39394<>15_0<>fengling han:jiankun hu:xinghuo yu<>fingerprint images encryption via multi-scroll chaotic attractors<>amc<>yi wang<>
39399<>16_3<>nulo<>maximum likelihood computation based on the fisher scoring and gauss-newton quadratic approximations<>csda<>yong wang<>
8498<>30_1<>hao li:anxiao jiang:jianer chen:ping luo<>face tracing based geographic routing in nonplanar wireless networks<>infocom<>fenghui zhang<>
33438<>32_29<>marvin v. zelkowitz:dag i. k. sjoberg:philip johnson:anthony j. cowling<>protocols in the use of empirical software engineering artifacts<>ese<>victor r. basili<>
5994<>43_0<>marshall w. bern<>improved ranking functions for protein and modification-site identifications<>recomb<>david goldberg<>
26763<>53_18<>boris kapchits<>an optimal algorithm for minimizing energy consumption while limiting maximum delay in a mesh sensor network<>infocom<>reuven cohen<>
18797<>56_0<>simone livieri:yoshiki higo:makoto matsushita<>very-large scale code clone analysis and visualization of open source programs using distributed ccfinder: d-ccfinder<>icse<>katsuro inoue<>
18798<>56_1<>simone livieri:yoshiki higo:makoto matsushita<>analysis of the linux kernel evolution using code clone coverage<>msr<>katsuro inoue<>
27201<>76_1<>avik paul<>precise dynamic slicing using execution-summary<>sac<>rajeev kumar<>
27203<>76_3<>vasant patil<>an effective motion re-estimation in frame-skipping video transcoding<>iccta<>rajeev kumar<>
27213<>76_13<>soham s. chakraborty<>precise static type analysis for object oriented programs<>sigplan<>rajeev kumar<>
27215<>76_15<>s. k. panda:arnab roy:p. p. chakrabarti<>simulation based verification using temporally attributed boolean logic<>vlsid<>rajeev kumar<>
27218<>76_18<>nilanjan banerjee<>multiobjective network design for realistic traffic models<>gecco<>rajeev kumar<>
27220<>76_20<>pramod kumar singh:bhargab b. bhattacharya<>a local search heuristic for biobjective intersecting geometric graphs<>iccta<>rajeev kumar<>
27228<>76_28<>sandip aine:p. p. chakrabarti<>awa* - a window constrained anytime heuristic search algorithm<>ijcai<>rajeev kumar<>
27233<>77_1<>nova ahmed:robert steven french:umakishore ramachandran<>rf2id: a reliable middleware framework for rfid deployment<>ipps<>rajnish kumar<>
27244<>79_1<>yong liu:keith w. ross<>stochastic fluid theory for p2p streaming systems<>infocom<>rakesh kumar<>
27249<>80_2<>eddie kohler:mani b. srivastava<>harbor: software-based memory protection for sensor nodes<>ipsn<>ram kumar<>
32372<>82_0<>zu guang zhang:masahiko gondo:norio yamashita:akio yamamoto<>design and control of a fish-like robot using an electrostatic motor<>icra<>toshiro higuchi<>
32374<>82_2<>norio yamashita:akio yamamoto:masahiko gondo<>evaluation of an electrostatic film motor driven by two-four-phase ac voltage and electrostatic induction<>icra<>toshiro higuchi<>
32376<>82_4<>ewoud van west:akio yamamoto<>pick and place of hard disk media using electrostatic levitation<>icra<>toshiro higuchi<>
22153<>85_0<>varun aggarwal:una-may o'reilly:muriel medard:wonsik kim<>genetic representations for evolutionary minimization of network coding resources<>evoW<>minkyu kim<>
22155<>85_2<>muriel medard:varun aggarwal:una-may o'reilly:wonsik kim:chang wook ahn:michelle effros<>evolutionary approaches to minimizing network coding resources<>infocom<>minkyu kim<>
22156<>85_3<>varun aggarwal:una-may o'reilly:muriel medard<>a doubly distributed genetic algorithm for network coding<>gecco<>minkyu kim<>
22160<>86_0<>kwang won sok:jehee lee<>simulating biped behaviors from human motion data<>tog<>manmyung kim<>
33367<>93_2<>zohar manna:henny b. sipma<>verifying balanced trees<>lfcs<>ting zhang<>
33395<>94_0<>congde lu:chunmei zhang:wei zhang<>kernel based symmetrical principal component analysis for face classification<>ijon<>taiyi zhang<>
23403<>106_9<>nulo<>formalizing communication protocols for multiagent systems<>ijcai<>munindar p. singh<>
23407<>106_13<>yathiraj b. udupi<>governance of cross-organizational service agreements: a policy-based approach<>IEEEscc<>munindar p. singh<>
23412<>106_18<>yonghong wang<>formal trust model for multiagent systems<>ijcai<>munindar p. singh<>
23453<>106_59<>ashok u. mallya<>an algebra for commitment protocols<>aamas<>munindar p. singh<>
23455<>106_61<>nirmit desai:amit k. chopra:matthew arrott:bill specht<>engineering foreign exchange processes via commitment protocols<>IEEEscc<>munindar p. singh<>
20442<>128_0<>xiaojun lin:ness b. shroff<>low-complexity and distributed energy minimization in multi-hop wireless networks<>infocom<>longbi lin<>
31497<>129_1<>kasturi r. varadarajan:yinyu ye:jiawei zhang<>approximating the radii of point sets<>siamcomp<>s. venkatesh<>
32840<>132_0<>elizabeth davidson<>mediating organizational innovation: a study of implementation of digital technologies in tv news<>hicss<>tsui-chuan lin<>
6806<>139_0<>r. m. hill:m. seifbarghy<>a two-echelon inventory model with lost sales<>eor<>d. k. smith<>
5771<>153_42<>nulo<>squarepants in a tree: sum of subtree clustering and hyperbolic pants decomposition<>soda<>david eppstein<>
5793<>153_64<>marc j. van kreveld:elena mumford:bettina speckmann<>"edges and switches, tunnels and bridges."<>wads<>david eppstein<>
5809<>153_80<>nulo<>happy endings for flip graphs<>compgeom<>david eppstein<>
5879<>153_150<>michael t. goodrich:nodari sitchinava<>guard placement for efficient point-in-polygon proofs<>compgeom<>david eppstein<>
22287<>167_1<>xiaoling jin:christy m. k. cheung:huaping chen<>factors affecting users' intention to continue using virtual community<>wecwis<>matthew k. o. lee<>
40553<>170_0<>qian zhang:zhisheng niu:jing zhu<>on optimal physical carrier sensing: theoretical analysis and protocol design<>infocom<>yanfeng zhu<>
41356<>177_8<>shiyong lu:ping yang<>itinerary-based access control for mobile tasks in scientific workflows<>aina<>zijiang yang<>
40516<>178_0<>jeffrey w. chastine:kristine nagel:luca yearsovich<>understanding the design space of referencing in collaborative augmented reality environments<>graphicsinterface<>ying zhu<>
8757<>183_1<>jianhua feng:yong zhang:lizhu zhou<>efficient holistic twig joins in leaf-to-root combining with root-to-leaf way<>dasfaa<>guoliang li<>
8759<>183_3<>bei yu:karen r. sollins:anthony k. h. tung<>effective keyword-based selection of relational databases<>sigmod<>guoliang li<>
8760<>183_4<>beng chin ooi:bei yu:lizhu zhou<>schema mapping in p2p networks based on classification and probing<>dasfaa<>guoliang li<>
8761<>183_5<>jianhua feng:na ta:lizhu zhou<>efficient keyword search over data-centric xml documents<>waim<>guoliang li<>
8762<>183_6<>beng chin ooi:bei yu<>one table stores all: enabling painless free-and-easy data publishing and sharing<>cidr<>guoliang li<>
41384<>194_2<>jorma laaksonen<>regularized neighborhood component analysis<>scia<>zhirong yang<>
34723<>205_9<>qi zhang<>a fast algorithm for approximate quantiles in high speed data streams<>ssdbm<>wei wang<>
34735<>205_21<>xiang zhang:jun huan<>on demand phenotype ranking through subspace clustering<>sdm<>wei wang<>
34744<>205_30<>xueyi wang:jun huan:jack snoeyink<>mining rna tertiary motifs with structure graphs<>ssdbm<>wei wang<>
34747<>205_33<>hye-chung kum:joong hyuk chang<>benchmarking the effectiveness of sequential pattern mining methods<>dke<>wei wang<>
34752<>205_38<>xiang zhang<>an efficient algorithm for mining coherent patterns from heterogeneous microarrays<>ssdbm<>wei wang<>
34757<>205_43<>jinze liu:qi zhang:leonard mcmillan:jan prins<>poclustering: lossless clustering of dissimilarity data<>sdm<>wei wang<>
34768<>205_54<>feng pan:leonard mcmillan<>accelerating profile queries in elevation maps<>icde<>wei wang<>
34783<>210_2<>min chen:andre raspaud<>three-coloring planar graphs without short cycles<>ipl<>weifan wang<>
34789<>210_8<>nulo<>total chromatic number of planar graphs with maximum degree ten<>jgt<>weifan wang<>
34803<>210_22<>ko-wei lih<>on the sizes of graphs embeddable in surfaces of nonnegative euler characteristic and their applications to edge choosability<>ejc<>wei-fan wang<>
34825<>213_2<>minos n. garofalakis:kannan ramchandran<>distributed sparse random projections for refinable approximation<>ipsn<>wei wang<>
11885<>222_3<>baojun qiu:c. lee giles:henry c. foley:john yen<>an lda-based community structure discovery approach for large-scale social networks<>isi<>haizheng zhang<>
17150<>228_0<>william m. tepfenhart:daniela rosca:anni tsai<>resource-constrained workflow modeling<>tase<>jiacun wang<>
17133<>230_26<>xiaonan lu:prasenjit mitra:c. lee giles<>deriving knowledge from figures for digital libraries<>www<>james z. wang<>
8090<>235_12<>guangyu chen:mahmut t. kandemir:ibrahim kolcu<>profile-driven energy reduction in network-on-chips<>pldi<>feihui li<>
34704<>237_7<>yi luo:xuemin lin:xiaofang zhou<>spark: top-k keyword query in relational databases<>sigmod<>wei wang<>
34705<>237_8<>alfredo cuzzocrea<>approximate range-sum query answering on data cubes with probabilistic guarantees<>jiis<>wei wang<>
11872<>249_4<>giovanni neglia:giuseppe reina:donald f. towsley:arun venkataramani:john s. danaher<>availability in bittorrent systems<>infocom<>honggang zhang<>
11875<>249_7<>giovanni neglia:donald f. towsley:giuseppe lo presti<>on unstructured file sharing networks<>infocom<>honggang zhang<>
8097<>251_1<>trevor j. cox<>a neural network model for speech intelligibility quantification<>asc<>francis f. li<>
8101<>253_0<>jimeng sun:spiros papadimitriou:george a. mihaila:ioana stanoi<>hiding in the crowd: privacy preservation on evolving streams through correlation tracking<>icde<>feifei li<>
8102<>253_1<>ke yi:marios hadjieleftheriou:george kollios<>proof-infused streams: enabling authentication of sliding window queries on streams<>vldb<>feifei li<>
8109<>253_8<>spiros papadimitriou:george kollios:philip s. yu<>time series compressibility and privacy<>vldb<>feifei li<>
11907<>256_0<>shuicheng yan:dong xu:benyu zhang:qiang yang:stephen lin<>graph embedding and extensions: a general framework for dimensionality reduction<>pami<>hongjiang zhang<>
11909<>260_0<>lukasz sochaczewski:wlodek tych:william davison<>2d dgt induced fluxes in sediments and soils (2d difs)<>envsoft<>hao zhang<>
30864<>269_31<>sabyasachi saha:stephane airiau:teddy candale:dipyaman banerjee:doran chakraborty:partha mukherjee:anil gursel<>robust agent communities<>aisadm<>sandip sen<>
30871<>269_38<>teddy candale<>multi-dimensional bid improvement algorithm for simultaneous auctions<>ijcai<>sandip sen<>
30875<>269_42<>sabyasachi saha<>an efficient protocol for negotiation over multiple indivisible resources<>ijcai<>sandip sen<>
30889<>269_56<>stephane airiau<>emergence of norms through social learning<>ijcai<>sandip sen<>
30933<>270_23<>surender baswana:ramesh hariharan<>improved decremental algorithms for maintaining transitive closure and all-pairs shortest paths<>jal<>sandeep sen<>
39274<>279_4<>yan-qing zhang:bo jin<>genetic granular neural networks<>isnn<>yuchun tang<>
39275<>279_5<>bo jin:yan-qing zhang<>support vector machines with genetic fuzzy feature transformation for biomedical data classification<>isci<>y. c. tang<>
29166<>280_7<>sabrina de capitani di vimercati:sara foresti:stefano paraboschi:pierangela samarati<>over-encryption: management of access control evolution on outsourced data<>vldb<>sushil jajodia<>
29174<>280_15<>ernesto damiani:sabrina de capitani di vimercati:sara foresti:stefano paraboschi:pierangela samarati<>selective data encryption in outsourced dynamic environments<>entcs<>sushil jajodia<>
29220<>280_61<>nulo<>topological analysis of network attack vulnerability<>ccs<>sushil jajodia<>
29278<>280_119<>xinyuan wang:shiping chen<>network flow watermarking attack on low-latency anonymous communication systems<>sp<>sushil jajodia<>
29330<>280_171<>huiping guo:yingjiu li<>chaining watermarks for detecting malicious modifications to streaming data<>isci<>sushil jajodia<>
29334<>280_175<>sabrina de capitani di vimercati:stefano paraboschi:pierangela samarati<>trust management services in relational databases<>ccs<>sushil jajodia<>
29338<>280_179<>lingyu wang:anoop singhal<>measuring the overall security of network configurations using attack graphs<>dbsec<>sushil jajodia<>
18547<>307_4<>shui-lung chuang:chengxiang zhai<>context-aware wrapping: synchronized data extraction<>vldb<>kevin chen-chuan chang<>
18549<>307_6<>mohamed a. soliman:ihab f. ilyas<>top-k query processing in uncertain databases<>icde<>kevin chen-chuan chang<>
18555<>307_12<>seung-won hwang<>probe minimization by schedule optimization: supporting top-k queries with expensive predicates<>tkde<>kevin chen-chuan chang<>
18563<>307_20<>seung-won hwang<>optimizing top-k queries for middleware access: a unified cost-based approach<>tods<>kevin chen-chuan chang<>
18570<>307_27<>tao cheng:xifeng yan<>entityrank: searching entities directly and holistically<>vldb<>kevin chen-chuan chang<>
18571<>307_28<>chengkai li:min wang:lipyeow lim:haixun wang<>supporting ranking and clustering as generalized order-by and group-by<>sigmod<>kevin chen-chuan chang<>
18573<>307_30<>bin he:mitesh patel:zhen zhang<>accessing the deep web<>cacm<>kevin chen-chuan chang<>
18578<>307_35<>tao cheng:xifeng yan<>supporting entity search: a large-scale prototype search engine<>sigmod<>kevin chen-chuan chang<>
18585<>307_42<>dong xin:jiawei han<>progressive and selective merge: computing top-k with ad-hoc ranking functions<>sigmod<>kevin chen-chuan chang<>
18592<>307_49<>tao cheng<>entity search engine: towards agile best-effort information integration over the web<>cidr<>kevin chen-chuan chang<>
18595<>307_52<>shui-lung chuang:chengxiang zhai<>collaborative wrapping: a turbo framework for web data extraction<>icde<>kevin chen-chuan chang<>
7311<>309_4<>izzat alsmadi:weifeng xu<>model checking aspect-oriented design specification<>compsac<>dianxiang xu<>
3315<>317_0<>xipeng shen:kirk kelsey:chris tice:ruke huang:chengliang zhang<>software behavior oriented parallelization<>pldi<>chen ding<>
9606<>323_3<>tak wah lam:prudence w. h. wong<>efficiency of data distribution in bittorrent-like systems<>aaim<>ho-leung chan<>
4898<>326_1<>wai man szeto:kin hong wong<>automatic lyrics alignment for cantonese popular music<>mms<>chi hang wong<>
23600<>333_40<>roberto sebastiani:stefano tonetta<>property-driven partitioning for abstraction refinement<>tacas<>moshe y. vardi<>
23620<>333_60<>byron cook:alexey gotsman:andreas podelski:andrey rybalchenko<>proving that programs eventually do something good<>popl<>moshe y. vardi<>
23670<>333_110<>erion plaku:lydia e. kavraki<>a motion planner for a hybrid robotic system with kinodynamic constraints<>icra<>moshe y. vardi<>
23686<>333_126<>kousha etessami:marta kwiatkowska:mihalis yannakakis<>multi-objective model checking of markov decision processes<>tacas<>moshe y. vardi<>
31408<>334_4<>john hershberger:amit m. bhosle<>on the difficulty of some shortest path problems<>talg<>subhash suri<>
30457<>336_4<>yong-yeol ahn:seungyeop han:haewoon kwak:hawoong jeong<>analysis of topological characteristics of huge online social networking services<>www<>sue moon<>
34433<>343_3<>yanxi liu<>a lattice-based mrf model for dynamic near-regular texture tracking<>pami<>wen-chieh lin<>
9631<>351_0<>wun-tat chan:tak wah lam:lap-kei lee:kin-sum mak:prudence w. h. wong<>energy efficient online deadline scheduling<>soda<>ho-leung chan<>
9615<>353_3<>adrian perrig:bartosz przydatek:dawn xiaodong song<>sia: secure information aggregation in sensor networks<>jcs<>haowen chan<>
33317<>360_0<>stephen m. blackburn:matthew hertz:kathryn s. mckinley:j. eliot b. moss<>profile-based pretenuring<>toplas<>ting yang<>
9650<>366_2<>dit-yan yeung<>kernel-based distance metric learning for content-based image retrieval<>ivc<>hong chang<>
9654<>366_6<>dit-yan yeung:guang dai<>a scalable kernel-based algorithm for semi-supervised metric learning<>ijcai<>hong chang<>
20436<>377_1<>hanyu li:mong-li lee:wynne hsu<>a path-based approach for efficient structural join with not-predicates<>dasfaa<>ling li<>
20428<>384_1<>han-wei shen<>image-based streamline generation and rendering<>tvcg<>liya li<>
38356<>388_0<>kamal gupta<>motion planning of multiple agents in virtual environments on parallel architectures<>icra<>yi li<>
38353<>395_0<>bingsheng he:qiong luo:dongqing yang<>easedb: a cache-oblivious in-memory query processor<>sigmod<>yinan li<>
38333<>399_1<>bao-liang lu:zhong-fu wu<>hierarchical fuzzy filter method for unsupervised feature selection<>jifs<>yun li<>
14639<>402_2<>seung ho lim:jong-woon yoo:ki-woong park:hyun-jin choi:kyu ho park<>a ubiquitous fashionable computer with an i-throw device on a location-based service environment<>aina<>jupyung lee<>
38328<>410_0<>jiaxin l. fu:nancy s. pollard<>data-driven grasp synthesis using shape matching and task-based pruning<>tvcg<>ying li<>
38315<>411_4<>ishan chaudhuri:huahai yang:satinder singh:h. v. jagadish<>danalix: a domain-adaptive natural language interface for querying xml<>sigmod<>yunyao li<>
38323<>413_6<>alan l. liu<>brickroad: a light-weight tool for spontaneous design of location-enhanced applications<>chi<>yang li<>
38304<>420_0<>william a. p. smith:edwin r. hancock<>face recognition with irregular region spin images<>scia<>yang li<>
22764<>424_17<>jae-sook cheong:a. frank van der stappen:kenneth y. goldberg:elon rimon<>immobilizing hinged polygons<>ijcga<>mark h. overmars<>
16373<>441_0<>lida li:thomas g. dietterich<>real-time detection of task switches of desktop users<>ijcai<>jianqiang shen<>
38383<>442_0<>mario g. rosso:prisca viehoever:bernd weisshaar<>gabi-kat simplesearch: an  t-dna mutant database with detailed information for confirmed insertions<>nar<>yong li<>
38361<>464_3<>wen jiang:xingxing yu<>truncation for low-complexity mimo signal detection<>tit<>ye li<>
5374<>468_0<>shanika karunasekera:christopher leckie<>evaluation of a decentralized architecture for large scale collaborative intrusion detection<>im<>chenfeng vincent zhou<>
19481<>483_1<>rakesh kumar:yong liu<>stochastic fluid theory for p2p streaming systems<>infocom<>keith w. ross<>
19493<>483_13<>jussi kangasharju:david a. turner<>optimizing file availability in peer-to-peer content distribution<>infocom<>keith w. ross<>
19431<>485_6<>damianos chatziantoniou<>partitioned optimization of complex queries<>is<>kenneth a. ross<>
19456<>485_31<>nulo<>efficient hash probes on modern processors<>icde<>kenneth a. ross<>
1056<>492_24<>fan wang<>a stochastic beam search for the berth allocation problem<>dss<>andrew lim<>
13323<>496_0<>hua xu:george hripcsak:eneida a. mendonca:marianthi markatou:carol friedman<>gene symbol disambiguation using knowledge-based profiles<>bioinformatics<>jung-wei fan<>
13309<>500_0<>ning mi:sheldon x.-d. tan:yici cai:xianlong hong<>statistical model order reduction for interconnect circuits considering spatial correlations<>date<>jeffrey fan<>
13310<>500_1<>ning mi:boyuan yan:sheldon x.-d. tan:hao yu<>general block structure-preserving reduced order modeling of linear dynamic circuits<>isqed<>jeffrey fan<>
11299<>501_1<>wen-tau yih:joshua goodman:lucy vanderwende<>multi-document summarization by maximizing informative content-words<>ijcai<>hisami suzuki<>
11301<>501_3<>satoshi sekine<>acquiring ontological knowledge from query logs<>www<>hisami suzuki<>
13913<>504_0<>jeffrey wong<>making mashups with marmite: towards end-user programming for the web<>chi<>jason i. hong<>
13925<>504_12<>yue zhang:lorrie faith cranor<>cantina: a content-based approach to detecting phishing web sites<>www<>jason i. hong<>
13935<>504_22<>ponnurangam kumaraguru:yong rhee:alessandro acquisti:lorrie faith cranor:elizabeth nunge<>protecting people from phishing: the design and evaluation of an embedded training email system<>chi<>jason hong<>
33909<>529_4<>vanessa murdock:diane kelly:nicholas j. belkin:xiaojun yuan<>identifying and improving retrieval for procedural questions<>ipm<>w. bruce croft<>
33915<>529_10<>xing wei<>modeling term associations for ad-hoc retrieval performance within language modeling framework<>ecir<>w. bruce croft<>
33922<>529_17<>niranjan balasubramanian:james allan<>a comparison of sentence retrieval techniques<>sigir<>w. bruce croft<>
33933<>529_28<>trevor strohman<>efficient document retrieval in main memory<>sigir<>w. bruce croft<>
33942<>529_37<>yun zhou<>query performance prediction in web search environments<>sigir<>w. bruce croft<>
33982<>529_77<>trevor strohman:david jensen<>recommending citations for academic papers<>sigir<>w. bruce croft<>
13939<>536_1<>tamar shinar:ronald fedkiw<>wrinkled flames and cellular patterns<>tog<>jeong-mo hong<>
13941<>536_3<>zhaosheng bao:joseph teran:ronald fedkiw<>fracturing rigid materials<>tvcg<>jeong-mo hong<>
25368<>542_2<>c. yao:t.-y. wang:yunghsiang s. han:pramod k. varshney<>performance analysis and code design for minimum hamming distance fusion in wireless sensor networks<>tit<>p.-n. chen<>
40<>562_0<>s. naicken:b. livingston:s. rodhetbhai:i. wakeman:d. chalmers<>the state of peer-to-peer simulators and simulations<>ccr<>a. basu<>
21830<>566_0<>david kensche:christoph quix:mohamed amine chatti<>gerome: a generic role based metamodel for model management<>jods<>matthias jarke<>
39580<>577_0<>lin cong:bo yang:yang chen:guohan lu:beixing deng:xing li<>nts6: ipv6 based network topology service system of cernet2<>mue<>ye wang<>
38873<>583_0<>yijun lu:hong jiang<>idea: : an infrastructure for detection-based adaptive consistency control in replicated services<>hpdc<>ying lu<>
6273<>590_0<>john d. villasenor<>a bit-width optimization methodology for polynomial-based function evaluation<>tc<>dong-u lee<>
6280<>590_7<>hyungjin kim:steven tu:mohammad h. rahimi:deborah estrin:john d. villasenor<>energy-optimized image communication on resource-constrained sensor platforms<>ipsn<>dong-u lee<>
6348<>597_0<>su yan<>toward alternative measures for ranking venues: a case of database research community<>jcdl<>dongwon lee<>
6349<>597_1<>ziming zhuang:ergin elmacioglu:c. lee giles<>measuring conference quality by mining program committee characteristics<>jcdl<>dongwon lee<>
6364<>598_3<>seo-il kang:im-yeong lee<>a study on key distribution and id registration in the aaa system for ubiquitous multimedia environments<>mmm<>deok-gyu lee<>
28805<>600_0<>hongsoo kim:eunjoung byun:maengsoon baik:sungsuk kim:chan yeol park:chong-sun hwang<>characterizing and classifying desktop grid<>ccgrid<>sungjin choi<>
28812<>600_7<>eunjoung byun:maengsoon baik:joon-min gil:chan yeol park:chong-sun hwang<>mjsa: markov job scheduler based on availability in desktop grid computing environment<>fgcs<>sungjin choi<>
28796<>606_1<>hojung cha:inuk jung:hyoseung kim:hyojeong shin:jaehyun yoo:chanmin yoon<>"retos: resilient, expandable, and threaded operating system for wireless sensor networks."<>ipsn<>sukwon choi<>
28797<>606_2<>hojung cha:inuk jung:hyoseung kim:hyojeong shin:jaehyun yoo:chanmin yoon<>"the retos operating system: kernel, tools and applications."<>ipsn<>sukwon choi<>
12123<>638_4<>seo-il kang:deok-gyu lee<>a study on key distribution and id registration in the aaa system for ubiquitous multimedia environments<>mmm<>im-yeong lee<>
18016<>649_8<>qiang yang:charles ling:rong pan<>extracting actionable knowledge from decision trees<>tkde<>jie yin<>
40074<>687_4<>y. c. lim:k. l. teo:tapio saramaki<>frm-based fir filters with minimum coefficient sensitivities<>iscas<>y. j. yu<>
29710<>693_1<>rob h. bracewell:ken m. wallace<>answering engineers' questions using semantic annotations<>aiedam<>sanghee kim<>
29662<>715_8<>sangjoon park:junghyun nam:dongho won<>efficient password-authenticated key exchange based on rsa<>ctrsa<>seungjoo kim<>
29684<>718_0<>daniel santos:matthew spenko:aaron parness:mark r. cutkosky<>directional adhesive structures for controlled climbing on smooth vertical surfaces<>icra<>sangbae kim<>
29685<>718_1<>matthew spenko:salomon trujillo:barrett heyneman:virgilio mattoli:mark r. cutkosky<>"whole body adhesion: hierarchical, directional and distributed control of adhesive forces for a climbing robot."<>icra<>sangbae kim<>
29625<>722_2<>xiaodong yu:yong wan park<>real-time traffic packet scheduling algorithm in hsdpa system considering the maximum tolerable delay and channel assignment<>icess<>sung won kim<>
29636<>724_1<>thomas zimmermann:e. james whitehead jr.:andreas zeller<>predicting faults from cached history<>icse<>sunghun kim<>
18120<>726_3<>torsten suel<>optimized inverted list assignment in distributed search engine architectures<>ipps<>jiangong zhang<>
18196<>729_0<>peter honeyman<>hierarchical replication control in a global file system<>ccgrid<>jiaying zhang<>
18150<>730_6<>kasturi r. varadarajan:s. venkatesh:yinyu ye<>approximating the radii of point sets<>siamcomp<>jiawei zhang<>
18156<>730_12<>anthony man-cho so:yinyu ye<>on approximating complex quadratic optimization problems via semidefinite programming relaxations<>mp<>jiawei zhang<>
18167<>731_10<>dong zheng:mung chiang<>the impact of stochastic noisy feedback on distributed network utility maximization<>infocom<>junshan zhang<>
18173<>731_16<>dong zheng<>joint optimal channel probing and transmission in collocated wireless networks<>infocom<>junshan zhang<>
18214<>732_4<>beibei li:shuting xu<>enhancing clustering blog documents by utilizing author/reader comments<>ACMse<>jun zhang<>
18207<>734_1<>marcin marszalek:svetlana lazebnik:cordelia schmid<>local features and kernels for classification of texture and object categories: a comprehensive study<>ijcv<>jianguo zhang<>
40029<>737_4<>t. h. ng:s. c. cheung:w. k. chan<>do maintainers utilize deployed design patterns effectively?<>icse<>y. t. yu<>
40056<>741_10<>jianguo lu:juan fernandez-ramil:phil yuan<>comparing web services with other software components<>icws<>yijun yu<>
31949<>743_1<>ichigaku takigawa:shuqin zhang:hiroshi mamitsuka<>a probabilistic model for clustering text documents with multiple fields<>ecir<>shanfeng zhu<>
31939<>746_9<>yun chi:xiaodan song:jun'ichi tatemura:belle l. tseng<>structural and temporal analysis of the blogosphere through community factorization<>kdd<>shenghuo zhu<>
12296<>759_3<>rob koeling:diana mccarthy<>text categorization for improved priors of word meaning<>cicling<>john carroll<>
19074<>772_1<>baihua zheng:huajing li:wang-chien lee<>approaching the skyline in z order<>vldb<>ken lee<>
31648<>806_1<>min-yuh day:richard tzong-han tsai:cheng-lung sung:chiu-chen hsieh:cheng-wei lee:kuen-pin wu:chorng-shyong ong:wen-lian hsu<>reference metadata extraction using a hierarchical knowledge representation framework<>dss<>shih-hung wu<>
40673<>838_0<>chuanyi ji<>measuring network-aware worm spreading ability<>infocom<>zesheng chen<>
30786<>846_0<>mark braverman:raghav kulkarni<>parity problems in planar graphs<>coco<>sambuddha roy<>
