Publications

Export 7151 results:
Author Title [ Type(Asc)] Year
Journal Articles
Brabec F, Samet H.  2007.  Client-Based Spatial Browsing on the World Wide Web. IEEE Internet Computing. 11(1):52-59.
Wang J, Oard D.  2007.  CLEF-2006 CL-SR at Maryland: English and Czech. Evaluation of Multilingual and Multi-modal Information Retrieval. :786-793.
Wang J, Oard D.  2006.  Clef-2005 cl-sr at maryland: Document and query expansion using side collections and thesauri. Accessing Multilingual Information Repositories. :800-809.
Oard D, Levow GA, Cabezas C.  2001.  CLEF experiments at Maryland: Statistical stemming and backoff translation. Cross-Language Information Retrieval and Evaluation. :176-187.
Perer A, Shneiderman B, Oard D.  2006.  Classifying science: Phenomena, data, theory, method, practice: Book Reviews. J. Am. Soc. Inf. Sci. Technol.. 57(14):1977-1978.
Chen M, Zheng Y, M. Wu.  2006.  Classification-based spatial error concealment for visual communications. EURASIP J. Appl. Signal Process.. 2006:257-257.
Jacobs DW, Weinshall D, Gdalyahu Y.  2000.  Classification with nonmetric distances: image retrieval and class representation. Pattern Analysis and Machine Intelligence, IEEE Transactions on. 22(6):583-600.
O'Leary TJ, O'Leary DP, Habbersett MC, Herman CJ.  1981.  Classification of Gynecologic Flow Cytometry Data: A Comparison of Methods. Journal of Analytical and Quantitative Cytology. 3:135-142.
Zhuolin Jiang, Li SF, Jia XP, Zhu HL.  2009.  Classic triangular mesh subdivision algorithm. Jisuanji Gongcheng/ Computer Engineering. 35(6):7-10.
Mundur P, Sood AK, Simon R.  2005.  Class-based access control for distributed video-on-demand systems. IEEE Transactions on Circuits and Systems for Video Technology. 15(7):844-853.
Jacobs DW, Weinshall D, Gdalyahu Y.  2000.  Class representation and image retrieval with non-metric distances. IEEE Transactions on Pattern Analysis and Machine Intelligence (TPAMI). 22(583-600):1-1.
Zhuolin Jiang, Lin Z, Davis LS.  2012.  Class consistent k-means: Application to face and action recognition. Computer Vision and Image Understanding. 116(6):730-741.
Shneiderman B, Byrd D, Croft WB.  1997.  Clarifying search: A user-interface framework for text searches. D-lib magazine. 3(1):18-20.
Shneiderman B.  2011.  Claiming success, charting the future: micro-HCI and macro-HCI. Interactions. 18(5):10-11.
Shneiderman B.  2009.  Civic Collaboration. ScienceScience. 325(5940):540-540.
Perlis D.  1987.  Circumscribing with sets. Artificial Intelligence. 31(2):201-211.
Moore JT, Hicks MW, Nettles S.  1999.  Chunks in PLAN: Language support for programs as packets. PROCEEDINGS OF THE ANNUAL ALLERTON CONFERENCE ON COMMUNICATION CONTROL AND COMPUTING. 37:PROCEEDINGSOFTHEANNUALALLERTONCONFERENCEONCOMMUNICATIONCONTROLANDCOMPUTING-PROCEEDINGSOFTHEANNUALALLERTONCONFER.
Conroy JM, Kolda TG, O'Leary DP, O'Leary TJ.  2000.  Chromosome Identification Using Hidden Markov Models: Comparison with Neural Networks, Singular Value Decomposition, Principal Components Analysis, and Fisher Discriminant Analysis. Laboratory Investigation. 80(11):1629-1641.
Mount D, Netanyahu NS, Silverman R, Wu AY.  2000.  Chromatic nearest neighbor searching: A query sensitive approach. Computational Geometry. 17(3–4):97-119.
Aloimonos Y, Fermüller C.  2005.  Chromatic Induction and Perspective Distortion. Journal of VisionJ Vis. 5(8):1026-1026.
Dodis Y, Katz J.  2005.  Chosen-ciphertext security of multiple encryption. Theory of Cryptography. :188-209.
Canetti R, Halevi S, Katz J.  2004.  Chosen-ciphertext security from identity-based encryption. Advances in Cryptology-Eurocrypt 2004. :207-222.
Boneh D, Canetti R, Halevi S, Katz J.  2007.  Chosen-ciphertext security from identity-based encryption. SIAM Journal on Computing. 36(5):1301-1328.
Katz J, Schneier B.  2000.  A chosen ciphertext attack against several e-mail encryption protocols. Ninth USENIX Security Symposium.
Colwell RR.  2005.  Cholera: the killer from the deep. The Biochemist.

Pages