Publications
Export 1254 results:
Author Title Type [ Year] Filters: First Letter Of Last Name is G [Clear All Filters]
2008. Identification of Form Features in Non-Manifold Shapes Through a Decomposition Approach. ASME Conference Proceedings. 2008(48371):293-300.
2008. Image acquisition forensics: Forensic analysis to identify imaging source. Acoustics, Speech and Signal Processing, 2008. ICASSP 2008. IEEE International Conference on. :1657-1660.
2008. Interactive Entity Resolution in Relational Data: A Visual Analytic Tool and Its Evaluation. IEEE Transactions on Visualization and Computer Graphics. 14(5):999-1014.
2008. LEARNING STRUCTURED BAYESIAN NETWORKS: COMBINING ABSTRACTION HIERARCHIES AND TREE‐STRUCTURED CONDITIONAL PROBABILITY TABLES. Computational Intelligence. 24(1):1-22.
2008. Learning To Predict Bad Behavior. NIPS 2007 Workshop on Machine Learning in Adversarial Environments for Computer Security.
2008. Leveraging social context for searching social media. Proceedings of the 2008 ACM workshop on Search in social media. :91-94.
2008. Modeling Transfer Relationships Between Learning Tasks for Improved Inductive Transfer. Machine Learning and Knowledge Discovery in DatabasesMachine Learning and Knowledge Discovery in Databases. 5211:317-332.
2008. More Than Meets the Eye: Transforming the User Experience of Home Network Management. Proceedings of the 7th ACM conference on Designing interactive systems. :455-464.
2008. Navigating information spaces: A case study of related article search in PubMed. Information Processing & Management. 44(5):1771-1783.
2008. A New Approach of Dynamic Background Modeling for Surveillance Information. Computer Science and Software Engineering, 2008 International Conference on. 1:850-855.
2008. Occurrence and Expression of Luminescence in Vibrio Cholerae. Applied and Environmental MicrobiologyAppl. Environ. Microbiol.. 74(3):708-715.
2008. Optimal Cryptographic Hardness of Learning Monotone Functions. Automata, Languages and Programming. :36-47.
2008. A pilot study to compare programming effort for two parallel programming models. Journal of Systems and Software. 81(11):1920-1930.
2008. Preserving the privacy of sensitive relationships in graph data. Proceedings of the 1st ACM SIGKDD international conference on Privacy, security, and trust in KDD. :153-171.
2008. Promoting Insight-Based Evaluation of Visualizations: From Contest to Benchmark Repository. Visualization and Computer Graphics, IEEE Transactions on. 14(1):120-134.
2008. The Randomized Coloring Procedure with Symmetry-Breaking. Automata, Languages and ProgrammingAutomata, Languages and Programming. 5125:306-319.
2008. Resolving arthropod phylogeny: exploring phylogenetic signal within 41 kb of protein-coding nuclear gene sequence. Syst Biol. 57(6):920-938.
2008. Review of Classifier Combination Methods. Studies in Computational Intelligence: Machine Learning in Document Analysis and RecognitionStudies in Computational Intelligence: Machine Learning in Document Analysis and Recognition. :361-386.
2008. Satisfying Complex Data Needs using Pull-Based Online Monitoring of Volatile Data Sources. Data Engineering, International Conference on. :1465-1467.
2008. SCALABLE CATALOG INFRASTRUCTURE FOR MANAGING ACCESS COSTS AND SOURCE SELECTION IN WIDE AREA NETWORKS. International Journal of Cooperative Information Systems. 17(1):77-109.
2008. Searching Electronic Health Records for Temporal Patterns in Patient Histories: A Case Study with Microsoft Amalga. AMIA Annual Symposium ProceedingsAMIA Annu Symp Proc. 2008:601-605.
2008. Sex and Age Dimorphism of Myocardial Gene Expression in Nonischemic Human Heart Failure. Circulation: Cardiovascular Genetics. 1(2):117-125.