Publications

Export 1254 results:
Author Title Type [ Year(Asc)]
Filters: First Letter Of Last Name is G  [Clear All Filters]
2009
Priyadarshi AK, Gupta SK.  2009.  Algorithms for generating multi-stage molding plans for articulated assemblies. Robotics and Computer-Integrated Manufacturing. 25(1):91-106.
Smith MA, Shneiderman B, Milic-Frayling N, Mendes Rodrigues E, Barash V, Dunne C, Capone T, Perer A, Gleave E.  2009.  Analyzing (social media) networks with NodeXL. Proceedings of the fourth international conference on Communities and technologies. :255-264.
Sayeed A, Elsayed T, Garera N, Alexander D, Xu T, Oard D, Yarowsky D, Piatko C.  2009.  Arabic Cross-Document Coreference Resolution. Proceedings of the ACL-IJCNLP 2009 Conference Short Papers$}$. :357-360.
Wong EW, Tse TH, Glass RL, Basili VR, Chen TY.  2009.  An assessment of systems and software engineering scholars and institutions (2002–2006). Journal of Systems and Software. 82(8):1370-1373.
Albrecht M, Gentry C, Halevi S, Katz J.  2009.  Attacking cryptographic schemes based on "perturbation polynomials". Proceedings of the 16th ACM conference on Computer and communications security. :1-10.
Sen P, Deshpande A, Getoor L.  2009.  Bisimulation-based approximate lifted inference. Proceedings of the Twenty-Fifth Conference on Uncertainty in Artificial Intelligence. :496-505.
Gumerov NA, Duraiswami R.  2009.  A broadband fast multipole accelerated boundary element method for the three dimensional Helmholtz equation. The Journal of the Acoustical Society of America. 125(1):191-205.
Doppa JR, Yu J, Tadepalli P, Getoor L.  2009.  Chance-constrained programs for link prediction. Proceedings of Workshop on Analyzing Networks and Learning with Graphs at NIPS Conference.
Ananthanarayanan A, Gupta SK, Bruck HA.  2009.  Characterization and control of pin diameter during in-mold assembly of mesoscale revolute joints. North American Manufacturing Research Institute. 37
Zheleva E, Sharara H, Getoor L.  2009.  Co-evolution of social and affiliation networks. Proceedings of the 15th ACM SIGKDD international conference on Knowledge discovery and data mining. :1007-1016.
Namata G, Sen P, Bilgic M, Getoor L.  2009.  Collective classification for text classification. Text Mining: Classification, Clustering, and ApplicationsText Mining: Classification, Clustering, and Applications. :51-69.
Bhattacharya I, Getoor L.  2009.  Collective relational clustering. Constrained Clustering: Advances in Algorithms, Theory, and ApplicationsConstrained Clustering: Advances in Algorithms, Theory, and Applications. :221-244.
Polymeropoulos MH, Licamele L, Volpi S, Mack K, Mitkus SN, Carstea ED, Getoor L, Thompson A, Lavedan C.  2009.  Common effect of antipsychotics on the biosynthesis and regulation of fatty acids and cholesterol supports a key role of lipid homeostasis in schizophrenia. Schizophrenia Research. 108(1–3):134-142.
Chun J, Grim CJ, Hasan NA, Lee JH, Choi SY, Haley BJ, Taviani E, Jeon YS, Kim DW, Lee JH et al..  2009.  Comparative genomics reveals mechanism for short-term and long-term clonal transitions in pandemic Vibrio cholerae. Proceedings of the National Academy of Sciences. 106(36):15442-15447.
Gordon S, Katz J.  2009.  Complete fairness in multi-party computation without an honest majority. Theory of Cryptography. :19-35.
Seydou F, Duraiswami R, Seppänen T, Gumerov NA.  2009.  Computation of singular and hypersingular boundary integrals by Green identity and application to boundary value problems. Engineering Analysis with Boundary Elements. 33(8–9):1124-1131.
Gumerov NA, O'donovan A, Duraiswami R, Zotkin DN.  2009.  Computation of the head-related transfer function via the boundary element method and representation via the spherical harmonic spectrum. Technical Reports from UMIACS UMIACS-TR-2009-06.
Poole EShehan, Chetty M, Morgan T, Grinter RE, W. Edwards K.  2009.  Computer Help at Home: Methods and Motivations for Informal Technical Support. SIGCHI '09. :739-748.
Chow R, Golle P, Jakobsson M, Elaine Shi, Staddon J, Masuoka R, Molina J.  2009.  Controlling data in the cloud: outsourcing computation without outsourcing control. :85-90.
Gopalakrishnan V, Bhattacharjee B, Ramakrishnan KK, Jana R, Srivastava D.  2009.  CPM: Adaptive Video-on-Demand with Cooperative Peer Assists and Multicast. INFOCOM 2009, IEEE. :91-99.
Mayfield J, Alexander D, Dorr BJ, Eisner J, Elsayed T, Finin T, Fink C, Freedman M, Garera N, McNamee P et al..  2009.  Cross-document coreference resolution: A key technology for learning by reading. AAAI Spring Symposium on Learning by Reading and Learning to Read.
Banerjee A G, Losert W, Gupta SK.  2009.  A Decoupled and Prioritized Stochastic Dynamic Programming Approach for Automated Transport of Multiple Particles Using Optical Tweezers. 6:785-796.
Hao S, Syed N A, Feamster N, Gray AG, Krasser S.  2009.  Detecting spammers with SNARE: spatio-temporal network-level automatic reputation engine. Proceedings of the 18th conference on USENIX security symposium. :101-118.
Grim CJ, Jaiani E, Whitehouse CA, Janelidze N, Kokashvili T, Tediashvili M, Colwell RR, Huq A.  2009.  Detection of toxigenic Vibrio cholerae O1 in freshwater lakes of the former Soviet Republic of Georgia. Environmental Microbiology Reports. 2(1):2-6.
Barash V, Smith M, Getoor L, Welser HT.  2009.  Distinguishing knowledge vs social capital in social media with roles and context. Proceedings of the ICWSM. 9

Pages