30796<>847_1<>rajeev gupta:manish bhide<>identity delegation in policy based systems<>policy<>shourya roy<>
30805<>851_0<>himabindu pucha:zheng zhang:y. charlie hu:lili qiu<>"overlay node placement: analysis, algorithms and impact on applications."<>icdcs<>sabyasachi roy<>
30770<>856_1<>v. srikrishnan:subhasis chaudhuri<>stabilisation of active contours using tangential evolution: an application to tracking<>iccta<>sumantra dutta roy<>
30778<>856_9<>kaustubh patwardhan<>"hand gesture modelling and recognition involving changing shapes and trajectories, using a predictive eigentracker."<>prl<>sumantra dutta roy<>
14208<>859_0<>vincent c. hu:evan martin:tao xie<>conformance checking of access control policies specified in xacml<>compsac<>jeehyun hwang<>
14204<>862_2<>ibrahim karliga<>extraction and integration of human body parts for 3-d motion analysis of golf swing from single-camera video sequences<>iscas<>jenq-neng hwang<>
19730<>891_5<>c. y. cheong:chi keong goh<>solving multiobjective vehicle routing problem with stochastic demand via evolutionary computation<>eor<>kay chen tan<>
19746<>891_21<>r. sathikannan:w. w. tan:a. p. loh<>evolutionary design and implementation of a hard disk drive servo control system<>soco<>k. c. tan<>
12671<>919_22<>ying gao<>operational semantics for positive relevant logics without distribution<>cie<>jingde cheng<>
12673<>921_0<>yiping ke:wilfred ng:an lu<>fg-index: towards verification-free query processing on graph databases<>sigmod<>james cheng<>
12678<>921_5<>an lu:yiping ke:wilfred ng<>mining vague association rules<>dasfaa<>james cheng<>
6216<>924_0<>jeong-hee kim:ho-young kwak:yung-cheol byun<>address internetworking between wsns and internet supporting web services<>mue<>do-hyeon kim<>
14590<>940_1<>kyu-young whang:min-soo kim 0002:min-jae lee:ki-hoon lee<>odysseus: a high-performance ordbms tightly-coupled with spatial database features<>icde<>jae-gil lee<>
14594<>940_5<>jiawei han:kyu-young whang<>trajectory clustering: a partition-and-group framework<>sigmod<>jae-gil lee<>
14579<>947_0<>jun-ki min:chin-wan chung<>an efficient encoding and labeling for dynamic xml data<>dasfaa<>jihyun lee<>
14580<>947_1<>myung-jae park:chun-hee lee:jiexi lin:olivier serres:chin-wan chung<>an efficient and scalable management of ontology<>dasfaa<>jihyun lee<>
14562<>952_1<>nulo<>dynamic reverse code generation for backward execution<>entcs<>jooyong lee<>
14557<>954_10<>jung-hwan oh:subodh kumar shah:xiaohui yuan:shou jiang tang<>automatic classification of digestive organs in wireless capsule endoscopy videos<>sac<>jeongkyu lee<>
22915<>956_30<>kimish patel:wonbok lee<>active bank switching for temperature control of the register file in a microprocessor<>glvlsi<>massoud pedram<>
22935<>956_50<>hwisung jung<>dynamic power management under uncertain information<>date<>massoud pedram<>
22980<>956_95<>hwisung jung<>a unified framework for system-level design: modeling and performance optimization of scalable networking systems<>isqed<>massoud pedram<>
23017<>956_132<>behnam amelifard<>optimal selection of voltage regulator modules in a power delivery network<>dac<>massoud pedram<>
14541<>959_2<>j. stephen downie:anatoliy a. gruzd:m. cameron jones<>toward an understanding of similarity judgments for music digital library evaluation<>jcdl<>jin ha lee<>
3643<>962_4<>nulo<>genetic programming with fitness based on model checking<>eurogp<>colin g. johnson<>
30725<>968_2<>ruben torres:xin sun:aaron walters:cristina nita-rotaru<>enabling confidentiality of data delivery in an overlay broadcasting system<>infocom<>sanjay g. rao<>
20674<>970_2<>luis miguel silveira:joel r. phillips<>efficient computation of the worst-delay corner<>date<>luis guerra e silva<>
20643<>974_4<>artur andrzejak<>deterministic models of software aging and optimal rejuvenation schedules<>im<>luis moura silva<>
20667<>974_28<>patricio domingues:bruno sousa<>sabotage-tolerance and trust management in desktop grid computing<>fgcs<>luis moura silva<>
10199<>982_4<>haesun park<>sparse non-negative matrix factorizations via alternating non-negativity-constrained least squares for microarray data analysis<>bioinformatics<>hyunsoo kim<>
3167<>994_0<>yu-hsien chiu:chung-hsien wu:hung-yu su<>joint optimization of word alignment and epenthesis generation for chinese to taiwanese sign synthesis<>pami<>chih-jen cheng<>
11752<>1002_0<>amit manjhi:phillip b. gibbons:anastassia ailamaki:charles garrod:bruce m. maggs:todd c. mowry:christopher olston:anthony tomasic<>invalidation clues for database scalability services<>icde<>haifeng yu<>
11760<>1002_8<>jeffrey pang:phillip b. gibbons:michael kaminsky:srinivasan seshan<>defragmenting dht-based distributed file systems<>icdcs<>haifeng yu<>
3156<>1005_0<>eric mcdermid:ichiro suzuki<>hardness results on the man-exchange stable marriage problem with short preference lists<>ipl<>christine cheng<>
15815<>1013_8<>nicola zeni:nadzeya kiyavitskaya:luisa mich:james r. cordy<>a lightweight approach to semantic annotation of research papers<>nldb<>john mylopoulos<>
25316<>1016_3<>gul agha<>supporting reconfigurable object distribution for customized web applications<>sac<>po-hao chang<>
25317<>1016_4<>gul agha<>towards context-aware web applications<>dais<>po-hao chang<>
20907<>1026_0<>s. a. neild:d. j. wagg<>modified model reference adaptive control for plants with unmodelled high frequency dynamics<>icinco<>l. yang<>
8254<>1037_10<>tiago leitao:jorge tavares:ernesto costa<>niching techniques: a study on the cluster geometry optimization problem<>gecco<>francisco b. pereira<>
36410<>1046_1<>chris pal:andrew mccallum<>generalized component analysis for text with heterogeneous attributes<>kdd<>xuerui wang<>
36411<>1046_2<>xing wei:jimeng sun<>dynamic mixture models for multiple time-series<>ijcai<>xuerui wang<>
22104<>1047_81<>piotr berman:yakov nekrich<>optimal trade-off for merkle tree traversal<>tcs<>marek karpinski<>
37097<>1050_1<>mariyam mirza:joel sommers:paul barford<>a machine learning approach to tcp throughput prediction<>sigmetrics<>xiaojin zhu<>
37099<>1050_3<>jurgen van gael<>correlation clustering for crosslingual link detection<>ijcai<>xiaojin zhu<>
37102<>1050_6<>gregory druck:chris pal:andrew mccallum<>semi-supervised classification with hybrid generative/discriminative methods<>kdd<>xiaojin zhu<>
37109<>1051_4<>xindong wu:taghi m. khoshgoftaar:yong shi<>an empirical study of the noise impact on cost-sensitive learning<>ijcai<>xingquan zhu<>
37120<>1051_15<>xindong wu<>discovering relational patterns across multiple databases<>icde<>xingquan zhu<>
37129<>1051_24<>xindong wu<>mining complex patterns across sequences with gap requirements<>ijcai<>xingquan zhu<>
9327<>1059_0<>adit d. singh<>delay test scan flip-flop: dft for high coverage delay testing<>vlsid<>gefu xu<>
9309<>1060_6<>wenqi zhao:chandrajit l. bajaj<>an algebraic spline model of molecular surfaces<>sma<>guoliang xu<>
36450<>1063_3<>chun-cheng chen:haiyun luo:eunsoo seo:nitin h. vaidya<>rate-adaptive framing for interfered wireless networks<>infocom<>xudong wang<>
36451<>1064_0<>bin cao:dou shen:jian-tao sun:qiang yang:zheng chen<>detect and track latent factors with online nonnegative matrix factorization<>ijcai<>xuanhui wang<>
36453<>1064_2<>chengxiang zhai<>learn from web search logs to organize search results<>sigir<>xuanhui wang<>
36434<>1065_6<>yong qin:wen liu<>a search-based chinese word segmentation method<>www<>xin-jing wang<>
36441<>1066_4<>dong jia:chenyang lu:xenofon d. koutsoukos<>deucon: decentralized end-to-end utilization control for distributed real-time systems<>tpds<>xiaorui wang<>
36443<>1066_6<>charles lefurgy:malcolm ware<>server-level power control<>icac<>xiaorui wang<>
36419<>1067_0<>alfonso renart:ruben moreno-bote:nestor parga<>mean-driven and fluctuation-driven persistent activity in recurrent networks<>neco<>xiao-jing wang<>
37055<>1068_4<>tomas kaiser:daniel kral:riste skrekovski<>the circular chromatic index of graphs of high girth<>jct<>xuding zhu<>
30408<>1077_13<>nishant patil:jie deng:h.-s. philip wong<>automated design of misaligned-carbon-nanotube-immune circuits<>dac<>subhasish mitra<>
30415<>1077_20<>mridul agarwal:bipul c. paul:ming zhang<>circuit failure prediction and its application to transistor aging<>vts<>subhasish mitra<>
30416<>1077_21<>pia sanda:norbert seifert<>"soft errors: technology trends, system effects, and protection techniques."<>iolts<>subhasish mitra<>
30446<>1079_4<>radu grosu:p. ye:e. entcheva:i. v. ramakrishnan:scott a. smolka<>learning cycle-linear hybrid automata for excitable cells<>hybrid<>s. mitra<>
22148<>1083_2<>eytan adar<>softguess: visualization and exploration of code clones in context<>icse<>miryung kim<>
22150<>1083_4<>nulo<>understanding and aiding code evolution by inferring change patterns<>icse<>miryung kim<>
22151<>1083_5<>david notkin:dan grossman<>automatic inference of structural changes for matching across program versions<>icse<>miryung kim<>
33081<>1087_5<>guodong rong<>variants of jump flooding algorithm for computing discrete voronoi diagrams<>isvd<>tiow-seng tan<>
12223<>1090_0<>pinyan lu<>on block-wise symmetric signatures for matchgates<>fct<>jin-yi cai<>
12225<>1090_2<>pinyan lu<>holographic algorithms: from art to science<>stoc<>jin-yi cai<>
12227<>1090_4<>eric bach<>a novel information transmission problem and its optimal solution<>fct<>jin-yi cai<>
12229<>1090_6<>pinyan lu<>bases collapse in holographic algorithms<>coco<>jin-yi cai<>
12240<>1090_17<>vinay choudhary:pinyan lu<>on the theory of matchgate computations<>coco<>jin-yi cai<>
28306<>1112_7<>fabio casati:florian daniel<>web service dependency discovery tool for soa management<>IEEEscc<>sujoy basu<>
28298<>1113_0<>evan martin:tao xie<>websob: a tool for robustness testing of web services<>icse<>suranjana basu<>
28337<>1114_10<>nulo<>combinatorial complexity in o-minimal geometry<>stoc<>saugata basu<>
28314<>1115_0<>natalia stakhanova:johnny wong<>a cost-sensitive model for preemptive intrusion response systems<>aina<>samik basu<>
28315<>1115_1<>natalia stakhanova:wensheng zhang:xia wang:johnny wong<>specification synthesis for monitoring and analysis of manet protocols<>aina<>samik basu<>
28319<>1115_5<>jyotishman pathak:vasant honavar<>on context-specific substitutability of web services<>icws<>samik basu<>
9835<>1117_0<>ka cheung sia:junghoo cho<>efficient monitoring algorithm for fast news alerts<>tkde<>hyun-kyu cho<>
6386<>1139_0<>wonjun lee:joongheon kim<>genetic algorithmic topology control for two-tiered wireless sensor networks<>iccS<>donghwan lee<>
6403<>1152_0<>karl crary:robert harper<>towards a mechanized metatheory of standard ml<>popl<>daniel k. lee<>
15238<>1156_11<>kai huang:le wang<>efficient training of rbf networks via the byy automated model selection learning algorithms<>isnn<>jinwen ma<>
15259<>1158_0<>jinfeng zhang:jianwei niu:rui he<>adaptive video streaming over p2p multi-hop path<>aina<>jian ma<>
15260<>1158_1<>jian jiang<>an optimal node selection scheme in multi-hop wireless network<>aina<>jian ma<>
15261<>1158_2<>jianwei niu:congying wei:rui he<>a robust error concealment algorithm in wireless networks<>aina<>jian ma<>
15262<>1158_3<>canfeng chen<>simulation study of aodv performance over ieee 802.15.4 mac in wsn with mobile sinks<>aina<>jian ma<>
15263<>1158_4<>saad ahmed munir:biao ren:weiwei jiao:bin wang:dongliang xie<>mobile wireless sensor network: architecture and enabling technologies for ubiquitous computing<>aina<>jian ma<>
19377<>1179_1<>boriana koleva:steve benford<>the iterative development of a tangible pin-board to symmetrically link physical and digital documents<>puc<>kher hui ng<>
37606<>1198_1<>rob j. van glabbeek:carroll morgan:chenyi zhang<>scalar outcomes suffice for finitary probabilistic testing<>esop<>yuxin deng<>
37607<>1198_2<>zhengqin luo:xiaojuan cai:jun pang<>analyzing an electronic cash protocol using applied pi calculus<>acns<>yuxin deng<>
37608<>1198_3<>catuscia palamidessi<>axiomatizations for probabilistic finite-state behaviors<>tcs<>yuxin deng<>
37610<>1198_5<>rob j. van glabbeek:matthew hennessy:carroll morgan:chenyi zhang<>characterising testing preorders for finite probabilistic processes<>lics<>yuxin deng<>
37616<>1198_11<>rob j. van glabbeek:matthew hennessy:carroll morgan:chenyi zhang<>remarks on testing probabilistic processes<>entcs<>yuxin deng<>
15380<>1204_23<>grigore rosu<>the rewriting logic semantics project<>tcs<>jose meseguer<>
20156<>1207_2<>xiao-hua xu:ping he<>a novel ant clustering algorithm based on cellular automata<>wias<>ling chen<>
20160<>1212_0<>pearl pu<>hybrid critiquing-based recommender systems<>iui<>li chen<>
20118<>1223_4<>gencai chen:hong chen:jack march:steve benford:zhi-geng pan<>an hci method to improve the human performance reduced by local-lag mechanism<>iwc<>ling chen<>
20131<>1223_17<>steve benford<>your way your missions: from location-based to route-based pervasive gaming<>ACMace<>ling chen<>
25610<>1235_5<>flavio chierichetti:alessandro panconesi:mauro sozio:alessandro tiberi:eli upfal<>finding near neighbors through cluster pruning<>pods<>prabhakar raghavan<>
36401<>1247_0<>shawna l. thomas:marco morales:nancy m. amato<>biasing samplers to improve motion planning performance<>icra<>xinyu tang<>
36402<>1247_1<>shawna l. thomas:lydia tapia:nancy m. amato<>tools for simulating and analyzing rna folding kinetics<>recomb<>xinyu tang<>
36405<>1247_4<>shawna l. thomas:nancy m. amato<>planning with reachable distances: fast enforcement of closure constraints<>icra<>xinyu tang<>
36390<>1248_9<>huicheng chi:samuel t. chanson<>optimal replica placement under ttl-based consistency<>tpds<>xueyan tang<>
36400<>1248_19<>minji wu:jianliang xu:wang-chien lee<>top-k monitoring in wireless sensor networks<>tkde<>xueyan tang<>
34321<>1257_0<>donghwan lee:joongheon kim<>genetic algorithmic topology control for two-tiered wireless sensor networks<>iccS<>wonjun lee<>
41222<>1261_8<>hui-qin cao<>on the number of zero-sum subsequences<>dm<>zhi-wei sun<>
19942<>1265_7<>chi hang wong:wai man szeto<>automatic lyrics alignment for cantonese popular music<>mms<>kin hong wong<>
41191<>1274_4<>wee hock desmond ng:michael p. howarth:haitham cruickshank<>dynamic balanced key tree management for secure multicast communications<>tc<>zhili sun<>
19922<>1275_2<>hui zhang:guoqiang zhang<>camera calibration from images of spheres<>pami<>kwan-yee kenneth wong<>
19895<>1277_14<>scott r. tilley:spencer smith<>report from the 3rd international symposium on software engineering course projects (swecp 2006)<>csee<>ken wong<>
9712<>1283_8<>yi-min wang:ming ma:yuan niu<>spam double-funnel: connecting web spammers with advertisers<>www<>hao chen<>
12726<>1297_7<>ka cheung sia:hyun-kyu cho<>efficient monitoring algorithm for fast news alerts<>tkde<>junghoo cho<>
29844<>1307_1<>m. tischler:m. garcia:c. d. peters-lidard:m. s. moran:s. miller:d. thoma:j. geiger<>a gis framework for surface-layer soil moisture estimation combining satellite radar measurements and land surface modeling with soil physical property estimation<>envsoft<>s. kumar<>
29620<>1327_6<>wan d. bae:shayma alkobaisi:sada narayanappa:cyrus shahabi<>supporting range queries on web data using k-nearest neighbor search<>webdb<>seon ho kim<>
29608<>1329_2<>kyoung-soo han:young-in song:hae-chang rim<>answer extraction and ranking strategies for definitional question answering using linguistic features and definition terminology<>ipm<>sang-bum kim<>
4861<>1343_0<>jie lu:guangquan zhang<>a constrained clustering approach to duplicate detection among relational data<>pakdd<>chao wang<>
4862<>1343_1<>jie lu:guangquan zhang<>generation and matching of ontology data for the semantic web in a peer-to-peer framework<>waim<>chao wang<>
32791<>1355_1<>ninghui li:suresh venkatasubramanian<>t-closeness: privacy beyond k-anonymity and l-diversity<>icde<>tiancheng li<>
22000<>1358_2<>manuel bodirsky:eric fusy:stefan vigerske<>"an unbiased pointing operator for unlabeled structures, with applications to counting and sampling."<>soda<>mihyun kang<>
22001<>1358_3<>manuel bodirsky:clemens gropl<>generating labeled planar graphs uniformly at random<>tcs<>mihyun kang<>
32746<>1363_8<>fei wang:changshui zhang<>regularized clustering for documents<>sigir<>tao li<>
32747<>1363_9<>zhiyuan chen<>addressing diverse user preferences in sql-query-result navigation<>sigmod<>tao li<>
20823<>1407_0<>nulo<>a computationally efficient method for nonlinear mixed-effects models with nonignorable missing data in time-varying covariates<>csda<>lang wu<>
4762<>1412_0<>kang g. shin:john reumann:sharad singhal<>online web cluster capacity estimation and its application to energy conservation<>tpds<>chang-hao tsai<>
19418<>1413_0<>ki-woong park:hyunchul seok<>pkasso: towards seamless authentication providing non-repudiation on resource-constrained devices<>aina<>kyu ho park<>
2594<>1423_0<>steen andreassen:geoffrey m. shaw:per l. jensen:stephen e. rees:j. geoffrey chase<>simulation of cardiovascular system diseases by including the autonomic nervous system into a minimal model<>cmpb<>bram w. smith<>
4763<>1429_0<>tai-yi huang:pin-chuan chou:hsin-an chen<>automated fault localization with statistically suspicious program states<>lctrts<>cheng-han tsai<>
23239<>1433_34<>yoshifumi uemura:yoshihiro nakajima<>direct execution of linux binary on windows for grid rpc workers<>ipps<>mitsuhisa sato<>
12339<>1436_5<>c. dan lo<>fpga-based reconfigurable computing ii<>mam<>j. morris chang<>
12381<>1440_4<>hye-chung kum:wei wang<>benchmarking the effectiveness of sequential pattern mining methods<>dke<>joong hyuk chang<>
16159<>1441_33<>thomas h. labean<>autonomous programmable biomolecular devices using self-assembled dna nanostructures<>wollic<>john h. reif<>
16205<>1441_79<>sukhendu chakraborty<>efficient and exact quantum compression<>iandc<>john h. reif<>
40647<>1453_3<>king ngi ngan<>towards rate-distortion tradeoff in real-time color video coding<>tcsv<>zhenzhong chen<>
13129<>1465_8<>thara angskun:george bosilca:graham e. fagg:jelena pjesivac-grbovic<>reliability analysis of self-healing network using discrete-event simulation<>ccgrid<>jack dongarra<>
13183<>1465_62<>fengguang song:shirley moore<>feedback-directed thread scheduling with memory considerations<>hpdc<>jack dongarra<>
13213<>1465_92<>emmanuel jeannot:erik saule:zhiao shi<>bi-objective scheduling algorithms for optimizing makespan and reliability on heterogeneous systems<>spaa<>jack dongarra<>
13224<>1465_103<>jean-francois pineau:yves robert:zhiao shi:frederic vivien<>revisiting matrix product on master-worker platforms<>ipps<>jack dongarra<>
13255<>1465_134<>thara angskun:george bosilca<>binomial graph: a scalable and fault-tolerant logical network topology<>ispa<>jack dongarra<>
40560<>1470_0<>ming yang:guillermo a. francia iii:jack dongarra<>self adaptive application level fault tolerance for parallel and distributed computing<>ipps<>zizhong chen<>
40601<>1473_23<>bin fu:mahdi abdelguerfi<>an almost linear time 2.8334-approximation algorithm for the disc covering problem<>aaim<>zhixiang chen<>
6531<>1483_0<>zhenjiang hu:masato takeichi<>bidirectional interpretation of xquery<>pepm<>dongxi liu<>
30206<>1485_1<>xiaoqiao meng:petros zerfos:vidyut samanta:starsky h. y. wong<>analysis of the reliability of a nationwide short message service<>infocom<>songwu lu<>
30272<>1488_9<>artem chebotko:mustafa atay:farshad fotouhi<>xml subtree reconstruction from relational storage of xml documents<>dke<>shiyong lu<>
30275<>1488_12<>seunghan chang:artem chebotko:farshad fotouhi<>graph matching based authorization model for efficient secure xml querying<>aina<>shiyong lu<>
30276<>1488_13<>liqiang wang:xubo fei:jeffrey l. ram<>a dataflow-oriented atomicity and provenance system for pipelined scientific workflows<>iccS<>shiyong lu<>
30282<>1488_19<>jamal alhiyafi:cavitha sebesan:melphine harriott:deborah jurczyszyn:raquel p. ritchie:felicitas s. gonzales:jeffrey l. ram<>computational methods for analysis of cryptic recombination in the performance of genomic recombination detection software<>aina<>shiyong lu<>
30283<>1488_20<>artem chebotko:mustafa atay:farshad fotouhi<>relational nested optional join for efficient semantic web query processing<>waim<>shiyong lu<>
30292<>1488_29<>zijiang yang:ping yang<>itinerary-based access control for mobile tasks in scientific workflows<>aina<>shiyong lu<>
30293<>1488_30<>mustafa atay:artem chebotko:dapeng liu:farshad fotouhi<>efficient schema-based xml-to-relational data mapping<>is<>shiyong lu<>
30294<>1489_0<>jens groth<>verifiable shuffle of large size ciphertexts<>pkc<>steve lu<>
9007<>1492_22<>e. panegai:e. poleo<>jsetl: a java library for supporting declarative programming in java<>spe<>g. rossi<>
35735<>1495_0<>prabal dutta:david e. culler:ion stoica<>micro power meter for energy monitoring of wireless sensor networks at scale<>ipsn<>xiaofan jiang<>
12879<>1499_28<>kirill minkovich<>improved sat-based boolean matching using implicants for lut-based fpgas<>fpga<>jason cong<>
12889<>1499_38<>guoling han:wei jiang<>synthesis of an application-specific soft multiprocessor system<>fpga<>jason cong<>
35731<>1500_0<>atsushi konno:masaru uchiyama<>a vision-based endpoint trajectory and vibration control for flexible manipulators<>icra<>xin jiang<>
35717<>1502_1<>xinyuan wang<>out-of-the-box monitoring of vm-based high-interaction honeypots<>raid<>xuxian jiang<>
35721<>1502_5<>ryan riley:dongyan xu<>an architectural approach to preventing code injection attacks<>dsn<>xuxian jiang<>
10286<>1508_9<>alan f. smeaton:colum foley:sinead mcgivney<>collaborative video searching on a tabletop<>mms<>hyowon lee<>
10288<>1508_11<>neil o'hare:cathal gurrin:gareth j. f. jones:noel e. o'connor:alan f. smeaton<>using text search for personal photo collections with the mediassist system<>sac<>hyowon lee<>
4869<>1514_1<>kate dickens:hugh c. davis:gary wills<>community tools for repurposing learning objects<>ectel<>chu wang<>
7618<>1520_5<>haim kaplan<>spatially-decaying aggregation over a network<>jcss<>edith cohen<>
5019<>1523_23<>xiliang zhong<>energy-aware modeling and scheduling for dynamic voltage scaling with statistical real-time guarantee<>tc<>cheng-zhong xu<>
5023<>1523_27<>xiliang zhong<>frequency-aware energy optimization for real-time periodic and aperiodic tasks<>lctrts<>cheng-zhong xu<>
35645<>1531_0<>hua lu<>snapshot density queries on location sensors<>mobide<>xuegang huang<>
35667<>1538_11<>jianer chen:iyad a. kanj:ge xia<>polynomial time approximation schemes and parameterized complexity<>dam<>xiuzhen huang<>
28858<>1544_2<>anand kashyap:samrat ganguly:suman banerjee<>"voip on wireless meshes: models, algorithms and evaluation."<>infocom<>samir r. das<>
28865<>1544_9<>ritesh maheshwari:jie gao<>detecting wormhole attacks in wireless networks using connectivity information<>infocom<>samir r. das<>
28886<>1546_0<>yunnan wu:ranveer chandra<>routing with a markovian metric to promote local mixing<>infocom<>saumitra das<>
12762<>1568_0<>kihong park:chongkwon kim<>"cross-layer analysis of rate adaptation, dcf and tcp in multi-rate wlans."<>infocom<>jaehyuk choi<>
17978<>1580_0<>yan liu:eric p. xing:alexander g. hauptmann<>harmonium models for semantic video representation and classification<>sdm<>jun yang<>
32551<>1591_2<>ah-hwee tan:ke wang<>mining generalized associations of semantic relations from textual web content<>tkde<>tao jiang<>
10727<>1595_0<>beng chin ooi:zhiyong huang:dan lin:linhao xu<>adapting relational database engine to accommodate moving objects in spade<>icde<>hua lu<>
10728<>1595_1<>zhiyong huang:christian s. jensen:beng chin ooi<>collaborative spatial data sharing among mobile lightweight devices<>ssd<>hua lu<>
10729<>1595_2<>zhiyong huang:christian s. jensen:linhao xu<>"distributed, concurrent range monitoring of spatial-network constrained mobile objects."<>ssd<>hua lu<>
10731<>1595_4<>xuegang huang<>snapshot density queries on location sensors<>mobide<>hua lu<>
10732<>1595_5<>xuegang huang:christian s. jensen:simonas saltenis<>s-grid: a versatile approach to efficient query processing in spatial networks<>ssd<>hua lu<>
13808<>1601_0<>nulo<>exploring the power of links in data mining<>waim<>jiawei han<>
10757<>1602_13<>sartaj sahni<>dynamic tree bitmap for ip lookup and update<>icn<>haibin lu<>
10740<>1603_2<>nulo<>a context-oriented framework for software testing in pervasive environment<>icse<>heng lu<>
37378<>1606_7<>simon y. chen<>cost-driven hybrid configuration prefetching for partial reconfigurable coprocessor<>ipps<>ying chen<>
13806<>1612_1<>bir bhanu<>fusion of color and infrared video for moving human detection<>pr<>ju han<>
37405<>1618_1<>chih-wei hsu:benjamin w. wah:ruoyun huang<>constraint partitioning for solving planning problems with trajectory constraints and goal preferences<>ijcai<>yixin chen<>
37419<>1618_15<>zhao xing:weixiong zhang<>long-distance mutual exclusion for propositional planning<>ijcai<>yixin chen<>
13761<>1619_19<>antony tang:ann e. nicholson:yan jin<>using bayesian belief networks for change impact analysis in architecture design<>jss<>jun han<>
13773<>1619_31<>yan jin:antony tang:yan liu<>performance evaluation and prediction for legacy information systems<>icse<>jun han<>
13787<>1622_1<>xiaoqiu shi:yunhao liu:lionel m. ni<>popularity adaptive search in hybrid p2p systems<>ipps<>jinsong han<>
13788<>1622_2<>li lu:lei hu:jinpeng huai:yunhao liu:lionel m. ni<>pseudo trust: zero-knowledge based authentication in anonymous peer-to-peer protocols<>ipps<>jinsong han<>
30521<>1627_20<>t. s. jayram:andrew mcgregor:erik vee<>estimating statistical aggregates on probabilistic data streams<>pods<>s. muthukrishnan<>
30585<>1627_84<>gianni franceschini<>optimal suffix selection<>stoc<>s. muthukrishnan<>
30618<>1627_117<>graham cormode<>the string edit distance matching problem with moves<>talg<>s. muthukrishnan<>
30619<>1627_118<>jon feldman:martin pal:clifford stein<>budget optimization in search-based advertising auctions<>sigecom<>s. muthukrishnan<>
23776<>1633_1<>nicholas armstrong-crews<>oracular partially observable markov decision processes: a very special case<>icra<>manuela m. veloso<>
28656<>1643_0<>lei guo:enhua tan:zhen xiao:xiaodong zhang<>does internet media traffic really follow zipf-like distribution?<>sigmetrics<>songqing chen<>
37793<>1646_15<>c. yao:p.-n. chen:t.-y. wang:pramod k. varshney<>performance analysis and code design for minimum hamming distance fusion in wireless sensor networks<>tit<>yunghsiang s. han<>
37796<>1648_1<>kai salomaa:derick wood<>intercode regular languages<>fuin<>yo-sub han<>
37798<>1648_3<>arto salomaa:kai salomaa:derick wood:sheng yu<>on the existence of prime decompositions<>tcs<>yo-sub han<>
