Publications

Export 336 results:
[ Author(Desc)] Title Type Year
Filters: First Letter Of Title is T  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
H
Hobson S P, Dorr BJ, Monz C, Schwartz R.  2007.  Task-based evaluation of text summarization using Relevance Prediction. Information Processing & Management. 43(6):1482-1499.
Hollingsworth J, Lumpp JE, Miller BP.  1995.  Techniques for performance measurement of parallel programs. Parallel computers: theory and practice. :225-240.
Hori O, Doermann D.  1996.  Table-Form Structure Analysis Based on Box-Driven Reasoning. IEICE TRANSACTIONS on Information and Systems. E79-D(5):542-547.
Hu Q, Syal M, Gumerov NA, Duraiswami R, Leishman JG.  2011.  Toward improved aeromechanics simulations using recent advancements in scientific computing. Proceedings 67th Annual Forum of the American Helicopter Society. :3-5.
Hu Y, Zhai K, Edelman V, Boyd-Graber J.  Submitted.  Topic Models for Translation Domain Adaptation. mimno.infosci.cornell.edu.
Hui A, De Floriani L.  2007.  Topological Decompositions for 3D Non-manifold Simplicial Shapes. CS-TR-4855
Hui A, De Floriani L.  2007.  A two-level topological decomposition for non-manifold simplicial shapes. Proceedings of the 2007 ACM symposium on Solid and physical modeling. :355-360.
Hung E, Deng Y, V.S. Subrahmanian.  2004.  TOSS: an extension of TAX with ontologies and similarity queries. Proceedings of the 2004 ACM SIGMOD international conference on Management of data. :719-730.
Hutchinson H, Mackay W, Westerlund B, Bederson BB, Druin A, Plaisant C, Beaudouin-Lafon M, Conversy S, Evans H, Hansen H et al..  2003.  Technology probes: inspiring design for and with families. Proceedings of the SIGCHI conference on Human factors in computing systems. :17-24.
J
JaJa JF, Kim J, Wang Q.  2004.  Temporal range exploration of large scale multidimensional time series data. Proceedings of SSDBM. :95-106.
JaJa JF, Smorul M, Song S.  2009.  Tools and Services for Long-Term Preservation of Digital Archives. Indo-US Workshop on International Trends in Digital Preservation.
Jia X-P, Peng H, Zheng Q-L, Zhuolin Jiang, Li Z.  2008.  A topic-based Document Correlation Model. Machine Learning and Cybernetics, 2008 International Conference on. 5:2487-2491.
Zhuolin Jiang, Li S-F, Gao D-F.  2006.  A Time Saving Method for Human Detection in Wide Angle Camera Images. Machine Learning and Cybernetics, 2006 International Conference on. :4029-4034.
Zhuolin Jiang, Lin Z, Davis LS.  2010.  A tree-based approach to integrated action localization, recognition and segmentation. ECCV Workshops.
Johnson B, Shneiderman B, Baker MJ, Eick SG.  1999.  TennisViewer: A Browser for Competition Trees. Readings in information visualization: using vision to think. :149-149.
Johnson B, Shneiderman B.  1993.  Treemaps. Sparks of innovation in human-computer interaction. 284:309-309.
Johnson B, Shneiderman B.  1991.  Tree-maps: a space-filling approach to the visualization of hierarchical information structures. , IEEE Conference on Visualization, 1991. Visualization '91, Proceedings. :284-291.
Josyula DP, Anderson ML, Perlis D.  2003.  Towards domain-independent, task-oriented, conversational adequacy. INTERNATIONAL JOINT CONFERENCE ON ARTIFICIAL IN℡LIGENCE. 18:1637-1638.
K
Kale A, Chowdhury AKR, Chellappa R.  2003.  Towards a view invariant gait recognition algorithm. Proceedings. IEEE Conference on Advanced Video and Signal Based Surveillance, 2003.. :143-150.
Kang L, Doermann D.  2011.  Template based Segmentation of Touching Components in Handwritten Text Lines. 11th Intl. Conf. on Document Analysis and Recognition (ICDAR'11). :569-573.
Karlson AK, Bederson BB.  2007.  Thumbspace: Generalized one-handed input for touchscreen-based mobile devices. Proceedings of the 11th IFIP TC 13 international conference on Human-computer interaction. :324-338.
Katz J, MacKenzie P, Taban G, Gligor V.  2005.  Two-server password-only authenticated key exchange. Applied Cryptography and Network Security. :175-206.
Katz J, Yung M.  2002.  Threshold cryptosystems based on factoring. Advances in Cryptology—ASIACRYPT 2002. :139-147.
Katz J, MacKenzie P, Taban G, Gligor V.  2012.  Two-server password-only authenticated key exchange. Journal of Computer and System Sciences. 78(2):651-669.
Keceli F, Tzannes A, Caragea GC, Barua R, Vishkin U.  2011.  Toolchain for Programming, Simulating and Studying the XMT Many-Core Architecture. Parallel and Distributed Processing Workshops and Phd Forum (IPDPSW), 2011 IEEE International Symposium on. :1282-1291.

Pages