Publications

Export 7148 results:
[ Author(Desc)] Title Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
W
Wong EW, Tse TH, Glass RL, Basili VR, Chen TY.  2009.  An assessment of systems and software engineering scholars and institutions (2002–2006). Journal of Systems and Software. 82(8):1370-1373.
Wong PC, Chen C, Görg C, Shneiderman B, Stasko J, Thomas J.  2011.  Tutorial-Graph Analytics — Lessons Learned and Challenges Ahead. IEEE Computer Graphics and Applications. 31(5):18-18.
Wong EW, Tse TH, Glass RL, Basili VR, Chen TY.  2008.  An assessment of systems and software engineering scholars and institutions (2001–2005). Journal of Systems and Software. 81(6):1059-1062.
Wong HS, Wu M, Joyce RA, Guan L, Kung SY.  2000.  A Neural Network Approach for Predicting Network Resource Requirements in Video Transmission Systems. Proc. IEEE Pacific RIM Conference on Multimedia, Sydney, Australia.
Wong EW, Tse TH, Glass RL, Basili VR, Chen TY.  2011.  An assessment of systems and software engineering scholars and institutions (2003–2007 and 2004–2008). Journal of Systems and Software. 84(1):162-168.
Wongsuphasawat K, Shneiderman B.  2009.  Finding comparable temporal categorical records: A similarity measure with an interactive visualization. IEEE Symposium on Visual Analytics Science and Technology, 2009. VAST 2009. :27-34.
Wongsuphasawat K, Plaisant C, Shneiderman B.  2009.  Querying timestamped event sequences by exact search or similarity-based search: design and empirical evaluation. HCIL-2009-20
Wongsuphasawat K, Guerra Gómez J A, Plaisant C, Wang T D, Taieb-Maimon M, Shneiderman B.  2011.  LifeFlow: visualizing an overview of event sequences. Proceedings of the 2011 annual conference on Human factors in computing systems. :1747-1756.
Wongsuphasawat K, Guerra Gómez J A, Plaisant C, Wang T, Taieb-Maimon M, Shneiderman B.  2011.  LifeFlow: visualizing an overview of event sequences (video preview). Proceedings of the 2011 annual conference extended abstracts on Human factors in computing systems. :507-510.
Wongsuphasawat K, Plaisant C, Taieb-Maimon M, Shneiderman B.  2012.  Querying event sequences by exact match or similarity search: Design and empirical evaluation. Interacting with Computers. 24(2):55-68.
Wonnacott WPD.  1994.  Experiences with Constraint-based Array Dependence Analysis. Principles and practice of constraint programming: second international workshop, PPCP'94, Rosario, Orcas Island, WA, USA, May 2-4, 1994: proceedings. :312-312.
Woods W, Uckun S, Kohane I, Bates J, Hulthage I, Gasser L, Hanks S, Gini M, Ram A, desJardins M et al..  1994.  AAAI 1994 Spring Symposium Series Reports. AI Magazine. 15(3):22-22.
Woodson SA, Mount SM.  1999.  The RNA World.
Wu M, Liu B.  2001.  Modulation and multiplexing techniques for multimedia data hiding. Proc. of SPIE ITcom’01, SPIE vol. 4518
Wu H-H, Shen C-C, Bhattacharyya SS, Compton K, Schulte M, Wolf M, Zhang T.  2010.  Design and implementation of real-time signal processing applications on heterogeneous multiprocessor arrays. 2010 Conference Record of the Forty Fourth Asilomar Conference on Signals, Systems and Computers (ASILOMAR). :2121-2125.
Wu H-H, Kee H, Sane N, Plishker W, Bhattacharyya SS.  2010.  Rapid prototyping for digital signal processing systems using Parameterized Synchronous Dataflow graphs. 2010 21st IEEE International Symposium on Rapid System Prototyping (RSP). :1-7.
M. Wu, Yu H H.  2000.  Video access control via multi-level data hiding. Multimedia and Expo, 2000. ICME 2000. 2000 IEEE International Conference on. 1:381-384vol.1-381-384vol.1.
M. Wu, Yu H H.  2003.  Human visual model for data hiding. : 09/691,544(6611608)
Wu M.  2004.  Distortion compensated lookup-table embedding: Joint security and robustness enhancement for quantization based data hiding. Electronic Imaging Symposium: Security, Steganography, and Watermarking of Multimedia Contents VI, San Jose, CA, Proc. of SPIE. 5306:610-621.
Wu M, Trappe W, Wang ZJ, Liu KJR.  2004.  Collusion resistant multimedia fingerprinting: A unified framework. Electronic Imaging Symposium: Security, Steganography, and Watermarking of Multimedia Contents VI, San Jose, CA, Proc. of SPIE. 5306:748-759.
M. Wu, Mui L, Mohtashemi M, Szolovits P.  2001.  Secure Health Information Sharing System: SHARE. Proceedings of the AMIA SymposiumProc AMIA Symp. :1060-1060.
Wu H, Sankaranarayanan AC, Chellappa R.  2007.  In Situ Evaluation of Tracking Algorithms Using Time Reversed Chains. Computer Vision and Pattern Recognition, 2007. CVPR '07. IEEE Conference on. :1-8.
M. Wu, Wolf W, Liu B.  1998.  An algorithm for wipe detection. Image Processing, 1998. ICIP 98. Proceedings. 1998 International Conference on. 1:893-897vol.1-893-897vol.1.
Wu M.  2007.  Signal Processing Magazine E-Newsletter: Inside Out [From the Editor]. Signal Processing Magazine, IEEE. 24(6):2-8.
M. Wu, Yu H, Liu B.  2003.  Data hiding in image and video .II. Designs and applications. Image Processing, IEEE Transactions on. 12(6):696-705.

Pages