Publications

Export 853 results:
Author Title Type [ Year(Asc)]
Filters: First Letter Of Last Name is F  [Clear All Filters]
2009
Feamster N, Hassan U, Sundaresan S, Valancius V, Johari R, Vazirani V.  2009.  Towards an Internet Connectivity Market. GT-CS-09-01
Phang KY, Foster JS, Hicks MW, Sazawal V.  2009.  Triaging Checklists: a Substitute for a PhD in Static Analysis. Evaluation and Usability of Programming Languages and Tools (PLATEAU) PLATEAU 2009.
Froehlich J, Dillahunt T, Klasnja P, Mankoff J, Consolvo S, Harrison B, Landay JA.  2009.  UbiGreen: investigating a mobile tool for tracking and supporting green transportation habits. Proceedings of the 27th international conference on Human factors in computing systems. :1043-1052.
Tsui C-jung, Wang P, Fleischmann K, Oard D, Sayeed A.  2009.  Understanding IT Innovations Through Computational Analysis of Discourse. ICIS 2009 Proceedings.
Ford TE, Colwell RR, Rose JB, Morse SS, Rogers DJ, Yates TL.  2009.  Using Satellite Images of Environmental Changes to Predict Infectious Disease Outbreaks. Emerging Infectious DiseasesEmerg Infect Dis. 15(9):1341-1346.
Xu Y, Ji H, Fermüller C.  2009.  Viewpoint Invariant Texture Description Using Fractal Analysis. International Journal of Computer Vision. 83(1):85-100.
Basri R, Felzenszwalb PF, Girshick RB, Jacobs DW, Klivans CJ.  2009.  Visibility constraints on features of 3D objects. Computer Vision and Pattern Recognition, 2009. CVPR 2009. IEEE Conference on. :1231-1238.
2008
Andersen DG, Balakrishnan H, Feamster N, Koponen T, Moon D, Shenker S.  2008.  Accountable internet protocol (aip). SIGCOMM Comput. Commun. Rev.. 38(4):339-350.
Consolvo S, McDonald DW, Toscos T, Chen MY, Froehlich J, Harrison B, Klasnja P, LaMarca A, LeGrand L, Libby R et al..  2008.  Activity sensing in the wild: a field trial of ubifit garden. Proceeding of the twenty-sixth annual SIGCHI conference on Human factors in computing systems. :1797-1806.
Cheng AS, Fleischmann KR, Wang P, Oard D.  2008.  Advancing social science research by applying computational linguistics. Proceedings of the American Society for Information Science and Technology. 45(1):1-12.
Zhang D, Raasi S, Fushman D.  2008.  Affinity Makes the Difference: Nonselective Interaction of the UBA Domain of Ubiquilin-1 with Monomeric Ubiquitin and Polyubiquitin Chains. Journal of Molecular Biology. 377(1):162-180.
Papamanthou C, Preparata FP, Tamassia R.  2008.  Algorithms for Location Estimation Based on RSSI Sampling. Algorithmic Aspects of Wireless Sensor Networks. :72-86.
Tariq M, Zeitoun A, Valancius V, Feamster N, Ammar M.  2008.  Answering what-if deployment and configuration questions with wise. Proceedings of the ACM SIGCOMM 2008 conference on Data communication. :99-110.
Ramachandran AV, Feamster N.  2008.  Authenticated out-of-band communication over social links. Proceedings of the first workshop on Online social networks. :61-66.
Bitsakos K, Yi H, Yi L, Fermüller C.  2008.  Bilateral symmetry of object silhouettes under perspective projection. 19th International Conference on Pattern Recognition, 2008. ICPR 2008. :1-4.
Feamster N, Gray A.  2008.  Can great research be taught?: independent research with cross-disciplinary thinking and broader impact Proceedings of the 39th SIGCSE technical symposium on Computer science education. :471-475.
Furr M, Foster JS.  2008.  Checking type safety of foreign function calls. ACM Transactions on Programming Languages and Systems (TOPLAS). 30(4):18-18.
Furr M, Foster JS.  2008.  Checking type safety of foreign function calls. ACM Transactions on Programming Languages and Systems (TOPLAS). 30(4):18-18.
Flach P, Matsubara ET, De Raedt L, Dietterich T, Getoor L, Kersting K, Muggleton SH.  2008.  On classification, ranking, and probability estimation.
Wu PF, Qu Y, Preece J, Fleischmann K, Golbeck J, Jaeger P, Shneiderman B.  2008.  Community response grid (CRG) for a university campus: Design requirements and implications. Proceedings of the 5th International ISCRAM Conference. :34-43.
Neamtiu I, Hicks MW, Foster JS, Pratikakis P.  2008.  Contextual effects for version-consistent dynamic software updating and safe concurrent programming. Proceedings of the 35th annual ACM SIGPLAN-SIGACT symposium on Principles of programming languages. :37-49.
Farrell R, Davis LS.  2008.  Decentralized discovery of camera network topology. Distributed Smart Cameras, 2008. ICDSC 2008. Second ACM/IEEE International Conference on. :1-10.
Fei Wu P, Qu Y, Fleischmann K, Golbeck J, Jaeger P, Preece J, Shneiderman B.  2008.  Designing community-based emergency communication system: A preliminary study. Proceedings of the American Society for Information Science and Technology. 45(1):1-3.
Fei Wu P, Qu Y, Fleischmann K, Golbeck J, Jaeger P, Preece J, Shneiderman B.  2008.  Designing community-based emergency communication system: A preliminary study. Proceedings of the American Society for Information Science and Technology. 45(1):1-3.
Ramachandran A, Feamster N, Dagon D.  2008.  Detecting botnet membership with dnsbl counterintelligence. Botnet Detection. :131-142.

Pages