Research Output

Filter
Paper

Keyword search in text cube: Finding top-k relevant cells

Ding, B., Yu, Y., Zhao, B., Lin, C. X., Han, J. & Zhai, C., Dec 1 2010, p. 145-159. 15 p.

Research output: Contribution to conferencePaper

L1 data cache decomposition for energy efficiency

Huang, M., Renau, J., Yoo, S. M. & Torrellas, J., 2001, p. 10-15. 6 p.

Research output: Contribution to conferencePaper

Learning from early attempts to measure information security performance

Zhang, J., Berthier, R., Rhee, W., Bailey, M., Pal, P., Jahanian, F. & Sanders, W. H., Jan 1 2012.

Research output: Contribution to conferencePaper

Learning to Move Autonomously in a Hostile World

Ikemoto, L., Arikan, O. & Forsyth, D., Jul 31 2005. 1 p.

Research output: Contribution to conferencePaper

Learning to verify branching time properties

Vardhan, A. & Viswanathan, M., Dec 1 2005, p. 325-328. 4 p.

Research output: Contribution to conferencePaper

Lessons Learned by INFEWS-ER's virtual resource center for transdisciplinary graduate student training at the nexus of food, energy, and water

Koelsch, R., Rodríguez, L. F., Banner, S., Classen, J., Cotton, D., Deviney, A., Heemstra, J., Koziel, J., Meyer, D., Marshall, A. M., Padmanabhan, A. & Steward, D., Jan 1 2019.

Research output: Contribution to conferencePaper

Locally-Optimal Navigation in Multiply-Connected Environments without Geometric Maps

Tovar, B., Lavalle, S. M. & Murrieta, R., Dec 26 2003, p. 3491-3497. 7 p.

Research output: Contribution to conferencePaper

Loss process analysis of the knockout switch using stochastic activity networks

Kant, L. & Sanders, W. H., Dec 1 1995, p. 344-349. 6 p.

Research output: Contribution to conferencePaper

Low-cost control of impact hammer performance

Jerrelind, J. & Dankowicz, H., Jan 1 2003, p. 1547-1554. 8 p.

Research output: Contribution to conferencePaper

Lower bounds on power-dissipation for DSP algorithms

Shanbhag, N. R., Dec 1 1996, p. 43-48. 6 p.

Research output: Contribution to conferencePaper

Low-power AEC-based MIMO signal processing for Gigabit Ethernet 1000base-T transceivers

Wang, L. & Shanbhag, N. R., Jan 1 2001, p. 334-339. 6 p.

Research output: Contribution to conferencePaper

Low-power architecture for phase-splitting passband equalizer

Hegde, R. & Shanbhag, N. R., Dec 1 1997, p. 385-394. 10 p.

Research output: Contribution to conferencePaper

Low-power technology mapping for FPGA architectures with dual supply voltages

Chen, D., Cong, J., Li, F. & He, L., Jan 1 2004, p. 109-117. 9 p.

Research output: Contribution to conferencePaper

Low-power VLSI decoder architectures for LDPC codes

Mansour, M. M. & Shanbhag, N. R., Jan 1 2002, p. 284-289. 6 p.

Research output: Contribution to conferencePaper

Lumping matrix diagram representations of markov models

Derisavi, S., Kemper, P. & Sanders, W. H., Nov 9 2005, p. 742-751. 10 p.

Research output: Contribution to conferencePaper

Manycast: Exploring the Space Between Anycast and Multicast in Ad Hoc Networks

Carter, C., Yi, S., Ratanchandani, P. & Kravets, R., Dec 1 2003, p. 273-285. 13 p.

Research output: Contribution to conferencePaper

Media streaming protocol: an adaptive protocol for the delivery of audio and video over the internet

Hess, C. K. & Campbell, R. H., Jan 1 1999, p. 903-907. 5 p.

Research output: Contribution to conferencePaper

Memory safety without runtime checks or garbage collection

Dhurjati, D., Kowshik, S., Adve, V. & Lattner, C., Nov 19 2003, p. 69-80. 12 p.

Research output: Contribution to conferencePaper

Microprocessor sensitivity to failures: Control vs. execution and combinational vs. sequential logic

Saggese, G. P., Vetteth, A., Kalbarczyk, Z. T. & Iyer, R. K., Nov 9 2005, p. 760-769. 10 p.

Research output: Contribution to conferencePaper

Mining behavior graphs for "Backtrace" of noncrashing bugs

Liu, C., Yan, X., Yu, H., Han, J. & Yu, P. S., Dec 1 2005, p. 286-297. 12 p.

Research output: Contribution to conferencePaper

Mining closed relational graphs with connectivity constraints

Yan, X., Zhou, X. J. & Han, J., Dec 1 2005, p. 324-333. 10 p.

Research output: Contribution to conferencePaper

Mining concept-drifting data streams using ensemble classifiers

Wang, H., Fan, W., Yu, P. S. & Han, J., Dec 1 2003, p. 226-235. 10 p.

Research output: Contribution to conferencePaper

Mining frequent item sets by opportunistic projection

Liu, J., Pan, Y., Wang, K. & Han, J., 2002, p. 229-238. 10 p.

Research output: Contribution to conferencePaper

Mining sequential patterns with constraints in large databases

Pei, J., Han, J. & Wang, W., Dec 1 2002, p. 18-25. 8 p.

Research output: Contribution to conferencePaper

Mitexcube: Microtextcluster cube for online analysis of text cells

Zhang, D., Zhai, C. & Han, J., Dec 1 2011, p. 204-218. 15 p.

