Publications

Export 624 results:
Author Title Type [ Year(Asc)]
Filters: First Letter Of Title is C  [Clear All Filters]
2012
V.S. Subrahmanian, Mannes A, Sliva A, Shakarian J, Dickerson JP.  2012.  Computational Analysis of Terrorist Groups: Lashkar-e-Taiba.
Dachman-Soled D, Gennaro R, Krawczyk H, Malkin T.  2012.  Computational Extractors and Pseudorandomness. Theory of Cryptography. :383-403.
Wei Z, JaJa JF.  2012.  Constructing Inverted Files: To MapReduce or Not Revisited. UMIACS-TR-2012-03
Senoh M, Ghosh‐Banerjee J, Ramamurthy T, Colwell RR, Miyoshi S-ichi, Nair BG, Takeda Y.  2012.  Conversion of viable but nonculturable enteric bacteria to culturable by co‐culture with eukaryotic cells. Microbiology and Immunology. 56(5):342-345.
2011
Cho S, Zwick A, Regier JC, Mitter C, Cummings MP, Yao J, Du Z, Zhao H, Kawahara AY, Weller S et al..  2011.  Can Deliberately Incomplete Gene Sample Augmentation Improve a Phylogeny Estimate for the Advanced Moths and Butterflies (Hexapoda: Lepidoptera)? Systematic BiologySyst Biol. 60(6):782-796.
Dachman-Soled D, Servedio RA.  2011.  A Canonical Form for Testing Boolean Function Properties. Approximation, Randomization, and Combinatorial Optimization. Algorithms and Techniques. :460-471.
Chafekar D, Anil Kumar V, Marathe M, Parthasarathy S, Srinivasan A.  2011.  Capacity of wireless networks under SINR interference constraints. Wireless Networks. 17(7):1605-1624.
Tom Yeh, White B, San Pedro J, Katz B, Davis LS.  2011.  A case for query by image and text content: searching computer help using screenshots and keywords. Proceedings of the 20th international conference on World wide web. :775-784.
Tom Yeh, White B, San Pedro J, Katz B, Davis LS.  2011.  A case for query by image and text content: searching computer help using screenshots and keywords. Proceedings of the 20th international conference on World wide web. :775-784.
Hopkins JK, Spranklin BW, Gupta SK.  2011.  A Case Study in Optimization of Gait and Physical Parameters for a Snake-Inspired Robot Based on a Rectilinear Gait. Journal of mechanisms and robotics. 3(1)
Layman L, Basili VR, Zelkowitz MV, Fisher KL.  2011.  A case study of measuring process risk for early insights into software safety. Software Engineering (ICSE), 2011 33rd International Conference on. :623-632.
Halter M, Sisan DR, Chalfoun J, Stottrup BL, Cardone A, Dima AA, Tona A, Plant AL, Elliott JT.  2011.  Cell cycle dependent TN-C promoter activity determined by live cell imaging.. Cytometry. Part A : the journal of the International Society for Analytical Cytology. 79(3):192-202.
Salles-Loustau G, Berthier R, Collange E, Sobesto B, Cukier M.  2011.  Characterizing Attackers and Attacks: An Empirical Study. :174-183.
Khan A, Bartram L, Blevis E, DiSalvo C, Froehlich J, Kurtenbach G.  2011.  CHI 2011 sustainability community invited panel: challenges ahead. 2011 annual conference extended abstracts on Human factors in computing systems. :73-76.
Whidby M, Zajic D, Dorr BJ.  2011.  Citation Handling for Improved Summarization of Scientific Documents.
Shneiderman B.  2011.  Claiming success, charting the future: micro-HCI and macro-HCI. Interactions. 18(5):10-11.
Alam M, Islam A, Bhuiyan NA, Rahim N, Hossain A, Khan GY, Ahmed D, Watanabe H, Izumiya H, Faruque ASG et al..  2011.  Clonal transmission, dual peak, and off-season cholera in Bangladesh. Infection Ecology & Epidemiology. 1(1)
Neamtiu I., Dumitras T.  2011.  Cloud software upgrades: Challenges and opportunities. 2011 International Workshop on the Maintenance and Evolution of Service-Oriented and Cloud-Based Systems (MESOCA) . :1-10.
Namata G M, Kok S, Getoor L.  2011.  Collective graph identification. Proceedings of the 17th ACM SIGKDD international conference on Knowledge discovery and data mining. :87-95.
Kim H, Sundaresan S, Chetty M, Feamster N, W. Edwards K.  2011.  Communicating with Caps: Managing Usage Caps in Home Networks. SIGCOMM Comput. Commun. Rev.. 41(4):470-471.
Kim H, Sundaresan S, Chetty M, Feamster N, Edwards KW.  2011.  Communicating with caps: managing usage caps in home networks. ACM SIGCOMM Computer Communication Review. 41(4):470-471.
Lai V, Rajashekar C, Rand W.  2011.  Comparing Social Tags to Microblogs. Privacy, security, risk and trust (passat), 2011 IEEE third international conference on and 2011 IEEE third international conference on social computing (socialcom). :1380-1383.
Templeton T C, Fleischmann KR, Boyd-Graber J.  2011.  Comparing values and sentiment using Mechanical Turk. Proceedings of the 2011 iConference. :783-784.
Gordon DS, Hazay C, Katz J, Lindell Y.  2011.  Complete Fairness in Secure Two-Party Computation. Journal of the ACM. 58(6):24:1–24:37-24:1–24:37.
Patel VM, Easley GR, Chellappa R.  2011.  Component-based restoration of speckled images. 2011 18th IEEE International Conference on Image Processing (ICIP). :2797-2800.

Pages