Publications

Export 7151 results:
Author Title Type [ Year(Desc)]
Filters: Believe-me%E2%80%94we-can-do-annotating-persuasive-acts-blog-text is   [Clear All Filters]
2008
Motiwala M, Elmore M, Feamster N, Vempala S.  2008.  Path splicing. SIGCOMM Comput. Commun. Rev.. 38(4):27-38.
Swaminathan A, M. Wu, Liu KJR.  2008.  A pattern classification framework for theoretical analysis of component forensics. Acoustics, Speech and Signal Processing, 2008. ICASSP 2008. IEEE International Conference on. :1665-1668.
Kim Y, Varshney A.  2008.  Persuading Visual Attention through Geometry. Visualization and Computer Graphics, IEEE Transactions on. 14(4):772-782.
Yardi S, Feamster N, Bruckman A.  2008.  Photo-based authentication using social networks. Proceedings of the first workshop on Online social networks. :55-60.
Tom Yeh, Lee JJ, Darrell T.  2008.  Photo-based question answering. Proceedings of the 16th ACM international conference on Multimedia. :389-398.
Hochstein L, Basili VR, Vishkin U, Gilbert J.  2008.  A pilot study to compare programming effort for two parallel programming models. Journal of Systems and Software. 81(11):1920-1930.
Last M, Luta G, Orso A, Porter A, Young S.  2008.  Pooled ANOVA. Computational Statistics & Data Analysis. 52(12):5215-5228.
Chellappa R, Aggarwal G.  2008.  Pose and Illumination Issues in Face-and Gait-Based Identification. Advances in Biometrics. :307-322.
Lin Z, Davis LS.  2008.  A pose-invariant descriptor for human detection and segmentation. Computer Vision–ECCV 2008. :423-436.
Eaton C, Memon AM.  2008.  Position Paper: Improving Browsing Environment Compliance Evaluations for Websites. Relation. 10(1.14):6113-6113.
Huang Y, Feamster N, Teixeira R.  2008.  Practical issues with using network tomography for fault diagnosis. SIGCOMM Comput. Commun. Rev.. 38(5):53-58.
Katz J, Sahai A, Waters B.  2008.  Predicate encryption supporting disjunctions, polynomial equations, and inner products. Proceedings of the theory and applications of cryptographic techniques 27th annual international conference on Advances in cryptology. :146-162.
Wang L, Deshpande A.  2008.  Predictive Modeling-Based Data Collection in Wireless Sensor Networks. Wireless Sensor NetworksWireless Sensor Networks. 4913:34-51.
Zheleva E, Getoor L.  2008.  Preserving the privacy of sensitive relationships in graph data. Proceedings of the 1st ACM SIGKDD international conference on Privacy, security, and trust in KDD. :153-171.
Plaisant C, Fekete J-D, Grinstein G.  2008.  Promoting Insight-Based Evaluation of Visualizations: From Contest to Benchmark Repository. Visualization and Computer Graphics, IEEE Transactions on. 14(1):120-134.
Pemmaraju S, Srinivasan A.  2008.  The Randomized Coloring Procedure with Symmetry-Breaking. Automata, Languages and ProgrammingAutomata, Languages and Programming. 5125:306-319.
Plaisant C.  2008.  A range of indicators for the evaluation of state health department Web-based data query systems. Issues in Evaluating Health Department Web-based Data Query Systems: Working Papers. :39-39.
Quinn AJ, Hu C, Arisaka T, Rose A, Bederson BB.  2008.  Readability of scanned books in digital libraries. Proceeding of the twenty-sixth annual SIGCHI conference on Human factors in computing systems. :705-714.
Wang J, Dam G, Yildirim S, Rand W, Wilensky U, Houk JC.  2008.  Reciprocity between the cerebellum and the cerebral cortex: Nonlinear dynamics in microscopic modules for generating voluntary motor commands. Complexity. 14(2):29-45.
Turaga P, Veeraraghavan A, Chellappa R.  2008.  Recognition of Humans and their Activities using Statistical analysis on Stiefel and Grassmann Manifolds. Red. 7:643-643.
Strecker J, Memon AM.  2008.  Relationships between Test Suites, Faults, and Fault Detection in GUI Testing. Software Testing, Verification, and Validation, 2008 1st International Conference on. :12-21.
Shneiderman B.  2008.  Research Agenda: Visual Overviews for Exploratory Search. Information Seeking Support Systems. 11:4-4.
Rust BW, O'Leary DP.  2008.  Residual periodograms for choosing regularization parameters for ill-posed problems. Inverse Problems. 24(3):034005-034005.
Regier JC, Shultz JW, Ganley ARD, Hussey A, Shi D, Ball B, Zwick A, Stajich JE, Cummings MP, Martin JW et al..  2008.  Resolving arthropod phylogeny: exploring phylogenetic signal within 41 kb of protein-coding nuclear gene sequence. Syst Biol. 57(6):920-938.
Elsayed T, Oard D, Namata G.  2008.  Resolving personal names in email using context expansion. Association for Computational Linguistics (ACL).

Pages