Publications

Export 47 results:
Author Title [ Type(Asc)] Year
Filters: Keyword is Internet  [Clear All Filters]
Journal Articles
Shroff N, Turaga P, Chellappa R.  2010.  Video Précis: Highlighting Diverse Aspects of Videos. IEEE Transactions on Multimedia. 12(8):853-868.
Haft DH, Selengut JD, Richter RA, Harkins D, Basu MK, Beck E.  2013.  TIGRFAMs and Genome Properties in 2013.. Nucleic Acids Res. 41(Database issue):D387-95.
Arbaugh WA, Davin JR, Farber DJ, Smith JM.  1998.  Security for virtual private intranets. Computer. 31(9):48-55.
Hicks MW, Keromytis AD, Smith JM.  2003.  A secure PLAN. IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews. 33(3):413-426.
Banerjee S, Bhattacharjee B.  2002.  Scalable secure group communication over IP multicast. Selected Areas in Communications, IEEE Journal on. 20(8):1511-1527.
Banerjee S, Lee S, Bhattacharjee B, Srinivasan A.  2006.  Resilient multicast using overlays. IEEE/ACM Transactions on Networking. 14(2):237-248.
Bavier A, Feamster N, Huang M, Peterson L, Rexford J.  2006.  In VINI veritas: realistic and controlled network experimentation. SIGCOMM Comput. Commun. Rev.. 36(4):3-14.
Feamster N, Johari R, Balakrishnan H.  2007.  Implications of Autonomy for the Expressiveness of Policy Routing. Networking, IEEE/ACM Transactions on. 15(6):1266-1279.
Brown JR, van Dam A, Earnshaw R, Encarnacao J, Guedj R, Preece J, Shneiderman B, Vince J.  1999.  Human-centered computing, online communities, and virtual environments. IEEE Computer Graphics and Applications. 19(6):70-74.
Dorai GK, Yacoob Y.  2002.  Embedded grammar tags: advancing natural language interaction on the Web. Intelligent Systems, IEEE. 17(1):48-53.
Bryce RC, Sampath S, Memon AM.  2011.  Developing a Single Model and Test Prioritization Strategies for Event-Driven Software. Software Engineering, IEEE Transactions on. 37(1):48-64.
Tanin E, Shneiderman B, Xie H.  2007.  Browsing large online data tables using generalized query previews. Information Systems. 32(3):402-423.
Conference Papers
Chetty M, Banks R, Brush A.J., Donner J, Grinter R.  2012.  You'Re Capped: Understanding the Effects of Bandwidth Caps on Broadband Use in the Home. SIGCHI '12. :3021-3030.
Gruser J, Raschid L, Vidal ME, Bright L.  1998.  Wrapper generation for Web accessible data sources. 3rd IFCIS International Conference on Cooperative Information Systems, 1998. Proceedings. :14-23.
Roitman H, Gal A, Raschid L.  2009.  Web Monitoring 2.0: Crossing Streams to Satisfy Complex Data Needs. IEEE 25th International Conference on Data Engineering, 2009. ICDE '09. :1215-1218.
North C, Shneiderman B, Plaisant C.  1996.  User controlled overviews of an image library: a case study of the visible human. Proceedings of the first ACM international conference on Digital libraries. :74-82.
Chrun D, Cukier M, Sneeringer G.  2008.  On the Use of Security Metrics Based on Intrusion Prevention System Event Data: An Empirical Analysis. :49-58.
Kuo K-T, Phuvoravan S, Bhattacharjee B, Jun La R, Shayman M, Chang H S.  2003.  On the use of flow migration for handling short-term overloads. Global Telecommunications Conference, 2003. GLOBECOM '03. IEEE. 6:3108-3112vol.6-3108-3112vol.6.
Friedman B, Thomas JC, Grudin J, Nass C, Nissenbaum H, Schlager M, Shneiderman B.  1999.  Trust me, I'm accountable: trust and accountability online. CHI '99 extended abstracts on Human factors in computing systems. :79-80.
Arbaugh WA, Farber DJ, Smith JM.  1997.  A secure and reliable bootstrap architecture. , 1997 IEEE Symposium on Security and Privacy, 1997. Proceedings. :65-71.
Tanin E, Brabec F, Samet H.  2002.  Remote access to large spatial databases. Proceedings of the 10th ACM international symposium on Advances in geographic information systems. :5-10.
Spring N, Chesire M, Berryman M, Sahasranaman V, Anderson T, Bershad B.  2000.  Receiver based management of low bandwidth access links. IEEE INFOCOM 2000. Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies. Proceedings. 1:245-254vol.1-245-254vol.1.
DuBois T, Golbeck J, Srinivasan A.  2011.  Predicting Trust and Distrust in Social Networks. Privacy, Security, Risk and Trust (PASSAT), 2011 IEEE Third International Conference on and 2011 IEEE Third International Confernece on Social Computing (SocialCom). :418-424.
Moore JT, Hicks MW, Nettles S.  2001.  Practical programmable packets. IEEE INFOCOM 2001. Twentieth Annual Joint Conference of the IEEE Computer and Communications Societies. Proceedings. 1:41-50vol.1-41-50vol.1.
Hicks MW, Moore JT, Alexander DS, Gunter CA, Nettles SM.  1999.  PLANet: an active internetwork. IEEE INFOCOM '99. Eighteenth Annual Joint Conference of the IEEE Computer and Communications Societies. Proceedings. 3:1124-1133vol.3-1124-1133vol.3.

Pages