Publications

Export 7151 results:
Author Title Type [ Year(Desc)]
2011
Tarkan S, Plaisant C, Shneiderman B, Hettinger ZA.  2011.  Reducing Missed Laboratory Results: Defining Temporal Responsibility, Generating User Interfaces for Test Process Tracking, and Retrospective Analyses to Identify Problems. AMIA Annual Symposium ProceedingsAMIA Annu Symp Proc. 2011:1382-1391.
Butler K, Payne T, Shneiderman B, Brennan P, Zhang J.  2011.  Re-engineering health care with information technology: the role of computer-human interaction. PART 2 ———– Proceedings of the 2011 annual conference extended abstracts on Human factors in computing systems. :451-454.
Tian Y, Zhang Y, Hurd L, Hannenhalli S, Liu F, Lu M M, Morrisey EE.  2011.  Regulation of Lung Endoderm Progenitor Cell Behavior by miR302/367. DevelopmentDevelopment. 138(7):1235-1245.
Chellappa R, Ni J, Patel VM.  2011.  Remote identification of faces: Problems, prospects, and progress. Pattern Recognition Letters.
Kandel S, Heer J, Plaisant C, Kennedy J, Van Ham F, Riche N H, Weaver C, Lee B, Brodbeck D, Buono P.  2011.  Research Directions in Data Wrangling: Visualizations and Transformations for Usable and Credible Data. Information VisualizationInformation Visualization. 10(4):271-288.
Perlis D.  2011.  Robotson Crusoe–or–What Is Common Sense? Logical Formalizations of Commonsense Reasoning — Papers from the AAAI 2011 Spring Symposium.
Maximo A, Patro R, Varshney A, Farias R.  2011.  A robust and rotationally invariant local surface descriptor with applications to non-local mesh processing. Graphical Models. 73(5):231-242.
De Magny G C, Mozumder PK, Grim CJ, Hasan NA, Naser NM, Alam M, Sack BR, Huq A, Colwell RR.  2011.  Role of Zooplankton Diversity in Vibrio Cholerae Population Dynamics and in the Incidence of Cholera in the Bangladesh Sundarbans. Applied and Environmental Microbiology. 77(17):6125-6132.
Katz J, Vaikuntanathan V.  2011.  Round-optimal password-based authenticated key exchange. Theory of Cryptography. :293-310.
Ip C Y, Varshney A.  2011.  Saliency-Assisted Navigation of Very Large Landscape Images. Visualization and Computer Graphics, IEEE Transactions on. 17(12):1737-1746.
Hu Q, Gumerov NA, Duraiswami R.  2011.  Scalable fast multipole methods on distributed heterogeneous architectures. High Performance Computing, Networking, Storage and Analysis (SC), 2011 International Conference for. :1-12.
Lu W, M. Wu.  2011.  Seam carving estimation using forensic hash. Proceedings of the thirteenth ACM multimedia workshop on Multimedia and security. :9-14.
Gordon D, Katz J, Kolesnikov V, Malkin T, Raykova M, Vahlis Y.  2011.  Secure computation with sublinear amortized work.
Dachman-Soled D, Malkin T, Raykova M, Yung M.  2011.  Secure Efficient Multiparty Computing of Multivariate Polynomials and Applications. Applied Cryptography and Network Security. :130-146.
Lu W, Varna A, M. Wu.  2011.  Secure video processing: Problems and challenges. Acoustics, Speech and Signal Processing (ICASSP), 2011 IEEE International Conference on. :5856-5859.
Garg R, Varna AL, M. Wu.  2011.  "Seeing" ENF: natural time stamp for digital video via optical sensing and signal processing. Proceedings of the 19th ACM international conference on Multimedia. :23-32.
Kumar J, Kang L, Doermann D, Abd-Almageed W.  2011.  Segmentation of Handwritten Textlines in Presence of Touching Components. Intl. Conf. on Document Analysis and Recognition (ICDAR 11). :109-113.
Eaton E, desJardins M, others.  2011.  Selective transfer between learning tasks using task-based boosting. Twenty-Fifth AAAI Conference on Artificial Intelligence.
Resnik P.  2011.  Semantic similarity in a taxonomy: An information-based measure and its application to problems of ambiguity in natural language. Arxiv preprint arXiv:1105.5444.
Tobin-Hochstadt S, Van Horn D.  2011.  Semantic Solutions to Program Analysis Problems. arXiv:1105.0106 [cs].
Kanagal B, Li J, Deshpande A.  2011.  Sensitivity analysis and explanations for robust query evaluation in probabilistic databases. Proceedings of the 2011 international conference on Management of data. :841-852.
Lam H, Bertini E, Isenberg P, Plaisant C, Carpendale S.  2011.  Seven guiding scenarios for information visualization evaluation. 2011-992-04
Kumar J, Prasad R, Cao H, Abd-Almageed W, Doermann D, Natarajan P.  2011.  Shape Codebook based Handwritten and Machine Printed Text Zone Extraction. Document Recognition and Retrieval. :7874:1-8-7874:1-8.
Abdelkader MF, Abd-Almageed W, Srivastava A, Chellappa R.  2011.  Silhouette-based gesture and action recognition via modeling trajectories on Riemannian shape manifolds. Computer Vision and Image Understanding. 115(3):439-455.
Mundada Y, Ramachandran A, Feamster N.  2011.  SilverLine: Data and Network Isolation for Cloud Services. 2nd USENIX Workshop on Hot Topics in Cloud Computing.

Pages