Research output: Contribution to conferencePaper

Modal filter based on-line monitoring of uncertain structural systems

Johnson, E. A., Bergman, L., Voulgaris, P. G. & Freudinger, L. C., Jan 1 1996, p. 156-159. 4 p.

Research output: Contribution to conferencePaper

Model-Based Reinforcement Learning for Atari

Campbell, R., Mar 2019.

Research output: Contribution to conferencePaper

Modeling and mitigation of jitter in multi-Gbps source-synchronous I/O links

Balamurugan, G. & Shanbhag, N. R., Dec 2 2003, p. 254-260. 7 p.

Research output: Contribution to conferencePaper

Modeling and multivariable control of an earthmoving vehicle powertrain

Zhang, R., Prasetiawan, E. A. & Alleyne, A. G., Dec 1 2001, p. 1459-1467. 9 p.

Research output: Contribution to conferencePaper

Modeling and multivariable control of an earthmoving vehicle powertrain

Zhang, R., Prasetiawan, E. A. & Alleyne, A. G., Dec 1 2002, p. 507-515. 9 p.

Research output: Contribution to conferencePaper

Modeling coordinated checkpointing for large-scale supercomputers

Wang, L., Pattabiraman, K., Kalbarczyk, Z., Iyer, R. K., Votta, L., Vick, C. & Wood, A., Nov 9 2005, p. 812-821. 10 p.

Research output: Contribution to conferencePaper

Multi-dimensional sequential pattern mining

Pinto, H., Han, J., Pei, J., Wang, K., Chen, Q. & Dayal, U., Jan 1 2001, p. 81-88. 8 p.

Research output: Contribution to conferencePaper

Multi-flow attacks against network flow watermarking schemes

Kiyavash, N., Houmansadr, A. & Borisov, N., Jan 1 2008, p. 307-320. 14 p.

Research output: Contribution to conferencePaper

Multimedia support in network protocol processing subsystems

Tan, S. M. & Campbell, R. H., Jan 1 1999, p. 41-45. 5 p.

Research output: Contribution to conferencePaper

Multiple-domain image modeling and restoration

Ishwar, P. & Moulin, P., Dec 1 1999, p. 362-366. 5 p.

Research output: Contribution to conferencePaper

Multivariable control of an earthmoving vehicle powertrain experimentally validated in an emulated working cycle

Zhang, R., Carter, D. E. & Alleyne, A. G., Jan 1 2003, p. 515-524. 10 p.

Research output: Contribution to conferencePaper

Networked control of distributed systems: A testbed

Stubbs, A. & Dullerud, G. E., Dec 1 2002, p. 301-305. 5 p.

Research output: Contribution to conferencePaper

Networked GPS approach to tracking marine animal schools

Heng, L. & Gao, G. X., Jan 1 2013, p. 612-619. 8 p.

Research output: Contribution to conferencePaper

Neutralization of errors and attacks in wireless ad hoc networks

Basile, C., Kalbarczyk, Z. & Iyer, R. K., Nov 9 2005, p. 518-527. 10 p.

Research output: Contribution to conferencePaper

New algorithms for admission control and scheduling to support multimedia feedback remote control applications

Nahrstedt, K. & Smith, J., Jan 1 1996, p. 532-539. 8 p.

Research output: Contribution to conferencePaper

New complexity prior for multiresolution image denoising

Liu, J. & Moulin, P., Jan 1 1998, p. 637-640. 4 p.

Research output: Contribution to conferencePaper

New framework for debugging globally optimized code

Wu, L. C., Mirani, R., Patil, H., Olsen, B. & Hwu, W-M. W., Jan 1 1999, p. 181-191. 11 p.

Research output: Contribution to conferencePaper

Nonadditive gaussian watermarking and its application to wavelet-based image watermarking

Moulin, P. & Ivanović, A., Jan 1 2002, p. III/473-III/476.

Research output: Contribution to conferencePaper

Non-control-data attacks are realistic threats

Chen, S., Xu, J., Sezer, E. C., Gauriar, P. & Iyer, R. K., Jan 1 2005, p. 177-191. 15 p.

Research output: Contribution to conferencePaper

Numerical evaluation of a group-oriented multicast protocol using stochastic activity networks

Malhis, L. M., Sanders, W. H. & Schlichting, R. D., Dec 1 1995, p. 63-72. 10 p.

Research output: Contribution to conferencePaper

Objective-based stochastic framework for manipulation planning

La Valle, S. M. & Hutchinson, S. A., Dec 1 1994, p. 1772-1779. 8 p.

Research output: Contribution to conferencePaper

Octopus: A secure and anonymous DHT lookup

Wang, Q. & Borisov, N., Oct 5 2012, p. 325-334. 10 p.

Research output: Contribution to conferencePaper

On a control policy that maintains indoor air quality in a variable-air-volume air-handling unit

Norris, W. R. & Sreenivas, R. S., Dec 1 1997, p. 886-891. 6 p.

Research output: Contribution to conferencePaper

On extending parallelism to serial simulators

Nicol, D. & Heidelberger, P., Jan 1 1995, p. 60-67. 8 p.

Research output: Contribution to conferencePaper

On Integrating the Möbius and Modest Modeling Tools

Bohnenkamp, H., Courtney, T., Daly, D., Derisavi, S., Hermanns, H., Katoen, J. P., Klaren, R., Vi Lam, V. & Sanders, W. H., Dec 1 2003. 1 p.

Research output: Contribution to conferencePaper