37801<>1648_6<>derick wood<>obtaining shorter regular expressions from finite-state automata<>tcs<>yo-sub han<>
16080<>1654_5<>myung-cheol roh:tae-yong kim:seong-whan lee<>accurate object contour tracking based on boundary edge selection<>pr<>jihun park<>
20622<>1658_8<>heng huang:fillia makedon:andrew j. saykin<>efficient registration of 3d spharm surfaces<>crv<>li shen<>
28640<>1671_3<>s. tan:l. hanzo<>adaptive beamforming for binary phase shift keying communication systems<>sigpro<>s. chen<>
28626<>1673_7<>jingui huang:jianer chen:jianxin wang<>a simple linear time approximation algorithm for multi-processor job scheduling on four processors<>jco<>songqiao chen<>
25707<>1680_1<>yuen ping ho<>knowledge sources of innovation in a small open economy: the case of singapore<>scientometrics<>poh-kam wong<>
12263<>1687_13<>jie yin:yuexuan wang:lianchen liu:cheng wu<>scheduling remote access to scientific instruments in cyberinfrastructure for education and research<>ccgrid<>junwei cao<>
6681<>1691_15<>krishnakumar balasubramanian:jaiganesh balasubramanian:jeff parsons:aniruddha s. gokhale<>a platform-independent component modeling language for distributed real-time and embedded systems<>jcss<>douglas c. schmidt<>
6733<>1691_67<>joe hoffert:shanshan jiang<>a taxonomy of discovery services and gap analysis for ultra-large scale systems<>ACMse<>douglas c. schmidt<>
18740<>1700_0<>lothar thiele<>performance analysis of multimedia applications using correlated streams<>date<>kai huang<>
33689<>1707_36<>bharadwaj veeravalli:chaoyang chen<>fault-tolerant analysis for multiple servers movie retrieval strategy for distributed multimedia applications<>mta<>viktor k. prasanna<>
16097<>1712_0<>denilson barbosa<>adaptive record extraction from web pages<>www<>justin park<>
37958<>1730_0<>justin m. wozniak:aaron striegel<>effects of low-quality computation time estimates in policed schedulers<>anss<>yingxin jiang<>
30718<>1731_0<>weihang jiang:yuanyuan zhou:sarita v. adve<>managing energy-performance tradeoffs for multithreaded applications on multiprocessor architectures<>sigmetrics<>soyeon park<>
29823<>1744_0<>christopher j. hughes:anthony nguyen<>carbon: architectural support for fine-grained parallelism on chip multiprocessors<>isca<>sanjeev kumar<>
29833<>1744_10<>christopher j. hughes:radek grzeszczuk:eftychios sifakis:daehyun kim:andrew selle:jatin chhugani:matthew j. holliman:yen-kuang chen<>physical simulation for animation and visual effects: parallelization and characterization for chip multiprocessors<>isca<>sanjeev kumar<>
29836<>1757_0<>thippur sreenivas<>increased watermark-to-host correlation of uniform random phase watermarks in audio signals<>sigpro<>s. krishna kumar<>
41070<>1783_6<>casar sanchez:henny b. sipma<>generating efficient distributed deadlock avoidance controllers<>ipps<>zohar manna<>
41078<>1783_14<>casar sanchez:henny b. sipma<>a family of distributed deadlock avoidance protocols and their reachable state spaces<>fase<>zohar manna<>
41097<>1783_33<>henny b. sipma:ting zhang<>verifying balanced trees<>lfcs<>zohar manna<>
3926<>1784_14<>akos seress<>symmetrical path-cycle covers of a graph and polygonal graphs<>jct<>cai heng li<>
3927<>1784_15<>michael giudici:cheryl e. praeger:akos seress:vladimir i. trofimov<>on limit graphs of finite vertex-primitive graphs<>jct<>cai heng li<>
3930<>1784_18<>michael giudici:cheryl e. praeger<>a new family of locally 5-arc transitive graphs<>ejc<>cai heng li<>
3938<>1786_0<>min wang:lipyeow lim:haixun wang:kevin chen-chuan chang<>supporting ranking and clustering as generalized order-by and group-by<>sigmod<>chengkai li<>
3933<>1787_0<>yuhyun park:sean r. downing:dohyun kim:william c. hahn:philip w. kantoff:l. j. wei<>simultaneous and exact interval estimates for the contrast of two groups based on an extremely high dimensional variable: application to mass spec data<>bioinformatics<>cheng li<>
3959<>1789_15<>ramaswamy hariharan:bijit hore:sharad mehrotra<>processing spatial-keyword (sk) queries in geographic information retrieval (gir) systems<>ssdbm<>chen li<>
3960<>1789_16<>houtan shirani-mehr:xiaochun yang<>protecting individual information against inference attacks in data publishing<>dasfaa<>chen li<>
8815<>1796_9<>benoit hudson:todd phillips<>sparse parallel delaunay mesh refinement<>spaa<>gary l. miller<>
36557<>1809_2<>zhiwei li:lei zhang:wei-ying ma<>searching one billion web images by content: challenges and opportunities<>mcam<>xing xie<>
37491<>1833_2<>zhongtang cai:vibhore kumar:dejan s. milojicic:karsten schwan<>automated availability management driven by business policies<>im<>yuan chen<>
37492<>1833_3<>ricardo rivaldo:guilherme germoglio:flavio santos:dejan s. milojicic:robert adams<>sml model-based management<>im<>yuan chen<>
37480<>1847_0<>divakaran liginlal<>bayesian networks for knowledge-based authentication<>tkde<>ye chen<>
37478<>1852_0<>wade trappe:richard p. martin<>attack detection in wireless localization<>infocom<>yingying chen<>
37444<>1853_3<>xian-he sun:surendra byna<>improving data access performance with server push architecture<>ipps<>yong chen<>
37462<>1855_6<>chao-hong chen<>real-coded ecga for economic dispatch<>gecco<>ying-ping chen<>
37522<>1861_0<>ling-jyh chen:tony sun:paruvelli sreedevi:kuan-ta chen:chen-hung yu:hao-hua chu<>finding self-similarities in opportunistic people networks<>infocom<>yung-chih chen<>
38943<>1870_5<>eyal even-dar:michael kearns:jennifer wortman<>regret to the best vs. regret to the average<>colt<>yishay mansour<>
39016<>1870_78<>eyal even-dar:sham m. kakade<>the value of observation for monitoring dynamic systems<>ijcai<>yishay mansour<>
39018<>1870_80<>nir andelman:michal feldman<>strong price of anarchy<>soda<>yishay mansour<>
39033<>1870_95<>sergiu hart<>the communication complexity of uncoupled nash equilibrium procedures<>stoc<>yishay mansour<>
37513<>1880_0<>wei chen:jialin zhang:xuezheng liu<>partition approach to failure detectors for k-set agreement<>podc<>yu chen<>
2927<>1893_3<>nulo<>encoding functional relations in scunak<>entcs<>chad e. brown<>
33326<>1900_0<>yiyo kuo:chiwoon cho<>a genetic algorithms simulation approach for the multi-attribute combinatorial dispatching decision problem<>eor<>taho yang<>
3586<>1907_58<>nulo<>when the internet hits the road<>btw<>christian s. jensen<>
3619<>1907_91<>zhiyong huang:hua lu:beng chin ooi<>collaborative spatial data sharing among mobile lightweight devices<>ssd<>christian s. jensen<>
39085<>1911_0<>volkhard helms<>on the derivation of propensity scales for predicting exposed transmembrane residues of helical membrane proteins<>bioinformatics<>yungki park<>
9552<>1943_87<>nulo<>a cubic kernel for feedback vertex set<>stacs<>hans l. bodlaender<>
26313<>1945_2<>dashiell kolbe:sakti pramanik<>on k-nearest neighbor searching in non-ordered discrete data spaces<>icde<>qiang zhu<>
26350<>1950_0<>abhijit davare:marco di natale:claudio pinello:sri kanajan:alberto l. sangiovanni-vincentelli<>period optimization for hard real-time distributed automotive systems<>dac<>qi zhu<>
26349<>1951_0<>song-hai zhang:ralph r. martin<>propagation of geometric tolerance zones in 3d<>ima-ms<>qi-hui zhu<>
34888<>1954_13<>yu qi:lei zhao:kai-yuan cai<>effective fault localization using code coverage<>compsac<>w. eric wong<>
34916<>1954_41<>victor k. y. chan<>outlier elimination in construction of software metric models<>sac<>w. eric wong<>
31374<>1960_0<>lei chen 0002<>similarity joins of text with incomplete information formats<>dasfaa<>shaoxu song<>
11948<>1967_11<>ruiming chen<>fast min-cost buffer insertion under process variations<>dac<>hai zhou<>
11962<>1967_25<>chuan lin:aiguo xie<>design closure driven delay relaxation based on convex cost network flow<>date<>hai zhou<>
11965<>1967_28<>debjit sinha:jianfeng luo:subramanian rajagopalan:shabbir h. batterywala:narendra v. shenoy<>impact of modern process technologies on the electrical parameters of interconnects<>vlsid<>hai zhou<>
29094<>1974_1<>zhanyuan jiang:jiang hu:weiping shi<>an efficient algorithm for rlc buffer insertion<>isqed<>shiyan hu<>
29096<>1974_3<>mahesh ketkar:jiang hu<>gate sizing for cell library-based designs<>dac<>shiyan hu<>
10251<>1985_5<>jose a. joao:onur mutlu:yale n. patt<>profile-assisted compiler support for dynamic predication in diverge-merge processors<>cgo<>hyesoon kim<>
4635<>1993_0<>gang luo:ying-li tian<>answering relationship queries on the web<>www<>chunqiang tang<>
4640<>1993_5<>constantin adam:rolf stadler:malgorzata steinder:michael spreitzer<>a service middleware that scales in system size and applications<>im<>chunqiang tang<>
4645<>1993_10<>malgorzata steinder:michael spreitzer:giovanni pacifici<>a scalable application placement controller for enterprise data centers<>www<>chunqiang tang<>
4651<>1993_16<>chun zhang:rong n. chang:chang-shing perng:edward so:tao tao<>qos-aware optimization of composite-service fulfillment policy<>IEEEscc<>chunqiang tang<>
4652<>1993_17<>gang luo:philip s. yu<>resource-adaptive real-time new event detection<>sigmod<>chunqiang tang<>
27931<>1998_0<>maryia kazakevich:pierre boulanger:manuel garcia:walter f. bischof<>multi-modal interface for fluid dynamics simulations using 3-d localized sound<>sg<>robyn taylor<>
27934<>2000_0<>r. guzman:t. p. martin:g. d. r. hall:a. p. micolich:d. jonas:b. c. scannell:m. s. fairbanks:c. a. marlow<>authenticating pollock paintings using fractal geometry<>prl<>r. p. taylor<>
4441<>2009_0<>henrik i. christensen<>using cots to construct a high performance robot arm<>icra<>christian smith<>
14394<>2035_1<>beomseok nam:michael a. marsh:peter j. keleher:bobby bhattacharjee:derek richardson:dennis wellnitz:alan sussman<>creating a robust desktop grid using peer-to-peer services<>ipps<>jik-soo kim<>
14395<>2035_2<>peter j. keleher:michael a. marsh:bobby bhattacharjee:alan sussman<>using content-addressable networks for load balancing in desktop grids<>hpdc<>jik-soo kim<>
14387<>2038_1<>sameer shivle:howard jay siegel:anthony a. maciejewski:tracy d. braun:myron schneider:sonja tideman:ramakrishna chitta:raheleh b. dilmaghani:rohit joshi<>dynamically mapping tasks with priorities and multiple deadlines in a heterogeneous environment<>jpdc<>jong-kook kim<>
39864<>2040_5<>jun shen:georg grossmann:markus stumptner:michael schrefl:thomas reiter<>analysis of business process integration in web service context<>fgcs<>yun yang<>
39867<>2040_8<>li ruan:yongji wang:qing wang:mingshu li:lizi xie:dapeng liu:haitao zeng:shen zhang:junchao xiao:lei zhang:m. wasif nisar:jian dai<>empirical study on benchmarking software development tasks<>ispw<>yun yang<>
39871<>2040_12<>qing wang:lang gou:nan jiang:meiru che:ronghui zhang:mingshu li<>an empirical study on establishing quantitative management model for testing process<>ispw<>yun yang<>
39888<>2040_29<>xiaohui zhao:chengfei liu:wasim sadiq<>handling instance correspondence in inter-organisational workflows<>caise<>yun yang<>
39855<>2042_1<>alexander markowetz:dimitris papadias<>keyword search on relational data streams<>sigmod<>yin yang<>
39856<>2042_2<>jargen kramer:dimitris papadias:bernhard seeger<>hybmig: a hybrid approach to dynamic plan migration for continuous queries<>tkde<>yin yang<>
39801<>2043_9<>james aspnes:yitong yin<>path-independent load balancing with unreliable machines<>soda<>yang richard yang<>
39820<>2044_3<>charles u. martel:shyhtsun felix wu<>clid: a general approach to validate security policies in a dynamic network<>im<>yanyan yang<>
39791<>2046_0<>yan lindsay sun:jin ren:qing yang<>building trust in online rating systems through signal modeling<>icdcsw<>yafei yang<>
14435<>2075_0<>ill-woo park:jun-ho oh<>walking control algorithm of biped humanoid robot on uneven and inclined floor<>jirs<>jung-yup kim<>
23534<>2078_0<>wil m. p. van der aalst:hajo a. reijers:a. j. m. m. weijters:boudewijn f. van dongen:ana karla alves de medeiros:h. m. w. (eric) verbeek<>business process mining: an industrial application<>is<>minseok song<>
23537<>2078_3<>wil m. p. van der aalst:boudewijn f. van dongen:christian w. gunther:r. s. mans:ana karla alves de medeiros:a. rozinat:vladimir rubin:h. m. w. (eric) verbeek:a. j. m. m. weijters<>prom 4.0: comprehensive support for  process analysis<>apn<>minseok song<>
24473<>2083_29<>wei zhang:li shang<>nanomap: an integrated design optimization flow for a hybrid nanotube/cmos dynamically reconfigurable architecture<>dac<>niraj k. jha<>
14446<>2086_2<>william j. dally:dennis abts<>flattened butterfly: a cost-efficient topology for high-radix networks<>isca<>john kim<>
14471<>2103_0<>do-hyeon kim:ho-young kwak:yung-cheol byun<>address internetworking between wsns and internet supporting web services<>mue<>jeong-hee kim<>
4220<>2106_0<>lei shi:bin liu<>utility-based bandwidth allocation for triple-play services<>ecumn<>changbin liu<>
41541<>2112_1<>john e. karro:yangpan yan:deyou zheng:nicholas carriero:philip cayting:paul m. harrison:mark gerstein<>pseudogene.org: a comprehensive database and comparison platform for pseudogene annotation<>nar<>zhaolei zhang<>
41591<>2137_0<>sabyasachi roy:himabindu pucha:y. charlie hu:lili qiu<>"overlay node placement: analysis, algorithms and impact on applications."<>icdcs<>zheng zhang<>
14462<>2147_0<>young-jin kim:kwon-taek kwon<>energy-efficient disk replacement and file placement techniques for mobile systems with hard disks<>sac<>jihong kim<>
14463<>2147_1<>young-jin kim<>device-aware cache replacement algorithm for heterogeneous mobile storage devices<>icess<>jihong kim<>
31295<>2176_5<>nulo<>design of a logic element for implementing an asynchronous fpga<>fpga<>scott c. smith<>
31269<>2177_2<>nulo<>a fast approximate covariance-model-based database search method for non-coding rna<>isbra<>scott f. smith<>
41255<>2182_1<>lei zhao:wei mo:yao ma<>diversity and multiplexing tradeoff in general fading channels<>tit<>zhengdao wang<>
40201<>2194_7<>chang-hua wu:weihua sheng<>mobile sensor networks self localization based on multi-dimensional scaling<>icra<>ying zhang<>
40208<>2194_14<>guoliang xing:chenyang lu:qingfeng huang:robert pless<>minimum power configuration for wireless communication in sensor networks<>tosn<>ying zhang<>
23778<>2201_0<>fusheng wang:pierre-emmanuel bourgue:georg hackenberg:david kaltschmidt:peiya liu:cornelius rabsch:patrick kling:gerald madlmayr:john pearson:joe carpinelli<>sciport: an adaptable scientific data integration platform for collaborative scientific research<>vldb<>mo wang<>
23781<>2202_2<>huaiqing wang:jiming liu<>dynamic supply chain integration through intelligent agents<>hicss<>minhong wang<>
40226<>2205_12<>haitao wu:kun tan:qian zhang<>proactive scan: fast handoff with smart triggers for 802.11 wireless lan<>infocom<>yongguang zhang<>
23797<>2206_0<>lipyeow lim:haixun wang<>semantic data management: towards querying data with their meaning<>icde<>min wang<>
40230<>2209_1<>piotr berman:bhaskar dasgupta:dhruv mubayi:robert h. sloan:gyargy turan<>the inverse protein folding problem on 2d and 3d lattices<>dam<>yi zhang<>
40231<>2209_2<>bing liu<>semantic text classification of disease reporting<>sigir<>yi zhang<>
40233<>2209_4<>mark d'souza:elizabeth m. glass:mustafa h. syed:alexis rodriguez:natalia maltsev:michael y. galperin<>sentra: a database of signal transduction proteins for comparative genome analysis<>nar<>yi zhang<>
40246<>2222_1<>yun zhou:yuguang fang<>access control in wireless sensor networks<>adhoc<>yanchao zhang<>
40235<>2229_0<>vugranam c. sreedhar:weirong zhu:vivek sarkar:guang r. gao<>optimized lock assignment and allocation: a method for exploiting concurrency among critical sections<>ppopp<>yuan zhang<>
40236<>2229_1<>evelyn duesterwald<>barrier matching for programs with textually unaligned barriers<>ppopp<>yuan zhang<>
26828<>2238_1<>neelam gupta<>expert: dynamic analysis based fault location via execution perturbations<>ipps<>rajiv gupta<>
26829<>2238_2<>xiangyu zhang:sriraman tallam:neelam gupta<>towards locating execution omission errors<>pldi<>rajiv gupta<>
40271<>2250_0<>xuemin lin:yidong yuan:qing zhang<>selecting stars: the k most representative skyline operator<>icde<>ying zhang<>
40270<>2251_1<>xuemin lin:yidong yuan:masaru kitsuregawa:xiaofang zhou:jeffrey xu yu<>summarizing order statistics over data streams with duplicates<>icde<>ying zhang<>
40283<>2257_1<>charles koelbel:ken kennedy<>relative performance of scheduling algorithms in grid environments<>ccgrid<>yang zhang<>
7037<>2269_7<>yong-soo kim:seok cheon park:chul soo lee:yoon kyung han<>learning based neural similarity metrics for multimedia data mining<>soco<>dianhui wang<>
7045<>2271_0<>charles s. zender:stephen f. jenks<>server-side parallel data reduction and analysis<>gpc<>daniel l. wang<>
23373<>2280_13<>francisco m. couto:pedro coutinho<>measuring semantic similarity between gene ontology terms<>dke<>mario j. silva<>
3450<>2290_5<>liqian luo:tarek f. abdelzaher:jack stankovic<>envirostore: a cooperative storage system for disconnected operation in sensor networks<>infocom<>chengdu huang<>
13476<>2299_9<>david b. chandler:ton kloks:rolf niedermeier<>probe matrix problems: totally balanced matrices<>aaim<>jiong guo<>
13481<>2299_14<>falk huffner:hannes moser<>feedback arc set in bipartite tournaments is np-complete<>ipl<>jiong guo<>
41299<>2311_2<>shixian chu:jinfeng chen:chee-hung henry chu:vijay raghavan<>a treemap-based result interface for search engine users<>hci<>zonghuan wu<>
41310<>2311_13<>king-lup liu:weiyi meng:jing qiu:clement t. yu:vijay raghavan:yiyao lu:hai he:hongkun zhao<>allinonenews: development and evaluation of a large-scale news metasearch engine<>sigmod<>zonghuan wu<>
41315<>2313_1<>di wu:feng cui:robert l. jernigan<>pidd: database for protein inter-atomic distance distributions<>nar<>zhijun wu<>
32016<>2317_1<>peyman afshani<>on approximate range counting and depth<>compgeom<>timothy m. chan<>
32029<>2317_14<>nulo<>more algorithms for all-pairs shortest paths in weighted graphs<>stoc<>timothy m. chan<>
21477<>2320_1<>cheng huang:jin li<>pyramid codes: flexible schemes to trade space for access efficiency in reliable data storage systems<>nca<>minghua chen<>
21380<>2326_22<>shan-hung wu:kun-ta chuang:chung-min chen<>diknn: an itinerary-based knn query processing algorithm for mobile sensor networks<>icde<>ming-syan chen<>
21382<>2326_24<>kun-ta chuang:keng-pei lin<>quality-aware sampling and its applications in incremental data mining<>tkde<>ming-syan chen<>
21388<>2326_30<>bi-ru dai:cheng-ru lin<>constrained data clustering by depth control and progressive constraint relaxation<>vldb<>ming-syan chen<>
21418<>2326_60<>ching-huang yun<>mining mobile sequential patterns in a mobile commerce environment<>tsmc<>ming-syan chen<>
21347<>2327_12<>shoukat islam:deborah silver<>volume splitting and its applications<>tvcg<>min chen<>
39963<>2334_0<>kasturi r. varadarajan:s. venkatesh:jiawei zhang<>approximating the radii of point sets<>siamcomp<>yinyu ye<>
39983<>2334_20<>anthony man-cho so:jiawei zhang<>on approximating complex quadratic optimization problems via semidefinite programming relaxations<>mp<>yinyu ye<>
39993<>2334_30<>anthony man-cho so<>theory of semidefinite programming for sensor network localization<>mp<>yinyu ye<>
21325<>2336_2<>mei-ling shyu:shu-ching chen:chengcui zhang:kanoksri sarinnapakorn<>capturing high-level image concepts via affinity relationships in image database retrieval<>mta<>min chen<>
7069<>2337_0<>yanfang ye:tao li:dongyi ye<>imds: intelligent malware detection system<>kdd<>dingding wang<>
17561<>2361_24<>zhen jiang<>on achieving the shortest-path routing in 2-d meshes<>ipps<>jie wu<>
17598<>2361_61<>juncheng huang:xiuqi li<>a class-based search system in unstructured p2p networks<>aina<>jie wu<>
17616<>2361_79<>shuhui yang:fei dai<>logarithmic store-carry-forward routing in mobile ad hoc networks<>tpds<>jie wu<>
17667<>2361_130<>wei tang:hui xiong:shi zhong<>enhancing semi-supervised clustering: a feature projection perspective<>kdd<>jie wu<>
17676<>2361_139<>shuhui yang:fei dai<>efficient backbone construction methods in manets using directional antennas<>icdcs<>jie wu<>
17681<>2361_144<>feng li<>mobility reduces uncertainty in manets<>infocom<>jie wu<>
17690<>2361_153<>tinghui xu<>quorum based ip address autoconfiguration in mobile ad hoc networks<>icdcsw<>jie wu<>
25594<>2363_0<>yijian bai:fusheng wang:carlo zaniolo:shaorong liu<>rfid data processing with a data stream query language<>icde<>peiya liu<>
25590<>2365_0<>xiuwen zheng:hung-chung huang:wenyuan li:quan-zhen li:ying liu<>modeling nonlinearity in dilution design microarray data<>bioinformatics<>peng liu<>
1679<>2381_1<>eran halperin:guy kortsarz:robert krauthgamer:nan wang<>integrality ratio for group steiner trees and directed steiner trees<>siamcomp<>aravind srinivasan<>
1760<>2382_10<>lei ji:hugh nymeyer:yanan yu<>data-driven time-parallelization in the afm simulation of proteins<>ipps<>ashok srinivasan<>
26064<>2385_0<>dekang lin:dale schuurmans<>simple training of dependency parsers via structured boosting<>ijcai<>qin iris wang<>
35428<>2392_10<>daniel crabtree:peter andreae<>qc4 - a clustering evaluation method<>pakdd<>xiaoying gao<>
16027<>2398_2<>hyukseong kwon:avinash c. kak<>a new approach for active stereo camera calibration<>icra<>johnny park<>
12822<>2399_2<>krzysztof niski:budirijanto purnomo<>multi-grained level of detail using a hierarchical seamless texture atlas<>si3d<>jonathan d. cohen<>
16031<>2400_3<>ganesh devarajan<>fine-grained and scalable approaches for message integrity<>hicss<>joon s. park<>
16034<>2400_6<>luk boral:maria disla:shivraj patil:jari williams<>countering insider threats in personal devices<>isi<>joon s. park<>
27421<>2408_0<>scott n. miller:darius j. semmens:david c. goodrich:mariano hernandez:william g. kepner:d. phillip guertin<>the automated geospatial watershed assessment tool<>envsoft<>ryan c. miller<>
39721<>2417_0<>wang-chien lee:jianliang xu<>analysis of a loss-resilient proactive data transmission protocol in wireless sensor networks<>infocom<>yingqi xu<>
35290<>2421_2<>lam c. tsoi<>a method of microarray data storage using array data type<>candc<>w. jim zheng<>
27355<>2427_33<>xianfang sun:paul l. rosin:frank c. langbein<>random walks for mesh denoising<>sma<>ralph r. martin<>
27358<>2427_36<>weishi li:frank c. langbein<>generating smooth parting lines for mold design for meshes<>sma<>ralph r. martin<>
27363<>2427_41<>ming li:frank c. langbein<>detecting approximate incomplete symmetries in discrete point sets<>sma<>ralph r. martin<>
37664<>2433_13<>nulo<>fair ambients<>acta<>yuxi fu<>
37649<>2434_2<>thomas s. huang<>hmouse: head tracking driven virtual computer mouse<>wacv<>yun fu<>
21501<>2449_0<>chiang-yu chen:hua-chieh li:soo-chang pei:hsuan-jung su<>generally dimensional and constellation expansion free space-time block codes for qam with full diversity<>tit<>ming-yang chen<>
3731<>2450_1<>jean-jacques quisquater<>"fault attacks for crt based rsa: new attacks, new results, and new countermeasures."<>wistp<>chong hee kim<>
39577<>2466_3<>gerry dozier:hurley cunningham:winard britt:cheryl seals:funing zhang<>"distributed constraint satisfaction, restricted recombination, and genetic protocols."<>asc<>yu wang<>
39566<>2472_0<>jianguo qian:andreas w. m. dress<>on the dependence polynomial of a graph<>ejc<>yan wang<>
21509<>2473_1<>andre raspaud:weifan wang<>three-coloring planar graphs without short cycles<>ipl<>min chen<>
39547<>2486_1<>jose meseguer:ralf sasse:helen j. wang<>a systematic approach to uncover security flaws in gui logic<>sp<>yi-min wang<>
2915<>2487_0<>gaurav s. sukhatme<>adaptive sampling for estimating a scalar field using a robotic boat and a sensor network<>icra<>bin zhang<>
39544<>2488_0<>frans coenen:paul leng:robert sanderson<>statistical identification of key phrases for text classification<>mldm<>yanbo j. wang<>
39545<>2488_1<>qin xin:frans coenen<>a novel rule ordering approach in classification association rule mining<>mldm<>yanbo j. wang<>
39552<>2490_0<>linda debrunner:dayong zhou:victor e. debrunner<>a multiplier structure based on a novel real-time csd recoding<>iscas<>yunhua wang<>
12512<>2509_0<>caifeng lai:ling wang:xiaofeng meng:karine zeitouni<>effective density queries for moving objects in road networks<>waim<>jidong chen<>
39523<>2510_1<>siu-wing cheng:hyeon-suk na:antoine vigneron<>approximate shortest paths in anisotropic regions<>soda<>yajun wang<>
39525<>2510_3<>siu-wing cheng:hyeon-suk na:antoine vigneron<>querying approximate shortest paths in anisotropic regions<>compgeom<>yajun wang<>
39511<>2514_0<>hongyi wu:feng lin:nian-feng tzeng<>protocol design and optimization for delay/fault-tolerant mobile sensor networks<>icdcs<>yu wang<>
39501<>2515_3<>celik parkan<>a preemptive goal programming method for aggregating owa operator weights in group decision making<>isci<>ying-ming wang<>
12438<>2522_38<>anxiao jiang:iyad a. kanj:ge xia:fenghui zhang<>separability and topology control of quasi unit disk graphs<>infocom<>jianer chen<>
12443<>2522_43<>gaocai wang:chuang lin:tao wang:guojun wang<>probabilistic analysis on mesh network fault tolerance<>jpdc<>jianer chen<>
12452<>2522_52<>jingui huang:songqiao chen:jianxin wang<>a simple linear time approximation algorithm for multi-processor job scheduling on four processors<>jco<>jianer chen<>
12484<>2522_84<>fenghui zhang:hao li:anxiao jiang:ping luo<>face tracing based geographic routing in nonplanar wireless networks<>infocom<>jianer chen<>
12489<>2522_89<>songjian lu:sing-hoi sze:fenghui zhang<>"improved algorithms for path, matching, and packing problems."<>soda<>jianer chen<>
12493<>2522_93<>xiuzhen huang:iyad a. kanj:ge xia<>polynomial time approximation schemes and parameterized complexity<>dam<>jianer chen<>
12399<>2527_0<>zeshui xu<>an interactive method for fuzzy multiple attribute group decision making<>isci<>jian chen<>
5336<>2540_4<>rong n. chang:chang-shing perng:edward so:chunqiang tang:tao tao<>qos-aware optimization of composite-service fulfillment policy<>IEEEscc<>chun zhang<>
39450<>2541_2<>sen wang:miao jin:xianfeng david gu:dimitris samaras<>"conformal geometry and its applications on 3d shape matching, recognition, and stitching."<>pami<>yang wang<>
5319<>2544_9<>ken-ichi kawarabayashi:jianbing niu<>chords of longest circuits in locally planar graphs<>ejc<>cun-quan zhang<>
39468<>2545_7<>ahmet sacan:ozgur ozturk:hakan ferhatosmanoglu<>lfm-pro: a tool for detecting significant local structural sites in proteins<>bioinformatics<>yusu wang<>
18669<>2556_0<>ling-jyh chen:yung-chih chen:tony sun:paruvelli sreedevi:chen-hung yu:hao-hua chu<>finding self-similarities in opportunistic people networks<>infocom<>kuan-ta chen<>
21055<>2561_0<>ann melissa campbell:timothy j. lowe<>the p<>eor<>li zhang<>
