Publications

Export 7151 results:
Author Title [ Type(Desc)] Year
Filters: Computational-studies-synaptic-alterations-alzheimer%E2%80%99s-disease is   [Clear All Filters]
Book Chapters
North C, Shneiderman B, Plaisant C, Kang H, Bederson BB.  2003.  Seeing the World Through Image Libraries. The craft of information visualization: readings and reflectionsThe craft of information visualization: readings and reflections. :47-47.
De Floriani L, Lee M.  2004.  Selective refinement on nested tetrahedral meshes. Geometric Modeling for Scientific VisualizationGeometric Modeling for Scientific Visualization. :329-344.
Albanese M, Turaga P, Chellappa R, Pugliese A, Subrahmanian V.  2010.  Semantic Video Content Analysis. Video Search and MiningVideo Search and Mining. 287:147-176.
Zajic D, Dorr BJ, Lin J, O'Leary DP, Conroy JM, Schlesinger JD.  2006.  Sentence Trimming and Selection: Mixing and Matching. DUC 06 Conference Proceedings.
Nagarajan N, Pop M.  2010.  Sequencing and Genome Assembly Using Next-Generation Technologies. Computational BiologyComputational Biology. 673:1-17.
Ling H, Jacobs DW.  2009.  Shape Matching for Foliage Database Retrieval. Semantic Mining Technologies for Multimedia DatabasesSemantic Mining Technologies for Multimedia Databases. :100-100.
Pop M.  2004.  Shotgun Sequence Assembly. Advances in ComputersAdvances in Computers. Volume 60:193-248.
Papamanthou C, Shi E, Tamassia R.  2013.  Signatures of Correct Computation. Theory of Cryptography. :222-242.
Bethencourt J, Elaine Shi, Song D.  2010.  Signatures of Reputation. Financial Cryptography and Data Security. 6052:400-407.
Nixon MS, Tan T, Chellappa R.  2006.  Silhouette-Based Approaches. Human Identification Based on GaitHuman Identification Based on Gait. :45-105.
Choi SGeol, Dachman-Soled D, Malkin T, Wee H.  2009.  Simple, Black-Box Constructions of Adaptively Secure Protocols. Theory of Cryptography. :387-402.
Brodský T, Fermüller C, Aloimonos Y.  1998.  Simultaneous estimation of viewing geometry and structure. Computer Vision — ECCV'98Computer Vision — ECCV'98. 1406:342-358.
Bessiere K, Ceaparu I, Lazar J, Robinson J, Shneiderman B.  2004.  Social and psychological influences on computer user frustration. Media access: Social and psychological dimensions of new technology useMedia access: Social and psychological dimensions of new technology use. :91-103.
Boehm B, Basili VR.  2005.  Software defect reduction top 10 list. Foundations of empirical software engineering: the legacy of Victor R. Basili. :426-426.
Kaâniche M, Kanoun K, Cukier M, Martini M.  1994.  Software reliability analysis of three successive generations of a Switching System. Dependable Computing — EDCC-1. 852:471-490.
O'Leary DP.  1994.  Some Themes in Gene H.Golub's Work on Iterative Methods. Recent Advances in Iterative MethodsRecent Advances in Iterative Methods. 60:1-11.
Cheong LF, Fermüller C, Aloimonos Y.  1996.  Spatiotemporal representations for visual navigation. Computer Vision — ECCV '96Computer Vision — ECCV '96. 1064:671-684.
Sharma P, Khurana U, Shneiderman B, Scharrenbroich M, Locke J.  2011.  Speeding Up Network Layout and Centrality Measures for Social Computing Goals. Social Computing, Behavioral-Cultural Modeling and PredictionSocial Computing, Behavioral-Cultural Modeling and Prediction. 6589:244-251.
Jogt NK, Shneiderman B.  1995.  Starfield visualization with interactive smooth zooming. Visual database systems, IIIVisual database systems, III. 3:1-1.
Turaga P, Veeraraghavan A, Srivastava A, Chellappa R.  2010.  Statistical Analysis on Manifolds and Its Applications to Video Analysis. Video Search and MiningVideo Search and Mining. 287:115-144.
Fermüller C, Aloimonos Y.  2001.  Statistics Explains Geometrical Optical Illusions. Foundations of Image UnderstandingFoundations of Image Understanding. 628:409-445.
Banerjee A, Gupta SK.  2006.  A Step Towards Automated Design of Side Actions in Injection Molding of Complex Parts. Geometric Modeling and Processing - GMP 2006. 4077:500-513.
Powell D, Cukier M, Arlat J.  1996.  On stratified sampling for high coverage estimations. Dependable Computing — EDCC-2. 1150:35-54.
Papamanthou C, Shi E, Tamassia R, Yi K.  2013.  Streaming Authenticated Data Structures. Advances in Cryptology – EUROCRYPT 2013. :353-370.
Nixon MS, Tan T, Chellappa R.  2006.  Subjects Allied to Gait. Human Identification Based on GaitHuman Identification Based on Gait. :5-15.

Pages