Publications

Search
Export 490 results:
[ Author(Desc)] Title Type Year
Filters: First Letter Of Last Name is C  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
C
Christian K, Kules B, Shneiderman B, Youssef A.  2005.  A Comparison of Voice Controlled and Mouse Controlled Web Browsing (2000). Institute for Systems Research Technical Reports.
Christian K, Kules B, Shneiderman B, Youssef A.  2000.  A comparison of voice controlled and mouse controlled web browsing. Proceedings of the fourth international ACM conference on Assistive technologies. :72-79.
Chrun D, Cukier M, Sneeringer G.  2008.  Finding Corrupted Computers Using Imperfect Intrusion Prevention System Event Data. Computer Safety, Reliability, and Security. 5219:221-234.
Chrun D, Cukier M, Sneeringer G.  2008.  On the Use of Security Metrics Based on Intrusion Prevention System Event Data: An Empirical Analysis. :49-58.
Chu B-TB, Reggia JA.  1990.  Modeling diagnostic problem-solving at multiple levels of abstraction. Artificial Intelligence Applications, 1990., Sixth Conference on. :55-61vol.1-55-61vol.1.
Chu D, Deshpande A, Hellerstein JM, Hong W.  2006.  Approximate Data Collection in Sensor Networks using Probabilistic Models. Proceedings of the 22nd International Conference on Data Engineering, 2006. ICDE '06. :48-48.
Chu BTB, Reggia JA.  1990.  Diagnostic reasoning at multiple levels of abstraction. AI Systems in Government Conference, 1990. Proceedings., Fifth Annual. :168-175.
Chuang WH, Varna AL, Wu M.  2010.  Performance impact of ordinal ranking on content fingerprinting. IEEE Int. Conf. on Image Processing.
Chuang W-H, Varna AL, M. Wu.  2009.  Modeling and analysis of ordinal ranking in content fingerprinting. Information Forensics and Security, 2009. WIFS 2009. First IEEE International Workshop on. :116-120.
Chuang W-H, Swaminathan A, M. Wu.  2009.  Tampering identification using Empirical Frequency Response. Acoustics, Speech and Signal Processing, 2009. ICASSP 2009. IEEE International Conference on. :1517-1520.
Chuang W-H, Su H, M. Wu.  2011.  Exploring compression effects for improved source camera identification using strongly compressed video. Image Processing (ICIP), 2011 18th IEEE International Conference on. :1953-1956.
Chuang W-H, M. Wu.  2010.  Semi non-intrusive training for cell-phone camera model linkage. Information Forensics and Security (WIFS), 2010 IEEE International Workshop on. :1-6.
Chun J, Rivera ING, Colwell RR.  2002.  Analysis of 16S-23S rRNA intergenic spacer of Vibrio cholerae and Vibrio mimicus for detection of these species. METHODS IN MOLECULAR BIOLOGY. 179:171-178.
Chun J, Grim CJ, Hasan NA, Lee JH, Choi SY, Haley BJ, Taviani E, Jeon YS, Kim DW, Lee JH et al..  2009.  Comparative genomics reveals mechanism for short-term and long-term clonal transitions in pandemic Vibrio cholerae. Proceedings of the National Academy of Sciences. 106(36):15442-15447.
Chung I-H, Hollingsworth J.  2004.  Automated cluster-based Web service performance tuning. 13th IEEE International Symposium on High performance Distributed Computing, 2004. Proceedings. :36-44.
Chung JM, Easley GR, O'Leary DP.  2011.  Windowed Spectral Regularization of Inverse Problems. SIAM Journal on Scientific Computing. 33(6)
Chung JM, Chung M, O'Leary DP.  2011.  Designing Optimal Spectral Filters for Inverse Problems. SIAM Journal on Scientific Computing. 33(6)
Chung J, Nagy JG, O'Leary DP.  2008.  A Weighted GCV Method for Lanczos Hybrid Regularization. Electronic Transactions on Numerical Analysis. 28:149-167.
Cignoni P, De Floriani L, Magillo P, Puppo E, Scopigno R, di Genova U.  2003.  Interactive Visualization of Large Tetrahedral Meshes through Selective Refinement. IEEE Transactions on Visualization and Computer Graphics.
Cignoni P, De Floriani L, Magillo P, Puppo E, Scopigno R.  2004.  Selective refinement queries for volume visualization of unstructured tetrahedral meshes. Visualization and Computer Graphics, IEEE Transactions on. 10(1):29-45.
Cignoni P, De Floriani L, Lindstrom P, Pascucci V, Rossignac J, Silva C.  2004.  Multi-resolution modeling, visualization and streaming of volume meshes. Eurographics 2004, Tutorials 2: Multi-resolution Modeling, Visualization and Streaming of Volume Meshes.
Citrin W, Halbert D, Hewitt C, Meyrowitz N, Shneiderman B.  1993.  Potentials and limitations of pen-based computers. Proceedings of the 1993 ACM conference on Computer science. :536-539.
Clark AG, Eisen MB, Smith DR, Bergman CM, Oliver B, Markow TA, Kaufman TC, Kellis M, Gelbart W, Iyer VN et al..  2007.  Evolution of genes and genomes on the Drosophila phylogeny. Nature. 450(7167):203-218.
Clark AG, Eisen MB, Smith DR, Bergman CM, Oliver B, Markow TA, Kaufman TC, Kellis M, Gelbart W, Iyer VN et al..  2007.  Evolution of genes and genomes on the Drosophila phylogeny. Nature. 450(7167):203-218.
Clark R, Feamster N, Nayak A, Reimers A.  2009.  Pushing Enterprise Security Down the Network Stack. GT-CS-09-03

Pages