21064<>2563_6<>chew lim tan<>warped document image restoration using shape-from-shading and physically-based modeling<>wacv<>li zhang<>
21044<>2568_5<>lucas bordeaux<>a solver for quantified boolean and linear constraints<>sac<>lintao zhang<>
33344<>2580_9<>qing zhang:nick koudas:divesh srivastava<>aggregate query answering on anonymized tables<>icde<>ting yu<>
6809<>2583_1<>anderson maciel:ronan boulic<>efficient collision detection within deforming spherical sliding contact<>tvcg<>daniel thalmann<>
18502<>2592_0<>jian yang:robert w. williams<>mapping the genetic architecture of complex traits in experimental populations<>bioinformatics<>jun zhu<>
18505<>2595_0<>yanfeng zhu:qian zhang:zhisheng niu<>on optimal physical carrier sensing: theoretical analysis and protocol design<>infocom<>jing zhu<>
18491<>2597_6<>sijian wang<>improved centroids estimation for the nearest shrunken centroid classifier<>bioinformatics<>ji zhu<>
21103<>2611_0<>holger hermanns:friedrich eisenbrand:david n. jansen<>flow faster: efficient decision algorithms for probabilistic simulations<>tacas<>lijun zhang<>
21102<>2612_0<>young j. kim:dinesh manocha<>c-dist: efficient distance computation for rigid and articulated models in configuration space<>sma<>liangjun zhang<>
20345<>2619_0<>stanley osher<>solving the chan-vese model by a multiphase level set algorithm based on the topological derivative<>scalespace<>lin he<>
34563<>2621_0<>zaiqing nie:yunxiao ma:shuming shi:ji-rong wen<>web object retrieval<>www<>wei-ying ma<>
37913<>2624_7<>hector garcia-molina<>parameterized subscriptions in publish/subscribe systems<>dke<>yongqiang huang<>
37904<>2630_3<>nalini venkatasubramanian:yang wang<>mapgrid: a new architecture for empowering mobile data placement in grid environments<>ccgrid<>yun huang<>
19177<>2635_0<>leo spalteholz:nigel livingston<>generating efficient labels to facilitate web accessibility<>www<>kin fun li<>
19179<>2635_2<>darshika g. perera<>an investigation of chip-level hardware support for web mining<>aina<>kin fun li<>
19175<>2636_28<>chiou-nan chen:tsu-yi hsieh:chia-hsien wen:joung-liang lan:der-yuan chen:chuan-yi tang<>towards design of a nailfold capillary microscopy image analysis and diagnosis framework using grid technology<>jhsn<>kuan-ching li<>
12023<>2643_3<>zhu yang:john d. o'brien:xiaobin zheng:zhen-su she<>tree and rate estimation by local evaluation of heterochronous nucleotide data<>bioinformatics<>huaiqiu zhu<>
11797<>2663_0<>yu hu:chunchen liu:lei he<>minimal skew clock embedding considering time variant temperature gradient<>ispd<>hao yu<>
11627<>2679_8<>umut balli:binoy ravindran:jonathan stephen anderson:e. douglas jensen<>utility accrual real-time scheduling under variable cost functions<>tc<>haisang wu<>
11634<>2680_3<>chong wang:nian-feng tzeng<>rfid-based 3-d positioning schemes<>infocom<>hongyi wu<>
11636<>2680_5<>yu wang:feng lin:nian-feng tzeng<>protocol design and optimization for delay/fault-tolerant mobile sensor networks<>icdcs<>hongyi wu<>
11637<>2681_0<>jerry m. mendel<>classification of battlefield ground vehicles using acoustic features and fuzzy logic rule-based classifiers<>tfs<>hongwei wu<>
11638<>2681_1<>jerry m. mendel<>"type-2 fuzzistics for symmetric interval type-2 fuzzy sets: part 2, inverse problems."<>tfs<>hongwei wu<>
11640<>2681_3<>jerry m. mendel<>"new results about the centroid of an interval type-2 fuzzy set, including the centroid of a fuzzy granule."<>isci<>hongwei wu<>
31067<>2683_99<>gregory l. cherlin<>universal graphs with a forbidden subtree<>jct<>saharon shelah<>
23876<>2684_19<>thomas agotnes:wiebe van der hoek:juan a. rodriguez-aguilar:carles sierra<>on the logic of normative systems<>ijcai<>michael wooldridge<>
23912<>2684_55<>thomas agotnes:wiebe van der hoek<>quantified coalition logic<>ijcai<>michael wooldridge<>
36832<>2691_1<>chaolin zhang:michael q. zhang:yanda li<>"neighbor number, valley seeking and clustering."<>prl<>xuegong zhang<>
36836<>2691_5<>jing zhang:bo jiang:ming li:john tromp:michael q. zhang<>computing exact -values for dna motifs<>bioinformatics<>xuegong zhang<>
36806<>2697_12<>lei guo:enhua tan:songqing chen:zhen xiao<>does internet media traffic really follow zipf-like distribution?<>sigmetrics<>xiaodong zhang<>
1819<>2699_0<>ibrahim bokharouss:wayne wobcke:yiu-wa chan:andrew limaru<>a location-aware mobile call handling assistant<>aina<>anna wong<>
3058<>2709_35<>jian zhang:weizhong zhu:michael vogeley<>delineating the citation impact of scientific discoveries<>jcdl<>chaomei chen<>
13093<>2718_3<>sheng yang:kang zhang<>visualizing design patterns in their applications and compositions<>tse<>jing dong<>
13101<>2718_11<>tu peng:zongyan qiu<>commutability of design pattern instantiation and integration<>tase<>jing dong<>
3088<>2724_1<>feng luo:yunfeng yang:roger chang:jizhong zhou:richard h. scheuermann<>modular organization of protein interaction networks<>bioinformatics<>chin-fu chen<>
3089<>2724_2<>feng luo:yunfeng yang:roger chang:jizhong zhou:richard h. scheuermann<>modular organization of protein interaction networks<>bioinformatics<>chin-fu chen<>
3091<>2724_4<>james z. wang:zhidian du:rapeeporn payattakool:philip s. yu<>a new method to measure the semantic similarity of go terms<>bioinformatics<>chin-fu chen<>
36842<>2728_1<>ji-hong zhang:ling-yun wu:yu-ying zhao<>an optimization approach to the reconstruction of positional dna sequencing by hybridization with errors<>eor<>xiang-sun zhang<>
36845<>2730_1<>alicja wieczorkowska:zbigniew w. ras:rory a. lewis<>multi-way hierarchic classification of musical instrument sounds<>mue<>xin zhang<>
36846<>2730_2<>krzysztof marasek:zbigniew w. ras<>maximum likelihood study for sound pattern separation and recognition<>mue<>xin zhang<>
36847<>2730_3<>zbigniew w. ras<>analysis of sound features for music timbre recognition<>mue<>xin zhang<>
36848<>2730_4<>zbigniew w. ras:rory a. lewis<>"mirai: multi-hierarchical, fs-tree based music information retrieval system."<>rseisp<>xin zhang<>
8906<>2734_22<>oscar h. ibarra:andrei paun:alfonso rodroguez-paton:petr sosik:sara woodworth<>normal forms for spiking neural p systems<>tcs<>gheorghe paun<>
8919<>2734_35<>mario j. perez-jimenez<>fourth brainstorming week on membrane computing<>tcs<>gheorghe paun<>
8932<>2734_48<>haiming chen:rudolf freund:mihai ionescu:mario j. perez-jimenez<>on string languages generated by spiking neural p systems<>fuin<>gheorghe paun<>
8978<>2734_94<>gabriel ciobanu:linqiang pan:mario j. perez-jimenez<>p systems with minimal parallelism<>tcs<>gheorghe paun<>
23802<>2740_0<>xiang li:andreas zell<>dribbling control of omnidirectional soccer robots<>icra<>maosen wang<>
39769<>2742_0<>daniel g. aliaga<>robust pixel classification for 3d modeling with structured light<>graphicsinterface<>yi xu<>
7227<>2747_41<>prosenjit bose:jurek czyzowicz:zhicheng gao:pat morin<>simultaneous diagonal flips in plane triangulations<>jgt<>david r. wood<>
7154<>2750_1<>jayaram bobba:kevin e. moore:haris volos:luke yen:mark d. hill:michael m. swift<>performance pathologies in hardware transactional memory<>isca<>david a. wood<>
36870<>2756_0<>jiangli zhu<>low-complexity interpolation architecture for soft-decision reed-solomon decoding<>iscas<>xinmiao zhang<>
31106<>2773_0<>david wingate:vishal soni:britton wolfe<>relational knowledge with predictive state representations<>ijcai<>satinder p. singh<>
31135<>2773_29<>erik talvitie<>an experts algorithm for transfer learning<>ijcai<>satinder singh<>
10522<>2774_0<>ming-yang chen:chiang-yu chen:soo-chang pei:hsuan-jung su<>generally dimensional and constellation expansion free space-time block codes for qam with full diversity<>tit<>hua-chieh li<>
31203<>2778_2<>chris mayfield:sunil prabhakar:rahul shah:susanne e. hambrusch<>indexing uncertain categorical data<>icde<>sarvjeet singh<>
3104<>2787_0<>ming-yang chen:hua-chieh li:soo-chang pei:hsuan-jung su<>generally dimensional and constellation expansion free space-time block codes for qam with full diversity<>tit<>chiang-yu chen<>
31206<>2790_2<>anuja cabraal:catherine demosthenous:gunela astbrink:michele furlong<>password sharing: implications for security design based on social practice<>chi<>supriya singh<>
31208<>2793_0<>geoffrey hollinger:athanasios kehagias<>probabilistic strategies for pursuit in cluttered environments with multiple robots<>icra<>sanjiv singh<>
31209<>2793_1<>sebastian scherer:lyle chamberlain:srikanth saripalli<>flying fast and low among obstacles<>icra<>sanjiv singh<>
3153<>2810_0<>kung chen:shu-chun weng:meng wang:siau-cheng khoo<>a compilation model for aspect-oriented polymorphically typed functional languages<>sas<>chung-hsin chen<>
3119<>2816_1<>jaewook shin:shiva kintali:jacqueline chame:mary w. hall<>model-guided empirical optimization for multimedia extension architectures: a case study<>ipps<>chun chen<>
32385<>2818_2<>canh hao nguyen<>kernel matrix evaluation<>ijcai<>tu bao ho<>
32380<>2819_1<>lijun chen:steven h. low:mung chiang:john c. doyle<>optimization based rate control for multicast with network coding<>infocom<>tracey ho<>
32382<>2819_3<>sidharth jaggi:michael langberg:sachin katti:dina katabi:muriel medard<>resilient network coding in the presence of byzantine adversaries<>infocom<>tracey ho<>
3143<>2824_2<>ying-ping chen<>real-coded ecga for economic dispatch<>gecco<>chao-hong chen<>
3131<>2827_0<>shan-hung wu:kun-ta chuang:ming-syan chen<>diknn: an itinerary-based knn query processing algorithm for mobile sensor networks<>icde<>chung-min chen<>
21891<>2834_1<>xiaolong yuan:yao ren<>speech signal enhancement through adaptive wavelet thresholding<>speech<>michael t. johnson<>
28069<>2842_7<>luis aburto<>improved supply chain management based on hybrid demand forecasts<>asc<>richard weber<>
21880<>2851_0<>nulo<>standard tableaux and klyachko's theorem on lie representations<>jct<>marianne johnson<>
4953<>2857_15<>peng qiu:z. jane wang:k. j. ray liu:zhang-zhi hu<>dependence network modeling for biomarker identification<>bioinformatics<>cathy h. wu<>
4962<>2857_24<>nicola j. mulder:rolf apweiler:teresa k. attwood:amos bairoch:alex bateman:david binns:peer bork:virginie buillard:lorenzo cerutti:richard r. copley:emmanuel courcelle:ujjwal das:louise daugherty:mark dibley:robert d. finn:wolfgang fleischmann:julian gough:daniel h. haft:nicolas hulo:sarah hunter:daniel kahn:alexander kanapin:anish kejariwal:alberto labarga:petra s. langendijk-genevaux:david lonsdale:rodrigo lopez:ivica letunic:martin madera:john maslen:craig mcanulla:jennifer mcdowall:jaina mistry:alex mitchell:anastasia n. nikolskaya:sandra e. orchard:christine a. orengo:robert petryszak:jeremy d. selengut:christian j. a. sigrist:paul d. thomas:franck valentin:derek wilson:corin yeats<>new developments in the interpro database<>nar<>cathy h. wu<>
6182<>2860_0<>j. w. large:m. tamiz<>hyper-spherical inversion transformations in multi-objective evolutionary optimization<>eor<>d. f. jones<>
10474<>2888_7<>li-ching ma<>detecting and adjusting ordinal and cardinal inconsistencies through a graphical and optimal approach in ahp models<>cor<>han-lin li<>
37597<>2893_1<>eric breck:claire cardie<>identifying expressions of opinion in context<>ijcai<>yejin choi<>
36676<>2897_0<>fengling han:jiankun hu:yi wang<>fingerprint images encryption via multi-scroll chaotic attractors<>amc<>xinghuo yu<>
36673<>2899_3<>manas tungare:william cameron:guofang teng:manuel a. pnrez-quinones:lillian n. cassel:weiguo fan:edward a. fox<>towards a syllabus repository for computer science courses<>sigcse<>xiaoyan yu<>
26104<>2903_6<>dou shen:jian-tao sun:hua li:zheng chen<>document summarization using conditional random fields<>ijcai<>qiang yang<>
26114<>2903_16<>jie yin:charles ling:rong pan<>extracting actionable knowledge from decision trees<>tkde<>qiang yang<>
26136<>2903_38<>xiaochuan ni:gui-rong xue:xiao ling:yong yu<>exploring in the weblog space by detecting informative and affective articles<>www<>qiang yang<>
26168<>2903_70<>jeffrey junfeng pan<>co-localization from labeled and unlabeled data using graph laplacian<>ijcai<>qiang yang<>
26187<>2903_89<>wenyuan dai:gui-rong xue:yong yu<>co-clustering based classification for out-of-domain documents<>kdd<>qiang yang<>
26212<>2903_114<>rong pan:junhui zhao:vincent wenchen zheng:jeffrey junfeng pan:dou shen:sinno jialin pan<>domain-constrained semi-supervised mining of tracking models in sensor networks<>kdd<>qiang yang<>
26255<>2908_0<>yafei yang:yan lindsay sun:jin ren<>building trust in online rating systems through signal modeling<>icdcsw<>qing yang<>
14254<>2921_1<>raj jain<>analysis of backward congestion notification (bcn) for ethernet in datacenter applications<>infocom<>jinjing jiang<>
10507<>2935_0<>lex wolters<>towards a better understanding of workload dynamics on data-intensive clusters and grids<>ipps<>hui li<>
10510<>2935_3<>david l. groep:lex wolters<>mining performance data for metascheduling decision support in the grid<>fgcs<>hui li<>
10511<>2935_4<>richard heusdens:michael muskulus:lex wolters<>analysis and synthesis of pseudo-periodic job arrivals in grids: a matching pursuit approach<>ccgrid<>hui li<>
10513<>2935_6<>nulo<>performance evaluation in grid computing: a modeling and prediction perspective<>ccgrid<>hui li<>
20719<>2942_2<>ying liu:bo liu:jikun huang:yunhua wu:yihui jin<>an intelligent differential evolution algorithm for designing trading-ratio system of water market<>isnn<>ling wang<>
10500<>2943_4<>mong-li lee:wynne hsu:ling li<>a path-based approach for efficient structural join with not-predicates<>dasfaa<>hanyu li<>
927<>2946_3<>nuwee wiwatwattana:christopher m. landau:g. jamie cope:gabriel a. harp<>organelle db: an updated resource of eukaryotic protein localization and function<>nar<>anuj kumar<>
39192<>2967_0<>zhenyu liu:takeshi ikenaga:satoshi goto<>enhanced strict multilevel successive elimination algorithm for fast motion estimation<>iscas<>yang song<>
39193<>2967_1<>zhenyu liu:yiqing huang:satoshi goto:takeshi ikenaga<>hardware-efficient propagate partial sad architecture for variable block size motion estimation in h.264/avc<>glvlsi<>yang song<>
39194<>2967_2<>xianghui wei:shen li:satoshi goto<>an irregular search window reuse scheme for motion estimation in mpeg-2 to h.264 transcoding<>iscas<>yang song<>
39174<>2971_0<>jian huang:isaac g. councill:jia li:c. lee giles<>generative models for name disambiguation<>www<>yang song<>
32924<>2979_0<>linying su:george inman:david w. chadwick<>flexible and manageable delegation of authority in rbac<>aina<>tuan-anh nguyen<>
9946<>2986_1<>chris hawblitzel:lea wittie:juan chen<>a garbage-collecting typed assembly language<>tldi<>heng huang<>
9949<>2986_4<>li shen:fillia makedon:andrew j. saykin<>efficient registration of 3d spharm surfaces<>crv<>heng huang<>
3885<>2994_0<>tim wark:christopher crossman:wen hu:ying guo:philip valencia:pavan sikka:peter i. corke:john henshall:kishore prayaga:julian o'grady:matt reed:andrew fisher<>the design and evaluation of a mobile sensor/actuator network for autonomous animal control<>ipsn<>caroline lee<>
3878<>2996_0<>myung-jae park:jihyun lee:jiexi lin:olivier serres:chin-wan chung<>an efficient and scalable management of ontology<>dasfaa<>chun-hee lee<>
29893<>3001_3<>dave levin:vijay gopalakrishnan:bobby bhattacharjee<>backbone construction in selfish wireless networks<>sigmetrics<>seungjoon lee<>
30011<>3013_0<>eamonn j. keogh:jessica lin:helga van herle<>finding the most unusual time series subsequence: algorithms and applications<>kais<>sang-hee lee<>
4755<>3018_1<>diego j. pedregal:peter c. young:wlodek tych<>environmental time series analysis and forecasting with the captain toolbox<>envsoft<>c. james taylor<>
39217<>3025_0<>c. greg plaxton:mitul tiwari:harrick vin<>reconfigurable resource scheduling with variable delay bounds<>ipps<>yu sun<>
39215<>3035_1<>john m. hollerbach:stephen a. mascaro<>finger force direction recognition by principal component analysis of fingernail coloration pattern<>haptics<>yu sun<>
39216<>3035_2<>john m. hollerbach:stephen a. mascaro<>eigennail for finger force direction recognition<>icra<>yu sun<>
39204<>3037_0<>marjan karkooti:joseph r. cavallaro<>"vlsi decoder architecture for high throughput, variable block-size and multi-rate ldpc codes."<>iscas<>yang sun<>
13568<>3047_42<>david j. martin:daniel kifer:ashwin machanavajjhala:johannes gehrke<>worst-case background knowledge for privacy-preserving data publishing<>icde<>joseph y. halpern<>
13570<>3047_44<>yoram moses<>characterizing solution concepts in games using knowledge-based programs<>ijcai<>joseph y. halpern<>
13627<>3047_101<>leandro chaves rego<>characterizing the np-pspace gap in the satisfiability problem for modal logic<>ijcai<>joseph y. halpern<>
13643<>3047_117<>riccardo pucella<>characterizing and reasoning about probabilistic and non-probabilistic expectation<>jacm<>joseph y. halpern<>
10540<>3052_3<>ford-long wong<>identity-based and inter-domain password authenticated key exchange for lightweight clients<>aina<>hoon wei lim<>
29454<>3054_1<>yoichi mukarami<>patch prediction of protein interaction sites: validation of a scoring function for an online server<>bird<>susan jones<>
29377<>3060_0<>martin sulzmann:gregory j. duck:peter j. stuckey<>understanding functional dependencies via constraint handling rules<>jfp<>simon l. peyton jones<>
29412<>3060_35<>martin sulzmann:manuel m. t. chakravarty:kevin donnelly<>system f with type equality coercions<>tldi<>simon l. peyton jones<>
29415<>3060_38<>dimitrios vytiniotis:stephanie weirich:mark shields<>practical type inference for arbitrary-rank types<>jfp<>simon l. peyton jones<>
29443<>3065_0<>gary e. burnett<>spatial skills and navigation of source code<>iticse<>sue jane jones<>
14931<>3067_0<>greg little:tessa a. lau:allen cypher:eben m. haber:eser kandogan<>"koala: capture, share, automate, personalize business processes on the web."<>chi<>james lin<>
14932<>3067_1<>john c. tang:jeffrey pierce:steve whittaker:clemens drews<>recent shortcuts: using recent interactions to support shared activities<>chi<>james lin<>
39612<>3071_4<>chia-ming chiang:arbee l. p. chen<>hiding sensitive association rules with limited side effects<>tkde<>yi-hung wu<>
25548<>3077_0<>serban nacu:rebecca critchley-thorne:susan holmes<>gene expression network analysis and applications to immunology<>bioinformatics<>peter lee<>
28780<>3086_0<>choongyeun cho:daeik kim:jonghae kim:jean-olivier plouchart:daihyun lim:robert trzcinski<>a data-driven statistical approach to analyzing process variation in 65nm soi technology<>isqed<>sangyeun cho<>
31564<>3095_10<>joachim s. stahl:adam bailey:michael dropps<>global detection of salient convex boundaries<>ijcv<>song wang<>
25685<>3098_1<>qiang ji:james l. wayman<>modeling and predicting face recognition system performance based on analysis of similarity scores<>pami<>peng wang<>
34064<>3120_4<>min-yuh day:richard tzong-han tsai:cheng-lung sung:chiu-chen hsieh:cheng-wei lee:shih-hung wu:kuen-pin wu:chorng-shyong ong<>reference metadata extraction using a hierarchical knowledge representation framework<>dss<>wen-lian hsu<>
8017<>3133_1<>marius wolf:jan borchers<>"education, entertainment and authenticity: lessons learned from designing an interactive exhibit about medieval music."<>chi<>eric lee<>
8024<>3133_8<>nulo<>towards a quantitative analysis of audio scrolling interfaces<>chi<>eric lee<>
30040<>3143_0<>ambarish goswami<>reaction mass pendulum (rmp): an explicit model for centroidal angular momentum of humanoid robots<>icra<>sung-hee lee<>
36254<>3144_0<>lusheng wang<>computing the maximum similarity bi-clusters of gene expression data<>bioinformatics<>xiaowen liu<>
36250<>3152_0<>hai liu:xiaohua jia:peng-jun wan:frances f. yao<>a distributed and efficient flooding scheme using 1-hop information in mobile ad hoc networks<>tpds<>xinxin liu<>
3875<>3176_0<>shih-wei kau:hung-jen lee:ching-mao yang:lin hong:chun-hsiung fang<>robust h<>fss<>ching-hsiang lee<>
5460<>3184_0<>qunfeng dong:suman banerjee:jia wang<>wire speed packet classification without tcams: a few more registers (and a bit of logic) are enough<>sigmetrics<>dheeraj agrawal<>
14890<>3207_1<>nulo<>user simulations for evaluating answers to question series<>ipm<>jimmy j. lin<>
14896<>3207_7<>pengyi zhang<>deconstructing nuggets: the stability and reliability of complex question answering evaluation<>sigir<>jimmy lin<>
14908<>3207_19<>dina demner-fushman<>answering clinical questions with knowledge-based and statistical techniques<>coling<>jimmy j. lin<>
3850<>3208_11<>yu-chi chung:i-fang su<>supporting multi-dimensional range query for sensor networks<>icdcs<>chiang lee<>
3832<>3226_5<>mei-hui wang<>ontology-based intelligent healthcare agent and its application to respiratory waveform recognition<>eswa<>chang-shing lee<>
31324<>3228_3<>mahmut t. kandemir<>integrated data reorganization and disk mapping for reducing disk energy consumption<>ccgrid<>seung woo son<>
31331<>3228_10<>mahmut t. kandemir:taylan yemliha:ozcan ozturk<>memory bank aware dynamic loop scheduling<>date<>seung woo son<>
39087<>3233_1<>jiajia zhang<>an alternative estimation method for the accelerated failure time frailty model<>csda<>yingwei peng<>
388<>3236_0<>matthew cary:benjamin edelman:ioannis giotis:kurtis heimerl:anna r. karlin:claire mathieu:michael schwarz<>greedy bidding strategies for keyword auctions<>sigecom<>aparna das<>
25425<>3250_1<>sundar subramanian:sanjay shakkottai<>on optimal geographic routing in wireless networks with holes and non-uniform traffic<>infocom<>piyush gupta<>
14841<>3255_0<>ningjian huang<>quality evaluation in flexible machining systems: a flexible fixture case study<>icra<>jingshan li<>
14839<>3257_1<>xin li:hsinchun chen:zhu zhang<>automatic patent classification using citation network information: an experimental study in nanotechnology<>jcdl<>jiexun li<>
14837<>3258_0<>nulo<>hierarchical land cover information retrieval in object-oriented remote sensing image databases with native queries<>ACMse<>jiang li<>
14805<>3294_2<>puntip pattaraintakorn:nick cercone<>"rule evaluations, attributes, and rough sets: extension and a case study."<>trs<>jiye li<>
14795<>3298_5<>michael guidero:zhen wu:eric purpus:toby ehrenkranz<>bgp routing dynamics revisited<>ccr<>jun li<>
14783<>3310_5<>son t. vuong<>ontsum: a semantic query routing scheme in p2p networks based on concise ontology indexing<>aina<>juan li<>
26040<>3319_1<>nils dahlback:clifford nass:jenny alwin<>similarity is more important than expertise: accent effects in speech interfaces<>chi<>qianying wang<>
8623<>3326_0<>matthew k. davis<>graphing kendall's tau<>csda<>gemai chen<>
27010<>3355_0<>lori l. monk:mary elizabeth jones<>wild things<>ACMse<>rich cosgriff jr.<>
35704<>3375_1<>philip bohannon:wenfei fan:floris geerts:anastasios kementsietsidis<>conditional functional dependencies for data cleaning<>icde<>xibei jia<>
16252<>3381_1<>edward w. knightly<>a performance study of deployment factors in wireless mesh networks<>infocom<>joshua robinson<>
38270<>3394_3<>yanjiang yang:robert h. deng<>new paradigm of inference control with trusted computing<>dbsec<>yingjiu li<>
38271<>3394_4<>huiping guo:sushil jajodia<>chaining watermarks for detecting malicious modifications to streaming data<>isci<>yingjiu li<>
38272<>3394_5<>xuhua ding<>protecting rfid communications in supply chains<>ccs<>yingjiu li<>
1150<>3411_11<>dariusz r. kowalski<>optimal deterministic broadcasting in known topology radio networks<>dc<>andrzej pelc<>
1164<>3411_25<>david peleg<>feasibility and complexity of broadcasting with random transmission failures<>tcs<>andrzej pelc<>
1218<>3411_79<>anders dessmark<>broadcasting in geometric radio networks<>jda<>andrzej pelc<>
9748<>3424_0<>ling chen:gencai chen:jack march:steve benford:zhi-geng pan<>an hci method to improve the human performance reduced by local-lag mechanism<>iwc<>hong chen<>
27405<>3438_8<>octavian udrea:lise getoor<>leveraging data and structure in ontology integration<>sigmod<>renee j. miller<>
27406<>3438_9<>mauricio a. hernandez:howard ho:lucian popa:ariel fuxman:takeshi fukuda:paolo papotti<>creating nested mappings with clio<>icde<>renee j. miller<>
27407<>3438_10<>yuan an:alexander borgida:john mylopoulos<>a semantic approach to discovering schema mapping expressions<>icde<>renee j. miller<>
25472<>3458_19<>vivek raghunathan<>a counterexample in congestion control of wireless networks<>pe<>p. r. kumar<>
30078<>3468_0<>nulo<>agentstra: an internet-based multi-agent intelligent system for strategic decision-making<>eswa<>shuliang li<>
20416<>3477_0<>yu liang:robert l. bass<>gapwm: a genetic algorithm method for optimizing a position weight matrix<>bioinformatics<>leping li<>
41039<>3485_0<>terence chung hsin sit:marcelo h. ang jr.:winston khoon guan seah<>multi-robot mobility enhanced hop-count based localization in ad hoc networks<>ras<>zheng liu<>
19612<>3492_2<>jinseong jeon:hwansoo han<>layout transformations for heap objects using static access patterns<>cc<>keoncheol shin<>
26719<>3500_0<>suresh purini<>bounded queries and the np machine hypothesis<>coco<>richard chang<>
10695<>3528_2<>hui zhang 0002:rauf izmailov:guofei jiang:xiaoqiao meng<>real-time application monitoring and diagnosis for service hosting platforms of black boxes<>im<>huadong liu<>
21117<>3531_1<>ravi r. iyer:fei guo:ramesh illikkal:srihari makineni:donald newell:yan solihin:lisa r. hsu:steven k. reinhardt<>qos policies and architecture for cache/memory in cmp platforms<>sigmetrics<>li zhao<>
21120<>3531_4<>laxmi n. bhuyan:ravi r. iyer:srihari makineni:donald newell<>hardware support for accelerating data movement in server platform<>tc<>li zhao<>
34462<>3551_0<>xiaoou tang:jianzhuang liu<>bayesian tensor inference for sketch-based facial photo hallucination<>ijcai<>wei liu<>
36138<>3560_1<>zhentao yu:marios c. papaefthymiou<>skew spreading for peak current reduction<>glvlsi<>xun liu<>
36149<>3560_12<>zhengtao yu<>design of rotary clock based circuits<>dac<>xun liu<>
24172<>3566_2<>long jiang:lee-feng chien:cheng niu<>named entity translation with web mining and transliteration<>ijcai<>ming zhou<>
12218<>3574_0<>rakesh kumar:dean m. tullsen<>proximity-aware directory-based coherence for multi-core processor architectures<>spaa<>jeffery a. brown<>
18288<>3582_0<>ting yan:john a. stankovic:sang hyuk son<>"thunder: towards practical, zero cost acoustic localization for outdoor wireless sensor networks."<>sigmobile<>jingbin zhang<>
22453<>3587_0<>yunhao liu<>underground structure monitoring with wireless sensor networks<>ipsn<>mo li<>
22454<>3587_1<>yunhao liu<>iso-map: energy-efficient contour mapping in wireless sensor networks<>icdcs<>mo li<>
22456<>3587_3<>yunhao liu:lei chen 0002<>non-threshold based event detection for 3d environment monitoring in sensor networks<>icdcs<>mo li<>
