Publications
Export 853 results:
Author Title [ Type] Year Filters: First Letter Of Last Name is F [Clear All Filters]
2006. Is there a grand challenge or X-prize for data mining? Proceedings of the 12th ACM SIGKDD international conference on Knowledge discovery and data mining. :954-956.
2002. Topology inference from BGP routing dynamics. Proceedings of the 2nd ACM SIGCOMM Workshop on Internet measurment. :243-248.
2008. Tracking Down Under: Following the Satin Bowerbird. Applications of Computer Vision, 2008. WACV 2008. IEEE Workshop on. :1-7.
2008. Tradeoffs in Approximate Range Searching Made Simpler. Computer Graphics and Image Processing, 2008. SIBGRAPI '08. XXI Brazilian Symposium on. :237-244.
2008. Trellis: a platform for building flexible, fast virtual networks on commodity hardware. Proceedings of the 2008 ACM CoNEXT Conference. :72:1–72:6-72:1–72:6.
2001. A trend analysis of exploitations. 2001 IEEE Symposium on Security and Privacy, 2001. S&P 2001. Proceedings. :214-229.
1999. Trust me, I'm accountable: trust and accountability online. CHI '99 extended abstracts on Human factors in computing systems. :79-80.
2009. UbiGreen: investigating a mobile tool for tracking and supporting green transportation habits. Proceedings of the 27th international conference on Human factors in computing systems. :1043-1052.
2003. Uncertainty in 3D shape estimation. ICCV Workshop on Statistical and Computational Theories of Vision.
2005. Understanding source code evolution using abstract syntax tree matching. Proceedings of the 2005 international workshop on Mining software repositories. :1-5.
2006. Understanding the network-level behavior of spammers. Proceedings of the 2006 conference on Applications, technologies, architectures, and protocols for computer communications. :291-302.
2004. Unifying artifacts and activities in a visual tool for distributed software development teams. 26th International Conference on Software Engineering, 2004. ICSE 2004. Proceedings. :387-396.
2007. Usage-based dhcp lease time optimization. Proceedings of the 7th ACM SIGCOMM conference on Internet measurement. :71-76.
2010. Using symbolic evaluation to understand behavior in configurable software systems. Software Engineering, 2010 ACM/IEEE 32nd International Conference on. 1:445-454.
2008. Using wearable sensors and real time inference to understand human recall of routine activities. Proceedings of the 10th international conference on Ubiquitous computing. :154-163.
2010. Values of Stakeholders in the Net Neutrality Debate: Applying Content Analysis to Telecommunications Policy. Hawaii International Conference on System Sciences. :1-10.
1997. VideoTrails: Representing and Visualizing Structure in Video Sequences. Proceedings of the ACMInternational Multimedia Conference. :335-346.
2008. Virtual access points for vehicular networks. Proceedings of the 1st international conference on MOBILe Wireless MiddleWARE, Operating Systems, and Applications. :14-14.
2008. Virtual access points for vehicular networks. Proceedings of the 1st international conference on MOBILe Wireless MiddleWARE, Operating Systems, and Applications. :14-14.
2009. Visibility constraints on features of 3D objects. Computer Vision and Pattern Recognition, 2009. CVPR 2009. IEEE Conference on. :1231-1238.
2006. A Visual Interface for Multivariate Temporal Data: Finding Patterns of Events across Multiple Histories. Visual Analytics Science And Technology, 2006 IEEE Symposium On. :167-174.
2011. Visual Scene Interpretation as a Dialogue between Vision and Language. Workshops at the Twenty-Fifth AAAI Conference on Artificial Intelligence.