Publications

Export 853 results:
Author Title [ Type(Desc)] Year
Filters: First Letter Of Last Name is F  [Clear All Filters]
Conference Papers
Foster JS, Fähndrich M, Aiken A.  1999.  A theory of type qualifiers. ACM SIGPLAN Notices. 34:192-203.
Piatetsky-Shapiro G, Grossman R, Djeraba C, Feldman R, Getoor L, Zaki M.  2006.  Is there a grand challenge or X-prize for data mining? Proceedings of the 12th ACM SIGKDD international conference on Knowledge discovery and data mining. :954-956.
Andersen DG, Feamster N, Bauer S, Balakrishnan H.  2002.  Topology inference from BGP routing dynamics. Proceedings of the 2nd ACM SIGCOMM Workshop on Internet measurment. :243-248.
Kembhavi A, Farrell R, Luo Y, Jacobs DW, Duraiswami R, Davis LS.  2008.  Tracking Down Under: Following the Satin Bowerbird. Applications of Computer Vision, 2008. WACV 2008. IEEE Workshop on. :1-7.
Arya S, Fonseca G, Mount D.  2008.  Tradeoffs in Approximate Range Searching Made Simpler. Computer Graphics and Image Processing, 2008. SIBGRAPI '08. XXI Brazilian Symposium on. :237-244.
Bhatia S, Motiwala M, Muhlbauer W, Mundada Y, Valancius V, Bavier A, Feamster N, Peterson L, Rexford J.  2008.  Trellis: a platform for building flexible, fast virtual networks on commodity hardware. Proceedings of the 2008 ACM CoNEXT Conference. :72:1–72:6-72:1–72:6.
Browne HK, Arbaugh WA, McHugh J, Fithen WL.  2001.  A trend analysis of exploitations. 2001 IEEE Symposium on Security and Privacy, 2001. S&P 2001. Proceedings. :214-229.
Friedman B, Thomas JC, Grudin J, Nass C, Nissenbaum H, Schlager M, Shneiderman B.  1999.  Trust me, I'm accountable: trust and accountability online. CHI '99 extended abstracts on Human factors in computing systems. :79-80.
Greenfieldboyce D, Foster JS.  2007.  Type qualifier inference for Java. ACM SIGPLAN Notices. 42:321-336.
Froehlich J, Dillahunt T, Klasnja P, Mankoff J, Consolvo S, Harrison B, Landay JA.  2009.  UbiGreen: investigating a mobile tool for tracking and supporting green transportation habits. Proceedings of the 27th international conference on Human factors in computing systems. :1043-1052.
Ji H, Fermüller C.  2003.  Uncertainty in 3D shape estimation. ICCV Workshop on Statistical and Computational Theories of Vision.
Neamtiu I, Foster JS, Hicks MW.  2005.  Understanding source code evolution using abstract syntax tree matching. Proceedings of the 2005 international workshop on Mining software repositories. :1-5.
Ramachandran A, Feamster N.  2006.  Understanding the network-level behavior of spammers. Proceedings of the 2006 conference on Applications, technologies, architectures, and protocols for computer communications. :291-302.
Froehlich J, Dourish P.  2004.  Unifying artifacts and activities in a visual tool for distributed software development teams. 26th International Conference on Software Engineering, 2004. ICSE 2004. Proceedings. :387-396.
Khadilkar M, Feamster N, Sanders M, Clark R.  2007.  Usage-based dhcp lease time optimization. Proceedings of the 7th ACM SIGCOMM conference on Internet measurement. :71-76.
Reisner E, Song C, Ma KK, Foster JS, Porter A.  2010.  Using symbolic evaluation to understand behavior in configurable software systems. Software Engineering, 2010 ACM/IEEE 32nd International Conference on. 1:445-454.
Klasnja P, Harrison BL, LeGrand L, LaMarca A, Froehlich J, Hudson SE.  2008.  Using wearable sensors and real time inference to understand human recall of routine activities. Proceedings of the 10th international conference on Ubiquitous computing. :154-163.
Cheng A-S, Fleischmann KR, Wang P, Ishita E, Oard D.  2010.  Values of Stakeholders in the Net Neutrality Debate: Applying Content Analysis to Telecommunications Policy. Hawaii International Conference on System Sciences. :1-10.
Kobla V, Doermann D, Faloutsos C.  1997.  VideoTrails: Representing and Visualizing Structure in Video Sequences. Proceedings of the ACMInternational Multimedia Conference. :335-346.
Frangiadakis N, Câmara D, Filali F, Loureiro AAF, Roussopoulos N.  2008.  Virtual access points for vehicular networks. Proceedings of the 1st international conference on MOBILe Wireless MiddleWARE, Operating Systems, and Applications. :14-14.
Frangiadakis N, Câmara D, Filali F, Loureiro AAF, Roussopoulos N.  2008.  Virtual access points for vehicular networks. Proceedings of the 1st international conference on MOBILe Wireless MiddleWARE, Operating Systems, and Applications. :14-14.
Ferreira R, Moon B, Humphries J, Sussman A, Saltz J, Miller R, Demarzo A.  1997.  The virtual microscope.. Proceedings of the AMIA Annual Fall Symposium. :449-449.
Basri R, Felzenszwalb PF, Girshick RB, Jacobs DW, Klivans CJ.  2009.  Visibility constraints on features of 3D objects. Computer Vision and Pattern Recognition, 2009. CVPR 2009. IEEE Conference on. :1231-1238.
Fails JA, Karlson A, Shahamat L, Shneiderman B.  2006.  A Visual Interface for Multivariate Temporal Data: Finding Patterns of Events across Multiple Histories. Visual Analytics Science And Technology, 2006 IEEE Symposium On. :167-174.
Yu X, Fermüller C, Aloimonos Y.  2011.  Visual Scene Interpretation as a Dialogue between Vision and Language. Workshops at the Twenty-Fifth AAAI Conference on Artificial Intelligence.

Pages