Publications

Export 1669 results:
Author Title [ Type(Desc)] Year
Filters: First Letter Of Last Name is B  [Clear All Filters]
Conference Papers
Baker P, Ogale AS, Fermüller C, Aloimonos Y.  2003.  New eyes for robotics. 2003 IEEE/RSJ International Conference on Intelligent Robots and Systems, 2003. (IROS 2003). Proceedings. 1:1018-1023vol.1-1018-1023vol.1.
Berthier R, Cukier M, Hiltunen M, Kormann D, Vesonder G, Sheleheda D.  2010.  Nfsight: netflow-based network awareness tool.
Biswas S, Aggarwal G, Ramanathan N, Chellappa R.  2008.  A Non-generative Approach for Face Recognition Across Aging. Biometrics: Theory, Applications and Systems, 2008. BTAS 2008. 2nd IEEE International Conference on. :1-6.
Abd-Almageed W, Fadali MS, Bebis G.  2002.  A non-intrusive Kalman filter-based tracker for pursuit eye movement. American Control Conference, 2002. Proceedings of the 2002. 2:1443-1447vol.2-1443-1447vol.2.
Basili VR, Zelkowitz MV, Layman L, Dangle K, Diep M.  2010.  Obtaining valid safety data for software safety measurement and process improvement. Proceedings of the 2010 ACM-IEEE International Symposium on Empirical Software Engineering and Measurement. :46:1–46:4-46:1–46:4.
Hansen DL, Jacobs DW, Lewis D, Biswas A, Preece J, Rotman D, Stevens E.  2011.  Odd Leaf Out: Improving Visual Recognition with Games. Privacy, security, risk and trust (passat), 2011 ieee third international conference on and 2011 ieee third international conference on social computing (socialcom). :87-94.
Karlson AK, Bederson BB.  2008.  One-handed touchscreen input for legacy applications. Proceeding of the twenty-sixth annual SIGCHI conference on Human factors in computing systems. :1399-1408.
Zhai K, Boyd-Graber J.  2013.  Online Latent Dirichlet Allocation with Infinite Vocabulary. International Conference on Machine Learning. PDF icon 2013_icml_infvoc.pdf (985.1 KB)
Basili VR, Zelkowitz MV.  1978.  Operation of the Software Engineering Laboratory. Proceedings of the Second US Army/IEEE Software Life Cycle Management Workshop. New York: Computer Societies Press.
Bhattacharyya SS, Levine WS.  2006.  Optimization of signal processing software for control system implementation. Computer Aided Control System Design, 2006 IEEE International Conference on Control Applications, 2006 IEEE International Symposium on Intelligent Control, 2006 IEEE. :1562-1567.
Bright L, Raschid L, Vidal ME.  1998.  Optimization of wrappers and mediators for web accessible data sources (websources). Workshop Web Inf. Data Management (WIDM), Washington DC.
Barrett C, Beckman R, Bisset K, Chen J, DuBois T, Eubank S, Kumar AVS, Lewis B, Marathe MV, Srinivasan A et al..  2012.  Optimizing epidemic protection for socially essential workers. Proceedings of the 2nd ACM SIGHIT International Health Informatics Symposium. :31-40.
Barrett C, Beckman R, Bisset K, Chen J, DuBois T, Eubank S, Kumar AVS, Lewis B, Marathe MV, Srinivasan A et al..  2012.  Optimizing epidemic protection for socially essential workers. Proceedings of the 2nd ACM SIGHIT International Health Informatics Symposium. :31-40.
Barrett C, Beckman R, Bisset K, Chen J, DuBois T, Eubank S, Kumar AVS, Lewis B, Marathe MV, Srinivasan A et al..  2012.  Optimizing epidemic protection for socially essential workers. Proceedings of the 2nd ACM SIGHIT International Health Informatics Symposium. :31-40.
Brakerski Z, Kalai YT, Katz J, Vaikuntanathan V.  2010.  Overcoming the Hole in the Bucket: Public-Key Cryptography Resilient to Continual Memory Leakage. Foundations of Computer Science (FOCS), 2010 51st Annual IEEE Symposium on. :501-510.
Suh B, Bederson BB.  2002.  OZONE: A zoomable interface for navigating ontology information. Proceedings of the Working Conference on Advanced Visual Interfaces. :139-143.
Sherwood R, Bhattacharjee B, Srinivasan A.  2002.  P5 : a protocol for scalable anonymous communication. 2002 IEEE Symposium on Security and Privacy, 2002. Proceedings. :58-70.
Helman DR, Bader DA, JaJa JF.  1996.  Parallel algorithms for personalized communication and sorting with an experimental study (extended abstract). Proceedings of the eighth annual ACM symposium on Parallel algorithms and architectures. :211-222.
Yacoob Y, Black MJ.  1998.  Parameterized modeling and recognition of activities. Computer Vision, 1998. Sixth International Conference on. :120-127.
Mishra A, Shrivastava V, Banerjee S, Arbaugh WA.  2006.  Partially overlapped channels not considered harmful. Proceedings of the joint international conference on Measurement and modeling of computer systems. :63-74.
Boyd-Graber J, Nikolova SS, Moffatt KA, Kin KC, Lee JY, Mackey LW, Tremaine MM, Klawe MM.  2006.  Participatory design with proxies: developing a desktop-PDA system to support people with aphasia. Proceedings of the SIGCHI conference on Human Factors in computing systems. :151-160.
Blikstein P, Rand W, Wilensky U.  2006.  Participatory, embodied, multi-agent simulation. Proceedings of the fifth international joint conference on Autonomous agents and multiagent systems. :1457-1458.
Beynon MD, Sussman A, Saltz J.  1999.  Performance impact of proxies in data intensive client-server applications. Proceedings of the 13th international conference on Supercomputing. :383-390.
Beynon MD, Sussman A, Catalyurek U, Kurc T, Saltz J.  2001.  Performance optimization for data intensive grid applications. Active Middleware Services, 2001. Third Annual International Workshop on. :97-105.
Baden R, Bender A, Spring N, Bhattacharjee B, Starin D.  2009.  Persona: an online social network with user-defined privacy. Proceedings of the ACM SIGCOMM 2009 conference on Data communication. :135-146.

Pages