Publications

Export 7151 results:
Author [ Title(Asc)] Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
W
Arbaugh WA, Fithen WL, McHugh J.  2000.  Windows of Vulnerability: A Case Study Analysis. Computer. 33(12):52-59.
Shneiderman B, Alavi M, Norman K, Borkowski E Y.  1995.  Windows of opportunity in electronic classrooms. Communications of the ACM. 38(11):19-24.
Chung JM, Easley GR, O'Leary DP.  2011.  Windowed Spectral Regularization of Inverse Problems. SIAM Journal on Scientific Computing. 33(6)
Agrawal M, Davis LS.  2004.  Window-based, discontinuity preserving stereo. Computer Vision and Pattern Recognition, 2004. CVPR 2004. Proceedings of the 2004 IEEE Computer Society Conference on. 1:I-66-I-73Vol.1-I-66-I-73Vol.1.
Lifshitz K, Shneiderman B.  1987.  Window control strategies for on-line text traversal. Department of Computer Science and Human Computer Interaction Laboratory, University of Maryland, College Park, MD (correspondence with B. Schneiderman).
Lifshitz J, Shneiderman B.  1991.  Window control strategies for hypertext traversal: An empirical study. Proc. 29th Annual ACM DC Technical Symposium.
Jimmy Lin, Demner-Fushman D.  2006.  Will pyramids built of nuggets topple over? Proceedings of the main conference on Human Language Technology Conference of the North American Chapter of the Association of Computational Linguistics. :383-390.
Rand W, Blikstein P, Wilensky U.  2006.  Widgets, Planets, and Demons: the Case for the Integration of Human, Embedded, and Virtual Agents via Mediation. Proceedings of Swarmfest.
Castillo CD, Jacobs DW.  2011.  Wide-baseline stereo for face recognition with large pose variation. Computer Vision and Pattern Recognition (CVPR), 2011 IEEE Conference on. :537-544.
Gumerov NA, Duraiswami R.  2009.  Wideband fast multipole accelerated boundary element methods for the three-dimensional Helmholtz equation.. The Journal of the Acoustical Society of America. 125(4):2566-2566.
Konte M, Feamster N.  2011.  Wide-area routing dynamics of malicious networks. Proceedings of the ACM SIGCOMM 2011 conference. :432-433.
Valancius V, Feamster N, Rexford J, Nakao A.  2010.  Wide-area route control for distributed services. Proceedings of the 2010 USENIX conference on USENIX annual technical conference. :2-2.
Roy-Chowdhury AK, Chellappa R, Keaton T.  2004.  Wide baseline image registration with application to 3-D face modeling. Multimedia, IEEE Transactions on. 6(3):423-434.
Chowdhury AM, Chellappa R, Keaton T.  2002.  Wide baseline image registration using prior information. Multimedia Signal Processing, 2002 IEEE Workshop on. :37-40.
Zadorozhny V, Gal A, Raschid L, Ye Q.  2004.  Wide area performance monitoring using aggregate latency profiles. Web Engineering. :771-775.
Shneiderman B.  2005.  Why Not Make Interfaces Better than 3D Reality? (2004) Institute for Systems Research Technical Reports.
Shneiderman B.  2003.  Why not make interfaces better than 3D reality? IEEE Computer Graphics and Applications. 23(6):12-15.
Chetty M, Haslem D, Baird A, Ofoha U, Sumner B, Grinter R.  2011.  Why is My Internet Slow?: Making Network Speeds Visible SIGCHI '11. :1889-1898.
Bitansky N, Dachman-Soled D, Garg S, Jain A, Kalai YTauman, López-Alt A, Wichs D.  2013.  Why “Fiat-Shamir for Proofs” Lacks a Proof. Theory of Cryptography. :182-201.
Dumitras T, Narasimhan P.  2009.  Why Do Upgrades Fail and What Can We Do About It?: Toward Dependable, Online Upgrades in Enterprise System Middleware'09 Proceedings of the 10th ACM/IFIP/USENIX International Conference on Middleware. :18:1-18:20.
Zotenko E, Mestre J, O'Leary DP, Przytycka TM.  2008.  Why Do Hubs in the Yeast Protein Interaction Network Tend To Be Essential: Reexamining the Connection between the Network Topology and Essentiality. PLoS Comput BiolPLoS Comput Biol. 4(8):e1000140-e1000140.
Kembhavi A, Tom Yeh, Davis LS.  2010.  Why Did the Person Cross the Road (There)? Scene Understanding Using Probabilistic Logic Models and Common Sense Reasoning Computer Vision – ECCV 2010. 6312:693-706.
O'Leary DP.  1995.  Why Broyden's Nonsymmetric Method Terminates on Linear Equations. SIAM Journal on Optimization. 5:231-235.
Chetty M, Banks R, Harper R, Regan T, Sellen A, Gkantsidis C, Karagiannis T, Key P.  2010.  Who's Hogging the Bandwidth: The Consequences of Revealing the Invisible in the Home. SIGCHI '10. :659-668.
Istrail S, Sutton GG, Florea L, Halpern AL, Mobarry CM, Lippert R, Walenz B, Shatkay H, Dew I, Miller JR et al..  2004.  Whole-genome shotgun assembly and comparison of human genome assemblies. Proceedings of the National Academy of Sciences of the United States of America. 101(7):1916-1916.

Pages