Error message

The page you requested does not exist. For your convenience, a search was performed using the query about.

Page not found

Search results

  1. Rahman, Tauhidur

    ... continuously and passively extract information about high-level health and behavioral variables including eating behavior, ...

  2. In Memoriam: Edward M. Riseman (1942 - 2007)

    ... time of Riseman's hiring. "I can't say enough good things about Ed. He served the department, he served the university and he served the ...

  3. The Beauty and the Beast — from Fortress to Julia

    ... often hacks single-file LaTeX documents, always complains about Git, and never used Coq. He is partly to blame for the artifact ...

  4. Putting the Cloud in the Palm of Your Hand

    ... without incurring delays and jitter and without worrying about energy.  I will highlight some of the challenges we face and some of the ...

  5. Whole-system A.C. Power Analysis

    ... analysis as a technique for making fine-grained inferences about complex, highly integrated devices like modern computers. This thesis ...

  6. Woolf, McCallum Shaping Northeast Big Data Hub Initiatives on Dec. 16

    ... program, with other industry and government leaders, talk about security and other big data topics. Northeast Hub leaders also ...

  7. Informatics FAQs

    ... pursue studies in Informatics through BDIC. More information about BDIC is available at  http://bdic.umass.edu How does the ...

  8. Extending Faceted Search to the Open-Domain Web

    ... model under a more practical scenario, where users care more about precision of presented facets than recall. The dominant facet ...

  9. How Private is an Anonymized Network?

    ... and derive conditions for network privacy, and insights about vulnerabilities. This has important implications for policies for ...

  10. Playing with Grammars: What Have We Known So Far?

    ... ICDE 2012 respectively. We're excited to learn more about Barna's research and look forward to seeing you there! ...

Pages