power diodes: mechanisms and models<>mr<>d. g. walker<>
9140<>3639_1<>guohong cao:thomas f. la porta<>movement-assisted sensor deployment<>tmc<>guiling wang<>
9138<>3640_0<>jennifer jie xu:hsinchun chen<>using social contextual information to match criminal identities<>hicss<>g. alan wang<>
9143<>3641_0<>tien-tsin wong:pheng-ann heng<>gpu-friendly warped display for scope-maintained video surveillance<>mms<>guangyu wang<>
9144<>3641_1<>tien-tsin wong:pheng-ann heng<>deringing cartoons by image analogies<>tog<>guangyu wang<>
9111<>3643_2<>nulo<>generic non-repudiation protocols supporting transparent off-line ttp<>jcs<>guilin wang<>
9122<>3643_13<>feng bao<>cryptanalysis of timestamp-based password authentication schemes using smart cards<>icics<>guilin wang<>
9125<>3643_16<>feng bao:jianying zhou<>the fairness of perfect concurrent signatures<>icics<>guilin wang<>
9130<>3643_21<>min-hua shao:jianying zhou<>some common attacks against certified email protocols and the countermeasures<>comcom<>guilin wang<>
9134<>3645_0<>pu wang:jianyu yang:zhi-lin zhang:quanyi mo<>a signal-dependent quadratic time frequency distribution for neural source estimation<>isnn<>gang wang<>
37169<>3647_1<>rakesh vattikonda:wenping wang<>modeling and minimization of pmos nbti effect for robust nanometer design<>dac<>yu cao<>
37170<>3647_2<>huifang qin:rakesh vattikonda:thuan trinh:jan m. rabaey<>sram cell optimization for ultra-low power standby<>jolpe<>yu cao<>
9102<>3648_0<>fei xie:haitao gong:donghua deng:shu wang:jicheng hu:phillip c.-y. sheu<>integrating semantic web services for declarative accesses in natural language<>ism<>george t. wang<>
9104<>3650_0<>wenrui gong:brian derenzi:ryan kastner<>design space exploration using time and resource duality with the ant colony optimization<>dac<>gang wang<>
9105<>3650_1<>wenrui gong:ryan kastner<>defect-tolerant nanocomputing using bloom filters<>fccm<>gang wang<>
9107<>3650_3<>wenrui gong:ryan kastner<>on the use of bloom filters for defect maps in nanocomputing<>iccad<>gang wang<>
37173<>3651_0<>sarvesh bhardwaj:sarma b. k. vrudhula:praveen ghanta<>modeling of intra-die process variations for accurate analysis and optimization of nano-scale circuits<>dac<>yu cao<>
37176<>3652_1<>ari shapiro:petros faloutsos<>style components<>graphicsinterface<>yong cao<>
37179<>3655_0<>oliver yu<>optimization of loss-balanced multicast in all-optical wdm networks<>jco<>yuan cao<>
37180<>3655_1<>oliver yu:anfei li:leping yin:ming liao:huan xu<>multi-domain lambda grid data portal for collaborative grid applications<>fgcs<>yuan cao<>
16581<>3660_1<>enock chisonge mofya<>exact and heuristic algorithms for solving the generalized minimum filter placement problem<>jco<>jonathan cole smith<>
16582<>3660_2<>hanif d. sherali<>a polyhedral study of the generalized vertex packing problem<>mp<>jonathan cole smith<>
16568<>3662_2<>muhammad atif tahir<>improving nearest neighbor classifier using tabu search and ensemble distance metrics<>icdm<>james smith<>
32134<>3672_0<>luca aceto:wan fokkink:anna ingolfsdottir<>on the axiomatizability of priority<>icalp<>taolue chen<>
32137<>3672_3<>tingting han:jian lu<>on the complete axiomatization for prefix iteration modulo observation congruence<>actaC<>taolue chen<>
32140<>3672_6<>tingting han:jian lu<>on the markovian randomized strategy of controller for markov decision processes<>fskd<>taolue chen<>
32141<>3672_7<>wan fokkink:sumit nain<>on finite alphabets and infinite bases ii: completed and ready simulation<>fossacs<>taolue chen<>
32143<>3672_9<>wan fokkink<>on finite alphabets and infinite bases iii: simulation<>concur<>taolue chen<>
30093<>3676_3<>chengqing li:der-chyuan lou:dan zhang<>on the security of the yen-guo's domino signal encryption algorithm (dsea)<>jss<>shujun li<>
32124<>3681_13<>nen-chung wang<>task migration in all-port wormhole-routed 2d mesh multicomputers<>isci<>tzung-shi chen<>
32125<>3681_14<>hua-wen tsai:chih-ping chu<>gathering-load-balanced tree protocol for wireless sensor networks<>sutc<>tzung-shi chen<>
13828<>3684_1<>yinpeng chen:he huang:weiwei xu:richard isaac wallis:hari sundaram:thanassis rikakis:todd ingalls:loren olson<>"the design of a real-time, multimodal biofeedback system for stroke patient rehabilitation."<>mm<>jiping he<>
13831<>3684_4<>yinpeng chen:weiwei xu:richard isaac wallis:hari sundaram:thanassis rikakis:todd ingalls:loren olson<>"a real-time, multimodal biofeedback system for stroke patient rehabilitation."<>mm<>jiping he<>
32092<>3690_3<>zhidong tu:li wang:michelle n. arbeitman:fengzhu sun<>an integrative approach for causal gene identification and gene regulatory pathway inference<>ismb<>ting chen<>
32095<>3690_6<>rajarshi guha:debojyoti dutta:peter c. jurs<>local lazy regression: making use of the neighborhood to improve qsar predictions<>jcisd<>ting chen<>
32108<>3690_19<>debojyoti dutta:rajarshi guha:peter c. jurs<>scalable partitioning and exploration of chemical spaces using geometric hashing<>jcisd<>ting chen<>
32088<>3691_1<>michael goesele:hans-peter seidel<>mesostructure from specularity<>cvpr<>tongbo chen<>
25957<>3694_0<>gunadi setiwan:samuel iskander:salil s. kanhere:kun-chan lan<>feasibility study of using mobile gateways for providing internet connectivity in public transportation vehicles<>iwcmc<>quan jun chen<>
25954<>3696_0<>yi-ping phoebe chen:chengqi zhang:lianggang li<>mining frequent itemsets for protein kinase regulation<>pricai<>qingfeng chen<>
25955<>3696_1<>yi-ping phoebe chen:shichao zhang:chengqi zhang<>detecting collusion attacks in security protocols<>apweb<>qingfeng chen<>
21989<>3697_4<>francis r. bach<>"learning spectral clustering, with application to speech separation."<>jmlr<>michael i. jordan<>
34135<>3700_0<>nulo<>community informatics and human development<>otm<>william j. mciver jr.<>
33201<>3711_2<>liang guo:abhik roychoudhury<>accurately choosing execution runs for software fault localization<>cc<>tao wang<>
33197<>3713_0<>nulo<>possibilistic c-template clustering and its application in object detection in images<>psivt<>tsaipei wang<>
33198<>3713_1<>jau hong kao:jen hui chuang<>automatic chromosome classification using medial axis approximation and band profile similarity<>accv<>tsai pei wang<>
36784<>3721_0<>jonathan f. bard<>comparative approaches to equipment scheduling in high volume factories<>cor<>xinhui zhang<>
36778<>3722_1<>xiaohua zhou:xiaohua hu<>semantic smoothing for model-based document clustering<>icdm<>xiaodan zhang<>
36779<>3722_2<>xiaohua hu:xiaohua zhou<>integration of cluster ensemble and em based text mining for microarray gene cluster identification and annotation<>cikm<>xiaodan zhang<>
36780<>3722_3<>xiaohua hu:illhoi yoo:yanqing zhang<>a semantic approach for mining hidden links from complementary and non-interactive biomedical literature<>sdm<>xiaodan zhang<>
36781<>3722_4<>xiaohua zhou:xiaohua hu:xia lin:il-yeol song<>context-sensitive semantic smoothing for the language modeling approach to genomic ir<>sigir<>xiaodan zhang<>
36782<>3722_5<>daniel duanqing wu:xiaohua zhou:xiaohua hu<>a language modeling text mining approach to the annotation of protein community<>bibe<>xiaodan zhang<>
36783<>3722_6<>xiaohua zhou:xiaohua hu:guangren li:xia lin<>relation-based document retrieval for biomedical ir<>tcsb<>xiaodan zhang<>
8406<>3723_2<>xin zhou:carlo zaniolo<>using xml to build efficient transaction-time temporal database systems on relational databases<>icde<>fusheng wang<>
8408<>3723_4<>xin zhou:carlo zaniolo<>bridging relational database history and the web: the xml approach<>widm<>fusheng wang<>
8411<>3723_7<>peiya liu:john pearson:fred azar:gerald madlmayr<>experiment management with metadata-based integration for collaborative scientific research<>icde<>fusheng wang<>
8415<>3723_11<>shaorong liu:peiya liu:yijian bai<>bridging physical and virtual worlds: complex event processing for rfid data streams<>edbt<>fusheng wang<>
8418<>3723_14<>xin zhou:carlo zaniolo<>efficient temporal coalescing query support in relational database systems<>dexa<>fusheng wang<>
8419<>3723_15<>yijian bai:peiya liu<>efficiently filtering rfid data streams<>cleandb<>fusheng wang<>
8423<>3723_19<>shaorong liu:peiya liu<>integrated rfid data modeling: an approach for querying physical objects in pervasive computing<>cikm<>fusheng wang<>
36768<>3726_9<>jian zhou<>video event detection using ica mixture hidden markov models<>icip<>xiao-ping zhang<>
36769<>3726_10<>h. yuan<>multiscale fragile watermarking based on the gaussian mixture model<>tip<>x.-p. zhang<>
36785<>3727_0<>wei wang<>mining coherent patterns from heterogeneous microarray data<>cikm<>xiang zhang<>
35013<>3728_3<>premachandran r. menon:russell tessier<>design-specific path delay testing in lookup-table-based fpgas<>tcad<>weifeng xu<>
36749<>3729_1<>neelam gupta:rajiv gupta<>locating faults through automated predicate switching<>icse<>xiangyu zhang<>
36751<>3729_3<>neelam gupta:rajiv gupta<>pruning dynamic slices with confidence<>pldi<>xiangyu zhang<>
36743<>3731_0<>kai zheng:hao che:zhijun wang:bin liu<>dppc-re: tcam-based distributed parallel packet classification with range encoding<>tc<>xin zhang<>
36737<>3732_10<>pauline lienhua chou:kotagiri ramamohanarao<>computing iceberg quotient cubes with bounding<>dawak<>xiuzhen zhang<>
34988<>3734_2<>dan kong:mei han:hai tao:yihong gong<>a conditional random field model for video super-resolution<>icpr<>wei xu<>
34990<>3734_4<>xiang ji<>document clustering with prior knowledge<>sigir<>wei xu<>
34994<>3734_8<>mei han:yihong gong<>video object segmentation by motion-based sequential feature clustering<>mm<>wei xu<>
34996<>3737_0<>solomon w. golomb:r. mena<>optimal interleaving schemes for two-dimensional arrays<>tit<>w.-q. xu<>
18271<>3738_3<>hongfang liu:zhang-zhi hu:cathy h. wu<>biothesaurus: a web-based thesaurus of protein and gene names<>bioinformatics<>jian zhang<>
880<>3739_1<>paul d. amer:randall r. stewart<>rethinking end-to-end failover with transport layer multihoming<>adt<>armando l. caro jr.<>
881<>3739_2<>paul d. amer:randall r. stewart<>retransmission policies for multihomed transport protocols<>comcom<>armando l. caro jr.<>
18263<>3741_1<>pearl pu<>a comparative study of compound critique generation in conversational recommender systems<>ah<>jiyong zhang<>
18265<>3741_3<>pearl pu:boi faltings<>agile decision agent for service-oriented e-commerce systems<>wecwis<>jiyong zhang<>
34983<>3743_1<>ke ma:wade trappe:yanyong zhang<>jamming sensor networks: attack and defense strategies<>network<>wenyuan xu<>
34984<>3743_2<>wade trappe:yanyong zhang<>channel surfing: defending wireless sensor networks from jamming and interference<>sensys<>wenyuan xu<>
35007<>3745_1<>v. n. venkatakrishnan:r. sekar:i. v. ramakrishnan<>a framework for building privacy-conscious composite web services<>icws<>wei xu<>
35008<>3745_2<>v. n. venkatakrishnan:daniel c. duvarney:r. sekar<>provably correct runtime enforcement of non-interference properties<>icics<>wei xu<>
18248<>3748_0<>lakshmish ramaswamy:ling liu<>efficient formation of edge cache groups for dynamic content delivery<>icdcs<>jianjun zhang<>
35000<>3749_1<>rui mao:shu wang:daniel p. miranker<>on integrating peptide sequence analysis and relational distance-based indexing<>bibe<>weijia xu<>
35003<>3751_0<>dianxiang xu<>state-based incremental testing of aspect-oriented programs<>aosd<>weifeng xu<>
18241<>3757_3<>jiebo luo:robert t. collins:yanxi liu<>body localization in still images using hierarchical models and hybrid search<>cvpr<>jiayong zhang<>
33224<>3758_0<>jieping ye<>"regularized discriminant analysis for high dimensional, low sample size data."<>kdd<>tie wang<>
33228<>3760_1<>adam milstein<>localization with dynamic motion models - determining motion model parameters dynamically in monte carlo localization<>icinco<>tao wang<>
505<>3763_0<>christina chavez:thais vasconcelos batista:claudio sant'anna:uira kulesza:awais rashid:carlos jose pereira de lucena<>on the modular representation of architectural aspects<>ewsa<>alessandro garcia<>
507<>3763_2<>christina chavez:ricardo choren<>enhancing agent-oriented models with aspects<>atal<>alessandro f. garcia<>
508<>3763_3<>uira kulesza:vander alves:carlos jose pereira de lucena:paulo borba<>improving extensibility of object-oriented frameworks with aspect-oriented programming<>icsr<>alessandro f. garcia<>
513<>3763_8<>uira kulesza:carlos jose pereira de lucena:paulo s. c. alencar<>customizing aspect-oriented variabilities using generative techniques<>seke<>alessandro garcia<>
515<>3763_10<>claudio sant'anna:cidiane lobato:uira kulesza:christina chavez:carlos jose pereira de lucena<>on the quantitative assessment of modular multi-agent architectures<>massa<>alessandro garcia<>
518<>3763_13<>nelio cacho:thais vasconcelos batista:claudio sant'anna:gordon s. blair<>improving modularity of reflective middleware with aspect-oriented programming<>edo<>alessandro garcia<>
520<>3763_15<>carlos jose pereira de lucena<>software engineering for multi-agent systems<>csse<>alessandro garcia<>
13952<>3766_1<>zhuo feng:peng li<>efficient model update for general link-insertion networks<>isqed<>jiang hu<>
13957<>3766_6<>weixiang shen:yici cai:xianlong hong:bing lu<>high performance clock routing in x-architecture<>iscas<>jiang hu<>
13958<>3766_7<>di wu:rabi n. mahapatra<>antenna avoidance in layer assignment<>tcad<>jiang hu<>
13965<>3766_14<>shiyan hu:qiuyang li:peng li<>steiner network construction for timing critical nets<>dac<>jiang hu<>
13968<>3766_17<>ganesh venkataraman:frank liu:cliff n. sze<>integrated placement and skew optimization for rotary clocking<>date<>jiang hu<>
13974<>3766_23<>charles j. alpert:sachin s. sapatnekar:cliff n. sze<>accurate estimation of global buffer delay within a floorplan<>tcad<>jiang hu<>
13977<>3766_26<>zhanyuan jiang:shiyan hu:zhuo li:weiping shi<>a new rlc buffer insertion algorithm<>iccad<>jiang hu<>
13980<>3766_29<>min-seok kim<>associative skew clock routing for difficult instances<>date<>jiang hu<>
13981<>3766_30<>cheng zhuo:kangsheng chen<>an improved amg-based method for fast power grid analysis<>isqed<>jiang hu<>
13982<>3766_31<>shiyan hu:charles j. alpert:shrirang k. karandikar:zhuo li:weiping shi:cliff n. sze<>fast algorithms for slew constrained minimum cost buffering<>dac<>jiang hu<>
13985<>3766_34<>rupak samanta:ganesh venkataraman<>clock buffer polarity assignment for power noise reduction<>iccad<>jiang hu<>
13988<>3766_37<>ganesh venkataraman:zhuo feng:peng li<>combinatorial algorithms for fast clock mesh optimization<>iccad<>jiang hu<>
13993<>3766_42<>ke cao:sorin dobre<>standard cell characterization considering lithography induced variations<>dac<>jiang hu<>
14017<>3767_4<>fengling han:xinghuo yu<>a biometric encryption approach incorporating fingerprint indexing in key generation<>icic<>jiankun hu<>
14020<>3767_7<>fengling han:xinhuo yu:yong feng:jie zhou<>a novel hybrid crypto-biometric authentication scheme for atm based banking applications<>icb<>jiankun hu<>
14005<>3768_9<>shuai wang:sotirios g. ziavras<>in-register duplication: exploiting narrow-width value for improving register file reliability<>dsn<>jie hu<>
14026<>3769_1<>wen xu:karel kreijns<>designing social navigation for a virtual community of practice<>edutainment<>jun hu<>
14030<>3769_5<>loe m. g. feijs<>ipml: extending smil for distributed multimedia presentations<>vsmm<>jun hu<>
8358<>3772_97<>nulo<>beware of the model: reflections on algorithmic research<>ciac<>franco p. preparata<>
8359<>3772_98<>nulo<>the unpredictable deviousness of models<>cocoon<>franco p. preparata<>
2904<>3773_2<>jin-wu nam:jinhan kim:sung-kyu kim<>"promir ii: a web server for the probabilistic prediction of clustered, nonclustered, conserved and nonconserved micrornas."<>nar<>byoung-tak zhang<>
2906<>3773_4<>dong-yeon cho:kwang-hyun cho<>identification of biochemical networks by s-tree based genetic programming<>bioinformatics<>byoung-tak zhang<>
2899<>3774_0<>yan-guo wang:hong qiao<>convergence of a new decomposition algorithm for support vector machines<>icic<>bo zhang<>
2901<>3774_2<>anhua wan:hong qiao:weihua mao<>new results for global exponential stability of delayed cohen-grossberg neural networks<>icic<>bo zhang<>
2889<>3778_2<>dan pei:daniel massey:lixia zhang<>an analysis of convergence delay in path vector routing protocols<>cn<>beichuan zhang<>
2890<>3778_3<>wenjie wang:sugih jamin:daniel massey:lixia zhang<>universal ip multicast delivery<>cn<>beichuan zhang<>
2891<>3778_4<>ricardo oliveira:dan pei:rafit izhak-ratzin:lixia zhang<>quantifying path exploration in the internet<>imc<>beichuan zhang<>
32588<>3781_33<>jing xiao:bogdan georgescu:xiang zhou:dorin comaniciu<>simultaneous registration and modeling of deformable shapes<>cvpr<>takeo kanade<>
32596<>3781_41<>goksel dedeoglu:simon baker<>resolution-aware fitting of active appearance models to low resolution images<>eccv<>takeo kanade<>
32606<>3781_51<>jing xiao:jinxiang chai<>a closed-form solution to non-rigid shape and motion recovery<>ijcv<>takeo kanade<>
32609<>3781_54<>fernando de la torre<>discriminative cluster analysis<>icml<>takeo kanade<>
32615<>3781_60<>qifa ke<>uncertainty models in quasiconvex optimization for geometric reconstruction<>cvpr<>takeo kanade<>
32641<>3781_86<>carlos vallespi:fernando de la torre:manuela m. veloso<>automatic clustering of faces in meetings<>icip<>takeo kanade<>
2854<>3784_1<>ning liu:shuzhen nong:jun yan:zheng chen:ying li<>similarity of temporal query logs based on arima model<>icdm<>benyu zhang<>
2856<>3784_3<>jun yan:ning liu:qiang yang:qiansheng cheng:zheng chen<>mining adaptive ratio rules from distributed data sources<>datamine<>benyu zhang<>
2861<>3784_8<>jun yan:ning liu:qiang yang:shuicheng yan:zheng chen<>a novel scalable algorithm for supervised subspace learning<>icdm<>benyu zhang<>
2868<>3784_15<>hua li:dou shen:zheng chen:qiang yang<>adding semantics to email clustering<>icdm<>benyu zhang<>
2875<>3784_22<>jun yan:shuicheng yan:ning liu:qiang yang:qiansheng cheng:hua li:zheng chen:wei-ying ma<>a scalable supervised algorithm for dimensionality reduction on streaming data<>isci<>benyu zhang<>
2878<>3784_25<>jun yan:ning liu:shuicheng yan:qiansheng cheng:weiguo fan:qiang yang:wensi xi:zheng chen<>effective and efficient dimensionality reduction for large-scale and streaming data preprocessing<>tkde<>benyu zhang<>
2880<>3784_27<>ning liu:shuzhen nong:jun yan:zheng chen:ying li<>similarity of temporal query logs based on arima model<>icdm<>benyu zhang<>
18479<>3787_0<>baoxin li<>image rectification for stereoscopic visualization without 3d glasses<>civr<>jin zhou<>
14043<>3788_0<>guoyin wang:qinghua zhang:xianquan liu<>attribute reduction based on granular computing<>rsctc<>jun hu<>
14038<>3789_7<>fei pan:kiran kamath:kangyu zhang:sudip pulapura:avinash achar:juan nunez-iglesias:yu huang 0003:xifeng yan:jiawei han:haiyan hu:min xu:xianghong jasmine zhou<>integrative array analyzer: a software package for analysis of cross-platform and cross-species microarray data<>bioinformatics<>jianjun hu<>
36621<>3791_0<>nulo<>normal based subdivision scheme for curve design<>cagd<>xunnian yang<>
36625<>3791_4<>weiping yang<>cone spline approximation via fat conic spline fitting<>cad<>xunnian yang<>
36620<>3792_6<>jian su:chew lim tan<>kernel-based pronoun resolution with structured syntactic knowledge<>acl<>xiaofeng yang<>
36606<>3793_2<>nitin h. vaidya<>a wireless mac protocol using implicit pipelining<>tmc<>xue yang<>
36610<>3793_6<>nitin h. vaidya<>priority scheduling in wireless ad hoc networks<>winet<>xue yang<>
36612<>3793_8<>nitin h. vaidya:priya ravichandran<>split-channel pipelined packet scheduling for wireless networks<>tmc<>xue yang<>
36613<>3793_9<>romit roy choudhury:ram ramanathan:nitin h. vaidya<>on designing mac protocols for wireless networks using directional antennas<>tmc<>xue yang<>
39909<>3799_0<>yang yu<>rdt properties and evaluations<>itng<>yulu yang<>
39917<>3802_2<>bao-liang lu<>prediction of protein subcellular multi-locations with a min-max modular support vector machine<>isnn<>yang yang<>
39918<>3803_0<>yang liu:helmut pottmann:johannes wallner:wenping wang<>geometric modeling with conical meshes and developable surfaces<>tog<>yong-liang yang<>
16968<>3805_0<>changsung kang<>inequality constraints in causal models with hidden variables<>uai<>jin tian<>
16965<>3806_1<>kai-kuang ma<>markov chain monte carlo super-resolution image reconstruction with simultaneous adaptation of the prior image model<>pcm<>jing tian<>
16960<>3808_1<>dekun zou:jeffrey bloom:jiefu zhai<>data hiding in film grain<>iwdw<>jun tian<>
16948<>3812_23<>li ma<>web testing for reliability improvement<>ac<>jeff tian<>
39921<>3813_0<>meng-ting lu:homer h. chen<>smooth playout control for video streaming over error-prone channels<>ism<>yi-hsuan yang<>
39922<>3813_1<>chia chu liu:homer h. chen<>music emotion classification: a fuzzy approach<>mm<>yi-hsuan yang<>
39923<>3813_2<>chia chu liu:ping-hao wu:homer h. chen<>detecting and classifying emotion in popular music<>jcis<>yi-hsuan yang<>
39925<>3814_1<>rocky dunlap:mike rexroad:brian f. cooper<>performance of full text search in structured and unstructured peer-to-peer systems<>infocom<>yong yang<>
39926<>3814_2<>wanxia xie:shamkant b. navathe:sushil k. prasad:david fisher<>optimizing peer virtualization and load balancing<>dasfaa<>yong yang<>
39931<>3817_0<>kay chen tan:chi keong goh:t. h. lee<>evolving better population distribution and exploration in evolutionary multi-objective optimization<>eor<>y. j. yang<>
39929<>3819_0<>jian feng xu:chee kiong soh<>an evolutionary programming algorithm for continuous global optimization<>eor<>yao wen yang<>
39935<>3820_0<>yi liu:pascale fung:christopher cieri:shudong huang:david graff<>hkust/mts: a very large scale mandarin telephone speech corpus<>iscslp<>yongsheng yang<>
14318<>3827_0<>sungbo seo:dongwon lee:keun ho ryu<>multivariate stream data classification using simple text classifiers<>dexa<>jaewoo kang<>
14323<>3827_5<>bin song:jeong-hyeon choi:guangyu chen:jacek szymanski:guo-qiang zhang:anthony k. h. tung:sun kim:jiong yang<>arcs: an aggregated related column scoring scheme for aligned sequences<>bioinformatics<>jaewoo kang<>
14330<>3831_1<>vijay gandhi:shashi shekhar:junchang ju:eric d. kolaczyk:sucharita gopal<>context-inclusive approach to speed-up function evaluation for statistical queries : an extended abstract<>icdm<>james m. kang<>
1432<>3835_1<>nulo<>probabilities of therapeutic extinction of hiv<>appml<>arni s. r. srinivasa rao<>
13286<>3836_0<>hendrik jan hoogeboom<>nested pebbles and transitive closure<>stacs<>joost engelfriet<>
13289<>3836_3<>andreas brandstadt:hoang-oanh le:vadim v. lozin<>clique-width for 4-vertex forbidden subgraphs<>mst<>joost engelfriet<>
13295<>3836_9<>sebastian maneth<>the equivalence problem for deterministic mso tree transducers is decidable<>ipl<>joost engelfriet<>
1434<>3839_0<>nulo<>the number of reachable pairs in a digraph<>dm<>a. r. rao<>
18113<>3845_0<>cunsheng ding<>secret sharing schemes from three classes of linear codes<>tit<>jin yuan<>
18116<>3845_3<>claude carlet:cunsheng ding<>the weight distribution of a class of linear codes from perfect nonlinear functions<>tit<>jin yuan<>
26723<>3849_0<>j. li<>structure from planar motion<>tip<>r. chellappa<>
18103<>3850_0<>aifeng yang<>partition the vertices of a graph into one independent set and one acyclic set<>dm<>jinjiang yuan<>
18107<>3850_4<>weiping shang<>upper minus domination in a claw-free cubic graph<>dm<>jinjiang yuan<>
15352<>3851_6<>j. e. rougui:m. rziza:driss aboutajdine:marc gelgon<>hierarchical organization of a set of gaussian mixture speaker models for scaling up indexing and retrieval in audio documents<>sac<>jose martinez<>
36523<>3854_0<>kaile su:huijing huang:shichao zhang<>a logical framework for identifying quality knowledge from different data sources<>dss<>xindong wu<>
36527<>3854_4<>dacheng tao:xiaoou tang:xuelong li<>asymmetric bagging and random subspace for support vector machines-based relevance feedback in image retrieval<>pami<>xindong wu<>
28695<>3862_4<>ing-ray chen:baoshan gu<>on integrated location and service management for minimizing network cost in personal communication systems<>tmc<>sheng-tzong cheng<>
36540<>3863_0<>shu lei:wang jin:jinsung cho:sungyoung lee<>energy-efficient deployment of mobile sensor networks by pso<>apweb<>xiaoling wu<>
28664<>3867_0<>zhixin liu:angelos d. liveris:zixiang xiong<>slepian-wolf coded nested lattice quantization for wyner-ziv coding: high-rate performance analysis and code design<>tit<>s. cheng<>
28666<>3867_2<>hyohoon choi:qiang wu:kenneth r. castleman<>extended depth-of-field microscope imaging: mpp image fusion vs. wavefront coding<>icip<>samuel cheng<>
28671<>3867_7<>v. m. stankovic:zixiang xiong<>on dualities in multiterminal coding problems<>tit<>s. cheng<>
27572<>3877_21<>anhai doan:fei chen:pedro derose:yoonkyong lee:robert mccann:mayssam sayyadian:warren shen<>community information management<>debu<>raghu ramakrishnan<>
6149<>3878_3<>tim stack:russ fish:daniel montrallo flickinger:leigh stoller:robert ricci:jay lepreau<>mobile emulab: a robotic wireless and sensor network testbed<>infocom<>david johnson<>
6130<>3886_1<>michael l. parks:eric de sturler:greg mackey:spandan maiti<>recycling krylov subspaces for sequences of linear systems<>siamsc<>duane d. johnson<>
6136<>3888_5<>joon-kyung seong:elaine cohen<>a higher dimensional formulation for robust and interactive distance queries<>sma<>david e. johnson<>
6142<>3889_2<>jorjeta g. jetcheva<>routing characteristics of ad hoc networks with unidirectional links<>adhoc<>david b. johnson<>
6078<>3890_15<>janos csirik:claire kenyon:james b. orlin:peter w. shor:richard r. weber<>on the sum-of-squares algorithm for bin packing<>jacm<>david s. johnson<>
38157<>3894_22<>okehee goh:ziad kaakani:elliott rachlin<>integrated scheduling with garbage collection for real-time embedded applications in cli<>isorc<>yann-hang lee<>
38133<>3895_0<>yoo-joo choi:jungho yoon:byung-gook lee:young j. kim<>a new class of non-stationary interpolatory subdivision schemes based on exponential polynomials<>gmp<>yeon ju lee<>
38134<>3895_1<>sung woo choi:byung-gook lee:jungho yoon<>stationary subdivision schemes reproducing polynomials<>cagd<>yeon ju lee<>
37643<>3896_0<>kaishun wang<>deza digraphs<>ejc<>yan-quan feng<>
37640<>3898_5<>nulo<>automorphism groups of cayley graphs on symmetric groups with generating transposition sets<>jct<>yan-quan feng<>
38194<>3903_7<>seunglak choi:sekyung huh:su myeon kim:junehwa song<>a scalable update management mechanism for query result caching systems at database-driven web sites<>apweb<>yoon-joon lee<>
20608<>3906_0<>liqing zhang:wenlu yang<>local independent factorization of natural scenes<>isnn<>libo ma<>
16839<>3908_0<>xuanhui wang:zheng chen:chengxiang zhai<>latent semantic analysis for multiple-type interrelated data objects<>sigir<>jian-tao sun<>
16842<>3908_3<>shen huang:xuanhui wang:hua-jun zeng:zheng chen<>subjectivity categorization of weblog with part-of-speech based smoothing<>icdm<>jian-tao sun<>
16844<>3908_5<>dou shen:qiang yang:zheng chen<>latent friend mining from blog data<>icdm<>jian-tao sun<>
16845<>3908_6<>dou shen:qiang yang:zheng chen<>text classification improved through multigram models<>cikm<>jian-tao sun<>
16846<>3908_7<>dou shen:rong pan:jeffrey junfeng pan:kangheng wu:jie yin:qiang yang<>query enrichment for web-query classification<>tois<>jian-tao sun<>
16848<>3908_9<>xuanhui wang:dou shen:hua-jun zeng:zheng chen<>mining clickthrough data for collaborative web search<>www<>jian-tao sun<>
16850<>3908_11<>dou shen:qiang yang:zheng chen<>building bridges for web query classification<>sigir<>jian-tao sun<>
16851<>3908_12<>xuanhui wang:dou shen:hua-jun zeng:zheng chen<>cws: a comparative web search system<>www<>jian-tao sun<>
16852<>3908_13<>dou shen:qiang yang:zheng chen<>a comparison of implicit and explicit links for web page classification<>www<>jian-tao sun<>
16853<>3908_14<>dou shen:qiang yang:hui zhao:zheng chen<>text classification improved through automatically extracted sequences<>icde<>jian-tao sun<>
16854<>3908_15<>dou shen:qiang yang:zheng chen<>thread detection in dynamic text message streams<>sigir<>jian-tao sun<>
20606<>3910_0<>jian ma:zhi-ping fan:yan-ping jiang:ji-ye mao<>a method for repairing the inconsistency of fuzzy preference relations<>fss<>louis ma<>
20604<>3912_0<>weidong jiang:kai xing:e. k. park<>the effective radius model for multi-hop wireless networks<>wasa<>liran ma<>
16767<>3914_3<>yuan-fang li:jing sun:gillian dobbie:hai h. wang<>reasoning about ora-ss data models using the semantic web<>jods<>jun sun<>
16770<>3914_6<>lin wang:gillian dobbie:lindsay groves<>validating ora-ss data models using alloy<>aswec<>jing sun<>
16772<>3914_8<>hui liang:jin song dong:roger duke:rudolph e. seviora<>formal specification-based online monitoring<>iceccs<>jing sun<>
16776<>3914_12<>yang liu<>algorithmic design using object-z for twig xml queries evaluation<>entcs<>jun sun<>
16777<>3914_13<>gillian dobbie:yuan-fang li:scott uk-jin lee<>research into verifying semistructured data<>icdcit<>jing sun<>
16779<>3914_15<>scott uk-jin lee:gillian dobbie:yuan-fang li<>a z approach in validating ora-ss data models<>entcs<>jing sun<>
16780<>3914_16<>jin song dong:yang liu:xian zhang<>verification of computation orchestration via timed automata<>icfem<>jun sun<>
16782<>3914_18<>jin song dong<>design synthesis from interaction and state-based specifications<>tse<>jun sun<>
16788<>3914_24<>ian warren:sanjev krishnamohan:thiranjith weerasinghe<>an automated formal approach to managing dynamic reconfiguration<>kbse<>jing sun<>
16790<>3914_26<>jin song dong:ping hao:xian zhang<>a reasoning method for timed csp based on constraint solving<>icfem<>jun sun<>
16791<>3914_27<>yuan-fang li:jing sun:gillian dobbie:hai h. wang<>validating semistructured data using owl<>waim<>jun sun<>
16797<>3914_33<>ling yuan:jin song dong:hamid abdul basit<>generic fault tolerant software architecture reasoning and customization<>tr<>jing sun<>
16798<>3914_34<>scott uk-jin lee:gillian dobbie:lindsay groves<>a pvs approach to verifying ora-ss data models<>seke<>jing sun<>
16805<>3916_1<>yin li:sing bing kang:heung-yeung shum<>flash matting<>tog<>jian sun<>
16807<>3916_3<>jiaya jia:chi-keung tang:heung-yeung shum<>drag-and-drop pasting<>tog<>jian sun<>
16811<>3916_7<>weiwei zhang:xiaoou tang:heung-yeung shum<>background cut<>eccv<>jian sun<>
16815<>3916_11<>jingdong wang:long quan:xiaoou tang:heung-yeung shum<>picture collage<>cvpr<>jian sun<>
4238<>3917_0<>susanne e. hambrusch:sunil prabhakar<>broadcasting and querying multi-dimensional index trees in a multi-channel environment<>is<>chuan-ming liu<>
16803<>3918_3<>michael t. goodrich:michael j. nelson<>the rainbow skip graph: a fault-tolerant constant-degree distributed data structure<>soda<>jonathan z. sun<>
16826<>3920_2<>yufei tao:dimitris papadias:george kollios<>spatio-temporal join selectivity<>is<>jimeng sun<>
16827<>3920_3<>spiros papadimitriou:philip s. yu<>local correlation tracking in time series<>icdm<>jimeng sun<>
16829<>3920_5<>spiros papadimitriou:christos faloutsos<>distributed pattern discovery in multiple streams<>pakdd<>jimeng sun<>
16831<>3920_7<>spiros papadimitriou:philip s. yu<>window-based tensor analysis on high-dimensional and multi-aspect streams<>icdm<>jimeng sun<>
16832<>3920_8<>evan hoke:christos faloutsos<>intemon: intelligent system monitoring on large clusters<>vldb<>jimeng sun<>
16836<>3920_12<>dacheng tao:christos faloutsos<>beyond streams and graphs: dynamic tensor analysis<>kdd<>jimeng sun<>
4234<>3921_1<>kui wu:yang xiao:bo sun<>random coverage with guaranteed connectivity: joint scheduling for wireless sensor networks<>tpds<>chong liu<>
4237<>3925_1<>chin-chung lin:wen-shyen e. chen:hsuan-yu chen:pei-chun chang:jeremy j. w. chen:pan-chyr yang<>crsd: a comprehensive web server for composite regulatory signature discovery<>nar<>chun-chi liu<>
6628<>3926_2<>chrysostomos nicopoulos:jongman kim:narayanan vijaykrishnan:chita r. das<>exploring fault-tolerant network-on-chip architectures<>dsn<>dongkook park<>
6629<>3926_3<>jongman kim:chrysostomos nicopoulos<>a gracefully degrading and energy-efficient modular router architecture for on-chip networks<>isca<>dongkook park<>
6631<>3926_5<>chrysostomos nicopoulos:jongman kim:narayanan vijaykrishnan:mazin s. yousif:chita r. das<>vichar: a dynamic virtual channel regulator for network-on-chip routers<>micro<>dongkook park<>
6632<>3926_6<>thomas d. richardson:chrysostomos nicopoulos:narayanan vijaykrishnan:yuan xie:chita r. das:vijay degalahal<>a hybrid soc interconnect with dynamic tdma-based transaction-less buses and on-chip networks<>vlsid<>dongkook park<>
22574<>3929_3<>carey e. priebe:j. tilak ratnanather<>segmenting magnetic resonance images via hierarchical mixture modelling<>csda<>michael i. miller<>
22619<>3932_1<>camino balbuena:e. barker:yuqing lin:k. a. sugeng<>consecutive magic graphs<>dm<>mirka miller<>
22620<>3932_2<>camino balbuena:e. barker:k. c. das:yuqing lin:joseph f. ryan:slamin:k. a. sugeng:michal tkac<>on the degrees of a strongly vertex-magic graph<>dm<>mirka miller<>
22621<>3932_3<>j. gimez marti<>two new families of large compound graphs<>networks<>m. miller<>
22616<>3933_2<>nitin h. vaidya<>leveraging channel diversity for key establishment in wireless sensor networks<>infocom<>matthew j. miller<>
22596<>3935_1<>joan gimbert:nacho lopez:joseph f. ryan<>characterization of eccentric digraphs<>dm<>mirka miller<>
19281<>3937_1<>yao-yuan liu:tzu-chang yeh:chad lin<>low-cost rfid identification variation<>jcis<>koong h.-c. lin<>
39954<>3938_0<>xueyan tang:ee-peng lim:aixin sun<>an energy-efficient and access latency optimized indexing scheme for wireless data broadcast<>tkde<>yuxia yao<>
39955<>3938_1<>xueyan tang:ee-peng lim<>in-network processing of nearest neighbor queries for wireless sensor networks<>dasfaa<>yuxia yao<>
19283<>3939_0<>martin bichler<>service-oriented computing<>computer<>kwei-jay lin<>
39950<>3940_0<>hanyu li:mubashir syed<>outage performance of a hybrid ds/fh spread-spectrum signal in an ism band<>ijnm<>yu-dong yao<>
19255<>3944_14<>tao yu<>qcws: an implementation of qos-capable multimedia web services<>mta<>kwei-jay lin<>
19279<>3946_0<>lei zhu:da-yong zhang<>an initial strategy for comparing proteins at the domain architecture level<>bioinformatics<>kui lin<>
36548<>3947_3<>victor c. s. lee:joseph kee-yin ng<>scheduling real-time requests in on-demand data broadcast environments<>rts<>xiao wu<>
32707<>3951_5<>r. v. craiu<>pattern generation using likelihood inference for cellular automata<>tip<>t. c. m. lee<>
32714<>3953_0<>dongjoo lee:suekyung lee:ok-ran jeong:hyeonsang eom:sang-goo lee<>bestchoice: a decision support system for supplier selection in e-marketplaces<>deec<>taehee lee<>
32694<>3956_1<>chao-hung lin:chung-ren yan:ji-hsen hsu<>multiresolution remeshing using weighted centroidal voronoi diagram<>iccS<>tong-yee lee<>
35863<>3959_0<>hector gonzalez:jiawei han:diego klabjan<>warehousing and analyzing massive rfid data sets<>icde<>xiaolei li<>
35864<>3959_1<>hector gonzalez:jiawei han<>mining compressed commodity workflows from massive rfid data sets<>cikm<>xiaolei li<>
35869<>3959_6<>hector gonzalez:jiawei han<>flowcube: constructuing rfid flowcubes for multi-dimensional analysis of commodity flows<>vldb<>xiaolei li<>
35870<>3959_7<>jiawei han:sangkyum kim<>motion-alert: automatic anomaly detection in massive moving objects<>isi<>xiaolei li<>
35873<>3959_10<>dong xin:jiawei han:hong cheng<>answering top-k queries with multi-dimensional selections: the ranking cube approach<>vldb<>xiaolei li<>
35835<>3962_4<>daniel parrott<>locating and tracking multiple dynamic optima by a particle swarm model using speciation<>tec<>xiaodong li<>
35845<>3962_14<>jurgen branke:tim blackwell<>particle swarm with speciation and adaptation in a dynamic environment<>gecco<>xiaodong li<>
32406<>3963_0<>maja pantic:alex pentland:anton nijholt<>human computing and machine understanding of human behavior: a survey<>icmi<>thomas s. huang<>
35850<>3968_2<>leen-kiat soh<>"adaptive, confidence-based strategic negotiations in complex multiagent environments."<>flairs<>xin li<>
35756<>3970_13<>zemin jin:mikio kano:bing wei<>"partitioning 2-edge-colored complete multipartite graphs into monochromatic cycles, paths and trees."<>jco<>xueliang li<>
35777<>3970_34<>zemin jin<>on the -path cover problem for cacti<>tcs<>xueliang li<>
35784<>3970_41<>jiannong cao:yanxiang he:yifeng chen<>madese: a simulation environment for mobile agent<>IEEEcit<>xuhui li<>
35796<>3974_9<>sabyasachi roy:y. charlie hu:dimitrios peroulis<>minimum-energy broadcast using practical directional antennas in all-wireless networks<>infocom<>xiang-yang li<>
35806<>3974_19<>yu wang<>minimum power assignment in wireless ad hoc networks with spanner property<>jco<>xiang-yang li<>
35808<>3974_21<>yu wang<>localized construction of bounded degree and planar spanner for wireless ad hoc networks<>monet<>xiang-yang li<>
2380<>3975_0<>heng tao shen:kian-lee tan<>saverf: towards efficient relevance feedback search<>icde<>beng chin ooi<>
2385<>3975_5<>h. v. jagadish:kian-lee tan:quang hieu vu:rong zhang<>speeding up search in peer-to-peer networks with a multi-way tree structure<>sigmod<>beng chin ooi<>
2391<>3975_11<>shuqiao guo:zhiyong huang:h. v. jagadish:zhenjie zhang<>relaxed space bounding for moving objects: a case for the buddy tree<>sigmod<>beng chin ooi<>
2393<>3975_13<>h. v. jagadish:quang hieu vu:rong zhang:aoying zhou<>vbi-tree: a peer-to-peer framework for supporting multi-dimensional indexing schemes<>icde<>beng chin ooi<>
2396<>3975_16<>hong lu:heng tao shen:xiangyang xue<>hierarchical indexing structure for efficient similarity search in video retrieval<>tkde<>beng chin ooi<>
2410<>3975_30<>bing tian dai:nick koudas:divesh srivastava:suresh venkatasubramanian<>rapid identification of column heterogeneity<>icdm<>beng chin ooi<>
2416<>3975_36<>bing tian dai:nick koudas:divesh srivastava:suresh venkatasubramanian<>column heterogeneity as a measure of data quality<>cleandb<>beng chin ooi<>
2425<>3975_45<>zhiyong huang:christian s. jensen:hua lu<>skyline queries against mobile lightweight devices in manets<>icde<>beng chin ooi<>
2431<>3975_51<>yongluan zhou:kian-lee tan:feng yu<>adaptive reorganization of coherency-preserving dissemination tree for streaming data<>icde<>beng chin ooi<>
2441<>3975_61<>panos kalnis:wee siong ng:kian-lee tan<>answering similarity queries in peer-to-peer networks<>is<>beng chin ooi<>
2464<>3975_84<>christian s. jensen:dan lin:rui zhang 0003<>effective density queries on continuouslymoving objects<>icde<>beng chin ooi<>
2466<>3975_86<>anthony k. h. tung:rui zhang 0003:nick koudas<>similarity search: a matching based approach<>vldb<>beng chin ooi<>
2467<>3975_87<>chong leng goh:yanfeng shu:zhiyong huang<>dynamic buffer management with extensible replacement policies<>vldb<>beng chin ooi<>
2468<>3975_88<>chenyi xia:wynne hsu:mong-li lee<>border: efficient computation of boundary points<>tkde<>beng chin ooi<>
2471<>3975_91<>h. v. jagadish:heng tao shen:kian-lee tan<>toward efficient multifeature query processing<>tkde<>beng chin ooi<>
2474<>3975_94<>cuiping li:anthony k. h. tung:shan wang<>dada: a data cube for dominant relationship analysis<>sigmod<>beng chin ooi<>
2486<>3975_106<>zhiyong huang:hua lu:anthony k. h. tung<>continuous skyline queries for moving objects<>tkde<>beng chin ooi<>
32411<>3977_1<>chong huang:yonghong tian:wen gao<>semantic scoring based on small-world phenomenon for feature selection in text mining<>adma<>tiejun huang<>
32412<>3977_2<>chong huang:yonghong tian:zhi zhou:charles x. ling<>keyphrase extraction using semantic networks structure analysis<>icdm<>tiejun huang<>
37990<>3980_0<>inwook hwang:byung ro moon<>multi-attractor gene reordering for graph bisection<>gecco<>yong-hyuk kim<>
37994<>3980_4<>alberto moraglio:yourim yoon:byung ro moon:riccardo poli<>generalized cycle crossover for graph partitioning<>gecco<>yong-hyuk kim<>
38000<>3980_10<>yourim yoon:alberto moraglio:byung ro moon<>geometric crossover for multiway graph partitioning<>gecco<>yong-hyuk kim<>
38001<>3980_11<>byung ro moon<>multicampaign assignment problem<>tkde<>yong-hyuk kim<>
38036<>3983_4<>min-soo jang:kyoung-sic cho:gwi-tae park<>"performance comparison between backpropagation, neuro-fuzzy network, and svm."<>csr<>yong-guk kim<>
38037<>3983_5<>taehwa hong:yang-bok lee:hagbae kim<>facial expression recognition using active appearance model<>isnn<>yong-guk kim<>
38039<>3983_7<>jeong-eom lee:sang-jun kim:min-soo jang:seok-joo lee:min chul park:gwi-tae park<>head detection and tracking for the car occupant's pose recognition<>ieaaie<>yong-guk kim<>
38040<>3983_8<>taehwa hong:hagbae kim:hyeonjoon moon:jongweon lee:seungbin moon<>face representation method using pixel-to-vertex map (pvm) for 3d model based face recognition<>eccv<>yong-guk kim<>
14287<>3991_0<>craig m. shepherd:ian a. borelli:gabriel lander:padmaja natarajan:vinay siddavanahalli:chandrajit l. bajaj:charles l. brooks iii:vijay s. reddy<>viperdb: a relational database for structural virology<>nar<>john e. johnson<>
38019<>3993_5<>mark shaneck:vipin kumar<>privacy preserving nearest neighbor search<>icdm<>yongdae kim<>
33105<>4000_4<>nulo<>symmetry breaking<>ausai<>toby walsh<>
33109<>4000_8<>carmel domshlak:steven david prestwich:francesca rossi:kristen brent venable<>hard and soft constraints for reasoning about qualitative conditional preferences<>heuristics<>toby walsh<>
33120<>4000_19<>yasuhiko takenaga<>tetravex is np-complete<>ipl<>toby walsh<>
33138<>4000_37<>philip kilby:john k. slaney:sylvie thiebaux<>estimating search tree size<>aaai<>toby walsh<>
33139<>4000_38<>christian bessiere:emmanuel hebrard:brahim hnich:zeynep kiziltan<>the roots constraint<>cp<>toby walsh<>
33150<>4000_49<>claude-guy quimper<>global grammar constraints<>cp<>toby walsh<>
33171<>4000_70<>maria silvia pini:francesca rossi:kristen brent venable<>computing possible and necessary winners from incomplete partially-ordered preferences<>ecai<>toby walsh<>
33176<>4000_75<>nulo<>general symmetry breaking constraints<>cp<>toby walsh<>
33178<>4000_77<>nulo<>symmetry breaking using value precedence<>ecai<>toby walsh<>
33185<>4000_84<>alan m. frisch:brahim hnich:zeynep kiziltan:ian miguel<>propagation algorithms for lexicographic ordering constraints<>ai<>toby walsh<>
33189<>4000_88<>kostas stergiou<>inverse consistencies for non-binary constraints<>ecai<>toby walsh<>
33190<>4000_89<>christian bessiere:emmanuel hebrard:brahim hnich:zeynep kiziltan<>the range constraint: algorithms and implementation<>cpaior<>toby walsh<>
28844<>4004_8<>james r. knapp:vincent a. schmidt<>specification for visual requirements of work-centered software systems<>sera<>soon m. chung<>
23964<>4009_1<>guan-ming su:zhu han:k. j. ray liu<>multiuser cross-layer resource allocation for video transmission over wireless networks<>network<>min wu<>
23986<>4009_23<>ashwin swaminathan:k. j. ray liu<>image tampering identification using blind deconvolution<>icip<>min wu<>
23987<>4009_24<>y. mao<>a joint signal processing and cryptographic approach to multimedia encryption<>tip<>m. wu<>
23988<>4009_25<>shan he<>collusion-resistant video fingerprinting for large user group<>icip<>min wu<>
24017<>4011_1<>shipeng yu:kai yu:volker tresp:hans-peter kriegel<>supervised probabilistic principal component analysis<>kdd<>mingrui wu<>
24019<>4011_3<>bernhard scholkopf:gokhan h. bakir<>a direct method for building sparse kernel learning algorithms<>jmlr<>mingrui wu<>
24014<>4012_3<>chia shen:kathy ryall:clifton forlines:alan esenther:frederic vernier:katherine everitt:daniel wigdor:meredith ringel morris:mark s. hancock:edward tse<>informing the design of direct-touch tabletops<>cga<>mike wu<>
