Book Chapters

Pages

Card SK, Mackinlay JD, Shneiderman B. Dynamic queries. In: Readings in information visualizationReadings in information visualization.; 1999. 2. p. 235.
Nixon MS, Tan T, Chellappa R. Early Recognition Approaches. In: Human Identification Based on GaitHuman Identification Based on Gait.; 2006. 3. p. 35-43p.
Dumitras T, Roşu D, Dan A, Narasimhan P. Ecotopia: An Ecological Framework for Change Management in Distributed Systems. In: de Lemos R, Gacek C, Romanovsky A, editors. Architecting Dependable Systems IV. Springer Berlin Heidelberg; 2007. 2. p. 262-286p. (Lecture Notes in Computer Science).
Shneiderman B, Kreitzberg C, Berk E. Editing to structure a reader's experience. In: Hypertext/hypermedia handbookHypertext/hypermedia handbook.; 1991. 1. p. 143-164p.
Shneiderman B. Education by engagement and construction: a strategic education initiative for a multimedia renewal of American education. In: Sociomedia: Hypermedia, Multimedia and the Social Creation of KnowledgeSociomedia: Hypermedia, Multimedia and the Social Creation of Knowledge.; 1992. 1. p. 13-26p.
Heitzmann A, Palazzi B, Papamanthou C, Tamassia R. Effective Visualization of File System Access-Control. In: Goodall JR, Conti G, Ma K-L, editors. Visualization for Computer Security. Springer Berlin Heidelberg; 2008. 1. p. 18-25p. (Lecture Notes in Computer Science).
Di Crescenzo G, Katz J, Ostrovsky R, Smith A. Efficient and Non-interactive Non-malleable Commitment. In: Pfitzmann B, editor. Advances in Cryptology — EUROCRYPT 2001Advances in Cryptology — EUROCRYPT 2001. Vol 2045. Springer Berlin / Heidelberg; 2001. 4. p. 40-59p. (Lecture Notes in Computer Science; vol 2045).
Canetti R, Dachman-Soled D, Vaikuntanathan V, Wee H. Efficient Password Authenticated Key Exchange via Oblivious Transfer. In: Fischlin M, Buchmann J, Manulis M, editors. Public Key Cryptography – PKC 2012. Springer Berlin Heidelberg; 2012. 4. p. 449-466p. (Lecture Notes in Computer Science).
Dachman-Soled D, Malkin T, Raykova M, Yung M. Efficient Robust Private Set Intersection. In: Abdalla M, Pointcheval D, Fouque P-A, Vergnaud D, editors. Applied Cryptography and Network Security. Springer Berlin Heidelberg; 2009. 1. p. 125-142p. (Lecture Notes in Computer Science).
Deshpande A, Khuller S, Malekian A, Toossi M. Energy Efficient Monitoring in Sensor Networks. In: Laber E, Bornstein C, Nogueira L, Faria L, editors. LATIN 2008: Theoretical InformaticsLATIN 2008: Theoretical Informatics. Vol 4957. Springer Berlin / Heidelberg; 2008. 4. p. 436-448p. (Lecture Notes in Computer Science; vol 4957).
Olsen M, Dorr BJ, Thomas S. Enhancing Automatic Acquisition of Thematic Structure in a Large-Scale Lexicon for Mandarin Chinese. In: Farwell D, Gerber L, Hovy E, editors. Machine Translation and the Information SoupMachine Translation and the Information Soup. Vol 1529. Springer Berlin / Heidelberg; 1998. 4. p. 41-50p. (Lecture Notes in Computer Science; vol 1529).
Khan AH, Memon AM. Enhancing Testing Technologies for Globalization of Software Engineering and Productivity. In: Handbook of Research on Software Engineering and Productivity Technologies: Implications of GlobalizationHandbook of Research on Software Engineering and Productivity Technologies: Implications of Globalization. Idea Group Inc (IGI); 2009. 4. p. 49.
