Publications
Export 7151 results:
Author Title Type [ Year] Filters: Believe-me%E2%80%94we-can-do-annotating-persuasive-acts-blog-text is [Clear All Filters]
2008. A pattern classification framework for theoretical analysis of component forensics. Acoustics, Speech and Signal Processing, 2008. ICASSP 2008. IEEE International Conference on. :1665-1668.
2008. Persuading Visual Attention through Geometry. Visualization and Computer Graphics, IEEE Transactions on. 14(4):772-782.
2008. Photo-based authentication using social networks. Proceedings of the first workshop on Online social networks. :55-60.
2008. Photo-based question answering. Proceedings of the 16th ACM international conference on Multimedia. :389-398.
2008. A pilot study to compare programming effort for two parallel programming models. Journal of Systems and Software. 81(11):1920-1930.
2008. Pose and Illumination Issues in Face-and Gait-Based Identification. Advances in Biometrics. :307-322.
2008. A pose-invariant descriptor for human detection and segmentation. Computer Vision–ECCV 2008. :423-436.
2008. Position Paper: Improving Browsing Environment Compliance Evaluations for Websites. Relation. 10(1.14):6113-6113.
2008. Practical issues with using network tomography for fault diagnosis. SIGCOMM Comput. Commun. Rev.. 38(5):53-58.
2008. Predicate encryption supporting disjunctions, polynomial equations, and inner products. Proceedings of the theory and applications of cryptographic techniques 27th annual international conference on Advances in cryptology. :146-162.
2008. Predictive Modeling-Based Data Collection in Wireless Sensor Networks. Wireless Sensor NetworksWireless Sensor Networks. 4913:34-51.
2008. Preserving the privacy of sensitive relationships in graph data. Proceedings of the 1st ACM SIGKDD international conference on Privacy, security, and trust in KDD. :153-171.
2008. Promoting Insight-Based Evaluation of Visualizations: From Contest to Benchmark Repository. Visualization and Computer Graphics, IEEE Transactions on. 14(1):120-134.
2008. The Randomized Coloring Procedure with Symmetry-Breaking. Automata, Languages and ProgrammingAutomata, Languages and Programming. 5125:306-319.
2008. A range of indicators for the evaluation of state health department Web-based data query systems. Issues in Evaluating Health Department Web-based Data Query Systems: Working Papers. :39-39.
2008. Readability of scanned books in digital libraries. Proceeding of the twenty-sixth annual SIGCHI conference on Human factors in computing systems. :705-714.
2008. Reciprocity between the cerebellum and the cerebral cortex: Nonlinear dynamics in microscopic modules for generating voluntary motor commands. Complexity. 14(2):29-45.
2008. Recognition of Humans and their Activities using Statistical analysis on Stiefel and Grassmann Manifolds. Red. 7:643-643.
2008. Relationships between Test Suites, Faults, and Fault Detection in GUI Testing. Software Testing, Verification, and Validation, 2008 1st International Conference on. :12-21.
2008. Research Agenda: Visual Overviews for Exploratory Search. Information Seeking Support Systems. 11:4-4.
2008. Residual periodograms for choosing regularization parameters for ill-posed problems. Inverse Problems. 24(3):034005-034005.
2008. Resolving arthropod phylogeny: exploring phylogenetic signal within 41 kb of protein-coding nuclear gene sequence. Syst Biol. 57(6):920-938.
2008. Resolving personal names in email using context expansion. Association for Computational Linguistics (ACL).