23998<>4015_0<>robert c. miller:simson l. garfinkel<>do security toolbars actually prevent phishing attacks?<>chi<>min wu<>
23997<>4016_2<>chris jermaine<>outlier detection by sampling with accuracy guarantees<>kdd<>mingxi wu<>
32652<>4018_0<>josef kittler<>design and fusion of pose-invariant face-identification experts<>tcsv<>tae-kyun kim<>
32659<>4018_7<>josef kittler:roberto cipolla<>learning discriminative canonical correlations for object recognition with image sets<>eccv<>tae-kyun kim<>
32665<>4020_1<>min sik kim:yongjune shin:simon s. lam:edward j. powers<>scalable clustering of internet paths by shared congestion<>infocom<>taekhyun kim<>
32662<>4021_0<>sung deok cha<>timed high-level message sequence charts for real-time system design<>sam<>tai hyo kim<>
40323<>4025_6<>rong luo<>a note on vizing's independence number conjecture of edge chromatic critical graphs<>dm<>yue zhao<>
19660<>4026_0<>andrew d. m. smith:richard a. blythe:paul vogt<>cross-situational learning: a mathematical approach<>eelc<>kenny smith<>
40334<>4027_2<>justin zobel:phil vines<>using relative entropy for authorship attribution<>airs<>ying zhao<>
19653<>4030_2<>ketan dalal:allison w. klein:yunjun liu<>a spectral approach to npr packing<>npar<>kaleigh smith<>
40294<>4032_1<>lujin wang:feng qiu:arie e. kaufman:klaus mueller<>melting and flowing in multiphase environment<>cg<>ye zhao<>
40302<>4036_0<>yiyu yao:jue wang<>on reduct construction algorithms<>rskt<>yan zhao<>
40306<>4036_4<>yiyu yao:jue wang:suqing han<>a model of machine learning based on user preference of attributes<>rsctc<>yan zhao<>
40309<>4036_7<>yiyu yao<>classification based on logical concept analysis<>ai<>yan zhao<>
19625<>4037_11<>shawkat ali<>on learning algorithm selection for classification<>asc<>kate a. smith<>
30754<>4040_1<>changbo long:sudhakar pamarti:lei he:tanay karnik<>power-efficient pulse width modulation dc/dc converters with zero voltage switching control<>islped<>sasank reddy<>
30756<>4040_3<>i. faik baskaya:sung kyu lim:david v. anderson<>placement for large-scale floating-gate field-programable analog arrays<>tvlsi<>sasank reddy<>
30759<>4043_0<>irith pomeranz<>generation of functional broadside tests for transition faults<>tcad<>sudhakar m. reddy<>
30761<>4043_2<>gang chen:irith pomeranz:janusz rajski<>a test pattern ordering algorithm for diagnosis with truncated fail data<>dac<>sudhakar m. reddy<>
30762<>4043_3<>zhuo zhang:irith pomeranz:xijiang lin:janusz rajski<>scan tests with multiple fault activation cycles for delay faults<>vts<>sudhakar m. reddy<>
32677<>4046_2<>david adalsteinsson:ming c. lin<>modeling ice dynamics as a thin-film stefan problem<>sca<>theodore kim<>
32667<>4047_1<>tahir rasheed:myung ho in:young-koo lee:sungyoung lee:soo yeol lee<>constrained ica based ballistocardiogram and electro-oculogram artifacts removal from visual evoked potential eeg signals measured inside mri<>iconip<>tae-seong kim<>
15299<>4053_0<>zhi-ping fan:yan-ping jiang:ji-ye mao:louis ma<>a method for repairing the inconsistency of fuzzy preference relations<>fss<>jian ma<>
6155<>4056_1<>ismail bhana<>developing collaborative social software<>iccS<>david johnson<>
40353<>4059_7<>yutaka sakuma:masakiyo miyazawa<>decay rate for a /2 queue with shortest queue discipline<>questa<>yiqiang q. zhao<>
40340<>4060_3<>chengqi zhang:shichao zhang:lianwei zhao<>adapting k-means algorithm for discovering clusters in subspaces<>apweb<>yanchang zhao<>
40341<>4060_4<>shichao zhang<>generalized dimension-reduction framework for recent-biased time series analysis<>tkde<>yanchang zhao<>
40342<>4060_5<>chengqi zhang:shichao zhang<>enhancing dwt for recent-biased dimension reduction of time series data<>ausai<>yanchang zhao<>
40344<>4060_7<>lianwei zhao:siwei luo:lingzhi liao:zhihai wang<>regularized semi-supervised classification on manifold<>pakdd<>yanchang zhao<>
5543<>4067_13<>chengzheng sun:steven xia:david sun:haifeng shen:wentong cai<>transparent adaptation of single-user applications for multi-user real-time collaboration<>tochi<>david chen<>
5521<>4069_7<>jianping song:aloysius k. mok:mark nixon<>using real-time logic synthesis tool to achieve process control over wireless sensor networks<>rtcsa<>deji chen<>
5526<>4069_12<>ming xiong:song han<>deferrable scheduling for temporal consistency: schedulability analysis and overhead reduction<>rtcsa<>deji chen<>
33836<>4071_2<>erich m. schwarz:igor antoshechkin:carol bastiani:tamberlyn bieri:darin blasiar:payan canaran:juancarlos chan:nansheng chen:paul davis:tristan j. fiedler:lisa girard:todd w. harris:eimear kenny:ranjana kishore:daniel lawson:raymond lee:hans-michael muller:cecilia nakamura:philip ozersky:andrei petcherski:anthony rogers:william spooner:mary ann tuli:kimberly van auken:daniel wang:richard durbin:john spieth:lincoln d. stein:paul w. sternberg<>"wormbase: better software, richer content."<>nar<>wen j. chen<>
33621<>4072_2<>madhav v. marathe:srinivasan parthasarathy 0002:aravind srinivasan:sibylle zust<>provable algorithms for parallel generalized sweep scheduling<>jpdc<>v. s. anil kumar<>
33625<>4072_6<>stephan eidenbenz:sibylle zust<>equilibria in topology control games for ad hoc networks<>monet<>v. anil kumar<>
33626<>4072_7<>christian a. duncan:stephen g. kobourov<>optimal constrained graph exploration<>talg<>v. s. anil kumar<>
33627<>4072_8<>christopher l. barrett:madhav v. marathe:shripad thite:gabriel istrate<>strong edge coloring for channel assignment in wireless radio networks<>percom<>v. s. anil kumar<>
33633<>4076_3<>p. madhusudan:mahesh viswanathan<>"minimization, learning, and conformance testing of boolean programs."<>concur<>viraj kumar<>
33827<>4077_1<>long zhang:chengfang song:qifeng tan:qunsheng peng<>quasi-physical simulation of large-scale dynamic forest scenes<>cgi<>wei chen<>
33828<>4077_2<>dong xu:hongxin zhang:hujun bao<>multi-level differential surface representation based on local transformations<>vc<>wei chen<>
33829<>4077_3<>guofeng zhang:xueying qin:xiaobo an:hujun bao<>as-consistent-as-possible compositing of virtual objects and video sequences<>jvca<>wei chen<>
33833<>4077_7<>yi gong:long zhang:yun zeng:qunsheng peng<>an approximate image-space approach for real-time rendering of deformable translucent objects<>cgi<>wei chen<>
33634<>4078_0<>b. s. kademani:v. l. kalyane:lalit mohan<>letter to the editor<>scientometrics<>vijai kumar<>
33795<>4079_0<>emeric deutsch:sergi elizalde<>old and young leaves on plane trees<>ejc<>william y. c. chen<>
33796<>4079_1<>louis w. shapiro:laura l. m. yang<>parity reversing involutions on plane trees and 2-motzkin paths<>ejc<>william y. c. chen<>
33804<>4079_9<>qing-hu hou<>factors of the gaussian coefficients<>dm<>william y. c. chen<>
33806<>4079_11<>wenchang chu:nancy s. s. gu<>finite form of the quintuple product identity<>jct<>william y. c. chen<>
23267<>4085_0<>alejandro pauly<>topological reasoning for identifying a complete set of topological predicates between vague spatial objects<>flairs<>markus schneider<>
23270<>4085_3<>thomas behr<>topological relationships between complex spatial objects<>tods<>markus schneider<>
23304<>4086_0<>nulo<>rdf: stores - a lightweight approach on managing shared knowledge<>uic<>michael schneider<>
23305<>4086_1<>carolin plate:nathalie basselin:alexander kroner:stephan baldes:vania dimitrova:anthony jameson<>recomindation: new functions for augmented memories<>ah<>michael schneider<>
33849<>4087_0<>yujie zhang:hitoshi isahara<>chinese chunking with tri-training learning<>iccpol<>wenliang chen<>
33850<>4087_1<>yujie zhang:hitoshi isahara<>an empirical study of chinese chunking<>acl<>wenliang chen<>
40497<>4089_0<>harish sethu<>on achieving fairness in the joint allocation of buffer and bandwidth resources: principles and algorithms<>cn<>yunkai zhou<>
40479<>4091_2<>oleksandr grygorash:zach jorgensen<>minimum spanning tree based clustering algorithms<>ictai<>yan zhou<>
40463<>4093_3<>jialun qin:hsinchun chen<>cmedport: an integrated approach to facilitating chinese medical information seeking<>dss<>yilu zhou<>
40464<>4093_4<>jialun qin:michael chau:hsinchun chen<>multilingual web retrieval: an experiment in english-chinese business intelligence<>jasis<>yilu zhou<>
40471<>4093_11<>michael chau:zan huang:jialun qin:hsinchun chen<>building a scientific knowledge web portal: the nanoport experience<>dss<>yilu zhou<>
40495<>4094_0<>joseph davis<>analysis of weblog link structure - a community perspective<>webist<>ying zhou<>
40486<>4096_0<>beng chin ooi:kian-lee tan:feng yu<>adaptive reorganization of coherency-preserving dissemination tree for streaming data<>icde<>yongluan zhou<>
40488<>4096_2<>beng chin ooi:kian-lee tan:ji wu<>efficient dynamic operator placement in a locally distributed continuous query system<>otm<>yongluan zhou<>
40493<>4096_7<>nulo<>scalable and adaptable distributed stream processing<>icde<>yongluan zhou<>
572<>4099_6<>gokul soundararajan:cristiana amza<>database replication policies for dynamic content applications<>eurosys<>ashvin goel<>
573<>4099_7<>jing su:kelvin k. w. chan:andrew g. miklas:kenneth po:ali akhavan:stefan saroiu:eyal de lara<>a preliminary investigation of worm infections in a bluetooth environment<>worm<>ashvin goel<>
40481<>4100_0<>francis de vericourt<>on the incomplete results for the heterogeneous server problem<>questa<>yong-pin zhou<>
541<>4101_17<>mihaela enachescu:yashar ganjali:nick mckeown:tim roughgarden<>routers with very small buffers<>infocom<>ashish goel<>
542<>4101_18<>adam meyerson<>simultaneous optimization via approximate majorization for concave profits or convex costs<>algorithmica<>ashish goel<>
543<>4101_19<>sung-woo cho<>pricing for fairness: distributed resource allocation for multiple objectives<>stoc<>ashish goel<>
560<>4101_36<>gagan aggarwal:rajeev motwani<>truthful auctions for pricing search keywords<>sigecom<>ashish goel<>
562<>4101_38<>sudipto guha:kamesh munagala<>asking the right questions: model-driven optimization using probes<>pods<>ashish goel<>
7689<>4102_8<>ilya baran:dmitriy a. katz<>optimally adaptive integration of univariate lipschitz functions<>latin<>erik d. demaine<>
7699<>4102_18<>mihai patrascu<>logarithmic lower bounds in the cell-probe model<>siamcomp<>erik d. demaine<>
7704<>4102_23<>micah adler:nicholas j. a. harvey:mihai patrascu<>lower bounds for asymmetric communication channels and distributed source coding<>soda<>erik d. demaine<>
7718<>4102_37<>mohammad taghi hajiaghayi:ken-ichi kawarabayashi<>algorithmic graph minor theory: improved grid minor bounds and wagner's contraction<>isaac<>erik d. demaine<>
7740<>4102_59<>robert connelly:martin l. demaine:sandor p. fekete:stefan langerman:joseph s. b. mitchell:ares ribo:gunter rote<>locked and unlocked chains of planar shapes<>compgeom<>erik d. demaine<>
7742<>4102_61<>dotan emanuel:amos fiat:nicole immorlica<>correlation clustering in general weighted graphs<>tcs<>erik d. demaine<>
7745<>4102_64<>mohammadhossein bateni:mohammad taghi hajiaghayi:mohammad moharrami<>plane embeddings of planar graph metrics<>compgeom<>erik d. demaine<>
7753<>4102_72<>martin l. demaine<>"puzzles, art, and magic with algorithms."<>mst<>erik d. demaine<>
7758<>4102_77<>sachio teramoto:ryuhei uehara<>voronoi game on graphs and its complexity<>cig<>erik d. demaine<>
7782<>4102_101<>martin l. demaine:arthur langerman:stefan langerman<>morpion solitaire<>mst<>erik d. demaine<>
21762<>4103_1<>aaron steinfeld:terrence fong:david b. kaber:michael lewis:jean scholtz:alan c. schultz<>common metrics for human-robot interaction<>hri<>michael a. goodrich<>
21765<>4103_4<>curtis w. nielsen<>comparing the usefulness of video and map information in navigation tasks<>hri<>michael a. goodrich<>
21690<>4104_29<>michael sirivianos:john solis:gene tsudik:ersin uzun<>loud and clear: human-verifiable authentication based on audio<>icdcs<>michael t. goodrich<>
21698<>4104_37<>michael j. nelson:jonathan z. sun<>the rainbow skip graph: a fault-tolerant constant-degree distributed data structure<>soda<>michael t. goodrich<>
21707<>4104_46<>daniel s. hirschberg<>efficient parallel algorithms for dead sensor diagnosis and multiple access channels<>spaa<>michael t. goodrich<>
21725<>4104_64<>michael b. dillencourt:david eppstein<>choosing colors for geometric graphs via color space embeddings<>gd<>michael t. goodrich<>
21746<>4104_85<>roberto tamassia:danfeng yao<>notarized federated identity management for web services<>dbsec<>michael t. goodrich<>
35550<>4106_0<>xu ling:jing jiang:qiaozhu mei:chengxiang zhai:bruce r. schatz<>automatically generating gene summaries from biomedical literature<>psb<>xin he<>
35551<>4107_0<>richard s. zemel:debajyoti ray<>learning and incorporating top-down cues in image segmentation<>eccv<>xuming he<>
35540<>4111_16<>d. cai:j. han:h.-j. zhang<>orthogonal laplacianfaces for face recognition<>tip<>x. he<>
35543<>4111_19<>deng cai:jiawei han<>tensor space model for document analysis<>sigir<>xiaofei he<>
35497<>4112_6<>huaming zhang<>an application of well-orderly trees in graph drawing<>ijfcs<>xin he<>
1670<>4116_0<>sadan kulturel-konak:bryan a. norman<>multi-objective tabu search using a multinomial probability mass function<>eor<>alice e. smith<>
1674<>4119_1<>peter smith<>a set probability technique for detecting relative time order across multiple neurons<>neco<>anne c. smith<>
31594<>4123_1<>ariadna quattoni:louis-philippe morency:david demirdjian:trevor darrell<>hidden conditional random fields for gesture recognition<>cvpr<>sy bor wang<>
31597<>4126_0<>xijin ge:qingfa wu:yong-chul jung:jun chen<>a large quantity of novel human antisense transcripts detected by longsage<>bioinformatics<>san ming wang<>
34980<>4135_0<>zhenyu yang:bin yu:ross diankov:ruzena bajcsy<>collaborative dancing in tele-immersive environment<>mm<>wanmin wu<>
31586<>4136_0<>lei wang<>exploiting soft redundancy for error-resilient on-chip memory design<>iccad<>shuo wang<>
31591<>4140_3<>yang wang:miao jin:xianfeng gu:dimitris samaras<>3d surface matching and recognition using conformal geometry<>cvpr<>sen wang<>
27133<>4142_0<>stephane gaubert<>reachability problems for products of matrices in semirings<>ijac<>ricardo katz<>
27138<>4144_0<>stephane gaubert<>max-plus convex geometry<>RelMiCS<>ricardo katz<>
27141<>4147_0<>sarit kraus<>efficient agents for cliff-edge environments with a large set of decision options<>atal<>ron katz<>
30493<>4148_4<>david montaner:joaquan tarraga:jaime huerta-cepas:jordi burguet:juan m. vaquerizas:lucia conde:pablo minguez:javier vera:joan valls:miguel a. g. pujana:eva alloza:javier herrero:fatima al-shahrour:joaquin dopazo<>next station in microarray data analysis: gepas<>nar<>sach mukherjee<>
31574<>4155_0<>jon louis bentley<>captcha challenge tradeoffs: familiarity of strings versus degradation of images<>icpr<>sui-yu wang<>
31584<>4157_0<>zhenfu cao:haiyong bao<>two-pass id-based authenticated key agreement protocol with key confirmation using pairings<>imsccs<>shengbao wang<>
31571<>4161_1<>jian-feng huang:sheng-yan chuang<>transmission range designation broadcasting methods for wireless ad hoc networks<>uic<>sheng-de wang<>
41343<>4163_0<>jun hua zhao:zhao yang dong<>effective feature preprocessing for time series forecasting<>adma<>zhao xu<>
11199<>4172_3<>n. jeremy hill:gunnar ratsch<>graph based semi-supervised learning with sharper edges<>ecml<>hyunjung shin<>
11202<>4172_6<>sungzoon cho<>response modeling with support vector machines<>eswa<>hyunjung shin<>
11205<>4173_0<>vijayalakshmi atluri<>efficient enforcement of security policies based on tracking of mobile users<>dbsec<>heechang shin<>
26304<>4179_0<>zheng he:villy baek iversen<>trunk reservation in multi-service networks with bpp traffic<>eurongi<>qi zhang<>
11215<>4182_1<>jean-lien c. wu<>the study of quick download mechanism in an infrastructural wireless environment<>ijcomsys<>haw-yun shin<>
41339<>4185_0<>volker tresp:kai yu:hans-peter kriegel<>infinite hidden relational models<>uai<>zhao xu<>
41331<>4187_4<>andrew lim:brenda cheang:ho wee kit:steve au-yeung<>tpboscourier: a transportation procurement system (for the procurement of courier services)<>aaai<>zhou xu<>
41335<>4188_0<>ronald r. yager<>the continuous ordered weighted geometric operator and its application to decision making<>fss<>zeshui xu<>
41337<>4188_2<>nulo<>induced uncertain linguistic owa operators applied to group decision making<>inffus<>zeshui xu<>
32184<>4194_0<>polly m. s. poon:elizabeth chang:ling feng<>xml descriptor based approach for real time data messaging<>isorc<>tharam s. dillon<>
3248<>4197_1<>ya zhang:yixin chen:hongyuan zha:xiang ji<>splice site prediction using support vector machines with a bayes kernel<>eswa<>chao-hsien chu<>
3249<>4197_2<>chang-chun tsai:xiaodan wu<>an evolutionary fuzzy multi-objective approach to cell formation<>seal<>chao-hsien chu<>
3252<>4197_5<>fengjun li:bo luo:peng liu:dongwon lee:prasenjit mitra:wang-chien lee<>in-broker access control: towards efficient end-to-end performance of information brokerage systems<>sutc<>chao-hsien chu<>
3253<>4197_6<>yiling chen:tracy mullen<>an in-depth analysis of information markets with aggregate uncertainty<>ecr<>chao-hsien chu<>
3205<>4198_0<>chiu-wing sham:evangeline f. y. young<>optimal cell flipping in placement and floorplanning<>dac<>chris c. n. chu<>
3220<>4198_15<>chuan lin:hai zhou<>a revisit to floorplan optimization by lagrangian relaxation<>iccad<>chris chu<>
13058<>4201_0<>jungwoo ha:christopher j. rossbach:hany e. ramadan:emmett witchel<>cost-sensitive decision tree learning for forensic classification<>ecml<>jason v. davis<>
13059<>4201_1<>inderjit s. dhillon<>estimating the global pagerank of web communities<>kdd<>jason v. davis<>
34032<>4203_0<>philip bohannon:eiman elnahrawy:michael flaster<>putting context into schema matching<>vldb<>wenfei fan<>
33985<>4204_0<>anisio lacerda:marco cristo:marcos andrc goncalves:nivio ziviani:berthier a. ribeiro-neto<>learning to advertise<>sigir<>weiguo fan<>
33991<>4204_6<>michael d. gordon:praveen pathak<>an integrated two-stage model for intelligent information routing<>dss<>weiguo fan<>
33992<>4204_7<>dmitri roussinov<>learning ranking vs. modeling relevance<>hicss<>weiguo fan<>
34002<>4204_17<>linda wallace:stephanie rich:zhongju zhang<>tapping the power of text mining<>cacm<>weiguo fan<>
34009<>4204_24<>l. christian schaupp:france belanger<>determining success for different website goals<>hicss<>weiguo fan<>
34011<>4204_26<>harris wu:michael d. gordon:kurt demaagd<>mining web navigations for intelligence<>dss<>weiguo fan<>
36710<>4209_0<>minh x. nguyen:baoquan chen:david h. porter<>hdr volvis: high dynamic range volume visualization<>tvcg<>xiaoru yuan<>
36714<>4209_4<>baoquan chen<>procedural image processing for visualization<>isvc<>xiaoru yuan<>
36706<>4210_6<>gloria chi-fishman<>volumetric tongue reconstruction by fusing bidirectional mr images<>isbi<>xiaohui yuan<>
36683<>4211_3<>z. duan:j. chandrashekar<>constructing inter-domain packet filters to control ip spoofing based on bgp updates<>infocom<>x. yuan<>
27677<>4216_0<>lasaro j. camargos:fernando pedone<>a primary-backup protocol for in-memory database replication<>nca<>rodrigo schmidt<>
27681<>4216_4<>nicolas schiper:fernando pedone<>optimistic algorithms for partial database replication<>opodis<>rodrigo schmidt<>
27654<>4220_1<>marcel karnstedt:kai-uwe sattler:manfred hauswirth<>cost-aware processing of similarity queries in structured overlays<>p2p<>roman schmidt<>
27658<>4220_5<>marcel karnstedt:kai-uwe sattler:manfred hauswirth<>similarity queries on structured data in structured overlays<>icde<>roman schmidt<>
27661<>4220_8<>karl aberer<>efficient peer-to-peer belief propagation<>otm<>roman schmidt<>
27621<>4222_3<>peter baumgartner<>blocking and other enhancements for bottom-up model generation methods<>cade<>renate a. schmidt<>
27637<>4222_19<>nulo<>developing modal tableaux and resolution methods via first-order resolution<>aiml<>renate a. schmidt<>
19326<>4224_0<>wei-chuan liu:ming-syan chen<>hardware enhanced mining for association rules<>pakdd<>ken-hao liu<>
16661<>4234_0<>michael l. nelson:ignacio garcia del campo<>"efficient, automatic web resource harvesting."<>widm<>joan a. smith<>
16662<>4234_1<>michael l. nelson:martin klein<>repository replication using smtp and nntp<>dgo<>joan a. smith<>
30337<>4241_27<>zhaohui fu<>solving the minimum-cost satisfiability problem using sat based branch-and-bound search<>iccad<>sharad malik<>
30347<>4241_37<>zhaohui fu<>on solving the partial max-sat problem<>sat<>sharad malik<>
38782<>4247_1<>jun-hai yong:hui zhang:dong-ming yan:jia-guang sun<>a quasi-monte carlo method for computing areas of point-sampled surfaces<>cad<>yu-shen liu<>
38784<>4248_0<>scott f. smith<>a formal framework for component deployment<>oopsla<>yu david liu<>
38786<>4249_0<>h. conrad cunningham:cuihua zhang<>using classic problems to teach java framework design<>scp<>yi liu<>
38811<>4256_0<>qun liu:shouxun lin<>tree-to-string alignment template for statistical machine translation<>acl<>yang liu<>
38817<>4260_0<>rong jin:liu yang<>semi-supervised multi-label learning by constrained non-negative matrix factorization<>aaai<>yi liu<>
38818<>4261_0<>jun sun<>algorithmic design using object-z for twig xml queries evaluation<>entcs<>yang liu<>
38819<>4261_1<>jin song dong:jun sun:xian zhang<>verification of computation orchestration via timed automata<>icfem<>yang liu<>
38051<>4264_3<>kwon-taek kwon:jihong kim<>energy-efficient file placement techniques for heterogeneous mobile storage systems<>emsoft<>young-jin kim<>
38809<>4266_0<>zidong wang:xiaohui liu<>global exponential stability of generalized recurrent neural networks with discrete and distributed delays<>nn<>yurong liu<>
38810<>4266_1<>zidong wang:xiaohui liu<>on global exponential stability of generalized stochastic neural networks with mixed time-delays<>ijon<>yurong liu<>
38046<>4269_1<>nulo<>feedback capacity of the first-order moving average gaussian channel<>tit<>y.-h. kim<>
38047<>4269_2<>nulo<>a counterexample to cover's 2p conjecture on gaussian feedback capacity<>tit<>y.-h. kim<>
38058<>4274_0<>ilhyun park:kiyoung choi:yunheung paek<>power-conscious configuration cache structure and code mapping for coarse-grained reconfigurable architecture<>islped<>yoonjin kim<>
38059<>4274_1<>minwook ahn:jonghee w. yoon:yunheung paek:mary kiemb:kiyoung choi<>a spatial mapping algorithm for heterogeneous coarse-grained reconfigurable architectures<>date<>yoonjin kim<>
16635<>4277_3<>ashish m. mehta:howard jay siegel:anthony a. maciejewski:arun jayaseelan:bin ye<>dynamic resource allocation heuristics for maximizing robustness with an overall makespan constraint in an uncertain environment<>pdpta<>jay smith<>
16636<>4277_4<>ashish m. mehta:howard jay siegel:anthony a. maciejewski:arun jayaseelan:bin ye<>dynamic resource management heuristics for minimizing makespan while maintaining an acceptable level of robustness in an uncertain environment<>icpads<>jay smith<>
16637<>4277_5<>vladimir shestak:howard jay siegel:anthony a. maciejewski<>a stochastic approach to measuring the robustness of resource allocations in distributed systems<>icpp<>jay smith<>
38062<>4278_0<>taekyong nam:dongho won<>2-way text classification for harmful web documents<>iccsa<>youngsoo kim<>
22639<>4280_2<>guy n. rothblum<>learning to impersonate<>icml<>moni naor<>
22653<>4280_16<>benny pinkas<>oblivious polynomial evaluation<>siamcomp<>moni naor<>
22655<>4280_18<>cynthia dwork:krishnaram kenthapadi:frank mcsherry:ilya mironov<>"our data, ourselves: privacy via distributed noise generation."<>eurocrypt<>moni naor<>
22668<>4280_31<>tal moran<>receipt-free universally-verifiable voting with everlasting privacy<>crypto<>moni naor<>
22712<>4280_75<>danny harnik<>on everlasting security in the  bounded storage model<>icalp<>moni naor<>
22713<>4280_76<>eyal kaplan:omer reingold<>derandomized constructions of k-wise (almost) independent permutations<>eccc<>moni naor<>
22724<>4280_87<>danny harnik<>on the compressibility of np instances and cryptographic applications<>focs<>moni naor<>
22735<>4280_98<>gil segev:adam smith<>tight bounds for unconditional authentication protocols in the manual channel and shared key models<>crypto<>moni naor<>
22743<>4280_106<>tal moran<>polling with physical envelopes: a rigorous analysis of a human-centric protocol<>eurocrypt<>moni naor<>
20828<>4299_2<>josh helzer<>media streaming via tfrc: an analytical study of the impact of tfrc on user-perceived media quality<>infocom<>lisong xu<>
20841<>4301_11<>zhi-yong liu:hong qiao<>multisets mixture learning-based ellipse detection<>pr<>lei xu<>
219<>4302_19<>ramanathan narayanan:berkin ozisikyilmaz:joseph zambreno:gokhan memik<>minebench: a benchmark suite for data mining workloads<>iiswc<>alok n. choudhary<>
265<>4302_65<>berkin ozisikyilmaz:ramanathan narayanan:joseph zambreno:gokhan memik<>an architectural characterization study of data mining and bioinformatics workloads<>iiswc<>alok n. choudhary<>
326<>4302_126<>peter m. aarestad:avery ching:george k. thiruvathukal<>scalable approaches for supporting mpi-io atomicity<>ccgrid<>alok n. choudhary<>
338<>4302_138<>avery ching:wei-keng liao:lee ward:neil pundit<>evaluating i/o characteristics and methods for storing structured scientific data<>ipps<>alok n. choudhary<>
348<>4302_148<>jianwei li:nan jiang:wei-keng liao<>mining frequent patterns by differential refinement of clustered bitmaps<>sdm<>alok n. choudhary<>
20446<>4309_2<>joonsoo bae:james caverlee:hua yan<>process mining by measuring process block similarity<>bpm<>ling liu<>
20464<>4309_20<>mudhakar srivatsa<>key derivation algorithms for monotone access structures in cryptographic file systems<>esorics<>ling liu<>
20465<>4309_21<>mudhakar srivatsa:arun iyengar:jian yin<>a client-transparent approach to defend against denial of service attacks<>srds<>ling liu<>
20467<>4309_23<>nulo<>mobile web and location-based services<>apweb<>ling liu<>
20469<>4309_25<>bugra gedik<>mobieyes: a distributed location monitoring service using moving location queries<>tmc<>ling liu<>
20474<>4309_30<>hua yan:keke chen<>efficiently clustering transactional data with weighted coverage density<>cikm<>ling liu<>
20482<>4309_38<>james caverlee:joonsoo bae<>distributed query sampling: a quality-conscious approach<>sigir<>ling liu<>
20492<>4309_48<>mudhakar srivatsa:arun iyengar:jian yin<>a middleware system for protecting against application level denial of service attacks<>middleware<>ling liu<>
20496<>4309_52<>mudhakar srivatsa<>securing decentralized reputation management using trustguard<>jpdc<>ling liu<>
20515<>4309_71<>keke chen<>ivibrate: interactive visualization-based framework for clustering large datasets<>tois<>ling liu<>
20517<>4309_73<>lakshmish ramaswamy:jianjun zhang<>efficient formation of edge cache groups for dynamic content delivery<>icdcs<>ling liu<>
20531<>4309_87<>aameek singh:mustaque ahamad<>privacy analysis for data sharing in *nix systems<>usenix<>ling liu<>
20532<>4309_88<>johannes gehrke<>guest editors' introduction: sensor-network applications<>internet<>ling liu<>
20564<>4316_0<>hui li<>production control in a two-stage system<>eor<>liming liu<>
25658<>4319_0<>jianyu yang<>multicomponent chirp signals analysis using product cubic phase function<>dsp<>pu wang<>
25659<>4319_1<>jianyu yang:zhi-lin zhang:gang wang:quanyi mo<>a signal-dependent quadratic time frequency distribution for neural source estimation<>isnn<>pu wang<>
20553<>4322_4<>oscar kin-chung au:chiew-lan tai:hongbo fu<>dual laplacian editing for meshes<>tvcg<>ligang liu<>
20554<>4322_5<>lei zhang:zhongping ji:guojin wang<>manifold parameterization<>cgi<>ligang liu<>
25653<>4323_7<>douglas hofstadter<>a logic of categorization<>jetai<>pei wang<>
25635<>4324_6<>fu-wen yang:hwei-jen lin:hung-hsuan wu<>robust clustering based on winner-population markov chain<>icpr<>patrick shen-pei wang<>
28120<>4326_0<>zhongfei (mark) zhang:mingjing li:wei-ying ma:hongjiang zhang<>a probabilistic semantic model for image annotation and multi-modal image retrieval<>mms<>ruofei zhang<>
28122<>4326_2<>ramesh sarukkai:jyh-herng chow:wei dai:zhongfei zhang<>joint categorization of queries and clips for web-based video search<>mir<>ruofei zhang<>
16290<>4329_0<>jose a. b. fortes:renato j. o. figueiredo:linda hermer-vazquez:josi carlos principe<>a new architecture for deriving dynamic brain-machine interfaces<>iccS<>justin c. sanchez<>
28136<>4330_3<>niraj k. jha<>state encoding of finite-state machines targeting threshold and majority logic based implementations with application to nanotechnologies<>vlsid<>rui zhang<>
28139<>4332_2<>chunqiang tang:y. charlie hu:sonia fahmy:xiaojun lin<>impact of the inaccuracy of distance prediction algorithms on internet applications - an analytical and comparative study<>infocom<>rongmei zhang<>
28140<>4332_3<>y. charlie hu:xiaojun lin:sonia fahmy<>a hierarchical approach to internet distance prediction<>icdcs<>rongmei zhang<>
28143<>4332_6<>ali raza butt:y. charlie hu<>a self-organizing flock of condors<>jpdc<>rongmei zhang<>
16274<>4333_3<>antonio razo:juan manuel cordova:abraham villegas<>dynamic generation of oai servers<>jcdl<>j. alfredo sanchez<>
39169<>4341_0<>zhipeng cai:lizhe xu:mohammad r. salavatipour:randy goebel:guohui lin<>using gene clustering to identify discriminatory genes with higher classification accuracy<>bibe<>yi shi<>
38646<>4344_0<>nitesh v. chawla:mary p. harper:elizabeth shriberg:andreas stolcke<>a study in machine learning from imbalanced data for sentence boundary detection in speech<>csl<>yang liu<>
38648<>4344_2<>elizabeth shriberg:andreas stolcke:dustin hillard:mari ostendorf:mary p. harper<>enriching speech recognition with automatic detection of sentence boundaries and disfluencies<>taslp<>yang liu<>
38650<>4344_4<>nulo<>initial study on automatic identification of speaker role in broadcast news speech<>naacl<>yang liu<>
38651<>4344_5<>john hale:izhak shafran:lisa yung:bonnie j. dorr:mary p. harper:anna krasnyanskaya:matthew lease:brian roark:matthew g. snover:robin stewart<>pcfgs with syntactic and prosodic indicators of speech repairs<>acl<>yang liu<>
38652<>4344_6<>jachym kolar:elizabeth shriberg<>using prosody for automatic sentence segmentation of multi-party meetings<>tsd<>yang liu<>
38615<>4348_1<>james hays:marius leordeanu:alexei a. efros<>discovering texture regularity as a higher-order correspondence problem<>eccv<>yanxi liu<>
38631<>4348_17<>owen t. carmichael:paul m. thompson:rebecca a. dutton:allen lu:sharon e. lee:jessica y. lee:lewis h. kuller:oscar l. lopez:howard aizenstein:carolyn c. meltzer:arthur w. toga:james t. becker<>mapping ventricular changes related to dementia and mild cognitive impairment in a large community-based cohort<>isbi<>yanxi liu<>
38642<>4348_28<>jiayong zhang:jiebo luo:robert t. collins<>body localization in still images using hierarchical models and hybrid search<>cvpr<>yanxi liu<>
38587<>4350_15<>scott d. stoller<>querying complex graphs<>padl<>yanhong a. liu<>
38588<>4350_16<>chen wang:michael gorbovitski:tom rothamel:yongxi cheng:yingchao zhao:jing zhang<>core role-based access control: efficient implementations by transformations<>pepm<>yanhong a. liu<>
38599<>4350_27<>katia hristova<>improved algorithm complexities for linear temporal logic model checking of pushdown systems<>vmcai<>yanhong a. liu<>
38600<>4350_28<>tom rothamel:constance l. heitmeyer:elizabeth i. leonard<>generating optimized code from scr specifications<>lctrts<>yanhong a. liu<>
38675<>4352_1<>samarjit chakraborty:radu marculescu<>generalized rate analysis for media-processing platforms<>rtcsa<>yanhong liu<>
38676<>4352_2<>samarjit chakraborty:nikolay stoimenov:lothar thiele:ernesto wandeler<>interface-based rate analysis of embedded systems<>rtss<>yanhong liu<>
16113<>4353_0<>ralf klasing:christian laforest:nicolas thibault<>constructing incremental sequences in graphs<>aor<>joseph peters<>
38669<>4354_0<>helmut pottmann:johannes wallner:yong-liang yang:wenping wang<>geometric modeling with conical meshes and developable surfaces<>tog<>yang liu<>
38670<>4354_1<>wenping wang:helmut pottmann<>fitting b-spline curves to point clouds by curvature-based squared distance minimization<>tog<>yang liu<>
38672<>4354_3<>dong-ming yan:wenping wang<>quadric surface extraction by variational shape approximation<>gmp<>yang liu<>
16114<>4355_0<>stefan schaal<>learning operational space control<>rss<>jan peters<>
16116<>4355_2<>jo-anne ting:michael mistry:stefan schaal:jun nakanishi<>a bayesian approach to nonlinear parameter identification for rigid body dynamics<>rss<>jan peters<>
20083<>4359_3<>yi ru huang:jian sheng yang<>a note on ramsey numbers with two parameters<>ejc<>ke min zhang<>
20091<>4359_11<>yaojun chen:yunqing zhang<>the ramsey numbers of trees versus  or<>ejc<>kemin zhang<>
8005<>4363_0<>klara nahrstedt:li xiao:kunsoo park<>identity-based registry for secure interdomain routing<>ccs<>e-yong kim<>
20095<>4368_0<>nulo<>software defect fractal description<>sede<>kai zhang<>
20103<>4372_0<>santosh pande<>minimizing downtime in seamless migrations of mobile applications<>lctrts<>kun zhang<>
20104<>4372_1<>tao zhang:santosh pande<>memory protection through dynamic access control<>micro<>kun zhang<>
38750<>4375_2<>king ngi ngan<>fast lossless multi-resolution motion estimation for scalable wavelet video coding<>iscas<>yu liu<>
38687<>4380_3<>john oleszkiewicz:li xiao<>effectively utilizing global cluster memory for large data-intensive parallel programs<>tpds<>yunhao liu<>
38688<>4380_4<>chen wang:li xiao:pei zheng<>dicas: an efficient distributed caching mechanism for p2p systems<>tpds<>yunhao liu<>
38690<>4380_6<>rui chu:nong xiao:yongzhen zhuang:xicheng lu<>a distributed paging ram grid system for wide-area memory sharing<>ipps<>yunhao liu<>
38691<>4380_7<>li xiao:xiaomei liu:wenjun gu:dong xuan<>a design of overlay anonymous multicast protocol<>ipps<>yunhao liu<>
38692<>4380_8<>wenwei xue:qiong luo:lei chen 0002<>contour map matching for event detection in sensor networks<>sigmod<>yunhao liu<>
38695<>4380_11<>xiaofei liao:hai jin:lionel m. ni:dafu deng<>anysee: peer-to-peer live streaming<>infocom<>yunhao liu<>
38696<>4380_12<>li xiao:wenjun gu:dong xuan:xiaomei liu<>mutual anonymous overlay multicast<>jpdc<>yunhao liu<>
38697<>4380_13<>xiaomei liu:li xiao<>improving query response delivery quality in peer-to-peer systems<>tpds<>yunhao liu<>
38706<>4380_22<>lei shi:bin liu:wenjie li:beibei wu<>ds-pps: a practical framework to guarantee differentiated qos in terabit routers with parallel packet switch<>infocom<>yunhao liu<>
38752<>4383_0<>peter stone<>value-function-based transfer for reinforcement learning using structure mapping<>aaai<>yaxin liu<>
38754<>4383_2<>sven koenig<>functional value iteration for decision-theoretic planning with general utility functions<>aaai<>yaxin liu<>
9245<>4388_8<>hajo broersma:fedor v. fomin:jan kratochvil<>planar graph coloring avoiding monochromatic subgraphs: trees and paths make it difficult<>algorithmica<>gerhard j. woeginger<>
9252<>4388_15<>vladimir g. deineko:bettina klinz<>exact algorithms for the hamiltonian cycle problem in planar graphs<>orl<>gerhard j. woeginger<>
40360<>4391_1<>simon oberthur:martin kardos:franz-josef rammig<>model-based runtime verification framework for self-optimizing systems<>entcs<>y. zhao<>
33904<>4398_0<>a. carlosena:b. bakkaloglu:s. kiaei<>randomized carrier pwm with exponential frequency mapping<>iscas<>wing-yee chu<>
33892<>4399_3<>shirish krishnaj shevade<>minimum enclosing spheres formulations for support vector ordinal regression<>icdm<>wei chu<>
33895<>4399_6<>zoubin ghahramani:alexei podtelezhnikov:david l. wild<>bayesian segmental models with multiple sequence alignment profiles for protein secondary structure and contact map prediction<>tcbb<>wei chu<>
33900<>4399_11<>zoubin ghahramani:roland krause:david l. wild<>identifying protein complexes in high-throughput protein interaction screens using an infinite latent feature model<>psb<>wei chu<>
18100<>4400_0<>bir bhanu<>super-resolution restoration of facial images in video<>icpr<>jiangang yu<>
18102<>4400_2<>bir bhanu<>evolutionary feature synthesis for facial expression recognition<>prl<>jiangang yu<>
18097<>4401_0<>gabriel pui cheong fung:hongjun lu:philip s. yu<>text classification without negative examples revisit<>tkde<>jeffrey xu yu<>
40374<>4405_0<>yan chen:david bindel<>towards unbiased end-to-end network diagnosis<>sigcomm<>yao zhao<>
40375<>4406_0<>hee beng kuan tan:hongyu zhang<>estimating loc for information systems from their conceptual data models<>icse<>yuan zhao<>
40378<>4407_0<>dhruv mubayi:gyargy turan<>the dnf exception problem<>tcs<>yi zhao<>
40377<>4409_0<>daniel stoffler:michel f. sanner<>hierarchical and multi-resolution representation of protein flexibility<>bioinformatics<>yong zhao<>
27196<>4413_0<>martin kutz<>the density of iterated crossing points and a gap result for triangulations of finite point sets<>compgeom<>rolf klein<>
27187<>4415_1<>annette ebbers-baumann:ansgar grune<>the geometric dilation of finite point sets<>algorithmica<>rolf klein<>
27192<>4415_6<>sandor p. fekete:andreas nuchter<>online searching with an autonomous robot<>comgeo<>rolf klein<>
27194<>4415_8<>christos levcopoulos:andrzej lingas<>a ptas for minimum vertex dilation triangulation of a simple polygon with a constant number of sources of dilation<>comgeo<>rolf klein<>
31732<>4418_0<>jieun lee:myung-soo kim<>realistic human hand deformation<>jvca<>seung-hyun yoon<>
31736<>4420_0<>michael harville:h. harlyn baker:nina t. bhatti<>automatic skin pixel selection and skin color classification<>icip<>sangho yoon<>
31737<>4420_1<>nulo<>vector quantization with model selection<>dcc<>sangho yoon<>
20217<>4423_0<>bharadwaj veeravalli:hun kwoon:goh whee:see lai:lim hian:ho chow<>"design, analysis, and implementation of an agent driven pull-based distributed video-on-demand system."<>mta<>long chen<>
20218<>4423_1<>haiping wu:eunjung park:juan del cuvillo:guang r. gao<>user-friendly methodology for automatic exploration of compiler options: a case study on the intel xscale microarchitecture<>serp<>long chen<>
20219<>4423_2<>haiping wu:joseph manzano:guang r. gao<>a user-friendly methodology for automatic exploration of compiler options<>serp<>long chen<>
20176<>4426_2<>tony sun:guang yang:m. y. sanadidi:mario gerla<>monitoring access link capacity using tfrc probe<>comcom<>ling-jyh chen<>
20179<>4426_5<>tony sun:yung-chih chen<>improving bluetooth edr data throughput using fec and interleaving<>msn<>ling-jyh chen<>
20184<>4426_10<>tony sun:li lao:guang yang:m. y. sanadidi:mario gerla<>estimating link capacity in high speed networks<>networking<>ling-jyh chen<>
29049<>4429_2<>ming xiong:deji chen<>deferrable scheduling for temporal consistency: schedulability analysis and overhead reduction<>rtcsa<>song han<>
20203<>4430_2<>peter kharchenko:yoav freund:dennis vitkup:george m. church<>identifying metabolic enzymes with multiple types of association evidence<>bmcbi<>lifeng chen<>
20204<>4432_0<>william-chandra tjhi<>a partitioning based algorithm to fuzzy co-cluster documents and words<>prl<>lihui chen<>
29051<>4433_0<>chunhui zhang:jian wang:mo yi:zhengyou zhang<>automatic real-time barcode localization in complex scenes<>icip<>shi han<>
29053<>4433_2<>shiqi peng:gang pan:yueming wang<>hallucinating 3d faces<>accv<>shi han<>
29054<>4433_3<>gang pan:zhaohui wu:yueming wang<>super-resolution of 3d face<>eccv<>shi han<>
3197<>4440_1<>shin-hung chung:kuo-feng ssu:hewijin christine jiau<>improving data transmission with helping nodes for geographical ad hoc routing<>prdc<>chih-hsun chou<>
3198<>4440_2<>kuo-feng ssu:wei-te shih:pau-choo chung:hewijin christine jiau<>detection and recovery for disconnection failures in a web-based medical teleconsultation system<>prdc<>chih-hsun chou<>
3200<>4441_1<>shaleeza sohail:sanjay jha:salil s. kanhere<>qos driven parallelization of resources to reduce file download delay<>tpds<>chun tung chou<>
3181<>4442_0<>jiang yu:zongkai yang:xu du:tai wang<>a dynamic caching algorithm based on internal popularity distribution of streaming media<>mms<>chun tung chou<>
3182<>4442_1<>jiang yu:xu du:tai wang<>internal popularity of streaming video and its implication on caching<>aina<>chun tung chou<>
3186<>4442_5<>wen hu:sanjay jha:nirupama bulusu<>deploying long-lived and cost-effective hybrid sensor networks<>adhoc<>chun tung chou<>
20239<>4446_0<>lei zhang:feng jing:kefeng deng:wei-ying ma<>enjoyphoto: a vertical image search engine for enjoying high-quality photos<>mm<>le chen<>
20240<>4446_1<>xirong li:lei zhang:fuzong lin:wei-ying ma<>image annotation by large-scale content-based image retrieval<>mm<>le chen<>
20243<>4446_4<>lei zhang:feng jing:kefeng deng:wei-ying ma<>ranking web objects from multiple communities<>cikm<>le chen<>
20245<>4447_1<>qian zhu:gagan agrawal<>supporting a real-time distributed intrusion detection application on gates<>europar<>liang chen<>
20248<>4447_4<>gagan agrawal<>supporting self-adaptation in streaming data mining applications<>ipps<>liang chen<>
20222<>4449_1<>gul agha<>state aware data dissemination over structured overlays<>p2p<>liping chen<>
14760<>4454_2<>haruhide matsuda<>"on (g, f, n)-critical graphs."<>arscom<>jianxiang li<>
14765<>4458_2<>hongji yang<>incorporating legacy system into semantic grid framework<>iri<>jianzhi li<>
14697<>4461_2<>james z. wang<>real-time computerized annotation of pictures<>mm<>jia li<>
14700<>4461_5<>james ze wang:kurt grieb:ya zhang:ching-chih chen:yixin chen<>machine annotation and retrieval for digital imagery of historical materials<>jodl<>jia li<>
14712<>4461_17<>ritendra datta:weina ge:james ze wang<>toward bridging the annotation-retrieval gap in image search by a generative modeling approach<>mm<>jia li<>
14719<>4461_24<>dhiraj joshi:james ze wang<>the story picturing engine - a system for automatic text illustration<>tomccap<>jia li<>
14724<>4461_29<>d. joshi:j. z. wang<>a computationally efficient approach to the estimation of two- and three-dimensional hidden markov models<>tip<>j. li<>
14725<>4461_30<>ding zhou:eren manavoglu:c. lee giles:hongyuan zha<>probabilistic models for discovering e-communities<>www<>jia li<>
14728<>4461_33<>ritendra datta:dhiraj joshi:james ze wang<>studying aesthetics in photographic images using a computational approach<>eccv<>jia li<>
14734<>4461_39<>hongyuan zha<>two-way poisson mixture models for simultaneous document classification and word clustering<>csda<>jia li<>
14740<>4462_2<>keith b. frikken:mikhail j. atallah<>"trust negotiation with hidden credentials, hidden policies, and policy cycles."<>ndss<>jiangtao li<>
14742<>4462_4<>keith b. frikken:mikhail j. atallah<>attribute-based access control with hidden policies and hidden credentials<>tc<>jiangtao li<>
14744<>4462_6<>ninghui li<>a construction for general and efficient oblivious commitment based envelope protocols<>icics<>jiangtao li<>
14748<>4462_10<>ninghui li<>oacerts: oblivious attribute certificates<>tdsc<>jiangtao li<>
34107<>4466_0<>jiuxing liu:bulent abali:dhabaleswar k. panda<>high performance vmm-bypass i/o in virtual machines<>usenix<>wei huang<>
34109<>4466_2<>qi gao:weikuan yu:dhabaleswar k. panda<>application-transparent checkpoint/restart for mpi programs over infiniband<>icpp<>wei huang<>
34120<>4471_2<>alain mille<>conkmel: a contextual knowledge management framework to support multimedia e-learning<>mta<>weihong huang<>
34123<>4471_5<>emmanuel eze:david webster<>towards integrating semantics of multi-media resources and processes in e-learning<>mms<>weihong huang<>
12640<>4474_0<>de liu<>designing online auctions with past performance information<>dss<>jianqing chen<>
16488<>4483_2<>nulo<>a comparative study of algorithmic debugging strategies<>lopstr<>josep silva<>
