Publications

Export 7148 results:
[ Author(Desc)] Title Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
W
Wong PC, Chen C, Görg C, Shneiderman B, Stasko J, Thomas J.  2011.  Tutorial-Graph Analytics — Lessons Learned and Challenges Ahead. IEEE Computer Graphics and Applications. 31(5):18-18.
Wong P C, Chen C, Gorg C, Shneiderman B, Stasko J, Thomas J.  2011.  Graph Analytics-Lessons Learned and Challenges Ahead. IEEE Computer Graphics and Applications. 31(5):18-29.
Wong HS, Wu M, Joyce RA, Guan L, Kung SY.  2000.  A Neural Network Approach for Predicting Network Resource Requirements in Video Transmission Systems. Proc. IEEE Pacific RIM Conference on Multimedia, Sydney, Australia.
Wong EW, Tse TH, Glass RL, Basili VR, Chen TY.  2011.  An assessment of systems and software engineering scholars and institutions (2003–2007 and 2004–2008). Journal of Systems and Software. 84(1):162-168.
Wong EW, Tse TH, Glass RL, Basili VR, Chen TY.  2009.  An assessment of systems and software engineering scholars and institutions (2002–2006). Journal of Systems and Software. 82(8):1370-1373.
Wongsuphasawat K, Plaisant C, Shneiderman B.  2009.  Querying timestamped event sequences by exact search or similarity-based search: design and empirical evaluation. HCIL-2009-20
Wongsuphasawat K, Shneiderman B.  2009.  Finding comparable temporal categorical records: A similarity measure with an interactive visualization. IEEE Symposium on Visual Analytics Science and Technology, 2009. VAST 2009. :27-34.
Wongsuphasawat K, Guerra Gómez J A, Plaisant C, Wang T D, Taieb-Maimon M, Shneiderman B.  2011.  LifeFlow: visualizing an overview of event sequences. Proceedings of the 2011 annual conference on Human factors in computing systems. :1747-1756.
Wongsuphasawat K, Guerra Gómez J A, Plaisant C, Wang T, Taieb-Maimon M, Shneiderman B.  2011.  LifeFlow: visualizing an overview of event sequences (video preview). Proceedings of the 2011 annual conference extended abstracts on Human factors in computing systems. :507-510.
Wongsuphasawat K, Plaisant C, Taieb-Maimon M, Shneiderman B.  2012.  Querying event sequences by exact match or similarity search: Design and empirical evaluation. Interacting with Computers. 24(2):55-68.
Wonnacott WPD.  1994.  Experiences with Constraint-based Array Dependence Analysis. Principles and practice of constraint programming: second international workshop, PPCP'94, Rosario, Orcas Island, WA, USA, May 2-4, 1994: proceedings. :312-312.
Woods W, Uckun S, Kohane I, Bates J, Hulthage I, Gasser L, Hanks S, Gini M, Ram A, desJardins M et al..  1994.  AAAI 1994 Spring Symposium Series Reports. AI Magazine. 15(3):22-22.
Woodson SA, Mount SM.  1999.  The RNA World.
Wu M, Martin, M.P.  2006.  Analysis of Shock Motion in a Compression Ramp Configuration using DNS data. Bulletin of the American Physical Society.
M. Wu, Fridrich J, Goljan M, Gou H.  2005.  Handling uneven embedding capacity in binary images: a revisit. Proceedings of SPIE. 5681(1):194-205.
Wu D, Parsia B, Sirin E, Hendler J, Nau DS.  2003.  Automating DAML-S Web Services Composition Using SHOP2. The Semantic Web - ISWC 2003. 2870:195-210.
M. Wu, Mao Y, Swaminathan A.  2007.  A Signal Processing and Randomization Perspective of Robust and Secure Image Hashing. Statistical Signal Processing, 2007. SSP '07. IEEE/SP 14th Workshop on. :166-170.
Wu M, Yu H, Gelman A.  1999.  Multi-level data hiding for digital image and video. SPIE Photonics East’99.
Wu S, Gong L, Rand W, Raschid L.  2012.  Making Recommendations in a Microblog to Improve the Impact of a Focal User. 6th ACM Conference on Recommender Systems (RecSys).
M. Wu, Tang E, Lin B.  2000.  Data hiding in digital binary image. Multimedia and Expo, 2000. ICME 2000. 2000 IEEE International Conference on. 1:393-396vol.1-393-396vol.1.
M. Wu, Liu B.  1998.  Watermarking for image authentication. Image Processing, 1998. ICIP 98. Proceedings. 1998 International Conference on. 2:437-441vol.2-437-441vol.2.
Wu M.  2003.  Joint security and robustness enhancement for quantization based data embedding. Circuits and Systems for Video Technology, IEEE Transactions on. 13(8):831-841.
M. Wu, Craver S, Felten EW, Liu B.  2001.  Analysis of attacks on SDMI audio watermarks. Acoustics, Speech, and Signal Processing, 2001. Proceedings. (ICASSP '01). 2001 IEEE International Conference on. 3:1369-1372vol.3-1369-1372vol.3.
Wu M, Taylor EM, Martin, M.P.  2005.  Assessment of STBLI DNS data and comparison against experiments. AIAA paper.
M. Wu, Liu B.  2004.  Data hiding in binary image for authentication and annotation. Multimedia, IEEE Transactions on. 6(4):528-538.

Pages