Publications

Export 604 results:
Author Title [ Type(Desc)] Year
Filters: First Letter Of Last Name is J  [Clear All Filters]
Book Chapters
Aris A, Shneiderman B, Plaisant C, Shmueli G, Jank W.  2005.  Representing Unevenly-Spaced Time Series Data for Visualization and Interactive Exploration. Human-Computer Interaction - INTERACT 2005Human-Computer Interaction - INTERACT 2005. 3585:835-846.
Tulyakov S, Jaeger S, Govindaraju V, Doermann D.  2008.  Review of Classifier Combination Methods. Studies in Computational Intelligence: Machine Learning in Document Analysis and RecognitionStudies in Computational Intelligence: Machine Learning in Document Analysis and Recognition. :361-386.
Kumar V, Marathe M, Parthasarathy S, Srinivasan A.  2005.  Scheduling on Unrelated Machines Under Tree-Like Precedence Constraints. Approximation, Randomization and Combinatorial Optimization. Algorithms and TechniquesApproximation, Randomization and Combinatorial Optimization. Algorithms and Techniques. 3624:609-609.
Ling H, Jacobs DW.  2009.  Shape Matching for Foliage Database Retrieval. Semantic Mining Technologies for Multimedia DatabasesSemantic Mining Technologies for Multimedia Databases. :100-100.
Jogt NK, Shneiderman B.  1995.  Starfield visualization with interactive smooth zooming. Visual database systems, IIIVisual database systems, III. 3:1-1.
Papamanthou C, Shi E, Tamassia R, Yi K.  2013.  Streaming Authenticated Data Structures. Advances in Cryptology – EUROCRYPT 2013. :353-370.
Dorr BJ, Jordan PW, Benoit JW.  1999.  A Survey of Current Paradigms in Machine Translation. Advances in Computers. Volume 49:1-68.
Oriol M, Hicks MW.  2005.  Tagged Sets: A Secure and Transparent Coordination Medium. Coordination Models and LanguagesCoordination Models and Languages. 3454:193-205.
Massa P, Bhattacharjee B.  2004.  Using Trust in Recommender Systems: An Experimental Analysis. Trust ManagementTrust Management. 2995:221-235.
Chen C-houh, Härdle W, Unwin A, Jank W, Shmueli G, Plaisant C, Shneiderman B.  2008.  Visualizing Functional Data with an Application to eBay’s Online Auctions. Handbook of Data VisualizationHandbook of Data Visualization. :873-898.
Caprara A, Italiano G, Mohan G, Panconesi A, Srinivasan A.  2000.  Wavelength Rerouting in Optical Networks, or the Venetian Routing Problem. Approximation Algorithms for Combinatorial Optimization. 1913:71-84.
Ji H, Fermüller C.  2006.  Wavelet-Based Super-Resolution Reconstruction: Theory and Algorithm. Computer Vision – ECCV 2006Computer Vision – ECCV 2006. 3954:295-307.
Bitansky N, Dachman-Soled D, Garg S, Jain A, Kalai YTauman, López-Alt A, Wichs D.  2013.  Why “Fiat-Shamir for Proofs” Lacks a Proof. Theory of Cryptography. :182-201.
Conference Papers
Jacobs DW.  1993.  2D images of 3-D oriented points. Computer Vision and Pattern Recognition, 1993. Proceedings CVPR '93., 1993 IEEE Computer Society Conference on. :226-232.
Florczyk SJ, Simon M, Juba D, P Pine S, Sarkar S, Chen D, Baker PJ, Bodhak S, Cardone A, Brady M et al..  2016.  3D Cellular Morphotyping of Scaffold Niches. 2016 32nd Southern Biomedical Engineering Conference (SBEC).
Jacobs DW, Basri R.  1997.  3-D to 2-D recognition with regions. Computer Vision and Pattern Recognition, 1997. Proceedings., 1997 IEEE Computer Society Conference on. :547-553.
Chen D, Bilgic M, Getoor L, Jacobs DW, Mihalkova L, Tom Yeh.  2011.  Active inference for retrieval in camera networks. Person-Oriented Vision (POV), 2011 IEEE Workshop on. :13-20.

Pages