Publications
Export 7148 results:
[ Author] Title Type Year Filters: Conversion-viable-nonculturable-vibrio-cholerae-culturable-state-co%E2%80%90culture-eukaryotic is [Clear All Filters]
2009. An assessment of systems and software engineering scholars and institutions (2002–2006). Journal of Systems and Software. 82(8):1370-1373.
2011. Graph Analytics-Lessons Learned and Challenges Ahead. IEEE Computer Graphics and Applications. 31(5):18-29.
2008. An assessment of systems and software engineering scholars and institutions (2001–2005). Journal of Systems and Software. 81(6):1059-1062.
2000. A Neural Network Approach for Predicting Network Resource Requirements in Video Transmission Systems. Proc. IEEE Pacific RIM Conference on Multimedia, Sydney, Australia.
2011. Tutorial-Graph Analytics — Lessons Learned and Challenges Ahead. IEEE Computer Graphics and Applications. 31(5):18-18.
2011. LifeFlow: visualizing an overview of event sequences. Proceedings of the 2011 annual conference on Human factors in computing systems. :1747-1756.
2011. LifeFlow: visualizing an overview of event sequences (video preview). Proceedings of the 2011 annual conference extended abstracts on Human factors in computing systems. :507-510.
2012. Querying event sequences by exact match or similarity search: Design and empirical evaluation. Interacting with Computers. 24(2):55-68.
2009. Finding comparable temporal categorical records: A similarity measure with an interactive visualization. IEEE Symposium on Visual Analytics Science and Technology, 2009. VAST 2009. :27-34.
2009. Querying timestamped event sequences by exact search or similarity-based search: design and empirical evaluation. HCIL-2009-20
1994. Experiences with Constraint-based Array Dependence Analysis. Principles and practice of constraint programming: second international workshop, PPCP'94, Rosario, Orcas Island, WA, USA, May 2-4, 1994: proceedings. :312-312.
1999. The RNA World.
2001. Modulation and multiplexing techniques for multimedia data hiding. Proc. of SPIE ITcom’01, SPIE vol. 4518
2011. Recommendations in social media for brand monitoring. Proceedings of the fifth ACM conference on Recommender systems. :345-348.
2007. Robust Visual Tracking Using the Time-Reversibility Constraint. Computer Vision, 2007. ICCV 2007. IEEE 11th International Conference on. :1-8.
2000. Video access control via multi-level data hiding. Multimedia and Expo, 2000. ICME 2000. 2000 IEEE International Conference on. 1:381-384vol.1-381-384vol.1.
2004. Distortion compensated lookup-table embedding: Joint security and robustness enhancement for quantization based data hiding. Electronic Imaging Symposium: Security, Steganography, and Watermarking of Multimedia Contents VI, San Jose, CA, Proc. of SPIE. 5306:610-621.
1998. An algorithm for wipe detection. Image Processing, 1998. ICIP 98. Proceedings. 1998 International Conference on. 1:893-897vol.1-893-897vol.1.
2004. Collusion resistant multimedia fingerprinting: A unified framework. Electronic Imaging Symposium: Security, Steganography, and Watermarking of Multimedia Contents VI, San Jose, CA, Proc. of SPIE. 5306:748-759.
2004. Flexible Control of Data Transfers between Parallel Programs. Proceedings of the 5th IEEE/ACM International Workshop on Grid Computing. :226-234.
2001. Secure Health Information Sharing System: SHARE. Proceedings of the AMIA SymposiumProc AMIA Symp. :1060-1060.
2008. Community response grid (CRG) for a university campus: Design requirements and implications. Proceedings of the 5th International ISCRAM Conference. :34-43.