37181<>3591_0<>min chen:wei zhao:frank liu<>fast statistical circuit analysis with finite-point based transistor model<>date<>yu cao<>
29133<>3596_1<>hwanjo yu:kevin chen-chuan chang<>enabling soft queries for data retrieval<>is<>seung-won hwang<>
18298<>3599_3<>mark s. ackerman:lada adamic<>expertise networks in online communities: structure and algorithms<>www<>jun zhang<>
18292<>3601_0<>ling-yun wu:yu-ying zhao:xiang-sun zhang<>an optimization approach to the reconstruction of positional dna sequencing by hybridization with errors<>eor<>ji-hong zhang<>
18312<>3614_1<>bo jiang:ming li:john tromp:xuegong zhang:michael q. zhang<>computing exact -values for dna motifs<>bioinformatics<>jing zhang<>
9300<>3626_0<>yuanpu zheng:imran qureshi:htar thant zin:tyler beck:blazej bulka:stephen j. freeland<>sgdb: a database of synthetic genes re-designed for optimizing protein over-expression<>nar<>gang wu<>
9119<>3643_10<>joonsang baek:duncan s. wong:feng bao<>on the generic and efficient constructions of secure designated confirmer signatures<>pkc<>guilin wang<>
37171<>3647_3<>wenping wang:shengqi yang:sarvesh bhardwaj:rakesh vattikonda:sarma b. k. vrudhula:frank liu<>the impact of nbti on the performance of combinational and sequential circuits<>dac<>yu cao<>
30104<>3666_0<>chao-fang hu:chang-jun teng<>a fuzzy goal programming approach to multi-objective optimization problem with priorities<>eor<>shao-yuan li<>
25960<>3675_0<>lei chen 0002:xiang lian:yunhao liu:jeffrey xu yu<>indexable pla for efficient similarity search<>vldb<>qiuxia chen<>
30097<>3676_7<>guanrong chen:albert cheung:bharat bhargava:kwok-tung lo<>on the design of perceptual mpeg-video encryption algorithms<>tcsv<>shujun li<>
32113<>3681_2<>shih-chun hsu<>mining frequent tree-like patterns in large datasets<>dke<>tzung-shi chen<>
13823<>3695_0<>yuren zhou<>a comparison of gas using penalizing infeasible solutions and repairing infeasible solutions on average capacity knapsack<>isica<>jun he<>
13824<>3695_1<>hongbin dong:houkuan huang:wei hou<>evolutionary programming using a mixed mutation strategy<>isci<>jun he<>
8396<>3720_2<>christopher c. yang<>an information delivery system with automatic summarization for mobile commerce<>dss<>fu lee wang<>
36777<>3722_0<>xiaohua zhou:xiaohua hu<>semantic smoothing of document models for agglomerative clustering<>ijcai<>xiaodan zhang<>
8404<>3723_0<>tian xia:peiya liu:sridharan palanivelu<>managing and searching distributed multidimensional annotations with large scale image data<>mcam<>fusheng wang<>
8413<>3723_9<>pierre-emmanuel bourgue:georg hackenberg:mo wang:david kaltschmidt:peiya liu:cornelius rabsch:patrick kling:gerald madlmayr:john pearson:joe carpinelli<>sciport: an adaptable scientific data integration platform for collaborative scientific research<>vldb<>fusheng wang<>
8420<>3723_16<>yijian bai:peiya liu:carlo zaniolo:shaorong liu<>rfid data processing with a data stream query language<>icde<>fusheng wang<>
8421<>3723_17<>cornelius rabsch:patrick kling:peiya liu:john pearson<>web-based collaborative information integration for scientific research<>icde<>fusheng wang<>
36787<>3727_2<>wei wang<>an efficient algorithm for mining coherent patterns from heterogeneous microarrays<>ssdbm<>xiang zhang<>
35011<>3728_1<>russell tessier<>tetris: a new register pressure control technique for vliw processors<>lctrts<>weifeng xu<>
36728<>3732_1<>pauline lienhua chou:guozhu dong<>efficient computation of iceberg cubes by bounding aggregate functions<>tkde<>xiuzhen zhang<>
36734<>3732_7<>pengfei han:raymond s. norton:zhiping feng<>reducing overfitting in predicting intrinsically unstructured proteins<>pakdd<>xiuzhen zhang<>
34997<>3737_1<>solomon w. golomb<>optimal interleaving schemes for correcting two-dimensional cluster errors<>dam<>wen-qing xu<>
18262<>3741_0<>pearl pu<>refining preference-based search results through bayesian filtering<>iui<>jiyong zhang<>
18264<>3741_2<>james reilly:lorraine mcginty:pearl pu:barry smyth<>a comparison of two compound critiquing systems<>iui<>jiyong zhang<>
18266<>3741_4<>james reilly:lorraine mcginty:pearl pu:barry smyth<>evaluating compound critiquing recommenders: a real-user study<>sigecom<>jiyong zhang<>
34982<>3743_0<>pandurang kamat:wade trappe:yanyong zhang<>temporal privacy in wireless sensor networks<>icdcs<>wenyuan xu<>
18251<>3748_3<>gong zhang:ling liu<>geogrid: a scalable location service network<>icdcs<>jianjun zhang<>
35004<>3751_1<>dianxiang xu:izzat alsmadi<>model checking aspect-oriented design specification<>compsac<>weifeng xu<>
33229<>3760_2<>daniel j. lizotte:michael bowling:dale schuurmans<>automatic gait optimization with gaussian process regression<>ijcai<>tao wang<>
13954<>3766_3<>zhanyuan jiang:shiyan hu:weiping shi<>an efficient algorithm for rlc buffer insertion<>isqed<>jiang hu<>
13971<>3766_20<>ganesh venkataraman<>a placement methodology for robust clocking<>vlsid<>jiang hu<>
13991<>3766_40<>shiyan hu:mahesh ketkar<>gate sizing for cell library-based designs<>dac<>jiang hu<>
14015<>3767_2<>fengling han:xinghuo yu:yi wang<>fingerprint images encryption via multi-scroll chaotic attractors<>amc<>jiankun hu<>
14016<>3767_3<>yi wang:damien phillips<>a fingerprint orientation model based on 2d fourier expansion (fomfe) and its application to singular-point detection and fingerprint indexing<>pami<>jiankun hu<>
13996<>3768_0<>shuai wang:hongyan yang:sotirios g. ziavras<>asymmetrically banked value-aware register files<>isvlsi<>jie hu<>
13997<>3768_1<>hongyan yang:sotirios g. ziavras<>fpga-based vector processing for matrix operations<>itng<>jie hu<>
14011<>3768_15<>hongyan yang:shuai wang:sotirios g. ziavras<>vector processing support for fpga-oriented high performance applications<>isvlsi<>jie hu<>
32630<>3781_75<>goksel dedeoglu:simon baker<>the asymmetry of image registration and its application to face tracking<>pami<>takeo kanade<>
2857<>3784_4<>yabo xu:ke wang:zheng chen<>privacy-enhancing personalized web search<>www<>benyu zhang<>
2858<>3784_5<>shuicheng yan:dong xu:hongjiang zhang:qiang yang:stephen lin<>graph embedding and extensions: a general framework for dimensionality reduction<>pami<>benyu zhang<>
2860<>3784_7<>xin li:jun yan:zhi-hong deng:lei ji:weiguo fan:zheng chen<>a novel clustering-based rss aggregator<>www<>benyu zhang<>
16964<>3806_0<>kai-kuang ma<>super-resolution imaging using grid computing<>ccgrid<>jing tian<>
39924<>3814_0<>jennifer c. hou:lu-chuan kung<>modeling the effect of transmit power and physical carrier sense in multi-hop wireless networks<>infocom<>yong yang<>
39927<>3814_3<>jren-chit chin:i-hong hou:jennifer c. hou:chris ma:nageswara s. rao:mohit saxena:mallikarjun shankar:david k. y. yau<>"a sensor-cyber network testbed for plume detection, identification, and tracking."<>ipsn<>yong yang<>
36635<>3826_0<>chuan-hoo tan:hock-hai teo<>user response to free trial restrictions: a coping perspective<>hci<>xue yang<>
14329<>3831_0<>mohamed f. mokbel:shashi shekhar:tian xia:donghui zhang<>continuous evaluation of monochromatic and bichromatic reverse nearest neighbors<>icde<>james m. kang<>
13288<>3836_2<>tjalling gelsema<>an exercise in structural congruence<>ipl<>joost engelfriet<>
13290<>3836_4<>nulo<>a kleene characterization of computability<>ipl<>joost engelfriet<>
13293<>3836_7<>hendrik jan hoogeboom:bart samwel<>xml transformation by tree-walking transducers with invisible pebbles<>pods<>joost engelfriet<>
18109<>3850_6<>zhao zhang<>degree conditions for restricted-edge-connectivity and isoperimetric-edge-connectivity to be optimal<>dm<>jinjiang yuan<>
28704<>3858_0<>michael p. wellman<>iterated weaker-than-weak dominance<>ijcai<>shih-fen cheng<>
4253<>3864_0<>enrico pontelli<>inductive logic programming by instance patterns<>padl<>chongbing liu<>
27557<>3877_6<>douglas burdick:prasad m. deshpande:t. s. jayram:shivakumar vaithyanathan<>olap over uncertain and imprecise data<>vldb<>raghu ramakrishnan<>
6067<>3890_4<>david applegate:gruia calinescu:howard j. karloff:katrina ligett:jia wang<>compressing rectilinear pictures and minimizing access control lists<>soda<>david s. johnson<>
16841<>3908_2<>dou shen:hua li:qiang yang:zheng chen<>document summarization using conditional random fields<>ijcai<>jian-tao sun<>
4232<>3913_0<>nulo<>the bayes decision rule induced similarity measures<>pami<>chengjun liu<>
16778<>3914_14<>hai h. wang:shengchao qin:jin song dong<>realizing live sequence charts in systemverilog<>tase<>jun sun<>
16763<>3915_2<>howard zhou:greg turk:james m. rehg<>terrain synthesis from digital elevation models<>tvcg<>jie sun<>
16830<>3920_6<>feifei li:spiros papadimitriou:george a. mihaila:ioana stanoi<>hiding in the crowd: privacy preservation on evolving streams through correlation tracking<>icde<>jimeng sun<>
16837<>3920_13<>christos faloutsos:spiros papadimitriou:philip s. yu<>graphscope: parameter-free mining of large time-evolving graphs<>kdd<>jimeng sun<>
6630<>3926_4<>jongman kim:chrysostomos nicopoulos:reetuparna das:yuan xie:narayanan vijaykrishnan:mazin s. yousif:chita r. das<>a novel dimensionally-decomposed router for on-chip communication in 3d architectures<>isca<>dongkook park<>
20609<>3927_0<>john ferguson:marc roper:murray wood<>investigating the viability of mental models held by novice programmers<>sigcse<>linxiao ma<>
35867<>3959_4<>jiawei han:jae-gil lee:hector gonzalez<>traffic density-based discovery of hot routes in road networks<>ssd<>xiaolei li<>
35868<>3959_5<>jiawei han<>mining approximate top-k subspace anomalies in multi-dimensional time-series data<>vldb<>xiaolei li<>
32407<>3963_1<>maja pantic:alex pentland:anton nijholt<>human computing and machine understanding of human behavior: a survey<>aihc<>thomas s. huang<>
35745<>3970_2<>ligong wang:hajo broersma:cornelis hoede:georg still<>integral trees of diameter 6<>dam<>xueliang li<>
35762<>3970_19<>yumei hu:yongtang shi:tianyi xu<>"connected (n, m)-graphs with minimum and maximum zeroth-order general randic index."<>dam<>xueliang li<>
35821<>3974_34<>yanli cai:wei lou:minglu li<>target-oriented scheduling in directional sensor networks<>infocom<>x.-y. li<>
2388<>3975_8<>zhiyong huang:dan lin:hua lu:linhao xu<>adapting relational database engine to accommodate moving objects in spade<>icde<>beng chin ooi<>
2459<>3975_79<>yueguo chen:mario a. nascimento:anthony k. h. tung<>spade: on shape-based pattern detection in streaming time series<>icde<>beng chin ooi<>
2472<>3975_92<>mihai lupu:jianzhong li:shengfei shi<>clustering wavelets to speed-up data dissemination in structured p2p manets<>icde<>beng chin ooi<>
2477<>3975_97<>shiyuan wang:anthony k. h. tung:lizhen xu<>efficient skyline query processing on peer-to-peer networks<>icde<>beng chin ooi<>
2482<>3975_102<>christian bohm:claudia plant:ying yan<>efficiently processing continuous k-nn queries on data streams<>icde<>beng chin ooi<>
32410<>3977_0<>chong huang:yonghong tian:zhi zhou<>towards multi-granularity multi-facet e-book retrieval<>www<>tiejun huang<>
38014<>3993_0<>ivan osipkov:eugene y. vasserman:nicholas hopper<>combating double-spending using cooperative p2p systems<>icdcs<>yongdae kim<>
38017<>3993_3<>joengmin hwang:yu gu:tian he<>realistic sensing area modeling<>infocom<>yongdae kim<>
38025<>3993_11<>joengmin hwang:tian he<>detecting phantom nodes in wireless sensor networks<>infocom<>yongdae kim<>
33133<>4000_32<>jorome lang:maria silvia pini:francesca rossi:kristen brent venable<>winner determination in sequential majority voting<>ijcai<>toby walsh<>
33157<>4000_56<>nina narodytska<>constraint and variable ordering heuristics for compiling configuration problems<>ijcai<>toby walsh<>
33162<>4000_61<>emmanuel hebrard:barry o'sullivan<>distance constraints in constraint satisfaction<>ijcai<>toby walsh<>
33164<>4000_63<>maria silvia pini:francesca rossi:kristen brent venable<>incompleteness and incomparability in preference aggregation<>ijcai<>toby walsh<>
28845<>4004_9<>john d. holt<>parallel mining of association rules from text databases<>tjs<>soon myoung chung<>
24018<>4011_2<>jason d. r. farquhar<>a subspace kernel for nonlinear feature extraction<>ijcai<>mingrui wu<>
23996<>4016_1<>chris jermaine<>a bayesian method for guessing the extreme values in a data set<>vldb<>mingxi wu<>
32657<>4018_5<>josef kittler:roberto cipolla<>discriminative learning and recognition of image set classes using canonical correlations<>pami<>tae-kyun kim<>
32645<>4022_0<>zhenmin li<>address code optimization exploiting code scheduling in dsp applications<>iscas<>taewhan kim<>
19661<>4024_0<>andrew coles<>marvin: a heuristic search planner with online macro-action learning<>jair<>kate a. smith<>
40333<>4027_1<>phil vines<>authorship attribution via combination of evidence<>ecir<>ying zhao<>
40293<>4032_0<>feng qiu:zhe fan:arie e. kaufman<>flow simulation with locally-refined lbm<>si3d<>ye zhao<>
40296<>4032_3<>yiping han:zhe fan:feng qiu:yu-chuan kuo:arie e. kaufman:klaus mueller<>visual simulation of heat shimmering and mirage<>tvcg<>ye zhao<>
40303<>4036_1<>yaohua chen:yiyu yao<>a profit-based business model for evaluating rule interestingness<>ai<>yan zhao<>
40310<>4036_8<>yiyu yao<>conflict analysis based on discernibility and indiscernibility<>foci<>yan zhao<>
32675<>4046_0<>ming c. lin<>fast animation of lightning using an adaptive mesh<>tvcg<>theodore kim<>
32666<>4047_0<>ji won yoon:simon j. godsill:chulhun kang<>bayesian inference for 2d gel electrophoresis image analysis<>bird<>tae-seong kim<>
15297<>4051_1<>min gao:qian zhang:lionel m. ni<>energy-efficient localized topology control algorithms in ieee 802.15.4-based sensor networks<>tpds<>jian ma<>
33801<>4079_6<>nelson y. li:louis w. shapiro:sherry h. f. yan<>matrix identities on weighted partial motzkin paths<>ejc<>william y. c. chen<>
23273<>4085_6<>mark mckenney:alejandro pauly:reasey praing<>local topological relationships for complex regions<>ssd<>markus schneider<>
23283<>4085_16<>alejandro pauly<>rosa: an algebra for rough spatial objects in databases<>rskt<>markus schneider<>
33848<>4088_10<>jialin zhang:yu chen:xuezheng liu<>partition approach to failure detectors for k-set agreement<>podc<>wei chen<>
40487<>4096_1<>shili xiang:hock-beng lim:kian-lee tan<>two-tier multiple query optimization for sensor networks<>icdcs<>yongluan zhou<>
40489<>4096_3<>ji wu:kian-lee tan<>window-oblivious join: a data-driven memory management scheme for stream join<>ssdbm<>yongluan zhou<>
563<>4101_39<>rajat bhattacharjee<>algorithms and incentives for robust ranking<>soda<>ashish goel<>
7702<>4102_21<>mohammad ghodsi:mohammad taghi hajiaghayi:amin s. sayedi-roshkhar:morteza zadimoghaddam<>scheduling to minimize gaps and power consumption<>spaa<>erik d. demaine<>
7714<>4102_33<>mohammad taghi hajiaghayi<>quickly deciding minor-closed parameters in general graphs<>ejc<>erik d. demaine<>
7736<>4102_55<>lars arge:michael a. bender:bryan holland-minkley:j. ian munro<>an optimal cache-oblivious priority queue and its application to graph algorithms<>siamcomp<>erik d. demaine<>
7785<>4102_104<>mohammad taghi hajiaghayi:bojan mohar<>approximation algorithms via contraction decomposition<>soda<>erik d. demaine<>
7795<>4102_114<>jean cardinal:samuel fiorini:gwenael joret:stefan langerman:ilan newman:oren weimann<>the stackelberg minimum spanning tree game<>wads<>erik d. demaine<>
21738<>4104_77<>david eppstein:daniel s. hirschberg<>improved combinatorial group testing algorithms for real-world problem sizes<>siamcomp<>michael t. goodrich<>
31592<>4140_4<>yang wang:miao jin:xianfeng david gu:dimitris samaras<>"conformal geometry and its applications on 3d shape matching, recognition, and stitching."<>pami<>sen wang<>
31583<>4156_0<>liangjiang wang:yonghua li:martin s. r. paradesi:susan j. brown<>beetlebase: the model organism database for<>nar<>suzhi wang<>
41346<>4165_1<>irwin king:michael r. lyu<>web page classification with heterogeneous data fusion<>www<>zenglin xu<>
11198<>4172_2<>sungzoon cho<>neighborhood property-based pattern selection for support vector machines<>neco<>hyunjung shin<>
3224<>4198_19<>min pan<>ipr: an integrated placement and routing algorithm<>dac<>chris chu<>
3231<>4198_26<>natarajan viswanathan:gi-joon nam:charles j. alpert:paul villarrubia:haoxing ren<>rql: global placement via relaxed quadratic spreading and linearization<>dac<>chris chu<>
13060<>4201_2<>jungwoo ha:christopher j. rossbach:indrajit roy:hany e. ramadan:donald e. porter:david l. chen:emmett witchel<>improved error reporting for software that uses black-box components<>pldi<>jason v. davis<>
34019<>4205_7<>susan b. davidson:carmem s. hara<>propagating xml constraints to relations<>jcss<>wenfei fan<>
36703<>4210_3<>jeongkyu lee:jung-hwan oh:subodh kumar shah:shou jiang tang<>automatic classification of digestive organs in wireless capsule endoscopy videos<>sac<>xiaohui yuan<>
36681<>4211_1<>ryan g. lane:scott daniels<>an empirical study of reliable multicast protocols over ethernet-connected networks<>pe<>xin yuan<>
27683<>4214_0<>tobias isenberg:pauline jepp:karan singh:brian wyvill<>"sketching, scaffolding, and inking: a visual history for interactive 3d modeling."<>npar<>ryan schmidt<>
36726<>4215_0<>vanessa murdock:diane kelly:w. bruce croft:nicholas j. belkin<>identifying and improving retrieval for procedural questions<>ipm<>xiaojun yuan<>
27680<>4216_3<>lasaro j. camargos:fernando pedone<>multicoordinated paxos<>podc<>rodrigo schmidt<>
27653<>4220_0<>anwitaman datta:karl aberer<>query-load balancing in structured overlays<>ccgrid<>roman schmidt<>
27657<>4220_4<>marcel karnstedt:kai-uwe sattler:martin richtarsky:jessica muller:manfred hauswirth:renault john<>unistore: querying a dht-based universal storage<>icde<>roman schmidt<>
36719<>4223_0<>atif m. memon<>using gui run-time state as feedback to generate test cases<>icse<>xun yuan<>
16650<>4229_0<>karon maclean<>communicating emotion through a haptic link: design space and methodology<>ijmms<>jocelyn smith<>
16974<>4239_1<>sinae kim:ioannis kagiampakis:patricia liwang:marina vannucci<>detecting protein dissimilarities in multiple alignments using bayesian variable selection<>bioinformatics<>jerry tsai<>
30315<>4241_5<>yogesh s. mahajan:carven chan:ali alphan bayazit:wei qin<>verification driven formal architecture and microarchitecture modeling<>memocode<>sharad malik<>
38791<>4249_5<>h. conrad cunningham<>java in the box: implementing the boxscript component language<>ACMse<>yi liu<>
38804<>4252_3<>liming zhu:ngoc bao bui:ian gorton<>revel8or: model driven capacity planning tool suite<>icse<>yan liu<>
38764<>4253_0<>tie-yan liu:tao qin:zhiming ma:hang li<>supervised rank aggregation<>www<>yu-ting liu<>
38048<>4264_0<>jihong kim<>device-aware cache replacement algorithm for heterogeneous mobile storage devices<>icess<>young-jin kim<>
38049<>4264_1<>kwon-taek kwon:jihong kim<>energy-efficient disk replacement and file placement techniques for mobile systems with hard disks<>sac<>young-jin kim<>
16633<>4277_1<>david l. janovy:howard jay siegel:anthony a. maciejewski<>models and heuristics for robust resource allocation in parallel and distributed computing systems<>ipps<>jay smith<>
16634<>4277_2<>luis diego briceno:anthony a. maciejewski:howard jay siegel:timothy renner:vladimir shestak:joshua ladd:andrew sutton:david l. janovy:sudha govindasamy:amin alqudah:rinku dewri:puneet prakash<>measuring the robustness of resource allocations in a stochastic dynamic environment<>ipps<>jay smith<>
22692<>4280_55<>cynthia dwork<>zaps and their applications<>siamcomp<>moni naor<>
22733<>4280_96<>ronen gradwohl:benny pinkas:guy n. rothblum<>cryptographic and physical zero-knowledge proof systems for solutions of sudoku puzzles<>fun<>moni naor<>
38066<>4288_3<>sang-oh shim<>scheduling on parallel identical machines to minimize total tardiness<>eor<>yeong-dae kim<>
20826<>4299_0<>harry g. perros<>performance analysis of an ingress switch in a jumpstart optical burst switching network<>pe<>lisong xu<>
20829<>4299_3<>han cai:do young eun:sang-tae ha:injong rhee<>stochastic ordering for internet congestion control and its applications<>infocom<>lisong xu<>
20253<>4304_0<>calvin pan:joseph kim:qi wang:christopher lee<>the hiv positive selection mutation database<>nar<>lamei chen<>
20455<>4309_11<>li xiong:subramanyam chitti<>mining multiple private databases using a knn classifier<>sac<>ling liu<>
20456<>4309_12<>james caverlee:steve webb<>spam-resilient web rankings via influence throttling<>ipps<>ling liu<>
20479<>4309_35<>james caverlee<>countering web spam with credibility-based link analysis<>podc<>ling liu<>
20489<>4309_45<>keke chen:gordon sun<>towards attack-resilient geometric data perturbation<>sdm<>ling liu<>
20491<>4309_47<>jianjun zhang:gong zhang<>geogrid: a scalable location service network<>icdcs<>ling liu<>
20500<>4309_56<>aameek singh:mudhakar srivatsa<>efficient and secure search of enterprise file systems<>icws<>ling liu<>
20508<>4309_64<>bhuvan bamba:james caverlee:vaibhav padliya:mudhakar srivatsa:tushar bansal:mahesh palekar:joseph patrao:suiyang li:aameek singh<>"dsphere: a source-centric approach to crawling, indexing and searching the world wide web."<>icde<>ling liu<>
20523<>4309_79<>sangeetha seshadri:vibhore kumar:brian f. cooper<>optimizing multiple distributed stream queries using hierarchical network partitions<>ipps<>ling liu<>
20549<>4322_0<>zhonggui chen:zhengyue zhang:guojin wang<>surface parameterization via aligning optimal local flattening<>sma<>ligang liu<>
20552<>4322_3<>wenhao song<>stretch-based tetrahedral mesh manipulation<>graphicsinterface<>ligang liu<>
16291<>4329_1<>rizwan bashirullah:john g. harris:toshikazu nishida:josi carlos principe<>florida wireless implantable recording electrodes (fwire) for brain machine interfaces<>iscas<>justin c. sanchez<>
16292<>4329_2<>jack digiovanna:loris marchal:prapaporn rattanatamrong:ming zhao:shalom darmanjian:babak mahmoudi:josi c. principe:linda hermer-vazquez:renato j. o. figueiredo:jose a. b. fortes<>towards real-time distributed signal modeling for brain-machine interfaces<>iccS<>justin c. sanchez<>
39170<>4341_1<>zhipeng cai:randy goebel:mohammad r. salavatipour:lizhe xu:guohui lin<>selecting genes with dissimilar discrimination strength for sample class prediction<>apbc<>yi shi<>
38618<>4348_4<>wen-chieh lin<>a lattice-based mrf model for dynamic near-regular texture tracking<>pami<>yanxi liu<>
38611<>4349_0<>wenyuan li:wee keong ng:kok-leong ong<>enhancing the effectiveness of clustering with spectra analysis<>tkde<>ying liu<>
38612<>4349_1<>juan miguel gomez:mariano rico:francisco garcaa sanchez:marilia terra de mello<>bird: biomedical information integration and discovery with semantic web services<>iwinac<>ying liu<>
38613<>4349_2<>xiuwen zheng:hung-chung huang:wenyuan li:peng liu:quan-zhen li<>modeling nonlinearity in dilution design microarray data<>bioinformatics<>ying liu<>
38590<>4350_18<>tom rothamel<>efficient implementation of tuple pattern based retrieval<>pepm<>yanhong a. liu<>
38605<>4350_33<>katia hristova:k. tuncay tekle<>efficient trust management policy analysis from rules<>ppdp<>yanhong a. liu<>
16115<>4355_1<>stefan schaal<>reinforcement learning for operational space control<>icra<>jan peters<>
38660<>4356_0<>jaime g. carbonell:vanathi gopalakrishnan:peter weigele<>protein quaternary fold recognition using conditional graphical models<>ijcai<>yan liu<>
38664<>4356_4<>katharina probst:rayid ghani:marko krema:andrew e. fano<>semi-supervised learning of attribute-value pairs from product descriptions<>ijcai<>yan liu<>
38667<>4356_7<>jingrui he:jaime g. carbonell<>graph-based semi-supervised learning as a generative model<>ijcai<>yan liu<>
16118<>4357_0<>guntram flach:stefan audersch<>integration von mobilen agenten und webservice-basierten workflows innerhalb komplexer egovernment-prozesse<>gvd<>jan peters<>
38749<>4375_1<>feng wu:king ngi ngan<>3d object-based scalable wavelet video coding with boundary effect suppression<>iscas<>yu liu<>
38682<>4377_0<>jean bacon:roger wilson-hinds<>on smart-care services: studies of visually impaired users in living contexts<>icds<>ying liu<>
38683<>4377_1<>jean bacon<>a practical synthesis of dynamic role settings in telecare services<>icds<>ying liu<>
38724<>4379_7<>murray patterson:eugenia ternovska:arvind gupta<>grounding for model expansion in k-guarded formulas with inductive definitions<>ijcai<>yongmei liu<>
38685<>4380_1<>qiuxia chen:lei chen 0002:xiang lian:jeffrey xu yu<>indexable pla for efficient similarity search<>vldb<>yunhao liu<>
38693<>4380_9<>mo li<>underground structure monitoring with wireless sensor networks<>ipsn<>yunhao liu<>
38703<>4380_19<>mo li<>iso-map: energy-efficient contour mapping in wireless sensor networks<>icdcs<>yunhao liu<>
38704<>4380_20<>li lu:jinsong han:lei hu:jinpeng huai:lionel m. ni<>pseudo trust: zero-knowledge based authentication in anonymous peer-to-peer protocols<>ipps<>yunhao liu<>
38707<>4380_23<>xiaoqiu shi:jinsong han:lionel m. ni<>popularity adaptive search in hybrid p2p systems<>ipps<>yunhao liu<>
38708<>4380_24<>mo li:lei chen 0002<>non-threshold based event detection for 3d environment monitoring in sensor networks<>icdcs<>yunhao liu<>
6036<>4382_0<>nulo<>statecharts in the making: a personal account<>hopl<>david harel<>
9248<>4388_11<>hajo broersma:fedor v. fomin:rastislav kralovic<>eliminating graphs by means of parallel knock-out schemes<>dam<>gerhard j. woeginger<>
40363<>4393_0<>shang-hua teng<>combinatorial and spectral aspects of nearest neighbor graphs in doubling dimensional and nearly-euclidean spaces<>tamc<>yingchao zhao<>
33890<>4399_1<>s. sathiya keerthi<>support vector ordinal regression<>neco<>wei chu<>
33903<>4399_14<>vikas sindhwani:s. sathiya keerthi<>semi-supervised gaussian process classifiers<>ijcai<>wei chu<>
31742<>4403_0<>chanchai veerarittiphan:mihail l. sichitiu<>tiny-sync: tight time synchronization for wireless sensor networks<>tosn<>suyoung yoon<>
31746<>4404_0<>cyrus shahabi<>the clustered aggregation (cag) technique leveraging spatial and temporal correlations in wireless sensor networks<>tosn<>sunhee yoon<>
27188<>4415_2<>adrian dumitrescu:annette ebbers-baumann:ansgar grune:gunter rote<>"on the geometric dilation of closed curves, graphs, and point sets."<>comgeo<>rolf klein<>
31741<>4421_0<>chunming qiao<>a new search algorithm using autonomous and cooperative multiple sensor nodes<>infocom<>seokhoon yoon<>
20220<>4423_3<>ziang hu:junmin lin:guang r. gao<>optimizing the fast fourier transform on a multi-core architecture<>ipps<>long chen<>
20181<>4426_7<>yung-chih chen:tony sun:paruvelli sreedevi:kuan-ta chen:chen-hung yu:hao-hua chu<>finding self-similarities in opportunistic people networks<>infocom<>ling-jyh chen<>