Bhattacharya I, Getoor L. Entity Resolution in Graphs. In: Cook DJ, Holder LB, editors. Mining Graph DataMining Graph Data. John Wiley & Sons, Inc.; 2006. 3. p. 311-344p.
Eiter T, Mascardi V, Subrahmanian V. Error-Tolerant Agents. In: Kakas A, Sadri F, editors. Computational Logic: Logic Programming and BeyondComputational Logic: Logic Programming and Beyond. Vol 2407. Springer Berlin / Heidelberg; 2002. 8. p. 83-104p. (Lecture Notes in Computer Science; vol 2407).
Ralston A, Shneiderman B. Errors. In: Encyclopedia of Computer ScienceEncyclopedia of Computer Science. Chichester, UK: John Wiley and Sons Ltd.; 2003. 6. p. 677-680p.
Shneiderman B, Brethauer D, Plaisant C, Potter R. Evaluating three museum installations of a hypertext system. In: Sparks of innovation in human-computer interaction. Vol 40. Intellect Books; 1993. 4. p. 404.
Laskowski S, Plaisant C. Evaluation Methodologies for Visual Analytics. In: Thomas J, Cook K, editors. Illuminating the Path: The Research and Development Agenda for Visual AnalyticsIlluminating the Path: The Research and Development Agenda for Visual Analytics. IEEE Computer Society; 2005. 1. p. 150-157p.
Seong-Kyu S, Shannon S, Hicks MW, Nettles S. Evolution in Action: Using Active Networking to Evolve Network Support for Mobility. In: Sterbenz J, Takada O, Tschudin C, Plattner B, editors. Active NetworksActive Networks. Vol 2546. Springer Berlin / Heidelberg; 2002. 1. p. 146-161p. (Lecture Notes in Computer Science; vol 2546).
Roe A, Weller S, Baixeras J, Brown JW, Cummings MP, Davis DR, et al. Evolutionary framework for Lepidoptera model systems. In: Goldsmith M, Marec F, editors. Genetics and Molecular Biology of LepidopteraGenetics and Molecular Biology of Lepidoptera. Boca Raton: Taylor & Francis; 2010. 1. p. 1-24p.
Basili VR. Evolving and packaging reading technologies. In: Foundations of Empirical Software Engineering: The Legacy of Victor R. BasiliFoundations of Empirical Software Engineering: The Legacy of Victor R. Basili. Vol 1. Springer; 2005. 3. p. 362.
Pratikakis P, Foster JS, Hicks MW. Existential Label Flow Inference Via CFL Reachability. In: Yi K, editor. Static AnalysisStatic Analysis. Vol 4134. Springer Berlin / Heidelberg; 2006. 8. p. 88-106p. (Lecture Notes in Computer Science; vol 4134).
Myers DS, Bazinet AL, Cummings MP. Expanding the reach of Grid computing: combining Globus- and BOINC-based systems. In: Talbi E-G, Zomaya AY, editors. Grids for Bioinformatics and Computational BiologyGrids for Bioinformatics and Computational Biology. Hoboken: Wiley-Interscience; 2008. 7. p. 71-85p. (Wiley Book Series on Bioinformatics: Computational Techniques and Engineering).
Barrett C, Cook D, Hicks G, Faber V, Marathe A, Marathe M, et al. Experimental Analysis of Algorithms for Bilateral-Contract Clearing Mechanisms Arising in Deregulated Power Industry. In: Brodal G, Frigioni D, Marchetti-Spaccamela A, editors. Algorithm EngineeringAlgorithm Engineering. Vol 2141. Springer Berlin / Heidelberg; 2001. 1. p. 172-184p. (Lecture Notes in Computer Science; vol 2141).
Joshi K, Cukier M, Sanders W. Experimental Evaluation of the Unavailability Induced by a Group Membership Protocol. In: Bondavalli A, Thevenod-Fosse P, editors. Dependable Computing EDCC-4. Vol 2485. Springer Berlin / Heidelberg; 2002. 6. p. 644-648p. (Lecture Notes in Computer Science; vol 2485).
