Downloading Textual Hidden-Web Content Through Keyword Queries Alexandros NtoulasPetros ZerfosJunghoo Cho University of California Los Angeles Computer.
1 Yago Diez, J. Antoni Sellarès and Universitat de Girona Noisy Road Network Matching Mario A. López University of Denver.
Online Reputation Monitoring in Twitter from an Information Access Perspective
vatter_pdm_1.1
Discrete Logarithm Integer factorization Complexity Theory Complete read/write access.
Elizeu Santos-Neto, Flavio Figueiredo Jussara Almeida, Miranda Mowbray Marcos Gonçalves, Matei Ripeanu The 2 nd IEEE SocialCom/SIN -- August 2010.
Adaptive Monitoring of Bursty Data Streams Brian Babcock, Shivnath Babu, Mayur Datar, and Rajeev Motwani.
Motion planning, control and obstacle avoidance D. Calisi.
Keywords Selection Problem in Hidden Web Crawling Ka Cheung Sia, Richard March 15 2004.
Sampling and Searching Methods for Practical Motion Planning Algorithms Anna Yershova Dept. of Computer Science University of Illinois.
Lecture 19 aCGH and Microarray Data Analysis Introduction to Bioinformatics C E N T R F O R I N T E G R A T I V E B I O I N F O R M A T I C S V U E.
Anna Yershova Thesis Defense Dept. of Computer Science, University of Illinois August 5, 2008