Publications

Export 7151 results:
Author [ Title(Desc)] Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
I
Gou H, Swaminathan A, M. Wu.  2009.  Intrinsic Sensor Noise Features for Forensic Analysis on Scanners and Scanned Images. Information Forensics and Security, IEEE Transactions on. 4(3):476-491.
Brooks PA, Memon AM.  2009.  Introducing a test suite similarity metric for event sequence-based test cases. Software Maintenance, 2009. ICSM 2009. IEEE International Conference on. :243-252.
Landau GM, Vishkin U.  1986.  Introducing efficient parallelism into approximate string matching and a new serial algorithm. Proceedings of the eighteenth annual ACM symposium on Theory of computing. :220-230.
Dorr BJ, Klavans J.  1994.  Introduction: Special issue on building lexicons for machine translation. Machine Translation. 9(3):151-153.
Minker J.  2000.  Introduction to logic-based artificial intelligence. Logic-based artificial intelligenceLogic-based artificial intelligence. :3-33.
Katz J, Lindell Y.  2008.  Introduction to Modern Cryptography.
JaJa JF.  1992.  An introduction to parallel algorithms.
JaJa JF.  1992.  Introduction to Parallel Computing.
Getoor L.  2006.  An introduction to probabilistic graphical models for relational data. Data Engineering Bulletin. 29(1)
Roussopoulos N, Leifker D.  1984.  An introduction to PSQL: A pictorial structured query language. Proc. IEEE Workshop on Visual Languages. :77-87.
Scholtz J, Shneiderman B.  1999.  Introduction to Special Issue on Usability Engineering. Empirical Software Engineering. 4(1):5-10.
Getoor L.  2007.  Introduction to Statistical Relational Learning.
Getoor L, Taskar B.  2007.  Introduction to Statistical Relational Learning. :602.
Getoor L, Diehl CP.  2005.  Introduction to the special issue on link mining. ACM SIGKDD Explorations Newsletter. 7(2):1-2.
Perlis D, Norvig P.  2005.  Introduction to the special review issue. Artificial Intelligence. 169(2):103-103.
Shneiderman B, Lazar J, IVORY M.  2003.  INTRODUCTION TO VOLUME 1, ISSUE 3: WEB NAVIGATION. IT&SOCIETY. 1(3)
Earl C, Sergey I, Might M, Van Horn D.  2012.  Introspective Pushdown Analysis of Higher-Order Programs. arXiv:1207.1813 [cs].
Cukier M, Lyons J, Pandey P, Ramasamy HV, Sanders WH, Pal P, Webber F, Schantz R, Loyall J, Watro R.  2001.  Intrusion tolerance approaches in ITUA. 64
Dodis Y, Franklin M, Katz J, Miyaji A, Yung M.  2003.  Intrusion-resilient public-key encryption. Topics in Cryptology—CT-RSA 2003. :19-32.
Biswas S, Aggarwal G, Chellappa R.  2006.  Invariant Geometric Representation of 3D Point Clouds for Registration and Matching. Image Processing, 2006 IEEE International Conference on. :1209-1212.
Shneiderman B.  2001.  Inventing Discovery Tools: Combining Information Visualization with Data Mining. Discovery Science. 2226:17-28.
Shneiderman B.  2005.  Inventing Discovery Tools: Combining Information Visualization with Data Mining (2001). Institute for Systems Research Technical Reports.
Easley GR, Patel VM, Healy Jr DM.  2009.  Inverse halftoning using a shearlet representation. Proceedings of SPIE. 7446:74460C-74460C.
Gumerov NA, Chahine GL.  2000.  An inverse method for the acoustic detection, localization and determination of the shape evolution of a bubble. Inverse Problems. 16:1741-1741.
Ishita E, Oard D, Fleischmann KR, Cheng AS, Templeton TC.  2010.  Investigating multi-label classification for human values. Proceedings of the American Society for Information Science and Technology. 47(1):1-4.

Pages