Publications

Export 1669 results:
Author Title [ Type(Desc)] Year
Filters: First Letter Of Last Name is B  [Clear All Filters]
Conference Papers
Suh B, Ling H, Bederson BB, Jacobs DW.  2003.  Automatic thumbnail cropping and its effectiveness. Proceedings of the 16th annual ACM symposium on User interface software and technology. :95-104.
Oard D, Demner-Fushman D, Hajic J, Ramabhadran B, Gustman S, Byrne WJ, Soergel D, Dorr BJ, Resnik P, Picheny M.  2002.  Automatic transcription of Czech language oral history in the MALACH project: resources and initial experiments. Proceedings of the The 5th International Conference on Text, Speech and Dialogue. :57-64.
Balch T, Khan Z, Veloso M.  2001.  Automatically Tracking and Analyzing the Behavior of Live Insect Colonies. AGENTS '01 Proceedings of the Fifth International Conference on Autonomous Agents . :521-528.
Broadwater J, Meth R, Chellappa R.  2005.  Average relative radiance transform for subpixel detection. Geoscience and Remote Sensing Symposium, 2005. IGARSS '05. Proceedings. 2005 IEEE International. 5:3565-3568.
Lee S, Levin D, Gopalakrishnan V, Bhattacharjee B.  2007.  Backbone construction in selfish wireless networks. Proceedings of the 2007 ACM SIGMETRICS international conference on Measurement and modeling of computer systems. :121-132.
Zagoria R, Reggia JA, Price T, Banko M.  1981.  Bayesian classification in medicine: The transferability question. Proceedings of the Fifth Annual Symposium on Computer Applications in Medical Care. :250-252.
Bilge L, Dumitras T.  2012.  Before We Knew It: An Empirical Study of Zero-day Attacks in the Real World. CCS '12 Proceedings of the 2012 ACM conference on Computer and Communications Security. :833-844.
Anand P, King J, Boyd-Graber J, Wagner E, Martell C, Oard D, Resnik P.  2011.  Believe Me—We Can Do This! Annotating Persuasive Acts in Blog Text. Workshops at the Twenty-Fifth AAAI Conference on Artificial Intelligence.
Bertini E, Perer A, Plaisant C, Santucci G.  2008.  BELIV'08: Beyond time and errors: novel evaluation methods for information visualization. CHI '08 extended abstracts on Human factors in computing systems. :3913-3916.
Nikolova S, Boyd-Graber J, Fellbaum C, Cook P.  2009.  Better vocabularies for assistive communication aids: connecting terms using semantic networks and untrained annotators. Proceedings of the 11th international ACM SIGACCESS conference on Computers and accessibility. :171-178.
Bitsakos K, Yi H, Yi L, Fermüller C.  2008.  Bilateral symmetry of object silhouettes under perspective projection. 19th International Conference on Pattern Recognition, 2008. ICPR 2008. :1-4.
Gyger Jr LS, Spranklin BW, Gupta SK, Bruck HA.  2006.  Bio-inspired, Modular, and Multifunctional Thermal and Impact Protected (TIPed) Embedded Sensing Controls Actuation Power Element (ESCAPE) Structures.
Levin D, LaCurts K, Spring N, Bhattacharjee B.  2008.  Bittorrent is an auction: analyzing and improving bittorrent's incentives. Proceedings of the ACM SIGCOMM 2008 conference on Data communication. :243-254.
Bobba RB, Eschenauer L, Gligor V, Arbaugh WA.  2003.  Bootstrapping security associations for routing in mobile ad-hoc networks. IEEE Global Telecommunications Conference, 2003. GLOBECOM '03. 3:1511-1515vol.3-1511-1515vol.3.
Plaisant C, Marchionini G, Bruns T, Komlodi A, Campbell L.  1997.  Bringing treasures to the surface: iterative design for the Library of Congress National Digital Library Program. Proceedings of the SIGCHI conference on Human factors in computing systems. :518-525.
Ko D-I, Won N, Bhattacharyya SS.  2010.  Buffer management for multi-application image processing on multi-core platforms: Analysis and case study. 2010 IEEE International Conference on Acoustics Speech and Signal Processing (ICASSP). :1662-1665.
Ren J, Cukier M, Rubel P, Sanders WH, Bakken DE, Karr DA.  1999.  Building dependable distributed applications using AQUA. :189-196.
Cukier M, Ren J, Rubel P, Bakken DE, Karr DA.  1999.  Building dependable distributed objects with the AQuA architecture. :17-18.
Andrade H, Kurc T, Sussman A, Borovikov E, Saltz J.  2002.  On cache replacement policies for servicing mixed data intensive query workloads. Proceedings of the 2nd Workshop on Caching, Coherence, and Consistency, held in conjunction with the 16th ACM International Conference on Supercomputing.
Kashyap A, Bhattacharjee B, La R, Shayman M, Tabatabaee V.  2006.  CAM04-6: Single-Path Routing of Time-varying Traffic. Global Telecommunications Conference, 2006. GLOBECOM '06. IEEE. :1-6.
Licamele L, Bilgic M, Getoor L, Roussopoulos N.  2005.  Capital and benefit in social networks. Proceedings of the 3rd international workshop on Link discovery. :44-51.
Lee S, Banerjee S, Bhattacharjee B.  2004.  The case for a multi-hop wireless local area network. INFOCOM 2004. Twenty-third AnnualJoint Conference of the IEEE Computer and Communications Societies. 2:894-905vol.2-894-905vol.2.
Lee S, Banerjee S, Bhattacharjee B.  2004.  The case for a multi-hop wireless local area network. INFOCOM 2004. Twenty-third AnnualJoint Conference of the IEEE Computer and Communications Societies. 2:894-905vol.2-894-905vol.2.
Feamster N, Balakrishnan H, Rexford J, Shaikh A, van der Merwe J.  2004.  The case for separating routing from routers. Proceedings of the ACM SIGCOMM workshop on Future directions in network architecture. :5-12.
Layman L, Basili VR, Zelkowitz MV, Fisher KL.  2011.  A case study of measuring process risk for early insights into software safety. Software Engineering (ICSE), 2011 33rd International Conference on. :623-632.

Pages