Publications

Export 7151 results:
Author Title Type [ Year(Desc)]
2006
Piatetsky-Shapiro G, Djeraba C, Getoor L, Grossman R, Feldman R, Zaki M.  2006.  What are the grand challenges for data mining? - KDD-2006 panel report ACM SIGKDD Explorations Newsletter. 8(2):70-77.
Grossman D, Manson J, Pugh W.  2006.  What do high-level memory models mean for transactions? Proceedings of the 2006 workshop on Memory system performance and correctness - MSPC '06. :62-62.
Agrawal A, Raskar R, Chellappa R.  2006.  What Is the Range of Surface Reconstructions from a Gradient Field? Computer Vision – ECCV 2006Computer Vision – ECCV 2006. 3951:578-591.
Rand W, Blikstein P, Wilensky U.  2006.  Widgets, Planets, and Demons: the Case for the Integration of Human, Embedded, and Virtual Agents via Mediation. Proceedings of Swarmfest.
Jimmy Lin, Demner-Fushman D.  2006.  Will pyramids built of nuggets topple over? Proceedings of the main conference on Human Language Technology Conference of the North American Chapter of the Association of Computational Linguistics. :383-390.
Shin M, Ma J, Mishra A, Arbaugh WA.  2006.  Wireless Network Security and Interworking. Proceedings of the IEEE. 94(2):455-466.
Lopez A, Resnik P.  2006.  Word-based alignment, phrase-based translation: What’s the link. Proc. of AMTA. :90-99.
Lazar J, Jones A, Shneiderman B.  2006.  Workplace user frustration with computers: an exploratory investigation of the causes and severity. Behaviour & Information Technology. 25(3):239-251.
2007
Shneiderman B.  2007.  25 years of CHI conferences: capturing the exchange of ideas. Magazine interactions - 25 years of CHI conferences: a photographic essay. 14(2):24-31.
Shneiderman B, Preece J.  2007.  911. gov. Science(Washington). 315(5814):944-944.
Bender A, Spring N, Levin D, Bhattacharjee B.  2007.  Accountability as a service. Proceedings of the 3rd USENIX workshop on Steps to reducing unwanted traffic on the internet. :5:1–5:6-5:1–5:6.
Song S, JaJa JF.  2007.  ACE: A Novel Software Platform to Ensure the Integrity of Long Term Archives. UMIACS-TR-2007-07
Katz J.  2007.  On achieving the "best of both worlds" in secure multiparty computation. Proceedings of the thirty-ninth annual ACM symposium on Theory of computing. :11-20.
Andrade H, Kurc T, Sussman A, Saltz J.  2007.  Active semantic caching to optimize multidimensional data analysis in parallel and distributed environments. Parallel Computing. 33(7-8):497-520.
He S, M. Wu.  2007.  Adaptive Detection for Group-Based Multimedia Fingerprinting. Signal Processing Letters, IEEE. 14(12):964-967.
Zhuolin Jiang, Li S-F, Gao D-F.  2007.  An adaptive mean shift tracking method using multiscale images. Wavelet Analysis and Pattern Recognition, 2007. ICWAPR '07. International Conference on. 3:1060-1066.
Deshpande A, Ives Z, Raman V.  2007.  Adaptive query processing. Foundations and Trends in Databases. 1(1):1-140.
Deshpande A, Ives Z, Raman V.  2007.  Adaptive query processing: why, how, when, what next? Proceedings of the 33rd international conference on Very large data bases. :1426-1427.
Tom Yeh, Lee J, Darrell T.  2007.  Adaptive Vocabulary Forests br Dynamic Indexing and Category Learning. Computer Vision, 2007. ICCV 2007. IEEE 11th International Conference on. :1-8.
Udrea O, Majkić Z, Subrahmanian V.  2007.  Aggregates in Generalized Temporally Indeterminate Databases. Scalable Uncertainty ManagementScalable Uncertainty Management. 4772:171-186.
Memon AM, Xie Q.  2007.  Agile Quality Assurance Techniques for GUI-Based Applications. Agile software development quality assuranceAgile software development quality assurance. :114-114.
Peng T, Balijepalli A, Gupta SK, LeBrun T.  2007.  Algorithms for on-line monitoring of micro spheres in an optical tweezers-based assembly cell. Journal of Computing and Information Science in Engineering. 7:330-330.
Lu Y, Bulka B, desJardins M, Freeland SJ.  2007.  Amino acid quantitative structure property relationship database: a web-based platform for quantitative investigations of amino acids. Protein Engineering Design and SelectionProtein Engineering, Design and Selection. 20(7):347-351.
Varna AL, He S, Swaminathan A, M. Wu.  2007.  Analysis of Nonlinear Collusion Attacks on Fingerprinting Systems for Compressed Multimedia. Image Processing, 2007. ICIP 2007. IEEE International Conference on. 2:II-133-II-136-II-133-II-136.
Lee C-R, Stewart G.W.  2007.  Analysis of the Residual Arnoldi Method. UMIACS-TR-2007-45

Pages