29050<>4428_0<>imgeun lee:chang-wook han<>a hybrid genetic algorithm with simulated annealing for nonlinear blind equalization using rbf networks<>icannga<>soowhan han<>
29055<>4431_0<>wee keong ng<>privacy-preserving genetic algorithms for rule discovery<>dawak<>shuguo han<>
29056<>4431_1<>li wan:wee keong ng:vincent c. s. lee<>privacy-preservation for gradient descent methods<>kdd<>shuguo han<>
29057<>4431_2<>wee keong ng<>privacy-preserving self-organizing map<>dawak<>shuguo han<>
29058<>4436_0<>yong-yeol ahn:haewoon kwak:sue moon:hawoong jeong<>analysis of topological characteristics of huge online social networking services<>www<>seungyeop han<>
14751<>4452_0<>weibing chen:jianqiang ma:reidar conradi:junzhong ji:chunnian liu<>a survey of software development with open source components in chinese software industry<>ispw<>jingyue li<>
14757<>4452_6<>anita gupta:jon arvid borretzen:reidar conradi<>the empirical studies on quality benefits of reusing software components<>compsac<>jingyue li<>
14714<>4461_19<>ding zhou:levent bolelli:c. lee giles:hongyuan zha<>learning user clicks in web search<>ijcai<>jia li<>
14747<>4462_9<>ninghui li:rui xue<>universal accumulators with efficient nonmembership proofs<>acns<>jiangtao li<>
14737<>4463_0<>simon wu:g. h. huang<>modeling the effects of elevation data resolution on the performance of topography-based watershed runoff simulation<>envsoft<>jonathan li<>
34110<>4466_3<>jiuxing liu:matthew j. koop:bulent abali:dhabaleswar k. panda<>nomad: migrating os-bypass networks in virtual machines<>vee<>wei huang<>
34111<>4466_4<>karthikeyan vaidyanathan:lei chai:dhabaleswar k. panda<>designing efficient asynchronous memory operations using hardware copy engine: a case study with i/oat<>ipps<>wei huang<>
12635<>4477_0<>guomin yang:duncan s. wong:xiaotie deng:dongsheng wang<>a more natural way to construct identity-based identification schemes<>acns<>jing chen<>
16490<>4483_4<>diego cheda:german vidal<>static slicing of rewrite systems<>entcs<>josep silva<>
16433<>4491_15<>ines lynce<>breaking symmetries in sat matrix models<>sat<>joao p. marques silva<>
28910<>4494_20<>amlan a. bhattacharya<>self-optimizing peer-to-peer networks with selfish processes<>saso<>sukumar ghosh<>
7602<>4496_14<>shuiming ye:qibin sun<>statistics- and spatiality-based feature distance measure for error resilient image authentication<>tdhms<>ee-chien chang<>
7570<>4498_32<>arun qamra<>scalable indexing for perceptual data<>mcam<>edward y. chang<>
21977<>4514_0<>j. stephen downie:jin ha lee:anatoliy a. gruzd<>toward an understanding of similarity judgments for music digital library evaluation<>jcdl<>m. cameron jones<>
21979<>4514_2<>ingbert r. floyd:dinesh rathi:michael b. twidale<>web mash-ups and patchwork prototyping: user-driven technological innovation with web 2.0 and open source software<>hicss<>m. cameron jones<>
21982<>4515_0<>nulo<>internal waves caused by the interaction of three harmonics under no restoring forces<>appml<>m. c. w. jones<>
21957<>4517_0<>rich cosgriff jr.:lori l. monk<>wild things<>ACMse<>mary elizabeth jones<>
21932<>4521_26<>will harwood:george buchanan:mounia lalmas<>storybank: an indian village community digital library<>jcdl<>matt jones<>
12584<>4540_0<>nulo<>a typed intermediate language for compiling multiple inheritance<>popl<>juan chen<>
12587<>4540_3<>chris hawblitzel:heng huang:lea wittie<>a garbage-collecting typed assembly language<>tldi<>juan chen<>
5286<>4542_3<>heidi l. alvarez:david c. chatfield:donald a. cox:eric crumpler:cassian d'cunha:ronald gutierrez:julio ibarra:eric johnson:kuldeep kumar:tom milledge:giri narasimhan:s. masoud sadjadi<>cyberbridges a model collaboration infrastructure for e-science<>ccgrid<>chi zhang<>
5298<>4544_0<>hans de sterck:aleks papo<>database-driven grid computing with gridbase<>aina<>chen zhang<>
5295<>4545_0<>xuegong zhang:michael q. zhang:yanda li<>"neighbor number, valley seeking and clustering."<>prl<>chaolin zhang<>
5257<>4550_0<>congde lu:taiyi zhang:wei zhang<>kernel based symmetrical principal component analysis for face classification<>ijon<>chunmei zhang<>
27300<>4565_1<>nulo<>dynamic category profiling for text filtering and classification<>ipm<>rey-long liu<>
11018<>4566_41<>adam phillippy<>knowledge discovery using the sand spatial browser<>dgo<>hanan samet<>
11033<>4566_56<>edwin h. jacox<>spatial join techniques<>tods<>hanan samet<>
11080<>4566_103<>michael d. lieberman:jagan sankaranarayanan:jon sperling<>steward: demo of spatio-textual extraction on the web aiding the retrieval of documents<>dgo<>hanan samet<>
11107<>4566_130<>houman alborzi<>execution time analysis of a top-down r-tree construction algorithm<>ipl<>hanan samet<>
12613<>4569_5<>dana angluin:james aspnes:lev reyzin<>learning large-alphabet and analog circuits with value injection queries<>colt<>jiang chen<>
12622<>4573_0<>michael freytag:vadim shapiro<>shape sensitivity of constructive representations<>sma<>jiaqin chen<>
12597<>4581_0<>kung chen<>aspect-based instrumentation for locating memory leaks in java programs<>compsac<>ju-bing chen<>
7282<>4594_0<>feng cui:robert l. jernigan:zhijun wu<>pidd: database for protein inter-atomic distance distributions<>nar<>di wu<>
39634<>4601_0<>hideki kashioka:jun zhao<>using clustering approaches to open-domain question answering<>cicling<>youzheng wu<>
39654<>4604_0<>dan gusfield<>a new recombination lower bound and the minimum perfect phylogenetic forest problem<>cocoon<>yufeng wu<>
39641<>4605_6<>saumitra das:ranveer chandra<>routing with a markovian metric to promote local mixing<>infocom<>yunnan wu<>
34181<>4612_0<>minkyu kim:muriel medard:varun aggarwal:una-may o'reilly:chang wook ahn:michelle effros<>evolutionary approaches to minimizing network coding resources<>infocom<>wonsik kim<>
34182<>4612_1<>minkyu kim:varun aggarwal:una-may o'reilly:muriel medard<>genetic representations for evolutionary minimization of network coding resources<>evoW<>wonsik kim<>
34146<>4619_6<>seonghoon kang<>minimalist and intuitive user interface design guidelines for consumer electronics devices<>jot<>won kim<>
34156<>4619_16<>nulo<>on challenges for information management technology<>jot<>won kim<>
5060<>4631_10<>chun-jen chen:ching-hsien hsu<>a peer-to-peer resource sharing system with data grid technology for mobile devices<>mue<>chao-tung yang<>
5062<>4631_12<>tsu-fen han:heng-chuan kan<>on construction of a biogrid platform for parallel bioinformatics applications<>sac<>chao-tung yang<>
5082<>4631_32<>wen-chung shih:tsui-ting chen:shian-shyong tseng<>performance-based workload distribution on grid environments<>gpc<>chao-tung yang<>
5086<>4631_36<>sung-yi chen:tsui-ting chen<>a grid resource broker with network bandwidth-aware job scheduling for computational grids<>gpc<>chao-tung yang<>
5102<>4634_0<>tobun d. ng<>"terrorism and crime related weblog social network: link, content analysis and information visualization."<>isi<>christopher c. yang<>
5108<>4634_6<>fu lee wang<>an information delivery system with automatic summarization for mobile commerce<>dss<>christopher c. yang<>
5137<>4637_1<>andrew mason<>precise rssi with high process variation tolerance<>iscas<>chao yang<>
5138<>4637_2<>andrew mason:yue huang:jichun zhang<>amperometric readout and electrode array chip for bioelectrochemical sensors<>iscas<>chao yang<>
26022<>4644_3<>xuemin lin:qing zhang:yidong yuan<>error minimization in approximate range aggregates<>dke<>qing liu<>
11341<>4646_0<>satoshi kuribayashi:yusuke sakamoto:maya morihara<>plantio: an interactive pot to augment plants' expressions<>ACMace<>hiroya tanaka<>
11342<>4646_1<>satoshi kuribayashi:yusuke sakamoto:maya morihara<>plantio: an interactive pot to augment plants' expressions<>ACMace<>hiroya tanaka<>
36314<>4662_7<>yixin jiang:chuang lin:minghui shi<>self-healing group key distribution with time-limited node revocation for wireless sensor networks<>adhoc<>xuemin shen<>
36327<>4665_1<>hector gonzalez:jiawei han<>cost-conscious cleaning of massive rfid data sets<>icde<>xuehua shen<>
36337<>4668_2<>jonathan shaw:brian meeker:chen ding<>locality approximation using time<>popl<>xipeng shen<>
36342<>4668_7<>yutao zhong:steven g. dropsho:ahren studer:chen ding<>miss rate prediction across program inputs and cache configurations<>tc<>xipeng shen<>
2043<>4689_3<>bingsheng he:qiong luo<>adaptive index utilization in memory-resident structural joins<>tkde<>byron choi<>
2047<>4689_7<>boon-siew seah:klarinda g. widjanarko:sourav s. bhowmick:erwin leonardi<>efficient support for ordered xpath processing in tree-unaware commercial relational databases<>dasfaa<>byron choi<>
2069<>4694_0<>inseong lee:kiho lee:seungki jung:sunju park:jinwoo kim<>the effects of users' motivation on their perception to trading systems of digital content accessories: focusing on trading items in online games<>hicss<>boreum choi<>
13428<>4698_0<>anthony stentz<>planning with uncertainty in position using high-resolution maps<>icra<>juan pablo gonzalez<>
18840<>4711_6<>lean yu:shouyang wang<>an evolutionary programming based svm ensemble model for corporate failure prediction<>icannga<>kin keung lai<>
18852<>4719_0<>s. k. mishra<>second order symmetric duality in multiobjective programming involving generalized cone-invex functions<>eor<>k. k. lai<>
25225<>4720_38<>jurek czyzowicz:zhicheng gao:pat morin:david r. wood<>simultaneous diagonal flips in plane triangulations<>jgt<>prosenjit bose<>
25228<>4720_41<>luc devroye<>on the stabbing number of a random delaunay triangulation<>comgeo<>prosenjit bose<>
25230<>4720_43<>sergey bereg:adrian dumitrescu:ferran hurtado:pavel valtr<>traversing a set of points with a minimum number of turns<>compgeom<>prosenjit bose<>
25239<>4720_52<>paz carmi:mathieu couture:michiel h. m. smid:daming xu<>on a family of strong geometric spanners that admit local routing strategies<>wads<>prosenjit bose<>
25258<>4720_71<>mathieu couture:michel barbeau:paz carmi:evangelos kranakis<>location oblivious distributed unit disk graph coloring<>sirocco<>prosenjit bose<>
14101<>4727_0<>chee-wei tan:mung chiang:raphael cendrillon<>statistical multiplexing over dsl networks<>infocom<>jianwei huang<>
14127<>4735_3<>yang song:isaac g. councill:jia li:c. lee giles<>generative models for name disambiguation<>www<>jian huang<>
14119<>4738_0<>adnan darwiche<>the language of search<>jair<>jinbo huang<>
14120<>4738_1<>sajjad siddiqi<>hierarchical diagnosis of multiple faults<>ijcai<>jinbo huang<>
14122<>4738_3<>nulo<>the effect of restarts on the efficiency of clause learning<>ijcai<>jinbo huang<>
10182<>4752_3<>seungyong lee:charles k. chui<>coherent line drawing<>npar<>henry kang<>
10185<>4752_6<>shaine joseph:uday k. chakraborty<>optical design with epsilon-dominated multi-objective evolutionary algorithm<>icannga<>hyung w. kang<>
11286<>4755_1<>sencun zhu:guohong cao<>attack-resilient time synchronization for wireless sensor networks<>adhoc<>hui song<>
30113<>4763_0<>po-hung lin<>analog placement based on novel symmetry-island formulation<>dac<>shyh-chang lin<>
2239<>4765_51<>xiaoli li:see-kiong ng<>learning to identify unexpected instances in the test set<>ijcai<>bing liu<>
2260<>4766_0<>yang xu:gao xia:dong lin<>iteration-shared scheduling algorithms abolishing the departure-time-compatible graph in switch-memory-switch switches<>infocom<>bin liu<>
2265<>4766_5<>chengchen hu:yi tang:xuefei chen<>per-flow queueing by dynamic queue sharing<>infocom<>bin liu<>
2269<>4766_9<>changbin liu:lei shi<>utility-based bandwidth allocation for triple-play services<>ecumn<>bin liu<>
2275<>4766_15<>lei shi:yue zhang:jianming yu:bo xu:jun li<>on the extreme parallelism inside next-generation network processors<>infocom<>bin liu<>
2303<>4772_2<>magesh jayapandian:adriane chapman:v. glenn tarcea:cong yu:aaron elkiss:angela ianni:arnab nandi:carlos santos:philip andrews:brian athey:david j. states:h. v. jagadish<>michigan molecular interactions (mimi): putting the jigsaw puzzle together<>nar<>bin liu<>
30305<>4777_1<>loreto bravo:wenfei fan<>extending dependencies with conditions<>vldb<>shuai ma<>
6913<>4786_15<>marco gaertler:robert gorke<>significance-driven graph clustering<>aaim<>dorothea wagner<>
6920<>4786_22<>daniel delling<>landmark-based routing in dynamic graphs<>wea<>dorothea wagner<>
6942<>4786_44<>thomas willhalm<>speed-up techniques for shortest-path computations<>stacs<>dorothea wagner<>
8778<>4792_0<>rongjie yan:wenliang zhang:yunquan peng<>improvements for the symbolic verification of timed automata<>forte<>guangyuan li<>
11228<>4797_2<>nikolas list<>general polynomial time decomposition algorithms<>jmlr<>hans-ulrich simon<>
11252<>4799_1<>nulo<>a characterization of strong learnability in the statistical query model<>stacs<>hans-ulrich simon<>
11256<>4799_5<>shai ben-david:david pal<>stability of  -means clustering<>colt<>hans-ulrich simon<>
18366<>4811_0<>dongqing yang:jun gao:tengjiao wang<>an xml publish/subscribe algorithm implemented by relational operators<>waim<>jiakui zhao<>
18325<>4816_5<>dan zhu:qiang meng<>outsourcing resource selection: a rough set approach<>hicss<>j. leon zhao<>
18349<>4816_29<>surendra sarnikar:zhu zhang<>predicting query performance in domain-specific corpora<>hicss<>j. leon zhao<>
8470<>4824_1<>nitin gupta 0003:alan j. demers:johannes gehrke:jayavel shanmugasundaram<>user-centric personalized extensibility for data-driven web applications<>sigmod<>fan yang<>
31423<>4827_0<>s. chen:l. hanzo<>adaptive beamforming for binary phase shift keying communication systems<>sigpro<>s. tan<>
20316<>4837_1<>jean-daniel boissonnat:steve oudot<>manifold reconstruction in arbitrary dimensions using witness complexes<>compgeom<>leonidas j. guibas<>
20317<>4837_2<>steve oudot<>reconstruction using witness complexes<>soda<>leonidas j. guibas<>
20314<>4839_0<>jie gao:nikola milosavljevic:john hershberger<>sparse data aggregation in sensor networks<>ipsn<>leonidas j. guibas<>
20275<>4844_4<>an nguyen:nikola milosavljevic:qing fang:jie gao<>landmark selection and greedy landmark-descent routing for sensor networks<>infocom<>leonidas j. guibas<>
38409<>4849_0<>venugopal v. veeravalli<>cooperative relay broadcast channels<>tit<>yingbin liang<>
31714<>4858_0<>lili yang:bryan f. jones<>a fuzzy multi-objective programming for optimization of fire station locations through genetic algorithms<>eor<>shuanghua yang<>
9929<>4870_0<>anca ivan:rama akkiraju:richard goodwin<>learning ontologies to improve the quality of automatic web service matching<>icws<>hui guo<>
9930<>4870_1<>anca-andreea ivan:rama akkiraju:richard goodwin<>learning ontologies to improve the quality of automatic web service matching<>www<>hui guo<>
34625<>4881_1<>anhai doan:jeffrey f. naughton:raghu ramakrishnan<>declarative information extraction using datalog with embedded extraction predicates<>vldb<>warren shen<>
34627<>4881_3<>pedro derose:long vu:anhai doan:raghu ramakrishnan<>source-aware entity matching: a compositional approach<>icde<>warren shen<>
34193<>4893_7<>minji wu:jianliang xu:xueyan tang<>top-k monitoring in wireless sensor networks<>tkde<>wang-chien lee<>
34196<>4893_10<>ken lee:baihua zheng:huajing li<>approaching the skyline in z order<>vldb<>wang-chien lee<>
34197<>4893_11<>yingqi xu:jianliang xu<>analysis of a loss-resilient proactive data transmission protocol in wireless sensor networks<>infocom<>wang-chien lee<>
22530<>4898_0<>nulo<>fast and simple algorithms to count the number of vertex covers in an interval graph<>ipl<>min-sheng lin<>
22522<>4902_21<>kelly ward:florence bertails:tae-yong kim:stephen r. marschner:marie-paule cani<>"a survey on hair modeling: styling, simulation, and rendering."<>tvcg<>ming c. lin<>
22523<>4902_22<>theodore kim<>fast animation of lightning using an adaptive mesh<>tvcg<>ming c. lin<>
172<>4904_2<>gustavo carneiro:pedro j. moreno:nuno vasconcelos<>supervised learning of semantic classes for image annotation and retrieval<>pami<>antoni b. chan<>
31678<>4920_4<>jie wu:fei dai<>logarithmic store-carry-forward routing in mobile ad hoc networks<>tpds<>shuhui yang<>
31685<>4922_2<>nulo<>dynamic power saving mechanism for 3g umts system<>monet<>shun-ren yang<>
31687<>4924_0<>jean-claude belfiore<>optimal space-time codes for the mimo amplify-and-forward cooperative channel<>tit<>sheng yang<>
31695<>4926_5<>hongfeng wang:dingwei wang<>triggered memory-based swarm optimization in dynamic environments<>evoW<>shengxiang yang<>
15082<>4930_7<>wei liu:xiaoou tang<>bayesian tensor inference for sketch-based facial photo hallucination<>ijcai<>jianzhuang liu<>
13324<>4937_0<>guoliang li:na ta:lizhu zhou<>efficient keyword search over data-centric xml documents<>waim<>jianhua feng<>
15052<>4941_0<>dennis goeckel:donald f. towsley<>bounds on the gain of network coding and broadcasting in wireless networks<>infocom<>junning liu<>
11130<>4943_1<>ke deng:xiaofang zhou<>multi-source skyline query processing in road networks<>icde<>heng tao shen<>
11132<>4943_3<>hoyoung jeung:xiaofang zhou<>mining trajectory patterns using hidden markov models<>dawak<>heng tao shen<>
11134<>4943_5<>zi huang:xiaofang zhou:dawei song:stefan ruger<>dimensionality reduction for dimension-specific search<>sigir<>heng tao shen<>
11145<>4943_16<>xiangmin zhou:xiaofang zhou<>a new similarity measure for near duplicate video clip detection<>waim<>heng tao shen<>
11146<>4943_17<>xiaofang zhou:aoying zhou<>an adaptive and dynamic dimensionality reduction method for high-dimensional indexing<>vldb<>heng tao shen<>
19823<>4955_2<>yabo xu:benyu zhang:zheng chen<>privacy-enhancing personalized web search<>www<>ke wang<>
35028<>4957_5<>jeffrey s. vetter:shane canon:song jiang<>exploiting lustre file joining for effective collective io<>ccgrid<>weikuan yu<>
35044<>4963_1<>xiaoou li<>passivity analysis of dynamic neural networks with different time-scales<>npl<>wen yu<>
35045<>4963_2<>marco a. moreno-armendariz:floriberto ortiz rodriguez<>system identification using hierarchical fuzzy neural networks with stable learning algorithm<>jifs<>wen yu<>
33038<>4985_16<>nulo<>inside-outside probability computation for belief propagation<>ijcai<>taisuke sato<>
33046<>4985_24<>shin-ichi minato:ken satoh<>compiling bayesian networks by symbolic probability calculation based on zero-suppressed bdds<>ijcai<>taisuke sato<>
28359<>4993_7<>xing jin:q. xia<>a cost-based evaluation of end-to-end network measurements in overlay multicast<>infocom<>s.-h. g. chan<>
17906<>5004_3<>ying-ming wang:dong-ling xu:kwai-sang chin<>on the combination and normalization of interval-valued belief structures<>isci<>jian-bo yang<>
17913<>5004_10<>dong-ling xu:jun liu:guo-ping liu:jin wang:ian jenkinson:jun ren<>inference and learning methodology of belief-rule-based expert system for pipeline leak detection<>eswa<>jian-bo yang<>
17917<>5006_0<>badrish chandramouli:jeff phillips<>value-based notification conditions in large-scale publish/subscribe systems<>vldb<>jun yang<>
17932<>5006_15<>badrish chandramouli:christopher n. bond:shivnath babu<>query suspend and resume<>sigmod<>jun yang<>
17934<>5006_17<>adam silberstein:gregory filpus:kamesh munagala<>data-driven processing in sensor networks<>cidr<>jun yang<>
17938<>5006_21<>badrish chandramouli:christopher n. bond:shivnath babu<>on suspending and resuming dataflows<>icde<>jun yang<>
17941<>5006_24<>hao he:haixun wang:philip s. yu<>blinks: ranked keyword searches on graphs<>sigmod<>jun yang<>
17916<>5007_0<>apala guha:jason hiser:naveen kumar:min zhao:shukang zhou:bruce r. childers:jack w. davidson:kim m. hazelwood:mary lou soffa<>virtual execution environments: support and tools<>ipps<>jing yang<>
35116<>5016_3<>abhishek pillai:dimitrios kagaris<>detecting vliw hard errors cost-effectively through a software-based approach<>aina<>wei zhang<>
35126<>5016_13<>jun yan<>wcet analysis of instruction caches with prefetching<>lctrts<>wei zhang<>
35131<>5016_18<>abhishek pillai:laurence tianruo yang<>exploring functional unit design space of vliw processors for optimizing both performance and energy consumption<>aina<>wei zhang<>
35134<>5016_21<>congde lu:chunmei zhang:taiyi zhang<>kernel based symmetrical principal component analysis for face classification<>ijon<>wei zhang<>
35145<>5016_32<>mallik kandala:laurence tianruo yang<>an area-efficient approach to improving register file reliability against transient errors<>aina<>wei zhang<>
13840<>5026_5<>minos n. garofalakis:petros maniatis<>proof sketches: verifiable in-network aggregation<>icde<>joseph m. hellerstein<>
13849<>5026_14<>ryan huebsch:minos n. garofalakis:ion stoica<>sharing aggregate computation for distributed queries<>sigmod<>joseph m. hellerstein<>
13853<>5026_18<>frederick reiss:kurt stockinger:kesheng wu:arie shoshani<>enabling real-time querying of live and historical stream data<>ssdbm<>joseph m. hellerstein<>
13873<>5026_38<>ling huang:xuanlong nguyen:minos n. garofalakis:michael i. jordan:anthony d. joseph:nina taft<>communication-efficient online detection of network-wide anomalies<>infocom<>joseph m. hellerstein<>
13881<>5026_46<>tyson condie:minos n. garofalakis:boon thau loo:petros maniatis:timothy roscoe:nina taft<>public health for the internet (phi)<>cidr<>joseph m. hellerstein<>
35173<>5028_0<>j. nicholas laneman<>how good is psk for peak-limited fading channels in the low-snr regime?<>tit<>wenyi zhang<>
35171<>5030_0<>barbara g. ryder<>discovering accurate interclass test dependences<>paste<>weilei zhang<>
15215<>5032_0<>d. chris rayner:katherine davison:vadim bulitko:kenneth anderson<>real-time heuristic search with a priority queue<>ijcai<>jieshan lu<>
37814<>5054_5<>xin li:xiaohu guo:hongyu wang:xianfeng gu:hong qin<>harmonic volumetric mapping for solid modeling applications<>sma<>ying he<>
18657<>5059_2<>ju-bing chen<>aspect-based instrumentation for locating memory leaks in java programs<>compsac<>kung chen<>
18658<>5059_3<>shu-chun weng:meng wang:siau-cheng khoo:chung-hsin chen<>a compilation model for aspect-oriented polymorphically typed functional languages<>sas<>kung chen<>
32727<>5070_0<>peter hoyer:robert spalek<>negative weights make adversaries stronger<>stoc<>troy lee<>
24957<>5073_27<>nulo<>developments in language theory<>tcs<>oscar h. ibarra<>
24239<>5078_47<>eyal lubetzky<>independent sets in tensor graph powers<>jgt<>noga alon<>
32223<>5081_33<>dirk beyer:rupak majumdar:andrey rybalchenko<>path invariants<>pldi<>thomas a. henzinger<>
32331<>5081_141<>krishnendu chatterjee:nir piterman<>generalized parity games<>fossacs<>thomas a. henzinger<>
32332<>5081_142<>krishnendu chatterjee<>assume-guarantee synthesis<>tacas<>thomas a. henzinger<>
32351<>5081_161<>krishnendu chatterjee:nir piterman<>strategy logic<>concur<>thomas a. henzinger<>
35220<>5082_42<>wei yu:xinwen fu:steve graham:dong xuan<>dsss-based flow marking technique for invisible traceback<>sp<>wei zhao<>
9430<>5105_6<>manfred droste<>bifinite chu spaces<>calco<>guo-qiang zhang<>
9438<>5105_14<>ying jiang<>weakly distributive domains<>tlca<>guo-qiang zhang<>
9449<>5105_25<>adam d. troy<>enhancing relevance scoring with chronological term rank<>sigir<>guo-qiang zhang<>
9460<>5111_1<>erwin lutwak:deane yang<>moment-entropy inequalities for a random vector<>tit<>gaoyong zhang<>
38888<>5114_1<>xuemin lin:wei wang:xiaofang zhou<>spark: top-k keyword query in relational databases<>sigmod<>yi luo<>
9462<>5116_1<>wei hua:xueying qin:tien-tsin wong:hujun bao<>stereoscopic video synthesis from a monocular video<>tvcg<>guofeng zhang<>
9464<>5118_0<>jianjun zhang:ling liu<>geogrid: a scalable location service network<>icdcs<>gong zhang<>
37870<>5130_0<>nicholas i. m. gould:jennifer a. scott<>a numerical evaluation of sparse direct solvers for the solution of large sparse symmetric linear systems of equations<>toms<>yifan hu<>
37864<>5131_20<>ali raza butt:chris gniady<>the performance impact of kernel prefetching on buffer cache replacement algorithms<>tc<>y. charlie hu<>
37865<>5131_21<>himabindu pucha:ying zhang:zhuoqing morley mao<>understanding network delay changes caused by routing events<>sigmetrics<>y. charlie hu<>
10005<>5136_0<>cheng-kuan lin:lih-hsing hsu<>on the spanning connectivity of graphs<>dm<>hua-min huang<>
15766<>5142_2<>q. zhang:g. g. yin<>two-time-scale approximation for wonham filters<>tit<>j. b. moore<>
23126<>5149_24<>leticia maria veiras bolzani:e. sanchez:massimiliano schillaci:giovanni squillero<>an automated methodology for cogeneration of test blocks for peripheral cores<>iolts<>matteo sonza reorda<>
23181<>5149_79<>paolo bernardi:michelangelo grosso:e. sanchez<>on the automatic generation of test programs for path-delay faults in microprocessor cores<>ets<>matteo sonza reorda<>
23186<>5149_84<>salvatore pontarelli:luca sterpone:gian-carlo cardarilli:marco re:adelio salsano:massimo violante<>self checking circuit optimization by means of fault injection analysis: a case study on reed solomon decoders<>iolts<>matteo sonza reorda<>
23197<>5149_95<>paolo bernardi:michelangelo grosso<>hardware-accelerated path-delay fault grading of functional test programs for processor-based systems<>glvlsi<>matteo sonza reorda<>
24101<>5152_4<>benoit libert:jean-jacques quisquater<>parallel key-insulated public key encryption without random oracles<>pkc<>moti yung<>
21579<>5157_10<>michela becchi:patrick crowley<>performance/area efficiency in chip multiprocessors with micro-caches<>cf<>mark a. franklin<>
24107<>5167_1<>jing zhang:bo jiang:ming li:john tromp:xuegong zhang<>computing exact -values for dna motifs<>bioinformatics<>michael q. zhang<>
24110<>5167_4<>m. juanita martinez:andrew d. smith:bilan li:kevin s. harrod<>computational prediction of novel components of lung transcriptional networks<>bioinformatics<>michael q. zhang<>
24118<>5167_12<>c. jiang:z. xuan:f. zhao<>"tred: a transcriptional regulatory element database, new entries and other development."<>nar<>m. q. zhang<>
24119<>5167_13<>chaolin zhang:xuegong zhang:yanda li<>"neighbor number, valley seeking and clustering."<>prl<>michael q. zhang<>
28823<>5168_0<>heeyoul choi<>robust kernel isomap<>pr<>seungjin choi<>
28824<>5168_1<>seunghak lee:iryoung jeong<>dynamically weighted hidden markov model for spam deobfuscation<>ijcai<>seungjin choi<>
31870<>5172_10<>gaurav aggarwal:rama chellappa:david w. jacobs<>"appearance characterization of linear lambertian objects, generalized photometric stereo, and illumination-invariant face recognition."<>pami<>shaohua kevin zhou<>
31878<>5172_18<>dorin comaniciu<>shape regression machine<>ipmi<>shaohua kevin zhou<>
31896<>5178_3<>apala guha:jason hiser:naveen kumar:jing yang:min zhao:bruce r. childers:jack w. davidson:kim m. hazelwood:mary lou soffa<>virtual execution environments: support and tools<>ipps<>shukang zhou<>
3419<>5181_0<>yi tang:xuefei chen:bin liu<>per-flow queueing by dynamic queue sharing<>infocom<>chengchen hu<>
