Publications

Export 1254 results:
Author [ Title(Asc)] Type Year
Filters: First Letter Of Last Name is G  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
P
De Raedt L, Dietterich T, Getoor L, Muggleton SH, Lloyd JW, Sears TD, Milch B, Marthi B, Russell S, Sontag D.  2006.  Probabilistic, Logical and Relational Learning-Towards a Synthesis. Dagstuhl Seminar Proceedings. 5051
Hung E, Getoor L, V.S. Subrahmanian.  2007.  Probabilistic interval XML. ACM Transactions on Computational Logic (TOCL). 8(4)
Gupta A, Kembhavi A, Davis LS.  2009.  Probabilistic graphical models. IEEE transactions on pattern analysis and machine intelligence. 31(10):1775-1789.
Plangprasopchok A, Lerman K, Getoor L.  2011.  A probabilistic approach for learning folksonomies from structured data. Proceedings of the fourth ACM international conference on Web search and data mining. :555-564.
Getoor L, Grant J.  2006.  PRL: A probabilistic relational language. Machine Learning. 62(1):7-31.
Getoor L, Grant J.  2006.  PRL: A probabilistic relational language. Machine Learning. 62(1):7-31.
Zheleva E, Getoor L.  2011.  Privacy in social networks: A survey. Social Network Data Analytics. :277-306.
Zheleva E, Terzi E, Getoor L.  2012.  Privacy in Social Networks. Synthesis Lectures on Data Mining and Knowledge Discovery. 3(1):1-85.
Zelkowitz MV, Shaw AC, Gannon JD.  1979.  Principles of software engineering and design.
Khan Z, Ford MJ, Cusanovich DA, Mitrano A, Pritchard JK, Gilad Y.  2013.  Primate Transcript and Protein Expression Levels Evolve Under Compensatory Selection Pressures. Science. 342(6162):1100-1104.
Haley BJ, Grim CJ, Hasan NA, Taviani E, Chun J, Brettin TS, Bruce DC, Challacombe JF, Detter CJ, Han CS et al..  2010.  The pre‐seventh pandemic Vibrio cholerae BX 330286 El Tor genome: evidence for the environment as a genome reservoir. Environmental Microbiology Reports. 2(1):208-216.
Greene S, Marchionini G, Plaisant C, Shneiderman B.  2000.  Previews and overviews in digital libraries: Designing surrogates to support visual information seeking. Journal of the American Society for Information Science. 51(4):380-393.
Zheleva E, Getoor L.  2008.  Preserving the privacy of sensitive relationships in graph data. Proceedings of the 1st ACM SIGKDD international conference on Privacy, security, and trust in KDD. :153-171.
Yilmaz C, Memon AM, Porter A, Krishna AS, Schmidt DC, Gokhale A, Natarajan B.  2004.  Preserving distributed systems critical properties: a model-driven approach. Software, IEEE. 21(6):32-40.
DuBois T, Golbeck J, Srinivasan A.  2011.  Predicting Trust and Distrust in Social Networks. Privacy, Security, Risk and Trust (PASSAT), 2011 IEEE Third International Conference on and 2011 IEEE Third International Confernece on Social Computing (SocialCom). :418-424.
Licamele L, Getoor L.  2007.  Predicting Protein-Protein Interactions Using Relational Features. CS-TR-4909
Louis VR, Russek-Cohen E, Choopun N, Rivera ING, Gangle B, Jiang SC, Rubin A, Patz JA, Huq A, Colwell RR.  2003.  Predictability of Vibrio Cholerae in Chesapeake Bay. Applied and Environmental MicrobiologyAppl. Environ. Microbiol.. 69(5):2773-2785.
Deshpande A.  2009.  PrDB: Managing Large-Scale Correlated Probabilistic Databases (Abstract). Scalable Uncertainty ManagementScalable Uncertainty Management. 5785:1-1.
Sen P, Deshpande A, Getoor L.  2009.  PrDB: managing and exploiting rich correlations in probabilistic databases. The VLDB Journal. 18(5):1065-1090.
Bhattacharjee B, Calvert K, Griffioen J, Spring N, Sterbenz JPG.  2006.  Postmodern internetwork architecture. ITTC-FY2006-TR-45030-01, Information and Telecommunication Center, The University of Kansas.
Yue Z, Zhao W, Chellappa R.  2005.  Pose-Encoded Spherical Harmonics for Robust Face Recognition Using a Single Image. Analysis and Modelling of Faces and GesturesAnalysis and Modelling of Faces and Gestures. 3723:229-243.
Hannenhalli S.  1995.  Polynomial-time algorithm for computing translocation distance between genomes. Combinatorial Pattern MatchingCombinatorial Pattern Matching. 937:162-176.
Mount D, Gable CW.  2001.  A point-placement strategy for conforming Delaunay tetrahedralization. International Journal of Computational Geometry & Applications. 11(6):669-682.
Murphy M, Mount D, Gable CW.  2000.  A point-placement strategy for conforming Delaunay tetrahedralization. Proceedings of the eleventh annual ACM-SIAM symposium on Discrete algorithms. :67-74.
Arkin E, Goodrich M, Mitchell J, Mount D, Piatko C, Skiena S.  1993.  Point probe decision trees for geometric concept classes. Algorithms and Data Structures. :95-106.

Pages