16491<>4483_5<>olaf chitil<>combining algorithmic debugging and program slicing<>ppdp<>josep silva<>
16494<>4483_8<>nulo<>slicing xml documents<>entcs<>josep silva<>
16484<>4484_0<>maxweel carmo:bruno carvalho:edmundo monteiro:paulo simoes:marilia curado:fernando boavida<>nsis-based quality of service and resource allocation in ethernet networks<>wwic<>jorge sa silva<>
16456<>4485_6<>luis silva:henrique madeira<>software aging and rejuvenation in a soap-based server<>nca<>joao gabriel silva<>
16464<>4485_14<>patricio domingues:luis silva<>sharing checkpoints to improve turnaround time in desktop grid<>aina<>joao gabriel silva<>
16502<>4487_0<>edmund k. burke<>the influence of the fitness evaluation method on the performance of multiobjective search algorithms<>eor<>j. d. landa silva<>
16498<>4489_0<>gabriel pereira lopes<>identification of document language is not yet a completely solved problem<>cimca<>joaquim ferreira da silva<>
16497<>4490_0<>paulo rupino da cunha<>reconciling the irreconcilable? a software development approach that combines agile with formal<>hicss<>josc goncalo a. oliveira basto da silva<>
16427<>4491_9<>antonio morgado:paulo j. matos:vasco m. manquinho<>counting models in integer domains<>sat<>joao p. marques silva<>
28920<>4493_0<>tomasz f. stepinski:ricardo vilalta<>automatic recognition of landforms on mars using terrain segmentation and classification<>dis<>soumya ghosh<>
28900<>4494_10<>anurag dasgupta:sebastien tixeuil<>selfish stabilization<>sss<>sukumar ghosh<>
7591<>4496_3<>sung woo choi:doyong kwon:hyungju park:chee-keng yap<>shortest path amidst disc obstacles is computable<>ijcga<>ee-chien chang<>
7592<>4496_4<>mun choon chan:liming lu:peng song ngiam<>effect of malicious synchronization<>acns<>ee-chien chang<>
7594<>4496_6<>qiming li<>hiding secret points amidst chaff<>eurocrypt<>ee-chien chang<>
7597<>4496_9<>shuiming ye:qibin sun<>error resilient image authentication using feature statistical and spatial properties<>iwdw<>ee-chien chang<>
7541<>4498_3<>gang wu:yen-kuang chen:christoper hughes<>incremental approximate matrix factorization for speeding up support vector machines<>kdd<>edward y. chang<>
7542<>4498_4<>steven c. h. hoi:michael r. lyu<>learning the unified kernel machines for classification<>kdd<>edward y. chang<>
7545<>4498_7<>navneet panda<>efficient top-k hyperplane query processing for multimedia information retrieval<>mm<>edward y. chang<>
7556<>4498_18<>navneet panda<>kdx: an indexer for support vector machines<>tkde<>edward y. chang<>
7564<>4498_26<>navneet panda:gang wu<>concept boundary detection for speeding up svms<>icml<>edward y. chang<>
7574<>4498_36<>arun qamra:belle l. tseng<>mining blog stories using community-based and temporal clustering<>cikm<>edward y. chang<>
7585<>4498_47<>wenyen chen:benjamin n. lee<>fotowiki: distributed map enhancement service<>mm<>edward y. chang<>
7586<>4498_48<>navneet panda:arun qamra<>hypersphere indexer<>dexa<>edward y. chang<>
28921<>4501_0<>preetam ghosh:kalyan basu:sajal k. das:simon daefler<>isimbiosys: a discrete event simulation platform for 'in silico' study of biological systems<>anss<>samik ghosh<>
28924<>4501_3<>preetam ghosh:kalyan basu:sajal k. das:simon daefler<>stochastic modeling of cytoplasmic reactions in complex biological systems<>iccsa<>samik ghosh<>
7605<>4502_0<>polly m. s. poon:tharam s. dillon:ling feng<>xml descriptor based approach for real time data messaging<>isorc<>elizabeth chang<>
992<>4505_0<>dinesh kumar 0002:venkatesh ramaiyan:eitan altman<>capacity optimizing hop distance in a mobile ad hoc network with power control<>wiopt<>anurag kumar<>
993<>4505_1<>srinivas shakkottai:eitan altman<>the case for non-cooperative multihoming of users to access points in ieee 802.11 wlans<>infocom<>anurag kumar<>
21980<>4514_3<>dinesh rathi:michael b. twidale<>wikifying your interface: facilitating community-based interface translation<>ACMdis<>m. cameron jones<>
21951<>4516_8<>j. andreas baerentzen:milos sramek<>3d distance fields: a survey of techniques and applications<>tvcg<>mark w. jones<>
21906<>4521_0<>nulo<>voices across the digital divide<>interactions<>matt jones<>
21907<>4521_1<>fabio crestani:mark d. dunlop:steve jones:stefano mizzaro<>theme issue on interactive mobile information access<>puc<>matt jones<>
21921<>4521_15<>dynal patel:gary marsden:steve jones<>improving photo searching interfaces for small-screen mobile computers<>mhci<>matt jones<>
21923<>4521_17<>steve jones<>the music is the message<>interactions<>matt jones<>
21931<>4521_25<>george buchanan:tzu-chiang cheng:preeti jain<>changing the pace of search: supporting background information seeking<>jasis<>matt jones<>
10444<>4524_3<>xinbiao zhou:haibin liu:meimei li:lv-an tang:yu fan:zijing hu<>monitoring abnormal patterns with complex semantics over icu data streams<>iwicpas<>hongyan li<>
10432<>4526_2<>chin-chuan ho:fang-fei kuo:suh-yin lee<>incremental mining of sequential patterns over a stream sliding window<>icdm<>hua-fu li<>
10433<>4526_3<>chin-chuan ho:fang-fei kuo:suh-yin lee<>a new algorithm for maintaining closed frequent itemsets in data streams by incremental updates<>icdm<>hua-fu li<>
10436<>4526_6<>suh-yin lee:man-kwan shan<>dsm-plw: single-pass mining of path traversal patterns over streaming web click-sequences<>cn<>hua-fu li<>
10439<>4526_9<>man-kwan shan:suh-yin lee<>online mining of frequent query trees over xml data streams<>www<>hua-fu li<>
10425<>4528_2<>jin-shea kuo:ying-kuei yang<>learning transliteration lexicons from the web<>acl<>haizhou li<>
10426<>4528_3<>namunu chinthaka maddage:mohan s. kankanhalli<>music structure based vector space retrieval<>sigir<>haizhou li<>
10428<>4528_5<>minghui dong:kim-teng lua<>a unit selection-based speech synthesis approach for mandarin chinese<>jclc<>haizhou li<>
10420<>4531_1<>allen clement:edmund l. wong:jeff napper:indrajit roy:lorenzo alvisi:michael dahlin<>bar gossip<>osdi<>harry c. li<>
12577<>4539_0<>yixin chen:yi pan:wei liu:ling chen<>partitioned optimization algorithms for multiple sequence alignment<>aina<>juan chen<>
5285<>4542_2<>yi deng:s. masoud sadjadi:peter j. clarke:vagelis hristidis:raju rangaswami:nagarajan prabakar<>a communication virtual machine<>compsac<>chi zhang<>
5289<>4542_6<>vassilios tsaoussidis<>tcp smoothness and window adjustment strategy<>tmm<>chi zhang<>
5278<>4543_3<>tong liu:pengwei hao<>fingerprint reference point detection based on local axial symmetry<>icpr<>chao zhang<>
5280<>4543_5<>shu yang<>regression nearest neighbor in face recognition<>icpr<>chao zhang<>
5282<>4543_7<>tong liu:pengwei hao<>fingerprint indexing based on las registration<>icip<>chao zhang<>
5296<>4545_1<>hai-ri li:jian-bing fan:jessica wang-rodriguez:tracy downs:xiang-dong fu:michael q. zhang<>profiling alternatively spliced mrna isoforms for prostate cancer classification<>bmcbi<>chaolin zhang<>
5297<>4545_2<>xuesong lu:xuegong zhang<>significance of gene ranking for classification of microarray samples<>tcbb<>chaolin zhang<>
5240<>4546_5<>wei-bang chen<>a robust method for biological sequence clustering<>iri<>chengcui zhang<>
10449<>4547_1<>s. alireza aghili:divyakant agrawal:amr el abbadi<>flux: content and structure matching of xpath queries with range predicates<>xsym<>hua-gang li<>
5261<>4548_3<>yong rui:li-wei he<>light weight background blurring for video conferencing applications<>icip<>cha zhang<>
5264<>4548_6<>yong rui<>robust visual tracking via pixel classification and integration<>icpr<>cha zhang<>
10457<>4549_1<>simon thompson<>comparative study of refactoring haskell and erlang programs<>scam<>huiqing li<>
27316<>4554_0<>hao zhang 0002:oliver van kaick<>spectral sequencing based on graph distance<>gmp<>rong liu<>
12527<>4556_0<>tei-wei kuo<>allocation cost minimization for periodic hard real-time tasks in energy-constrained dvs systems<>iccad<>jian-jia chen<>
12528<>4556_1<>heng-ruey hsu:tei-wei kuo<>leakage-aware energy-efficient scheduling of real-time tasks in multiprocessor systems<>rtas<>jian-jia chen<>
12529<>4556_2<>tei-wei kuo<>procrastination for leakage-aware rate-monotonic scheduling on a dynamic voltage scaling processor<>lctrts<>jian-jia chen<>
12531<>4556_4<>jun wu:chi-sheng shih<>approximation algorithms for scheduling real-time jobs with multiple feasible intervals<>rts<>jian-jia chen<>
27321<>4557_0<>predrag spasojevic:emina soljanin<>reliable channel regions for good binary codes transmitted over parallel channels<>tit<>ruoheng liu<>
12558<>4559_2<>tao ni:doug a. bowman<>increased display size and resolution improve task performance in information-rich virtual environments<>graphicsinterface<>jian chen<>
12559<>4559_3<>doug a. bowman:chadwick a. wingrave:john f. lucas:andrew ray:nicholas f. polys:qing li:yonca haciahmetoglu:ji-sun kim:seonho kim:robert boehringer:tao ni<>new directions in 3d user interfaces<>ijvr<>jian chen<>
27303<>4565_4<>nulo<>dynamic category profiling for text filtering and classification<>pakdd<>rey-long liu<>
10980<>4566_3<>leana golubchik<>scalable data collection and retrieval infrastructure for digital government applications<>dgo<>hanan samet<>
10984<>4566_7<>egemen tanin:aaron harwood:deepa nayar:sarana nutanong<>building and querying a p2p virtual world<>geoinformatica<>hanan samet<>
11027<>4566_50<>jagan sankaranarayanan:houman alborzi<>distance join queries on spatial networks<>gis<>hanan samet<>
11048<>4566_71<>charles ben cranston<>efficient position-independent iconic search using an r-theta index<>gis<>hanan samet<>
11065<>4566_88<>jagan sankaranarayanan:houman alborzi<>enabling query processing on spatial networks<>icde<>hanan samet<>
11066<>4566_89<>dave tahmoush<>image similarity and asymmetry to improve computer-aided detection of breast cancer<>mammo<>hanan samet<>
12618<>4568_1<>fernando paganini:m. y. sanadidi:ren wang:mario gerla<>fluid-flow analysis of tcp westwood with red<>cn<>jiwei chen<>
12610<>4569_2<>dana angluin<>learning a hidden hypergraph<>jmlr<>jiang chen<>
12616<>4569_8<>dana angluin:james aspnes:yinghua wu<>learning a circuit by injecting values<>stoc<>jiang chen<>
12625<>4575_0<>bo-yin yang:chen-mou cheng:bor-rong chen<>implementing minimized multivariate pkc on low-resource embedded systems<>spc<>jiun-ming chen<>
12590<>4579_1<>yun yang<>key research issues in grid workflow verification and validation<>acsw<>jinjun chen<>
7274<>4587_0<>ye tian:kam wing ng<>"modeling, analysis and improvement for bittorrent-like file sharing networks."<>infocom<>di wu<>
7276<>4587_2<>ye tian:kam-wing ng<>analyzing multiple file downloading in bittorrent<>icpp<>di wu<>
7277<>4587_3<>ye tian:kam-wing ng<>roogle: supporting efficient high-dimensional range queries in p2p systems<>europar<>di wu<>
7278<>4587_4<>ye tian:kam-wing ng<>analytical study on improving dht lookup performance under churn<>p2p<>di wu<>
12604<>4588_1<>fredrik bengtsson<>computing maximum-scoring segments in almost linear time<>cocoon<>jingsen chen<>
7279<>4593_0<>damian m. tan:marilyn baird:john decampo:chris white:hong ren wu<>perceptually lossless medical image coding<>tmi<>david wu<>
39656<>4597_1<>frank y. shih<>genetic algorithm based methodology for breaking the steganalytic systems<>tsmc<>yi-ta wu<>
39657<>4598_0<>xiuwen liu:washington mio:kyle a. gallivan<>two-stage optimal component analysis<>icip<>yiming wu<>
39629<>4599_0<>quanzhi li<>identifying important concepts from medical documents<>jbi<>yi-fang brook wu<>
39651<>4602_1<>qiang wu:margaret martonosi:douglas w. clark:vijay janapa reddi:dan connors:jin lee:david brooks<>dynamic-compiler-driven control for microprocessor energy and performance<>micro<>youfeng wu<>
39652<>4603_0<>qiulei dong:zhanyi hu<>gesture recognition using quadratic curves<>accv<>yihong wu<>
39653<>4603_1<>zhanyi hu<>detecting critical configuration of six points<>accv<>yihong wu<>
39636<>4605_1<>kamal jain:sun-yuan kung<>a unification of network coding and tree-packing (routing) theorems<>tit<>yunnan wu<>
39642<>4606_0<>cong wang:sin chun ng:anant madabhushi:yixin zhong<>breast cancer diagnosis using neural-based linear fusion strategies<>iconip<>yunfeng wu<>
39645<>4607_1<>huamin qu:hong zhou<>controllable and progressive edge clustering for large networks<>gd<>yingcai wu<>
39646<>4607_2<>huamin qu:hong zhou:ming-yuen chan<>fusing features in direct volume rendered images<>isvc<>yingcai wu<>
39647<>4607_3<>ying tang:huamin qu:hong zhou<>natural textures for weather data visualization<>iv<>yingcai wu<>
39649<>4608_1<>long qin:zhen-hua ling:bu-fan zhang:ren-hua wang<>hmm-based emotional speech synthesis using average emotion model<>iscslp<>yi-jian wu<>
34170<>4614_1<>dong-hee kwon:young-joo suh:james won-ki hong<>towards autonomic network management for mobile ipv4 based wireless networks<>ipom<>woo-jae kim<>
34171<>4614_2<>kyung-jin bae:dong-hee kwon:young-joo suh<>an efficient multicast routing protocol in multi-rate wireless ad hoc networks<>euc<>woo-jae kim<>
34172<>4614_3<>seon-don lee:dong-hee kwon:young-joo suh<>improving tcp throughput and fairness over multi-rate ieee 802.11 wireless lans<>iccsa<>woo-jae kim<>
34148<>4619_8<>nulo<>on addressing the computer science crisis<>jot<>won kim<>
34151<>4619_11<>nulo<>directions for web-based learning<>icwl<>won kim<>
34153<>4619_13<>nulo<>trends in the uses of the internet - 2006<>jot<>won kim<>
18730<>4620_1<>young-in song:hoo-jung chung:jooyoung lee:hae-chang rim:jae-won lee<>k-qard: a practical korean question answering framework for restricted domain<>acl<>kyoung-soo han<>
18731<>4620_2<>young-in song:hae-chang rim<>probabilistic model for definitional question answering<>sigir<>kyoung-soo han<>
35320<>4626_0<>vetle i. torvik:neil r. smalheiser<>adam: another database of abbreviations in medline<>bioinformatics<>wei zhou<>
5056<>4631_6<>tsu-fen han:wen-chung shih:wen-chung chiang:chih-hung chang<>metropolitan-scale grid environment: the implementation and applications of tiger grid<>ispa<>chao-tung yang<>
5057<>4631_7<>wen-chung shih:ping-i chen:shian-shyong tseng<>performance-based content retrieval for learning object repositories on grid environments<>pdcat<>chao-tung yang<>
5065<>4631_15<>wen-chung shih:shian-shyong tseng:chun-jen chen<>a peer-to-peer based framework of interlibrary cooperation for digital libraries<>pdcat<>chao-tung yang<>
5067<>4631_17<>ping-i chen:sung-yi chen:hao-yu tung<>a jobs allocation strategy for multiple drbl diskless linux clusters with condor schedulers<>gcc<>chao-tung yang<>
5071<>4631_21<>chun-sheng liao<>on construction and performance evaluation of cluster of linux pc clusters environments<>ccgrid<>chao-tung yang<>
5080<>4631_30<>wen-chung shih:shian-shyong tseng<>a performance-based approach to dynamic workload distribution for master-slave applications on grid environments<>gpc<>chao-tung yang<>
5085<>4631_35<>chun-sheng liao:ping-i chen:hao-yu tung<>a information monitoring and job scheduling system for multiple linux pc clusters<>pdcat<>chao-tung yang<>
5094<>4631_44<>cheng-fang lin:sung-yi chen<>a workflow-based computational resource broker with information monitoring in grids<>gcc<>chao-tung yang<>
5100<>4633_0<>hsin-hsi chen:wen-cheng lin:wei-hao lin<>translating-transliterating named entities for multilingual information access<>jasis<>changhua yang<>
5105<>4634_3<>nan liu:marc sageman<>analyzing the terrorist social networks with visualization tools<>isi<>christopher c. yang<>
5107<>4634_5<>fu lee wang:xiaodong shi<>multi-document summarization for terrorism information extraction<>isi<>christopher c. yang<>
5110<>4634_8<>xiaodong shi<>discovering event evolution graphs from newswires<>www<>christopher c. yang<>
5113<>4634_11<>nan liu<>measuring similarity of semi-structured documents with context weights<>sigir<>christopher c. yang<>
5123<>4634_21<>kar wing li<>conceptual analysis of parallel corpus collected from the web<>jasis<>christopher c. yang<>
5136<>4637_0<>a. mason<>zero-if vga with novel offset cancellation<>iscas<>c. yang<>
26017<>4642_7<>malgorzata marek-sadowska<>semi-individual wire-length prediction with application to logic synthesis<>tcad<>qinghua liu<>
26019<>4644_0<>xuemin lin:yidong yuan:xiaofang zhou:hongjun lu<>summarizing level-two topological relations in large spatial datasets<>tods<>qing liu<>
26020<>4644_1<>jian pei:yidong yuan:xuemin lin:wen jin:martin ester:wei wang:yufei tao:jeffrey xu yu:qing zhang<>towards multidimensional subspace skyline analysis<>tods<>qing liu<>
35304<>4645_11<>r. chellappa doss:d. chandra:l. pan:m. chowdhury<>lease based addressing for event-driven wireless sensor networks<>iscc<>w. zhou<>
35310<>4645_17<>wei shi<>frequency distribution of tata box and extension sequences on human promoters<>imsccs<>wanlei zhou<>
26024<>4647_1<>yang liu:shouxun lin<>tree-to-string alignment template for statistical machine translation<>acl<>qun liu<>
26027<>4649_2<>taorong qiu:xiaoqing chen:houkuan huang<>ontology capture based on granular computing<>isda<>qing liu<>
26030<>4653_0<>andrew h. sung:jianyun xu:bernardete ribeiro<>image complexity and feature extraction for steganalysis of lsb matching steganography<>icpr<>qingzhong liu<>
26031<>4653_1<>jianyun xu:andrew h. sung<>tree based behavior monitoring for adaptive fraud detection<>icpr<>qingzhong liu<>
26033<>4655_1<>deyi xiong:shouxun lin<>maximum entropy based phrase reordering model for statistical machine translation<>acl<>qun liu<>
7100<>4656_0<>olivier salvado:claudia hillenbrand:shaoxiang zhang<>method to correct intensity inhomogeneity in mr images for atherosclerosis characterization<>tmi<>david l. wilson<>
36311<>4662_4<>chuang lin:yan (lindsay) sun:jianping pan:peter langendorfer:zhenfu cao<>wireless network security<>wicomm<>xuemin shen<>
36312<>4662_5<>hui chen:yang xiao<>update-based cache access and replacement in wireless data access<>tmc<>xuemin shen<>
36329<>4665_3<>bin tan:chengxiang zhai<>mining long-term search history to improve search accuracy<>kdd<>xuehua shen<>
36332<>4665_6<>dong xin:qiaozhu mei:jiawei han<>discovering interesting patterns through user's interactive feedback<>kdd<>xuehua shen<>
36346<>4668_11<>chengliang zhang:kirk kelsey:chen ding:matthew hertz:mitsunori ogihara<>program-level adaptive memory management<>iwmm<>xipeng shen<>
2580<>4678_3<>magy seif el-nasr<>learning through game<>cie<>brian k. smith<>
2588<>4679_5<>jacob kohler:katherine munn:alexander ruegg:andre skusa<>quality control for terms and definitions in ontologies and taxonomies<>bmcbi<>barry smith<>
2551<>4681_3<>nulo<>constraint programming models for graceful graphs<>cp<>barbara m. smith<>
2555<>4681_7<>brahim hnich:steven david prestwich:evgeny selensky<>constraint models for the covering test problem<>constraints<>barbara m. smith<>
2045<>4689_5<>bingsheng he:qiong luo<>cache-conscious automata for xml filtering<>tkde<>byron choi<>
2052<>4690_2<>eric simonton:steven seidel<>using gossip for dynamic resource discovery<>icpp<>byung kyu choi<>
2038<>4691_1<>t. s. raghu:ajay s. vinze<>an empirical study of standards development for e-businesses: a social network perspective<>hicss<>beomjin choi<>
17509<>4699_20<>azadeh davoodi:vishal khandelwal:ankur srivastava:miodrag potkonjak<>a statistical methodology for wire-length prediction<>tcad<>jennifer l. wong<>
11295<>4702_0<>hui cheng:xi min zhang:yun q. shi:anthony vetro<>constant quality rate allocation for fgs coding using composite r-d analysis<>tmm<>huifang sun<>
11292<>4704_0<>ping zhang<>the role of moderating factors in user technology acceptance<>ijmms<>heshan sun<>
11294<>4704_2<>ping zhang:na li<>affective quality and cognitive absorption: extending technology acceptance research<>hicss<>heshan sun<>
18836<>4711_2<>lean yu:shouyang wang:wei huang<>a novel nonlinear neural network ensemble model for financial time series forecasting<>iccS<>kin keung lai<>
18837<>4711_3<>lean yu:shouyang wang:chengxiong zhou<>a double-stage genetic optimization algorithm for portfolio selection<>iconip<>kin keung lai<>
18838<>4711_4<>lean yu:shouyang wang:ligang zhou<>credit risk analysis using a reliability-based neural network ensemble model<>icann<>kin keung lai<>
18841<>4711_7<>chengxiong zhou:lean yu:tao huang:shouyang wang<>selecting valuable stock using genetic algorithm<>seal<>kin keung lai<>
18846<>4711_12<>shuqin liu:jichang dong:shouyang wang<>a stochastic approach to hotel revenue management considering multiple-day stays<>ijitdm<>kin keung lai<>
18847<>4711_13<>lean yu:shouyang wang:ligang zhou<>neural network metalearning for credit scoring<>icic<>kin keung lai<>
18848<>4711_14<>lean yu:shouyang wang<>currency crisis forecasting with general regression neural networks<>ijitdm<>kin keung lai<>
17482<>4714_15<>l. g. alex sung<>autonomic resource management for a cluster that executes batch jobs<>cluster<>johnny w. wong<>
27591<>4718_8<>matthew w. hoffman:david b. grimes:aaron p. shon<>a probabilistic model of gaze imitation and shared attention<>nn<>rajesh p. n. rao<>
27602<>4718_19<>seungsin lee<>self-similar random field models in discrete space<>tip<>raghuveer m. rao<>
27612<>4718_29<>brandon mikulis<>object labeling for 3-d cross-sectional data using trajectory tracking<>icip<>raghuveer rao<>
25193<>4720_6<>boris aronov:erik d. demaine:joachim gudmundsson:john iacono:stefan langerman:michiel h. m. smid<>data structures for halfplane proximity queries and incremental voronoi diagrams<>latin<>prosenjit bose<>
25198<>4720_11<>michiel h. m. smid:daming xu<>diamond triangulations contain spanners of bounded degree<>isaac<>prosenjit bose<>
25200<>4720_13<>jurek czyzowicz:zhicheng gao:pat morin:david r. wood<>simultaneous diagonal flips in plane triangulations<>soda<>prosenjit bose<>
25201<>4720_14<>ferran hurtado:eduardo rivera-campo:david r. wood<>partitions of complete geometric graphs into plane trees<>comgeo<>prosenjit bose<>
25216<>4720_29<>sergio cabello:otfried cheong:joachim gudmundsson:marc j. van kreveld:bettina speckmann<>area-preserving approximations of polygonal paths<>jda<>prosenjit bose<>
27582<>4721_5<>sarma b. k. vrudhula:chaitali chakrabarti:naehyuck chang<>an optimal analytical solution for processor speed control with thermal constraints<>islped<>ravishankar rao<>
27615<>4723_0<>pavan nuggehalli:vikram srinivasan:carla-fabiana chiasserini<>efficient cache placement in multi-hop wireless networks<>ton<>ramesh r. rao<>
14106<>4726_2<>jiangbo dang:michael n. huhns<>ontology reconciliation for service-oriented computing<>IEEEscc<>jingshan huang<>
14102<>4727_1<>ao tang:jang-won lee:mung chiang:a. robert calderbank<>reverse engineering mac<>wiopt<>jianwei huang<>
14103<>4727_2<>randall berry:michael l. honig<>auction-based spectrum sharing<>monet<>jianwei huang<>
14134<>4732_0<>adrian r. pearce<>distributed interactive learning in multi-agent systems<>aaai<>jian huang<>
14132<>4733_0<>adrian r. pearce<>toward inductive logic programming for collaborative problem solving<>iat<>jian huang<>
14124<>4735_0<>yang song:ding zhou:isaac g. councill:hongyuan zha:c. lee giles<>boosting the feature space: text classification for unstructured data on the web<>icdm<>jian huang<>
14125<>4735_1<>seyda ertekin:c. lee giles<>efficient name disambiguation for large-scale databases<>pkdd<>jian huang<>
14113<>4737_3<>ming-syan chen<>on the effect of group mobility to data replication in ad hoc networks<>tmc<>jiun-long huang<>
14115<>4737_5<>kun-ta chuang:ming-syan chen<>on exploring the power-law relationship in the itemset support distribution<>edbt<>jiun-long huang<>
14118<>4737_8<>jui-nan lin<>data broadcast on a multi-system heterogeneous overlayed wireless network<>pdcat<>jiun-long huang<>
14138<>4742_1<>tingshao zhu:russell greiner:dengyong zhou:dale schuurmans<>information marginalization on subgraphs<>pkdd<>jiayuan huang<>
801<>4744_4<>dipanjan chakraborty:yelena yesha<>integrating service discovery with routing and session management for ad-hoc networks<>adhoc<>anupam joshi<>
808<>4744_11<>sethuram balaji kodeswaran<>content and context aware networking using semantic tagging<>icde<>anupam joshi<>
814<>4744_17<>dipanjan chakraborty:yelena yesha:timothy w. finin<>toward distributed service discovery in pervasive computing environments<>tmc<>anupam joshi<>
824<>4744_27<>lalana kagal:tim finin:sol j. greenspan<>security and privacy challenges in open and dynamic environments<>computer<>anupam joshi<>
835<>4744_38<>boanerges aleman-meza:meenakshi nagarajan:cartic ramakrishnan:li ding:pranam kolari:amit p. sheth:ismailcem budak arpinar:tim finin<>semantic analytics on social networks: experiences in addressing the problem of conflict of interest detection<>www<>anupam joshi<>
870<>4745_0<>aashish phansalkar:lieven eeckhout:lizy kurian john<>measuring benchmark similarity using inherent program characteristics<>tc<>ajay joshi<>
868<>4746_3<>vinita v. deodhar:jeffrey a. davis<>low power multilevel interconnect networks using wave-pipelined multiplexed (wpm) routing<>vlsid<>ajay joshi<>
10189<>4751_0<>yasuyuki matsushita:xiaoou tang:xue-quan chen<>space-time video montage<>cvpr<>hong-wen kang<>
11290<>4754_0<>kirsty a. beilharz<>sonification guidelines facilitating an intuitive and rapid understanding/interpretation<>mmm<>hong jun song<>
17460<>4756_0<>richard gourlay:robert japp:mathias neumuller<>extracting partition statistics from semistructured data<>dexaw<>john n. wilson<>
17461<>4756_1<>richard gourlay:robert japp:mathias neumuller<>a resource efficient hybrid data structure for twig queries<>xsym<>john n. wilson<>
17462<>4757_0<>mirabelle d'cruz<>virtual and interactive environments for work of the future<>ijmms<>john r. wilson<>
17442<>4760_0<>emily k. lada<>a wavelet-based spectral procedure for steady-state simulation analysis<>eor<>james r. wilson<>
17443<>4760_1<>michael e. kuhl:sachin g. sumant<>an automated multiresolution procedure for modeling complex arrival processes<>informs<>james r. wilson<>
17453<>4760_11<>michael e. kuhl:emily k. lada:natalie m. steiger:mary ann flanigan wagner<>introduction to modeling and generating probabilistic input processes for simulation<>wsc<>james r. wilson<>
17459<>4761_0<>nulo<>automated classification of images from crystallisation experiments<>incdm<>julie wilson<>
2182<>4764_2<>qunfeng dong:suman banerjee<>throughput optimization and fair bandwidth allocation in multi-hop wireless lans<>infocom<>benyuan liu<>
2185<>4764_5<>daniel r. figueiredo:yang guo:james f. kurose:donald f. towsley<>on the efficiency of fluid simulation of networks<>cn<>benyuan liu<>
2207<>4765_19<>kaidi zhao:jeffrey benkler:weimin xiao<>rule interestingness analysis using olap operations<>kdd<>bing liu<>
2214<>4765_26<>kaidi zhao:jeffrey benkler:weimin xiao<>opportunity map: identifying causes of failure - a deployed data mining system<>kdd<>bing liu<>
2231<>4765_43<>yanhong zhai<>automatic wrapper generation using tree matching and partial tree alignment<>aaai<>bing liu<>
2241<>4765_53<>nitin jindal<>identifying comparative sentences in text documents<>sigir<>bing liu<>
2247<>4765_59<>yanhong zhai<>structured data extraction from the web based on partial tree alignment<>tkde<>bing liu<>
2250<>4765_62<>minqing hu<>opinion extraction and summarization on the web<>aaai<>bing liu<>
2262<>4766_2<>lei shi:wenjie li:beibei wu:yunhao liu<>ds-pps: a practical framework to guarantee differentiated qos in terabit routers with parallel packet switch<>infocom<>bin liu<>
2270<>4766_10<>kai zheng:chengchen hu:hongbin lu<>a tcam-based distributed parallel ip lookup scheme and performance analysis<>ton<>bin liu<>
2272<>4766_12<>wen-jie li:yang xu:heng liao<>parallel switch system with qos guarantee for real-time traffic<>jcst<>bin liu<>
2276<>4766_16<>kai zheng:hao che:zhijun wang:xin zhang<>dppc-re: tcam-based distributed parallel packet classification with range encoding<>tc<>bin liu<>
2277<>4767_0<>andrew b. kahng:xu xu<>statistical crosstalk aggressor alignment aware interconnect delay calculation<>slip<>bao liu<>
2282<>4767_5<>andrew b. kahng:xu xu<>statistical gate delay calculation with crosstalk alignment consideration<>glvlsi<>bao liu<>
2293<>4769_6<>robert a. joyce<>temporal segmentation of video using frame and histogram space<>tmm<>bede liu<>
2298<>4771_3<>zhilong shan<>the counting series for unlabeled linear acyclic hypergraphs<>arscom<>bolian liu<>
30123<>4776_5<>kevin knight<>discovering the linear writing order of a two-dimensional ancient hieroglyphic script<>ai<>shou de lin<>
30116<>4778_2<>demetrios zeinalipour-yazti:vana kalogeraki:dimitrios gunopulos:walid a. najjar<>efficient indexing data structures for flash-based sensor devices<>tos<>song lin<>
30117<>4778_3<>demetrios zeinalipour-yazti:dimitrios gunopulos<>distributed spatio-temporal similarity search<>cikm<>song lin<>
30130<>4781_0<>jingbin zhang:gang zhou:lin gu:john a. stankovic:tian he<>atpc: adaptive transmission power control for wireless sensor networks<>sensys<>shan lin<>
6865<>4784_24<>chris crutchfield:david molnar:david turner<>generic on-line/off-line threshold signatures<>pkc<>david wagner<>
6895<>4784_54<>raphael chung-wei phan<>security considerations for incremental hash functions based on pair block chaining<>compsec<>david wagner<>
6925<>4786_27<>sabine cornelsen<>completely connected clustered graphs<>jda<>dorothea wagner<>
8783<>4791_0<>kin-hong lee:kwong-sak leung<>genetic algorithm based on independent component analysis for global optimization<>ppsn<>gang li<>
8780<>4793_0<>steven w. zucker<>surface geometric constraints for stereo in belief propagation<>cvpr<>gang li<>
8776<>4794_0<>steven w. zucker<>differential geometric consistency extends stereo to curved surfaces<>eccv<>gang li<>
15108<>4810_0<>ying zhang:feng zhao<>robust distributed node localization with error management<>mobihoc<>juan liu<>
18367<>4811_1<>dongqing yang:lijun chen:jun gao:tengjiao wang<>cardinality computing: a new step towards fully representing multi-sets by bloom filters<>wise<>jiakui zhao<>
18362<>4813_1<>carole a. goble:robert stevens<>an identity crisis in the life sciences<>ipaw<>jun zhao<>
18360<>4814_0<>robert m. corless<>compact finite difference method for integro-differential equations<>amc<>jichao zhao<>
18322<>4816_2<>s. h. kwok<>content-based object organization for efficient image retrieval in image databases<>dss<>j. leon zhao<>
18323<>4816_3<>henry h. bi:hsinchun chen:daniel dajun zeng:chienting lin:michael chau<>process-driven collaboration support for intra-agency crime analysis<>dss<>j. leon zhao<>
18370<>4817_0<>sen-ching s. cheung:m. vijay venkatesh<>efficient object-based video inpainting<>icip<>jian zhao<>
18369<>4819_0<>zhao yang dong:zhao xu<>effective feature preprocessing for time series forecasting<>adma<>jun hua zhao<>
8469<>4824_0<>nicholas gerner:alan j. demers:johannes gehrke:mirek riedewald:jayavel shanmugasundaram<>automatic client-server partitioning of data-driven web applications<>sigmod<>fan yang<>
8471<>4824_2<>anand bhaskar:chavdar botev:muthiah m. muthaia chettiar:lin guo:jayavel shanmugasundaram:feng shao<>quark: an efficient xquery full-text implementation<>sigmod<>fan yang<>
20319<>4834_0<>primoz skraba:qing fang:an thai nguyen<>sweeps over wireless sensor networks<>ipsn<>leonidas j. guibas<>
20309<>4840_0<>niloy j. mitra:mark pauly<>partial and approximate symmetry detection for 3d geometry<>tog<>leonidas j. guibas<>
20306<>4841_1<>afra zomorodian:patrice koehl<>geometric filtering of pairwise atomic interactions applied to the design of efficient statistical potentials<>cagd<>leonidas j. guibas<>
20271<>4844_0<>stefan funke:an nguyen:yusu wang<>distance-sensitive information brokerage in sensor networks<>dcoss<>leonidas j. guibas<>
20277<>4844_6<>qing fang:jie gao<>locating and bypassing holes in sensor networks<>monet<>leonidas j. guibas<>
20298<>4844_27<>jie gao:an thai nguyen<>deformable spanners and applications<>comgeo<>leonidas j. guibas<>
34469<>4847_0<>i. samoylenko:t.-c. chao:c.-m. chen<>visualizing the scientific world and its evolution<>jasis<>wei-chih liu<>
38397<>4852_3<>k. el-maleh:s. manjunath<>upfront intra-refresh decision for low-complexity wireless video telephony<>iscas<>y. j. liang<>
31716<>4854_0<>daniela kohler:kathrin teller:thomas cremer:patricia le baccon:edith heard:roland eils:karl rohr<>non-rigid registration of 3d multi-channel microscopy images of cell nuclei<>miccai<>siwei yang<>
2949<>4859_0<>h. y. tian<>a criterion for a multi-dimensional explosion due to a concentrated nonlinear source<>appml<>c. y. chan<>
2938<>4862_1<>natheer khasawneh<>active user-based and ontology-based web log data preprocessing for web usage mining<>webi<>chien-chung chan<>
2943<>4863_1<>zheng li:stephen m. shaw:matthew j. yedwabnick<>using a state-space model with hidden variables to infer transcription factor activities<>bioinformatics<>christina chan<>
9935<>4871_3<>swarnalatha radhakrishnan:sri parameswaran:aleksandar ignjatovic<>application specific forwarding network and instruction encoding for multi-pipe asips<>codes<>hui guo<>
10167<>4872_5<>matthew johnson:jeffrey bradshaw:paul j. feltovich:renia jeffers:andrzej uszok<>a semantically rich policy based approach to robot control<>icinco<>hyuckchul jung<>
10170<>4872_8<>james f. allen:nathanael chambers:lucian galescu:mary swift:william taysom<>one-shot procedure learning from instruction and observation<>flairs<>hyuckchul jung<>
10174<>4872_12<>nathanael chambers:james f. allen:lucian galescu:william taysom<>using semantics to identify web objects<>aaai<>hyuckchul jung<>
10154<>4875_1<>min-su kim:remy prost:hyun-yeol chung<>a blind watermarking for 3-d dynamic mesh model using distribution of temporal wavelet coefficients<>mrcs<>ho-youl jung<>
10155<>4875_2<>jae-won cho:min-su kim:sebastien valette:remy prost<>3-d dynamic mesh compression using wavelet-based multiresolution analysis<>icip<>ho-youl jung<>
10158<>4875_5<>min-su kim:jae-won cho:remy prost<>wavelet analysis based blind watermarking for 3-d surface meshes<>iwdw<>ho-youl jung<>
10160<>4875_7<>jae-won cho:hyun-yeol chung<>a robust blind audio watermarking using distribution of sub-band signals<>mrcs<>ho-youl jung<>
34608<>4880_1<>shuying wang:qi hao<>an agent-based web service workflow model for inter-enterprise collaboration<>eswa<>weiming shen<>
34610<>4880_3<>yinsheng li:ying huang:xiaohua lu:xingdong shi:hamada ghenniwa<>multi-model driven collaborative development platform for service-oriented e-business systems<>cscwd<>weiming shen<>
34624<>4881_0<>anhai doan:raghu ramakrishnan:fei chen:pedro derose:yoonkyong lee:robert mccann:mayssam sayyadian<>community information management<>debu<>warren shen<>
34293<>4884_0<>mark giesbrecht:george labahn<>symbolic-numeric sparse interpolation of multivariate polynomials<>issac<>wen-shin lee<>
34291<>4888_0<>ken c. k. lee:hong va leong<>nearest surrounder queries<>icde<>wang-chien lee<>
34222<>4889_2<>roberto perdisci:guofei gu<>using an ensemble of one-class svm classifiers to harden payload-based anomaly detection systems<>icdm<>wenke lee<>
34238<>4889_18<>guofei gu:prahlad fogla:david dagon:boris skoric<>towards an information-theoretic framework for analyzing intrusion detection systems<>esorics<>wenke lee<>
34246<>4889_26<>prahlad fogla<>evading network anomaly detection systems: formal reasoning and practical techniques<>ccs<>wenke lee<>
34250<>4889_30<>david dagon:cliff zou<>modeling botnet propagation using time zones<>ndss<>wenke lee<>
34251<>4889_31<>prahlad fogla<>q-gram matching using tree models<>tkde<>wenke lee<>
34253<>4889_33<>hongmei deng:roger xu:jason h. li:frank zhang:renato levy<>agent-based cooperative anomaly detection for wireless ad hoc networks<>icpads<>wenke lee<>
34255<>4889_35<>guofei gu:prahlad fogla:douglas m. blough<>dso: dependable signing overlay<>acns<>wenke lee<>
34258<>4889_38<>collin mulliner:giovanni vigna:david dagon<>using labeling to prevent cross-service attacks against smart phones<>dimva<>wenke lee<>
34259<>4889_39<>guofei gu:prahlad fogla:david dagon:boris skoric<>measuring intrusion detection capability: an information-theoretic approach<>ccs<>wenke lee<>
34267<>4890_3<>dell zhang<>learning to separate text content and style for classification<>airs<>wee sun lee<>
34268<>4890_4<>dell zhang<>extracting key-substring-group features for text classification<>kdd<>wee sun lee<>
34273<>4890_9<>yew jin lim<>properties of forward pruning in game-tree search<>aaai<>wee sun lee<>
34280<>4890_16<>yew jin lim<>rankcut - a domain independent forward pruning method for games<>aaai<>wee sun lee<>
34188<>4893_2<>ken c. k. lee:baihua zheng:jianliang xu<>caching complementary space for location-based services<>edbt<>wang-chien lee<>
34199<>4893_13<>jianliang xu:xueyan tang:qing gao:shanping li<>an error-resilient and tunable distributed indexing scheme for wireless data broadcast<>tkde<>wang-chien lee<>
34210<>4893_24<>baihua zheng:jianliang xu:dik lun lee<>grid-partition index: a hybrid method for nearest-neighbor queries in wireless location-based services<>vldb<>wang-chien lee<>
34213<>4893_27<>yingqi xu<>exploring spatial correlation for link quality estimation in wireless sensor networks<>percom<>wang-chien lee<>
22507<>4902_6<>nico galoppo:miguel a. otaduy:paul mecklenburg:markus h. gross<>fast simulation of deformable models in contact using dynamic deformation textures<>sca<>ming c. lin<>
22518<>4902_17<>theodore kim:david adalsteinsson<>modeling ice dynamics as a thin-film stefan problem<>sca<>ming c. lin<>
22524<>4902_23<>naga k. govindaraju:dinesh manocha<>fast and reliable collision culling using graphics hardware<>tvcg<>ming c. lin<>
22499<>4903_0<>guillermo duran:sergio mera:jayme luiz szwarcfiter<>algorithms for clique-independent sets on subclasses of circular-arc graphs<>dam<>min chih lin<>
22500<>4903_1<>flavia bonomo:guillermo duran:jayme luiz szwarcfiter<>on balanced graphs<>mp<>min chih lin<>
171<>4904_1<>anthony p. reeves:david f. yankelevitz:claudia i. henschke:b. kressler:william j. kostis<>on measuring the change in size of pulmonary nodules<>tmi<>a. b. chan<>
15103<>4914_1<>lian-cui zuo:jia-liang wu<>the vertex linear arboricity of distance graphs<>dm<>jia-zhuang liu<>
15097<>4915_1<>aaron kimball:andrew c. myers<>interruptible iterators<>popl<>jed liu<>
31677<>4920_3<>mihaela cardei:jie wu<>topology control in ad hoc wireless networks using cooperative communication<>tmc<>shuhui yang<>
31679<>4920_5<>jie wu:mihaela cardei:fei dai<>extended dominating set and its applications in ad hoc networks using cooperative communication<>tpds<>shuhui yang<>
31693<>4926_3<>nulo<>associative memory scheme for genetic algorithms in dynamic environments<>evoW<>shengxiang yang<>
31697<>4926_7<>sima uyar<>adaptive mutation with fitness and allele distribution correlation for genetic algorithms<>sac<>shengxiang yang<>
31703<>4926_13<>nulo<>dominance learning in diploid genetic algorithms for dynamic optimization problems<>gecco<>shengxiang yang<>
31705<>4926_15<>yew-soon ong:yaochu jin<>editorial to special issue on evolutionary computation in dynamic and uncertain environments<>gpem<>shengxiang yang<>
31706<>4926_16<>nulo<>a comparative study of immune system based genetic algorithms in dynamic environments<>gecco<>shengxiang yang<>
15075<>4930_0<>zhenguo li:xiaoou tang<>shape from regularities for interactive 3d reconstruction of piecewise planar objects from single images<>mm<>jianzhuang liu<>
15077<>4930_2<>liangliang cao:xiaoou tang<>3d object retrieval using 2d line drawing and graph based relevance reedback<>mm<>jianzhuang liu<>
15078<>4930_3<>yun li:chunjing xu:xiaoou tang<>detecting irregularity in videos using kernel estimation and kd trees<>mm<>jianzhuang liu<>
15084<>4930_9<>liangliang cao:xiaoou tang<>degen generalized cylinders and their properties<>eccv<>jianzhuang liu<>
13343<>4931_0<>hans-erik giesen:yubao guo:gregory gutin:tommy jensen:arash rafiey<>characterization of edge-colored complete graphs with properly colored hamilton paths<>jgt<>jinfeng feng<>
15085<>4932_0<>roger j. hubbold<>mesh optimisation using edge information in feature-based surface reconstruction<>isvc<>jun liu<>
15086<>4932_1<>roger j. hubbold<>automatic camera calibration and scene reconstruction with scale-invariant features<>isvc<>jun liu<>
15058<>4935_2<>alec woo:siddharth seth:tim olson:feng zhao<>a spreadsheet approach to programming and managing sensor networks<>ipsn<>jie liu<>
15059<>4935_3<>zoe abrams<>greedy is good: on service tree placement for in-network stream processing<>icdcs<>jie liu<>
15065<>4935_9<>zoe abrams:ho-lin chen:leonidas j. guibas:feng zhao<>kinetically stable task assignment for networks of microservers<>ipsn<>jie liu<>
15071<>4936_3<>ton kloks:dieter kratsch:chuan-min lee<>improved bottleneck domination algorithms<>dam<>jiping liu<>
13325<>4937_1<>yuguo liao:yong zhang:lizhu zhou<>hidden conditioned homomorphism for xpath fragment containment<>dasfaa<>jianhua feng<>
13326<>4937_2<>qian qian:yuguo liao:lizhu zhou<>counting graph matches with adaptive statistics collection<>waim<>jianhua feng<>
13327<>4937_3<>guoliang li:jianyong wang:yong zhang:lizhu zhou<>incremental mining of frequent query patterns from xml queries for caching<>icdm<>jianhua feng<>
13329<>4937_5<>qian qian:jianyong wang:lizhu zhou<>exploit sequencing to accelerate xml twig query answering<>dasfaa<>jianhua feng<>
13330<>4937_6<>yi wang:lizhu zhou:jianyong wang:zhi-qiang liu<>mining complex time-series data by learning markovian models<>icdm<>jianhua feng<>
13332<>4937_8<>qian qian:jianyong wang:lizhu zhou<>exploit sequencing to accelerate hot xml query pattern mining<>sac<>jianhua feng<>
13334<>4937_10<>yi wang:li-zhu zhou:lei xie:chun yuan<>2d/3d web visualization on mobile devices<>wise<>jianhua feng<>
15053<>4941_1<>micah adler:donald f. towsley:chun zhang<>on optimal communication cost for gathering correlated data through wireless sensor networks<>mobicom<>junning liu<>
11167<>4942_16<>hui tian<>multicast-based inference for topology and network-internal loss performance from end-to-end measurements<>comcom<>hong shen<>
11181<>4942_30<>haibin kan<>lower bounds on the minimal delay of complex orthogonal designs with maximal rates<>tcom<>hong shen<>
11133<>4943_4<>hong lu:beng chin ooi:xiangyang xue<>hierarchical indexing structure for efficient similarity search in video retrieval<>tkde<>heng tao shen<>
11139<>4943_10<>h. v. jagadish:beng chin ooi:kian-lee tan<>toward efficient multifeature query processing<>tkde<>heng tao shen<>
11141<>4943_12<>beng chin ooi:kian-lee tan<>saverf: towards efficient relevance feedback search<>icde<>heng tao shen<>
11143<>4943_14<>bin cui:jialie shen:gao cong:cui yu<>exploring composite acoustic features for efficient music similarity query<>mm<>heng tao shen<>
11144<>4943_15<>zi huang:xiaofang zhou:dawei song<>3d protein structure matching by patch signatures<>dexa<>heng tao shen<>
11147<>4943_18<>xiaofang zhou:bin cui<>indexing and integrating multiple features for www images<>www<>heng tao shen<>
11148<>4943_19<>kai xu:xiaofang zhou:xuemin lin:ke deng<>a multiresolution terrain model for efficient visualization query processing<>tkde<>heng tao shen<>
11189<>4946_2<>ge wang:wenxiang cong:yi li:weimin han:durai kumar:xin qian<>recent development in bioluminescence tomography<>isbi<>haiou shen<>
11185<>4947_0<>james coughlan<>finding text in natural scenes by figure-ground segmentation<>icpr<>huiying shen<>
11186<>4947_1<>james coughlan:roberto manduchi<>computer vision-based terrain sensors for blind wheelchair users<>icchp<>huiying shen<>
15222<>4948_0<>subarna sinha:qing su:jamil kawa:charles chiang<>an ic manufacturing yield model considering intra-die variations<>dac<>jianfeng luo<>
15216<>4949_0<>hersh v. shukla:jean-pierre hubaux<>non-interactive location surveying for sensor networks with mobility-differentiated toa<>infocom<>jun luo<>
15226<>4950_0<>bao-liang lu<>gender recognition using a min-max modular support vector machine with equal clustering<>isnn<>jun luo<>
19810<>4951_4<>thomas eiter<>forgetting and conflict resolving in disjunctive logic programming<>aaai<>kewen wang<>
