Publications

Export 1858 results:
Author Title [ Type(Desc)] Year
Filters: First Letter Of Last Name is C  [Clear All Filters]
Conference Papers
Gupta A, Chen T, Chen F, Kimber D, Davis LS.  2008.  Context and observation driven latent variable model for human pose estimation. Computer Vision and Pattern Recognition, 2008. CVPR 2008. IEEE Conference on. :1-8.
Gupta H, Roy Chowdhury AK, Chellappa R.  2004.  Contour-based 3D Face Modeling from a Monocular Video. Proceedings of the British Machine Vision Conference. :39.1-39.10-39.1-39.10.
Chow R, Golle P, Jakobsson M, Elaine Shi, Staddon J, Masuoka R, Molina J.  2009.  Controlling data in the cloud: outsourcing computation without outsourcing control. :85-90.
Yuan X, Cohen M, Memon AM.  2007.  Covering array sampling of input event sequences for automated gui testing. Proceedings of the twenty-second IEEE/ACM international conference on Automated software engineering. :405-408.
Yilmaz C, Cohen MB, Porter A.  2004.  Covering arrays for efficient fault characterization in complex configuration spaces. ACM SIGSOFT Software Engineering Notes. 29:45-54.
Tom Yeh, Chang T-H, Xie B, Walsh G, Watkins I, Wongsuphasawat K, Huang M, Davis LS, Bederson BB.  2011.  Creating contextual help for GUIs using screenshots. Proceedings of the 24th annual ACM symposium on User interface software and technology. :145-154.
Chafekar D, Kumar AVS, Marathe MV, Parthasarathy S, Srinivasan A.  2007.  Cross-layer latency minimization in wireless networks with SINR constraints. Proceedings of the 8th ACM international symposium on Mobile ad hoc networking and computing. :110-119.
Su G-M, Chen M, M. Wu.  2006.  Cross-Path PDMA-Based Error Protection for Streaming Multiuser Video over Multiple Paths. Image Processing, 2006 IEEE International Conference on. :21-24.
Corcoran BJ, Swamy N, Hicks MW.  2009.  Cross-tier, label-based security enforcement for web applications. Proceedings of the 35th SIGMOD international conference on Management of data. :269-282.
Catarci T, Costabile MF, Cruz IF, Ioannidis Y, Shneiderman B.  1997.  Data models, visual representations, metaphors: how to solve the puzzle? (panel) Proceedings of the third IFIP WG2.6 working conference on Visual database systems 3 (VDB-3). :177-182.
Catarci T, Costabile MF, Cruz IF, Ioannidis Y, Shneiderman B.  1997.  Data models, visual representations, metaphors: how to solve the puzzle? (panel) Proceedings of the third IFIP WG2.6 working conference on Visual database systems 3 (VDB-3). :177-182.
Catarci T, Costabile MF, Cruz IF, Ioannidis Y, Shneiderman B.  1997.  Data models, visual representations, metaphors: how to solve the puzzle? (panel) Proceedings of the third IFIP WG2.6 working conference on Visual database systems 3 (VDB-3). :177-182.
Canino D, De Floriani L.  2011.  A Decomposition-based Approach to Modeling and Understanding Arbitrary Shapes. Eurographics Italian Chapter Conference 2011. :53-60.
Feamster N, Nayak A, Kim H, Clark R, Mundada Y, Ramachandran A, bin Tariq M.  2010.  Decoupling policy from configuration in campus and enterprise networks. Local and Metropolitan Area Networks (LANMAN), 2010 17th IEEE Workshop on. :1-6.
Wyche SP, Smyth TN, Chetty M, Aoki PM, Grinter RE.  2010.  Deliberate Interactions: Characterizing Technology Use in Nairobi, Kenya. SIGCHI '10. :2593-2602.
Myers BA, Cypher A, Maulsby D, Smith DC, Shneiderman B.  1991.  Demonstrational interfaces: Coming soon? Proceedings of the SIGCHI conference on Human factors in computing systems: Reaching through technology. :393-396.
Berthier R, Cukier M.  2008.  The Deployment of a Darknet on an Organization-Wide Network: An Empirical Analysis. :59-68.
Caesar M, Caldwell D, Feamster N, Rexford J, Shaikh A, van der Merwe J.  2005.  Design and implementation of a routing control platform. Proceedings of the 2nd conference on Symposium on Networked Systems Design & Implementation - Volume 2. :15-28.
Caesar M, Caldwell D, Feamster N, Rexford J, Shaikh A, van der Merwe J.  2005.  Design and implementation of a routing control platform. Proceedings of the 2nd conference on Symposium on Networked Systems Design & Implementation - Volume 2. :15-28.
Wu H-H, Shen C-C, Bhattacharyya SS, Compton K, Schulte M, Wolf M, Zhang T.  2010.  Design and implementation of real-time signal processing applications on heterogeneous multiprocessor arrays. 2010 Conference Record of the Forty Fourth Asilomar Conference on Signals, Systems and Computers (ASILOMAR). :2121-2125.
Cho I, Shen C-C, Potbhare S, Bhattacharyya SS, Goldsman N.  2011.  Design methods for Wireless Sensor Network Building Energy Monitoring Systems. 2011 IEEE 36th Conference on Local Computer Networks (LCN). :974-981.
Nikolova S, Boyd-Graber J, Cook PR.  2009.  The design of ViVA: a mixed-initiative visual vocabulary for aphasia. Proceedings of the 27th international conference extended abstracts on Human factors in computing systems. :4015-4020.
Cole R, Vishkin U.  1986.  Deterministic coin tossing and accelerating cascades: micro and macro techniques for designing parallel algorithms. Proceedings of the eighteenth annual ACM symposium on Theory of computing. :206-219.
Chetty M, Tucker W, Blake E.  2004.  Developing Locally Relevant Software Applications for Rural Areas: A South African Example. SAICSIT '04. :239-243.
Chu BTB, Reggia JA.  1990.  Diagnostic reasoning at multiple levels of abstraction. AI Systems in Government Conference, 1990. Proceedings., Fifth Annual. :168-175.

Pages