Publications
Export 636 results:
Author Title [ Type] Year Filters: First Letter Of Last Name is N [Clear All Filters]
2009. Toward Upgrades-as-a-service in Distributed Systems. Middleware'09 Proceedings of the 10th ACM/IFIP/USENIX International Conference on Middleware. :29:1-29:2.
2010. Tracking via object reflectance using a hyperspectral video camera. 2010 IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops (CVPRW). :44-51.
1994. Trade-offs between communication throughput and parallel time. Proceedings of the twenty-sixth annual ACM symposium on Theory of computing. :372-381.
1999. Trust me, I'm accountable: trust and accountability online. CHI '99 extended abstracts on Human factors in computing systems. :79-80.
1999. Trust me, I'm accountable: trust and accountability online. CHI '99 extended abstracts on Human factors in computing systems. :79-80.
2008. Uncovering Genomic Reassortments among Influenza Strains by Enumerating Maximal Bicliques. IEEE International Conference on Bioinformatics and Biomedicine, 2008. BIBM '08. :223-230.
2005. Understanding source code evolution using abstract syntax tree matching. Proceedings of the 2005 international workshop on Mining software repositories. :1-5.
1996. User controlled overviews of an image library: a case study of the visible human. Proceedings of the first ACM international conference on Digital libraries. :74-82.
2003. User-specified adaptive scheduling in a streaming media network. 2003 IEEE Conference on Open Architectures and Network Programming. :87-96.
2007. Using annotations from controlled vocabularies to find meaningful associations. Proceedings of the 4th international conference on Data integration in the life sciences. :247-263.
1988. Using flow field divergence for obstacle avoidance in visual navigation. Science Applications International Corp, Proceedings: Image Understanding Workshop,. 2
2010. Using methods & measures from network analysis for gui testing. Software Testing, Verification, and Validation Workshops (ICSTW), 2010 Third International Conference on. :240-246.
1998. Utility elicitation as a classification problem. Proceedings of the Fourteenth conference on Uncertainty in artificial intelligence. :79-88.
2004. Utilizing volatile external information during planning. Proceedings of the European Conference on Artificial Intelligence (ECAI). :647-651.
1993. Vacuum-logic. Proceedings of AAAI 1993 Fall Symposium Series: Instantiating Real-World Agents. :51-54.
2011. Visual Analysis of Temporal Trends in Social Networks Using Edge Color Coding and Metric Timelines. Privacy, Security, Risk and Trust (PASSAT), 2011 IEEE Third International Conference on and 2011 IEEE Third International Confernece on Social Computing (SocialCom). :549-554.
2002. Web question answering: is more always better? Proceedings of the 25th annual international ACM SIGIR conference on Research and development in information retrieval. :291-298.
1998. Is the Web really different from everything else? CHI 98 conference summary on Human factors in computing systems. :92-93.
2003. What test oracle should I use for effective GUI testing? Automated Software Engineering, 2003. Proceedings. 18th IEEE International Conference on. :164-173.
2009. Why Do Upgrades Fail and What Can We Do About It?: Toward Dependable, Online Upgrades in Enterprise System Middleware'09 Proceedings of the 10th ACM/IFIP/USENIX International Conference on Middleware. :18:1-18:20.
2010. Wide-area route control for distributed services. Proceedings of the 2010 USENIX conference on USENIX annual technical conference. :2-2.