19817<>4951_11<>thomas eiter:giovambattista ianni:roman schindlauer:hans tompits<>forgetting in managing rules and ontologies<>webi<>kewen wang<>
15224<>4952_1<>jianmin wu:xizeng mao:tao cai:liping wei<>kobas server: a web-based platform for automated annotation and pathway identification<>nar<>jingchu luo<>
19821<>4955_0<>benjamin c. m. fung<>anonymizing sequential releases<>kdd<>ke wang<>
19824<>4955_3<>raymond chi-wing wong:jiuyong li:ada wai-chee fu<>"(alpha, k)-anonymity: an enhanced k-anonymity model for privacy preserving data publishing."<>kdd<>ke wang<>
35024<>4957_1<>qi gao:wei huang:dhabaleswar k. panda<>application-transparent checkpoint/restart for mpi programs over infiniband<>icpp<>weikuan yu<>
35029<>4957_6<>qi gao:dhabaleswar k. panda<>adaptive connection management for scalable mpi over infiniband<>ipps<>weikuan yu<>
35032<>4957_9<>shuang liang:dhabaleswar k. panda<>high performance block i/o for global file system (gfs) with infiniband rdma<>icpp<>weikuan yu<>
35035<>4960_1<>raymond lui<>dual methods for nonconvex spectrum optimization of multicarrier systems<>tcom<>wei yu<>
35036<>4960_2<>raphael cendrillon:marc moonen:jan verlinden:tom bostoen<>optimal multiuser spectrum balancing for digital subscriber lines<>tcom<>wei yu<>
35037<>4960_3<>nulo<>sum-capacity computation for the gaussian vector broadcast channel via dual decomposition<>tit<>wei yu<>
35040<>4960_6<>nulo<>uplink-downlink duality via minimax duality<>tit<>wei yu<>
19836<>4961_0<>ilya nemenman:nilanjana banerjee:adam a. margolin:andrea califano<>genome-wide discovery of modulators of transcriptional interactions in human b lymphocytes<>recomb<>kai wang<>
35043<>4963_0<>alejandro cruz sandoval<>some new stability properties of dynamic neural networks with different time-scales<>ijns<>wen yu<>
35048<>4963_5<>marco a. moreno-armendariz:giovanni egidio pazienza<>training cellular neural networks with stable learning algorithm<>isnn<>wen yu<>
35050<>4963_7<>rigoberto toxqui toxqui:xiaoou li<>pd control of overhead crane systems with neural compensation<>isnn<>wen yu<>
35051<>4963_8<>alejandro cruz sandoval:xiaoou li<>passivity analysis for neuro identifier with different time-scales<>icic<>wen yu<>
35052<>4963_9<>alejandro cruz sandoval<>passivity analysis of dynamic neural networks with different time-scales<>isnn<>wen yu<>
35056<>4963_13<>josu de jesus rubio<>discrete-time sliding-mode control based on neural networks<>isnn<>wen yu<>
35057<>4963_14<>jair cervantes:xiaoou li<>support vector machine classification based on fuzzy clustering for large data sets<>micai<>wen yu<>
19838<>4964_0<>hui-ming wee:jonas c. p. yu:k. y. kung<>coordinated resource allocation by mutual outsourcing in decentralized supply chain<>seal<>kung-jeng wang<>
35063<>4967_5<>yan l. sun:zhu han:k. j. ray liu<>a trust evaluation framework in distributed networks: vulnerability analysis and defense against attacks<>infocom<>wei yu<>
35065<>4967_7<>fangting sun:jason e. fritts<>efficient rate control for jpeg-2000<>tcsv<>wei yu<>
18717<>4968_0<>liaquat hossain:andre wu<>actor centrality correlates to project based coordination<>cscw<>kenneth k. s. chung<>
35069<>4970_0<>mengsheng zhang:yu du:zeyi wang<>an efficient algorithm for 3-d reluctance extraction considering high frequency effect<>aspdac<>wenjian yu<>
35577<>4972_1<>illhoi yoo:il-yeol song<>integration of semantic-based bipartite graph representation and mutual refinement strategy for biomedical literature clustering<>kdd<>xiaohua hu<>
35580<>4972_4<>xiaodan zhang:illhoi yoo:yanqing zhang<>a semantic approach for mining hidden links from complementary and non-interactive biomedical literature<>sdm<>xiaohua hu<>
35583<>4972_7<>illhoi yoo<>biomedical ontology mesh improves document clustering qualify on medline articles: a comparison study<>cbms<>xiaohua hu<>
35585<>4972_9<>t. y. lin:il-yeol song:illhoi yoo:min song<>a semi-supervised efficient learning approach to extract biological relationships from web-based biomedical digital library<>wias<>xiaohua hu<>
35586<>4972_10<>illhoi yoo<>clustering large collection of biomedical literature based on ontology-enriched bipartite graph representation and mutual refinement strategy<>pakdd<>xiaohua hu<>
35594<>4973_2<>yu hu:tong jing:zhe feng 0002:xianlong hong:guiying yan<>aco-steiner: ant colony optimization based rectilinear steiner minimal tree algorithm<>jcst<>xiao-dong hu<>
35595<>4973_3<>zhen cao:tong jing:yu hu:yiyu shi:xianlong hong:guiying yan<>draxrouter: global routing in x-architecture with dynamic resource assignment<>aspdac<>xiaodong hu<>
35591<>4974_3<>lei xu<>a comparative study on selection of cluster number and local subspace dimension in the mixture pca models<>isnn<>xuelei hu<>
35598<>4975_1<>patrick jeuniaux:max m. louwerse<>the role of discourse structure and response time in multimodal communication<>iva<>xiangen hu<>
1551<>4982_0<>marcos vinicius linhares:romulo silva de oliveira<>empirical evaluation of sysml through the modeling of an industrial automation unit<>etfa<>alexandre jose da silva<>
33037<>4985_15<>kenichi kurihara<>variational bayesian grammar induction for natural language<>icgi<>taisuke sato<>
33047<>4985_25<>masanobu yamamoto:humikazu mitomi:fuyuki fujiwara<>bayesian classification of task-oriented actions based on stochastic context-free grammar<>fgr<>taisuke sato<>
28354<>4993_2<>m. mat:oscar c. au:liwei giio:zhiqin liang<>three-loop temporal interpolation for error concealment of mdc<>iscas<>s. h. g. chan<>
28357<>4993_5<>chi-wang ho:oscar c. au:shu-kei yip:hoi-ming wong<>low-complexity rate control for efficient h.263 to h.264/avc video transcoding<>icip<>s.-h. gary chan<>
28362<>4993_10<>w.-p. k. yiu:kin fung simon wong:wan-ching wong:qian zhang:wenwu zhu:ya-qin zhang<>lateral error recovery for media streaming in application-level multicast<>tmm<>s.-h. g. chan<>
28364<>4993_12<>xing zheng:qian zhang:wenwu zhu:ya-qin zhang<>video loss recovery with fec and stream replication<>tmm<>s.-h. g. chan<>
28367<>4993_15<>chi-wang ho:oscar c. au:hoi-ming wong:shu-kei yip<>improved refinement search for h.263 to h.264/avc transcoding based on the minimum cost tendency search<>iscas<>s.-h. gary chan<>
28375<>4997_0<>cane wing-ki leung:fu-lai chung<>a collaborative filtering framework based on fuzzy association rules and multiple-level similarity<>kais<>stephen chi-fai chan<>
28380<>4998_0<>king sun chan:king-tim ko<>a data link control protocol for broadband wireless networks with adaptive coding rate<>ijcomsys<>sammy chan<>
17948<>5000_0<>yi ru huang:ke min zhang<>a note on ramsey numbers with two parameters<>ejc<>jian sheng yang<>
17950<>5003_1<>yu-kuang tu:ming-ting sun<>efficient rate-distortion estimation for h.264/avc coders<>tcsv<>jar-ferr yang<>
17903<>5004_0<>ying-ming wang:dong-ling xu<>environmental impact assessment using the evidential reasoning approach<>eor<>jian-bo yang<>
17904<>5004_1<>dong-ling xu:ying-ming wang<>the evidential reasoning approach for multi-attribute decision analysis under interval uncertainty<>eor<>jian-bo yang<>
17905<>5004_2<>ying-ming wang:dong-ling xu:kwai-sang chin<>the evidential reasoning approach for multiple attribute decision analysis using interval belief degrees<>eor<>jian-bo yang<>
17908<>5004_5<>ying-ming wang:dong-ling xu:kwai-sang chin<>on the centroids of fuzzy numbers<>fss<>jian-bo yang<>
17911<>5004_8<>dong-ling xu:mccarthy<>intelligent decision system and its application in business innovation self assessment<>dss<>jian-bo yang<>
17900<>5005_0<>david evans:deepali bhardwaj:thirumalesh bhat:manuvir das<>perracotta: mining temporal api rules from imperfect traces<>icse<>jinlin yang<>
17923<>5006_6<>badrish chandramouli:junyi xie<>on the database/network interface in large-scale publish/subscribe systems<>sigmod<>jun yang<>
17925<>5006_8<>adam silberstein:kamesh munagala<>energy-efficient monitoring of extreme values in sensor networks<>sigmod<>jun yang<>
17927<>5006_10<>haixun wang:hao he:philip s. yu:jeffrey xu yu<>dual labeling: answering graph reachability queries in constant time<>icde<>jun yang<>
17928<>5006_11<>adam silberstein:rebecca braynard<>energy-efficient continuous isoline queries in sensor networks<>icde<>jun yang<>
17937<>5006_20<>badrish chandramouli:amin vahdat<>distributed network querying with bounded approximate caching<>dasfaa<>jun yang<>
17939<>5006_22<>adam silberstein:rebecca braynard<>constraint chaining: on energy-efficient continuous monitoring in sensor networks<>sigmod<>jun yang<>
17944<>5006_27<>pankaj k. agarwal:junyi xie:hai yu<>scalable continuous query processing by tracking hotspots<>vldb<>jun yang<>
17945<>5006_28<>paul g. flikkema:pankaj k. agarwal:james s. clark:carla schlatter ellis:alan gelfand:kamesh munagala<>model-driven dynamic control of embedded wireless sensor networks<>iccS<>jun yang<>
17946<>5006_29<>adam silberstein:rebecca braynard:carla schlatter ellis:kamesh munagala<>a sampling-based approach to optimizing top-k queries in sensor networks<>icde<>jun yang<>
21994<>5012_1<>guangyu chen:feihui li:mary jane irwin<>reducing noc energy consumption through compiler-directed channel voltage scaling<>pldi<>mahmut t. kandemir<>
2075<>5015_1<>paolo viappiani:pearl pu<>preference-based search using example-critiquing with suggestions<>jair<>boi faltings<>
35113<>5016_0<>robert van engelen:madhusudhan govindaraju<>exploring remote object coherence in xmlweb services<>icws<>wei zhang<>
35114<>5016_1<>kun chen:haiyan zhao:hong mei<>identification of crosscutting requirements based on feature dependency analysis<>re<>wei zhang<>
35120<>5016_7<>xiang zhong fang:yi xu<>detection of moving cast shadows using image orthogonal transform<>icpr<>wei zhang<>
35121<>5016_8<>bingru yang<>an efficient and scalable algorithm for multi-relational frequent pattern discovery<>isda<>wei zhang<>
35122<>5016_9<>jianzhong li<>processing probabilistic range query over imprecise data based on quality of result<>apweb<>wei zhang<>
35128<>5016_15<>xiang zhong fang:xiaokang yang<>moving vehicles segmentation based on bayesian framework for gaussian motion model<>prl<>wei zhang<>
35130<>5016_17<>yanli he:haicheng yang:weiping he:xinping he<>flexible workflow driven job shop manufacturing execution and automation based on multi agent system<>iat<>wei zhang<>
35133<>5016_20<>xiang zhong fang:xiaokang yang<>moving cast shadows detection based on ratio edge<>icpr<>wei zhang<>
35139<>5016_26<>nagm mohamed:nazeih botros<>the impact of cache organization in optimizing microprocessor power consumption<>cdes<>wei zhang<>
35140<>5016_27<>ronghua shang:wenping ma<>immune clonal mo algorithm for 0/1 knapsack problems<>icnc<>wei zhang<>
35148<>5016_35<>xiangyang xue:hong lu:yue-fei guo<>discriminant neighborhood embedding for classification<>pr<>wei zhang<>
35150<>5016_37<>david gaitros:austin mast:gregory a. riccardi:fredrik ronquist<>a biodiversity semantic associative annotation tool<>ic<>wei zhang<>
35089<>5018_19<>nulo<>data mining methods for modeling gene expression regulation and their applications<>icdm<>weixiong zhang<>
35097<>5018_27<>sharlee climer<>"rearrangement clustering: pitfalls, remedies, and applications."<>jmlr<>weixiong zhang<>
35101<>5018_31<>jianhua ruan<>identification and evaluation of weak community structures in networks<>aaai<>weixiong zhang<>
35102<>5018_32<>jianhua ruan<>a bi-dimensional regression tree approach to the modeling of gene expression regulation<>bioinformatics<>weixiong zhang<>
35107<>5018_37<>zhao xing:yixin chen<>an efficient hybrid strategy for temporal planning<>cpaior<>weixiong zhang<>
35161<>5022_1<>nulo<>"comments on ""maximum diversity in single-carrier frequency-domain equalization""."<>tit<>wei zhang<>
35167<>5024_0<>yuangui li:chen lin<>improved sparse least-squares support vector machine classifiers<>ijon<>weidong zhang<>
13844<>5026_9<>boon thau loo:tyson condie:minos n. garofalakis:david e. gay:petros maniatis:raghu ramakrishnan:timothy roscoe:ion stoica<>"declarative networking: language, execution and optimization."<>sigmod<>joseph m. hellerstein<>
13851<>5026_16<>minos n. garofalakis:kurt p. brown:michael j. franklin:daisy zhe wang:eirinaios michelakis:liviu tancau:eugene wu 0002:shawn r. jeffery:ryan aipperspach<>probabilistic data management for pervasive computing: the  project<>debu<>joseph m. hellerstein<>
13887<>5026_52<>tyson condie:varun kacholia:sriram sank:petros maniatis<>induced churn as shelter from routing-table poisoning<>ndss<>joseph m. hellerstein<>
13890<>5026_55<>david chu:amol deshpande:wei hong<>approximate data collection in sensor networks using probabilistic models<>icde<>joseph m. hellerstein<>
13892<>5026_57<>frederick reiss<>declarative network monitoring with an underprovisioned query processor<>icde<>joseph m. hellerstein<>
13900<>5026_65<>david chu:kaisen lin:alexandre linares:ky giang nguyen<>sdlib: a sensor network data and communications library for rapid and robust application development<>ipsn<>joseph m. hellerstein<>
13902<>5026_67<>alexandra meliou:david chu:carlos guestrin:wei hong<>data gathering tours in sensor networks<>ipsn<>joseph m. hellerstein<>
13907<>5026_72<>frederick reiss:minos n. garofalakis<>compact histograms for hierarchical identifiers<>vldb<>joseph m. hellerstein<>
35170<>5027_0<>clement t. yu:neil r. smalheiser:vetle i. torvik<>segmentation of publication records of authors from the web<>icde<>wei zhang<>
35174<>5028_1<>j. nicholas laneman<>an induced additive-noise model for memoryless rayleigh-fading channels<>tit<>wenyi zhang<>
35172<>5031_0<>shiguang shan:yu su:xilin chen:wen gao<>a riemannian weighted filter for edge-sensitive image smoothing<>icpr<>wenchao zhang<>
18634<>5037_0<>chun-ying huang:polly huang:chin-laung lei<>quantifying skype user satisfaction<>sigcomm<>kuan-ta chen<>
18635<>5037_1<>polly huang:chin-laung lei<>how sensitive are online gamers to network quality?<>cacm<>kuan-ta chen<>
18636<>5037_2<>chun-ying huang:polly huang:chin-laung lei<>an empirical evaluation of tcp performance in online games<>ACMace<>kuan-ta chen<>
18637<>5037_3<>polly huang:guo-shiuan wang:chun-ying huang:chin-laung lei<>on the sensitivity of online game playing time to network qos<>infocom<>kuan-ta chen<>
18638<>5037_4<>chin-laung lei<>network game design: hints and implications of player interaction<>netgames<>kuan-ta chen<>
18614<>5039_6<>libin wang<>comments on a theorem on grid access control<>fgcs<>kefei chen<>
18621<>5039_13<>libin wang<>comments on an access control model in semantic grid<>fgcs<>kefei chen<>
17711<>5045_0<>jun-cheng chen:wei-ta chu:jin-hau kuo:chung-yi weng<>tiling slideshow<>mm<>ja-ling wu<>
17717<>5049_1<>lian-cui zuo:jia-zhuang liu<>the vertex linear arboricity of distance graphs<>dm<>jia-liang wu<>
17721<>5049_5<>liancui zuo:qinglin yu<>tree coloring of distance graphs with a real interval set<>appml<>jianliang wu<>
37813<>5054_4<>xianfeng gu:hong qin<>manifold splines<>cvgip<>ying he<>
37815<>5054_6<>kexiang wang:xiaohu guo:hong qin<>spline thin-shell simulation of manifold surfaces<>cgi<>ying he<>
37818<>5054_9<>kexiang wang:hongyu wang:xianfeng gu:hong qin<>manifold t-spline<>gmp<>ying he<>
37821<>5055_2<>cauligi s. raghavendra:steven berson:robert braden<>an autonomic routing framework for sensor networks<>cluster<>yu he<>
9150<>5056_1<>julia luxenburger<>exploiting community behavior for enhanced link analysis and web search<>webdb<>gerhard weikum<>
9154<>5056_5<>holger bast:debapriyo majumdar:ralf schenkel:martin theobald<>io-top-k: index-access optimized top-k query processing<>vldb<>gerhard weikum<>
9155<>5056_6<>surajit chaudhuri<>foundations of automated database tuning<>icde<>gerhard weikum<>
9158<>5056_9<>sebastian michel:matthias bender:peter triantafillou<>iqn routing: integrating quality and novelty in p2p querying and ranking<>edbt<>gerhard weikum<>
9163<>5056_14<>ralitsa angelova<>graph-based text classification: learn from your neighbors<>sigir<>gerhard weikum<>
9164<>5056_15<>josiane xavier parreira:debora donato:sebastian michel<>efficient and decentralized pagerank approximation in a peer-to-peer web search network<>vldb<>gerhard weikum<>
9168<>5056_19<>surajit chaudhuri<>foundations of automated database tuning<>vldb<>gerhard weikum<>
18655<>5059_0<>ching-wei lin<>an aspect-oriented approach to declarative access control for web applications<>apweb<>kung chen<>
18659<>5059_4<>meng wang:siau-cheng khoo<>type-directed weaving of aspects for higher-order functional languages<>pepm<>kung chen<>
18663<>5061_2<>edwin hsing-mean sha<>the fat-stack and universal routing in interconnection networks<>jpdc<>kevin f. chen<>
32724<>5072_0<>kay chen tan:chi keong goh:y. j. yang<>evolving better population distribution and exploration in evolutionary multi-objective optimization<>eor<>t. h. lee<>
9640<>5075_0<>jeffrey w. eberhard:douglas albagli:andrea schmitz:bernhard e. h. claus:paul carson:mitchell goodsitt:marilyn roubidoux:jerry a. thomas:jacqueline osland<>mammography tomosynthesis system for high performance 3d imaging<>mammo<>heang-ping chan<>
9641<>5075_1<>bernhard e. h. claus:jeffrey w. eberhard:andrea schmitz:paul carson:mitchell goodsitt<>generalized filtered back-projection reconstruction in breast tomosynthesis<>mammo<>heang-ping chan<>
24194<>5078_2<>graham brightwell:hal a. kierstead:alexandr v. kostochka:peter winkler<>dominating sets in k-majority tournaments<>jct<>noga alon<>
24200<>5078_8<>raphael yuster<>the number of orientations having no fixed tournament<>combinatorica<>noga alon<>
24221<>5078_29<>nulo<>ranking tournaments<>siamdm<>noga alon<>
24227<>5078_35<>eyal lubetzky<>the shannon capacity of a graph and the independence numbers of its powers<>tit<>noga alon<>
24233<>5078_41<>fan r. k. chung<>explicit construction of linear sized tolerant networks<>dm<>noga alon<>
24240<>5078_48<>rados radoicic:benny sudakov:jan vondrak<>a ramsey-type result for the hypercube<>jgt<>noga alon<>
24275<>5078_83<>eitan bachmat<>regular graphs whose subgraphs tend to be acyclic<>rsa<>noga alon<>
32201<>5081_11<>dirk beyer:gregory theoduloz<>lazy shape analysis<>cav<>thomas a. henzinger<>
32238<>5081_48<>krishnendu chatterjee:rupak majumdar<>markov decision processes with multiple objectives<>stacs<>thomas a. henzinger<>
32240<>5081_50<>krishnendu chatterjee:marcin jurdzinski<>games with secure equilibria<>tcs<>thomas a. henzinger<>
32243<>5081_53<>slobodan matic<>an interface algebra for real-time components<>rtas<>thomas a. henzinger<>
32253<>5081_63<>joseph sifakis<>the embedded systems design challenge<>fm<>thomas a. henzinger<>
32260<>5081_70<>bhargav s. gulavani:yamini kannan:aditya v. nori:sriram k. rajamani<>synergy: a new algorithm for property checking<>sigsoft<>thomas a. henzinger<>
32264<>5081_74<>krishnendu chatterjee:luca de alfaro<>strategy improvement for concurrent reachability games<>qest<>thomas a. henzinger<>
32265<>5081_75<>roman manevich:john field:g. ramalingam:mooly sagiv<>abstract counterexample-based refinement for powerset domains<>birthday<>thomas a. henzinger<>
32273<>5081_83<>krishnendu chatterjee<>finitary winning in omega-regular games<>tacas<>thomas a. henzinger<>
32275<>5081_85<>nir piterman<>solving games without determinization<>csl<>thomas a. henzinger<>
32276<>5081_86<>vinayak s. prabhu<>timed alternating-time temporal logic<>formats<>thomas a. henzinger<>
32282<>5081_92<>krishnendu chatterjee:luca de alfaro:marco faella:rupak majumdar:marielle stoelinga<>compositional quantitative reasoning<>qest<>thomas a. henzinger<>
32291<>5081_101<>arkadeb ghosal:alberto l. sangiovanni-vincentelli:christoph m. kirsch:daniel t. iercan<>a hierarchical coordination language for interacting real-time tasks<>emsoft<>thomas a. henzinger<>
32292<>5081_102<>jasmin fisher<>executable biology<>wsc<>thomas a. henzinger<>
32313<>5081_123<>krishnendu chatterjee:luca de alfaro<>the complexity of quantitative concurrent parity games<>soda<>thomas a. henzinger<>
32315<>5081_125<>krishnendu chatterjee<>strategy improvement for stochastic rabin and streett games<>concur<>thomas a. henzinger<>
32318<>5081_128<>krishnendu chatterjee:laurent doyen:jean-francois raskin<>"algorithms for omega-regular games with imperfect information."<>csl<>thomas a. henzinger<>
32320<>5081_130<>martin de wulf:laurent doyen:jean-francois raskin<>antichains: a new algorithm for checking universality of finite automata<>cav<>thomas a. henzinger<>
32340<>5081_150<>orna kupferman:rupak majumdar<>on the universal and existential fragments of the -calculus<>tcs<>thomas a. henzinger<>
32354<>5081_164<>krishnendu chatterjee<>strategy improvement and randomized subexponential algorithms for stochastic parity games<>stacs<>thomas a. henzinger<>
35191<>5082_13<>wei yu:sriram chellappan:dong xuan<>distributed policy processing in active-service based infrastructures<>ijcomsys<>wei zhao<>
35215<>5082_37<>weijia jia:hanxing wang:wanqing tu<>a new delay control method for real-time flows<>jco<>wei zhao<>
35224<>5082_46<>shengquan wang:zhibin mai:dong xuan<>design and implementation of qos-provisioning system for voice over ip<>tpds<>wei zhao<>
35226<>5082_48<>wei yu:nan zhang 0004<>self-adaptive worms and countermeasures<>sss<>wei zhao<>
35233<>5082_55<>chuan he:guan qin:mi lu<>an optimized finite difference computing engine on fpgas<>fccm<>wei zhao<>
35246<>5082_68<>chuan he:guan qin:mi lu<>an efficient implementation of high-accuracy finite difference computing engine on fpgas<>asap<>wei zhao<>
35287<>5083_0<>peng zhang:tao jiang<>a network flow approach to the minimum common integer partition problem<>tcs<>wenbo zhao<>
35282<>5084_2<>henning schulzrinne<>dotslash: handling web hotspots at dynamic content web sites<>infocom<>weibin zhao<>
35263<>5087_4<>louise e. moser:p. m. melliar-smith<>making web services dependable<>IEEEares<>wenbing zhao<>
35264<>5087_5<>louise e. moser:p. m. melliar-smith<>end-to-end latency of a fault-tolerant corba infrastructure<>pe<>wenbing zhao<>
3008<>5089_0<>feifei li:george kollios:azer bestavros<>characterizing and exploiting reference locality in data stream applications<>icde<>ching chang<>
2967<>5093_9<>tae-hyung kim<>an aspect-oriented approach to resource composition in petri net-based software architectural models<>compsac<>carl k. chang<>
2973<>5093_15<>jinchun xia:jeff wise:yujia ge<>an empirical performance study on psim<>cj<>carl k. chang<>
2981<>5096_0<>bernd girod<>direction-adaptive discrete wavelet transform via directional lifting and bandeletization<>icip<>chuo-ling chang<>
2983<>5096_2<>xiaoqing zhu:prashant ramanathan:bernd girod<>light field compression using disparity-compensated lifting and shape adaptation<>tip<>chuo-ling chang<>
9461<>5116_0<>xueying qin:xiaobo an:wei chen:hujun bao<>as-consistent-as-possible compositing of virtual objects and video sequences<>jvca<>guofeng zhang<>
9463<>5117_0<>k. k. lai<>combining path relinking and genetic algorithms for the multiple-level warehouse layout problem<>eor<>g. q. zhang<>
37887<>5121_0<>robert willis:hyeong-ah choi<>a framework for managing emergent transmissions in ip networks<>ic<>yen-hung hu<>
37840<>5128_2<>hang li:yunbo cao:li teng:dmitriy meyerzon:qinghua zheng<>automatic extraction of titles from general documents using machine learning<>ipm<>yunhua hu<>
37849<>5131_5<>ali raza butt:rongmei zhang<>a self-organizing flock of condors<>jpdc<>y. charlie hu<>
37851<>5131_7<>rongmei zhang:xiaojun lin:sonia fahmy<>a hierarchical approach to internet distance prediction<>icdcs<>y. charlie hu<>
37853<>5131_9<>long fei:xing fang:samuel p. midkiff<>monitoring remotely executing shared memory programs in software dsms<>ipps<>y. charlie hu<>
37856<>5131_12<>chris gniady:ali raza butt:yung-hsiang lu<>program counter-based prediction techniques for dynamic power management<>tc<>y. charlie hu<>
37860<>5131_16<>sabyasachi roy:dimitrios koutsonikolas:saumitra m. das<>high-throughput multicast routing metrics in wireless mesh networks<>icdcs<>y. charlie hu<>
37866<>5131_22<>himabindu pucha:sabyasachi roy<>take one get one free: leveraging p2p networks for content promotion<>infocom<>y. charlie hu<>
37868<>5131_24<>shuo yang:ali raza butt:xing fang:samuel p. midkiff<>"a fair, secure and trustworthy peer-to-peer based cycle-sharing system."<>grid<>y. charlie hu<>
37878<>5132_0<>tong jing:zhe feng 0002:xianlong hong:xiao-dong hu:guiying yan<>aco-steiner: ant colony optimization based rectilinear steiner minimal tree algorithm<>jcst<>yu hu<>
37881<>5132_3<>zhen cao:tong jing:yiyu shi:xianlong hong:xiaodong hu:guiying yan<>draxrouter: global routing in x-architecture with dynamic resource assignment<>aspdac<>yu hu<>
37877<>5133_0<>yan lin:lei he:tim tuan<>simultaneous time slack budgeting and retiming for dual-vdd fpga power reduction<>dac<>yu hu<>
10006<>5136_1<>cheng-kuan lin:d. frank hsu:lih-hsing hsu<>on the spanning -wide diameter of the star graph<>networks<>hua-min huang<>
10009<>5137_0<>tsuyoshi masuda:aleksandra cerekovic:kateryna tarasenko:igor s. pandzic:yukiko i. nakano:toyoaki nishida<>toward a universal platform for integrating embodied conversational agent components<>kes<>hung-hsuan huang<>
10002<>5138_0<>ting-hao chang:shu-yu hu:polly huang<>"magnetic diffusion: scalability, reliability, and qos of data dissemination mechanisms for wireless sensor networks."<>comcom<>hsing-jung huang<>
15773<>5145_1<>giuseppe carenini<>generating and evaluating evaluative arguments<>ai<>johanna d. moore<>
23133<>5149_31<>davide appello:paolo bernardi:michelangelo grosso<>system-in-package testing: problems and solutions<>dt<>matteo sonza reorda<>
23143<>5149_41<>paolo bernardi:michelangelo grosso:maurizio rebaudengo<>a pattern ordering algorithm for reducing the size of fault dictionaries<>vts<>matteo sonza reorda<>
23151<>5149_49<>paolo bernardi:leticia maria veiras bolzani:maurizio rebaudengo:fabian vargas:massimo violante<>a new hybrid fault detection technique for systems-on-a-chip<>tc<>matteo sonza reorda<>
23156<>5149_54<>massimo violante<>hardware-in-the-loop-based dependability analysis of automotive systems<>iolts<>matteo sonza reorda<>
23166<>5149_64<>julio perez acle:massimo violante<>"early, accurate dependability analysis of can-based networked systems."<>dt<>matteo sonza reorda<>
23171<>5149_69<>ernesto sanchez:giovanni squillero<>efficient techniques for automatic verification-oriented test set optimization<>ijpp<>matteo sonza reorda<>
24098<>5152_1<>tal malkin:francois-xavier standaert<>a comparative cost/security analysis of fault attack countermeasures<>fdtc<>moti yung<>
24099<>5152_2<>benoit libert:jean-jacques quisquater<>efficient intrusion-resilient signatures without random oracles<>cisc<>moti yung<>
11117<>5156_1<>wolfram von funck:holger theisel<>vector field based shape deformations<>tog<>hans-peter seidel<>
11118<>5156_2<>rafal mantiuk:alexander efremov:karol myszkowski<>backward compatible high dynamic range mpeg video compression<>tog<>hans-peter seidel<>
21577<>5157_8<>eric j. tyson:j. buckley:patrick crowley:john maschmeyer<>auto-pipe and the x language: a pipeline design tool and description language<>ipps<>mark a. franklin<>
21583<>5157_14<>tilman wolf<>performance models for network processor design<>tpds<>mark a. franklin<>
21600<>5157_31<>rahul p. maddimsetty:jeremy buhler:roger d. chamberlain:brandon harris<>accelerator design for protein sequence hmm search<>ics<>mark a. franklin<>
11128<>5162_0<>rhaleb zayer:christian rossl<>curvilinear spherical parameterization<>smi<>hans-peter seidel<>
21604<>5163_1<>matthew denny<>adaptive execution of variable-accuracy functions<>vldb<>michael j. franklin<>
21611<>5163_8<>shawn r. jeffery:gustavo alonso:wei hong:jennifer widom<>declarative support for sensor data cleaning<>pervasive<>michael j. franklin<>
21637<>5163_34<>alon y. halevy:david maier<>dataspaces: a new abstraction for information management<>dasfaa<>michael j. franklin<>
15948<>5165_0<>jairo de souza:melise paula:jano moreira de souza<>meaning negotiation for consensus formation in ontology integration<>cscwd<>jonice oliveira<>
15939<>5166_0<>sukrit dasgupta:jean-phillippe vasseur<>a new distributed dynamic bandwidth reservation mechanism to improve resource utilization: simulation and analysis on real network and traffic scenarios<>infocom<>jaudelice cavalcante de oliveira<>
15944<>5166_5<>fernand s. cohen:ezgi taslidere<>locating hot nodes and data routing for efficient decision fusion in sensor networks<>adhoc<>jaudelice cavalcante de oliveira<>
24111<>5167_5<>fang fang:shicai fan:xuegong zhang<>predicting methylation status of cpg islands in the human brain<>bioinformatics<>michael q. zhang<>
24114<>5167_8<>chaolin zhang:hai-ri li:jian-bing fan:jessica wang-rodriguez:tracy downs:xiang-dong fu<>profiling alternatively spliced mrna isoforms for prostate cancer classification<>bmcbi<>michael q. zhang<>
28825<>5168_2<>nulo<>differential learning algorithms for decorrelation and independent component analysis<>nn<>seungjin choi<>
28826<>5168_3<>jong kyoung kim:sung yang bang<>sequence-driven features for prediction of subcellular localization of proteins<>pr<>seungjin choi<>
28822<>5169_0<>enkhtuvshin dorjgotov:steven r. dunlop:gary r. bertoline<>portable haptic display for large immersive virtual environments<>haptics<>seungmoon choi<>
31841<>5170_1<>zhi-qiang liu:jian ying zhang<>"fuzzy causal networks: general model, inference, and convergence."<>tfs<>sanming zhou<>
31845<>5170_5<>jian ying zhang:zhi-qiang liu<>dynamic domination in fuzzy causal networks<>tfs<>sanming zhou<>
31864<>5172_4<>rama chellappa<>from sample similarity to ensemble similarity: probabilistic distance measures in reproducing kernel hilbert space<>pami<>shaohua kevin zhou<>
31868<>5172_8<>bogdan georgescu:dorin comaniciu:jie shao<>boostmotion: boosting a discriminative similarity function for motion estimation<>cvpr<>shaohua kevin zhou<>
31872<>5172_12<>jie shao:bogdan georgescu:dorin comaniciu<>pairwise active appearance model and its application to echocardiography tracking<>miccai<>shaohua kevin zhou<>
31883<>5172_23<>yefeng zheng:xiang sean zhou:bogdan georgescu:dorin comaniciu<>example based non-rigid shape detection<>eccv<>shaohua kevin zhou<>
31884<>5174_0<>ta nguyen binh duong<>a network-centric approach to enhancing the interactivity of large-scale distributed virtual environments<>comcom<>suiping zhou<>
31885<>5174_1<>ta nguyen binh duong:haifeng shen<>greedy algorithms for client assignment in large-scale distributed virtual environments<>pads<>suiping zhou<>
31893<>5178_0<>jason hiser:naveen kumar:min zhao:bruce r. childers:jack w. davidson:mary lou soffa<>techniques and tools for dynamic optimization<>ipps<>shukang zhou<>
3421<>5181_2<>kai zheng:hongbin lu:bin liu<>a tcam-based distributed parallel ip lookup scheme and performance analysis<>ton<>chengchen hu<>
24159<>5182_1<>yaoping ruan:vivek s. pai:jennifer rexford<>how dns misnaming distorts internet topology mapping<>usenix<>ming zhang<>
3410<>5183_1<>hwangnam kim:jennifer c. hou:dennis chi:saishankar nandagopalan<>provisioning quality controlled medium access in ultrawideband-operated wpans<>infocom<>chunyu hu<>
24162<>5184_0<>anne-kathrin schultz:charles calef:carla kuiken:thomas leitner:bette korber:burkhard morgenstern:mario stanke<>jphmm at gobics: a web server to detect genomic recombinations in hiv-1<>nar<>ming zhang<>
24125<>5187_0<>huayang xie:peter andreae<>population clustering in genetic programming<>eurogp<>mengjie zhang<>
24128<>5187_3<>xiaoying gao:minh duc cao<>treewrapper: automatic data extraction based on tree representation<>ausai<>mengjie zhang<>
24130<>5187_5<>malcolm lett<>localisation fitness in gp for object detection<>evoW<>mengjie zhang<>
24131<>5187_6<>xiaoying gao:weijun lou:dongping qian<>investigation of brood size in gp with brood recombination crossover for object recognition<>pricai<>mengjie zhang<>
24134<>5187_9<>xiaoying gao:minh duc cao:yuejin ma<>modelling citation networks for improving scientific paper classification performance<>pricai<>mengjie zhang<>
24135<>5187_10<>phillip wong:dongping qian<>online program simplification in genetic programming<>seal<>mengjie zhang<>
24136<>5187_11<>huayang xie:peter andreae<>genetic programming for automatic stress detection in spoken english<>evoW<>mengjie zhang<>
24138<>5187_13<>le phong bao vuong:xiaoying gao<>data extraction from semi-structured web pages by clustering<>webi<>mengjie zhang<>
24144<>5187_19<>huayang xie:peter andreae<>automatic selection pressure control in genetic programming<>isda<>mengjie zhang<>
24146<>5187_21<>xiaoying gao:minh duc cao:yuejin ma<>neural networks for scientific paper classification<>icicic<>mengjie zhang<>
24151<>5187_26<>phillip wong<>algebraic simplification of gp programs during evolution<>gecco<>mengjie zhang<>
24156<>5189_0<>le zhao:shaoping ma<>the nature of novelty detection<>ir<>min zhang<>
24154<>5190_0<>dang van hung<>formal analysis of streaming downloading protocol for system upgrading<>entcs<>miaomiao zhang<>
3424<>5194_1<>simon lucey:iain matthews:zara ambadar:fernando de la torre:jeffrey f. cohn<>aam derived face representations for robust facial action recognition<>fgr<>changbo hu<>
3430<>5194_7<>ya chang:rogerio feris:matthew turk<>manifold based analysis of facial expression<>ivc<>changbo hu<>
6460<>5197_0<>c.-c. lei:s.-w. hung<>computer-aided kidney segmentation on abdominal ct images<>titb<>d.-t. lin<>
38932<>5200_1<>zhengdao wang:subbarayan pasupathy<>asymptotic performance of hybrid-selection/maximal-ratio combining over fading channels<>tcom<>yao ma<>
38910<>5202_0<>sharad mehrotra:dawit yimam seid:qi zhong<>raf: an activation framework for refining similarity queries using learning techniques<>dasfaa<>yiming ma<>
38913<>5202_3<>dmitri v. kalashnikov:sharad mehrotra:ramaswamy hariharan<>index for fast retrieval of uncertain spatial point data<>gis<>yiming ma<>
38922<>5202_12<>dmitri v. kalashnikov:sharad mehrotra:ramaswamy hariharan:nalini venkatasubramanian:naveen ashish<>sat: spatial awareness from textual input<>edbt<>yiming ma<>
38923<>5202_13<>dmitri v. kalashnikov:sharad mehrotra:ramaswamy hariharan:carter butts<>modeling and querying uncertain spatial information for situational awareness applications<>gis<>yiming ma<>
38930<>5202_20<>dawit yimam seid<>interactive refinement of filtering queries on streaming intelligence data<>isi<>yiming ma<>
6444<>5204_4<>rui zhang 0003:aoying zhou<>indexing fast moving objects for knn queries based on nearest landmarks<>geoinformatica<>dan lin<>
6448<>5206_0<>marius pasca:jeffrey bigham:andrei lifchits:alpa jain<>organizing and searching the world wide web of facts - step one: the one-million fact extraction challenge<>aaai<>dekang lin<>
6451<>5206_3<>guohui lin:zhipeng cai<>vertex covering by paths on trees with its applications in machine translation<>ipl<>dekang lin<>
4625<>5209_2<>yan li:hock-hai teo:a. talib mattar<>motivating open source software developers: influence of transformational and transactional leaderships<>sigcpr<>chuan-hoo tan<>
38934<>5214_0<>zhangang lin:zuoquan lin<>a fault-tolerant default logic<>jelia<>yue ma<>
22495<>5218_0<>byrav ramamurthy<>integrated intermediate waveband and wavelength switching for optical wdm mesh networks<>infocom<>mengke li<>
4611<>5219_0<>joseph chee ming teo:jim mee ng<>low-power group key agreement for heterogeneous wireless networks<>iwcmc<>chik how tan<>
4614<>5219_3<>nulo<>analysis of improved signcryption scheme with key privacy<>ipl<>chik how tan<>
4616<>5219_5<>nulo<>public-key encryption from id-based encryption without one-time signature<>otm<>chik how tan<>
4617<>5219_6<>joseph chee ming teo<>energy-efficient id-based group key agreement protocols for wireless networks<>ipps<>chik how tan<>
4620<>5219_9<>nulo<>chosen ciphertext security from identity-based encryption without  condition<>iwsec<>chik how tan<>
4622<>5219_11<>nulo<>a secure signature scheme<>iwcmc<>chik how tan<>
4524<>5220_5<>shijian lu<>document flattening through grid modeling and regularization<>icpr<>chew lim tan<>
4532<>5220_13<>jinxiu chen:donghong ji:zheng-yu niu<>unsupervised relation disambiguation using spectral clustering<>acl<>chew lim tan<>
4535<>5220_16<>li yang:weihua huang<>semi-automatic ground truth generation for chart image recognition<>das<>chew lim tan<>
4542<>5220_23<>li zhang:zheng zhang 0003:tao xia<>restoring warped document images through 3d shape modeling<>pami<>chew lim tan<>
4545<>5220_26<>shijian lu:weihua huang<>language identification in degraded and distorted document images<>das<>chew lim tan<>
4555<>5220_36<>jinxiu chen:donghong ji:zheng-yu niu<>relation extraction using label propagation based semi-supervised learning<>acl<>chew lim tan<>
4572<>5220_53<>tianming hu:chao qu:sam yuan sung:wenjun zhou<>preserving patterns in bipartite graph partitioning<>ictai<>chew lim tan<>
4574<>5220_55<>shijian lu<>camera text recognition based on perspective invariants<>icpr<>chew lim tan<>
4589<>5220_70<>lijun zhou:yue lu<>bangla/english script identification based on analysis of connected component profiles<>das<>chew lim tan<>
4600<>5220_81<>henry wai kit chia:sam yuan sung<>enhancing knowledge discovery via association-based evolution of neural logic networks<>tkde<>chew lim tan<>
4604<>5220_85<>bo yuan:leong kwoh<>finding the best-fit bounding-boxes<>das<>chew lim tan<>
4609<>5220_90<>man lan:hwee-boon low<>proposing a new term weighting scheme for text categorization<>aaai<>chew lim tan<>
4610<>5220_91<>shijian lu<>the restoration of camera documents through image segmentation<>das<>chew lim tan<>
34490<>5221_0<>james j. little<>simultaneous tracking and action recognition using the pca-hog descriptor<>crv<>wei-lwun lu<>
11725<>5225_1<>yunyao li:h. v. jagadish<>constructing a generic natural language interface for an xml database<>edbt<>huahai yang<>
11726<>5225_2<>yunyao li:h. v. jagadish<>term disambiguation in natural language query for xml<>fqas<>huahai yang<>
11716<>5228_13<>richard bornat:cristiano calcagno<>variables as resource in separation logic<>entcs<>hongseok yang<>
11722<>5228_19<>dino distefano:peter w. o'hearn<>a local shape analysis based on separation logic<>tacas<>hongseok yang<>
11723<>5228_20<>cristiano calcagno:dino distefano:peter w. o'hearn<>beyond reachability: shape abstraction in the presence of pointer arithmetic<>sas<>hongseok yang<>
34479<>5230_0<>tianping chen<>global asymptotical stability of cohen-grossberg neural networks with time-varying and distributed delays<>isnn<>wenlian lu<>
34484<>5230_5<>tianping chen<>dynamical behaviors of delayed neural network systems with discontinuous activation functions<>neco<>wenlian lu<>
11743<>5231_0<>srinivasan parthasarathy<>mining spatial and spatio-temporal patterns in scientific data<>icde<>hui yang<>
11740<>5233_1<>yang xu:issam amin<>business rule based program transformation for crm system evolution<>iri<>hongji yang<>
33644<>5236_0<>roger mailler<>a cooperative mediation-based protocol for dynamic distributed resource allocation<>tsmc<>victor r. lesser<>
11735<>5237_5<>minjie zhang<>two-stage statistical language models for text database selection<>ir<>hui yang<>
22489<>5243_1<>xinbiao zhou:hongyan li:haibin liu:lv-an tang:yu fan:zijing hu<>monitoring abnormal patterns with complex semantics over icu data streams<>iwicpas<>meimei li<>
22487<>5244_1<>chandra kambhamettu:maureen c. stone<>a level set approach for shape recovery of open contours<>accv<>min li<>
22477<>5248_0<>deepak ganesan:prashant j. shenoy<>presto: feedback-driven data management in sensor networks<>nsdi<>ming li<>
22482<>5250_0<>hua zhu:imrich chlamtac:b. prabhakaran<>end-to-end qos framework for heterogeneous wired-cum-wireless networks<>winet<>ming li<>
22484<>5250_2<>hui li:b. prabhakaran<>middleware for streaming 3d progressive meshes over lossy networks<>tomccap<>ming li<>
7344<>5253_0<>hongxin zhang:hujun bao<>non-uniform differential mesh deformation<>cgi<>dong xu<>
7345<>5253_1<>wei chen:hongxin zhang:hujun bao<>multi-level differential surface representation based on local transformations<>vc<>dong xu<>
7346<>5253_2<>hongxin zhang:qing wang:hujun bao<>poisson shape interpolation<>cvgip<>dong xu<>
7343<>5254_6<>yang chen:yizhi xiong:chunming qiao:xin he<>on the complexity of and algorithms for finding the shortest path with a disjoint counterpart<>ton<>dahai xu<>
6476<>5259_5<>huaguang zhang:yanhong luo<>a new fuzzy identification method based on adaptive critic designs<>isnn<>derong liu<>
28112<>5260_0<>kiyoshi sawada<>models of adding relations to an organization structure of a complete k<>eor<>richard wilson<>
6482<>5261_1<>kien a. hua:khanh vu:ning yu<>fast query point movement techniques with relevance feedback for content-based image retrieval<>edbt<>danzhou liu<>
6483<>5261_2<>kien a. hua:khanh vu:ning yu<>efficient target search with relevance feedback for large cbir systems<>sac<>danzhou liu<>
6484<>5261_3<>kien a. hua:ning yu<>query decomposition: a multiple neighborhood approach to relevance feedback processing in content-based image retrieval<>icde<>danzhou liu<>
6486<>5261_5<>kien a. hua:kiminobu sugaya<>a framework for web-based interactive applications of high-resolution 3d medical image data<>cbms<>danzhou liu<>
6513<>5269_0<>datong chen:tsuhan chen<>latent layout analysis for discovering objects in images<>icpr<>david liu<>
6515<>5269_2<>datong chen:tsuhan chen<>unsupervised image layout extraction<>icip<>david liu<>
16024<>5273_0<>bo hu:jian qiu zhang<>an efficient object tracking algorithm with adaptive prediction of initial searching point<>psivt<>jiyan pan<>
12697<>5275_0<>jeffrey xu yu:nan tang<>fast reachability query processing<>dasfaa<>jiefeng cheng<>
11683<>5280_1<>nulo<>data processing and compact representation of measured isotropic spectral brdf<>grapp<>huiying xu<>
11666<>5281_4<>xiaoqin zhang<>towards automated development of multi-agent systems using rade<>icai<>haiping xu<>
11669<>5281_7<>mihir m. ayachit<>a petri net based xml firewall security model for web services invocation<>cnis<>haiping xu<>
11671<>5281_9<>yi-tsung cheng<>a formal approach to detecting shilling behaviors in concurrent online auctions<>iceis<>haiping xu<>
28776<>5285_1<>hans van den berg:richard j. boucherie<>insensitive bounds for the moments of the sojourn time distribution in the m/g/1 processor-sharing queue<>questa<>sing-kong cheung<>
28755<>5286_1<>bruno dutertre:ulf lindqvist<>detecting disruptive routers in wireless sensor networks<>adhoc-now<>steven cheung<>
28756<>5286_2<>nulo<>denial of service against the domain name system<>ieeesp<>steven cheung<>
28745<>5288_35<>gang huang:li zhou:xuanzhe liu:hong mei<>performance aware service pool in dependable service oriented architecture<>jcst<>shing-chi cheung<>
10328<>5289_0<>abtin keshavarzian:lakshmi venkatraman<>wakeup scheduling in wireless sensor networks<>mobihoc<>huang lee<>
10319<>5292_0<>sungtae kwon:seungyong lee<>real-time pencil rendering<>npar<>hyunjun lee<>
10338<>5294_0<>john burkardt:max gunzburger<>centroidal voronoi tessellation-based reduced-order modeling of complex systems<>siamsc<>hyung-chun lee<>
10333<>5296_0<>su-in lee:pieter abbeel:andrew y. ng<>efficient l1 regularized logistic regression<>aaai<>honglak lee<>
10334<>5296_1<>erick delage:andrew y. ng<>a dynamic bayesian network model for autonomous 3d reconstruction from a single indoor image<>cvpr<>honglak lee<>
15979<>5301_0<>qiang yang:hong chang:dit-yan yeung<>a manifold regularization approach to calibration reduction for sensor-network based tracking<>aaai<>jeffrey junfeng pan<>
15982<>5301_3<>dou shen:rong pan:jian-tao sun:kangheng wu:jie yin:qiang yang<>query enrichment for web-query classification<>tois<>jeffrey junfeng pan<>
15983<>5301_4<>james t. kwok:qiang yang:yiqiang chen<>multidimensional vector regression for accurate and low-cost location estimation in pervasive computing<>tkde<>jeffrey junfeng pan<>
10343<>5304_0<>song chong<>combined qos scheduling and call admission control algorithm in cellular networks<>wiopt<>hyang-won lee<>
