Publications

Export 7151 results:
Author Title [ Type(Desc)] Year
Journal Articles
Young D, Shneiderman B.  1993.  A graphical filter/flow representation of Boolean queries: A prototype implementation and evaluation. Journal of the American Society for Information Science. 44(6):327-339.
Deshpande A, Getoor L, Sen P.  2009.  Graphical models for uncertain data. Managing and Mining Uncertain Data. :77-77.
Weiland WJ, Shneiderman B.  1993.  A graphical query interface based on aggregation/generalization hierarchies. Information Systems. 18(4):215-232.
Arlt S, Banerjee I, Bertolini C, Memon AM, Schäf M.  2012.  Grey-box GUI Testing: Efficient Generation of Event Sequences. arXiv:1205.4928.
Cummings MP, Huskamp JC.  2005.  Grid computing. EDUCAUSE Review. 40:116-117.
Bazinet AL, Myers DS, Fuetsch J, Cummings MP.  2007.  Grid Services Base Library: A high-level, procedural application programming interface for writing Globus-based Grid services. Future Generation Comp Syst. 23(3):517-522.
Jacobs DW.  1987.  GROPER: A Grouping Based Object Recognition System for Two-Dimensional Objects. IEEE Workshop on Computer Vision. :164-169.
Perlis D.  1976.  Group algebras and model theory. Illinois journal of mathematics. 20(2):298-305.
Saha B, Getoor L.  2008.  Group proximity measure for recommending groups in online social networks. networks. 1(6):5-5.
Gordon S, Katz J, Vaikuntanathan V.  2010.  A group signature scheme from lattice assumptions. Advances in Cryptology-ASIACRYPT 2010. :395-412.
He S, Wu M.  2005.  Group-based joint coding and embedding technique for multimedia fingerprinting. Proc. SPIE. 5681:96-105.
Kantere V, Tsoumakos D, Sellis T, Roussopoulos N.  2009.  GrouPeer: Dynamic clustering of P2P databases. Information Systems. 34(1):62-86.
Jacobs DW.  1989.  Grouping for recognition. AI Memos (1959 - 2004).
Wang JZ, M. Wu, Trappe W, Liu KJR.  2004.  Group-oriented fingerprinting for multimedia forensics. EURASIP J. Appl. Signal Process.. 2004:2153-2173.
Bhanu B, Ratha NK, Kumar V, Chellappa R, Bigun J.  2007.  Guest Editorial: Special Issue on Human Detection and Recognition. Information Forensics and Security, IEEE Transactions on. 2(3):489-490.
Khanna S, Srinivasan A.  2004.  Guest editors' foreword: special issue: 35th annual ACM symposium on theory of computing. Journal of Computer and System Sciences. 69(3):305-305.
Varshney A.  2001.  Guest Editor's Introduction: Special Issue on Visualization 2000. IEEE Transactions on Visualization and Computer Graphics. 7(3):193-194.
Giancarlo R, Hannenhalli S.  2008.  Guest Editors' Introduction to the Special Section on Algorithms in Bioinformatics. IEEE/ACM Transactions on Computational Biology and Bioinformatics. 5(4):482-483.
Figueiredo MAT, Hancock ER, Pelillo M, Zerubia J.  2003.  Guest editors' Introduction to the special section on energy minimization methods in computer vision and pattern recognition. Pattern Analysis and Machine Intelligence, IEEE Transactions on. 25(11):1361-1363.
Yuan X, Cohen MB, Memon AM.  2011.  GUI Interaction Testing: Incorporating Event Context. Software Engineering, IEEE Transactions on. 37(4):559-574.
Memon AM, Banerjee I, Nagarajan A.  2003.  GUI ripping: Reverse engineering of graphical user interfaces for testing. Proceedings of the 10th working conference on reverse engineering (WCRE’03). 1095(1350/03):17-00.
Memon AM.  2002.  GUI testing: Pitfalls and process. IEEE Computer. 35(8):87-88.
Feamster N, Borkenhagen J, Rexford J.  2003.  Guidelines for interdomain traffic engineering. SIGCOMM Comput. Commun. Rev.. 33(5):19-30.
Katz J, Lindell Y.  2008.  Handling expected polynomial-time strategies in simulation-based security proofs. Journal of Cryptology. 21(3):303-349.
M. Wu, Fridrich J, Goljan M, Gou H.  2005.  Handling uneven embedding capacity in binary images: a revisit. Proceedings of SPIE. 5681(1):194-205.

Pages