Publications
Export 197 results:
[ Author] Title Type Year Filters: First Letter Of Title is B [Clear All Filters]
1992. Behavioral Visual Motion Analysis,". Proceedings, DARPA Image Understanding Workshop. :521-541.
2011. Believe Me—We Can Do This! Annotating Persuasive Acts in Blog Text. Workshops at the Twenty-Fifth AAAI Conference on Artificial Intelligence.
2010. Building a fast, virtualized data plane with programmable hardware. SIGCOMM Comput. Commun. Rev.. 40(1):75-82.
2012. BEAGLE: An Application Programming Interface and High-Performance Computing Library for Statistical Phylogenetics. Systematic BiologySyst Biol. 61(1):170-173.
2015. Building Infectious Disease Research Programs to Promote Security and Enhance Collaborations with Countries of the Former Soviet Union. Frontiers in Public Health. 35361632
2001. Building an Experience Base for Software Engineering: A report on the first CeBASE eWorkshop. Product Focused Software Process Improvement. :110-125.
2008. BELIV'08: Beyond time and errors: novel evaluation methods for information visualization. CHI '08 extended abstracts on Human factors in computing systems. :3913-3916.
2007. BELIV'06: beyond time and errors: novel evaluation methods for information visualization. interactions. 14(3):59-60.
2012. Before We Knew It: An Empirical Study of Zero-day Attacks in the Real World. CCS '12 Proceedings of the 2012 ACM conference on Computer and Communications Security. :833-844.
2008. Bilateral symmetry of object silhouettes under perspective projection. 19th International Conference on Pattern Recognition, 2008. ICPR 2008. :1-4.
2003. Bootstrapping security associations for routing in mobile ad-hoc networks. IEEE Global Telecommunications Conference, 2003. GLOBECOM '03. 3:1511-1515vol.3-1511-1515vol.3.
1998. Beyond the Epipolar Constraint: Integrating 3D Motion and Structure Estimation. 3D Structure from Multiple Images of Large-Scale Environments3D Structure from Multiple Images of Large-Scale Environments. 1506:109-123.
2011. Brief announcement: better speedups for parallel max-flow. Proceedings of the 23rd ACM symposium on Parallelism in algorithms and architectures. :131-134.
2009. Brief announcement: performance potential of an easy-to-program PRAM-on-chip prototype versus state-of-the-art processor. Proceedings of the twenty-first annual symposium on Parallelism in algorithms and architectures. :163-165.
2002. Bayesian methods for face recognition from video. Acoustics, Speech, and Signal Processing (ICASSP), 2002 IEEE International Conference on. 4:IV-4068-IV-4071-IV-4068-IV-4071.
2008. Black-Box Construction of a Non-malleable Encryption Scheme from Any Semantically Secure One. Theory of Cryptography. :427-444.
2007. Bridging the ROUGE/Human Evaluation Gap in Multi-Document Summarization. Document Understanding Conference DUC 2007Document Understanding Conference DUC 2007.
2010. Broader incorporation of bioinformatics in education: opportunities and challenges. Brief Bioinform. 11(537-543)