10344<>5304_1<>song chong<>a distributed utility max-min flow control algorithm<>cn<>hyang-won lee<>
15977<>5305_1<>gerard j. chang<>isometric path numbers of graphs<>dm<>jun-jie pan<>
15949<>5311_0<>alun d. preece:stuart chalmers:craig mckenzie:peter gray<>a semantic web approach to handling soft constraints in virtual organisations<>ACMicec<>jeff z. pan<>
15950<>5311_1<>ian horrocks<>owl-eu: adding customised datatypes into owl<>ws<>jeff z. pan<>
15952<>5311_3<>giorgos stoilos:giorgos b. stamou:vassilis tzouvaras:ian horrocks<>f-swrl: a fuzzy extension of swrl<>jods<>jeff z. pan<>
15954<>5311_5<>giorgos b. stamou:jacco van ossenbruggen:guus schreiber<>multimedia annotations on the semantic web<>ieeemm<>jeff z. pan<>
15956<>5311_7<>wolf siberski:uwe thaden<>querying the semantic web with preferences<>semweb<>jeff z. pan<>
15958<>5311_9<>sik chun lam:derek h. sleeman:wamberto weber vasconcelos<>a fine-grained approach to resolving unsatisfiable ontologies<>webi<>jeff z. pan<>
15962<>5311_13<>carlos viegas damasio:giorgos stoilos:umberto straccia<>an approach to representing uncertainty rules in ruleml<>ruleml<>jeff z. pan<>
15964<>5311_15<>chris mellish<>supporting semi-automatic semantic annotation of multimedia resources<>ifip12<>jeff z. pan<>
15967<>5311_18<>shenghui wang<>integrating and querying parallel leaf shape descriptions<>semweb<>jeff z. pan<>
15970<>5311_21<>thomas meyer:kevin lee:richard booth<>finding maximally satisfiable terminologies for the description logic alc<>aaai<>jeff z. pan<>
15972<>5311_23<>giorgos flouris:zhisheng huang:dimitris plexousakis:holger wache<>"inconsistencies, negations and changes in ontologies."<>aaai<>jeff z. pan<>
16022<>5313_0<>michael k. ng:zhong-zhi bai<>new preconditioners for saddle point problems<>amc<>jian-yu pan<>
16007<>5317_7<>lin cai:jun ye:xuemin shen:jon w. mark<>dynamic server selection using fuzzy inference in content distribution networks<>comcom<>jianping pan<>
16008<>5317_8<>yiwei thomas hou:lin cai:yi shi:sherman x. shen<>serialized optimal relay schedules in two-tiered wireless sensor networks<>comcom<>jianping pan<>
16010<>5318_0<>andre guilherme:ribeiro balan:eric p. xing:agma j. m. traina:christos faloutsos<>automatic mining of fruit fly embryo images<>kdd<>jia-yu pan<>
16012<>5318_2<>hanghang tong:christos faloutsos<>fast random walk with restart and its applications<>icdm<>jia-yu pan<>
10355<>5319_0<>christian anthony l. go:won-hyung lee<>an efficient algorithm for rendering large bodies of water<>iwec<>ho-min lee<>
10353<>5323_1<>jaeil hwang:joonwoo lee:seungyong park:chungwoo lee:yunmook nah:segil jeon:moon-hae kim<>long-term location data management for distributed moving object databases<>isorc<>ho lee<>
15671<>5326_1<>yue wang:jie gao<>boundary recognition in sensor networks by topological methods<>mobicom<>joseph s. b. mitchell<>
15690<>5326_20<>esther m. arkin:gill barequet<>algorithms for two-box covering<>compgeom<>joseph s. b. mitchell<>
15705<>5326_35<>robert connelly:erik d. demaine:martin l. demaine:sandor p. fekete:stefan langerman:ares ribo:gunter rote<>locked and unlocked chains of planar shapes<>compgeom<>joseph s. b. mitchell<>
15707<>5326_37<>amitabh basu:jie gao:girishkumar sabhnani<>distributed localization using noisy distance and angle information<>mobihoc<>joseph s. b. mitchell<>
15708<>5326_38<>olaf hall-holt:matthew j. katz:piyush kumar:arik sityon<>finding large sticks and potatoes in polygons<>soda<>joseph s. b. mitchell<>
15724<>5326_54<>paz carmi:matthew j. katz<>the minimum-area spanning tree problem<>comgeo<>joseph s. b. mitchell<>
15729<>5326_59<>helmut alt:esther m. arkin:hervo bronnimann:jeff erickson:sandor p. fekete:christian knauer:jonathan lenchner:kim whittlesey<>minimum-cost coverage of point sets by disks<>compgeom<>joseph s. b. mitchell<>
15615<>5327_30<>collin jackson:andrew bortz:dan boneh<>protecting browser state from web privacy attacks<>www<>john c. mitchell<>
15622<>5327_37<>ninghui li<>understanding spki/sdsi using first-order logic<>ijisec<>john c. mitchell<>
15627<>5327_42<>adam barth<>managing digital rights using linear logic<>lics<>john c. mitchell<>
15628<>5327_43<>collin jackson:andrew bortz:dan boneh<>protecting browser state from web privacy attacks<>www<>john c. mitchell<>
15630<>5327_45<>ajith ramanathan:andre scedrov:vanessa teague<>a probabilistic polynomial-time process calculus for the analysis of cryptographic protocols<>tcs<>john c. mitchell<>
15639<>5327_54<>adam barth:anupam datta:helen nissenbaum<>privacy and contextual integrity: framework and applications<>sp<>john c. mitchell<>
15642<>5327_57<>anupam datta:ante derek:ajith ramanathan:andre scedrov<>games and the impossibility of realizable ideal functionality<>tcc<>john c. mitchell<>
15647<>5327_62<>michael backes:anupam datta:ante derek:mathieu turuani<>compositional analysis of contract-signing protocols<>tcs<>john c. mitchell<>
2508<>5328_12<>aleks aris<>network visualization by semantic substrates<>tvcg<>ben shneiderman<>
2527<>5328_31<>galit shmueli:wolfgang jank:aleks aris:catherine plaisant<>exploring auction databases through interactive visualization<>dss<>ben shneiderman<>
2545<>5328_49<>nulo<>a telescope for high-dimensional data<>cse<>ben shneiderman<>
15750<>5332_2<>edward o. cannon<>classifying the world anti-doping agency's 2005 prohibited list using the chemistry development kit fingerprint<>complife<>john b. o. mitchell<>
37229<>5336_1<>iadh ounis:minkoo kim<>query reformulation using automatically generated query concepts from a document space<>ipm<>youjin chang<>
37230<>5336_2<>minkoo kim:vijay v. raghavan<>construction of query concepts based on feature clustering of documents<>ir<>youjin chang<>
37231<>5339_0<>paul r. cohen:clayton t. morrison:robert st. amant:carole r. beal<>piagetian adaptation meets image schemas: the jean system<>sab<>yu-han chang<>
5211<>5340_7<>h. v. jagadish<>efficient discovery of xml data redundancies<>vldb<>cong yu<>
5213<>5340_9<>h. v. jagadish<>schema summarization<>vldb<>cong yu<>
21013<>5341_6<>junhua tang:chee kheong siew<>an opportunistic video scheduling algorithm over shared wireless downlink<>comcom<>liren zhang<>
20930<>5346_1<>le chen:feng jing:kefeng deng:wei-ying ma<>enjoyphoto: a vertical image search engine for enjoying high-quality photos<>mm<>lei zhang<>
20937<>5346_8<>changhu wang:feng jing:hongjiang zhang<>scalable search-based image annotation of personal images<>mir<>lei zhang<>
20938<>5346_9<>changhu wang:feng jing:hongjiang zhang<>image annotation refinement using random walk with restarts<>mm<>lei zhang<>
20943<>5346_14<>feng jing:wei-ying ma<>virtualtour: an online travel assistant based on high quality images<>mm<>lei zhang<>
20944<>5346_15<>en cheng:feng jing:hai jin<>scalable relevance feedback using click-through data for web image retrieval<>mm<>lei zhang<>
20949<>5346_20<>xin-jing wang:feng jing:wei-ying ma<>annosearch: image auto-annotation by search<>cvpr<>lei zhang<>
20950<>5346_21<>feng jing:changhu wang:yuhuan yao:kefeng deng:wei-ying ma<>igroup: a web image search engine with semantic clustering of search results<>mm<>lei zhang<>
20952<>5346_23<>xirong li:le chen:fuzong lin:wei-ying ma<>image annotation by large-scale content-based image retrieval<>mm<>lei zhang<>
20957<>5346_28<>le chen:feng jing:kefeng deng:wei-ying ma<>ranking web objects from multiple communities<>cikm<>lei zhang<>
20958<>5346_29<>feng jing:changhu wang:yuhuan yao:kefeng deng:wei-ying ma<>igroup: web image search results clustering<>mm<>lei zhang<>
20962<>5346_33<>xin-jing wang:feng jing:wei-ying ma<>image annotation using search and mining technologies<>www<>lei zhang<>
20964<>5348_1<>baoyindureng wu<>extension of a list coloring problem<>appml<>li zhang<>
20925<>5349_0<>jianqiang xin:brad aswegan:john dickerson:julie a. dickerson:thomas daniels:yong guan<>a testbed for evaluation and analysis of stepping stone attack attribution techniques<>tridentcom<>linfeng zhang<>
20927<>5350_0<>cathy h. xia:james broberg:zhen liu<>distributed resource allocation in stream processing systems<>wdag<>li zhang<>
20928<>5350_1<>james broberg:zhen liu:cathy h. xia<>a multicommodity flow model for distributed stream processing<>sigmetrics<>li zhang<>
21002<>5352_1<>shree k. nayar<>projection defocus analysis for scene capture and image display<>tog<>li zhang<>
20982<>5354_1<>beichuan zhang:wenjie wang:sugih jamin:daniel massey<>universal ip multicast delivery<>cn<>lixia zhang<>
20983<>5354_2<>ricardo oliveira:beichuan zhang:dan pei:rafit izhak-ratzin<>quantifying path exploration in the internet<>imc<>lixia zhang<>
20986<>5354_5<>dan pei:beichuan zhang:daniel massey<>an analysis of convergence delay in path vector routing protocols<>cn<>lixia zhang<>
26395<>5357_0<>swarat chaudhuri:p. madhusudan<>a fixpoint calculus for local and global program flows<>popl<>rajeev alur<>
26396<>5357_1<>p. madhusudan<>adding nesting structure to words<>dlt<>rajeev alur<>
26416<>5357_21<>swarat chaudhuri<>branching pushdown tree automata<>fsttcs<>rajeev alur<>
26423<>5357_28<>salvatore la torre:p. madhusudan<>modular strategies for recursive game graphs<>tcs<>rajeev alur<>
26429<>5357_34<>wonhong nam<>learning-based symbolic assume-guarantee reasoning with automatic decomposition<>atva<>rajeev alur<>
26435<>5357_40<>sebastian burckhardt:milo m. k. martin<>bounded model checking of concurrent data types on relaxed memory models: a case study<>cav<>rajeev alur<>
26443<>5357_48<>pavol cerny:steve zdancewic<>preserving secrecy under refinement<>icalp<>rajeev alur<>
26459<>5357_64<>swarat chaudhuri:p. madhusudan<>languages of nested trees<>cav<>rajeev alur<>
26464<>5357_69<>truong nghiem:george j. pappas:antoine girard<>time-triggered implementations of dynamic controllers<>emsoft<>rajeev alur<>
16340<>5358_0<>ben shneiderman<>knowledge discovery in high-dimensional data: case studies and a user survey for the rank-by-feature framework<>tvcg<>jinwook seo<>
16341<>5358_1<>heather gordish-dressman:eric p. hoffman<>an interactive power analysis tool for microarray hypothesis testing and generation<>bioinformatics<>jinwook seo<>
24624<>5359_2<>rui fan<>gradient clock synchronization<>dc<>nancy a. lynch<>
24638<>5359_16<>constantinos djouvas:nancy d. griffeth<>testing self-similar networks<>entcs<>nancy a. lynch<>
24651<>5359_29<>rui fan<>an omega ( log ) lower bound on the cost of mutual exclusion<>podc<>nancy a. lynch<>
24652<>5359_30<>myla archer:hongping lim:sayan mitra:shinya umeno<>specifying and proving properties of timed i/o automata in the tioa toolkit<>memocode<>nancy a. lynch<>
24722<>5359_100<>sayan mitra:daniel liberzon<>verifying average dwell time by solving optimization problems<>hybrid<>nancy a. lynch<>
24747<>5359_125<>ran canetti:ling cheung:dilsun kirli kaynar:moses liskov:olivier pereira:roberto segala<>time-bounded task-pioas: a framework for analyzing security protocols<>wdag<>nancy a. lynch<>
15197<>5364_0<>james p. callan<>user modeling for full-text federated search in peer-to-peer networks<>sigir<>jie lu<>
15203<>5364_6<>jamie callan<>full-text federated search of text-based digital libraries in peer-to-peer networks<>ir<>jie lu<>
15185<>5365_0<>chao wang:guangquan zhang<>integration of ontology data through learning instance matching<>webi<>jie lu<>
15186<>5365_1<>fengjie wu:guangquan zhang<>a new approximate algorithm for solving multiple objective linear programming problems with fuzzy parameters<>amc<>jie lu<>
15187<>5365_2<>chenggen shi:guangquan zhang<>on bilevel multi-follower decision making: general framework and solutions<>isci<>jie lu<>
15191<>5365_6<>chenggen shi:guangquan zhang:hong zhou<>an extended branch and bound algorithm for linear bilevel programming<>amc<>jie lu<>
15194<>5365_9<>zhifeng hao:wen wen:xiaowei yang:guangquan zhang<>a fast data preprocessing procedure for support vector regression<>ideal<>jie lu<>
15196<>5365_11<>zi lu:chenggang bai:guangquan zhang<>customer online shopping behaviours analysis using bayesian networks<>ausai<>jie lu<>
15173<>5367_1<>jianjun xu:wei wang:baile shi<>effective keyword search in xml documents based on miu<>dasfaa<>jiaheng lu<>
13441<>5372_12<>gordon bell:alexander s. szalay<>petascale computational systems<>computer<>jim gray<>
13444<>5372_15<>leslie lamport<>consensus on transaction commit<>tods<>jim gray<>
8457<>5373_1<>zhuoqing morley mao:jia wang:lixin gao:randy bush<>a measurement study on the impact of routing events on end-to-end internet path performance<>sigcomm<>feng wang<>
8458<>5374_0<>chantal t. falzon<>conformational processes in l-alanine studied using dual space analysis<>iccS<>feng wang<>
14167<>5376_27<>tomer moscovich<>multi-finger cursor techniques<>graphicsinterface<>john f. hughes<>
33075<>5379_0<>martyn whitwell:john lee<>eye movements and pupil dilation during event perception<>etra<>tim j. smith<>
14200<>5382_0<>jon bowyer<>assessing undergraduate experience of continuous integration and test-driven development<>icse<>janet hughes<>
33063<>5383_0<>nathan thomas:steven saunders:gabriel tanase:lawrence rauchwerger<>armi: a high level communication library for stapl<>ppl<>tim smith<>
33068<>5387_1<>mark w. newman:bill n. schilit<>recipes for digital living<>computer<>trevor f. smith<>
33070<>5387_3<>nicolas ducheneaut:james bo begole:mark w. newman:chris beckmann<>the orbital browser: composing ubicomp services using only rotation and selection<>chi<>trevor f. smith<>
25584<>5388_0<>richard faber:bo li:gunter wozny<>data reconciliation for real-time optimization of an industrial coke-oven-gas purification process<>simpra<>pu li<>
14234<>5390_2<>chun-jen lee:jason s. chang<>extraction of transliteration pairs from parallel corpora using a statistical transliteration model<>isci<>jyh-shing roger jang<>
14243<>5390_11<>hong-ru lee<>an initial study on progressive filtering based on dynamic programming for query-by-singing/humming<>pcm<>jyh-shing roger jang<>
25551<>5392_0<>michel toulouse<>variations of the maximum leaf spanning tree problem for bipartite graphs<>ipl<>pak ching li<>
25554<>5393_2<>steve zdancewic<>encoding information flow in haskell<>csfw<>peng li<>
25570<>5395_1<>haisang wu:binoy ravindran:e. douglas jensen<>a utility accrual scheduling algorithm for real-time activities with mutual exclusion resource constraints<>tc<>peng li<>
25578<>5395_9<>haisang wu:binoy ravindran:e. douglas jensen<>"energy-efficient, utility accrual scheduling under resource constraints for mobile embedded systems."<>tecs<>peng li<>
25567<>5398_7<>haijing wang:tianwen zhang<>histogram features-based fisher linear discriminant for face detection<>accv<>peihua li<>
15878<>5401_1<>rilla khaled:pippin barr:robert biddle<>investigating social software as persuasive technology<>persuasive<>james noble<>
15894<>5401_17<>david j. pearce<>relationship aspects<>aosd<>james noble<>
15902<>5401_25<>rilla khaled:robert biddle:pippin barr:ronald fischer<>persuasive interaction for collectivist cultures<>auic<>james noble<>
15903<>5401_26<>jennifer ferreira:robert biddle<>a case for iconic icons<>auic<>james noble<>
15909<>5401_32<>alex potanin:dave clarke:robert biddle<>generic ownership for generic java<>oopsla<>james noble<>
15912<>5401_35<>chris andreae:shane markstrum:todd d. millstein<>a framework for implementing pluggable type systems<>oopsla<>james noble<>
15916<>5401_39<>darren willis:david j. pearce<>efficient object querying for java<>ecoop<>james noble<>
41062<>5409_0<>cai heng li:hua zhang<>tetravalent edge-transitive cayley graphs with odd number of vertices<>jct<>zai ping lu<>
23083<>5410_0<>eli gafni:sergio rajsbaum:corentin travers<>the committee decision problem<>latin<>michel raynal<>
23085<>5410_2<>achour mostefaoui:eric mourgaya:corentin travers<>a time-free assumption to implement eventual leadership<>ppl<>michel raynal<>
23086<>5410_3<>achour mostefaoui:corentin travers:sergio rajsbaum<>from failure detectors with limited scope accuracy to system-wide leadership<>aina<>michel raynal<>
23087<>5410_4<>vincent gramoli:anne-marie kermarrec:achour mostefaoui:bruno sericola<>core persistence in peer-to-peer systems: relating size to lifetime<>otm<>michel raynal<>
23088<>5410_5<>corentin travers<>in search of the holy grail: looking for the weakest failure detector for wait-free set agreement<>opodis<>michel raynal<>
23089<>5410_6<>jiannong cao:xianbing wang:weigang wu<>the power and limit of adding synchronization messages for synchronous agreement<>icpp<>michel raynal<>
23091<>5410_8<>achour mostefaoui:sergio rajsbaum<>synchronous condition-based consensus<>dc<>michel raynal<>
23092<>5410_9<>philippe raipin parvedy:corentin travers<>strongly terminating early-stopping -set agreement in synchronous systems with general omission failures<>sirocco<>michel raynal<>
41061<>5411_3<>helen l. johnson:k. bretonnel cohen:william a. baumgartner jr.:michael bada:todd kester:hyunmin kim:lawrence hunter<>evaluation of lexical methods for detecting relationships between concepts from multiple ontologies<>psb<>zhiyong lu<>
41053<>5415_0<>nulo<>the numerical evaluation of the probability density function of a quadratic form in normal variables<>csda<>zeng-hua lu<>
41052<>5416_0<>jie lu:chenggang bai:guangquan zhang<>customer online shopping behaviours analysis using bayesian networks<>ausai<>zi lu<>
41401<>5420_0<>bevan m. baas<>performance and power analysis of globally asynchronous locally synchronous multi-processor systems<>isvlsi<>zhiyi yu<>
41392<>5423_1<>yong guan<>a dynamic en-route scheme for filtering false data injection in wireless sensor networks<>infocom<>zhen yu<>
37204<>5431_3<>nulo<>a 2-level tcam architecture for ranges<>tc<>yeim-kuan chang<>
37205<>5431_4<>yu-ren lin:yi-wei ting<>caching personalized and database-related dynamic web pages<>iwnas<>yeim-kuan chang<>
8467<>5432_0<>emmanuel agu:matthew ward<>multiresolution graphics on ubiquitous displays using wavelets<>ijvr<>fan wu<>
8465<>5434_2<>zaiqing nie:ji-rong wen:wei-ying ma<>extracting objects from the web<>icde<>fei wu<>
19515<>5438_1<>ramachandran vaidyanathan:jerry l. trahan<>routing multiple width communications on the circuit switched tree<>ijfcs<>krishnendu roy<>
19518<>5439_0<>nulo<>guest editorial<>integration<>kaushik roy<>
10913<>5445_3<>hyunsoo kim:barry l. drake<>adaptive nonlinear discriminant analysis by regularized minimum squared errors<>tkde<>haesun park<>
10922<>5445_12<>peg howland:jianlin wang<>solving the small sample size problem in face recognition using generalized discriminant analysis<>pr<>haesun park<>
10923<>5445_13<>jieping ye:ravi janardan:qi li<>feature reduction via generalized uncorrelated linear discriminant analysis<>tkde<>haesun park<>
5190<>5446_8<>jisong chen:rowena chau<>a multi-word term extraction system<>pricai<>chung-hsing yeh<>
5200<>5446_18<>rowena chau:kate smith-miles<>fuzzy-neuro web-based multilingual knowledge management<>fskd<>chung-hsing yeh<>
34658<>5450_0<>hai huang:yinong chen<>binary analysis and automated hot patching for web-based applications<>infsof<>wei-tek tsai<>
4041<>5451_2<>ibrahim hur<>memory prefetching using adaptive stream detection<>micro<>calvin lin<>
15521<>5455_1<>paul lukowicz:gerhard troster<>textile pressure sensor for muscle activity and motion detection<>iswc<>jan meyer<>
15432<>5456_6<>jamal bentahar:bernard moulin:yves lesperance<>a new logical semantics for agent communication<>clima<>john-jules ch. meyer<>
15438<>5456_12<>m. birna van riemsdijk<>a compositional semantics of plan revision in intelligent agents<>amast<>john-jules ch. meyer<>
15474<>5456_48<>mehdi dastani:m. birna van riemsdijk<>goal types in agent programming<>atal<>john-jules ch. meyer<>
15485<>5456_59<>m. birna van riemsdijk:frank s. de boer:mehdi dastani<>prototyping 3apl in the maude term rewriting language<>clima<>john-jules ch. meyer<>
15499<>5456_73<>nulo<>reasoning about emotional agents<>ijis<>john-jules ch. meyer<>
15503<>5456_77<>m. birna van riemsdijk:frank s. de boer<>semantics of plan revision in intelligent agents<>tcs<>john-jules ch. meyer<>
15505<>5456_79<>jamal bentahar:bernard moulin<>a new model checking approach for verifying agent communication protocols<>ccece<>john-jules ch. meyer<>
15507<>5456_81<>m. birna van riemsdijk:mehdi dastani:frank s. de boer<>goal-oriented modularity in agent programming<>atal<>john-jules ch. meyer<>
15515<>5456_89<>m. birna van riemsdijk:frank s. de boer:mehdi dastani<>prototyping 3apl in the maude term rewriting language<>atal<>john-jules ch. meyer<>
15517<>5456_91<>mehdi dastani:m. birna van riemsdijk<>goal types in agent programming<>ecai<>john-jules ch. meyer<>
4137<>5465_2<>tzu-kuo huang:ruby c. weng<>ranking individuals by group comparisons<>icml<>chih-jen lin<>
4144<>5465_9<>tzu-kuo huang:ruby c. weng<>generalized bradley-terry models and multi-class probability estimates<>jmlr<>chih-jen lin<>
7535<>5466_0<>massimo mecella:mourad ouzzani:federica paci<>access control enforcement for conversation-based web services<>www<>elisa bertino<>
7537<>5466_2<>giovanni mella:elena ferrari:yunhua koglin<>controlled and cooperative updates of xml documents in byzantine and failure-prone distributed systems<>tissec<>elisa bertino<>
4133<>5467_2<>hua-min huang:d. frank hsu:lih-hsing hsu<>on the spanning -wide diameter of the star graph<>networks<>cheng-kuan lin<>
7532<>5468_1<>ji-won byun:yonglak sohn<>systematic control and management of data integrity<>sacmat<>elisa bertino<>
4096<>5473_7<>xuemin shen:yan (lindsay) sun:jianping pan:peter langendorfer:zhenfu cao<>wireless network security<>wicomm<>chuang lin<>
4098<>5473_9<>xuehai peng<>architecture of trustworthy networks<>dasc<>chuang lin<>
4100<>5473_11<>yang qu:yajuan li:zhiguang shan<>performability evaluation of resource scheduling algorithms for computational grids<>gcc<>chuang lin<>
4102<>5473_13<>yuanzhuo wang:yang yang:junjie lv:yang qu<>a game-based intrusion tolerant mechanism for grid service<>gcc<>chuang lin<>
4104<>5473_15<>hao yin:zhangxi tan:geyong min:yanfei fan<>a context-based simulation tool for design and evaluation of network processors<>simpra<>chuang lin<>
4111<>5473_22<>yang qu:yuanzhuo wang:zhiguang shan<>qos-aware composite service selection in grids<>gcc<>chuang lin<>
4112<>5473_23<>xuehai peng<>research on network architecture with trustworthiness and controllability<>jcst<>chuang lin<>
4116<>5473_27<>huanying zou:hao yin:zhen chen:feng qiu:xuening liu<>optimal priority packetization with multi-layer uep for video streaming over wireless network<>pcm<>chuang lin<>
4121<>5473_32<>yuanzhuo wang:zhengli zhai:yang yang<>a dependable task scheduling strategy for a fault tolerant grid model<>apweb<>chuang lin<>
4122<>5473_33<>yao zhao:hao yin<>security authentication of 3g-wlan interworking<>aina<>chuang lin<>
40918<>5476_0<>nai xia:guole li:bing mao:li xie<>transparent run-time prevention of format-string attacks via dynamic taint and flexible validation<>isw<>zhiqiang lin<>
40925<>5477_1<>tu minh phuong:russ b. altman<>choosing snps using feature selection<>jbcb<>zhen lin<>
8156<>5482_3<>clement t. yu:weiyi meng:abdur chowdhury<>effective keyword search in relational databases<>sigmod<>fang liu<>
8164<>5484_3<>dechang chen:xilong mao:xia fei:kai xing:min song<>a convex-hull based algorithm to connect the maximal independent set in unit-disk graphs<>wasa<>fang liu<>
8169<>5486_0<>tai t. do:kien a. hua<>dynamic range query in spatial network environments<>dexa<>fuyu liu<>
32904<>5490_0<>vittorio selmin<>collaborative multidisciplinary design in virtual environments<>cscwd<>toan nguyen<>
32909<>5493_1<>hanh huu hoang:amin andjomshoaa:a. min tjoa<>a front-end approach for user query generation and information retrieval in the semanticlife framework<>iiwas<>tho manh nguyen<>
39268<>5495_0<>yukio shibata<>on the pagenumber of trivalent cayley graphs<>dam<>yuuki tanaka<>
32915<>5496_0<>mohamed ali sfaxi:solange ghernaouti-helie<>integration of quantum cryptography in 802.11 networks<>IEEEares<>thi mai trang nguyen<>
30830<>5499_0<>deepak kumar dalai:subhamoy maitra<>basic theory in construction of boolean functions with maximum possible annihilator immunity<>dcc<>sumanta sarkar<>
30831<>5499_1<>selcuk kavut:subhamoy maitra:melek d. yucel<>enumeration of 9-variable rotation symmetric boolean functions having nonlinearity  240<>indocrypt<>sumanta sarkar<>
16888<>5509_1<>sophia b. liu:michael j. muller:james lin:clemens drews<>unobtrusive but invasive: using screen recording to collect field data on computer-mediated interaction<>cscw<>john c. tang<>
16883<>5510_0<>xi zhang<>qos-driven asynchronous uplink subchannel allocation algorithms for space-time ofdm-cdma systems in wireless networks<>winet<>jia tang<>
16904<>5512_0<>meng zhang:dong guo:liang hu:qiang li<>succinct text indexes on large alphabet<>tamc<>jijun tang<>
16876<>5515_0<>mingcai hong:juan-zi li:bangyong liang<>tree-structured conditional random fields for semantic annotation<>semweb<>jie tang<>
16882<>5515_6<>kuo zhang:hui xu:juan-zi li<>keyword extraction using support vector machine<>waim<>jie tang<>
16873<>5516_0<>guoliang xue:weiyi zhang<>reliable ad hoc routing based on mobility prediction<>jco<>jian tang<>
16874<>5516_1<>bin hao:arunabha sen<>relay node placement in large scale wireless sensor networks<>comcom<>jian tang<>
32896<>5518_1<>claire p. willis:derek j. paddon:sinh hoa nguyen:hung son nguyen<>learning sunspot classification<>fuin<>trung thanh nguyen<>
32898<>5518_3<>sinh hoa nguyen:hung son nguyen<>ontology driven concept approximation<>rsctc<>trung thanh nguyen<>
18684<>5519_2<>dong-yeon cho:byoung-tak zhang<>identification of biochemical networks by s-tree based genetic programming<>bioinformatics<>kwang-hyun cho<>
21801<>5521_0<>andy c. bavier:nick feamster:larry l. peterson:jennifer rexford<>in vini veritas: realistic and controlled network experimentation<>sigcomm<>mark huang<>
21803<>5521_2<>andy c. bavier:larry l. peterson<>planetflow: maintaining accountability for network services<>sigops<>mark huang<>
21788<>5522_7<>quang vinh nguyen:kang zhang:i-ling yen<>a visualization model for web sitemaps<>IEEEcgiv<>mao lin huang<>
21804<>5524_0<>francisco j. mesa-martinez:jose renau<>"seed: scalable, efficient enforcement of dependences."<>IEEEpact<>michael c. huang<>
21805<>5524_1<>alok garg:m. wasiur rashid<>slackened memory dependence enforcement: combining opportunistic forwarding with decoupled verification<>isca<>michael c. huang<>
21806<>5524_2<>fernando castro:luis pinuel:daniel chaver:manuel prieto:francisco tirado<>dmdc: delayed memory dependence checking through age-based filtering<>micro<>michael c. huang<>
37756<>5529_6<>jinfeng feng:hans-erik giesen:gregory gutin:tommy jensen:arash rafiey<>characterization of edge-colored complete graphs with properly colored hamilton paths<>jgt<>yubao guo<>
1545<>5536_0<>yves lechevallier:francisco de a. t. de carvalho:brigitte trousse<>mining web usage data for discovering navigation clusters<>iscc<>alzennyr da silva<>
18824<>5543_0<>irfan a. essa:gregory d. abowd<>interactive mosaic generation for video navigation<>mm<>kihwan kim<>
18802<>5551_3<>larry s. davis<>multi-camera tracking and segmentation of occluded people on ground plane using search-guided particle filtering<>eccv<>kyungnam kim<>
18001<>5552_0<>gwenaelle piriou:patrick bouthemy<>recognition of dynamic video contents with global probabilistic models of visual motion<>tip<>jian-feng yao<>
18002<>5552_1<>tomas crivelli:bruno cernuschi-frias:patrick bouthemy<>mixed-state markov random fields for motion texture modeling and segmentation<>icip<>jian-feng yao<>
17989<>5554_4<>nulo<>supporting research with weblogs: a study on web-based research support systems<>iat<>jingtao yao<>
17998<>5554_13<>songlun zhao:lisa fan<>an enhanced support vector machine model for intrusion detection<>rskt<>jingtao yao<>
28972<>5555_1<>jason a. blome:shuguang feng:scott a. mahlke<>cost-efficient soft error protection for embedded microprocessors<>cases<>shantanu gupta<>
28962<>5556_13<>tridib mukherjee:krishna k. venkatasubramanian:t. b. taylor<>proximity based access control in smart-emergency departments<>percom<>sandeep k. s. gupta<>
28965<>5556_16<>tridib mukherjee:krishna k. venkatasubramanian<>criticality aware access control model for pervasive applications<>percom<>sandeep k. s. gupta<>
29010<>5557_2<>alok priyadarshi<>finding mold-piece regions using computer graphics hardware<>gmp<>satyandra k. gupta<>
29016<>5557_8<>antonio cardone:abhijit deshmukh:mukul karnik<>machining feature-based similarity assessment algorithms for prismatic machined parts<>cad<>satyandra k. gupta<>
29022<>5557_14<>ashis gopal banerjee<>a step towards automated design of side actions in injection molding of complex parts<>gmp<>satyandra k. gupta<>
8529<>5564_9<>feihui li:mahmut t. kandemir:mary jane irwin<>reducing noc energy consumption through compiler-directed channel voltage scaling<>pldi<>guangyu chen<>
8532<>5564_12<>feihui li:mahmut t. kandemir<>compiler-directed channel allocation for saving power in on-chip networks<>popl<>guangyu chen<>
8535<>5564_15<>mahmut t. kandemir:narayanan vijaykrishnan:mary jane irwin<>object duplication for improving reliability<>aspdac<>guilin chen<>
8539<>5564_19<>ozcan ozturk:mahmut t. kandemir:ibrahim kolcu<>compiler-guided data compression for reducing memory consumption of embedded applications<>aspdac<>guangyu chen<>
8546<>5564_26<>mahmut t. kandemir:feihui li:mary jane irwin:ibrahim kolcu<>activity clustering for leakage management in spms<>date<>guangyu chen<>
8556<>5564_36<>ozcan ozturk:mahmut t. kandemir:mustafa karakoy<>dynamic scratch-pad memory management for irregular array access patterns<>date<>guilin chen<>
8577<>5565_15<>warren e. shreve:bing wei<>hamiltonian graphs involving neighborhood unions<>jgt<>guantao chen<>
8586<>5565_24<>zhicheng gao:xingxing yu:wenan zang<>approximating longest cycles in graphs with bounded degrees<>siamcomp<>guantao chen<>
8591<>5567_0<>yi zhang:ling chen<>globally synchronized dead-reckoning with local lag for continuous distributed multiplayer games<>netgames<>gencai chen<>
8592<>5567_1<>ling chen:wei liu<>an adaptive-filtering policy for distributed virtual environments<>cscwd<>gencai chen<>
8593<>5567_2<>chengzhe xu:ling chen<>a color bar based affective annotation method for media player<>apweb<>gencai chen<>
8597<>5567_6<>yunjun gao:ling chen:chun chen<>an i/o optimal and scalable skyline query algorithm<>bncod<>gencai chen<>
8599<>5567_8<>jun yu:ling chen<>priority based overlay multicast for distributed interactive applications<>iscc<>gencai chen<>
8600<>5567_9<>jun yu:ling chen<>priority based overlay multicast with filtering mechanism for distributed interactive applications<>dsrt<>gencai chen<>
8602<>5567_11<>ling chen:wei liu<>effects of filtering policies on task performance in a desktop cve system<>edutainment<>gencai chen<>
8603<>5567_12<>yunjun gao:ling chen:chun chen<>parallelizing progressive computation for skyline queries in multi-disk environment<>dexa<>gencai chen<>
8604<>5567_13<>yunjun gao:ling chen:chun chen<>efficient parallel processing for -nearest-neighbor search in spatial databases<>iccsa<>gencai chen<>
8607<>5570_1<>yi ouyang:zhengyi le:james ford:fillia makedon<>entrapping adversaries for source protection in sensor networks<>wowmom<>guanling chen<>
31759<>5580_0<>kai yu:volker tresp:hans-peter kriegel<>multi-output regularized feature projection<>tkde<>shipeng yu<>
31765<>5580_6<>kai yu:volker tresp:hans-peter kriegel<>collaborative ordinal regression<>icml<>shipeng yu<>
31770<>5580_11<>kai yu:volker tresp:hans-peter kriegel:mingrui wu<>supervised probabilistic principal component analysis<>kdd<>shipeng yu<>
31771<>5580_12<>kai yu:volker tresp:hans-peter kriegel<>variational bayesian dirichlet-multinomial allocation for exponential family mixtures<>ecml<>shipeng yu<>
31797<>5581_0<>daoliang tan:kaiqi huang:tieniu tan<>efficient night gait recognition based on template matching<>icpr<>shiqi yu<>
19840<>5586_0<>jian pei:haixun wang:jian liu:jianyong wang:philip s. yu<>discovering frequent closed partial orders from strings<>tkde<>ke wang<>
37967<>5588_8<>aimin zhou:qingfu zhang:bernhard sendhoff:edward p. k. tsang<>prediction-based population re-initialization for evolutionary dynamic multi-objective optimization<>emo<>yaochu jin<>
37970<>5588_11<>shengxiang yang:yew-soon ong<>editorial to special issue on evolutionary computation in dynamic and uncertain environments<>gpem<>yaochu jin<>
3487<>5591_4<>s. ravi:anand raghunathan:niraj k. jha<>use of computation-unit integrated memories in high-level synthesis<>tcad<>chao huang<>
40106<>5593_4<>derek leonard:dmitri loguinov<>jetmax: scalable max-min congestion control for high-speed heterogeneous networks<>infocom<>yueping zhang<>
40096<>5594_0<>tao yu:kwei-jay lin<>modeling and measuring privacy risks in qos web services<>wecwis<>yue zhang<>
40098<>5594_2<>tao yu:krishna raman:kwei-jay lin<>strategies for efficient syntactical and semantic web services<>wecwis<>yue zhang<>
40099<>5594_3<>kwei-jay lin:tao yu<>accountability in service-oriented architecture: computing with reasoning and reputation<>icebe<>yue zhang<>
40100<>5594_4<>kwei-jay lin:raymond klefstad<>direct: a robust distributed broker framework for trust and reputation management<>wecwis<>yue zhang<>
40086<>5596_0<>reynold cheng:elisa bertino:sunil prabhakar<>preserving user location privacy in mobile data management infrastructures<>pet<>yu zhang<>
40116<>5597_1<>philip zigoris:damian eads<>unsupervised learning of tree alignment models for information extraction<>icdm<>yi zhang<>
40111<>5603_0<>dongmo zhang<>logical properties of belief-revision-based bargaining solution<>ausai<>yan zhang<>
40113<>5603_2<>dongmo zhang<>a computational model of logic-based negotiation<>aaai<>yan zhang<>
29043<>5605_0<>gopa r. mishra:m. suresh:k. kumaran:n. kannabiran:shubha suresh:p. bala:k. shivakumar:n. anuradha:raghunath reddy:t. madhan raghavan:shalini menon:g. hanumanthu:malvika gupta:sapna upendran:m. mahesh:bincy jacob:pinky mathew:pritam chatterjee:k. s. arun:salil sharma:k. n. chandrika:nandan deshpande:kshitish palvankar:r. raghavnath:r. krishnakanth:hiren karathia:b. rekha:rashmi nayak:g. vishnupriya:h. g. mohan kumar:m. nagini:g. s. sameer kumar:rojan jose:p. deepthi:s. sujatha mohan:t. k. b. gandhi:h. c. harsha:krishna s. deshpande:malabika sarker:t. s. keshava prasad:akhilesh pandey<>human protein reference database - 2006 update<>nar<>shweta gupta<>
40109<>5606_2<>salim hariri:bithika khargharia:huoping chen:jingmei yang:manish parashar:hua liu<>the autonomic computing paradigm<>cluster<>yeliang zhang<>
3491<>5608_1<>yonghong tian:tiejun huang:wen gao<>semantic scoring based on small-world phenomenon for feature selection in text mining<>adma<>chong huang<>
3492<>5608_2<>yonghong tian:zhi zhou:charles x. ling:tiejun huang<>keyphrase extraction using semantic networks structure analysis<>icdm<>chong huang<>
3496<>5618_0<>chee wai lee:laxmikant v. kale<>support for adaptivity in armci using migratable objects<>ipps<>chao huang<>
3498<>5618_2<>gengbin zheng:laxmikant v. kale:sameer kumar<>performance evaluation of adaptive mpi<>ppopp<>chao huang<>
3499<>5618_3<>sameer kumar:george almasi:laxmikant v. kale<>achieving strong scaling with namd on blue gene/l<>ipps<>chao huang<>
20348<>5627_0<>david w. walker:omer f. rana:yan huang<>dynamic workflow management using performance data<>ccgrid<>lican huang<>
20358<>5633_0<>hao zhang:daniel gildea:kevin knight<>synchronous binarization for machine translation<>naacl<>liang huang<>
18385<>5635_0<>laurie a. williams:nachiappan nagappan:will snipes:john p. hudepohl:mladen a. vouk<>on the value of static analysis for fault detection in software<>tse<>jiang zheng<>
18387<>5635_2<>brian robinson:laurie williams:karen smiley<>applying regression test selection for cots-based applications<>icse<>jiang zheng<>
18390<>5635_5<>brian robinson:laurie williams:karen smiley<>a lightweight process for change identification and regression test selection in using cots components<>iccbss<>jiang zheng<>
18374<>5636_1<>baifang lu:zhaowei fan:lin li<>bio-native shape modeling and virtual reality for bio education<>ijig<>jianmin zheng<>
18382<>5636_9<>yiyu cai<>interpolation over arbitrary topology meshes using a two-phase subdivision scheme<>tvcg<>jianmin zheng<>
36976<>5637_0<>chunping li<>combining smooth graphs with semi-supervised classification<>pakdd<>xueyuan zhou<>
36978<>5637_2<>chunping li<>semi-supervised classification based on smooth graphs<>dasfaa<>xueyuan zhou<>
36982<>5638_3<>takehiro ito:kazuya goto:takao nishizeki<>partitioning a multi-weighted graph to connected subgraphs of almost uniform size<>cocoon<>xiao zhou<>
36986<>5638_7<>takehiro ito:takao nishizeki<>partitioning a graph of bounded tree-width to connected subgraphs of almost uniform size<>jda<>xiao zhou<>
36904<>5639_1<>terrence chen:wotao yin:dorin comaniciu:thomas s. huang<>total variation models for variable lighting face recognition<>pami<>xiang sean zhou<>
36905<>5639_2<>yefeng zheng:bogdan georgescu:shaohua kevin zhou:dorin comaniciu<>example based non-rigid shape detection<>eccv<>xiang sean zhou<>
36910<>5639_7<>jing xiao:bogdan georgescu:dorin comaniciu:takeo kanade<>simultaneous registration and modeling of deformable shapes<>cvpr<>xiang zhou<>
36933<>5640_20<>guandong xu:yanchun zhang<>discovering task-oriented usage pattern for web recommendation<>adc<>xiaofang zhou<>
36941<>5640_28<>ke deng:heng tao shen:kai xu:xuemin lin<>surface k-nn query processing<>icde<>xiaofang zhou<>
36942<>5640_29<>heng tao shen:kian-lee tan:bin cui<>icicle: a semantic-based retrieval system for www images<>mms<>xiaofang zhou<>
36954<>5640_41<>xuemin lin:jian xu:qing zhang:hongjun lu:jeffrey xu yu:yidong yuan<>approximate processing of massive continuous quantile queries over high-speed data streams<>tkde<>xiaofang zhou<>
36955<>5640_42<>heng tao shen:bin cui<>indexing and integrating multiple features for www images<>www<>xiaofang zhou<>
36966<>5640_53<>saeid asadi:jiajie xu:yuan shi:joachim diederich<>calculation of target locations for web resources<>wise<>xiaofang zhou<>
36967<>5640_54<>xuemin lin:qing liu:yidong yuan:hongjun lu<>summarizing level-two topological relations in large spatial datasets<>tods<>xiaofang zhou<>
36970<>5640_57<>zi huang:dawei song:peter bruza<>dimensionality reduction in patch-signature based protein structure matching<>adc<>xiaofang zhou<>
36973<>5640_60<>kai xu:xuemin lin:heng tao shen:ke deng<>a multiresolution terrain model for efficient visualization query processing<>tkde<>xiaofang zhou<>
37032<>5641_1<>jianbin wei:cheng-zhong xu:qing li<>a robust packet scheduling algorithm for proportional delay differentiation services<>comcom<>xiaobo zhou<>
37037<>5641_6<>nulo<>internet services and architectures: a performance perspective<>paapp<>xiaobo zhou<>
37043<>5641_12<>jianbin wei:cheng-zhong xu<>resource allocation for session-based two-dimensional service differentiation on e-commerce servers<>tpds<>xiaobo zhou<>
37019<>5643_0<>fei pan:kiran kamath:kangyu zhang:sudip pulapura:avinash achar:juan nunez-iglesias:yu huang 0003:xifeng yan:jiawei han:haiyan hu:min xu:jianjun hu<>integrative array analyzer: a software package for analysis of cross-platform and cross-species microarray data<>bioinformatics<>xianghong jasmine zhou<>
37045<>5645_0<>yu zhang:yiyue gao<>optimizing the data intensive mediator-based web services composition<>apweb<>xiangmin zhou<>
1441<>5646_0<>julia hirschberg<>"story segmentation of broadcast news in english, mandarin and arabic."<>naacl<>andrew rosenberg<>
8697<>5648_40<>wenjun wu:hasan bulut:ahmet uyar:tao huang<>service oriented architecture for voip conferencing<>ijcomsys<>geoffrey fox<>
36006<>5655_1<>william k. cheung:jiming liu<>integrating value-directed compression and belief space analysis for pomdp decomposition<>iat<>xin li<>
36009<>5657_0<>nicola santoro<>an integrated self-deployment and coverage maintenance scheme for mobile sensor networks<>msn<>xu li<>
36008<>5658_1<>jean-luc gaudiot<>design trade-offs and deadlock prevention in transient fault-tolerant smt processors<>prdc<>xiaobin li<>
36026<>5659_0<>yandong tang:axel von freyberg:gert goch<>automatic segmentation of the papilla in a fundus image based on the c-v model and a shape restraint<>icpr<>xiaomao li<>
36024<>5660_2<>dong xu:shuicheng yan:dacheng tao:lei zhang:hongjiang zhang<>human gait recognition with matrix representation<>tcsv<>xuelong li<>
36025<>5660_3<>dacheng tao:stephen j. maybank:xindong wu<>human carrying status in visual surveillance<>cvpr<>xuelong li<>
36027<>5661_0<>jonathan malkin:jeff a. bilmes<>"a high-speed, low-resource asr back-end based on custom arithmetic."<>taslp<>xiao li<>
36015<>5662_1<>shi-kuo chang<>user profiling in the chronobot/virtual classroom system<>seke<>xin li<>
36017<>5665_0<>bing liu:philip s. yu<>discovering overlapping communities of named entities<>pkdd<>xin li<>
36496<>5668_0<>yiliang bao:marta karczewicz:justin ridge<>fgs coding with adaptive reference for low-delay applications<>icip<>xianglin wang<>
19056<>5669_2<>se-joong lee:hoi-jun yoo<>low-power network-on-chip for high-performance soc design<>tvlsi<>kangmin lee<>
35958<>5670_1<>jie wu<>improve searching by reinforcement learning in unstructured p2ps<>icdcsw<>xiuqi li<>
27425<>5672_3<>rina panigrahy:ying xu 0002<>fractional matching via balls-and-bins<>approx<>rajeev motwani<>
27438<>5672_16<>andrei z. broder:marcus fontoura:vanja josifovski:ravi kumar:shubha u. nabar:rina panigrahy:andrew tomkins:ying xu 0002<>estimating corpus size via queries<>cikm<>rajeev motwani<>
27447<>5672_25<>gagan aggarwal:ashish goel<>truthful auctions for pricing search keywords<>sigecom<>rajeev motwani<>
27473<>5672_51<>assaf naor:rina panigrahy<>lower bounds on locality sensitive hashing<>compgeom<>rajeev motwani<>
27491<>5672_69<>utkarsh srivastava:kamesh munagala:jennifer widom<>query optimization over web services<>vldb<>rajeev motwani<>
27520<>5672_98<>gagan aggarwal:an zhu<>the load rebalancing problem<>jal<>rajeev motwani<>
27525<>5672_103<>ying xu 0002<>evolution of page popularity under random web graph models<>pods<>rajeev motwani<>
27532<>5672_110<>shubha u. nabar:bhaskara marthi:krishnaram kenthapadi:nina mishra<>towards robustness in query auditing<>vldb<>rajeev motwani<>
19052<>5673_2<>wang-chien lee:hong va leong<>nearest surrounder queries<>icde<>ken c. k. lee<>
36487<>5674_0<>chao yao:lingyu wang:sushil jajodia<>indistinguishability: the other aspect of privacy<>sdmw<>xiaoyang sean wang<>
36489<>5676_0<>hang he:lei li:runsheng chen:xing wang deng:songgang li<>nmpp: a user-customized nimblegen microarray data processing pipeline<>bioinformatics<>xiangfeng wang<>
36491<>5678_1<>hongbo yu:aaram yun:sangwoo park<>cryptanalysis of the full haval with 4 and 5 passes<>fse<>xiaoyun wang<>
19048<>5679_0<>seo-young kim:euijong whang:jae-gil lee<>a practitioner's approach to normalizing xquery expressions<>dasfaa<>ki-hoon lee<>
36492<>5680_0<>liwei wang:jufu feng<>on image matrix based feature extraction algorithms<>tsmc<>xiao wang<>
36482<>5682_2<>sriram chellappan:phillip boyer:dong xuan<>on the effectiveness of secure overlay forwarding systems under intelligent distributed dos attacks<>tpds<>xun wang<>
9914<>5683_2<>karsten ehrig:ulrike prange:gabriele taentzer<>fundamental theory for typed attributed graphs and graph transformation based on adhesive hlr categories<>fuin<>hartmut ehrig<>
36484<>5685_1<>mitch cherniack<>improving query i/o performance by permuting and refining block request sequences<>cikm<>xiaoyu wang<>
35973<>5690_9<>yin-chet tan:see-kiong ng<>systematic gene function prediction using a fuzzy nearest-cluster method on gene expression data<>imsccs<>xiaoli li<>
36002<>5691_0<>shuang-cheng wang:hai-yan tang<>hybrid data clustering based on dependency structure and gibbs sampling<>ausai<>xiao-lin li<>