3409<>5183_0<>jennifer c. hou<>a novel approach to contention control in ieee 802.11e-operated wlans<>infocom<>chunyu hu<>
24163<>5184_1<>jun xie:tao zhou:xia hua:lisha tang:weilin wu<>sno/scarnabase: a curated database for small nucleolar rnas and cajal body-specific rnas<>nar<>ming zhang<>
24141<>5187_16<>christopher fogelberg<>genetic programming for image recognition: an lgp approach<>evoW<>mengjie zhang<>
24143<>5187_18<>william d. smart:peter andreae<>empirical analysis of gp tree-fragments<>eurogp<>mengjie zhang<>
38931<>5200_0<>lei zhao:wei mo:zhengdao wang<>diversity and multiplexing tradeoff in general fading channels<>tit<>yao ma<>
38919<>5202_9<>dmitri v. kalashnikov:ramaswamy hariharan:sharad mehrotra:nalini venkatasubramanian:naveen ashish:jay lickfett<>on-demand information portals for disaster situations<>isi<>yiming ma<>
38920<>5202_10<>sharad mehrotra<>integrating similarity retrieval and skyline exploration via relevance feedback<>dasfaa<>yiming ma<>
38929<>5202_19<>roberto j. bayardo:ramakrishnan srikant<>scaling up all pairs similarity search<>www<>yiming ma<>
6440<>5204_0<>prathima rao:elisa bertino<>xacml function annotations<>policy<>dan lin<>
6442<>5204_2<>prathima rao:elisa bertino:jorge lobo<>an approach to evaluate policy similarity<>sacmat<>dan lin<>
6443<>5204_3<>hicham g. elmongui:elisa bertino:beng chin ooi<>data management in rfid applications<>dexa<>dan lin<>
6447<>5204_7<>bin cui:dongqing yang<>optimizing moving queries over moving object data streams<>dasfaa<>dan lin<>
4626<>5209_3<>khim-yong goh:hock-hai teo<>an investigation of online group-buying institution and buyer behavior<>hci<>chuan-hoo tan<>
4627<>5209_4<>xue yang:hock-hai teo<>user response to free trial restrictions: a coping perspective<>hci<>chuan-hoo tan<>
38936<>5210_0<>zaiqing nie:shuming shi:ji-rong wen:wei-ying ma<>web object retrieval<>www<>yunxiao ma<>
4630<>5213_0<>dah-ming chiu:john c. s. lui:david k. y. yau<>a distributed throttling approach for handling high bandwidth aggregates<>tpds<>chee-wei tan<>
4631<>5213_1<>daniel perez palomar:mung chiang<>exploiting hidden convexity for flexible and robust resource allocation in cellular networks<>infocom<>chee-wei tan<>
4618<>5219_7<>joseph chee ming teo:jens-are amundsen<>authenticated broadcast encryption scheme<>aina<>chik how tan<>
4522<>5220_3<>li zhang<>warped document image restoration using shape-from-shading and physically-based modeling<>wacv<>chew lim tan<>
4525<>5220_6<>zheng-yu niu:dong-hong ji<>using cluster validation criterion to identify optimal feature subset and cluster number for document clustering<>ipm<>chew lim tan<>
4565<>5220_46<>bo yuan<>convex hull based skew estimation<>pr<>chew lim tan<>
4602<>5220_83<>weihua huang:siqi zong<>chart image classification using multiple-instance learning<>wacv<>chew lim tan<>
34487<>5224_0<>yinfei pan:ying zhang:kenneth chiu<>a static load-balancing scheme for parallel xml parsing on multicore cpus<>ccgrid<>wei lu<>
11703<>5228_0<>lars birkedal<>relational parametricity and separation logic<>fossacs<>hongseok yang<>
11718<>5228_15<>nulo<>relational separation logic<>tcs<>hongseok yang<>
34481<>5230_2<>tianping chen<>positive solutions of general delayed competitive or cooperative lotka-volterra systems<>isnn<>wenlian lu<>
22486<>5244_0<>chandra kambhamettu:maureen c. stone<>nonrigid motion recovery for 3d surfaces<>ivc<>min li<>
22494<>5245_0<>yanli cai:wei lou:x.-y. li<>target-oriented scheduling in directional sensor networks<>infocom<>minglu li<>
7339<>5254_2<>ying li:mung chiang:a. robert calderbank<>optimal provisioning of elastic service availability<>infocom<>dahai xu<>
7342<>5254_5<>mung chiang:jennifer rexford<>deft: distributed exponentially-weighted flow splitting<>infocom<>dahai xu<>
6480<>5259_9<>huaguang zhang:qinglai wei<>on-line learning control for discrete nonlinear systems via an improved addhp method<>isnn<>derong liu<>
6481<>5261_0<>kien a. hua<>support concurrent queries in multiuser cbir systems<>icde<>danzhou liu<>
6500<>5266_9<>nulo<>efficient and distributed access control for sensor networks<>dcoss<>donggang liu<>
6501<>5266_10<>nulo<>resilient cluster formation for sensor networks<>icdcs<>donggang liu<>
6040<>5270_0<>jeremy heaston:ivette morazzani:ping ren:gabriel goldman<>strider: self-excited tripedal dynamic experimental robot<>icra<>dennis hong<>
28713<>5288_3<>w. k. chan:tsong yueh chen:t. h. tse:zhenyu zhang<>towards the testing of power-aware software applications for wireless sensor networks<>adaEurope<>s. c. cheung<>
28716<>5288_6<>t. h. ng:w. k. chan:y. t. yu<>do maintainers utilize deployed design patterns effectively?<>icse<>s. c. cheung<>
28753<>5288_43<>frank k. w. cheong:dickson k. w. chiu:patrick c. k. hung<>developing a distributed e-monitoring system for enterprise website and web services: an experience report with free libraries and tools<>icws<>shing-chi cheung<>
15980<>5301_1<>rong pan:junhui zhao:vincent wenchen zheng:dou shen:sinno jialin pan:qiang yang<>domain-constrained semi-supervised mining of tracking models in sensor networks<>kdd<>jeffrey junfeng pan<>
15981<>5301_2<>qiang yang<>co-localization from labeled and unlabeled data using graph laplacian<>ijcai<>jeffrey junfeng pan<>
31728<>5310_0<>mark harman<>pareto efficient multi-objective test case selection<>issta<>shin yoo<>
15965<>5311_16<>ian horrocks<>rdfs(fa): connecting rdf(s) and owl dl<>tkde<>jeff z. pan<>
15971<>5311_22<>nulo<>a flexible ontology reasoning architecture for the semantic web<>tkde<>jeff z. pan<>
10351<>5322_0<>shih-wei kau:ching-mao yang:ching-hsiang lee:lin hong:chun-hsiung fang<>robust h<>fss<>hung-jen lee<>
15703<>5326_33<>peter bras:eowyn cenek:christian a. duncan:alon efrat:cesim erten:dan ismailescu:stephen g. kobourov:anna lubiw<>on simultaneous planar graph embeddings<>comgeo<>joseph s. b. mitchell<>
15755<>5329_0<>douglas r. mitchell<>status of clinical gene sequencing data reporting and associated risks for information loss<>jbi<>joyce a. mitchell<>
37232<>5339_1<>nulo<>no regrets about no-regret<>ai<>yu-han chang<>
37234<>5339_3<>paul r. cohen:clayton t. morrison:carole r. beal<>learning and transferring action schemas<>ijcai<>yu-han chang<>
5209<>5340_5<>h. v. jagadish<>querying complex structured databases<>vldb<>cong yu<>
5210<>5340_6<>h. v. jagadish:adriane chapman:aaron elkiss:magesh jayapandian:yunyao li:arnab nandi<>making database systems usable<>sigmod<>cong yu<>
5214<>5340_10<>magesh jayapandian:adriane chapman:v. glenn tarcea:aaron elkiss:angela ianni:bin liu:arnab nandi:carlos santos:philip andrews:brian athey:david j. states:h. v. jagadish<>michigan molecular interactions (mimi): putting the jigsaw puzzle together<>nar<>cong yu<>
20951<>5346_22<>shuo wang:feng jing:jibo he:qixing du<>igroup: presenting web image search results in semantic clusters<>chi<>lei zhang<>
20959<>5346_30<>zhiwei li:xing xie:wei-ying ma<>searching one billion web images by content: challenges and opportunities<>mcam<>lei zhang<>
20926<>5349_1<>yong guan<>variance estimation over sliding windows<>pods<>linfeng zhang<>
21006<>5352_5<>kevin wampler:daichi sasaki:zoran popovic<>"dynamic, expressive speech animation from a single mesh."<>sca<>li zhang<>
26401<>5357_6<>arun chandrashekharapuram<>dispatch sequences for embedded control models<>jcss<>rajeev alur<>
26430<>5357_35<>nulo<>marrying words and trees<>pods<>rajeev alur<>
26433<>5357_38<>pavol cerny:swarat chaudhuri<>model checking on trees with path equivalences<>tacas<>rajeev alur<>
26452<>5357_57<>gera weiss<>automata based interfaces for control and scheduling<>hybrid<>rajeev alur<>
26455<>5357_60<>marcelo arenas:pablo barcelo:kousha etessami:neil immerman:leonid libkin<>first-order and temporal logics for nested words<>lics<>rajeev alur<>
26478<>5357_83<>sebastian burckhardt:milo m. k. martin<>checkfence: checking consistency of concurrent data types on relaxed memory models<>pldi<>rajeev alur<>
26516<>5357_121<>nulo<>marrying words and trees<>csr<>rajeev alur<>
24682<>5359_60<>rui fan:ralph e. droms:nancy d. griffeth<>the dhcp failover protocol: a formal perspective<>forte<>nancy a. lynch<>
24716<>5359_94<>rachid guerraoui:maurice herlihy:petr kouznetsov:calvin c. newport<>on the weakest failure detector ever<>podc<>nancy a. lynch<>
24759<>5359_137<>tina nolte<>a virtual node-based tracking algorithm for mobile networks<>icdcs<>nancy a. lynch<>
15206<>5362_0<>athinodoros s. georghiades:andreas glaser:hongzhi wu:li-yi wei:baining guo:julie dorsey:holly e. rushmeier<>context-aware textures<>tog<>jianye lu<>
15188<>5365_3<>chao wang:guangquan zhang<>mining key information of web pages: a method and its application<>eswa<>jie lu<>
8460<>5375_1<>kuai xu:supratik bhattacharyya:zhi-li zhang<>a real-time network traffic profiling system<>dsn<>feng wang<>
14244<>5391_0<>jin-soo kim<>design issues and performance comparisons in supporting the sockets interface over user-level communication architecture<>tjs<>jae-wan jang<>
41048<>5399_4<>shu-chuan chu:jeng-shyang pan<>hadamard transform based fast codeword search algorithm for high-dimensional vq encoding<>isci<>zhe-ming lu<>
23090<>5410_7<>rachid guerraoui<>the alpha of indulgent consensus<>cj<>michel raynal<>
26528<>5424_6<>tyler moore<>information security economics - and beyond<>crypto<>ross anderson<>
26552<>5427_0<>richard anderson:k. m. davis:natalie linnell:craig prince:valentin razmov<>supporting active learning and example based instruction with classroom technology<>sigcse<>ruth e. anderson<>
8463<>5434_0<>john c. tang:clemens drews:mark smith:alison e. sue:tessa lau<>exploring patterns of social commonality among file directories at work<>chi<>fei wu<>
10930<>5441_0<>kyuseok shim<>approximate algorithms for k-anonymity<>sigmod<>hyoungmin park<>
10929<>5442_0<>mi-young park:su jeong shim:yong-kee jun<>mpirace-check: detection of message races in mpi programs<>gpc<>hyuk-ro park<>
10926<>5444_0<>jeff burke:mani b. srivastava<>design and implementation of a wireless sensor network for intelligent light control<>ipsn<>heemin park<>
5183<>5446_1<>jao-hong cheng:yuh-wen chiu<>improving business failure predication using rough sets with non-financial variables<>icannga<>chung-hsing yeh<>
5202<>5448_0<>shie-jue lee<>a kernel-based two-stage one-class support vector machines algorithm<>isnn<>chi-yuan yeh<>
15520<>5455_0<>christian metzger:elgar fleisch:gerhard troster<>weight-sensitive foam to monitor product availability on retail shelves<>pervasive<>jan meyer<>
7536<>5466_1<>rafae bhatti:arif ghafoor<>an integrated approach to federated identity and privilege management in open systems<>cacm<>elisa bertino<>
4132<>5467_1<>hua-min huang:lih-hsing hsu<>on the spanning connectivity of graphs<>dm<>cheng-kuan lin<>
7533<>5468_2<>monica scannapieco:ilya figotin:ahmed k. elmagarmid<>privacy preserving schema and data matching<>sigmod<>elisa bertino<>
7534<>5468_3<>maria luisa damiani:barbara catania:paolo perlasca<>geo-rbac: a spatially aware rbac<>tissec<>elisa bertino<>
4130<>5469_0<>andrew mccreight:zhong shao:long li<>a general framework for certifying garbage collectors and their mutators<>pldi<>chunxiao lin<>
4095<>5473_6<>yixin jiang:minghui shi:xuemin shen<>self-healing group key distribution with time-limited node revocation for wireless sensor networks<>adhoc<>chuang lin<>
4099<>5473_10<>jianer chen:gaocai wang:tao wang:guojun wang<>probabilistic analysis on mesh network fault tolerance<>jpdc<>chuang lin<>
8162<>5484_1<>kai xing:xiuzhen cheng:shmuel rotenstreich<>location-centric storage for safety warning based on roadway sensor networks<>jpdc<>fang liu<>
8163<>5484_2<>xiuzhen cheng:dechang chen<>insider attacker detection in wireless sensor networks<>infocom<>fang liu<>
8168<>5487_1<>rosena r. x. du<>"(k, m)-catalan numbers and hook length polynomials for plane trees."<>ejc<>fu liu<>
32914<>5494_0<>frederic magoules:cedric revillon<>gravy: towards virtual file system for the grid<>gpc<>thi-mai-huong nguyen<>
16911<>5508_0<>c. vuik<>acceleration of preconditioned krylov solvers for bubbly flow problems<>iccS<>j. m. tang<>
16899<>5509_12<>james lin:jeffrey pierce:steve whittaker:clemens drews<>recent shortcuts: using recent interactions to support shared activities<>chi<>john c. tang<>
16901<>5509_14<>clemens drews:mark smith:fei wu:alison e. sue:tessa lau<>exploring patterns of social commonality among file directories at work<>chi<>john c. tang<>
16886<>5510_3<>l. liu:p. parag:w.-y. chen:j.-f. chamberland<>resource allocation and quality of service evaluation for wireless communication systems using fluid models<>tit<>j. tang<>
16907<>5512_3<>fei ye:yan guo:andrew lawson<>improving tree search in phylogenetic reconstruction from genome rearrangement data<>wea<>jijun tang<>
16872<>5513_0<>yu ding:eunshin byon:chiwoo park:yi lu:xin wang<>dynamic data-driven fault diagnosis of wind turbine systems<>iccS<>jiong tang<>
16881<>5515_5<>juan-zi li:jing zhang:qiong luo:yunhao liu:mingcai hong<>eos: expertise oriented search using social networks<>www<>jie tang<>
37775<>5525_1<>yi long:weihua sheng<>global trajectory generation for nonholonomic robots in dynamic environments<>icra<>yi guo<>
37772<>5526_0<>mahmoud ben naser:csaba andras moritz<>designing memory subsystems resilient to process variations<>isvlsi<>yao guo<>
1548<>5534_0<>jan j. m. m. rutten<>behavioural differential equations and coinduction for binary trees<>wollic<>alexandra silva<>
18808<>5548_1<>sartaj sahni<>efficient construction of pipelined multibit-trie router-tables<>tc<>kun suk kim<>
18805<>5550_2<>francois baccelli:david r. mcdonald<>equilibria of a class of transport equations arising in congestion control<>questa<>ki baek kim<>
18006<>5562_1<>shmuel s. oren:ilan adler<>two-settlement electricity markets with price caps and cournot generation firms<>eor<>jian yao<>
8596<>5567_5<>ling chen:hong chen:jack march:steve benford:zhi-geng pan<>an hci method to improve the human performance reduced by local-lag mechanism<>iwc<>gencai chen<>
37977<>5588_18<>dudy lim:yew-soon ong:bernhard sendhoff:bu-sung lee<>efficient hierarchical parallel genetic algorithms using grid computing<>fgcs<>yaochu jin<>
40118<>5597_3<>wei xu<>fast exact maximum likelihood estimation for mixture of language models<>sigir<>yi zhang<>
3490<>5608_0<>yonghong tian:zhi zhou:tiejun huang<>towards multi-granularity multi-facet e-book retrieval<>www<>chong huang<>
10356<>5614_0<>s. s. chang:c. k. chan<>generalized system for relaxed cocoercive variational inequalities in hilbert spaces<>appml<>h. w. joseph lee<>
35416<>5624_0<>volker haarslev:nematollaah shiri<>measuring inconsistencies in ontologies<>esws<>xi deng<>
37000<>5638_21<>takehiro ito:akira kato:takao nishizeki<>algorithms for finding distance-edge-colorings of graphs<>jda<>xiao zhou<>
37015<>5638_36<>takao nishizeki<>orthogonal drawings of series-parallel graphs with minimum bends<>walcom<>xiao zhou<>
36919<>5640_6<>jia liao:guoren wang:bo zhang:ge yu<>an adaptive and efficient unsupervised shot clustering algorithm for sports video<>dasfaa<>xiaofang zhou<>
36923<>5640_10<>heng tao shen:aoying zhou<>an adaptive and dynamic dimensionality reduction method for high-dimensional indexing<>vldb<>xiaofang zhou<>
36924<>5640_11<>hoyoung jeung:heng tao shen<>mining trajectory patterns using hidden markov models<>dawak<>xiaofang zhou<>
36926<>5640_13<>zi huang:heng tao shen:jie shao<>dual dimensionality reduction for efficient video similarity search<>dawak<>xiaofang zhou<>
36927<>5640_14<>ying zhang:xuemin lin:yidong yuan:masaru kitsuregawa:jeffrey xu yu<>summarizing order statistics over data streams with duplicates<>icde<>xiaofang zhou<>
36939<>5640_26<>zi huang:heng tao shen:dawei song:stefan ruger<>dimensionality reduction for dimension-specific search<>sigir<>xiaofang zhou<>
36949<>5640_36<>ke deng:heng tao shen<>multi-source skyline query processing in road networks<>icde<>xiaofang zhou<>
36964<>5640_51<>yi luo:xuemin lin:wei wang<>spark: top-k keyword query in relational databases<>sigmod<>xiaofang zhou<>
36965<>5640_52<>heng tao shen<>capture local information in shape representation<>mta<>xiaofang zhou<>
37025<>5643_6<>fei pan:chi-hsien chiu:sudip pulapura:michael r. mehan:juan nunez-iglesias:kangyu zhang:kiran kamath:michael s. waterman:caleb e. finch<>gene aging nexus: a web database and data mining platform for microarray data on aging<>nar<>xianghong jasmine zhou<>
37046<>5645_1<>heng tao shen:xiaofang zhou:zi huang:jie shao<>uqlips: a real-time near-duplicate video clip detection system<>vldb<>xiangmin zhou<>
37047<>5645_2<>xiangmin zhou:heng tao shen<>a new similarity measure for near duplicate video clip detection<>waim<>xiaofang zhou<>
36500<>5652_0<>tomas vitvar:vassilios peristeras:adrian mocan:sotirios k. goudos:konstantinos a. tarabanis<>wsmo-pa: formal specification of public administration service model on semantic web service ontology<>hicss<>xia wang<>
36499<>5654_0<>jun huan:jack snoeyink:wei wang<>mining rna tertiary motifs with structure graphs<>ssdbm<>xueyi wang<>
36010<>5657_1<>amiya nayak:isabelle ryl:david simplot:ivan stojmenovic<>secure mobile ad hoc routing<>aina<>xu li<>
36011<>5657_2<>nicola santoro:ivan stojmenovic<>mesh-based sensor relocation for coverage maintenance in mobile sensor networks<>uic<>xu li<>
27426<>5672_4<>renato carmo:tomas feder:yoshiharu kohayakawa:eduardo sany laber:liadan o'callaghan:rina panigrahy:dilys thomas<>querying priced information in databases: the conjunctive case<>talg<>rajeev motwani<>
27452<>5672_30<>tomas feder:liadan o'callaghan:chris olston:rina panigrahy<>computing shortest paths with uncertainty<>jal<>rajeev motwani<>
27464<>5672_42<>mayank bawa:aristides gionis:hector garcia-molina<>the price of validity in dynamic networks<>jcss<>rajeev motwani<>
19049<>5679_1<>kyu-young whang:jae-gil lee:min-soo kim 0002:min-jae lee<>odysseus: a high-performance ordbms tightly-coupled with spatial database features<>icde<>ki-hoon lee<>
35966<>5690_2<>bing liu:see-kiong ng<>learning to identify unexpected instances in the test set<>ijcai<>xiaoli li<>
35978<>5699_0<>norbert oertel:andre kaup<>adaptive lagrange multiplier selection for intra-frame video coding<>iscas<>xiang li<>
17331<>5705_0<>manuel m. oliveira<>filling holes on locally smooth surfaces reconstructed from point clouds<>ivc<>jianning wang<>
17325<>5706_1<>ming-yang kao:hai zhou<>address generation for nanowire decoders<>glvlsi<>jia wang<>
17310<>5707_3<>zhidian du:pradip k. srimani<>cooperative proxy caching for wireless base stations<>mis<>james zijun wang<>
17311<>5707_4<>zhidian du:rapeeporn payattakool:philip s. yu:chin-fu chen<>a new method to measure the semantic similarity of go terms<>bioinformatics<>james z. wang<>
35888<>5720_0<>maosen wang:andreas zell<>dribbling control of omnidirectional soccer robots<>icra<>xiang li<>
35889<>5720_1<>andreas zell<>motion control of an omnidirectional mobile robot<>icinco<>xiang li<>
35895<>5722_0<>jian wang:lawrence t. pileggi<>parameterized macromodeling for analog system-level design exploration<>dac<>xin li<>
35896<>5722_1<>lawrence t. pileggi<>efficient parametric yield extraction for multiple correlated non-normal performance distributions of analog/rf circuits<>dac<>xin li<>
34572<>5749_3<>daniel s. yeung:defeng wang:eric c. c. tsang:xizhao wang<>localized generalization error of gaussian-based classifiers and visualization of decision boundaries<>soco<>wing w. y. ng<>
17389<>5760_0<>brian j. d'auriol:young-koo lee:sungyoung lee<>a swarm intelligence inspired autonomic routing scenario in ubiquitous sensor networks<>mue<>jin wang<>
17390<>5760_1<>brian j. d'auriol:xiaoling wu:young-koo lee:sungyoung lee<>energy consumption of swarm intelligence inspired routing algorithms in manets<>mue<>jin wang<>
26934<>5778_0<>preeti ranjan panda<>memory architecture exploration for power-efficient 2d-discrete wavelet transform<>vlsid<>rahul jain<>
26936<>5778_2<>preeti ranjan panda<>an efficient pipelined vlsi architecture for lifting-based 2d-discrete wavelet transform<>iscas<>rahul jain<>
20800<>5788_0<>jufu feng<>rademacher margin complexity<>colt<>liwei wang<>
20802<>5788_2<>xichen sun:jufu feng<>further results on the subspace distance<>pr<>liwei wang<>
2603<>5794_2<>karen church<>mobile content enrichment<>iui<>barry smyth<>
2617<>5794_16<>peter briggs<>trusted search communities<>iui<>barry smyth<>
2690<>5794_89<>nulo<>case-based recommendation<>adaptive<>barry smyth<>
20787<>5795_3<>suzhi wang:yonghua li:martin s. r. paradesi:susan j. brown<>beetlebase: the model organism database for<>nar<>liangjiang wang<>
20767<>5800_0<>norihide kitaoka:seiichi nakagawa<>robust distant speaker recognition based on position-dependent cmn by combining speaker-specific gmm with speaker-adapted hmm<>speech<>longbiao wang<>
36463<>5807_2<>zhongmei yao:dmitri loguinov<>residual-based measurement of peer and link lifetimes in gnutella networks<>infocom<>xiaoming wang<>
36465<>5807_4<>zhongmei yao:derek leonard:dmitri loguinov<>on node isolation under churn in unstructured p2p networks with heavy-tailed lifetimes<>infocom<>xiaoming wang<>
21185<>5836_0<>jingjiang yan:qiang liu:hong li:chaoxiang xie:yinghua wang:jennifer l. campos:hong-jin sun<>visual and auditory information specifying an impending collision of an approaching object<>hci<>liu zhou<>
21177<>5840_4<>namhee kwon:eduard h. hovy:stuart w. shulman<>identifying and classifying subjective claims<>dgo<>liang zhou<>
21157<>5844_15<>minder chen:dongsong zhang<>empowering collaborative commerce with web services enabled business process management systems<>dss<>lina zhou<>
40878<>5850_0<>ke pan:stephen john turner:wentong cai<>an efficient sort-based ddm matching algorithm for hla applications with a large spatial environment<>pads<>zengxiang li<>
40879<>5850_1<>ke pan:stephen john turner:wentong cai<>a service oriented hla rti on the grid<>icws<>zengxiang li<>
36035<>5858_2<>hsinchun chen:zhu zhang:jiexun li<>automatic patent classification using citation network information: an experimental study in nanotechnology<>jcdl<>xin li<>
40442<>5870_1<>edward a. essock:bruce c. hansen:andrew m. haun<>a new metric based on extended spatial frequency and its application to dwt based fusion algorithms<>inffus<>yufeng zheng<>
40450<>5874_0<>brad r. jackson:carlos e. saavedra<>a cmos direct-digital bpsk modulator using an active balun and common-gate switches<>iscas<>you zheng<>
7820<>5877_17<>ryan richardson<>using bilingual etd collections to mine phrase translations<>jcdl<>edward a. fox<>
7823<>5877_20<>xiaoyan yu:manas tungare:weiguo fan:manuel a. pnrez-quinones:william cameron:guofang teng:lillian n. cassel<>automatic syllabus classification<>jcdl<>edward a. fox<>
7826<>5877_23<>yi ma:marcos andrc goncalves<>pim through a 5s perspective<>jcdl<>edward a. fox<>
7834<>5877_31<>barbara lagoeiro moreira:marcos andrc goncalves:alberto h. f. laender<>5squal: a quality assessment tool for digital libraries<>jcdl<>edward a. fox<>
7858<>5877_55<>jeffrey pomerantz:sanghee oh:barbara m. wildemuth:seungwon yang<>digital library education in computer science programs<>jcdl<>edward a. fox<>
35555<>5889_0<>ning zong<>a forward constrained selection algorithm for probabilistic neural network<>isnn<>xia hong<>
35558<>5889_3<>ning zong<>a multi-level probabilistic neural network<>isnn<>xia hong<>
35575<>5890_7<>ming lei:zijie qi:susan v. vrbsky<>protecting location privacy with dynamic mac address exchanging in wireless networks<>isi<>xiaoyan hong<>
20751<>5891_0<>mainak mazumdar:matthew d. bailey:jorge valenzuela<>oligopoly models for market price of electricity under demand uncertainty and unit reliability<>eor<>lizhi wang<>
20762<>5892_5<>anoop singhal:sushil jajodia<>measuring the overall security of network configurations using attack graphs<>dbsec<>lingyu wang<>
4803<>5894_34<>james dinan:stephen olivier:gerald sabin:jan prins:p. sadayappan<>dynamic load balancing of unbalanced computations using message passing<>ipps<>chau-wen tseng<>
20042<>5901_0<>min-yuh day:richard tzong-han tsai:cheng-lung sung:chiu-chen hsieh:cheng-wei lee:shih-hung wu:chorng-shyong ong:wen-lian hsu<>reference metadata extraction using a hierarchical knowledge representation framework<>dss<>kuen-pin wu<>
28152<>5907_1<>bogdan cautis:tova milo<>reasoning about xml update constraints<>pods<>serge abiteboul<>
28166<>5907_15<>neoklis polyzotis<>the data ring: community content sharing<>cidr<>serge abiteboul<>
32930<>5913_1<>david j. abraham:avrim blum<>clearing algorithms for barter exchange markets: enabling nationwide kidney exchanges<>sigecom<>tuomas sandholm<>
32948<>5913_19<>andrew gilpin<>information-theoretic approaches to branching in search<>ijcai<>tuomas sandholm<>
32980<>5913_51<>nulo<>perspectives on multiagent learning<>ai<>tuomas sandholm<>
32992<>5913_63<>vincent conitzer:craig boutilier<>automated design of multistage mechanisms<>ijcai<>tuomas sandholm<>
33004<>5913_75<>felix brandt:yoav shoham<>spiteful bidding in sealed-bid auctions<>ijcai<>tuomas sandholm<>
33014<>5913_85<>vincent conitzer<>incremental mechanism design<>ijcai<>tuomas sandholm<>
3507<>5915_0<>yiming li:shao-ming yu<>numerical simulation of static noise margin for a six-transistor static random access memory cell with 32nm fin-typed field effect transistors<>iccS<>chih-hong hwang<>
19984<>5918_7<>han liang:piyush mishra<>error correction on-demand: a low power register transfer level concurrent error correction technique<>tc<>kaijie wu<>
20887<>5922_0<>bryan f. jones:shuanghua yang<>a fuzzy multi-objective programming for optimization of fire station locations through genetic algorithms<>eor<>lili yang<>
22271<>6004_1<>kyu-young whang:jae-gil lee:min-soo kim 0002:ki-hoon lee<>odysseus: a high-performance ordbms tightly-coupled with spatial database features<>icde<>min-jae lee<>
22204<>6013_19<>judice l. y. koh:wynne hsu:kai-tak lam<>correlation-based detection of attribute outliers<>dasfaa<>mong-li lee<>
22241<>6013_56<>jin chen:wynne hsu:see-kiong ng<>labeling network motifs in protein interactomes for protein function prediction<>icde<>mong-li lee<>
24825<>6022_17<>nulo<>on expected probabilistic polynomial-time adversaries: a suggestion for restricted definitions and their benefits<>tcc<>oded goldreich<>
28214<>6042_2<>sudipta sengupta:shravan k. rayanchu<>an analysis of wireless network coding for unicast sessions: the case for coding-aware routing<>infocom<>suman banerjee<>
28217<>6042_5<>qunfeng dong:ashutosh shukla:vivek shrivastava:dheeraj agrawal:koushik kar<>load balancing in large-scale rfid systems<>infocom<>suman banerjee<>
28235<>6042_23<>anand kashyap:samrat ganguly:samir r. das<>"voip on wireless meshes: models, algorithms and evaluation."<>infocom<>suman banerjee<>
