Publications

Export 7151 results:
Author Title [ Type(Asc)] Year
Conference Papers
Donn K, Plaisant C, Shneiderman B.  1996.  Query previews in networked information systems. Proceedings of the Third Forum on Research and Technology Advances in Digital Libraries, 1996. ADL '96. :120-129.
Zhang K, Andrade H, Raschid L, Sussman A.  2005.  Query planning for the grid: adapting to dynamic resource availability. Cluster Computing and the Grid, IEEE International Symposium on. 2:751-758.
Parameswaran V, Chellappa R.  2002.  Quasi-invariants for human action representation and recognition. Pattern Recognition, 2002. Proceedings. 16th International Conference on. 1:307-310vol.1-307-310vol.1.
Ramasamy HV, Pandey P, Lyons J, Cukier M, Sanders WH.  2002.  Quantifying the cost of providing intrusion tolerance in group communication systems. :229-238.
Shulman D, Fermüller C.  1996.  Qualitative depth and FOE information via smoothed flow. Proceedings of the 20th workshop of the Austrian Association for Pattern Recognition (OAGM/AAPR) on Pattern recognition 1996. :207-213.
Hung E, Getoor L, V.S. Subrahmanian.  2003.  PXML: a probabilistic semistructured data model and algebra. Data Engineering, 2003. Proceedings. 19th International Conference on. :467-478.
Jimmy Lin, Madnani N, Dorr BJ.  2010.  Putting the user in the loop: interactive Maximal Marginal Relevance for query-focused summarization. Human Language Technologies: The 2010 Annual Conference of the North American Chapter of the Association for Computational Linguistics. :305-308.
Shneiderman B.  1981.  Putting the human factor into systems development. Proceedings of the eighteenth annual computer personnel research conference. :1-13.
Boyd-Graber J, Blei D.  2007.  PUTOP: turning predominant senses into a topic model for word sense disambiguation. Proceedings of the 4th International Workshop on Semantic Evaluations. :277-281.
Aloimonos Y.  1990.  Purposive and qualitative active vision. Proceedings of 10th International Conference on Pattern Recognition, 1990. i:346-360vol.1-346-360vol.1.
Weiss K, De Floriani L, Fellegara R, Velloso M.  2011.  The PR-star octree: a spatio-topological data structure for tetrahedral meshes. Proceedings of the 19th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems. :92-101.
Jajodia S, Kudo M, V.S. Subrahmanian.  2001.  Provisional authorizations. E-commerce Security and Privacy. 2:133-159.
Dumitras T, Efstathopoulos P..  2012.  The Provenance of WINE. Dependable Computing Conference (EDCC), 2012 Ninth European. :126-131.
Mendonça Neto MG, Seaman C, Basili VR, Kim YM.  2001.  A prototype experience management system for a software consulting organization. Thirteenth International Conference on Software Engineering and Knowledge Engineering. :29-36.
Sabnis C, Cukier M, Ren J, Rubel P, Sanders WH, Bakken DE, Karr D.  1999.  Proteus: a flexible infrastructure to implement adaptive fault tolerance in AQuA. :149-168.
Minker J, Perlis D.  1984.  Protected circumscription. Proc. Workshop on Non-Monotonic Reasoning. :337-343.
Reggia JA.  1987.  Properties of a competition-based activation mechanism in neuromimetic network models. Proceedings of the First International Conference on Neural Networks.
Shneiderman B, Churchill E, Fischer G, Goldberg K.  2009.  Promoting social creativity: a component of a national initiative for social participation. Proceedings of the seventh ACM conference on Creativity and cognition. :7-8.
Xu Y, Ji H, Fermüller C.  2006.  A Projective Invariant for Textures. 2006 IEEE Computer Society Conference on Computer Vision and Pattern Recognition. 2:1932-1939.
Marchionini G, Haas S, Shneiderman B, Plaisant C, Hert CA.  2004.  Project highlight: toward the statistical knowledge network. Proceedings of the 2004 annual national conference on Digital government research. :125:1–125:2-125:1–125:2.
Yeh RT, Mittermeir R, Roussopoulos N, Reed J.  1984.  A Programming Environment Framework Based on Reusability. Proceedings of the First International Conference on Data Engineering. :277-280.
Ramsbrock D, Berthier R, Cukier M.  2007.  Profiling Attacker Behavior Following SSH Compromises. :119-124.
Kang H-J, Doermann D.  2004.  Product approximation by minimizing the upper bound of Bayes error rate for Bayesian combination of classifiers. Pattern Recognition, 2004. ICPR 2004. Proceedings of the 17th International Conference on. 1:252-255Vol.1-252-255Vol.1.
Doermann D, Rosenfeld A.  1993.  The processing of form documents. Document Analysis and Recognition, 1993., Proceedings of the Second International Conference on. :497-501.
Rand W, Riolo R.  2005.  The problem with a self-adaptative mutation rate in some environments: a case study using the shaky ladder hyperplane-defined functions. Proceedings of the 2005 conference on Genetic and evolutionary computation. :1493-1500.

Pages