Baker P, Pless R, Fermüller C, Aloimonos Y. Eyes from Eyes. In: Pollefeys M, Van Gool L, Zisserman A, Fitzgibbon A, editors. 3D Structure from Images — SMILE 20003D Structure from Images — SMILE 2000. Vol 2018. Springer Berlin / Heidelberg; 2001. 2. p. 204-217p. (Lecture Notes in Computer Science; vol 2018).
Gopalan R, Schwartz WR, Chellappa R, Srivastava A. Face Detection. In: Moeslund TB, Hilton A, Krüger V, Sigal L, editors. Visual Analysis of HumansVisual Analysis of Humans. Springer London; 2011. 7. p. 71-90p.
Zhou S, Chellappa R, Aggarwal G. Face Recognition from Video. In: Bovik A, editor. The Essential Guide to Video Processing (Second Edition)The Essential Guide to Video Processing (Second Edition). Boston: Academic Press; 2009. 6. p. 653-688p.
Bhanu B, Govindaraju V. Face Tracking and Recognition in a Camera Network. In: Multibiometrics for Human IdentificationMultibiometrics for Human Identification. Cambridge University Press; 2011.
Chellappa R, Du M, Turaga P, Zhou S. Face Tracking and Recognition in Video. In: Li SZ, Jain AK, editors. Handbook of Face RecognitionHandbook of Face Recognition. Springer London; 2011. 3. p. 323-351p.
Berman P, Hannenhalli S. Fast sorting by reversal. In: Hirschberg D, Myers G, editors. Combinatorial Pattern MatchingCombinatorial Pattern Matching. Vol 1075. Springer Berlin / Heidelberg; 1996. 1. p. 168-185p. (Lecture Notes in Computer Science; vol 1075).
Byrka J, Srinivasan A, Swamy C. Fault-Tolerant Facility Location: A Randomized Dependent LP-Rounding Algorithm. In: Eisenbrand F, Shepherd F, editors. Integer Programming and Combinatorial OptimizationInteger Programming and Combinatorial Optimization. Vol 6080. Springer Berlin / Heidelberg; 2010. 2. p. 244-257p. (Lecture Notes in Computer Science; vol 6080).
Dumitras T, Narasimhan P. Fault-Tolerant Middleware and the Magical 1%. In: Alonso G, editor. Middleware 2005. Springer Berlin Heidelberg; 2005. 4. p. 431-441p. (Lecture Notes in Computer Science).
Navlakha S, White J, Nagarajan N, Pop M, Kingsford C. Finding Biologically Accurate Clusterings in Hierarchical Tree Decompositions Using the Variation of Information. In: Batzoglou S, editor. Research in Computational Molecular Biology. Vol 5541. Springer Berlin / Heidelberg; 2009. 4. p. 400-417p. (Lecture Notes in Computer Science; vol 5541).
Chrun D, Cukier M, Sneeringer G. Finding Corrupted Computers Using Imperfect Intrusion Prevention System Event Data. In: Harrison M, Sujan M-A, editors. Computer Safety, Reliability, and Security. Vol 5219. Springer Berlin / Heidelberg; 2008. 2. p. 221-234p. (Lecture Notes in Computer Science; vol 5219).
Priyadarshi A, Gupta SK. Finding Mold-Piece Regions Using Computer Graphics Hardware. In: Kim M-S, Shimada K, editors. Geometric Modeling and Processing - GMP 2006. Vol 4077. Springer Berlin / Heidelberg; 2006. 6. p. 655-662p. (Lecture Notes in Computer Science; vol 4077).
Khuller S, Martinez V, Nau DS, Simari G, Sliva A, Subrahmanian V. Finding Most Probable Worlds of Probabilistic Logic Programs. In: Prade H, Subrahmanian V, editors. Scalable Uncertainty Management. Vol 4772. Springer Berlin / Heidelberg; 2007. 4. p. 45-59p. (Lecture Notes in Computer Science; vol 4772).