36003<>5691_1<>shuang-cheng wang:hai-yan tang<>learning bayesian networks structure with continuous variables<>adma<>xiao-lin li<>
35996<>5695_0<>yunxin zhao:rong hu<>speedup convergence and reduce noise for enhanced speech separation and recognition<>taslp<>xiaolong li<>
35995<>5696_2<>jatinder n. d. gupta:james v. koch<>effect of technological breakthroughs on electronic markets<>ecr<>xiaotong li<>
35989<>5698_10<>yi ding:maria e. orlowska<>recency-based collaborative filtering<>adc<>xue li<>
35990<>5698_11<>juggapong natwichai:maria e. orlowska<>a reconstruction-based algorithm for classification rules hiding<>adc<>xue li<>
17274<>5701_19<>weifeng su:frederick h. lochovsky<>automatic hierarchical classification of structured deep web databases<>wise<>jiying wang<>
17287<>5701_32<>sen zhang:katherine g. herbert:william h. piel:david r. b. stockwell<>phylominer: a tool for evolutionary data analysis<>ssdbm<>jason t. l. wang<>
17294<>5701_39<>sen zhang<>mining frequent agreement subtrees in phylogenetic databases<>sdm<>jason tsong-li wang<>
17300<>5701_45<>weifeng su:qiong huang:frederick h. lochovsky<>query result ranking over e-commerce web databases<>cikm<>jiying wang<>
17302<>5701_47<>weifeng su:frederick h. lochovsky<>holistic query interface matching using parallel schema matching<>icde<>jiying wang<>
17324<>5706_0<>zhenyu (peter) gu:yonghong yang:robert p. dick:li shang<>taphs: thermal-aware unified physical-level and high-level synthesis<>aspdac<>jia wang<>
17326<>5706_2<>hai zhou<>optimal jumper insertion for antenna avoidance under ratio upper-bound<>dac<>jia wang<>
17330<>5706_6<>hai zhou:ping-chih wu<>processing rate optimization by sequential system floorplanning<>isqed<>jia wang<>
17315<>5707_8<>matti vanninen<>self-configuration protocols for p2p networks<>wias<>james z. wang<>
17320<>5707_13<>feng luo:eric promislow<>exploring local community structures in large networks<>webi<>james z. wang<>
17337<>5708_0<>sarma b. k. vrudhula:praveen ghanta<>hermite polynomial based interconnect analysis in the presence of process variations<>tcad<>janet meiling wang<>
37184<>5709_2<>jin li<>bgn authentication and its extension to convey message commitments<>iccsa<>yuen-yan chan<>
37186<>5709_4<>sebastian fleissner:tsz hon yuen:victor ng<>webquest markup language (wqml) for sharable inquiry-based learning<>iccsa<>yuen-yan chan<>
37187<>5715_0<>alan robinson:dennis c. dietz<>detecting a security disturbance in multi commodity stochastic networks<>telsys<>yupo chan<>
35876<>5716_1<>weizhao wang:stephan eidenbenz:yu wang<>ours: optimal unicast routing systems in non-cooperative wireless networks<>mobicom<>xiang-yang li<>
35879<>5716_4<>chih-wei yi:peng-jun wan:ophir frieder<>asymptotic distribution of the number of isolated nodes in wireless ad hoc networks with bernoulli nodes<>tcom<>xiang-yang li<>
35880<>5716_5<>yu wang:weizhao wang<>efficient distributed low-cost backbone formation for wireless networks<>tpds<>xiang-yang li<>
35884<>5716_9<>yu wang<>simple approximation algorithms and ptass for various problems in wireless ad hoc networks<>jpdc<>xiang-yang li<>
35885<>5716_10<>weizhao wang<>low-cost routing in selfish and rational wireless ad hoc networks<>tmc<>xiang-yang li<>
35886<>5716_11<>weizhao wang:ophir frieder:yu wang:wen-zhan song<>efficient interference-aware tdma link scheduling for static wireless networks<>mobicom<>xiang-yang li<>
35897<>5722_2<>padmini gopalakrishnan:lawrence t. pileggi<>architecture-aware fpga placement using metric embedding<>dac<>xin li<>
35905<>5722_10<>jiayong le:lawrence t. pileggi<>projection-based statistical analysis of full-chip leakage power with non-log-normal distributions<>dac<>xin li<>
17338<>5723_0<>shumin zhai:john f. canny<>"camera phone based motion sensing: interaction techniques, applications and performance study."<>uist<>jingtao wang<>
17341<>5723_3<>john f. canny<>tinymotion: camera phone based interaction methods<>chi<>jingtao wang<>
17342<>5723_4<>john f. canny<>end-user place annotation on mobile devices: a comparative study<>chi<>jingtao wang<>
28506<>5724_18<>arvind nayak<>automatic illumination correction for scene enhancement and object tracking<>ivc<>subhasis chaudhuri<>
28520<>5724_32<>manjunath v. joshi<>simultaneous estimation of super-resolved depth map and intensity field using photometric cue<>cviu<>subhasis chaudhuri<>
17344<>5726_1<>yiqing zhou:mamoru sawahashi<>downlink transmission of broadband ofcdm systems-part ii: effect of doppler shift<>tcom<>jiangzhou wang<>
17348<>5726_5<>wong tat tung<>narrowband interference suppression in time-hopping impulse radio ultra-wideband communications<>tcom<>jiangzhou wang<>
35938<>5730_0<>nulo<>symmetric disparity estimation in distributed coding of stereo images<>icip<>xin li<>
35941<>5730_3<>congxia dai:yunfei zheng<>subframe video synchronization via 3d phase correlation<>icip<>xin li<>
35946<>5730_8<>ayman abaza:diaa eldin m. nassar:hany h. ammar<>fast and accurate segmentation of dental x-ray records<>icb<>xin li<>
35937<>5732_0<>hui lin<>indexing network-constrained trajectories for connectivity-based queries<>gis<>xiang li<>
33255<>5734_0<>ichiro mitsuhashi:michio oyamaguchi<>the reachability and related decision problems for monadic and semi-constructor trss<>ipl<>toshiyuki yamada<>
17357<>5735_8<>douglas w. oard<>combining bidirectional translation and synonymy for cross-language information retrieval<>sigir<>jianqiang wang<>
17368<>5736_3<>xin tong:stephen lin:minghao pan:chao wang:hujun bao:baining guo:heung-yeung shum<>appearance manifolds for modeling time-variant appearance of materials<>tog<>jiaping wang<>
17369<>5742_0<>kostas n. plataniotis:juwei lu:anastasios n. venetsanopoulos<>on solving the face recognition problem with one training sample per subject<>pr<>jie wang<>
17375<>5745_0<>zhigang zeng<>multiperiodicity and exponential attractivity evoked by periodic external inputs in delayed cellular neural networks<>neco<>jun wang<>
34580<>5747_5<>panos kalnis:beng chin ooi:kian-lee tan<>answering similarity queries in peer-to-peer networks<>is<>wee siong ng<>
34573<>5749_4<>ming lu:daniel s. yeung<>applying undistorted neural network sensitivity analysis in iris plant classification and construction productivity prediction<>soco<>wing w. y. ng<>
24094<>5751_0<>a. sadam hedayat<>efficient crossover designs for comparing test treatments with a control treatment<>dm<>min yang<>
24068<>5754_3<>kuo-hua lo:rong-yu lin<>shadow removal for foreground segmentation<>psivt<>mau-tsuen yang<>
24070<>5754_5<>tarak gandhi:rangachar kasturi:octavia i. camps:lee d. coraor:jeffrey mccandless<>performance characterization of the dynamic programming obstacle detection algorithm<>tip<>mau-tsuen yang<>
24072<>5754_7<>shih-yu huang:kuo-hua lo:wen-kai tai:cheng-chin chiang<>exploiting spatial-temporal coherence in the construction of multiple perspective videos<>psivt<>mau-tsuen yang<>
24073<>5754_8<>kuo-hua lo<>shadow detection by integrating multiple features<>icpr<>mau-tsuen yang<>
24076<>5755_0<>j. ru:x. r. li:h. chen:a. bashi<>predicting internet end-to-end delay: a multiple-model approach<>infocom<>m. yang<>
24063<>5758_4<>zongming fei<>a segmentation-based fine-grained peer sharing technique for delivering large media files in content distribution networks<>tmm<>mengkun yang<>
10382<>5766_6<>nulo<>structurally unambiguous finite automata<>wia<>hing leung<>
20807<>5772_0<>s. subramanian:shahram latifi:pradip k. srimani<>distance distribution of nodes in star graphs<>appml<>l. wang<>
26935<>5778_1<>anindita mukherjee:kolin paul<>defect-aware design paradigm for reconfigurable architectures<>isvlsi<>rahul jain<>
20797<>5780_0<>qiang sun:gerald dejong<>explanation-based learning for image understanding<>aaai<>li-lun wang<>
24041<>5785_0<>tim ellis<>augmented tracking with incomplete observation and probabilistic reasoning<>ivc<>ming xu<>
20803<>5786_0<>ming wen:chong wang 0002:wenyuan wang<>robust visual tracking via incremental maximum margin criterion<>isnn<>lu wang<>
24053<>5787_4<>mark d. hill:rastislav bodik<>a regulated transitive reduction (rtr) for longer memory race recording<>asplos<>min xu<>
10358<>5790_1<>kai-tai tang<>reconstructing the correct writing sequence from a set of chinese character strokes<>iccpol<>howard leung<>
10359<>5790_2<>jian guo:xian pu:yuanlie lin<>protein subcellular localization based on psi-blast and machine learning<>jbcb<>howard leung<>
10360<>5790_3<>sam tak-sum wong:horace ho-shing ip<>brush writing style classification from individual chinese characters<>icpr<>howard leung<>
10364<>5790_7<>sam tak-sum wong:horace ho-shing ip<>fitting ellipses to a region with application in calligraphic stroke reconstruction<>icip<>howard leung<>
10365<>5790_8<>taku komura:beta lam:rynson w. h. lau<>e-learning martial arts<>icwl<>howard leung<>
10366<>5790_9<>kai-tai tang:ka-ki li<>a web-based chinese handwriting education system with automatic feedback and analysis<>icwl<>howard leung<>
2605<>5794_4<>jill freyne<>further experiments in case-based collaborative web search<>ewcbr<>barry smyth<>
2611<>5794_10<>oisin boydell<>community-based snippet-indexes for pseudo-anonymous personalization in web search<>sigir<>barry smyth<>
2613<>5794_12<>evelyn balfe<>anonymous personalization in collaborative web search<>ir<>barry smyth<>
2628<>5794_27<>oisin boydell<>title and snippet based result re-ranking in collaborative web search<>ecir<>barry smyth<>
2634<>5794_33<>oisin boydell<>capturing community search expertise for personalized web search using snippet-indexes<>cikm<>barry smyth<>
2637<>5794_36<>lucy e. dunne:sarah brady:richard tynan:kim lau:dermot diamond:gregory m. p. o'hare<>garment-based body sensing using foam sensors<>auic<>barry smyth<>
2649<>5794_48<>jill freyne<>cooperating search communities<>ah<>barry smyth<>
2666<>5794_65<>martin halvey:mark t. keane<>time based patterns in mobile-internet surfing<>chi<>barry smyth<>
2691<>5794_90<>martin halvey:mark t. keane<>mobile web surfing is the same as web surfing<>cacm<>barry smyth<>
2702<>5794_101<>martin halvey:mark t. keane<>temporal rules for predicting user navigation in the mobile web<>ah<>barry smyth<>
20785<>5795_1<>susan j. brown<>prediction of dna-binding residues from sequence features<>jbcb<>liangjiang wang<>
20786<>5795_2<>susan j. brown<>bindn: a web-based tool for efficient prediction of dna and rna binding sites in amino acid sequences<>nar<>liangjiang wang<>
20790<>5797_1<>xiao wang:jufu feng<>on image matrix based feature extraction algorithms<>tsmc<>liwei wang<>
20792<>5798_0<>padmanabhan krishnan<>an approach to provisioning e-commerce applications with commercial components<>icebe<>lei wang<>
20793<>5798_1<>padmanabhan krishnan<>a framework for checking behavioral compatibility for component selection<>aswec<>lei wang<>
20776<>5804_0<>kang li<>a polynomial time approximation scheme for embedding a directed hypergraph on a ring<>ipl<>lusheng wang<>
4001<>5806_2<>shujun li:der-chyuan lou:dan zhang<>on the security of the yen-guo's domino signal encryption algorithm (dsea)<>jss<>chengqing li<>
36461<>5807_0<>dmitri loguinov<>wealth-based evolution model for the internet as-level topology<>infocom<>xiaoming wang<>
4007<>5810_0<>shunichi suzuki:qi-wei ge:mitsuru nakata:hiroshi matsuno:satoru miyano<>structural modeling and analysis of signaling pathways based on petri nets<>jbcb<>chen li<>
36473<>5814_0<>lars hedrich<>an approach to topology synthesis of analog circuits using hierarchical blocks and symbolic analysis<>aspdac<>xiaoying wang<>
36467<>5816_0<>m. iqbal<>bluetooth: opening a blue sky for healthcare<>mis<>x. h. wang<>
36479<>5817_0<>xueli yu<>a owl-based semantic web service discovery framework<>aict<>xinqi wang<>
36042<>5822_0<>le chen:lei zhang:fuzong lin:wei-ying ma<>image annotation by large-scale content-based image retrieval<>mm<>xirong li<>
36043<>5824_0<>lang li:alfred s. l. cheng:victor x. jin:henry h. paik:meiyun fan:wei zhang:jason robarge:curtis balch:ramana v. davuluri:sun kim:tim hui-ming huang:kenneth p. nephew<>a mixture model-based discriminate analysis for identifying ordered transcription factor binding site pairs in gene promoters directly regulated by estrogen receptor-alpha<>bioinformatics<>xiaoman li<>
36046<>5830_0<>tamer kahveci<>a novel algorithm for identifying low-complexity regions in a protein sequence<>bioinformatics<>xuehui li<>
40892<>5833_1<>yan gao:yan chen<>a dos resilient flow-level intrusion detection approach for high-speed networks<>icdcs<>zhichun li<>
40893<>5833_2<>pin ren:yan gao:yan chen:benjamin watson<>idgraphs: intrusion detection and analysis using stream compositing<>cga<>zhichun li<>
40894<>5833_3<>robert t. schweller:yan chen:yan gao:ashish gupta:yin zhang:peter a. dinda:ming-yang kao:gokhan memik<>"reverse hashing for high-speed network monitoring: algorithms, evaluation, and applications."<>infocom<>zhichun li<>
40901<>5835_0<>jannik fritsch:sven wachsmuth:gerhard sagerer<>an object-oriented approach using a top-down and bottom-up process for manipulative action recognition<>dagm<>zhe li<>
21175<>5840_2<>chin-yew lin:dragos stefan munteanu:eduard h. hovy<>paraeval: using paraphrases to evaluate summaries automatically<>naacl<>liang zhou<>
21160<>5842_0<>ying tao:james j. cimino:elizabeth s. chen:hongfang liu:yves a. lussier:george hripcsak:carol friedman<>terminology model discovery using natural language processing and visualization techniques<>jbi<>li zhou<>
21161<>5842_1<>genevieve b. melton:simon parsons:george hripcsak<>a temporal constraint structure for extracting temporal information from clinical narrative<>jbi<>li zhou<>
21146<>5844_4<>wei-yu kevin chiang:dongsong zhang<>predicting and explaining patronage behavior toward web and traditional stores using neural networks: a comparative analysis with logistic regression<>dss<>lina zhou<>
40889<>5846_0<>douglas herbert:yung-hsiang lu:saurabh bagchi<>detection and repair of software errors in hierarchical sensor networks<>sutc<>zhiyuan li<>
40884<>5848_4<>baochun li:lap chi lau<>on achieving maximum multicast throughput in undirected networks<>tit<>zongpeng li<>
40886<>5848_6<>liqi shi:phillipa sessini:anirban mahanti:derek l. eager<>scalable streaming for heterogeneous clients<>mm<>zongpeng li<>
6201<>5852_0<>in-kwon lee:dani lischinski:ayellet tal<>guest editorial<>vc<>deok-soo kim<>
6211<>5855_2<>nulo<>selective maximum-likelihood symbol-by-symbol detection for multidimensional multicode wcdma with precoding<>tcom<>dong in kim<>
36038<>5856_0<>bo zhang:hui li<>computing efficient solutions to fuzzy multiple objective linear programming problems<>fss<>xue-quan li<>
6214<>5857_1<>jong sou park:sung-hwan kim<>a hardware implementation of lightweight block cipher for ubiquitous computing security<>kes<>dong seong kim<>
36033<>5858_0<>jiexun li:hua su:hsinchun chen:david w. galbraith<>a framework of integrating gene relations from heterogeneous data sources: an experiment on<>bioinformatics<>xin li<>
36032<>5864_0<>liang chen:shaozhi ye<>template detection for large scale search engines<>sac<>xing li<>
36029<>5865_0<>qian wang<>heuristics for permutation flow shops to minimize total flowtime<>cscwd<>xiaoping li<>
40387<>5867_8<>eric j. balster:robert l. ewing<>combined spatial and temporal domain wavelet shrinkage algorithm for video denoising<>tcsv<>yuan f. zheng<>
40443<>5869_0<>ali raza butt:troy a. johnson:y. charlie hu<>kosha: a peer-to-peer enhancement for the network file system<>grid<>yili zheng<>
40445<>5869_2<>christopher barton:calin cascaval:george almasi:montse farreras:siddhartha chatterjee:jose nelson amaral<>shared memory programming for large scale machines<>pldi<>yili zheng<>
40426<>5871_38<>xian-mo zhang:josef pieprzyk<>on algebraic immunity and annihilators<>icisc<>yuliang zheng<>
40452<>5873_0<>steven bird:yi chen:susan b. davidson:haejoong lee<>designing and evaluating an xpath dialect for linguistic queries<>icde<>yifeng zheng<>
40454<>5873_2<>yi chen:susan b. davidson<>an efficient xpath query processor for xml streams<>icde<>yifeng zheng<>
40456<>5873_4<>stephen fisher:shirley cohen:sheng guo:junhyong kim:susan b. davidson<>crimson: a data management system to support evaluating phylogenetic tree reconstruction algorithms<>vldb<>yifeng zheng<>
7804<>5877_1<>naga srinivas vemuri:ricardo da silva torres:rao shen:marcos andrc goncalves:weiguo fan<>a content-based image retrieval service for archaeology collections<>ercimdl<>edward a. fox<>
7819<>5877_16<>rao shen:naga srinivas vemuri:weiguo fan<>what is a successful digital library?<>ercimdl<>edward a. fox<>
7825<>5877_22<>ricardo da silva torres:claudia bauzer medeiros:marcos andrc goncalves<>a digital library framework for biodiversity information systems<>jodl<>edward a. fox<>
7832<>5877_29<>seungwon yang:barbara m. wildemuth:jeffrey pomerantz:sanghee oh<>interdisciplinary curriculum development for digital library education<>icadl<>edward a. fox<>
7857<>5877_54<>byron marshall:hsinchun chen:rao shen<>moving digital libraries into the student learning space: the getsmart experience<>jeric<>edward a. fox<>
7859<>5877_56<>jeffrey pomerantz:barbara m. wildemuth:seungwon yang<>curriculum development for digital libraries<>jcdl<>edward a. fox<>
19361<>5882_3<>robert w. irving:telikepalli kavitha:dimitrios michail:katarzyna e. paluch<>rank-maximal matchings<>talg<>kurt mehlhorn<>
19363<>5882_5<>holger bast:guido schafer:hisao tamaki<>matching algorithms are fast in sparse random graphs<>mst<>kurt mehlhorn<>
12118<>5884_0<>woo-chan park:duk-ki yoon:kil-whan lee:kyung-su kim:won-jong lee:tack-don han:sung-bong yang<>a processor architecture with effective memory system for sort-last parallel rendering<>arcs<>il-san kim<>
12115<>5888_0<>heon young yeom<>mixing heterogeneous address spaces in a single edge network<>apnoms<>ilhwan kim<>
35563<>5889_8<>s. chen:c. j. harris<>fast kernel classifier construction using orthogonal forward selection to minimise leave-one-out misclassification rate<>icic<>x. hong<>
35569<>5890_1<>xiaoxin wu:jun liu:elisa bertino<>achieving anonymity in mobile ad hoc networks using fuzzy position information<>msn<>xiaoyan hong<>
35573<>5890_5<>lei tang:phillip g. bradford<>secure relative location determination in vehicular network<>msn<>xiaoyan hong<>
35574<>5890_6<>qunwei zheng:sibabrata ray<>resource allocation for restoration of compromised systems<>jco<>xiaoyan hong<>
20757<>5892_0<>chao yao:anoop singhal:sushil jajodia<>interactive analysis of attack graphs using relational queries<>dbsec<>lingyu wang<>
20764<>5892_7<>chao yao:xiaoyang sean wang:sushil jajodia<>indistinguishability: the other aspect of privacy<>sdmw<>lingyu wang<>
20765<>5892_8<>steven noel:sushil jajodia<>minimum-cost network hardening using attack graphs<>comcom<>lingyu wang<>
20752<>5893_0<>mingwei gong:minglun gong:ruigang yang<>how far can we go with local optimization in real-time stereo matching<>3dpvt<>liang wang<>
20753<>5893_1<>miao liao:minglun gong:ruigang yang:david nister<>high-quality real-time stereo using adaptive cost aggregation and dynamic programming<>3dpvt<>liang wang<>
20754<>5893_2<>qingxiong yang:ruigang yang:henrik stewenius:david nister<>"stereo matching with color-weighted correlation, hierarchical belief propagation and occlusion handling."<>cvpr<>liang wang<>
20756<>5893_4<>a. akbarzadeh:jan-michael frahm:philippos mordohai:brian clipp:c. engels:david gallup:paul merrell:m. phelps:s. sinha:b. talton:qingxiong yang:henrik stewenius:ruigang yang:greg welch:herman towles:david nister:marc pollefeys<>towards urban 3d reconstruction from video<>3dpvt<>liang wang<>
4784<>5894_15<>hwansoo han<>exploiting locality for irregular scientific codes<>tpds<>chau-wen tseng<>
31671<>5896_0<>z. jane wang<>systematic derivation of jump conditions for the immersed interface method in three-dimensional flow simulation<>siamsc<>sheng xu<>
20045<>5898_0<>m. l. tang:k. m. lee<>multiple testing procedures for analyzing stratified comparative clinical trials using odds ratios<>csda<>k. h. wu<>
31668<>5904_0<>yingqing xu:sing bing kang:david salesin:yunhe pan:heung-yeung shum<>animating chinese paintings through stroke-based decomposition<>tog<>songhua xu<>
28178<>5905_0<>luc segoufin:victor vianu<>representing and querying xml with incomplete information<>tods<>serge abiteboul<>
28155<>5907_4<>karl schnaitter:tova milo:neoklis polyzotis<>colt: continuous on-line tuning<>sigmod<>serge abiteboul<>
28157<>5907_6<>stephen alstrup:haim kaplan:tova milo:theis rauhe<>compact labeling scheme for ancestor queries<>siamcomp<>serge abiteboul<>
28158<>5907_7<>ioana manolescu:emanuel taropa<>a framework for distributed xml data management<>edbt<>serge abiteboul<>
28163<>5907_12<>bogdan cautis:tova milo<>reasoning about xml update constraints<>bda<>serge abiteboul<>
28164<>5907_13<>nulo<>turning the network into a database with active xml<>ecoop<>serge abiteboul<>
28169<>5907_18<>pierre senellart<>querying and updating probabilistic information in xml<>edbt<>serge abiteboul<>
28171<>5907_20<>bogdan cautis:amos fiat:tova milo<>digital signatures for modifiable collections<>IEEEares<>serge abiteboul<>
28175<>5907_24<>neoklis polyzotis<>data ring: let us turn the net into a database!<>adbis<>serge abiteboul<>
32938<>5913_9<>andrew gilpin<>a texas hold'em poker player based on automated abstraction and real-time equilibrium computation<>atal<>tuomas sandholm<>
32952<>5913_23<>vincent conitzer<>nonexistence of voting rules that are usually hard to manipulate<>aaai<>tuomas sandholm<>
32957<>5913_28<>vincent conitzer<>failures of the vcg mechanism in combinatorial auctions and exchanges<>atal<>tuomas sandholm<>
32967<>5913_38<>andrew gilpin<>finding equilibria in large sequential games of imperfect information<>sigecom<>tuomas sandholm<>
32969<>5913_40<>andrew gilpin<>information-theoretic approaches to branching in search<>atal<>tuomas sandholm<>
32971<>5913_42<>vincent conitzer<>complexity of constructing solutions in the core based on synergies among coalitions<>ai<>tuomas sandholm<>
32978<>5913_49<>naoki ohta:atsushi iwasaki:makoto yokoo:kohki maruono:vincent conitzer<>a compact representation scheme for coalitional games in open anonymous environments<>aaai<>tuomas sandholm<>
32984<>5913_55<>nulo<>expressive commerce and its application to sourcing<>aaai<>tuomas sandholm<>
32997<>5913_68<>avrim blum:martin zinkevich<>online algorithms for market clearing<>jacm<>tuomas sandholm<>
33005<>5913_76<>vincent conitzer<>computing the optimal strategy to commit to<>sigecom<>tuomas sandholm<>
20036<>5916_1<>ekow j. otoo:arie shoshani<>optimizing bitmap indices with efficient compression<>tods<>kesheng wu<>
19977<>5918_0<>tongquan wei:piyush mishra:han liang<>online task-scheduling for fault-tolerant low-energy real-time systems<>iccad<>kaijie wu<>
19981<>5918_4<>nikhil joshi:jayachandran sundararajan:ramesh karri<>concurrent error detection for involutional functions with applications in fault-tolerant cryptographic hardware design<>tcad<>kaijie wu<>
19989<>5918_12<>bo yang:ramesh karri<>secure scan: a design-for-test architecture for crypto chips<>tcad<>kaijie wu<>
19995<>5918_18<>nikhil joshi:jayachandran sundararajan:bo yang:ramesh karri<>tamper proofing by design using generalized involution-based concurrent error detection for involutional substitution permutation and feistel networks<>tc<>kaijie wu<>
17409<>5919_0<>peg howland:haesun park<>solving the small sample size problem in face recognition using generalized discriminant analysis<>pr<>jianlin wang<>
17412<>5923_1<>carl tropper<>compiled code in distributed logic simulation<>wsc<>jun wang<>
20884<>5926_0<>joseph m. kizza:raimund k. ege<>a flexible context-aware authorization framework for mediation systems<>isi<>li yang<>
20890<>5930_2<>naphtali rishe<>formal representation and transformation of dtds to sem-odm semantic schemas<>fcs<>li yang<>
17394<>5937_0<>zhiwei li:jinyi yao:zengqi sun:mingjing li:wei-ying ma<>adaptive user profile model and collaborative filtering for personalized news<>apweb<>jue wang<>
17395<>5937_1<>jinyi yao:zhiwei li:mingjing li:wei-ying ma<>ranking web news via homepage visual layout and cross-site voting<>ecir<>jue wang<>
17428<>5953_0<>jian pei:haixun wang:jian liu:ke wang:philip s. yu<>discovering frequent closed partial orders from strings<>tkde<>jianyong wang<>
17431<>5956_0<>yu sheng:feng tian:bing wei:yongjin zhu<>path extendability of claw-free graphs<>dm<>jianglu wang<>
21309<>5963_0<>chuan-min lee<>distance-hereditary graphs are clique-perfect<>dam<>maw-shang chang<>
21314<>5963_5<>ruo-wei hung<>solving the path cover problem on circular-arc graphs by using an approximation algorithm<>dam<>maw-shang chang<>
21306<>5965_0<>ying kin yu:kin-hong wong<>merging artificial objects with marker-less video sequences based on the interacting multiple model method<>tmm<>michael ming-yuen chang<>
4498<>5970_6<>pascal vallotton<>fast linear feature detection using multiple directional non-maximum suppression<>icpr<>changming sun<>
4477<>5972_12<>steven xia:david sun:david chen:haifeng shen:wentong cai<>transparent adaptation of single-user applications for multi-user real-time collaboration<>tochi<>chengzheng sun<>
19667<>5985_5<>cuihong li:joseph a. giampapa<>bilateral negotiation decisions with uncertain dynamic outside options<>tsmc<>katia p. sycara<>
19689<>5985_27<>bin yu:paul scerri:yang xu:michael lewis<>scalable and reliable data delivery in mobile ad hoc sensor networks<>atal<>katia sycara<>
19715<>5986_1<>young-woo seo<>cost-sensitive access control for illegitimate confidential access by insiders<>isi<>katia p. sycara<>
19716<>5986_2<>mary koes:illah r. nourbakhsh<>a constraint optimization framework for fractured robot teams<>atal<>katia sycara<>
19717<>5986_3<>gita sukthankar<>simultaneous team assignment and behavior recognition from spatio-temporal agent traces<>aaai<>katia sycara<>
378<>5998_0<>martin j. o'connor:ravi shankar<>an ontology-driven mediator for querying time-oriented biomedical data<>cbms<>amar k. das<>
379<>5998_1<>ravi d. shankar:susana b. martins:martin j. o'connor:david b. parrish<>towards semantic interoperability in a clinical trials management system<>semweb<>amar k. das<>
373<>5999_1<>yiyu chen:anand sivasubramaniam:qian wang:r. harper:m. bland<>consolidating clients on back-end servers with co-location and frequency control<>sigmetrics<>amitayu das<>
22270<>6004_0<>hyo-sang lim:jae-gil lee:kyu-young whang:il-yeol song<>continuous query processing in data streams using duality of data and queries<>sigmod<>min-jae lee<>
34871<>6007_0<>beichuan zhang:sugih jamin:daniel massey:lixia zhang<>universal ip multicast delivery<>cn<>wenjie wang<>
22189<>6013_4<>chang sheng:wynne hsu<>mining dense periodic patterns in time series data<>icde<>mong-li lee<>
22192<>6013_7<>xinyu guo:wynne hsu:tien yin wong<>a tree matching approach for the temporal registration of retinal images<>ictai<>mong-li lee<>
22198<>6013_13<>ling li:wynne hsu<>rewriting queries for xml integration systems<>dexa<>mong-li lee<>
22199<>6013_14<>liang huai yang:wynne hsu:limsoon wong<>identification of microrna precursors via svm<>apbc<>mong-li lee<>
22218<>6013_33<>hanyu li:wynne hsu:gao cong<>an estimation system for xpath expressions<>icde<>mong-li lee<>
22222<>6013_37<>chenyi xia:wynne hsu:beng chin ooi<>border: efficient computation of boundary points<>tkde<>mong-li lee<>
22224<>6013_39<>junmei wang:wynne hsu:chang sheng<>a partition-based approach to graph mining<>icde<>mong-li lee<>
22229<>6013_44<>jin chen:wynne hsu:see-kiong ng<>increasing confidence of protein interactomes using network topological metrics<>bioinformatics<>mong-li lee<>
22233<>6013_48<>minghua zhang:wynne hsu<>mining progressive confident rules<>kdd<>mong-li lee<>
22238<>6013_53<>yun zheng:wynne hsu:limsoon wong<>exploring essential attributes for detecting microrna precursors from background sequences<>vdmb<>mong-li lee<>
22251<>6013_66<>wee hyong tok:stephane bressan<>progressive spatial join<>ssdbm<>mong-li lee<>
21902<>6019_0<>kobus barnard:keiji yanai:prasad gabbur<>cross modal disambiguation<>clor<>matthew johnson<>
24838<>6022_30<>yehuda lindell<>session-key generation using human passwords only<>joc<>oded goldreich<>
24864<>6022_56<>nulo<>on promise problems: a survey<>birthday<>oded goldreich<>
24900<>6022_92<>madhu sudan<>locally testable codes and pcps of almost-linear length<>jacm<>oded goldreich<>
24922<>6022_114<>dana ron<>approximating average parameters of graphs<>approx<>oded goldreich<>
24926<>6022_118<>eli ben-sasson:prahladh harsha:madhu sudan:salil p. vadhan<>"robust pcps of proximity, shorter pcps, and applications to coding."<>siamcomp<>oded goldreich<>
24927<>6022_119<>adi akavia:shafi goldwasser:dana moshkovitz<>on basing one-way functions on np-hardness<>stoc<>oded goldreich<>
15557<>6025_17<>kunal verma:prashant doshi:karthik gomadam:amit p. sheth<>optimal adaptation in web processes with coordination constraints<>icws<>john a. miller<>
15581<>6028_0<>suman nath:jie liu:feng zhao:andre santanche<>sensormap: a web site for sensors world-wide<>sensys<>jessica miller<>
15537<>6031_2<>rodney g. downey:carl g. jockusch jr.<>on self-embeddings of computable linear orderings<>apal<>joseph s. miller<>
34861<>6033_0<>xiaohong guan:xiangliang zhang:liwei yang<>profiling program behavior for anomaly intrusion detection based on the transition and frequency property of computer audit data<>compsec<>wei wang<>
34862<>6033_1<>roberto battiti<>identifying intrusions in computer networks with principal component analysis<>IEEEares<>wei wang<>
34867<>6034_0<>carlos a. varela<>distributed garbage collection for mobile actor systems: the pseudo root approach<>gpc<>wei-jen wang<>
34859<>6037_1<>dai pan:mei-hwa chen<>architecture-based software reliability modeling<>jss<>wen-li wang<>
34856<>6038_0<>andreas stolcke:barry chen:horacio franco:venkata ramana rao gadde:martin graciarena:mei-yuh hwang:katrin kirchhoff:arindam mandal:nelson morgan:xin lei:t. ng:mari ostendorf:k. sonmez:anand venkataraman:dimitra vergyri:jing zheng:qifeng zhu<>recent innovations in speech-to-text transcription at sri-icsi-uw<>taslp<>wen wang<>
28220<>6042_8<>arunesh mishra:vladimir brik:aravind srinivasan:william a. arbaugh<>a client-driven approach for channel management in wireless lans<>infocom<>suman banerjee<>
28224<>6042_12<>arunesh mishra:vivek shrivastava:william a. arbaugh<>partially overlapped channels not considered harmful<>sigmetrics<>suman banerjee<>
28226<>6042_14<>christopher kommareddy:koushik kar:bobby bhattacharjee:samir khuller<>omni: an efficient overlay multicast infrastructure for real-time applications<>cn<>suman banerjee<>
28229<>6042_17<>samrat ganguly:sudeept bhatnagar:akhilesh saxena:rauf izmailov<>a fast content-based data distribution infrastructure<>infocom<>suman banerjee<>
28230<>6042_18<>rajiv chakravorty:samrat ganguly<>mobistream: error-resilient video streaming in wireless wans using virtual channels<>infocom<>suman banerjee<>
28241<>6042_29<>qunfeng dong:jia wang:dheeraj agrawal:ashutosh shukla<>packet classifiers in ternary cams can be smaller<>sigmetrics<>suman banerjee<>
28245<>6042_33<>arunesh mishra:vivek shrivastava:dheeraj agrawal:samrat ganguly<>distributed channel management in uncoordinated wireless environments<>mobicom<>suman banerjee<>
28247<>6042_35<>qunfeng dong:benyuan liu<>throughput optimization and fair bandwidth allocation in multi-hop wireless lans<>infocom<>suman banerjee<>
28279<>6043_2<>alexander i. rudnicky<>smartnotes: implicit labeling of meeting data through user note-taking and browsing<>naacl<>satanjeev banerjee<>
28256<>6044_6<>puneet sharma:zhichen xu:sung-ju lee<>estimating network proximity and latency<>ccr<>sujata banerjee<>
28271<>6044_21<>r. fonseca:p. sharma:s.-j. lee:s. basu<>distributed querying of internet distance information<>infocom<>s. banerjee<>
34844<>6050_1<>jean-jacques e. slotine<>fast computation with neural oscillators<>ijon<>wei wang<>
34842<>6051_1<>shanzhong zhu:chinya v. ravishankar<>stochastically consistent caching and dynamic duty cycling for erratic sensor sources<>dcoss<>wei wang<>
35741<>6052_0<>chen yu:susumu horiguchi:minyi guo<>overall blocking behavior analysis of general banyan-based optical switching networks<>tpds<>xiaohong jiang<>
30151<>6053_3<>fusheng wang:peiya liu:yijian bai<>bridging physical and virtual worlds: complex event processing for rfid data streams<>edbt<>shaorong liu<>
30154<>6053_6<>fusheng wang:peiya liu<>integrated rfid data modeling: an approach for querying physical objects in pervasive computing<>cikm<>shaorong liu<>
30147<>6056_6<>barrett r. bryant:jeffrey g. gray:rajeev r. raje:mihran tuceryan:andrew m. olson:mikhail auguston<>qospl: a qos-driven software product line engineering framework for distributed real-time and embedded systems<>seke<>shih-hsi liu<>
34838<>6057_3<>lu wang:ming wen:chong wang 0002<>robust visual tracking via incremental maximum margin criterion<>isnn<>wenyuan wang<>
34828<>6059_0<>bharat k. bhargava:yi lu:xiaoxin wu<>defending against wormhole attacks in mobile ad hoc networks<>wicomm<>weichao wang<>
34829<>6059_1<>aidong lu<>visualization assisted detection of sybil attacks in wireless networks<>vizsec<>weichao wang<>
34831<>6059_3<>yi lu:b. bhargava:dongyan xu<>trust-based privacy preservation for peer-to-peer data sharing<>tsmc<>weichao wang<>
30159<>6066_3<>yingxue wang<>programmable synaptic weights for an avlsi network of spiking neurons<>iscas<>shih-chii liu<>
30169<>6066_13<>matthias oster<>feature competition in a spike-based winner-take-all vlsi network<>iscas<>shih-chii liu<>
30175<>6066_19<>v. chan:andre van schaik<>spike response properties of an aer ear<>iscas<>shih-chii liu<>
34847<>6075_2<>karthikeyan sundaresan:stephan eidenbenz<>algorithmic aspects of communication in ad-hoc networks with smart antennas<>mobihoc<>weizhao wang<>
783<>6077_6<>samuel kemp<>heuristic confidence intervals for the gamma test<>icai<>antonia jones<>
791<>6080_0<>raymond hoare:dara kusic:gayatri mehta:joshua fazekas:john foster<>reducing power while increasing performance with supercisc<>tecs<>alex k. jones<>
793<>6084_1<>lucas zamboulis:hao fan:khalid belhajjame:jennifer a. siepen:nigel j. martin:alexandra poulovassilis:simon j. hubbard:suzanne m. embury:norman w. paton<>data access and integration in the ispider proteomics grid<>dils<>andrew jones<>
3392<>6088_0<>ariel fuxman:mauricio a. hernandez:renee j. miller:paolo papotti:lucian popa<>nested mappings: schema mapping reloaded<>vldb<>c. t. howard ho<>
3395<>6089_0<>federico barbagli:kenneth salisbury:charles spence:hong z. tan<>haptic discrimination of force direction and the influence of visual information<>tap<>cristy ho<>
6767<>6091_8<>nulo<>composition by colimit and formal software development<>birthday<>douglas r. smith<>
3375<>6093_10<>sun-yuan hsieh:tsan-sheng hsu:ming-tat ko<>the hamiltonian problem on distance-hereditary graphs<>dam<>chin-wen ho<>
25984<>6094_2<>haodong wang<>distributed user access control in sensor networks<>dcoss<>qun li<>
25986<>6094_4<>chiu c. tan<>a robust and secure rfid-based pedigree system (short paper)<>icics<>qun li<>
25987<>6094_5<>haodong wang<>efficient implementation of public key cryptosystems on mote sensors (short paper)<>icics<>qun li<>
25988<>6094_6<>daniela rus<>global clock synchronization in sensor networks<>tc<>qun li<>
25997<>6094_15<>bo sheng:weizhen mao<>data storage placement in sensor networks<>mobihoc<>qun li<>
25998<>6095_0<>weixin shang:liming liu<>tail asymptotics for the queue length in an m/g/1 retrial queue<>questa<>quan-lin li<>
25975<>6098_13<>jieping ye:chandra kambhamettu<>spatial interest pixels (sips): useful low-level features of visual media data<>mta<>qi li<>
6799<>6101_0<>monica m. c. schraefel:max wilson:alistair russell<>mspace: improving information access to multimedia domains with multimodal exploratory search<>cacm<>daniel a. smith<>
6794<>6104_0<>max wilson:alistair russell:m. c. schraefel<>mspace mobile: a ui gestalt to support on-the-go info-interaction<>chi<>daniel a. smith<>
6788<>6106_3<>jason eisner<>minimum risk annealing for training log-linear models<>acl<>david a. smith<>
29104<>6111_6<>eduardo b. fernandez:michael vanhilst:maria m. larrondo-petrie<>defining security requirements through misuse actions<>ifip<>shihong huang<>
29105<>6111_7<>scott r. tilley:kenny wong:spencer smith<>report from the 2nd international workshop on software engineering course projects (swecp 2005)<>csee<>shihong huang<>
38529<>6114_4<>tian bu:donald f. towsley<>on the tcp-friendliness of voip traffic<>infocom<>yong liu<>
38538<>6116_3<>hongbin zhu:xuehui liu:enhua wu<>simulation of miscible binary mixtures based on lattice boltzmann method<>jvca<>youquan liu<>
38541<>6117_2<>hong luo:sajal k. das<>routing correlated data with fusion cost in wireless sensor networks<>tmc<>yonghe liu<>
38544<>6117_5<>hong luo:jun luo:sajal k. das<>adaptive data fusion for energy efficient routing in wireless sensor networks<>tc<>yonghe liu<>
29120<>6118_0<>chen-hsing wang:chih-yen lo:min-sheng lee:jen-chieh yeh:chih-tsun huang:cheng-wen wu<>a network security processor design based on an integrated soc design and test platform<>dac<>shi-yu huang<>
38547<>6120_0<>robert feyen:omer tsimhoni<>queueing network-model human processor (qn-mhp): a computational architecture for multitask performance in human-machine systems<>tochi<>yili liu<>
38548<>6120_1<>michael bauerly<>computational modeling and experimental investigation of effects of compositional elements on interface and design aesthetics<>ijmms<>yili liu<>
29112<>6123_0<>li-cheng wu:jorng-tzong horng:hsien-da huang:baw-jhiune liu<>detection of discriminative sequence motifs in proteins obtained from prokaryotes grown at various temperatures<>jcc<>shir-ly huang<>
38553<>6125_0<>hong zhou<>flag guided integration of multiple registered range images<>icpr<>yonghuai liu<>
38554<>6125_1<>guoqiang fei:baogang wei:longzhuang li<>discontinuity-based simplification of free form surface from a range image<>icpr<>yonghuai liu<>
38555<>6125_2<>hong zhou:xuan su:mingxin ni:robert j. lloyd<>transforming least squares to weighted least squares for accurate range image registration<>3dpvt<>yonghuai liu<>
38557<>6125_4<>nulo<>automatic registration of overlapping 3d point clouds using closest points<>ivc<>yonghuai liu<>
38561<>6125_8<>baogang wei:longzhuang li:hong zhou<>projecting registration error for accurate registration of overlapping range images<>ras<>yonghuai liu<>
29119<>6126_0<>nulo<>adaptive computation-aware scheme for software-based predictive block motion estimation<>jvcir<>shih-yu huang<>
3015<>6135_0<>wesley e. snyder:cliff wang<>robust localization of multiple events in sensor networks<>sutc<>chih-chieh geoff chang<>
21808<>6137_1<>ozcan ozturk:mahmut t. kandemir:suleyman tosun<>multi-level on-chip memory hierarchy design for embedded chip multiprocessors<>icpads<>mary jane irwin<>
15157<>6138_0<>eno thereska:brandon salmon:john d. strunk:matthew wachs:michael abd-el-malek:gregory r. ganger<>stardust: tracking activity in a distributed storage system<>sigmetrics<>julio lopez<>
15115<>6140_1<>vicente benjumea:josi maria troya linero<>specification of a framework for the anonymous use of privileges<>tele<>javier lopez<>
15119<>6140_5<>rodrigo roman:jianying zhou<>an anti-spam scheme using pre-challenges<>comcom<>javier lopez<>
15122<>6140_8<>nulo<>unleashing public-key cryptography in wireless sensor networks<>jcs<>javier lopez<>
15124<>6140_10<>jianying zhou:jose antonio onieva<>a synchronous multi-party contract signing protocol improving lower bound of steps<>sec<>javier lopez<>
15136<>6140_22<>antonio mana:antonio munoz<>a secure and auto-configurable environment for mobile agents in ubiquitous computing scenarios<>uic<>javier lopez<>
15151<>6140_37<>jose a. montenegro:rodrigo roman<>service-oriented security architecture for cii based on sensor networks<>secperu<>javier lopez<>
15152<>6140_38<>isaac agudo:jose a. montenegro<>graphical representation of authorization policies for weighted credentials<>acisp<>javier lopez<>
6428<>6146_6<>tsan-ming (jason) choi:houmin yan<>quick response policy with bayesian information updates<>eor<>duan li<>
31427<>6147_0<>xin li:zhi-hong deng<>a fast algorithm for maintenance of association rules in incremental databases<>adma<>shiwei tang<>
31430<>6147_3<>lingbo kong:dongqing yang:tengjiao wang:jun gao<>"no tag, a little nesting, and great xml keyword search."<>airs<>shiwei tang<>
31432<>6147_5<>dehui zhang:shaohua tan:dongqing yang:lizheng jiang<>adapting olap analysis to the user's interest through virtual cubes<>fskd<>shiwei tang<>
31435<>6147_8<>yuhong guo:yunhai tong:dongqing yang<>triple-driven data modeling methodology in data warehousing: a case study<>dolap<>shiwei tang<>
31439<>6147_12<>aiqiang gao:dongqing yang:ming zhang<>mining models of composite web services for performance analysis<>dasfaa<>shiwei tang<>
31440<>6147_13<>dehui zhang:shaohua tan:dongqing yang:xiuli ma:lizheng jiang<>dynamic construction of user defined virtual cubes<>ngits<>shiwei tang<>
31443<>6147_16<>lv-an tang:hongyan li:baojun qiu:meimei li:jianjun wang:lei wang:bin zhou:dongqing yang<>wise: a prototype for ontology driven development of web information systems<>apweb<>shiwei tang<>
31449<>6147_22<>ernest dawei wang:qiong luo:dongqing yang<>binary search join between an ir system and an rdbms<>webi<>shiwei tang<>
31451<>6147_24<>lingbo kong:dongqing yang:tengjiao wang:jun gao<>kcam: concentrating on structural similarity for xml fragments<>waim<>shiwei tang<>
31460<>6147_33<>lei chang:dongqing yang:tengjiao wang<>mining compressed sequential patterns<>adma<>shiwei tang<>
31463<>6147_36<>yu fan:hongyan li:zijing hu:jianlong gao:haibin liu:xinbiao zhou<>dsec: a data stream engine based clinical information system<>apweb<>shiwei tang<>
31470<>6147_43<>hongding wang:yunhai tong:dongqing yang<>an approach for identifying attribute correspondences in multilingual schemas<>sac<>shiwei tang<>
31479<>6147_52<>aiqiang gao:dongqing yang:ming zhang<>qos-driven web service composition with inter service conflicts<>apweb<>shiwei tang<>
31480<>6147_53<>hongding wang:shaohua tan:dongqing yang:yunhai tong<>file correspondences dictionary construction in multilingual p2p file sharing systems<>euc<>shiwei tang<>
31487<>6147_60<>lizheng jiang:dongqing yang:xiuli ma:dehui zhang<>mining maximal correlated member clusters in high dimensional database<>pakdd<>shiwei tang<>
31488<>6147_61<>guojie song:dongqing yang:ling wu:tengjiao wang<>a mixed process neural network and its application to churn prediction in mobile communications<>icdm<>shiwei tang<>
31490<>6147_63<>hongding wang:shaohua tan:dongqing yang:yunhai tong<>identifying indirect attribute correspondences in multilingual schemas<>dexaw<>shiwei tang<>
6413<>6148_0<>yi yang<>exec: an evolvable and extensible environment for collaboration<>c5<>du li<>
6416<>6148_3<>yi yang:james creel:blake dworaczyk<>a framework for building collaboration tools by leveraging industrial components<>otm<>du li<>
24806<>6156_1<>suresh srinivasan:prasanth mangalagiri:yuan xie:karthik sarpatwari<>flaw: fpga lifetime awareness<>dac<>narayanan vijaykrishnan<>
24789<>6157_2<>feihui li:chrysostomos nicopoulos:thomas d. richardson:yuan xie:mahmut t. kandemir<>design and management of 3d chip multiprocessors using network-in-memory<>isca<>narayanan vijaykrishnan<>
24795<>6157_8<>chrysostomos nicopoulos:dongkook park:jongman kim:mazin s. yousif:chita r. das<>vichar: a dynamic virtual channel regulator for network-on-chip routers<>micro<>narayanan vijaykrishnan<>
24796<>6157_9<>jooheung lee:mary jane irwin:wayne wolf<>an efficient architecture for motion estimation and compensation in the transform domain<>tcsv<>narayanan vijaykrishnan<>
24797<>6157_10<>greg m. link<>thermal trends in emerging technologies<>isqed<>narayanan vijaykrishnan<>
