The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Michael Smith: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Mary Jean Harrold, Loren Larsen, John Lloyd, David Nedved, Melanie Page, Gregg Rothermel, Manvinder Singh, Michael Smith
    Aristotle: a system for development of program analysis based tools. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference, 1995, pp:110-119 [Conf]
  2. Michael Smith
    Running the Table: An AI for Computer Billiards. [Citation Graph (0, 0)][DBLP]
    AAAI, 2006, pp:- [Conf]
  3. Michael Smith
    Muscular Effects of VDT Work. [Citation Graph (0, 0)][DBLP]
    COMPCON, 1984, pp:281-283 [Conf]
  4. Michael Smith
    Mental and Emotional Issues in VDT Work. [Citation Graph (0, 0)][DBLP]
    COMPCON, 1984, pp:289-292 [Conf]
  5. Dong-U Lee, Wayne Luk, Connie Wang, Christopher Jones, Michael Smith, John D. Villasenor
    A Flexible Hardware Encoder for Low-Density Parity-Check Codes. [Citation Graph (0, 0)][DBLP]
    FCCM, 2004, pp:101-111 [Conf]
  6. Debasis Mitra, Michael Smith
    Digital Signal Processing in Predicting Secondary Structures of Proteins. [Citation Graph (0, 0)][DBLP]
    IEA/AIE, 2004, pp:40-49 [Conf]
  7. Marc Davis, Michael Smith, John F. Canny, Nathan Good, Simon King, Rajkumar Janakiraman
    Towards context-aware face recognition. [Citation Graph (0, 0)][DBLP]
    ACM Multimedia, 2005, pp:483-486 [Conf]
  8. Steve Bishop, Matthew Fairbairn, Michael Norrish, Peter Sewell, Michael Smith, Keith Wansbrough
    Engineering with logic: HOL specification and symbolic-evaluation testing for TCP implementations. [Citation Graph (0, 0)][DBLP]
    POPL, 2006, pp:55-66 [Conf]
  9. C. Michael Holloway, Ben L. Di Vito, David Guaspari, Michael Smith
    Formal Methods Fact vs. Fiction. [Citation Graph (0, 0)][DBLP]
    TRI-Ada, 1994, pp:256-258 [Conf]
  10. Steve Bishop, Matthew Fairbairn, Michael Norrish, Peter Sewell, Michael Smith, Keith Wansbrough
    Rigorous specification and conformance testing techniques for network protocols, as applied to TCP, UDP, and sockets. [Citation Graph (0, 0)][DBLP]
    SIGCOMM, 2005, pp:265-276 [Conf]
  11. Matthew Bass, Raghvinder Sangwan, Michael Smith
    Architecture Design for Globally Distributed Projects. [Citation Graph (0, 0)][DBLP]
    WICSA, 2007, pp:35- [Conf]
  12. Michael Smith, Paul C. van Oorschot, Michael Willett
    Cryptographic Information Recovery Using Key Recover. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:1, pp:21-27 [Journal]
  13. Farshad Faghih, Michael Smith
    Combining spatial and scale-space techniques for edge detection to provide a spatially adaptive wavelet-based noise filtering algorithm. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Image Processing, 2002, v:11, n:9, pp:1062-1071 [Journal]
  14. Michael Smith
    PickPocket: A computer billiards shark. [Citation Graph (0, 0)][DBLP]
    Artif. Intell., 2007, v:171, n:16-17, pp:1069-1091 [Journal]

  15. Broadening participation in computing with the k-gray engineering pathway digital library. [Citation Graph (, )][DBLP]


  16. Mother, May I? OWL-based Policy Management at NASA. [Citation Graph (, )][DBLP]


  17. Owlgres: A Scalable OWL Reasoner. [Citation Graph (, )][DBLP]


  18. Managing Change: An Ontology Version Control System. [Citation Graph (, )][DBLP]


  19. Opening, Closing Worlds - On Integrity Constraints. [Citation Graph (, )][DBLP]


Search in 0.003secs, Finished in 0.005secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002