Publications
2017. Deep-learning-assisted visualization for live-cell images. IEEE International Conference on Image Processing.
2012. You'Re Capped: Understanding the Effects of Bandwidth Caps on Broadband Use in the Home. SIGCHI '12. :3021-3030.
1998. Wrapper generation for Web accessible data sources. 3rd IFCIS International Conference on Cooperative Information Systems, 1998. Proceedings. :14-23.
2010. Workshop on experimental evaluation of software and systems in computer science (Evaluate 2010). Proceedings of the ACM international conference companion on Object oriented programming systems languages and applications companion. :291-292.
1992. Wordnet and distributional analysis: A class-based approach to lexical discovery. AAAI workshop on statistically-based natural language processing techniques. :56-64.
2004. Word Level Script Identification on Scanned Document Images. SPIEConference on Document Recognition and Retrieval. :124-135.
2004. Window-based, discontinuity preserving stereo. Computer Vision and Pattern Recognition, 2004. CVPR 2004. Proceedings of the 2004 IEEE Computer Society Conference on. 1:I-66-I-73Vol.1-I-66-I-73Vol.1.
2006. Will pyramids built of nuggets topple over? Proceedings of the main conference on Human Language Technology Conference of the North American Chapter of the Association of Computational Linguistics. :383-390.
2011. Wide-baseline stereo for face recognition with large pose variation. Computer Vision and Pattern Recognition (CVPR), 2011 IEEE Conference on. :537-544.
2011. Wide-area routing dynamics of malicious networks. Proceedings of the ACM SIGCOMM 2011 conference. :432-433.
2010. Wide-area route control for distributed services. Proceedings of the 2010 USENIX conference on USENIX annual technical conference. :2-2.
2002. Wide baseline image registration using prior information. Multimedia Signal Processing, 2002 IEEE Workshop on. :37-40.
2009. Why Do Upgrades Fail and What Can We Do About It?: Toward Dependable, Online Upgrades in Enterprise System Middleware'09 Proceedings of the 10th ACM/IFIP/USENIX International Conference on Middleware. :18:1-18:20.
2010. Who's Hogging the Bandwidth: The Consequences of Revealing the Invisible in the Home. SIGCHI '10. :659-668.
2008. Who killed the directed model? Computer Vision and Pattern Recognition, IEEE Computer Society Conference on. :1-8.
2003. Which comes first, usability or utility? Proceedings of the 14th IEEE Visualization 2003 (VIS'03). :112–-112–.
1996. Where is information visualization technology going? Proceedings of the 9th annual ACM symposium on User interface software and technology. :75-77.
1998. When Two Hands Are Better Than One: Enhancing Collaboration Using Single Display Groupware. CHI’98. Extended Abstracts. :287-288.
1990. When is `partial' adequate? A logic-based proof technique using partial specifications Logic in Computer Science, 1990. LICS '90, Proceedings., Fifth Annual IEEE Symposium on e. :440-449.
2012. When Does Simulated Data Match Real Data? Comparing Model Calibration Functions using Genetic Algorithms World Congress on Social Simulation (WCSS), Taipei, Taiwan.
2011. When does simulated data match real data? Proceedings of the 13th annual conference companion on Genetic and evolutionary computation. :231-232.