Publications

Export 197 results:
[ Author(Desc)] Title Type Year
Filters: First Letter Of Title is B  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
A
Aloimonos Y, Duriç Z, Fermüller C, Huang L, Rivlin E, Sharma R.  1992.  Behavioral Visual Motion Analysis,". Proceedings, DARPA Image Understanding Workshop. :521-541.
Anand P, King J, Boyd-Graber J, Wagner E, Martell C, Oard D, Resnik P.  2011.  Believe Me—We Can Do This! Annotating Persuasive Acts in Blog Text. Workshops at the Twenty-Fifth AAAI Conference on Artificial Intelligence.
Antonakakis M, Perdisci R, Dagon D, Lee W, Feamster N.  2010.  Building a dynamic reputation system for DNS. 19th Usenix Security Symposium.
Anwer M B, Feamster N.  2010.  Building a fast, virtualized data plane with programmable hardware. SIGCOMM Comput. Commun. Rev.. 40(1):75-82.
Ayres DL, Darling A, Zwickl DJ, Beerli P, Holder MT, Lewis PO, Huelsenbeck JP, Ronquist F, Swofford DL, Cummings MP et al..  2012.  BEAGLE: An Application Programming Interface and High-Performance Computing Library for Statistical Phylogenetics. Systematic BiologySyst Biol. 61(1):170-173.
B
Bartholomew JC, Pearson AD, Stenseth NC, LeDuc JW, Hirschberg DL, Colwell RR.  2015.  Building Infectious Disease Research Programs to Promote Security and Enhance Collaborations with Countries of the Former Soviet Union. Frontiers in Public Health. 35361632
Basili VR, Tesoriero R, Costa P, Lindvall M, Rus I, Shull F, Zelkowitz MV.  2001.  Building an Experience Base for Software Engineering: A report on the first CeBASE eWorkshop. Product Focused Software Process Improvement. :110-125.
Bertini E, Perer A, Plaisant C, Santucci G.  2008.  BELIV'08: Beyond time and errors: novel evaluation methods for information visualization. CHI '08 extended abstracts on Human factors in computing systems. :3913-3916.
Bertini E, Plaisant C, Santucci G.  2007.  BELIV'06: beyond time and errors: novel evaluation methods for information visualization. interactions. 14(3):59-60.
Bilge L, Dumitras T.  2012.  Before We Knew It: An Empirical Study of Zero-day Attacks in the Real World. CCS '12 Proceedings of the 2012 ACM conference on Computer and Communications Security. :833-844.
Bitsakos K, Yi H, Yi L, Fermüller C.  2008.  Bilateral symmetry of object silhouettes under perspective projection. 19th International Conference on Pattern Recognition, 2008. ICPR 2008. :1-4.
Bobba RB, Eschenauer L, Gligor V, Arbaugh WA.  2003.  Bootstrapping security associations for routing in mobile ad-hoc networks. IEEE Global Telecommunications Conference, 2003. GLOBECOM '03. 3:1511-1515vol.3-1511-1515vol.3.
Brodský T, Fermüller C, Aloimonos Y.  1998.  Beyond the Epipolar Constraint: Integrating 3D Motion and Structure Estimation. 3D Structure from Multiple Images of Large-Scale Environments3D Structure from Multiple Images of Large-Scale Environments. 1506:109-123.
C
Caragea GC, Vishkin U.  2011.  Brief announcement: better speedups for parallel max-flow. Proceedings of the 23rd ACM symposium on Parallelism in algorithms and architectures. :131-134.
Caragea GC, Saybasili AB, Wen X, Vishkin U.  2009.  Brief announcement: performance potential of an easy-to-program PRAM-on-chip prototype versus state-of-the-art processor. Proceedings of the twenty-first annual symposium on Parallelism in algorithms and architectures. :163-165.
Card SK, Mackinlay JD, Shneiderman B.  1999.  Bifocal lens. Readings in information visualization. :331-332.
Cardone A, Amelot J, Li-Baboud Y-S, Brady M, Bajcsy P.  2012.  Biases from model assumptions in texture sub-cellular image segmentation. SPIE Newsroom. 13
Chellappa R, Zhou S, Li B.  2002.  Bayesian methods for face recognition from video. Acoustics, Speech, and Signal Processing (ICASSP), 2002 IEEE International Conference on. 4:IV-4068-IV-4071-IV-4068-IV-4071.
Choi SGeol, Dachman-Soled D, Malkin T, Wee H.  2008.  Black-Box Construction of a Non-malleable Encryption Scheme from Any Semantically Secure One. Theory of Cryptography. :427-444.
Conroy JM, Schlesinger JD, O'Leary DP.  2007.  Bridging the ROUGE/Human Evaluation Gap in Multi-Document Summarization. Document Understanding Conference DUC 2007Document Understanding Conference DUC 2007.
Conroy JM, Schlesinger JD, O'Leary DP, Goldstein J.  2006.  Back to Basics: CLASSY 2006. DUC 06 Conference ProceedingsDUC 06 Conference Proceedings.
Cukier M, Ren J, Rubel P, Bakken DE, Karr DA.  1999.  Building dependable distributed objects with the AQuA architecture. :17-18.
Cummings MP.  2004.  A book like its cover. Heredity. 93(2):234-235.
Cummings MP, Temple GG.  2010.  Broader incorporation of bioinformatics in education: opportunities and challenges. Brief Bioinform. 11(537-543)
D
Dachman-Soled D, Lindell Y, Mahmoody M, Malkin T.  2011.  On the Black-Box Complexity of Optimally-Fair Coin Tossing. Theory of Cryptography. :450-467.

Pages