O'Leary DP. Fine and Medium Grained Parallel Algorithms for Matrix QR Factorization. In: te Riele HJJ, Dekker T.J., van der Vorst HA, editors. Algorithms and Applications on Vector and Parallel ComputersAlgorithms and Applications on Vector and Parallel Computers. Elsevier Science Publishers B.V. (North Holland); 1987. 3. p. 347-349p.
Card SK, Mackinlay JD, Shneiderman B. Fisheye views. In: Readings in information visualizationReadings in information visualization.; 1999. 3. p. 311.
Van Horn D, Mairson HG. Flow Analysis, Linearity, and PTIME. In: Alpuente M, Vidal G, editors. Static Analysis. Springer Berlin Heidelberg; 2008. 2. p. 255-269p. (Lecture Notes in Computer Science).
Card SK, Mackinlay JD, Shneiderman B. Focus+ context. In: Readings in information visualizationReadings in information visualization.; 1999. 3. p. 306-309p.
Pratikakis P, Foster JS, Hicks MW, Neamtiu I. Formalizing Soundness of Contextual Effects. In: Mohamed O, Muñoz C, Tahar S, editors. Theorem Proving in Higher Order LogicsTheorem Proving in Higher Order Logics. Vol 5170. Springer Berlin / Heidelberg; 2008. 2. p. 262-277p. (Lecture Notes in Computer Science; vol 5170).
Colwell RR, Faruque SM, Nair GB. Free-Living to Freewheeling: The Evolution of Vibrio cholerae from Innocence to Infamy. In: Dronamraju KR, editor. Infectious Disease and Host-Pathogen EvolutionInfectious Disease and Host-Pathogen Evolution. Cambridge University Press; 2004. 1. p. 198.
Colwell RR. Fulfilling the promise of marine biotechnology. In: on of Products N R C C M B: B A M N(US), editor. Marine biotechnology in the twenty-first century: problems, promise, and productsMarine biotechnology in the twenty-first century: problems, promise, and products. National Academies Press; 2002. 3. p. 39.
Nixon MS, Tan T, Chellappa R. Further Gait Developments. In: Human Identification Based on GaitHuman Identification Based on Gait.; 2006. 1. p. 135-149p.
Agrawal A, Chellappa R. Fusing Depth and Video Using Rao-Blackwellized Particle Filter. In: Pal S, Bandyopadhyay S, Biswas S, editors. Pattern Recognition and Machine IntelligencePattern Recognition and Machine Intelligence. Vol 3776. Springer Berlin / Heidelberg; 2005. 5. p. 521-526p. (Lecture Notes in Computer Science; vol 3776).
Nixon MS, Tan T, Chellappa R. Future Challenges. In: Human Identification Based on GaitHuman Identification Based on Gait.; 2006. 1. p. 151-170p.
Kale A, Cuntoor N, Yegnanarayana B, Rajagopalan AN, Chellappa R. Gait Analysis for Human Identification. In: Kittler J, Nixon M, editors. Audio- and Video-Based Biometric Person AuthenticationAudio- and Video-Based Biometric Person Authentication. Vol 2688. Springer Berlin / Heidelberg; 2003. 1. p. 1058. (Lecture Notes in Computer Science; vol 2688).
Nixon MS, Tan T, Chellappa R. Gait Databases. In: Human Identification Based on GaitHuman Identification Based on Gait.; 2006. 1. p. 17-34p.
Cohn G, Gupta S, Froehlich J, Larson E, Patel S. GasSense: Appliance-Level, Single-Point Sensing of Gas Activity in the Home. In: Floréen P, Krüger A, Spasojevic M, editors. Pervasive Computing. Vol 6030. Springer Berlin / Heidelberg; 2010. 2. p. 265-282p. (Lecture Notes in Computer Science; vol 6030).
Fermüller C, Aloimonos Y. Geometry of Eye Design: Biology and Technology. In: Klette R, Gimel’farb G, Huang T, editors. Multi-Image Analysis. Vol 2032. Springer Berlin / Heidelberg; 2001. 2. p. 22-38p. (Lecture Notes in Computer Science; vol 2032).

Pages