24799<>6157_12<>andrew j. ricketts:kevin m. irick:mary jane irwin<>priority scheduling in digital microfluidics-based biochips<>date<>narayanan vijaykrishnan<>
24804<>6157_17<>dongkook park:chrysostomos nicopoulos:jongman kim:chita r. das<>exploring fault-tolerant network-on-chip architectures<>dsn<>narayanan vijaykrishnan<>
22883<>6158_1<>min gyu choi:yoshihisa shinagawa:sung yong shin<>video-guided motion synthesis using example motions<>tog<>min je park<>
22884<>6159_0<>jesse s. jin:suhuai luo<>locating the optic disc in retinal images<>IEEEcgiv<>mira park<>
22878<>6160_1<>yong-kee jun<>detecting unaffected message races in parallel programs<>gpc<>mi-young park<>
12174<>6165_13<>wai-tat fu:daniel bothell:scott douglass:craig haimson:myeong-ho sohn<>toward a real-time model-based training system<>iwc<>john r. anderson<>
12159<>6167_0<>catherine s. weir:mervyn a. jack<>on the role of metaphor and language in design of third party payments in ebanking: usability and quality<>ijmms<>james n. anderson<>
12176<>6172_0<>edward curley:binoy ravindran:e. douglas jensen<>recovering from distributable thread failures with assured timeliness in real-time distributed systems<>srds<>jonathan stephen anderson<>
20386<>6173_2<>li-c. wang<>on bounding the delay of a critical path<>iccad<>leonard lee<>
33488<>6174_3<>nulo<>interval methods in knowledge representation<>ijufks<>vladik kreinovich<>
33541<>6174_56<>nulo<>interval methods in knowledge representation<>ijufks<>vladik kreinovich<>
10658<>6181_0<>benjamin k. chen:fouad a. tobagi<>power-law tradeoffs between optical and electronic switching<>infocom<>huan liu<>
10662<>6182_2<>peng-jun wan:xiaohua jia<>on optimal placement of relay nodes for reliable connectivity in wireless sensor networks<>jco<>hai liu<>
10665<>6182_5<>deying li:xiaohua jia<>qos topology control with minimal total energy cost in ad hoc wireless networks<>msn<>hai liu<>
10668<>6182_8<>peng-jun wan:xiaohua jia<>maximal lifetime scheduling for  to 1 sensor-target surveillance networks<>cn<>hai liu<>
10649<>6185_6<>li zhou:ying tao:james j. cimino:elizabeth s. chen:yves a. lussier:george hripcsak:carol friedman<>terminology model discovery using natural language processing and visualization techniques<>jbi<>hongfang liu<>
10651<>6185_8<>manabu torii<>headwords and suffixes in biomedical names<>pakdd<>hongfang liu<>
10578<>6187_10<>surendra k. singhi<>feature subset selection bias for classification learning<>icml<>huan liu<>
10581<>6187_13<>ping wu:ji-rong wen:wei-ying ma<>query selection techniques for efficient crawling of structured web sources<>icde<>huan liu<>
10608<>6187_40<>gabriel pui cheong fung:jeffrey xu yu:haixun wang:david w. cheung<>a balanced ensemble approach to weighting classifiers for text classification<>icdm<>huan liu<>
10621<>6187_53<>k. selcuk candan:jong wook kim:reshma suvarna<>discovering mappings in hierarchical data from multiple sources using the inherent structure<>kais<>huan liu<>
10669<>6189_0<>pattie maes<>rendering aesthetic impressions of text in color space<>ijait<>hugo liu<>
15929<>6190_7<>wonkyung park:misty k. blowers:matt b. wolf<>an open-set speaker identification system using genetic learning classifier system<>gecco<>jae c. oh<>
15933<>6191_0<>hong hua<>user evaluations on form factors of tangible magic lenses<>ismar<>ji-young oh<>
15935<>6191_2<>wolfgang sturzlinger:john danahy<>sesame: towards better 3d conceptual design systems<>ACMdis<>ji-young oh<>
24296<>6192_2<>david c. k. yuen:andrew byde<>heuristic bidding strategies for multiple heterogeneous auctions<>ecai<>nicholas r. jennings<>
24309<>6192_15<>bastian blankenburg:minghua he:matthias klusch<>risk-bounded formation of fuzzy coalitions among service agents<>cia<>nicholas r. jennings<>
24310<>6192_16<>perukrishnen vytelingum:dave cliff<>evolutionary stability of behavioural types in the continuous double auction<>atal<>nicholas r. jennings<>
24312<>6192_18<>paritosh padhy:rajdeep k. dash:kirk martinez<>a utility-based sensing and communication model for a glacial sensor network<>atal<>nicholas r. jennings<>
24319<>6192_25<>terry r. payne:esther david:matthew sharifi<>auction mechanisms for efficient advertisement selection on public displays<>ecai<>nicholas r. jennings<>
24325<>6192_31<>minghua he:alex rogers:xudong luo<>designing a successful trading agent for supply chain management<>atal<>nicholas r. jennings<>
24333<>6192_39<>w. t. luke teacy:jigar patel:michael luck<>travos: trust and reputation in the context of inaccurate information sources<>aamas<>nicholas r. jennings<>
24336<>6192_42<>sebastian stein:terry r. payne<>flexible provisioning of service workflows<>ecai<>nicholas r. jennings<>
24337<>6192_43<>jigar patel:w. t. luke teacy:michael luck:stuart chalmers:nir oren:timothy j. norman:alun d. preece:peter m. d. gray:gareth shercliff:patrick j. stockreisser:jianhua shao:w. alex gray:n. j. fiddian:simon g. thompson<>conoise-g: agent-based virtual organisations<>atal<>nicholas r. jennings<>
24339<>6192_45<>viet dung dang:rajdeep k. dash:alex rogers<>overlapping coalition formation for efficient data fusion in multi-sensor networks<>aaai<>nicholas r. jennings<>
24354<>6192_60<>vidya narayanan<>learning to negotiate optimally in non-stationary environments<>cia<>nicholas r. jennings<>
24358<>6192_64<>s. shaheen fatima:michael wooldridge<>on efficient procedures for multi-issue negotiation<>atal<>nicholas r. jennings<>
24359<>6192_65<>sarvapali d. ramchurn:carles sierra:lluis godo<>negotiating using rewards<>atal<>nicholas r. jennings<>
24361<>6192_67<>partha sarathi dutta:luc moreau<>adaptive distributed resource allocation and diagnostics using cooperative information-sharing strategies<>atal<>nicholas r. jennings<>
24374<>6192_80<>efrat manisterski:esther david:sarit kraus<>forming efficient agent groups for completing complex tasks<>atal<>nicholas r. jennings<>
24389<>6192_95<>nishan c. karunatillake:iyad rahwan:sarvapali d. ramchurn<>managing social influences through argumentation-based negotiation<>atal<>nicholas r. jennings<>
24391<>6192_97<>trung dong huynh:nigel r. shadbolt<>certified reputation: how an agent can trust a stranger<>atal<>nicholas r. jennings<>
24392<>6192_98<>s. shaheen fatima:michael wooldridge<>multi-issue negotiation with deadlines<>jair<>nicholas r. jennings<>
24413<>6192_119<>minghua he:adam prugel-bennett<>a heuristic bidding strategy for buying multiple goods in multiple english auctions<>toit<>nicholas r. jennings<>
24418<>6192_124<>viet dung dang<>coalition structure generation in task-based settings<>ecai<>nicholas r. jennings<>
24431<>6192_137<>enrico h. gerding:alex rogers:rajdeep k. dash<>"competing sellers in online markets: reserve prices, shill bidding, and auction fees."<>atal<>nicholas r. jennings<>
24439<>6192_145<>trung dong huynh:nigel r. shadbolt<>an integrated trust and reputation model for open multi-agent systems<>aamas<>nicholas r. jennings<>
24442<>6192_148<>enrico h. gerding:alex rogers:rajdeep k. dash<>"competing sellers in online markets: reserve prices, shill bidding, and auction fees."<>atal<>nicholas r. jennings<>
9919<>6193_3<>susanne albers<>energy-efficient algorithms for flow time minimization<>stacs<>hiroshi fujiwara<>
25377<>6197_0<>yu-hui huang:tingting hwang<>switching-activity driven gate sizing and vth assignment for low power design<>aspdac<>po-yuan chen<>
11347<>6201_1<>yun chi:philip s. yu:richard r. muntz<>catch the moment: maintaining closed frequent itemsets over a data stream sliding window<>kais<>haixun wang<>
11349<>6201_3<>jian pei:jian liu:ke wang:jianyong wang:philip s. yu<>discovering frequent closed partial orders from strings<>tkde<>haixun wang<>
11358<>6201_12<>yijian bai:hetal thakkar:chang luo:carlo zaniolo<>a data stream language and system designed for power and extensibility<>cikm<>haixun wang<>
11362<>6201_16<>chang-shing perng:sheng ma<>fast relevance discovery in time series<>icdm<>haixun wang<>
11364<>6201_18<>jian yin:jian pei:philip s. yu:jeffrey xu yu<>suppressing model overfitting in mining concept-drifting data streams<>kdd<>haixun wang<>
11366<>6201_20<>jiefeng cheng:jeffrey xu yu:xuemin lin:philip s. yu<>fast computation of reachability labeling for large graphs<>edbt<>haixun wang<>
11367<>6201_21<>peng wang:wei wang:baile shi:philip s. yu<>loci: load shedding through class-preserving data acquisition<>icdm<>haixun wang<>
11369<>6201_23<>qi zhao:mitsunori ogihara:jun xu<>finding global icebergs over distributed data sets<>pods<>haixun wang<>
11398<>6201_52<>gabriel pui cheong fung:jeffrey xu yu:david w. cheung:huan liu<>a balanced ensemble approach to weighting classifiers for text classification<>icdm<>haixun wang<>
9943<>6202_0<>fei pan:kiran kamath:kangyu zhang:sudip pulapura:avinash achar:juan nunez-iglesias:yu huang 0003:xifeng yan:jiawei han:min xu:jianjun hu:xianghong jasmine zhou<>integrative array analyzer: a software package for analysis of cross-platform and cross-species microarray data<>bioinformatics<>haiyan hu<>
9938<>6205_0<>michael a. bender<>an adaptive packed-memory array<>pods<>haodong hu<>
28118<>6206_0<>zeshui xu<>the continuous ordered weighted geometric operator and its application to decision making<>fss<>ronald r. yager<>
14051<>6210_1<>jeffrey f. naughton:miron livny<>trac: toward recency and consistency reporting in a database with distributed data sources<>vldb<>jiansheng huang<>
14056<>6217_0<>xiaohua sun:patrick chiu:maribeth back:wolf polak<>implicit brushing and target snapping: data exploration and sense-making on large displays<>avi<>jeffrey huang<>
14086<>6219_0<>huadong liu:micah beck<>dynamic co-scheduling of distributed computation and replication<>ccgrid<>jian huang<>
11444<>6220_8<>justin ma:john dunagan:stefan savage:geoffrey m. voelker<>finding diversity in remote code injection exploits<>imc<>helen j. wang<>
11453<>6220_17<>charles reis:john dunagan:opher dubrovsky:saher esmeir<>browsershield: vulnerability-driven filtering of dynamic html<>osdi<>helen j. wang<>
11455<>6220_19<>samuel t. king:peter m. chen:yi-min wang:chad verbowski:jacob r. lorch<>subvirt: implementing malware with virtual machines<>sp<>helen j. wang<>
11494<>6224_14<>yuan-fang li:jing sun:gillian dobbie:jun sun<>validating semistructured data using owl<>waim<>hai h. wang<>
11496<>6224_16<>yuan-fang li:jing sun:gillian dobbie:jun sun<>reasoning about ora-ss data models using the semantic web<>jods<>hai h. wang<>
14080<>6225_12<>nulo<>representation characterizations of chordal bipartite graphs<>jct<>jing huang<>
11498<>6226_1<>roger zimmermann:wei-shinn ku<>distributed continuous range query processing on moving objects<>dexa<>haojun wang<>
11415<>6230_1<>david suter<>efficient visual tracking by probabilistic fusion of multiple cues<>icpr<>hanzi wang<>
11420<>6230_6<>david suter:konrad schindler<>effective appearance model and similarity measure for particle filtering and visual tracking<>eccv<>hanzi wang<>
11423<>6230_9<>konrad schindler<>smooth foreground-background segmentation for video processing<>accv<>hanzi wang<>
11424<>6230_10<>david suter<>background subtraction based on a robust consensus method<>icpr<>hanzi wang<>
11426<>6230_12<>david suter<>a novel robust statistical method for background initialization and visual surveillance<>accv<>hanzi wang<>
34638<>6231_3<>yonggen mao<>performance evaluation of peer-to-peer web caching systems<>jss<>weisong shi<>
11427<>6232_0<>yunqiang chen:tong fang:jason tyan:narendra ahuja<>gradient adaptive image restoration and enhancement<>icip<>hongcheng wang<>
10873<>6235_0<>trung q. bui<>error performance of bicm-id in impulsive noise<>ccece<>ha h. nguyen<>
10875<>6235_2<>son x. nguyen<>suboptimal decoding of vector quantization over a cdma channel with m-ask<>ccece<>ha h. nguyen<>
36290<>6239_3<>kinji mori<>autonomous information services integration for high-assurance in demand-oriented information systems<>iscc<>xiaodong lu<>
10882<>6240_3<>trung thanh nguyen:claire p. willis:derek j. paddon:sinh hoa nguyen<>learning sunspot classification<>fuin<>hung son nguyen<>
10886<>6240_7<>sinh hoa nguyen:trung thanh nguyen<>ontology driven concept approximation<>rsctc<>hung son nguyen<>
20568<>6241_0<>hongya ge:swades de<>impact of network resource constraints on the performance of wireless sensor relay networks<>iwcmc<>lichuan liu<>
10896<>6243_0<>viktor kuncak:martin c. rinard<>deciding boolean algebra with presburger arithmetic<>jar<>huu hai nguyen<>
10897<>6245_0<>michelle wetterwald:susana sargento<>an early technical evaluation of convergence between cellular and broadcast media<>icns<>huu nghia nguyen<>
10900<>6248_2<>patrick thiran<>using end-to-end data to infer lossy links in sensor networks<>infocom<>hung xuan nguyen<>
36262<>6249_2<>hong chen:anil k. jain<>multimodal facial gender and ethnicity identification<>icb<>xiaoguang lu<>
36269<>6249_9<>anil k. jain:dirk colbry<>matching 2.5d face scans to 3d models<>pami<>xiaoguang lu<>
36274<>6249_14<>anil k. jain<>deformation modeling for robust 3d face matching<>cvpr<>xiaoguang lu<>
10902<>6250_0<>xing xiong:uyen trang nguyen<>preemptive multicast routing in mobile ad-hoc networks<>icn<>hoang lan nguyen<>
10903<>6250_1<>uyen trang nguyen<>study of different types of attacks on multicast in mobile ad hoc networks<>icn<>hoang lan nguyen<>
40725<>6254_18<>akimasa morihata:kazuhiko kakehi:masato takeichi<>swapping arguments and results of recursive functions<>mpc<>zhenjiang hu<>
40732<>6254_25<>kiminori matsuzaki:masato takeichi<>parallel skeletons for manipulating general trees<>pc<>zhenjiang hu<>
36276<>6255_1<>prasenjit mitra:james ze wang:c. lee giles<>automatic categorization of figures in scientific documents<>jcdl<>xiaonan lu<>
40739<>6256_0<>steven m. gallo:long li:marc s. halfon<>a regulatory element database for<>bioinformatics<>zihua hu<>
40740<>6256_1<>gail r. willsky<>utilization of two sample -test statistics from redundant probe sets to evaluate different probe set algorithms in genechip studies<>bmcbi<>zihua hu<>
40746<>6258_0<>x. yuan:h. t. wu:manabu torii:meenakshi narayanaswamy:k. e. ravikumar:k. vijay-shanker:cathy h. wu<>an online literature mining tool for protein phosphorylation<>bioinformatics<>zhang-zhi hu<>
40752<>6258_6<>bo han:zoran obradovic:cathy h. wu:slobodan vucetic<>substring selection for biomedical document classification<>bioinformatics<>zhang-zhi hu<>
40753<>6258_7<>hongfang liu:jian zhang:cathy h. wu<>biothesaurus: a web-based thesaurus of protein and gene names<>bioinformatics<>zhang-zhi hu<>
37147<>6259_0<>kihwan kim:wallapak tavanapong<>sharing location dependent experiences in manet<>mdm<>ying cai<>
37149<>6259_2<>kien a. hua:guohong cao:toby xu<>real-time processing of range-monitoring queries in heterogeneous mobile databases<>tmc<>ying cai<>
37152<>6259_5<>jianming zhou<>an overlay subscription network for live internet tv broadcast<>tkde<>ying cai<>
37160<>6260_2<>xiaobo zhou:edward chow<>an integrated approach with feedback control for robust web qos design<>comcom<>yu cai<>
37161<>6262_0<>minglu li:min-you wu<>an area-based collaborative sleeping protocol for wireless sensor networks<>apweb<>yanli cai<>
37162<>6263_0<>kevin j. sullivan<>modularity analysis of logical design models<>kbse<>yuanfang cai<>
37163<>6263_1<>william g. griswold:kevin j. sullivan:yuanyuan song:macneil shonle:nishit tewari:hridesh rajan<>modular software design with crosscutting interfaces<>software<>yuanfang cai<>
18512<>6266_0<>peng li:wen fang<>hybrid kernel machine ensemble for imbalanced data sets<>icpr<>kap luk chan<>
18516<>6266_4<>wen fang<>using statistical shape priors in geodesic active contours for robust object detection<>icpr<>kap luk chan<>
18523<>6266_11<>jiayin zhou:pengfei xu:vincent f. h. chong<>nasopharyngeal carcinoma lesion segmentation from mr images by support vector machine<>isbi<>kap luk chan<>
18527<>6266_15<>myo thida:how-lung eng<>an improved real-time contour tracking algorithm using fast level set method<>psivt<>kap luk chan<>
18540<>6267_0<>sammy chan:king-tim ko<>a data link control protocol for broadband wireless networks with adaptive coding rate<>ijcomsys<>king sun chan<>
18539<>6270_0<>patrick c. h. ma:xin yao:david k. y. chiu<>an evolutionary clustering algorithm for gene expression microarray data analysis<>tec<>keith c. c. chan<>
26281<>6278_0<>aimin zhou:yaochu jin:bernhard sendhoff:edward p. k. tsang<>prediction-based population re-initialization for evolutionary dynamic multi-objective optimization<>emo<>qingfu zhang<>
26282<>6278_1<>aimin zhou:yaochu jin:bernhard sendhoff:edward p. k. tsang<>modelling the population distribution in multi-objective optimization by generative topographic mapping<>ppsn<>qingfu zhang<>
26283<>6278_2<>hui li<>a multiobjective differential evolution based on decomposition for multiobjective optimization with variable linkages<>ppsn<>qingfu zhang<>
26284<>6278_3<>jianyong sun:jin li:xin yao<>a hybrid estimation of distribution algorithm for cdma cellular system design<>seal<>qingfu zhang<>
26258<>6279_0<>dan wang:jiangchuan liu<>self-protection for wireless sensor networks<>icdcs<>qian zhang<>
26259<>6279_1<>kun tan:jingmin song:murari sridharan<>a compound tcp approach for high-speed and long distance networks<>infocom<>qian zhang<>
26260<>6279_2<>w.-p. k. yiu:kin fung simon wong:s.-h. g. chan:wan-ching wong:wenwu zhu:ya-qin zhang<>lateral error recovery for media streaming in application-level multicast<>tmm<>qian zhang<>
26279<>6280_0<>shenggui zhang<>edge vulnerability parameters of split graphs<>appml<>qilong zhang<>
25924<>6282_19<>gary chartrand:sin-min lee<>uniformly cordial graphs<>dm<>ping zhang<>
25932<>6285_1<>heshan sun<>the role of moderating factors in user technology acceptance<>ijmms<>ping zhang<>
25934<>6285_3<>fiona fui-hoon nah:scott mccoy:mun y. yi<>human-computer interaction research in the management information systems discipline<>ijmms<>ping zhang<>
25935<>6285_4<>na li:heshan sun<>affective quality and cognitive absorption: extending technology acceptance research<>hicss<>ping zhang<>
7897<>6286_30<>george s. lueker<>approximation algorithms for extensible bin packing<>scheduling<>edward g. coffman jr.<>
7955<>6288_1<>thomas zimmermann:sunghun kim:andreas zeller<>mining version archives for co-changed lines<>msr<>e. james whitehead jr.<>
7956<>6288_2<>sunghun kim<>properties of signature change patterns<>icsm<>e. james whitehead jr.<>
7961<>6288_7<>sunghun kim<>how long did it take to fix bugs?<>msr<>e. james whitehead jr.<>
7962<>6288_8<>sunghun kim:kai pan<>micro pattern evolution<>msr<>e. james whitehead jr.<>
7968<>6288_14<>kai pan:sunghun kim<>bug classification using program slicing metrics<>scam<>e. james whitehead jr.<>
7979<>6288_25<>sunghun kim:thomas zimmermann:kai pan<>automatic identification of bug-introducing changes<>kbse<>e. james whitehead jr.<>
26291<>6296_0<>xuemin lin:jian xu:hongjun lu:jeffrey xu yu:xiaofang zhou:yidong yuan<>approximate processing of massive continuous quantile queries over high-speed data streams<>tkde<>qing zhang<>
26299<>6296_8<>jian pei:yidong yuan:xuemin lin:wen jin:martin ester:qing liu:wei wang:yufei tao:jeffrey xu yu<>towards multidimensional subspace skyline analysis<>tods<>qing zhang<>
25943<>6300_0<>ron caspi:hartmut foerster:carol a. fulcher:rebecca hopkinson:john ingraham:pallavi kaipa:markus krummenacker:suzanne m. paley:john pick:seung yon rhee:christophe tissier:peter d. karp<>metacyc: a multiorganism database of metabolic pathways and enzymes<>nar<>peifen zhang<>
25940<>6301_0<>nulo<>"producing human-centered, usability-sensitive, and hci-competent managers, cios, and ceos."<>chi<>ping zhang<>
9827<>6308_0<>hai jiang:weihua zhuang<>distributed medium access control for wireless mesh networks<>wicomm<>ho ting cheng<>
9819<>6309_6<>chao chen<>superimposing voronoi complexes for shape deformation<>ijcga<>ho-lun cheng<>
9812<>6311_0<>khanh vu:kien a. hua:sheau-dong lang<>a non-linear dimensionality-reduction technique for fast similarity search in large databases<>sigmod<>hao cheng<>
33882<>6322_0<>chengcui zhang:xin chen<>a pca-based vehicle classification framework<>icde<>wei-bang chen<>
17855<>6327_2<>s. shu:d. sun<>an algebraic multigrid method for higher-order finite element discretizations<>computing<>j. xu<>
17844<>6329_0<>ken c. k. lee:wang-chien lee:baihua zheng<>caching complementary space for location-based services<>edbt<>jianliang xu<>
17848<>6329_4<>haibo hu:dik lun lee<>fast nearest neighbor search on road networks<>edbt<>jianliang xu<>
17850<>6329_6<>xueyan tang<>extending network lifetime for precision-constrained data aggregation in wireless sensor networks<>infocom<>jianliang xu<>
17852<>6330_0<>wei wang:jian pei:xiaoyuan wang:baile shi:ada wai-chee fu<>utility-based anonymization for privacy preservation with less information loss<>sigkdd<>jian xu<>
17824<>6331_1<>yunbo cao:hang li:yalou huang<>cost-sensitive learning of svm for ranking<>ecml<>jun xu<>
17826<>6331_3<>yunbo cao:tie-yan liu:hang li:yalou huang:hsiao-wuen hon<>adapting ranking svm to document retrieval<>sigir<>jun xu<>
17828<>6331_5<>yunbo cao:hang li:min zhao:yalou huang<>a supervised learning approach to search of definitions<>jcst<>jun xu<>
17831<>6332_2<>g. alan wang:hsinchun chen<>using social contextual information to match criminal identities<>hicss<>jennifer jie xu<>
17833<>6332_4<>g. a. wang:h. chen:h. atabakhsh<>automatically detecting criminal identity deception: an adaptive detection algorithm<>tsmc<>j. j. xu<>
17836<>6332_7<>hsinchun chen:yilu zhou:jialun qin<>on the topology of the dark web of terrorist groups<>isi<>jennifer jie xu<>
17837<>6332_8<>zan huang:hsinchun chen:fei guo:soushan wu:wun-hwa chen<>expertise visualization: an implementation and study based on cognitive fit theory<>dss<>jennifer jie xu<>
17817<>6333_5<>tibor bakota:rudolf ferenc:tibor gyimothy:claudio riva<>towards portable metrics-based models for software maintenance problems<>icsm<>jianli xu<>
17818<>6333_6<>nulo<>using colored petri nets and tools to support mobile terminal and network software development<>apn<>jianli xu<>
17820<>6333_8<>nulo<>evaluating and balancing reliability and performance properties of software architecture using formal modeling techniques<>sew<>jianli xu<>
33865<>6340_0<>benjamin n. lee:edward y. chang<>fotofiti: web service for photo management<>mm<>wenyen chen<>
33866<>6340_1<>benjamin n. lee:edward y. chang<>"a scalable service for photo annotation, sharing, and search."<>mm<>wenyen chen<>
33867<>6340_2<>yaw-chung chen<>an agent-based metric for quality of services over wireless networks<>compsac<>wen-yen chen<>
33868<>6340_3<>benjamin n. lee:edward y. chang<>fotowiki: distributed map enhancement service<>mm<>wenyen chen<>
33864<>6341_0<>yi-ling chen:ming-syan chen<>mining frequent spatial patterns in image databases<>pakdd<>wei-ta chen<>
632<>6343_6<>sai rahul reddy p.<>auction based resource allocation in grids<>icdcn<>arobinda gupta<>
634<>6343_8<>markose thomas:srinivasan keshav<>group based routing in disconnected ad hoc networks<>hipc<>arobinda gupta<>
638<>6343_12<>ankur jain:sushanta karmakar<>adaptive connected dominating set - an exercise in distributed output switching<>icdcn<>arobinda gupta<>
681<>6346_0<>chandra chekuri:ilan newman:yuri rabinovich:alistair sinclair<>embedding -outerplanar graphs into<>siamdm<>anupam gupta<>
683<>6346_2<>kunal talwar<>approximating unique games<>soda<>anupam gupta<>
693<>6346_12<>mohammad taghi hajiaghayi:harald racke<>oblivious network design<>soda<>anupam gupta<>
701<>6346_20<>hubert t.-h. chan:michael dinitz<>spanners with slack<>esa<>anupam gupta<>
13029<>6349_1<>nulo<>memories: array-like records for acl2<>acl2<>jared davis<>
651<>6350_11<>chao wang:zijiang yang:franjo ivancic<>disjunctive image computation for embedded software verification<>date<>aarti gupta<>
654<>6350_14<>himanshu jain:franjo ivancic:ilya shlyakhter:chao wang<>using statically computed invariants inside the predicate abstraction and refinement loop<>cav<>aarti gupta<>
657<>6350_17<>malay k. ganai:muralidhar talupur<>: tight integration of  and  approaches in a separation logic solver<>tacas<>aarti gupta<>
664<>6350_24<>chao wang:malay k. ganai<>predicate learning and selective theory deduction for a difference logic solver<>dac<>aarti gupta<>
665<>6350_25<>vineet kahlon:nishant sinha<>symbolic model checking of concurrent programs using partial orders and on-the-fly transactions<>cav<>aarti gupta<>
13031<>6351_1<>jan struyf:c. david page jr.<>an efficient approximation to lookahead in relational learners<>ecml<>jesse davis<>
13033<>6351_3<>mark goadrich<>the relationship between precision-recall and roc curves<>icml<>jesse davis<>
667<>6352_1<>zille huma kamal:leszek lilien:ashfaq a. khokhar<>an efficient map classifier for sensornets<>hipc<>ajay gupta<>
676<>6352_10<>zille huma kamal:leszek lilien:ashfaq a. khokhar<>classification using efficient lu decomposition in sensornets<>woc<>ajay gupta<>
13019<>6353_6<>ying zhou<>analysis of weblog link structure - a community perspective<>webist<>joseph davis<>
13023<>6353_10<>ying zhou<>community discovery and analysis in blogspace<>www<>joseph davis<>
12994<>6357_6<>ambrish tyagi<>minimal-latency human action recognition using reliable-inference<>ivc<>james w. davis<>
13004<>6357_16<>hui gao<>sampling representative examples for dimensionality reduction and recognition - bootstrap bumping lda<>eccv<>james w. davis<>
13006<>6357_18<>hui gao<>why direct lda is not equivalent to lda<>pr<>james w. davis<>
35332<>6359_0<>juan del cuvillo:ziang hu:guang r. gao<>toward a software infrastructure for the cyclops-64 cellular architecture<>hpcs<>weirong zhu<>
35334<>6359_2<>guang r. gao:thomas l. sterling:rick l. stevens:mark hereld<>hierarchical multithreading: programming model and system software<>ipps<>weirong zhu<>
35336<>6359_4<>juan del cuvillo:guang r. gao<>landing openmp on cyclops-64: an efficient mapping of openmp to a many-core system-on-a-chip<>cf<>weirong zhu<>
35338<>6359_6<>parimala thulasiraman:ruppa k. thulasiram:guang r. gao<>exploring financial applications on many-core-on-a-chip architecture: a first experiment<>ispa<>weirong zhu<>
35340<>6359_8<>ziang hu:juan del cuvillo:guang r. gao<>optimization of dense matrix multiplication on ibm cyclops-64: challenges and experiences<>europar<>weirong zhu<>
1668<>6362_2<>kenny smith:richard a. blythe:paul vogt<>cross-situational learning: a mathematical approach<>eelc<>andrew d. m. smith<>
1659<>6364_7<>yevgeniy dodis:jonathan katz:leonid reyzin<>robust fuzzy extractors and authenticated key agreement from close secrets<>crypto<>adam smith<>
1649<>6365_0<>george a. constantinides:peter y. k. cheung<>a novel heuristic and provable bounds for reconfigurable architecture design<>fpl<>alastair m. smith<>
1639<>6367_0<>ramadass nagarajan:karthikeyan sankaralingam:robert g. mcdonald:doug burger:stephen w. keckler:kathryn s. mckinley<>dataflow predication<>micro<>aaron smith<>
1640<>6367_1<>jon gibson:bertrand a. maher:nicholas nethercote:bill yoder:doug burger:kathryn s. mckinley:james h. burrill<>compiling for edge architectures<>cgo<>aaron smith<>
13050<>6369_0<>nulo<>household indicators: design to inform and engage citizens<>chi<>janet davis<>
1610<>6370_28<>kai wei:yih-farn robin chen:binh vo<>whopay: a scalable and anonymous payment system for peer-to-peer environments<>icdcs<>alan j. smith<>
41615<>6377_5<>wei tang<>clusterer ensemble<>kbs<>zhi-hua zhou<>
41617<>6377_7<>daoqiang zhang:songcan chen<>diagonal principal component analysis for face recognition<>pr<>zhi-hua zhou<>
41618<>6377_8<>junping zhang:li he<>ensemble-based discriminant manifold learning for face recognition<>icnc<>zhi-hua zhou<>
41619<>6377_9<>de-chuan zhan<>neighbor line-based locally linear embedding<>pakdd<>zhi-hua zhou<>
41624<>6377_14<>xiao-bing xue<>distributional features for text categorization<>ecml<>zhi-hua zhou<>
41632<>6377_22<>min-ling zhang<>adapting rbf neural networks to multi-instance learning<>npl<>zhi-hua zhou<>
41634<>6377_24<>daoqiang zhang:songcan chen<>non-negative matrix factorization on kernels<>pricai<>zhi-hua zhou<>
41637<>6377_27<>daoqiang zhang:songcan chen<>learning the kernel parameters in kernel minimum distance classifier<>pr<>zhi-hua zhou<>
41639<>6377_29<>xu-ying liu:jianxin wu<>exploratory under-sampling for class-imbalance learning<>icdm<>zhi-hua zhou<>
41640<>6377_30<>xu-ying liu<>training cost-sensitive neural networks with methods addressing the class imbalance problem<>tkde<>zhi-hua zhou<>
41643<>6377_33<>xu-ying liu<>the influence of class imbalance on cost-sensitive learning: an empirical study<>icdm<>zhi-hua zhou<>
41646<>6377_36<>hong-bin dai<>query-sensitive similarity measure for content-based image retrieval<>icdm<>zhi-hua zhou<>
41647<>6377_37<>xu-ying liu<>on multi-class cost-sensitive learning<>aaai<>zhi-hua zhou<>
41648<>6377_38<>xin geng<>image region selection and ensemble for face recognition<>jcst<>zhi-hua zhou<>
41656<>6377_46<>yang yu<>a new approach to estimating the expected first hitting time of evolutionary algorithms<>aaai<>zhi-hua zhou<>
41658<>6377_48<>xin geng:yu zhang:gang li:honghua dai<>learning from facial aging patterns for automatic age estimation<>mm<>zhi-hua zhou<>
41660<>6377_50<>xiao-bing xue:zhongfei (mark) zhang<>improve web search using image snippets<>aaai<>zhi-hua zhou<>
41666<>6377_56<>ke-jia chen:hong-bin dai<>enhancing relevance feedback in image retrieval using unlabeled data<>tois<>zhi-hua zhou<>
41669<>6377_59<>daoqiang zhang:songcan chen<>adaptive kernel principal component analysis with unsupervised learning of kernels<>icdm<>zhi-hua zhou<>
18900<>6384_1<>xudong xie<>an efficient illumination normalization method for face recognition<>prl<>kin-man lam<>
18912<>6384_13<>li zhuo:l. shen<>channel-adaptive error protection for streaming stored mpeg-4 fgs over error-prone environments<>tcsv<>k.-m. lam<>
15029<>6388_0<>dan wang:qian zhang<>self-protection for wireless sensor networks<>icdcs<>jiangchuan liu<>
15034<>6388_5<>bo li:ya-qin zhang<>optimal stream replication for video simulcasting<>tmm<>jiangchuan liu<>
15038<>6388_9<>dan li:jianping wu:yong cui:ke xu<>trustworthy distributed algorithm design to defend distance cheating in link-weighted alm<>iscis<>jiangchuan liu<>
15042<>6388_13<>ming zhou<>tree-assisted gossiping for overlay video distribution<>mta<>jiangchuan liu<>
15044<>6389_0<>jaaved mohammed:james carter:sanjay ranka:tamer kahveci:michael baudis<>distance-based clustering of cgh data<>bioinformatics<>jun liu<>
14956<>6394_2<>krishnan sundaresan:nihar r. mahapatra<>efficient encoding for address buses with temporal redundancy for simultaneous area and energy reduction<>glvlsi<>jiangjiang liu<>
14957<>6394_3<>brian bell:tan truong<>analysis and characterization of intel itanium instruction bundles for improving vliw processor performance<>imsccs<>jiangjiang liu<>
40706<>6404_6<>richard lai:alonso marquez<>on using cache conscious clustering for improving oodbms performance<>infsof<>zhen he<>
18741<>6411_0<>shanshan song:yu-kwong kwok<>risk-resilient heuristics and genetic algorithms for security-assured grid job scheduling<>tc<>kai hwang<>
18744<>6411_3<>yu chen<>collaborative detection and filtering of shrew ddos attacks using spectral analysis<>jpdc<>kai hwang<>
416<>6412_0<>karl aberer<>internet-scale storage systems under churn -- a study of the steady-state using markov models<>p2p<>anwitaman datta<>
415<>6414_3<>ashish choudhary:michael l. bittner:edward r. dougherty<>intervention in a family of boolean networks<>bioinformatics<>aniruddha datta<>
18750<>6415_0<>sung-bae cho<>modular bayesian networks for inferring landmarks on mobile daily life<>ausai<>keum-sung hwang<>
18752<>6415_2<>sung-bae cho<>interactive learning of scene context extractor using combination of bayesian network and logic network<>acivs<>keum-sung hwang<>
407<>6416_1<>ante derek:john c. mitchell:bogdan warinschi<>computationally sound compositional logic for key exchange protocols<>csfw<>anupam datta<>
409<>6416_3<>michael backes:ante derek:john c. mitchell:mathieu turuani<>compositional analysis of contract-signing protocols<>tcs<>anupam datta<>
399<>6419_2<>maria gradinariu:antonino virgillito<>deterministic delta-connected overlay for peer-to-peer networks<>isorc<>ajoy kumar datta<>
26648<>6425_0<>alan mishchenko:jin s. zhang:subarnarekha sinha:jerry r. burch:malgorzata chrzanowska-jeske<>using simulation and satisfiability to compute flexibilities in boolean networks<>tcad<>robert k. brayton<>
26651<>6425_3<>jin s. zhang:alan mishchenko:malgorzata chrzanowska-jeske<>"symmetry detection for large boolean functions using circuit representation, simulation, and satisfiability."<>dac<>robert k. brayton<>
26657<>6425_9<>alan mishchenko:satrajit chatterjee:niklas een<>improvements to combinational equivalence checking<>iccad<>robert k. brayton<>
26667<>6425_19<>alan mishchenko:satrajit chatterjee<>dag-aware aig rewriting a fresh look at combinational logic synthesis<>dac<>robert k. brayton<>
26671<>6425_23<>satrajit chatterjee:alan mishchenko<>factor cuts<>iccad<>robert k. brayton<>
26680<>6425_32<>alan mishchenko:satrajit chatterjee<>improvements to technology mapping for lut-based fpgas<>fpga<>robert k. brayton<>
26690<>6426_2<>alan mishchenko<>a theory of nondeterministic networks<>tcad<>robert k. brayton<>
3770<>6428_1<>phil-su kang:chi-sheng shih:lui sha<>schedulability envelope for real-time radar dwell scheduling<>tc<>chang-gun lee<>
3785<>6428_16<>sathish gopalakrishnan:marco caccamo:chi-sheng shih:lui sha<>finite-horizon scheduling of radar dwells with online template construction<>rts<>chang-gun lee<>
3788<>6429_0<>leonardo bonanni:jose h. espinosa:henry lieberman:ted selker<>augmenting kitchen appliances with a shared context using knowledge about daily events<>iui<>chia-hsun jackie lee<>
3790<>6429_2<>chiun-yi ian jang:ting-han daniel chen:jon wetzel:yang-ting bowbow shen:ted selker<>attention meter: a vision-based input toolkit for interaction designers<>chi<>chia-hsun jackie lee<>
3791<>6429_3<>hyemin chung:ted selker<>lover's cups: drinking interfaces as new communication channels<>chi<>chia-hsun jackie lee<>
3796<>6431_1<>tiegang fang:fang guo<>a note on the extended blasius equation<>appml<>chia-fon f. lee<>
3798<>6432_1<>youngmin kim:amitabh varshney<>vertex-transformation streams<>cvgip<>chang ha lee<>
3803<>6436_0<>chao huang:laxmikant v. kale<>support for adaptivity in armci using migratable objects<>ipps<>chee wai lee<>
3805<>6436_2<>laxmikant v. kale:gengbin zheng:sameer kumar<>scaling applications to massively parallel machines using projections performance analysis tool<>fgcs<>chee wai lee<>
26949<>6442_1<>jeffrey s. foster:john kodumal:alex aiken<>flow-insensitive type qualifiers<>toplas<>robert johnson<>
18083<>6450_0<>shie mannor<>asymptotics of efficiency loss in competitive market mechanisms<>infocom<>jia yuan yu<>
2704<>6455_0<>sohraab soltani:jonathan k. shapiro:pang-ning tan<>local detection of selfish routing behavior in ad hoc networks<>join<>bo wang<>
2716<>6457_2<>nulo<>on the satisfiability of modular arithmetic formulae<>atva<>bow-yaw wang<>
2721<>6457_7<>nulo<>modeling and analyzing applications with domain-specific languages by reflective rewriting: a case study<>sac<>bow-yaw wang<>
2724<>6457_10<>nulo<>automatic verification of a model checker by reflection<>padl<>bow-yaw wang<>
18096<>6460_1<>chibiao liu<>an analysis of dos attacks on wireless lan<>woc<>james t. yu<>
29468<>6465_0<>sangjin hong:peom park<>effect of robust header compression (rohc) and packet aggregation on multi-hop wireless mesh networks<>IEEEcit<>sangkil jung<>
37247<>6467_0<>yao zhao:david bindel<>towards unbiased end-to-end network diagnosis<>sigcomm<>yan chen<>
37248<>6467_1<>yan gao:zhichun li<>a dos resilient flow-level intrusion detection approach for high-speed networks<>icdcs<>yan chen<>
37256<>6467_9<>pin ren:yan gao:zhichun li:benjamin watson<>idgraphs: intrusion detection and analysis using stream compositing<>cga<>yan chen<>
37260<>6467_13<>robert t. schweller:zhichun li:yan gao:ashish gupta:yin zhang:peter a. dinda:ming-yang kao:gokhan memik<>"reverse hashing for high-speed network monitoring: algorithms, evaluation, and applications."<>infocom<>yan chen<>
37327<>6469_2<>kai hwang<>collaborative detection and filtering of shrew ddos attacks using spectral analysis<>jpdc<>yu chen<>
37284<>6470_0<>w. t. tsai:jerry gao:xiao wei<>testability of software in service-oriented architecture<>compsac<>yinong chen<>
37286<>6470_2<>man wang:zhihui du:zhili cheng<>a soa based pipeline system to deal with astronomy telescope data<>sose<>yinong chen<>
37287<>6470_3<>wei-tek tsai:chun fan:raymond a. paul:jen-yao chung<>architecture classification for soa-based applications<>isorc<>yinong chen<>
37288<>6470_4<>susan b. davidson:yifeng zheng<>an efficient xpath query processor for xml streams<>icde<>yi chen<>
37291<>6470_7<>natalia kwasnikowska:zoe lacroix<>modeling and storing scientific protocols<>otm<>yi chen<>
37292<>6470_8<>hai huang:wei-tek tsai<>binary analysis and automated hot patching for web-based applications<>infsof<>yinong chen<>
37295<>6470_11<>wei-tek tsai:bingnan xiao:raymond a. paul:qian huang<>global software enterprise: a new software constructing architecture<>wecwis<>yinong chen<>
37301<>6470_17<>mark chang:jackson he:w. t. tsai:bingnan xiao<>ucsoa: user-centric service-oriented architecture<>icebe<>yinong chen<>
37303<>6470_19<>bingnan xiao:wei-tek tsai:qian huang:raymond a. paul<>"soa collaboration modeling, analysis, and simulation in psml-c."<>icebe<>yinong chen<>
37304<>6470_20<>wei-tek tsai:yann-hang lee:zhibin cao:bingnan xiao<>rtsoa: real-time service-oriented architecture<>sose<>yinong chen<>
37307<>6470_23<>steven bird:susan b. davidson:haejoong lee:yifeng zheng<>designing and evaluating an xpath dialect for linguistic queries<>icde<>yi chen<>
37309<>6470_25<>w. t. tsai:miroslaw malek:farokh b. bastani<>perspectives on service-oriented computing and service-oriented system engineering<>sose<>yinong chen<>
37313<>6470_29<>wei-tek tsai:chun fan:raymond a. paul<>a service-oriented modeling and simulation framework for rapid development of distributed applications<>simpra<>yinong chen<>
37315<>6470_31<>wei-tek tsai:qian huang:bingnan xiao<>verification framework for dynamic collaborative services in service-oriented architecture<>qsic<>yinong chen<>
37319<>6470_35<>xinyu zhou:wei-tek tsai:xiao wei:bingnan xiao<>pi4soa: a policy infrastructure for verification and control of service collaboration<>icebe<>yinong chen<>
37323<>6470_39<>wei hao:tong gao:i-ling yen:raymond a. paul<>an infrastructure for web services migration for real-time applications<>sose<>yinong chen<>
37268<>6471_2<>carlos lopez<>using object and trajectory analysis to facilitate indexing and retrieval of video<>kbs<>yi-ping phoebe chen<>
37269<>6471_3<>qingfeng chen<>analyzing inconsistency toward enhancing integration of biological molecular databases<>apbc<>yi-ping phoebe chen<>
37270<>6471_4<>dian tjondronegoro:binh pham<>extensible detection and indexing of highlight events in broadcasted sports video<>acsc<>yi-ping phoebe chen<>
37271<>6471_5<>qingfeng chen:shichao zhang:chengqi zhang<>detecting collusion attacks in security protocols<>apweb<>yi-ping phoebe chen<>
37273<>6471_7<>jiyuan an<>finding short patterns to classify text documents<>webi<>yi-ping phoebe chen<>
37274<>6471_8<>jiyuan an<>a similarity search algorithm to predict protein structures<>kes<>yi-ping phoebe chen<>
37278<>6471_12<>qingfeng chen:chengqi zhang:lianggang li<>mining frequent itemsets for protein kinase regulation<>pricai<>yi-ping phoebe chen<>
37337<>6475_0<>karthik nandakumar:anil k. jain:sarat c. dass<>quality-based score level fusion in multibiometric systems<>icpr<>yi chen<>
37340<>6475_3<>julian fierrez-aguilar:javier ortega-garcia:anil k. jain<>incorporating image quality in multi-algorithm fingerprint verification<>icb<>yi chen<>
37341<>6475_4<>anil k. jain:meltem demirkus<>pores and ridges: fingerprint matching using level 3 features<>icpr<>yi chen<>
28611<>6476_5<>babak falsafi:phillip b. gibbons:michael kozuch:todd c. mowry:radu teodorescu:anastassia ailamaki:limor fix:gregory r. ganger:bin lin:steven w. schlosser<>log-based architectures for general-purpose monitoring of deployed code<>asplos<>shimin chen<>
28613<>6476_7<>vasileios liaskovitis:phillip b. gibbons:anastassia ailamaki:guy e. blelloch:babak falsafi:limor fix:nikos hardavellas:michael kozuch:todd c. mowry:chris wilkerson<>parallel depth first vs. work stealing schedulers on cmp architectures<>spaa<>shimin chen<>
28614<>6478_0<>robert f. murphy<>a graphical model approach to automated classification of protein subcellular location patterns in multi-cell images<>bmcbi<>shann-ching chen<>
28599<>6480_0<>lei guo:xiaodong zhang<>design and evaluation of a scalable and reliable p2p assisted proxy for on-demand streaming media delivery<>tkde<>songqing chen<>
28604<>6480_5<>lei guo:enhua tan:zhen xiao:oliver spatscheck:xiaodong zhang<>delving into internet streaming media delivery: a quality and resource utilization perspective<>imc<>songqing chen<>
28543<>6490_4<>kasturi chatterjee:khalid saleem:na zhao:min chen:shahid hamid<>modeling methodology for component reuse and system integration for hurricane loss projection application<>iri<>shu-ching chen<>
28550<>6490_11<>mei-ling shyu:min chen:chengcui zhang:chi-min shu<>probabilistic semantic network-based image retrieval using mmm and relevance feedback<>mta<>shu-ching chen<>
28561<>6490_22<>hongli luo:mei-ling shyu<>an optimal resource utilization scheme with end-to-end congestion control for continuous media stream transmission<>cn<>shu-ching chen<>
28573<>6490_34<>thiago quirino:zongxing xie:mei-ling shyu:liwu chang<>collateral representative subspace projection modeling for supervised classification<>ictai<>shu-ching chen<>
28577<>6490_38<>mei-ling shyu<>introduction to the special issue on multimedia databases<>is<>shu-ching chen<>
28583<>6490_44<>min chen:chengcui zhang:mei-ling shyu<>exciting event detection using multi-level multimodal descriptors and data classification<>ism<>shu-ching chen<>
28590<>6490_51<>liang-jie zhang<>introduction to the special issue on ieee multimedia software engineering 2004<>mms<>shu-ching chen<>
28591<>6490_52<>keqi zhang:peter singh:khalid saleem:na zhao<>a 3d visualization system for hurricane storm-surge flooding<>cga<>shu-ching chen<>
25517<>6495_5<>insup lee:george j. pappas:rance cleaveland:john hatcliff:bruce h. krogh:harvey rubin:lui sha<>high-confidence medical device software and systems<>computer<>peter lee<>
9849<>6496_12<>ju wang:esther a. hughes<>efficient route establishment and maintenance in wireless sensor networks with mobile base stations<>ACMse<>hongsik choi<>
25546<>6501_0<>hagit shatkay<>bntagger: improved tagging snp selection using bayesian networks<>ismb<>phil hyoun lee<>
9850<>6503_0<>vu-duc ngo:huy nam nguyen:younghwan bae:hanjin cho<>throughput aware mapping for network on chip design of h.264 decoder<>ispa<>hae-wook choi<>
9853<>6503_3<>vu-duc ngo:huy nam nguyen<>the optimum network on chip architectures for video object plane decoder design<>ispa<>hae-wook choi<>
9857<>6504_1<>patrick traynor:guohong cao:sencun zhu:tom la porta<>establishing pair-wise keys in heterogeneous sensor networks<>infocom<>heesook choi<>
4027<>6505_0<>katharine s. willis<>modeling context aware interaction for wayfinding using mobile devices<>mhci<>chao li<>
4028<>6505_1<>nulo<>"user preferences, information transactions and location-based services: a study of urban pedestrian wayfinding."<>urban<>chao li<>
32871<>6506_6<>hwann-tzong chen:chiou-shann fuh<>segmenting highly articulated video objects with weak-prior random forests<>eccv<>tyng-luh liu<>
32877<>6506_12<>tien-lung chang:jen-hui chuang<>direct energy minimization for super-resolution on nonlinear manifolds<>eccv<>tyng-luh liu<>
