Publications

Export 7151 results:
Author [ Title(Desc)] Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
E
Arlat DPMCJ, Crouzet Y.  1996.  Estimation of time-dependent coverage. 96466
Marchionini G, Hert C, Shneiderman B, Liddy L.  2001.  E-tables: Non-specialist use and understanding of statistical data. SURFACE, the Syracuse University Research Facility And Collaborative Environment. :33-33.
Fang H-ren, O'Leary DP.  2011.  Euclidean distance matrix completion problems. Optimization Methods and Software. :1-23.
Arya S, Das G, Mount D, Salowe JS, Smid M.  1995.  Euclidean spanners: short, thin, and lanky. Proceedings of the twenty-seventh annual ACM symposium on Theory of computing. :489-498.
Hannenhalli S.  2008.  Eukaryotic Transcription Factor Binding Sites—modeling and Integrative Search Methods. BioinformaticsBioinformatics. 24(11):1325-1331.
Hannenhalli S.  2007.  Eukaryotic Transcriptional Regulation: Signals, Interactions, and Modules. Computational genomics: current methods. :21-21.
Komlodi A, Hou W, Preece J, Druin A, Golub E, Alburo J, Liao S, Elkiss A, Resnik P.  2007.  Evaluating a cross-cultural children’s online book community: Lessons learned for sociability, usability, and cultural exchange. Interacting with Computers. 19(4):494-511.
Hovemeyer D, Spacco J, Pugh W.  2005.  Evaluating and tuning a static analysis to find null pointer bugs. Proceedings of the 6th ACM SIGPLAN-SIGSOFT workshop on Program analysis for software tools and engineering. :13-19.
Oard D, Gey FC, Dorr BJ.  2002.  Evaluating Arabic Retrieval from English or French Queries: The TREC-2001 Cross-Language Information Retrieval Track. Proceedings of the Post Workshop of LREC.
Molina J, Cukier M.  2009.  Evaluating Attack Resiliency for Host Intrusion Detection Systems. Journal of Information Assurance and Security. 4(1):001-009.
Chang S, Van Horn D, Felleisen M.  2010.  Evaluating Call-By-Need on the Control Stack. arXiv:1009.3174 [cs].
Hayden C, Smith E, Hardisty E, Hicks MW, Foster JS.  2011.  Evaluating Dynamic Software Update Safety Using Systematic Testing. IEEE Transactions on Software Engineering. PP(99):1-1.
Kules B, Shneiderman B.  2008.  Evaluating Exploratory Search Systems. Information processing & management. 44(2):463-484.
Molina J, Cukier M.  2009.  Evaluating Files to Audit for Detecting Intrusions in FileSystem Data. :163-170.
Ehrlich K, Microsytems S, Marchionini G, Nielsen J, Shneiderman B.  1990.  EVALUATING HYPERMEDIA SYSTEMS. Human factors in computing systems: CHI'90 Conference proceedings, April 1-5, Seattle. :387-387.
Shneiderman B.  1977.  Evaluating introductory programming textbooks: A guide for students, instructors, authors and publishers. SIGCSE '77 Proceedings of the eighth SIGCSE technical symposium on Computer science education. 9:56-58.
Resnik P.  1997.  Evaluating multilingual gisting of Web pages. SS-97-02
Shneiderman B, GRANTHAM C, Norman K, ROGERS J, Roussopoulos N.  1983.  Evaluating multiple coordinated windows for programming workstations. NASA. Goddard Space Flight Center Proc. of the Eighth Ann. Software Eng. Workshop 11 p(SEE N 84-23137 13-61).
Naishlos D, Nuzman J, Tseng CW, Vishkin U.  2000.  Evaluating multi-threading in the prototype XMT environment. Proc. 4th Workshop on Multi-Threaded Execution, Architecture and Compliation (MTEAC2000).
Elaine Shi.  2008.  Evaluating predicates over encrypted data.
Nau DS, Zhang G, Gupta SK, Karinthi RR.  1993.  Evaluating product machinability for concurrent engineering. Concurrent Engineering: Contemporary Issues and Modern Design Tools. :264-279.
Nguyen T, Hu Y, Boyd-Graber J.  Submitted.  Evaluating Regularized Anchor Words. mimno.infosci.cornell.edu.
Dorr BJ, Oard D.  1998.  Evaluating Resources for Query Translation in Cross-Language Information Retrieval. In Proceedings of the First International Conference on Language Resources and Evaluation. :759-763.
Shneiderman B, Chimera R, Jog N, Stimart R, White D.  1995.  Evaluating Spatial and Textual Style of Displays. Institute for Systems Research Technical Reports.
Jimmy Lin, Demner-Fushman D.  2005.  Evaluating Summaries and Answers: Two Sides of the Same Coin? Intrinsic and Extrinsic Evaluation Measures for Machine Translation and/or Summarization. :41-41.

Pages