Return to Skip Menu
Export 3821 results:Sort by:
"Instructor Rating Markets", Proceedings of the AAAI Conference on Artificial Intelligence, To appear, 2013.
"On the Social Welfare of Mechanisms for Repeated Batch Matching", Proceedings of the AAAI Conference on Artificial Intelligence, To appear, 2013.
"Impacts of adaptive feedback on teaching test-driven development", Proceeding of the 44th ACM technical symposiumProceeding of the 44th ACM technical symposium on Computer science education - SIGCSE '13, Denver, Colorado, USANew York, New York, USA, ACM Press, pp. 293-298, March, 2013.
"Re-imagining CS1/CS2 with Android using the Sofia framework", Proceeding of the 44th ACM Technical Symposium on Computer Science Education - SIGCSE '13, Denver, Colorado, USANew York, New York, USA, ACM Press, pp. 759, March, 2013.
"Device-Based Isolation for Securing Cryptographic Keys", Third International Symposium on Internet of Ubiquitous and Pervasive Things (IUPT 2013), Halifax, Nova Scotia, Canada, June 25-28, 2013.
"An Information Flow Control Meta-model", 18th ACM Symposium on Access Control Models and Technologies (SACMAT), Amsterdam, The Netherlands, June 12-14, 2013.
"The Landscape of Host Transcriptional Response Programs Commonly Perturbed by Bacterial Pathogens: Towards Host-Oriented Broad-Spectrum Drug Targets", PLoS ONE, vol. 8, issue 3, pp. e58553, 3/2013.
"Performance Modeling and Load Balancing for Large Scale Epidemiological Simulation", Proceedings of the ACM International Symposium on High Performance Parallel and Distributed Computing (HPDC ’13), 06/2013.
"The Effects of Visual Realism on Search Tasks in Mixed Reality Simulation", IEEE Transactions on Visualization and Computer Graphics, vol. 19, issue 4, no. 4, pp. 547 - 556, 04/2013.
"Validation of the MR Simulation Approach for Evaluating the Effects of Immersion on Visual Analysis of Volume Data", IEEE Transactions on Visualization and Computer Graphics, vol. 19, issue 4, no. 4, pp. 529 - 538, 04/2013.
"Composite Trust-based Public Key Management in Mobile Ad Hoc Networks", ACM 28th Symposium on Applied Computing, Coimbra, Portugal, 03/2013.
"Computer Science Principles: Analysis of a proposed Advanced Placement Course", The 44thACM Technical Symposium on Computer Science Education, Denver, CO., Association of Computing Machinery, 03/2013.
"Dynamic Multisource Multipath Routing for Intrusion Tolerance and Lifetime Maximization of Autonomous Wireless Sensor Networks", IEEE 11th Symposium on Decentralized Autonomous Systems, 03/2013.
"Reconciling differential gene expression data with molecular interaction networks", Bioinformatics, vol. 29, issue 5, pp. 622 - 629, 03/2013.
"Scaffolding Technology for Low Literacy Groups: From Cell Phone to PC?", International Journal of Human-Computer Interaction, vol. 29, no. 4, pp. 274-288, 03/2013.
"Scalable, Adaptive and Survivable Trust Management for Community of Interest Based Internet of Things Systems", IEEE 11th Symposium on Decentralized Autonomous Systems, 03/2013.
"Secure ad-hoc trust initialization and key management in wireless body area networks", ACM Transactions on Sensor Networks (ToSN), vol. 9, no. 2, pp. 18:1-18:35, 03/2013.
"“Parallel Universes of Teleconferencing”", Electronic Journal of Communications, vol. Volume 23, no. Numbers 1 & 2, 03/2013.
"SuperIDR: A Tool for Fish Identification and Information Retrieval", Fisheries, vol. 38(2), pp. 65-75, 02/2013.
"Two-phase stretching of molecular chains", Proceedings of the National Academy of Sciences, vol. 110, issue 8, pp. 2816 - 2821, 02/2013.
"Scalable and Secure Sharing of Personal Health Records in Cloud Computing using Attribute-based Encryption", IEEE Transactions on Parallel and Distributed Systems, vol. 24, no. 1, pp. 131-143, 01/2013.
"3D User Interfaces", Encyclopedia of Human-Computer Interaction, 2nd, Aarhus, Denmark, The Interaction Design Foundation, 2013.
"Achieving Both Creativity and Rationale: Reuse in Design with Images and Claims", Creativity and Rationale: Enhancing Human Experience by Design, London, Springer-Verlag, pp. 105-120, 2013.
"Adaptive Intrusion Detection of Malicious Unmanned Air Vehicles Using Behavior Rule Specifications", IEEE Transactions on Systems, Man and Cybernetics, 2013.
"Adjusting process count on demand for petascale global optimization", Parallel Comput., vol. 39, pp. 21--35, 2013.