Publications

Export 7151 results:
Author Title Type [ Year(Desc)]
2008
Guven T, La RJ, Shayman MA, Bhattacharjee B.  2008.  A Unified Framework for Multipath Routing for Unicast and Multicast Traffic. Networking, IEEE/ACM Transactions on. 16(5):1038-1051.
Goyal V, Katz J.  2008.  Universally composable multi-party computation with an unreliable common reference string. Theory of Cryptography. :142-154.
Oard D.  2008.  Unlocking the Potential of the Spoken Word. Science. 321(5897):1787-1788.
Martin, M.P, Priebe S, Wu M.  2008.  Upstream and downstream in unsteadiness of STBLI using DNS data in two con gurations. 46th AIAA Aerospace Sciences Meeting.
Martin, M.P, Priebe S, Wu M.  2008.  Upstream and downstream influence on the unsteadiness of STBLI using DNS data in two configurations. AIAA Paper 2008-0719, 46, h.
Chrun D, Cukier M, Sneeringer G.  2008.  On the Use of Security Metrics Based on Intrusion Prevention System Event Data: An Empirical Analysis. :49-58.
Oard D, He D, Wang J.  2008.  User-assisted query translation for interactive cross-language information retrieval. Information Processing & Management. 44(1):181-211.
Kules B, Shneiderman B.  2008.  Users can change their web search tactics: Design guidelines for categorized overviews. Information Processing & Management. 44(2):463-484.
Xie Q, Memon AM.  2008.  Using a pilot study to derive a GUI model for automated testing. ACM Transactions on Software Engineering and Methodology (TOSEM). 18(2):7:1–7:35-7:1–7:35.
Osadchy M, Jacobs DW, Ramamoorthi R, Tucker D.  2008.  Using specularities in comparing 3D models and 2D images. Computer Vision and Image Understanding. 111(3):275-294.
Klasnja P, Harrison BL, LeGrand L, LaMarca A, Froehlich J, Hudson SE.  2008.  Using wearable sensors and real time inference to understand human recall of routine activities. Proceedings of the 10th international conference on Ubiquitous computing. :154-163.
Duan L, Martin, M.P.  2008.  Validation of a DNS code for wall-bounded turbulence including finite-rate reactions and surface catalysis. AIAA Paper 2008. 645
Sato T, Kameya Y, Kurihara K, De Raedt L, Dietterich T, Getoor L, Kersting K, Muggleton SH.  2008.  Variational Bayes via Propositionalization. Probabilistic, Logical and Relational Learning-A Further Synthesis.
Grinstein G, Plaisant C, Laskowski S, O'Connell T, Scholtz J, Whiting M.  2008.  VAST 2008 Challenge: Introducing mini-challenges. Visual Analytics Science and Technology, 2008. VAST '08. IEEE Symposium on. :195-196.
Liu X, Doermann D, Li H.  2008.  VCode - Pervasive Data Transfer Using Video Barcode. IEEETransactions on Multimedia. 10(3):361-371.
Swamy N, Hicks MW.  2008.  Verified enforcement of automaton-based information release policies. Proceedings of the 2008 Workshop on Programming Languages and Analysis for Security. ACM Press.
Mohapatra H, Mohapatra SS, Mantri CK, Colwell RR, Singh DV.  2008.  Vibrio cholerae non‐O1, non‐O139 strains isolated before 1992 from Varanasi, India are multiple drug resistant, contain intSXT, dfr18 and aadA5 genes. Environmental Microbiology. 10(4):866-873.
Ramachandran M, Veeraraghavan A, Chellappa R.  2008.  Video stabilization and mosaicing. The Essential Guide to Video Processing,. :109-138.
Fermüller C, Xu Y, Ji H.  2008.  A View-Point Invariant Texture Descriptor. Journal of VisionJ Vis. 8(6):354-354.
Frangiadakis N, Câmara D, Filali F, Loureiro AAF, Roussopoulos N.  2008.  Virtual access points for vehicular networks. Proceedings of the 1st international conference on MOBILe Wireless MiddleWARE, Operating Systems, and Applications. :14-14.
Chen C-houh, Härdle W, Unwin A, Jank W, Shmueli G, Plaisant C, Shneiderman B.  2008.  Visualizing Functional Data with an Application to eBay’s Online Auctions. Handbook of Data VisualizationHandbook of Data Visualization. :873-898.
Chung J, Nagy JG, O'Leary DP.  2008.  A Weighted GCV Method for Lanczos Hybrid Regularization. Electronic Transactions on Numerical Analysis. 28:149-167.
Kingsford C, Salzberg SL.  2008.  What are decision trees? Nature biotechnology. 26(9):1011-1011.
Katz J.  2008.  Which languages have 4-round zero-knowledge proofs? Theory of Cryptography. :73-88.
Domke J, Karapurkar A, Aloimonos Y.  2008.  Who killed the directed model? Computer Vision and Pattern Recognition, IEEE Computer Society Conference on. :1-8.

Pages