Publications

Export 7151 results:
Author Title Type [ Year(Desc)]
2009
Song S, JaJa JF.  2009.  Search and Access Strategies for Web Archives. Proceedings of IS&T Archiving 2009.
Tom Yeh, Katz B.  2009.  Searching documentation using text, OCR, and image. Proceedings of the 32nd international ACM SIGIR conference on Research and development in information retrieval. :776-777.
Langmead B, Schatz MC, Jimmy Lin, Pop M, Salzberg SL.  2009.  Searching for SNPs with cloud computing. Genome Biology. 10(11):R134-R134.
Dumitras T, Neamtiu I, Tilevich E.  2009.  Second ACM Workshop on Hot Topics in Software Upgrades (HotSWUp 2009). :705-706.
Lu W, Varna AL, Swaminathan A, M. Wu.  2009.  Secure image retrieval through feature protection. Acoustics, Speech and Signal Processing, 2009. ICASSP 2009. IEEE International Conference on. :1533-1536.
Yacoob Y, Davis LS.  2009.  Segmentation using appearance of mesostructure roughness. International journal of computer vision. 83(3):248-273.
Gong J, Oard D.  2009.  Selecting hierarchical clustering cut points for web person-name disambiguation. Proceedings of the 32nd international ACM SIGIR conference on Research and development in information retrieval. :778-779.
Baker K, Bethard S, Bloodgood M, Brown R, Callison-Burch C, Coppersmith G, Dorr BJ, Filardo W, Giles K, Irvine A et al..  2009.  Semantically informed machine translation (SIMT). SCALE summer workshop final report, Human Language Technology Center Of Excellence.
Papaleo L, De Floriani L.  2009.  Semantic-based segmentation and annotation of 3d models. Image Analysis and Processing–ICIAP 2009. :103-112.
Stewart G.W.  2009.  On the Semidefinite B-Arnoldi Method. SIAM Journal on Matrix Analysis and Applications. 31(3):1458-1468.
Daumé H.  2009.  Semi-supervised or semi-unsupervised? Proceedings of the NAACL HLT Workshop on Semisupervised Learning for Natural Language Processing. :84-85.
Froehlich J, Neumann J, Oliver N.  2009.  Sensing and predicting the pulse of the city through shared bicycling. International Joint Conference on Artificial Intelligence. :1420-1426.
Froehlich J, Everitt K, Fogarty J, Patel S, Landay J.  2009.  Sensing opportunities for personalized feedback technology to reduce consumption. Proc. CHI Workshop on Defining the Role of HCI in the Challenge of Sustainability.
Aloimonos Y.  2009.  Sensory grammars for sensor networks. Journal of Ambient Intelligence and Smart Environments. 1(1):15-21.
Alam M, Chowdhury WB, Bhuiyan NA, Islam A, Hasan NA, Nair BG, Watanabe H, Siddique AK, Huq A, Sack BR et al..  2009.  Serogroup, Virulence, and Genetic Traits of Vibrio Parahaemolyticus in the Estuarine Ecosystem of Bangladesh. Applied and Environmental MicrobiologyAppl. Environ. Microbiol.. 75(19):6268-6274.
De Floriani L, Panozzo D, Hui A.  2009.  A set of tools for Representing, Decomposing and Visualizing non manifold Cellular Complexes. DISI-TR-09-06
Eaton E, desJardins M.  2009.  Set-Based Boosting for Instance-Level Transfer. Data Mining Workshops, 2009. ICDMW '09. IEEE International Conference on. :422-428.
Gregory MB, Shneiderman B.  2009.  Shape Identification in Temporal Data Sets.
Ling H, Jacobs DW.  2009.  Shape Matching for Foliage Database Retrieval. Semantic Mining Technologies for Multimedia DatabasesSemantic Mining Technologies for Multimedia Databases. :100-100.
Patel VM, Easley GR, Healy DM.  2009.  Shearlet-Based Deconvolution. IEEE Transactions on Image Processing. 18(12):2673-2685.
Zhu G, Zheng Y, Doermann D, Jaeger S.  2009.  Signature Detection and Matching for Document Image Retrieval. IEEETransactions on Pattern Analysis and Machine Intelligence. 31(11):2015-2031.
Katz J, Vaikuntanathan V.  2009.  Signature schemes with bounded leakage resilience. Advances in Cryptology–ASIACRYPT 2009. :703-720.
Boneh D, Freeman D, Katz J, Waters B.  2009.  Signing a linear subspace: Signature schemes for network coding. Public Key Cryptography–PKC 2009. :68-87.
Tom Yeh, Chang T-H, Miller RC.  2009.  Sikuli: using GUI screenshots for search and automation. Proceedings of the 22nd annual ACM symposium on User interface software and technology. :183-192.
Choi SGeol, Dachman-Soled D, Malkin T, Wee H.  2009.  Simple, Black-Box Constructions of Adaptively Secure Protocols. Theory of Cryptography. :387-402.

Pages