28237<>6042_25<>qunfeng dong:jia wang:dheeraj agrawal<>wire speed packet classification without tcams: a few more registers (and a bit of logic) are enough<>sigmetrics<>suman banerjee<>
28280<>6043_3<>alexander i. rudnicky<>segmenting meetings into agenda items by extracting implicit supervision from human note-taking<>iui<>satanjeev banerjee<>
30150<>6053_2<>yijian bai:fusheng wang:peiya liu:carlo zaniolo<>rfid data processing with a data stream query language<>icde<>shaorong liu<>
30141<>6056_0<>marjan mernik:barrett r. bryant<>a clustering entropy-driven approach for exploring and exploiting noisy functions<>sac<>shih-hsi liu<>
30161<>6066_5<>f. gomez-rodriguez:alejandro linares-barranco:l. miro:andre van schaik:ralph etienne-cummings:m. anthony lewis<>aer auditory filtering and cpg for robot control<>iscas<>shih-chii liu<>
30167<>6066_11<>matthias oster:patrick lichtsteiner:tobi delbruck<>a spike-based saccadic recognition system<>iscas<>shih-chii liu<>
30173<>6066_17<>matthias oster:rodney j. douglas<>quantifying input and output spike statistics of a winner-take-all network in a vision system<>iscas<>shih-chii liu<>
30180<>6066_24<>rico moeckel<>motion detection circuits for a time-to-travel algorithm<>iscas<>shih-chii liu<>
16913<>6068_0<>nulo<>forecasting daily supermarket sales using exponentially weighted quantile regression<>eor<>james w. taylor<>
790<>6082_0<>j. edward swan ii:eric kolstad:mark a. livingston:harvey s. smallman<>"egocentric depth judgments in optical, see-through augmented reality."<>tvcg<>adam jones<>
25985<>6094_3<>shansi ren:haining wang:xin chen:xiaodong zhang<>design and analysis of sensing scheduling algorithms under partial coverage for object detection in sensor networks<>tpds<>qun li<>
6795<>6104_1<>paul andre:max wilson:alisdair owens<>journey planning based on user needs<>chi<>daniel a. smith<>
29110<>6113_2<>david zook:yannis smaragdakis<>cj: enhancing java with safe type conditions<>aosd<>shan shan huang<>
38527<>6114_2<>rakesh kumar:keith w. ross<>stochastic fluid theory for p2p streaming systems<>infocom<>yong liu<>
16098<>6128_0<>h. luo:indranil gupta<>a cross-layer architecture to exploit multi-channel diversity with a single transceiver<>infocom<>jay a. patel<>
16099<>6129_0<>michael d. morse<>an efficient and accurate method for evaluating time series similarity<>sigmod<>jignesh m. patel<>
16102<>6129_3<>yuanyuan tian:richard c. mceachin:carlos santos:david j. states<>saga: a subgraph matching tool for biological graphs<>bioinformatics<>jignesh m. patel<>
31495<>6145_1<>zhuo zhang:sin lam tan:man-hung eric tang:arun prashanth kumar:suresh kumar ramadoss:vladimir b. bajic<>kberg: knowledgebase for estrogen responsive genes<>nar<>suisheng tang<>
37888<>6155_0<>y.-k. hu<>global optimization in clustering using hyperbolic cross points<>pr<>y. p. hu<>
24805<>6156_0<>jongman kim:chrysostomos nicopoulos:dongkook park:reetuparna das:yuan xie:mazin s. yousif:chita r. das<>a novel dimensionally-decomposed router for on-chip communication in 3d architectures<>isca<>narayanan vijaykrishnan<>
24807<>6156_2<>madhu mutyam<>working with process variation aware caches<>date<>narayanan vijaykrishnan<>
22881<>6160_4<>su jeong shim:yong-kee jun:hyuk-ro park<>mpirace-check: detection of message races in mpi programs<>gpc<>mi-young park<>
33540<>6174_55<>matthew g. averill:kate c. miller:g. randy keller:roberto araiza:scott a. starks<>using expert knowledge in solving the seismic inverse problem<>ijar<>vladik kreinovich<>
12151<>6179_2<>charles edwin killian:ryan braud:ranjit jhala:amin vahdat<>mace: language support for building distributed systems<>pldi<>james w. anderson<>
10666<>6182_6<>xiaohua jia:peng-jun wan:xinxin liu:frances f. yao<>a distributed and efficient flooding scheme using 1-hop information in mobile ad hoc networks<>tpds<>hai liu<>
10645<>6185_2<>akif gunes koru:dongsong zhang<>modeling the effect of size on defect proneness for open-source software<>icse<>hongfang liu<>
10568<>6187_0<>zheng zhao<>searching for interacting features<>ijcai<>huan liu<>
10583<>6187_15<>zheng zhao<>semi-supervised feature selection via spectral analysis<>sdm<>huan liu<>
24313<>6192_19<>ioannis a. vetsikas:bart selman<>generating bayes-nash equilibria to design autonomous trading agents<>ijcai<>nicholas r. jennings<>
24357<>6192_63<>partha sarathi dutta:claudia v. goldman<>communicating effectively in resource-constrained multi-agent systems<>ijcai<>nicholas r. jennings<>
24366<>6192_72<>talal rahwan<>an algorithm for distributing coalitional value calculations among cooperating agents<>ai<>nicholas r. jennings<>
24415<>6192_121<>talal rahwan:sarvapali d. ramchurn:viet dung dang<>near-optimal anytime coalition structure generation<>ijcai<>nicholas r. jennings<>
24420<>6192_126<>sebastian stein:terry r. payne<>an effective strategy for the flexible provisioning of service workflows<>socase<>nicholas r. jennings<>
24433<>6192_139<>xudong luo<>a spectrum of compromise aggregation operators for multi-attribute decision making<>ai<>nicholas r. jennings<>
11352<>6201_6<>wei-shinn ku:roger zimmermann<>location-based spatial queries with data sharing in wireless broadcast environments<>icde<>haixun wang<>
11356<>6201_10<>jian pei:ada wai-chee fu:xuemin lin<>computing compressed multidimensional skyline cubes efficiently<>icde<>haixun wang<>
11370<>6201_24<>haoliang jiang:philip s. yu:shuigeng zhou<>gstring: a novel approach for efficient search in graph databases<>icde<>haixun wang<>
11375<>6201_29<>hao he:jun yang:philip s. yu<>blinks: ranked keyword searches on graphs<>sigmod<>haixun wang<>
11376<>6201_30<>lipyeow lim:min wang<>semantic data management: towards querying data with their meaning<>icde<>haixun wang<>
11383<>6201_37<>yijian bai:hetal thakkar:carlo zaniolo<>optimizing timestamp management in data stream management systems<>icde<>haixun wang<>
11391<>6201_45<>xiaohui gu:philip s. yu<>adaptive load diffusion for multiway windowed stream joins<>icde<>haixun wang<>
9937<>6204_0<>gail-joon ahn<>towards realizing a formal rbac model in real systems<>sacmat<>hongxin hu<>
14050<>6210_0<>jeffrey f. naughton<>k-relevance: a spectrum of relevance for data sources impacting a query<>sigmod<>jiansheng huang<>
11447<>6220_11<>weidong cui:marcus peinado:michael e. locasto<>shieldgen: automatic data patch generation for unknown vulnerabilities with informed probing<>sp<>helen j. wang<>
11449<>6220_13<>jose meseguer:ralf sasse:yi-min wang<>a systematic approach to uncover security flaws in gui logic<>sp<>helen j. wang<>
11418<>6230_4<>david suter<>a consensus-based method for tracking: modelling background scenario and foreground appearance<>pr<>hanzi wang<>
34636<>6231_1<>zhifeng yu<>an adaptive rescheduling strategy for grid workflow applications<>ipps<>weisong shi<>
10898<>6248_0<>patrick thiran<>the boolean solution to the congested ip link location problem: theory and practice<>infocom<>hung xuan nguyen<>
40717<>6254_10<>dongxi liu:masato takeichi<>bidirectional interpretation of xquery<>pepm<>zhenjiang hu<>
36275<>6255_0<>james z. wang:prasenjit mitra:c. lee giles<>deriving knowledge from figures for digital libraries<>www<>xiaonan lu<>
40750<>6258_4<>peng qiu:z. jane wang:k. j. ray liu:cathy h. wu<>dependence network modeling for biomarker identification<>bioinformatics<>zhang-zhi hu<>
26262<>6279_4<>jian ma:min gao:lionel m. ni<>energy-efficient localized topology control algorithms in ieee 802.15.4-based sensor networks<>tpds<>qian zhang<>
26270<>6279_12<>haitao wu:kun tan:yongguang zhang<>proactive scan: fast handoff with smart triggers for 802.11 wireless lan<>infocom<>qian zhang<>
26271<>6279_13<>cong peng:ming zhao:yan yao<>on the performance analysis of network-coded cooperation in wireless networks<>infocom<>qian zhang<>
26275<>6279_17<>yanfeng zhu:zhisheng niu:jing zhu<>on optimal physical carrier sensing: theoretical analysis and protocol design<>infocom<>qian zhang<>
25938<>6285_7<>xiaozhong liu:robert benjamin<>re-examining it enabled change with a new model of the information field: the tiger creek case<>hicss<>ping zhang<>
7957<>6288_3<>sunghun kim:thomas zimmermann:andreas zeller<>predicting faults from cached history<>icse<>e. james whitehead jr.<>
26292<>6296_1<>xuemin lin:yidong yuan:qing liu<>error minimization in approximate range aggregates<>dke<>qing zhang<>
26294<>6296_3<>xuemin lin:yidong yuan:ying zhang<>selecting stars: the k most representative skyline operator<>icde<>qing zhang<>
26298<>6296_7<>chaoyi pang:david p. hansen:anthony j. maeder<>building data synopses within a known maximum error bound<>waim<>qing zhang<>
25946<>6298_0<>lynne plettenberg:judith l. klavans:douglas w. oard:dagobert soergel<>"task-based interaction with an integrated multilingual, multimedia information system: a formative evaluation."<>jcdl<>pengyi zhang<>
17870<>6315_0<>huiming qu:alexandros labrinidis<>quality is in the eye of the beholder: towards user-centric web-databases<>sigmod<>jie xu<>
17846<>6329_2<>yingqi xu:wang-chien lee<>analysis of a loss-resilient proactive data transmission protocol in wireless sensor networks<>infocom<>jianliang xu<>
17827<>6331_4<>yunbo cao:hang li:nick craswell:yalou huang<>searching documents based on relevance and type<>ecir<>jun xu<>
691<>6346_10<>barbara m. anthony<>infrastructure leasing problems<>ipco<>anupam gupta<>
13030<>6351_0<>irene m. ong:jan struyf:elizabeth s. burnside:david page:vitor santos costa<>change of representation for statistical relational learning<>ijcai<>jesse davis<>
721<>6356_0<>david c. noelle<>a dual-pathway neural network model of control relinquishment in motor skill learning<>ijcai<>ashish gupta<>
13001<>6357_13<>alexander m. morison:david d. woods<>building adaptive camera models for video surveillance<>wacv<>james w. davis<>
13002<>6357_14<>vinay sharma<>background-subtraction in thermal imagery using contour saliency<>ijcv<>james w. davis<>
13008<>6357_20<>alexander m. morison:david d. woods<>an adaptive focus-of-attention model for video surveillance and monitoring<>mva<>james w. davis<>
13009<>6357_21<>vinay sharma<>extraction of person silhouettes from surveillance imagery using mrfs<>wacv<>james w. davis<>
1645<>6366_4<>m. juanita martinez:bilan li:michael q. zhang:kevin s. harrod<>computational prediction of novel components of lung transcriptional networks<>bioinformatics<>andrew d. smith<>
1580<>6372_3<>jekanthan thangavelautham:dale boucher:jim richard:gabriele m. t. d'eleuterio<>evolving a scalable multirobot controller using an artificial neural tissue paradigm<>icra<>alexander d. s. smith<>
41627<>6377_17<>hong-bin dai<>exploiting image contents in web search<>ijcai<>zhi-hua zhou<>
41665<>6377_55<>min-ling zhang<>solving multi-instance problems with classifier ensemble based on constructive clustering<>kais<>zhi-hua zhou<>
24021<>6383_0<>yan-qun he:lai-kow chan<>balancing productivity and consumer satisfaction for profitability: statistical and fuzzy regression analysis<>eor<>ming-lu wu<>
15031<>6388_2<>alan t. s. ip:john c. s. lui<>copacc: an architecture of cooperative proxy-client caching system for on-demand media streaming<>tpds<>jiangchuan liu<>
15041<>6388_12<>feng wang:yongqiang xiong<>mtreebone: a hybrid tree/mesh overlay for application-layer live video multicast<>icdcs<>jiangchuan liu<>
15045<>6389_1<>sanjay ranka:tamer kahveci<>markers improve clustering of cgh data<>bioinformatics<>jun liu<>
15023<>6390_1<>nulo<>handling safety-related feature interaction in safety-critical product lines<>icse<>jing liu<>
18742<>6411_1<>yu-kwong kwok:shanshan song<>selfish grids: game-theoretic modeling and nas/psa benchmark evaluation<>tpds<>kai hwang<>
18751<>6415_1<>sung-bae cho:kyung-joong kim<>generating cartoon-style summary of daily life with multimedia mobile devices<>ieaaie<>keum-sung hwang<>
404<>6417_0<>minh tran<>jigsaw texture synthesis<>sg<>amitava datta<>
405<>6417_1<>tobias lauer:thomas ottmann<>update-efficient data structures for dynamic ip router tables<>ijfcs<>amitava datta<>
3789<>6429_1<>chaochi chang:hyemin chung:connor dickie:ted selker<>emotionally reactive television<>iui<>chia-hsun jackie lee<>
18085<>6449_1<>jingnan yao:laxmi n. bhuyan:jun yang<>program mapping onto network processors by recursive bipartitioning and refining<>dac<>jia yu<>
37249<>6467_2<>g. lu:stefan birrer:fabian e. bustamante:c. y. cheung:x. li<>end-to-end inference of router packet forwarding priority<>infocom<>y. chen<>
37264<>6467_17<>yao zhao<>a suite of schemes for user-level network diagnosis without infrastructure<>infocom<>yan chen<>
37296<>6470_12<>xiaoying bai:zhongkui shao<>adaptive web services testing<>compsac<>yinong chen<>
37298<>6470_14<>hemal khatri:jianchun fan:subbarao kambhampati<>qpiad: query processing over incomplete autonomous databases<>icde<>yi chen<>
37302<>6470_18<>w. t. tsai:qian huang:xin sun<>dynamic collaboration simulation in service-oriented computing paradigm<>anss<>yinong chen<>
37316<>6470_32<>qihong shao:michel kinsy<>storing and discovering critical workflows from log in scientific exploration<>IEEEscc<>yi chen<>
37317<>6470_33<>ziyang liu<>identifying meaningful return information for xml keyword search<>sigmod<>yi chen<>
37321<>6470_37<>garrett wolf:hemal kathri:bhaumik chokshi:jianchun fan:subbarao kambhampati<>query processing over incomplete autonomous databases<>vldb<>yi chen<>
28609<>6476_3<>phillip b. gibbons:michael kozuch:vasileios liaskovitis:anastassia ailamaki:guy e. blelloch:babak falsafi:limor fix:nikos hardavellas:todd c. mowry:chris wilkerson<>scheduling threads for constructive cache sharing on cmps<>spaa<>shimin chen<>
28598<>6479_0<>igor radovanovic:johan lukkien:richard verhoeven:melissa tjiong:remi bosman<>virtual community based secure service discovery and access for 3d video steaming applications<>mcam<>shudong chen<>
28618<>6483_0<>ying chen<>cost-driven hybrid configuration prefetching for partial reconfigurable coprocessor<>ipps<>simon y. chen<>
28592<>6490_53<>mei-ling shyu:min chen:chengcui zhang:kanoksri sarinnapakorn<>capturing high-level image concepts via affinity relationships in image database retrieval<>mta<>shu-ching chen<>
9868<>6492_0<>seungjin choi<>robust kernel isomap<>pr<>heeyoul choi<>
25533<>6497_2<>c. litchfield:r. j. langley:j. c. batchelor<>logarithmic codecs for adaptive beamforming in wcdma downlink channels<>iscas<>p. lee<>
25540<>6499_0<>tian bu:thomas y. c. woo<>on the detection of signaling dos attacks on 3g wireless networks<>infocom<>patrick p. c. lee<>
25541<>6499_1<>vishal misra:dan rubenstein<>toward optimal network fault correction via end-to-end inference<>infocom<>patrick p. c. lee<>
25544<>6499_4<>tian bu:jin cao:aiyou chen<>a fast and compact method for unveiling significant patterns in high speed networks<>infocom<>patrick p. c. lee<>
25545<>6499_5<>john c. s. lui:david k. y. yau<>seal: a secure communication library for building dynamic group key agreement applications<>jss<>patrick p. c. lee<>
32843<>6508_2<>yu-ting liu:tao qin:zhiming ma:hang li<>supervised rank aggregation<>www<>tie-yan liu<>
32858<>6508_17<>huai-yuan yang:xin zheng:tao qin:wei-ying ma<>fast large-scale spectral clustering by sequential shrinkage optimization<>ecir<>tie-yan liu<>
32891<>6512_0<>p. viswanath<>an extremal inequality motivated by multiterminal information-theoretic problems<>tit<>t. liu<>
36111<>6519_2<>abhinav gupta:r. srikant<>low-complexity distributed scheduling algorithms for wireless networks<>infocom<>xiaojun lin<>
36113<>6519_4<>longbi lin:ness b. shroff<>low-complexity and distributed energy minimization in multi-hop wireless networks<>infocom<>xiaojun lin<>
36114<>6519_5<>shahzada rasool<>"a distributed joint channel-assignment, scheduling and routing algorithm for multi-channel ad-hoc wireless networks."<>infocom<>xiaojun lin<>
4036<>6526_0<>chia-mu yu:chun-shien lu:der-tsai lee:sy-yen kuo<>attack probability based deterministic key predistribution mechanism for non-uniform sensor deployment<>icdcsw<>cheng-chung li<>
4038<>6530_0<>j. m. van den akker:sjaak brinkkemper:guido diepen<>integrated requirement selection and scheduling for the release planning of a software product<>refsq<>c. li<>
10102<>6532_2<>shudong jin<>design and analysis of adaptive strategies for locating internet-based servers in manets<>pe<>hongbo jiang<>
39286<>6550_1<>wai-hong tam<>joint multi-channel link layer and multi-path routing design for wireless mesh networks<>infocom<>yu-chee tseng<>
39302<>6550_17<>chi-fu huang:hsiao-lu wu<>distributed protocols for ensuring both coverage and connectivity of a wireless sensor network<>tosn<>yu-chee tseng<>
40857<>6577_2<>charles j. alpert:stephen t. quay:sachin s. sapatnekar:weiping shi<>probabilistic congestion prediction with partial blockages<>isqed<>zhuo li<>
40833<>6579_18<>changjiu xian:yung-hsiang lu<>energy-aware scheduling for real-time multiprocessor systems with uncertain task execution time<>dac<>zhiyuan li<>
39162<>6590_0<>gregory f. cooper<>a bayesian biosurveillance method that models unknown outbreak diseases<>biosurveillance<>yanna shen<>
7118<>6601_3<>bessie c. hu:zhenfeng zhang:xiaotie deng<>certificateless signature: a new security model and an improved generic construction<>dcc<>duncan s. wong<>
7127<>6601_12<>guilin wang:joonsang baek:feng bao<>on the generic and efficient constructions of secure designated confirmer signatures<>pkc<>duncan s. wong<>
7128<>6601_13<>guomin yang:jing chen:xiaotie deng:dongsheng wang<>a more natural way to construct identity-based identification schemes<>acns<>duncan s. wong<>
7145<>6601_30<>qiong huang:yiming zhao<>generic transformation to strongly unforgeable signatures<>acns<>duncan s. wong<>
7148<>6601_33<>xinyi huang:yi mu:willy susilo:wei wu<>certificateless signature revisited<>acisp<>duncan s. wong<>
7149<>6601_34<>qiong huang<>generic certificateless key encapsulation mechanism<>acisp<>duncan s. wong<>
7152<>6601_37<>robert w. zhu:guomin yang<>an efficient identity-based key exchange protocol with kgs forward secrecy for low-power devices<>tcs<>duncan s. wong<>
13357<>6604_1<>leonidas j. guibas:nikola milosavljevic:john hershberger<>sparse data aggregation in sensor networks<>ipsn<>jie gao<>
13359<>6604_3<>xianjin zhu:rik sarkar<>shape segmentation and applications in sensor networks<>infocom<>jie gao<>
13374<>6604_18<>ritesh maheshwari:samir r. das<>detecting wormhole attacks in wireless networks using connectivity information<>infocom<>jie gao<>
41169<>6608_0<>gabor melli:yang wang:yudong liu:baohua gu:mehdi m. kashani:anoop sarkar:fred popowich<>question answering summarization of multiple biomedical documents<>ai<>zhongmin shi<>
7453<>6615_4<>levent bolelli:seyda ertekin:c. lee giles<>a clustering method for web data with multi-type interrelated components<>www<>ding zhou<>
7454<>6615_5<>levent bolelli:jia li:c. lee giles:hongyuan zha<>learning user clicks in web search<>ijcai<>ding zhou<>
7459<>6617_1<>yunhua wang:linda debrunner:victor e. debrunner<>a multiplier structure based on a novel real-time csd recoding<>iscas<>dayong zhou<>
4838<>6618_0<>tzu-chien lo:shao-wen yang<>interacting object tracking in crowded urban areas<>icra<>chieh-chih wang<>
4826<>6624_0<>li xiao<>improving event-to-sink throughput in wireless sensor networks<>dcoss<>chen wang<>
4830<>6624_4<>li xiao<>an effective p2p search scheme to exploit file sharing heterogeneity<>tpds<>chen wang<>
31625<>6630_1<>xi chen:chi k. michael tse:ljiljana trajkovic<>stability analysis of red gateway with multiple tcp reno connections<>iscas<>siu chung wong<>
31609<>6634_0<>jerry cheng:hao yang:songwu lu<>smartsiren: virus detection and alert for smartphones<>mobisys<>starsky h. y. wong<>
31612<>6634_3<>xiaoqiao meng:petros zerfos:vidyut samanta:songwu lu<>analysis of the reliability of a nationwide short message service<>infocom<>starsky h. y. wong<>
31606<>6635_5<>simon miles:weijian fang:paul t. groth:klaus-peter zauner:luc moreau<>provenance-based validation of e-science experiments<>ws<>sylvia c. wong<>
1134<>6657_2<>emanuela merelli:giuliano armano:nicola cannata:flavio corradini:mark d'inverno:andreas doms:phillip w. lord:luciano milanesi:steffen moller:michael schroeder:michael luck<>"agents in bioinformatics, computational and systems biology."<>bib<>andrew martin<>
41477<>6672_0<>ernie love:yu song<>the optimal service time allocation of a versatile server to queue jobs and stochastically available non-queue jobs of different types<>cor<>zhe george zhang<>
41474<>6673_35<>yingfei dong:david hung-chang du<>full-sharing: efficient bandwidth scheduling for video streaming over broadband cable networks (bcns)<>mta<>zhi-li zhang<>
3691<>6675_27<>nulo<>splitting atoms safely<>tcs<>cliff b. jones<>
36885<>6692_0<>zongyan qiu:chao cai:hongli yang<>towards the theoretical foundation of choreography<>www<>xiangpeng zhao<>
18475<>6700_5<>per-ake larson:johann christoph freytag:wolfgang lehner<>efficient exploitation of similar subexpressions for query processing<>sigmod<>jingren zhou<>
18468<>6702_2<>joseph kee-yin ng<>a data fusion approach to mobile location estimation based on ellipse propagation model within a cellular radio network<>aina<>junyang zhou<>
5651<>6706_0<>santosh n. kabadi<>on-line network synthesis<>aor<>donglei du<>
18411<>6710_8<>joonsang baek:willy susilo<>new constructions of fuzzy identity-based encryption<>ccs<>jianying zhou<>
18413<>6710_10<>chunhua su:feng bao:tsuyoshi takagi:kouichi sakurai<>two-party privacy-preserving agglomerative document clustering<>ispec<>jianying zhou<>
18415<>6710_12<>zhuowei li:amitabha das<>towards automatic assembly of privacy-preserved intrusion signatures<>trustbus<>jianying zhou<>
18438<>6710_35<>shiqun li:guilin wang:kefei chen<>undeniable mobile billing schemes<>europki<>jianying zhou<>
11656<>6711_1<>qiong luo:pei zheng:lionel m. ni<>vmnet: realistic emulation of wireless sensor networks<>tpds<>hejun wu<>
18452<>6716_3<>hanchuan peng<>automatic recognition and annotation of gene expression patterns of fly embryos<>bioinformatics<>jie zhou<>
18455<>6716_6<>hanchuan peng<>automatic recognition and annotation of gene expression patterns of fly embryos<>bioinformatics<>jie zhou<>
37551<>6728_2<>dharma p. agrawal<>an improved key distribution mechanism for large-scale hierarchical wireless sensor networks<>adhoc<>yi cheng<>
37565<>6733_0<>vikram ravindran:alberto leon-garcia<>internet traffic characterization using packet-pair probing<>infocom<>yu cheng<>
3362<>6744_2<>bingjun sun:qingzhao tan:prasenjit mitra<>extraction and search of chemical formulae in text documents on the web<>www<>c. lee giles<>
29791<>6747_0<>ying lai:ratko orlandic:wai gen yee<>scalable clustering for large high-dimensional data based on data summarization<>cidm<>sachin kulkarni<>
29756<>6749_25<>borzoo bonakdarpour<>exploiting symbolic techniques in automated synthesis of distributed programs with large state space<>icdcs<>sandeep s. kulkarni<>
37718<>6750_0<>joseph c. culberson<>consistency and random constraint satisfaction models<>jair<>yong gao<>
2839<>6759_11<>thomas bailey<>processing partially specified queries over high-dimensional databases<>dke<>byunggu yu<>
19341<>6761_14<>jing tian<>super-resolution imaging using grid computing<>ccgrid<>kai-kuang ma<>
32495<>6763_3<>hiromitsu hattori:mark klein<>multi-issue negotiation protocol for agents: exploring nonlinear utility spaces<>ijcai<>takayuki ito<>
32509<>6763_17<>naoki fukuta<>toward a large scale e-market: a greedy and local search based winner determination<>ieaaie<>takayuki ito<>
32513<>6764_0<>akira kato:xiao zhou:takao nishizeki<>algorithms for finding distance-edge-colorings of graphs<>jda<>takehiro ito<>
32523<>6764_10<>nulo<>partitioning graphs of supply and demand<>walcom<>takehiro ito<>
11539<>6774_0<>chun-chieh huang:tsai-yen li:chun-yen chang<>idea storming cube: a game-based system to support creative thinking<>digitel<>hao-chuan wang<>
11544<>6774_5<>chun-chieh huang:tsai-yen li:chun-yen chang<>a collaborative support tool for creativity learning: idea storming cube<>icalt<>hao-chuan wang<>
11545<>6774_6<>rohit kumar:carolyn penstein rose:tsai-yen li:chun-yen chang<>a hybrid ontology directed feedback selection algorithm for supporting creative problem solving dialogues<>ijcai<>hao-chuan wang<>
11548<>6775_2<>mingxuan sun:ruigang yang<>space-time light field rendering<>tvcg<>huamin wang<>
762<>6786_2<>avadhnam madhav kumar<>hybrid neural network models for hydrologic time series forecasting<>asc<>ashu jain<>
758<>6787_0<>anhai doan:luis gravano<>sql queries over unstructured text databases<>icde<>alpa jain<>
11578<>6790_1<>peihua li<>object tracking with particle filter using color information<>mirage<>haijing wang<>
40081<>6815_0<>alejandro ribeiro:nikos d. sidiropoulos:georgios b. giannakis<>achieving wireline random access throughput in wireless networking via user cooperation<>tit<>yingqun yu<>
40083<>6815_2<>georgios b. giannakis:nihar jindal<>information-bearing noncoherently modulated pilots for mimo training<>tit<>yingqun yu<>
11604<>6817_1<>minhong wang:jiming liu<>dynamic supply chain integration through intelligent agents<>hicss<>huaiqing wang<>
11611<>6821_0<>leszle a. szekely<>binary trees with the largest number of subtrees<>dam<>hua wang<>
7381<>6846_12<>yang du:tian xia:yufei tao:feng zhu<>on multidimensional k-anonymity with local recoding generalization<>icde<>donghui zhang<>
7390<>6846_21<>james m. kang:mohamed f. mokbel:shashi shekhar:tian xia<>continuous evaluation of monochromatic and bichromatic reverse nearest neighbors<>icde<>donghui zhang<>
7367<>6853_1<>erwin lutwak:gaoyong zhang<>moment-entropy inequalities for a random vector<>tit<>deane yang<>
5177<>6872_0<>shih-wei kau:hung-jen lee:ching-hsiang lee:lin hong:chun-hsiung fang<>robust h<>fss<>ching-mao yang<>
21545<>6878_0<>murdoch gabbay<>nominal rewriting<>iandc<>maribel fernandez<>
21546<>6878_1<>sandra alves:mario florido:ian mackie<>iterator types<>fossacs<>maribel fernandez<>
21541<>6883_3<>christophe calves<>implementing nominal unification<>entcs<>maribel fernandez<>
14370<>6894_1<>chrysostomos nicopoulos:dongkook park:reetuparna das:yuan xie:narayanan vijaykrishnan:mazin s. yousif:chita r. das<>a novel dimensionally-decomposed router for on-chip communication in 3d architectures<>isca<>jongman kim<>
14341<>6899_2<>salah sukkarieh<>real-time implementation of airborne inertial-slam<>ras<>jong-hyuk kim<>
14336<>6900_2<>melanie hilario<>learning relations and information extraction rules for protein annotation<>aina<>jee-hyub kim<>
2121<>6904_3<>david m. brooks:bronis r. de supinski:martin schulz:karan singh:sally a. mckee<>methods of inference and learning for performance modeling of parallel applications<>ppopp<>benjamin c. lee<>
2079<>6914_0<>yingjie liu:ignacio llamas:jarek rossignac<>advections with significantly reduced dissipation and diffusion<>tvcg<>byungmoon kim<>