32841<>6508_0<>bin gao:wei-ying ma<>star-structured high-order heterogeneous data co-clustering based on consistent information theory<>icdm<>tie-yan liu<>
32842<>6508_1<>guang feng:xu-dong zhang:wei-ying ma<>level-biased statistics in the hierarchical structure of the web<>pakdd<>tie-yan liu<>
32850<>6508_9<>guang feng:ying wang:ying bao:zhiming ma:xu-dong zhang:wei-ying ma<>aggregaterank: bringing order to web sites<>sigir<>tie-yan liu<>
32855<>6508_14<>qiankun zhao:sourav s. bhowmick:wei-ying ma<>event detection from evolution of click-through data<>kdd<>tie-yan liu<>
32857<>6508_16<>huai-yuan yang:li gao:wei-ying ma<>heterogeneous information integration in hierarchical text classification<>pakdd<>tie-yan liu<>
32862<>6508_21<>qiankun zhao:steven c. h. hoi:sourav s. bhowmick:michael r. lyu:wei-ying ma<>time-dependent semantic similarity measure of queries using historical click-through data<>www<>tie-yan liu<>
32863<>6508_22<>yunbo cao:jun xu:hang li:yalou huang:hsiao-wuen hon<>adapting ranking svm to document retrieval<>sigir<>tie-yan liu<>
4029<>6511_0<>joseph a. giampapa:katia p. sycara<>bilateral negotiation decisions with uncertain dynamic outside options<>tsmc<>cuihong li<>
32892<>6512_1<>p. viswanath<>opportunistic orthogonal writing on dirty paper<>tit<>tie liu<>
32893<>6512_2<>p. moulin:ralf koetter<>on error exponents of modulo lattice additive noise channels<>tit<>tie liu<>
36084<>6515_5<>nulo<>quality assurance in high volume document digitization: a survey<>dial<>xiaofan lin<>
36088<>6515_9<>yan xiong<>detection and analysis of table of contents based on content association<>ijdar<>xiaofan lin<>
36089<>6515_10<>nulo<>active layout engine: algorithms and applications in variable data printing<>cad<>xiaofan lin<>
36093<>6515_14<>elisa h. barney smith:henry s. baird:william a. barrett:frank le bourgeois:george nagy:steven j. simske<>dial 2004 working group report on acquisition quality control<>dial<>xiaofan lin<>
36047<>6516_0<>kai xu:xiaofang zhou:heng tao shen:ke deng<>a multiresolution terrain model for efficient visualization query processing<>tkde<>xuemin lin<>
36053<>6516_6<>jiefeng cheng:jeffrey xu yu:haixun wang:philip s. yu<>fast computation of reachability labeling for large graphs<>edbt<>xuemin lin<>
36055<>6516_8<>jian pei:yidong yuan:wen jin:martin ester:qing liu:wei wang:yufei tao:jeffrey xu yu:qing zhang<>towards multidimensional subspace skyline analysis<>tods<>xuemin lin<>
36057<>6516_10<>ying zhang:jian xu:flip korn:wei wang<>space-efficient relative error order sketch over data streams<>icde<>xuemin lin<>
36060<>6516_13<>zhihong chong:jeffrey xu yu:zhengjie zhang:wei wang:aoying zhou<>efficient computation of -medians over data streams under memory constraints<>jcst<>xuemin lin<>
36062<>6516_15<>qing liu:yidong yuan:xiaofang zhou:hongjun lu<>summarizing level-two topological relations in large spatial datasets<>tods<>xuemin lin<>
36064<>6516_17<>ke deng:xiaofang zhou:heng tao shen:kai xu<>surface k-nn query processing<>icde<>xuemin lin<>
36068<>6516_21<>peter eades:qing-wen feng:hiroshi nagamochi<>straight-line drawing algorithms for hierarchical graphs and clustered graphs<>algorithmica<>xuemin lin<>
36074<>6516_27<>jian xu:qing zhang:hongjun lu:jeffrey xu yu:xiaofang zhou:yidong yuan<>approximate processing of massive continuous quantile queries over high-speed data streams<>tkde<>xuemin lin<>
36110<>6519_1<>rongmei zhang:chunqiang tang:y. charlie hu:sonia fahmy<>impact of the inaccuracy of distance prediction algorithms on internet applications - an analytical and comparative study<>infocom<>xiaojun lin<>
36115<>6519_6<>rongmei zhang:y. charlie hu:sonia fahmy<>a hierarchical approach to internet distance prediction<>icdcs<>xiaojun lin<>
29157<>6527_0<>ankush mittal:ankur jain:sumit gupta<>high quality compression of educational videos using content-adaptive framework<>accv<>sourabh jain<>
29158<>6527_1<>ankush mittal:sumit gupta:ankur jain<>content-based adaptive compression of educational videos using phase correlation techniques<>mms<>sourabh jain<>
10099<>6531_1<>xinwei li:chaojun liu<>large margin hidden markov models for speech recognition<>taslp<>hui jiang<>
10101<>6532_1<>shudong jin<>scalable and robust aggregation techniques for extracting statistical information in sensor networks<>icdcs<>hongbo jiang<>
28041<>6538_0<>luonan chen:kazuyuki aihara<>synchronizing a multicellular system by external input: an artificial control strategy<>bioinformatics<>ruiqi wang<>
29144<>6539_7<>charles r. mclean<>a concept prototype for integrated gaming and simulation for incident management<>wsc<>sanjay jain<>
10054<>6540_2<>yifeng zhu<>false rate analysis of bloom filter replicas in distributed systems<>icpp<>hong jiang<>
10058<>6540_6<>leen-kiat soh:nobel khandaker<>multiagent coalition formation for computer-supported cooperative learning<>aaai<>hong jiang<>
10062<>6540_10<>feng xian:witawas srisa-an<>evaluating hardware support for reference counting using software configurable processors<>asap<>hong jiang<>
10070<>6540_18<>xiao qin:yifeng zhu:david r. swanson<>improving the performance of i/o-intensive applications on clusters of workstations<>cluster<>hong jiang<>
10071<>6540_19<>feng xian:witawas srisa-an<>service oriented garbage collection: improving performance and robustness of application servers<>oopsla<>hong jiang<>
10072<>6540_20<>j. v. sumanth:david r. swanson<>adaptive load balancing for long-range md simulations in a distributed environment<>icpp<>hong jiang<>
10075<>6540_23<>nader mohamed:jameela al-jaroodi:david r. swanson<>high-performance message striping over reliable transport protocols<>tjs<>hong jiang<>
10076<>6540_24<>ligang he:stephen a. jarvis:daniel p. spooner:donna n. dillenberger:graham r. nudd<>allocating non-real-time and soft real-time jobs in multiclusters<>tpds<>hong jiang<>
10077<>6540_25<>yifeng zhu:xiao qin:dan feng:david r. swanson<>exploiting redundancy to boost performance in a raid-10 style cluster-based file system<>cluster<>hong jiang<>
10078<>6540_26<>xiao qin<>a novel fault-tolerant scheduling algorithm for precedence constrained tasks in real-time heterogeneous systems<>pc<>hong jiang<>
10091<>6540_39<>leen-kiat soh<>commercializing a multiagent-supported collaborative system<>atal<>hong jiang<>
29152<>6543_1<>ramesh c. agarwal:karan gupta:suchitra amalapurapu<>an approximation to the greedy algorithm for differential compression<>ibmrd<>shaili jain<>
29156<>6547_0<>areejit samal:shalini singh:varun giri:sandeep krishna:nandula raghuram<>low degree metabolites explain essential reactions and enhance modularity in biological networks<>bmcbi<>sanjay jain<>
28031<>6548_0<>jie chen:shiguang shan:wen gao<>enhancing training set for face detection<>icpr<>ruiping wang<>
28034<>6548_3<>jie chen:shiguang shan:xilin chen:wen gao<>isomap based on the image euclidean distance<>icpr<>ruiping wang<>
39287<>6550_2<>chi-fu huang:li-chu lo:wen-tsuen chen<>decentralized energy-conserving and coverage-preserving protocols for wireless sensor networks<>tosn<>yu-chee tseng<>
39322<>6550_37<>chih-yu lin:wen-chih peng<>efficient in-network moving object tracking in wireless sensor networks<>tmc<>yu-chee tseng<>
28476<>6553_0<>s. wesley changchien:ru-hui huang<>assessing users' product-specific knowledge for personalization in electronic commerce<>eswa<>shuchih ernest chang<>
28478<>6553_2<>ying-jiun hsieh:chien-wei chen:chun-kuei liao:shiau-ting wang<>location-based services for tourism industry: an empirical study<>uic<>shuchih ernest chang<>
28479<>6553_3<>boris minkin<>the implementation of a secure and pervasive multimodal web system architecture<>infsof<>shuchih ernest chang<>
28473<>6556_5<>jongho park:kangbok lee<>online and semi-online scheduling of two machines under a grade of service provision<>orl<>soo y. chang<>
23045<>6561_2<>angelica caro:coral calero:houari a. sahraoui:ghazwa malak<>a bayesian network to structure a data quality model for web portals<>icsoft<>mario piattini<>
21811<>6562_1<>morihiko tamai:naoki shibata:keiichi yasumoto<>an energy-aware video streaming system for portable computing devices<>mdm<>minoru ito<>
21814<>6562_4<>munenobu nagata:yoshihiro murata:naoki shibata:keiichi yasumoto<>a method to plan group tours with joining and forking<>seal<>minoru ito<>
21819<>6562_9<>takato izaiku:shinya yamamoto:yoshihiro murata:naoki shibata:keiichi yasumoto<>cheat detection for mmorpg on p2p environments<>netgames<>minoru ito<>
40871<>6564_1<>wen gao:feng pan:s. w. ma:k. p. lim:g. n. feng:xiao lin:susanto rahardja:h. q. lu:yan lu<>adaptive rate control for h.264<>jvcir<>z. g. li<>
21820<>6569_0<>mitsuru kawamoto:noboru ohnishi:yujiro inouye<>eigenvector algorithms with reference signals for frequency domain bss<>ica<>masanori ito<>
39077<>6572_3<>kentarou hitomi:tomohiro shibata:shin ishii<>reinforcement learning for quasi-passive dynamic walking of an unstable biped robot<>ras<>yutaka nakamura<>
20698<>6575_7<>khadidjatou ousmanou<>articulation of information requirements for personalised knowledge construction<>re<>lily sun<>
20682<>6576_4<>hua-ming xing:xue-gang chen<>domination in graphs of minimum degree five<>gc<>liang sun<>
40861<>6577_6<>mandar waghmode:weiping shi<>buffer insertion in large circuits with constructive solution search techniques<>dac<>zhuo li<>
40812<>6581_0<>xianlong hong:qiang zhou:jinian bian:hannah honghua yang:vijay pitchumani<>efficient thermal-oriented 3d floorplanning and thermal via planning for two-stacked-die integration<>todaes<>zuoyuan li<>
40814<>6581_2<>xianlong hong:qiang zhou:shan zeng:jinian bian:hannah yang:vijay pitchumani:chung-kuan cheng<>integrating dynamic thermal via planning with 3d floorplanning algorithm<>ispd<>zhuoyuan li<>
1419<>6583_7<>yonit kesten:li-on raviv:elad shahar<>model checking with strong fairness<>fmsd<>amir pnueli<>
39159<>6588_0<>fei lu:xiaochun cao:hassan foroosh<>camera calibration from two shadow trajectories<>icpr<>yuping shen<>
39160<>6588_1<>fei lu:xiaochun cao:hassan foroosh<>video completion for perspective camera under constrained motion<>icpr<>yuping shen<>
39141<>6596_0<>pamela c. cosman:laurence b. milstein<>video coding with fixed-length packetization for a tandem channel<>tip<>yushi shen<>
39143<>6596_2<>pamela c. cosman:laurence b. milstein<>error-resilient video communications over cdma networks with a bandwidth constraint<>tip<>y. shen<>
41172<>6600_1<>zhiping shi:qingyong li:zhiwei shi<>semantics supervised cluster-based index for video databases<>civr<>zhongzhi shi<>
7115<>6601_0<>shoulun long:josef pieprzyk:huaxiong wang<>generalised cumulative arrays in secret sharing<>dcc<>duncan s. wong<>
7116<>6601_1<>zhenfeng zhang:jing xu:dengguo feng<>certificateless public-key signature: security model and efficient construction<>acns<>duncan s. wong<>
7121<>6601_6<>guomin yang:xiaotie deng:huaxiong wang<>anonymous signature schemes<>pkc<>duncan s. wong<>
7130<>6601_15<>joseph k. liu:willy susilo<>ring signature with designated linkability<>iwsec<>duncan s. wong<>
7132<>6601_17<>bessie c. hu:zhenfeng zhang:xiaotie deng<>key replacement attack against a generic construction of certificateless signature<>acisp<>duncan s. wong<>
7133<>6601_18<>man ho au:joseph k. liu:tsz hon yuen<>id-based ring signature scheme secure in the standard model<>iwsec<>duncan s. wong<>
7134<>6601_19<>joseph k. liu<>enhanced security models and a generic construction approach for linkable ring signature<>ijfcs<>duncan s. wong<>
7139<>6601_24<>guomin yang:huaxiong wang:xiaotie deng<>formal analysis and systematic construction of two-factor authentication scheme (short paper)<>icics<>duncan s. wong<>
7142<>6601_27<>reihaneh safavi-naini:huaxiong wang<>resilient lkh: secure multicast key distribution schemes<>ijfcs<>duncan s. wong<>
7150<>6601_35<>xiaojian tian<>session corruption attack and improvements on encryption based mt-authenticators<>ctrsa<>duncan s. wong<>
13352<>6603_0<>guorong xuan:yun q. shi:cong huang:dongdong fu:xiuming zhu:peiqi chai<>steganalysis using high-dimensional features derived from co-occurrence matrix and class-wise non-principal components analysis (cnpca)<>iwdw<>jianjiong gao<>
13354<>6603_2<>guorong xuan:qiuming yao:chengyun yang:peiqi chai:yun q. shi:zhicheng ni<>lossless data hiding using histogram shifting method based on integer wavelets<>iwdw<>jianjiong gao<>
13356<>6604_0<>yue wang:joseph s. b. mitchell<>boundary recognition in sensor networks by topological methods<>mobicom<>jie gao<>
13364<>6604_8<>qing fang:leonidas j. guibas<>landmark-based information storage and retrieval in sensor networks<>infocom<>jie gao<>
13365<>6604_9<>li zhang<>load-balanced short-path routing in wireless networks<>tpds<>jie gao<>
13372<>6604_16<>rik sarkar:xianjin zhu<>double rulings for information brokerage in sensor networks<>mobicom<>jie gao<>
13375<>6604_19<>michael langberg:leonard j. schulman<>analysis of incomplete data and an intrinsic-dimension helly theorem<>soda<>jie gao<>
13380<>6604_24<>leonidas j. guibas:an thai nguyen<>deformable spanners and applications<>comgeo<>jie gao<>
41167<>6606_7<>hai yan<>studying software implementations of elliptic curve cryptography<>itng<>zhijie jerry shi<>
13393<>6609_3<>markus glatter:jian huang:colin mollenhour<>scalable data servers for large multivariate volume visualization<>tvcg<>jinzhu gao<>
13395<>6609_5<>xiaohui cui:thomas e. potok<>a flocking based algorithm for document clustering analysis<>jsa<>jinzhu gao<>
13397<>6609_7<>qishi wu:mengxia zhu<>a scalable framework for distributed virtual reality using heterogeneous processors<>icat<>jinzhu gao<>
13402<>6610_0<>akio kosaka:avinash c. kak<>a multi-kalman filtering approach for video tracking of human-delineated objects in cluttered environments<>cviu<>jean gao<>
7444<>6614_4<>jiayuan huang:tingshao zhu:russell greiner:dale schuurmans<>information marginalization on subgraphs<>pkdd<>dengyong zhou<>
7451<>6615_2<>bingjun sun:hongyuan zha:john yen<>multi-task text segmentation and alignment based on weighted mutual information<>cikm<>ding zhou<>
7452<>6615_3<>yang song:jian huang:isaac g. councill:hongyuan zha:c. lee giles<>boosting the feature space: text classification for unstructured data on the web<>icdm<>ding zhou<>
7455<>6615_6<>eren manavoglu:jia li:c. lee giles:hongyuan zha<>probabilistic models for discovering e-communities<>www<>ding zhou<>
4809<>6623_0<>himanshu jain:franjo ivancic:aarti gupta:ilya shlyakhter<>using statically computed invariants inside the predicate abstraction and refinement loop<>cav<>chao wang<>
4812<>6623_3<>aarti gupta:malay k. ganai<>predicate learning and selective theory deduction for a difference logic solver<>dac<>chao wang<>
4815<>6623_6<>zijiang yang:franjo ivancic:aarti gupta<>whodunit? causal analysis for counterexamples<>atva<>chao wang<>
4816<>6623_7<>bing li:hoonsang jin:gary d. hachtel:fabio somenzi<>improving ariadne's bundle by following multiple threads in abstraction refinement<>tcad<>chai wang<>
4817<>6623_8<>zijiang yang:franjo ivancic:aarti gupta<>disjunctive image computation for embedded software verification<>date<>chao wang<>
4818<>6623_9<>roderick bloem:gary d. hachtel:kavita ravi:fabio somenzi<>compositional scc analysis for language emptiness<>fmsd<>chao wang<>
4824<>6623_15<>zijiang yang:aarti gupta:franjo ivancic<>mixed symbolic representations for model checking software programs<>memocode<>chao wang<>
4827<>6624_1<>li xiao<>locating sensors in concave areas<>infocom<>chen wang<>
4831<>6624_5<>brian d. connelly:christopher w. bowron:li xiao:pang-ning tan<>adaptively routing p2p queries using association analysis<>icpp<>chen wang<>
32686<>6627_4<>hsin-ju lu<>efficient h.264 encoding based on skip mode early termination<>psivt<>tien-ying kuo<>
31624<>6630_0<>k. c. tam:c. k. tse<>fast analytical approach to finding steady-state waveforms for power electronics circuits using orthogonal polynomial basis functions<>iscas<>s. c. wong<>
31633<>6632_0<>jodi james:todd ingalls:gang qian:loren olson:daniel whiteley:thanassis rikakis<>movement-based interactive dance performance<>mm<>siew wong<>
31630<>6633_0<>kwan-yee kenneth wong:roberto cipolla<>robust appearance-based tracking using a sparse bayesian classifier<>icpr<>shu-fai wong<>
31631<>6633_1<>roberto cipolla<>continuous gesture recognition using a sparse bayesian classifier<>icpr<>shu-fai wong<>
31610<>6634_1<>petros zerfos:xiaoqiao meng:vidyut samanta:songwu lu<>a study of the short message service of a nationwide cellular network<>imc<>starsky h. y. wong<>
31605<>6635_4<>richard m. crowder:nigel r. shadbolt:gary b. wills<>knowledge management for a large service-oriented corporation<>pakm<>sylvia c. wong<>
31607<>6635_6<>richard m. crowder:gary b. wills<>on a service-oriented approach for an engineering knowledge desktop<>www<>sylvia c. wong<>
33233<>6643_1<>anup basu<>iterative estimation of 3d transformations for object alignment<>isvc<>tao wang<>
33234<>6643_2<>anup basu<>automatic estimation of 3d transformations using skeletons for object alignment<>icpr<>tao wang<>
33235<>6644_0<>cheng li<>sample rate conversion technology in software defined radio<>ccece<>tianqi wang<>
19787<>6646_0<>toshiharu imai<>the concept of memory-based thread execution by highly functional memory controller<>pdpta<>kiyofumi tanaka<>
19788<>6646_1<>akira imai<>adaptive dynamic voltage scaling for real-time systems<>csreaESA<>kiyofumi tanaka<>
1116<>6653_9<>lee momtahan:a. w. roscoe<>a taxonomy of web services using csp<>entcs<>andrew martin<>
4256<>6658_1<>genki cho<>practical 3-d shape measurement using optimal intensity-modulated projection and intensity-phase analysis techniques<>icpr<>cunwei lu<>
4263<>6660_4<>arnold p. boedihardjo:jinping zheng<>aitvs: advanced interactive traffic visualization system<>icde<>chang-tien lu<>
4270<>6660_11<>yufeng kou:dechang chen<>spatial weighted outlier detection<>sdm<>chang-tien lu<>
4277<>6662_1<>graham d. finlayson:steven d. hordley:mark s. drew<>on the removal of shadows from images<>pami<>cheng lu<>
41526<>6666_2<>hongji yang:william c. chu<>extracting reusable object-oriented legacy code segments with combined formal concept analysis and slicing techniques for service integration<>qsic<>zhuopeng zhang<>
41529<>6666_5<>jian kang:hongji yang<>uml modelling web applications via formal concept analysis<>seke<>zhuopeng zhang<>
41507<>6668_1<>chi ma:yuanyuan yang<>battery-aware router scheduling in wireless mesh networks<>ipps<>zhenghao zhang<>
41513<>6668_7<>yuanyuan yang<>wdm optical interconnects with recirculating buffering and limited range wavelength conversion<>tpds<>zhenghao zhang<>
41516<>6668_10<>yuanyuan yang<>optimal scheduling in buffered wdm interconnects with limited range wavelength conversion capability<>tc<>zhenghao zhang<>
41518<>6668_12<>lin liu:yuanyuan yang<>slotted optical burst switching (sobs) networks<>nca<>zhenghao zhang<>
41519<>6668_13<>yuanyuan yang<>enhancing downlink performance in wireless networks by simultaneous multiple packet transmission<>ipps<>zhenghao zhang<>
41451<>6673_12<>sanghwan lee:sambit sahu:debanjan saha<>on suitability of euclidean embedding of internet hosts<>sigmetrics<>zhi-li zhang<>
41464<>6673_25<>teng fei:shu tao:lixin gao:roch guerin<>light-weight overlay path selection in a peer-to-peer environment<>infocom<>zhi-li zhang<>
41413<>6674_3<>gang hua:zicheng liu:ying wu<>automatic business card scanning with a camera<>icip<>zhengyou zhang<>
41424<>6674_14<>chunhui zhang:jian wang:shi han:mo yi<>automatic real-time barcode localization in complex scenes<>icip<>zhengyou zhang<>
41427<>6674_17<>gang hua:zicheng liu:ying wu<>iterative local-global energy minimization for automatic extraction of objects of interest<>pami<>zhengyou zhang<>
3689<>6675_25<>nulo<>reasoning about partial functions in the formal development of programs<>entcs<>cliff b. jones<>
1876<>6684_13<>nir ailon<>information theory in property testing and monotonicity testing in higher dimension<>iandc<>bernard chazelle<>
1903<>6684_40<>nir ailon<>approximate nearest neighbors and the fast johnson-lindenstrauss transform<>stoc<>bernard chazelle<>
1973<>6684_110<>c. seshadhri<>online geometric reconstruction<>compgeom<>bernard chazelle<>
36901<>6685_0<>david s. skibbe:xiujuan wang:lisa a. borsuk:dan nettleton:patrick s. schnable<>scanning microarrays at multiple intensities enhances discovery of differentially expressed genes<>bioinformatics<>xuefeng zhao<>
36899<>6688_0<>kevin borders:atul prakash<>siren: catching evasive malware (short paper)<>sp<>xin zhao<>
36886<>6692_1<>quan long:zongyan qiu<>model checking dynamic uml consistency<>icfem<>xiangpeng zhao<>
36888<>6692_3<>hongli yang:zongyan qiu<>towards the formal model and verification of web service choreography description language<>wsfm<>xiangpeng zhao<>
36890<>6692_5<>hongli yang:zongyan qiu:chao cai:geguang pu<>type checking choreography description language<>icfem<>xiangpeng zhao<>
36891<>6692_6<>geguang pu:shuling wang:zongyan qiu<>towards the semantics and verification of bpel4ws<>entcs<>xiangpeng zhao<>
4986<>6693_0<>howard c. elman<>analysis and comparison of geometric and algebraic multigrid for convection-diffusion equations<>siamsc<>chin-tien wu<>
18466<>6702_0<>joseph kee-yin ng<>algorithm selectors for providing location estimation services within a cellular radio network<>rtcsa<>junyang zhou<>
18469<>6702_3<>joseph kee-yin ng<>a selector method for providing mobile location estimation services within a radio cellular network<>IEEEares<>junyang zhou<>
18478<>6703_0<>hong-jian lai:yehong shao:hehui wu<>"every 3-connected, essentially 11-connected line graph is hamiltonian."<>jct<>ju zhou<>
11659<>6705_1<>david wu:damian m. tan:marilyn baird:john decampo:chris white<>perceptually lossless medical image coding<>tmi<>hong ren wu<>
5652<>6706_1<>santosh n. kabadi<>an improved algorithm for decomposing arc flows into multipath flows<>orl<>donglei du<>
5653<>6706_2<>dachuan xu<>the -level facility location game<>orl<>donglei du<>
5655<>6706_4<>r. chandrasekaran<>the multiroute maximum flow problem revisited<>networks<>donglei du<>
5658<>6706_7<>zhonghang xia:i-ling yen:peng li<>an integrated admission control scheme for the delivery of streaming media<>jpdc<>donglei du<>
11661<>6708_0<>ji chen:arjan durresi:huaibei zhou<>automatic geometry-driven ofdm quality-of-service analysis for indoor environments<>join<>hsiao-chun wu<>
18408<>6710_5<>kui ren:wenjing lou:kai zeng:feng bao:robert h. deng<>routing optimization security in mobile ipv6<>cn<>jianying zhou<>
18417<>6710_14<>shane balfe:shiqun li<>pervasive trusted computing<>secperu<>jianying zhou<>
18431<>6710_28<>shiqun li:shane balfe:kefei chen<>enforcing trust in pervasive computing with trusted computing technology<>critis<>jianying zhou<>
18434<>6710_31<>min-hua shao:guilin wang<>some common attacks against certified email protocols and the countermeasures<>comcom<>jianying zhou<>
18436<>6710_33<>feng bao:robert h. deng<>minimizing ttp's involvement in signature validation<>ijisec<>jianying zhou<>
18437<>6710_34<>guilin wang:feng bao<>the fairness of perfect concurrent signatures<>icics<>jianying zhou<>
18440<>6710_37<>tanmoy kanti das:subhamoy maitra<>cryptanalysis of chu's dct based watermarking scheme<>tmm<>jianying zhou<>
18446<>6710_43<>michal ren:tanmoy kanti das<>diverging keys in wireless sensor networks<>isw<>jianying zhou<>
11657<>6711_2<>qiong luo:wenwei xue<>distributed cross-layer scheduling for in-network sensor query processing<>percom<>hejun wu<>
18396<>6712_3<>zhengrong ji:rajive bagrodia<>twine: a hybrid emulation testbed for wireless networks and applications<>infocom<>junlan zhou<>
18398<>6712_5<>zhengrong ji:mineo takai:rajive bagrodia<>improving scalability of wireless network simulation with bounded inaccuracies<>tomacs<>junlan zhou<>
11654<>6713_2<>yiu-ming cheung<>public authentication of 3d mesh models<>webi<>hao-tian wu<>
18459<>6714_1<>kendra cooper:i-ling yen:john linn:raymond a. paul<>a software enhancement system for embedded software development<>isorc<>jia zhou<>
18462<>6714_4<>hui ma:i-ling yen:kendra cooper<>qos analysis for component-based embedded software: model and methodology<>jss<>jia zhou<>
18463<>6718_0<>ying cai<>an overlay subscription network for live internet tv broadcast<>tkde<>jianming zhou<>
31378<>6720_0<>i.-c. lin:narayanan vijaykrishnan:n. dhanwada<>transaction level error susceptibility model for bus based soc architectures<>isqed<>s. srinivasan<>
31382<>6720_4<>prasanth mangalagiri:yuan xie:narayanan vijaykrishnan:karthik sarpatwari<>flaw: fpga lifetime awareness<>dac<>suresh srinivasan<>
31387<>6723_4<>roma kane:panagiotis manolios<>monolithic verification of deep pipelines with collapsed flushing<>date<>sudarshan k. srinivasan<>
37737<>6725_0<>jing wang:shoubao yang:leitao guo<>fcan: a structured p2p system based on content query<>gcc<>ying gao<>
37549<>6728_0<>dharma p. agrawal<>distributed pairwise key establishment in wireless sensor networks<>csreaPSC<>yi cheng<>
37550<>6728_1<>dharma p. agrawal<>energy efficient session key establishment in wireless sensor networks<>icwn<>yi cheng<>
37566<>6733_1<>weihua zhuang<>dynamic inter-sla resource sharing in path-oriented differentiated services networks<>ton<>yu cheng<>
37568<>6733_3<>wei song:weihua zhuang:alberto leon-garcia:rose hu<>efficient resource allocation for policy-based wireless/wireline interworking<>monet<>yu cheng<>
29734<>6749_3<>anish arora:murat demirbas<>resettable vector clocks<>jpdc<>sandeep s. kulkarni<>
29735<>6749_4<>mahesh arumugam:limin wang<>a case study on prototyping power management protocols for sensor networks<>sss<>sandeep s. kulkarni<>
29743<>6749_12<>mahesh arumugam<>"transformations for write-all-with-collision model."<>comcom<>sandeep s. kulkarni<>
29749<>6749_18<>mohamed g. gouda:anish arora<>secret instantiation in ad-hoc networks<>comcom<>sandeep s. kulkarni<>
37722<>6750_4<>nulo<>on the threshold of having a linear treewidth in random graphs<>cocoon<>yong gao<>
37704<>6753_0<>conrad sanderson:samy bengio<>on transforming statistical models for non-frontal face verification<>pr<>yongsheng gao<>
37705<>6753_1<>richard yang<>line-based affine invariant object location using transformation space decomposition<>icpr<>yongsheng gao<>
37710<>6753_6<>sanqiang zhao<>automated face pose estimation using elastic energy models<>icpr<>yongsheng gao<>
37716<>6753_12<>bai-ling zhang:clement leung<>face recognition by combining kernel associative memory and gabor transforms<>icpr<>yongsheng gao<>
2817<>6756_3<>paul scerri:katia sycara:yang xu:michael lewis<>scalable and reliable data delivery in mobile ad hoc sensor networks<>atal<>bin yu<>
2818<>6756_4<>sean owens:paul scerri:robin glinton:katia sycara<>synergistic integration of agent technologies for military simulation<>atal<>bin yu<>
2810<>6757_9<>peng zhao<>on model selection consistency of lasso<>jmlr<>bin yu<>
2813<>6757_12<>jianfeng gao:hisami suzuki<>approximation lasso methods for language modeling<>acl<>bin yu<>
2837<>6759_9<>seon ho kim<>interpolating and using most likely trajectories in moving-objects databases<>dexa<>byunggu yu<>
2838<>6759_10<>nulo<>a spatiotemporal uncertainty model of degree 1.5 for continuously changing data objects<>sac<>byunggu yu<>
19330<>6761_3<>zhe wei:canhui cai<>h.264-based multiple description video coder and its dsp implementation<>icip<>kai-kuang ma<>
32501<>6763_9<>tokuro matsuo:toramatsu shintani<>an approach to detecting shill-biddable allocations in combinatorial auctions<>deec<>takayuki ito<>
32507<>6763_15<>naoki fukuta<>towards better approximation of winner determination for combinatorial auctions with large number of bids<>iat<>takayuki ito<>
32511<>6763_19<>mark klein:hiromitsu hattori<>a negotiation protocol for agents with nonlinear utility functions<>aaai<>takayuki ito<>
32517<>6764_4<>erik d. demaine:xiao zhou:takao nishizeki<>approximability of partitioning graphs with supply and demand<>isaac<>takehiro ito<>
32518<>6764_5<>xiao zhou:takao nishizeki<>partitioning a graph of bounded tree-width to connected subgraphs of almost uniform size<>jda<>takehiro ito<>
32521<>6764_8<>kazuya goto:xiao zhou:takao nishizeki<>partitioning a multi-weighted graph to connected subgraphs of almost uniform size<>cocoon<>takehiro ito<>
11515<>6767_0<>ji zhang:qigang gao<>discover gene specific local co-regulations using progressive genetic algorithm<>ictai<>hai wang<>
11517<>6767_2<>ji zhang:qigang gao<>a novel method for detecting outlying subspaces in high-dimensional databases using genetic algorithm<>icdm<>hai wang<>
11523<>6767_8<>ji zhang<>"detecting outlying subspaces for high-dimensional data: the new task, algorithms, and performance."<>kais<>hai wang<>
40809<>6768_1<>xiaofang zhou:heng tao shen:dawei song<>3d protein structure matching by patch signatures<>dexa<>zi huang<>
40796<>6771_11<>giorgos flouris:jeff z. pan:dimitris plexousakis:holger wache<>"inconsistencies, negations and changes in ontologies."<>aaai<>zhisheng huang<>
40801<>6771_16<>guus schreiber:alia amin:mark van assem:viktor de boer:lynda hardman:michiel hildebrand:laura hollink:janneke van kersen:marco de niet:borys omelayenko:jacco van ossenbruggen:ronny siebes:jos taekema:jan wielemaker:bob j. wielinga<>multimedian e-culture demonstrator<>semweb<>zhisheng huang<>
11503<>6772_3<>jun li:wei-yun yau<>constrained nonlinear models of fingerprint orientations with prediction<>pr<>han wang<>
11505<>6772_5<>jun li:wei-yun yau<>fingerprint indexing based on symmetrical measurement<>icpr<>han wang<>
11511<>6772_11<>nan liu<>feature extraction with genetic algorithms based nonlinear principal component analysis for face recognition<>icpr<>han wang<>
40766<>6773_8<>christian s. jensen:hua lu:beng chin ooi<>skyline queries against mobile lightweight devices in manets<>icde<>zhiyong huang<>
40770<>6773_12<>chong leng goh:yanfeng shu:beng chin ooi<>dynamic buffer management with extensible replacement policies<>vldb<>zhiyong huang<>
40783<>6773_25<>chen chen:hang yu:ee-chien chang<>progressive transmission and rendering of foveated volume data<>grapp<>zhiyong huang<>
11540<>6774_1<>tsai-yen li:carolyn penstein rose:chun-chieh huang:chun-yen chang<>vibrant: a brainstorming agent for computer supported creative problem solving<>its<>hao-chuan wang<>
11541<>6774_2<>tsai-yen li:chun-yen chang<>a web-based tutoring system with styles-matching strategy for spatial geometric transformation<>iwc<>hao-chuan wang<>
11533<>6776_3<>sam kwong:chi-wah kok<>effectively detecting all-zero dct blocks for h.264 optimization<>icip<>hanli wang<>
11534<>6776_4<>sam kwong:chi-wah kok<>efficient prediction algorithm of integer dct coefficients for h.264/avc optimization<>tcsv<>hanli wang<>
11536<>6777_0<>peng liu<>modeling and evaluating the survivability of an intrusion tolerant database system<>esorics<>hai wang<>
11572<>6778_2<>sotirios a. tsaftaris:aggelos k. katsaggelos<>joint source-channel coding for wireless object-based video communications utilizing data hiding<>tip<>haohong wang<>
11573<>6778_3<>dalei wu:song ci<>cross-layer design for multimedia delivery over wireless networks<>ism<>haohong wang<>
11555<>6779_6<>shih-sian cheng:yi-hsiang chao:hsin-chia fu<>a prototypes-embedded genetic k-means algorithm<>icpr<>hsin-min wang<>
11558<>6779_9<>hung-ming yu:wei-ho tsai<>a music retrieval system based on query-by-singing for karaoke jukebox<>airs<>hsin-min wang<>
11560<>6779_11<>wei-ho tsai<>automatic singer recognition of popular music recordings via estimation and modeling of solo vocal signals<>taslp<>hsin-min wang<>
11563<>6779_14<>jen-wei kuo<>a minimum boundary error framework for automatic phonetic segmentation<>iscslp<>hsin-min wang<>
11564<>6779_15<>yi-ting chen:suhan yu:berlin chen<>extractive chinese spoken document summarization using probabilistic ranking models<>iscslp<>hsin-min wang<>
11565<>6779_16<>yi-hsiang chao:ruei-chuan chang<>a novel alternative hypothesis characterization using kernel classifiers for llr-based speaker verification<>iscslp<>hsin-min wang<>
767<>6784_0<>ankush mittal:sourabh jain:sumit gupta<>high quality compression of educational videos using content-adaptive framework<>accv<>ankur jain<>
768<>6784_1<>ankush mittal:sumit gupta:sourabh jain<>content-based adaptive compression of educational videos using phase correlation techniques<>mms<>ankur jain<>
763<>6785_0<>gang wu:amir rahimi:edward y. chang:kingshy goh:tomy tsai:yuan-fang wang<>identifying color in motion in video sensors<>cvpr<>ankur jain<>
764<>6785_1<>dan kopell:kyle kakligian:yuan-fang wang<>using stationary-dynamic camera assemblies for wide-area video surveillance and selective attention<>cvpr<>ankur jain<>
759<>6787_1<>marius pasca:dekang lin:jeffrey bigham:andrei lifchits<>names and similarities on the web: fact extraction in the fast lane<>acl<>alpa jain<>
757<>6788_0<>marius pasca:dekang lin:jeffrey bigham:andrei lifchits<>organizing and searching the world wide web of facts - step one: the one-million fact extraction challenge<>aaai<>alpa jain<>
750<>6789_2<>lawrence s. hon<>a deterministic motif finding algorithm with application to the human genome<>bioinformatics<>ajay n. jain<>
756<>6789_8<>barbara a. novak<>pathway recognition and augmentation by computational analysis of microarray expression data<>bioinformatics<>ajay n. jain<>
11577<>6790_0<>peihua li:tianwen zhang<>histogram features-based fisher linear discriminant for face detection<>accv<>haijing wang<>
11584<>6791_2<>ronny r. dakdouk:semih salihoglu:haiyong xie:yang richard yang<>interdomain routing as social choice<>icdcsw<>hao wang<>
11585<>6791_3<>haiyong xie:lili qiu:yang richard yang:yin zhang:albert g. greenberg<>cope: traffic engineering in dynamic networks<>sigcomm<>hao wang<>
11601<>6802_1<>edwin r. hancock<>probabilistic relaxation using the heat equation<>icpr<>hongfang wang<>
11602<>6802_2<>edwin r. hancock<>a graph spectral approach to consistent labelling<>iciar<>hongfang wang<>
40080<>6810_1<>zhi-hua zhou<>a new approach to estimating the expected first hitting time of evolutionary algorithms<>aaai<>yang yu<>
22178<>6812_0<>mukta prasad:andrew zisserman:andrew w. fitzgibbon:philip h. s. torr<>learning class-specific edges for object detection and segmentation<>icvgip<>m. pawan kumar<>
22180<>6812_2<>philip h. s. torr:andrew zisserman<>solving markov random fields using second order cone programming relaxations<>cvpr<>m. pawan kumar<>
22181<>6812_3<>philip h. s. torr<>fast memory-efficient generalized belief propagation<>eccv<>m. pawan kumar<>
9100<>6825_0<>ralph highnam:xiabo pan:ruth warren:mona jeffreys:michael brady<>breast composition measurements using retrospective standard mammogram form (smf)<>mammo<>george davey smith<>
21<>6826_1<>elad hazan:satyen kale:robert e. schapire<>algorithms for portfolio management based on the newton method<>icml<>amit agarwal<>
22<>6826_2<>elad hazan:adam kalai:satyen kale<>logarithmic regret algorithms for online convex optimization<>colt<>amit agarwal<>
8<>6830_0<>selcuk colak:enes eryarsoy<>improvement heuristic for the flow-shop scheduling problem: an adaptive-learning approach<>eor<>anurag agarwal<>
9<>6830_1<>selcuk colak:varghese s. jacob:hasan pirkul<>heuristics and augmented neural networks for task scheduling with non-identical machines<>eor<>anurag agarwal<>
9080<>6831_15<>tim mccomb<>compositional class refinement in object-z<>fm<>graeme smith<>
9085<>6831_20<>john derrick<>verifying data refinements using a model checker<>fac<>graeme smith<>
0<>6833_0<>andrew blake<>the panum proxy algorithm for dense stereo matching over a volume of interest<>cvpr<>ankur agarwal<>
2<>6833_2<>bill triggs<>a local basis representation for estimating human pose from cluttered images<>accv<>ankur agarwal<>
5<>6833_5<>bill triggs<>recovering 3d human pose from monocular images<>pami<>ankur agarwal<>
26<>6834_0<>soumen chakrabarti<>learning parameters in entity relationship graphs from ranking preferences<>pkdd<>alekh agarwal<>
27<>6834_1<>soumen chakrabarti:sunny aggarwal<>learning to rank networked entities<>kdd<>alekh agarwal<>
35348<>6836_0<>richard f. riesenfeld:elaine cohen<>degree reduction for nurbs symbolic computation on curves<>smi<>xianming chen<>
38132<>6837_0<>gregory t. byrd<>high-throughput sketch update on a low-power stream processor<>ancs<>yu-kuen lai<>
35353<>6839_3<>yi-fang brook wu:quanzhi li:razvan stefan bot<>finding nuggets in documents: a machine learning approach<>jasis<>xin chen<>
35357<>6839_7<>yi-fang wu<>personalized knowledge discovery: mining novel association rules from text<>sdm<>xin chen<>
35360<>6840_1<>lan liu:zheng liu:tao jiang<>on the minimum common integer partition problem<>ciac<>xin chen<>
35361<>6840_2<>zheng fu:vladimir vacic:peng nan:yang zhong:tao jiang<>a parsimony approach to genome-wide ortholog assignment<>recomb<>xin chen<>
35366<>6840_7<>haifeng li:keshu zhang:tao jiang<>a general framework for biclustering gene expression data<>jbcb<>xin chen<>
35342<>6841_0<>takuma kimura<>finite element surface fitting for bridge management<>ijitdm<>xiaojun chen<>
7413<>6845_2<>wee sun lee<>learning to separate text content and style for classification<>airs<>dell zhang<>
7417<>6845_6<>wee sun lee<>extracting key-substring-group features for text classification<>kdd<>dell zhang<>
7369<>6846_0<>tian xia<>continuous reverse nearest neighbor monitoring<>icde<>donghui zhang<>
7370<>6846_1<>yang du:tian xia:yufei tao<>progressive computation of the min-dist optimal-location query<>vldb<>donghui zhang<>
7372<>6846_3<>shu-yao chien:vassilis j. tsotras:carlo zaniolo<>supporting complex queries on multiversion xml documents<>toit<>donghui zhang<>
7374<>6846_5<>tian xia<>refreshing the sky: the compressed skycube with efficient support for frequent updates<>sigmod<>donghui zhang<>
7387<>6846_18<>evangelos kanoulas:yang du:tian xia<>finding fastest paths on a road network with speed patterns<>icde<>donghui zhang<>
7392<>6846_23<>daniel kunkle:gene cooperman<>efficient mining of max frequent patterns in a generalized environment<>cikm<>donghui zhang<>
7396<>6847_2<>yan zhang<>logical properties of belief-revision-based bargaining solution<>ausai<>dongmo zhang<>
7403<>6847_9<>masabumi furuhata<>capacity allocation with competitive retailers<>ACMicec<>dongmo zhang<>
7404<>6847_10<>yan zhang<>a computational model of logic-based negotiation<>aaai<>dongmo zhang<>
7430<>6849_0<>rutger rienks:daniel gatica-perez:wilfried post<>detection and application of influence rankings in small group meetings<>icmi<>dong zhang<>
7426<>6850_0<>kuanyi zhu<>computer simulation study on central pattern generator: from biology to engineering<>ijns<>dingguo zhang<>
7428<>6851_1<>qin li:lei zhang:prabir bhattacharya<>a new approach to automated retinal vessel segmentation using multiscale analysis<>icpr<>david zhang<>
7368<>6852_0<>ali ozer ercan:abbas el gamal:leonidas j. guibas<>optimal placement and selection of camera network nodes for target localization<>dcoss<>danny b. yang<>
5180<>6858_0<>shuang wu:jie zhou<>clustering-training for data stream mining<>icdm<>chunyu yang<>
7353<>6861_4<>lizheng jiang:shiwei tang:xiuli ma:dehui zhang<>mining maximal correlated member clusters in high dimensional database<>pakdd<>dongqing yang<>
7355<>6861_6<>aiqiang gao:shiwei tang:ming zhang<>mining models of composite web services for performance analysis<>dasfaa<>dongqing yang<>
7357<>6861_8<>aiqiang gao:shiwei tang:ming zhang<>qos-driven web service composition with inter service conflicts<>apweb<>dongqing yang<>
7358<>6861_9<>lei chang:shiwei tang:tengjiao wang<>mining compressed sequential patterns<>adma<>dongqing yang<>
8069<>6862_11<>ayman farahat<>improving probabilistic latent semantic analysis with principal component analysis<>eacl<>francine chen<>
8054<>6863_1<>nikolai tillmann:wolfram schulte<>discovering likely method specifications<>icfem<>feng chen<>
8055<>6863_2<>grigore rosu<>parametric and termination-sensitive control dependence<>sas<>feng chen<>
8071<>6864_0<>falko dressler:armin heindl<>end-to-end performance characteristics in energy-aware wireless sensor networks<>pe-wasun<>feng chen<>
35378<>6867_0<>hua-ming xing:xin chen<>a note on roman domination in graphs<>dm<>xue-gang chen<>
35381<>6867_3<>hua-ming xing:liang sun<>domination in graphs of minimum degree five<>gc<>xue-gang chen<>
8072<>6868_0<>anhai doan:raghu ramakrishnan:pedro derose:yoonkyong lee:robert mccann:mayssam sayyadian:warren shen<>community information management<>debu<>fei chen<>
35377<>6869_2<>patrick j. flynn:kevin w. bowyer<>fusion of infrared and range data: multi-modal face images<>icb<>xin chen<>
35388<>6870_5<>harry hsieh:felice balarin<>verification approach of metropolis design framework for embedded systems<>ijpp<>xi chen<>
5171<>6885_1<>hong lin<>specifying distributed multi-agent systems in chemical reaction metaphor<>apin<>chunsheng yang<>
5174<>6885_4<>hong lin<>specification of multi-agent systems in the gamma language<>ccece<>chunsheng yang<>
2351<>6889_38<>karine arnout<>componentization: the visitor example<>computer<>bertrand meyer<>
2354<>6889_41<>nulo<>the unspoken revolution in software engineering<>computer<>bertrand meyer<>
2358<>6889_45<>michela pedroni<>the inverted curriculum in practice<>sigcse<>bertrand meyer<>
2368<>6889_55<>nulo<>dependable software<>dics<>bertrand meyer<>
14376<>6893_1<>sooyong park:vijayan sugumaran<>improving use case driven analysis using goal and scenario authoring: a linguistics-based approach<>dke<>jintae kim<>
14379<>6893_4<>minseong kim:sooyong park<>goal and scenario based domain requirements analysis environment<>jss<>jintae kim<>
14371<>6894_2<>chrysostomos nicopoulos:dongkook park<>a gracefully degrading and energy-efficient modular router architecture for on-chip networks<>isca<>jongman kim<>
14373<>6894_4<>dongkook park:chrysostomos nicopoulos:narayanan vijaykrishnan:chita r. das<>exploring fault-tolerant network-on-chip architectures<>dsn<>jongman kim<>
14374<>6894_5<>chrysostomos nicopoulos:dongkook park:narayanan vijaykrishnan:mazin s. yousif:chita r. das<>vichar: a dynamic virtual channel regulator for network-on-chip routers<>micro<>jongman kim<>
14343<>6898_0<>bala bollobas:jacques verstraete<>regular subgraphs of random graphs<>rsa<>jeong han kim<>
14352<>6898_9<>tom bohman<>a phase transition for avoiding a giant component<>rsa<>jeong han kim<>
17024<>6903_21<>luca foschini:roberto grossi:ankur gupta<>when indexing equals compression: experiments with compressing suffix arrays and applications<>talg<>jeffrey scott vitter<>
17050<>6903_47<>yossi matias:eran segal<>efficient bundle sorting<>siamcomp<>jeffrey scott vitter<>
17088<>6903_85<>david a. hutchinson<>distribution sort with randomized cycling<>jacm<>jeffrey scott vitter<>
2119<>6904_1<>david m. brooks<>accurate and efficient regression modeling for microarchitectural performance and power prediction<>asplos<>benjamin c. lee<>
2124<>6905_2<>li-c. wang:magdy s. abadir<>refined statistical static timing analysis through<>dac<>benjamin n. lee<>
2126<>6906_1<>sung woo choi:yeon ju lee:jungho yoon<>stationary subdivision schemes reproducing polynomials<>cagd<>byung-gook lee<>
2127<>6906_2<>yoo-joo choi:yeon ju lee:jungho yoon:young j. kim<>a new class of non-stationary interpolatory subdivision schemes based on exponential polynomials<>gmp<>byung-gook lee<>
2088<>6907_0<>seongbae kim:surya sahoo<>waste collection vehicle routing problem with time windows<>cor<>byung-in kim<>
2082<>6910_0<>esma senturk gel:john w. fowler:w. matthew carlyle:jyrki wallenius<>evaluation of nondominated solution sets for k<>eor<>bosun kim<>
2104<>6919_1<>cynthia sims parr:catherine plaisant:benjamin b. bederson:vladislav daniel veksler:wayne d. gray:christopher kotfila<>treeplus: interactive exploration of networks with enhanced tree layouts<>tvcg<>bongshin lee<>
2106<>6919_3<>hyunmo kang:catherine plaisant:benjamin b. bederson<>exploring content-actor paired network data using iterative query refinement with netlens<>jcdl<>bongshin lee<>
