Publications

Export 7151 results:
Author Title [ Type(Desc)] Year
Conference Papers
Vuillemot R, Clement T, Plaisant C, Kumar A.  2009.  What's being said near "Martha"? Exploring name entities in literary text collections Visual Analytics Science and Technology, 2009. VAST 2009. IEEE Symposium on. :107-114.
Stonedahl F, Anderson D, Rand W.  2011.  When does simulated data match real data? Proceedings of the 13th annual conference companion on Genetic and evolutionary computation. :231-232.
Stonedahl F, Rand W.  2012.  When Does Simulated Data Match Real Data? Comparing Model Calibration Functions using Genetic Algorithms World Congress on Social Simulation (WCSS), Taipei, Taiwan.
Cleaveland R, Steffen B.  1990.  When is `partial' adequate? A logic-based proof technique using partial specifications Logic in Computer Science, 1990. LICS '90, Proceedings., Fifth Annual IEEE Symposium on e. :440-449.
Stewart J, Raybourn E, Bederson BB, Druin A.  1998.  When Two Hands Are Better Than One: Enhancing Collaboration Using Single Display Groupware. CHI’98. Extended Abstracts. :287-288.
Hascoët-Zizi M, Ahlberg C, Korfhage R, Plaisant C, Chalmers M, Rao R.  1996.  Where is information visualization technology going? Proceedings of the 9th annual ACM symposium on User interface software and technology. :75-77.
Grinstein G, Kobsa A, Plaisant C, Shneiderman B, Stasko JT.  2003.  Which comes first, usability or utility? Proceedings of the 14th IEEE Visualization 2003 (VIS'03). :112–-112–.
Fermüller C, Aloimonos Y.  1998.  Which shape from motion? Sixth International Conference on Computer Vision, 1998. :689-695.
Domke J, Karapurkar A, Aloimonos Y.  2008.  Who killed the directed model? Computer Vision and Pattern Recognition, IEEE Computer Society Conference on. :1-8.
Chetty M, Banks R, Harper R, Regan T, Sellen A, Gkantsidis C, Karagiannis T, Key P.  2010.  Who's Hogging the Bandwidth: The Consequences of Revealing the Invisible in the Home. SIGCHI '10. :659-668.
Dumitras T, Narasimhan P.  2009.  Why Do Upgrades Fail and What Can We Do About It?: Toward Dependable, Online Upgrades in Enterprise System Middleware'09 Proceedings of the 10th ACM/IFIP/USENIX International Conference on Middleware. :18:1-18:20.
Chetty M, Haslem D, Baird A, Ofoha U, Sumner B, Grinter R.  2011.  Why is My Internet Slow?: Making Network Speeds Visible SIGCHI '11. :1889-1898.
Chowdhury AM, Chellappa R, Keaton T.  2002.  Wide baseline image registration using prior information. Multimedia Signal Processing, 2002 IEEE Workshop on. :37-40.
Valancius V, Feamster N, Rexford J, Nakao A.  2010.  Wide-area route control for distributed services. Proceedings of the 2010 USENIX conference on USENIX annual technical conference. :2-2.
Konte M, Feamster N.  2011.  Wide-area routing dynamics of malicious networks. Proceedings of the ACM SIGCOMM 2011 conference. :432-433.
Castillo CD, Jacobs DW.  2011.  Wide-baseline stereo for face recognition with large pose variation. Computer Vision and Pattern Recognition (CVPR), 2011 IEEE Conference on. :537-544.
Jimmy Lin, Demner-Fushman D.  2006.  Will pyramids built of nuggets topple over? Proceedings of the main conference on Human Language Technology Conference of the North American Chapter of the Association of Computational Linguistics. :383-390.
Agrawal M, Davis LS.  2004.  Window-based, discontinuity preserving stereo. Computer Vision and Pattern Recognition, 2004. CVPR 2004. Proceedings of the 2004 IEEE Computer Society Conference on. 1:I-66-I-73Vol.1-I-66-I-73Vol.1.
Carr R, Raboin E, Parker A, Nau DS.  2009.  Within epsilon of optimal play in the cultaptation social learning game. :1327-1328.
Ma H, Doermann D.  2004.  Word Level Script Identification on Scanned Document Images. SPIEConference on Document Recognition and Retrieval. :124-135.
Lopez A, Resnik P.  2006.  Word-based alignment, phrase-based translation: What’s the link. Proc. of AMTA. :90-99.
Resnik P.  1992.  Wordnet and distributional analysis: A class-based approach to lexical discovery. AAAI workshop on statistically-based natural language processing techniques. :56-64.
Blackburn SM, Diwan A, Hauswirth M, Memon AM, Sweeney PF.  2010.  Workshop on experimental evaluation of software and systems in computer science (Evaluate 2010). Proceedings of the ACM international conference companion on Object oriented programming systems languages and applications companion. :291-292.
Gruser J, Raschid L, Vidal ME, Bright L.  1998.  Wrapper generation for Web accessible data sources. 3rd IFCIS International Conference on Cooperative Information Systems, 1998. Proceedings. :14-23.
Chetty M, Banks R, Brush A.J., Donner J, Grinter R.  2012.  You'Re Capped: Understanding the Effects of Bandwidth Caps on Broadband Use in the Home. SIGCHI '12. :3021-3030.

Pages