Publications

Export 636 results:
Author [ Title(Desc)] Type Year
Filters: First Letter Of Last Name is N  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
S
Ma X, Boyd-Graber J, Nikolova S, Cook PR.  2009.  Speaking through pictures: images vs. icons. Proceedings of the 11th international ACM SIGACCESS conference on Computers and accessibility. :163-170.
Plaisant C, North C.  2007.  Special Issue in Honor of Ben Shneiderman's 60th Birthday: Reflections on Human-Computer Interaction. International Journal of Human-Computer Interaction. 23(3):195-204.
Mozumder PK, Nahar S, M Naser N, Alam M, Huq A, R Sack B, Colwell RR.  2013.  Species composition of limnetic zooplankton from the southern coastal areas (Mathbaria and Bakerganj) in Bangladesh. Journal of the Asiatic Society of Bangladesh, Science. 38(1)
Mozumder PK, Nahar S, M Naser N, Alam M, Huq A, R Sack B, Colwell RR.  2013.  Species composition of limnetic zooplankton from the southern coastal areas (Mathbaria and Bakerganj) in Bangladesh. Journal of the Asiatic Society of Bangladesh, Science. 38(1)
Sharma P, Khurana U, Shneiderman B, Scharrenbroich M, Locke J.  2011.  Speeding Up Network Layout and Centrality Measures for Social Computing Goals. Social Computing, Behavioral-Cultural Modeling and PredictionSocial Computing, Behavioral-Cultural Modeling and Prediction. 6589:244-251.
Naor M, Schulman LJ, Srinivasan A.  1995.  Splitters and near-optimal derandomization. , 36th Annual Symposium on Foundations of Computer Science, 1995. Proceedings. :182-191.
White J R, Nagarajan N, Pop M.  2009.  Statistical Methods for Detecting Differentially Abundant Features in Clinical Metagenomic Samples. PLoS Comput Biology. 5(4):e1000352-e1000352.
Simari G, Sliva A, Nau DS, V.S. Subrahmanian.  2006.  A stochastic language for modelling opponent agents. Proceedings of the fifth international joint conference on Autonomous agents and multiagent systems. :244-246.
Raboin E, Nau DS, Kuter U, Gupta SK, Svec P.  2010.  Strategy generation in multi-agent imperfect-information pursuit games. :947-954.
Papamanthou C, Shi E, Tamassia R, Yi K.  2013.  Streaming Authenticated Data Structures. Advances in Cryptology – EUROCRYPT 2013. :353-370.
Hicks MW, Hornof L, Moore JT, Nettles SM.  1998.  A study of large object spaces. Proceedings of the 1st international symposium on Memory management. :138-145.
Dumitras T, Narasimhan P.  2013.  A study of unpredictability in fault-tolerant middleware. Computer Networks. 57(3):682-698.
Martineau J, Mokashi R, Chapman D, Grasso M, Brady M, Yesha Y, Yesha Y, Cardone A, Dima A.  2012.  Sub-cellular feature detection and automated extraction of collocalized actin and myosin regions. the 2nd ACM SIGHIT symposiumProceedings of the 2nd ACM SIGHIT symposium on International health informatics - IHI '12. :399.
Chin JP, Norman KL, Shneiderman B.  1987.  Subjective user evaluation of CF PASCAL programming tools. Department of Computer Science and Human-Computer Interaction Laboratory Working Paper.
Nixon MS, Tan T, Chellappa R.  2006.  Subjects Allied to Gait. Human Identification Based on GaitHuman Identification Based on Gait. :5-15.
Somasundaran S, Namata G, Wiebe J, Getoor L.  2009.  Supervised and unsupervised methods in employing discourse relations for improving opinion polarity classification. Proceedings of the 2009 Conference on Empirical Methods in Natural Language Processing: Volume 1 - Volume 1. :170-179.
Namata GM, Sharara H, Getoor L.  2010.  A survey of link mining tasks for analyzing noisy and incomplete networks. Link Mining: Models, Algorithms, and Applications. :107-133.
Alexander DS, Arbaugh WA, Hicks MW, Kakkar P, Keromytis AD, Moore JT, Gunter CA, Nettles SM, Smith JM.  1998.  The SwitchWare active network architecture. IEEE Network. 12(3):29-36.
Alexander DS, Hicks MW, Kakkar P, Keromytis AD, Shaw M, Moore JT, Gunter CA, Jim T, Nettles SM, Smith JM.  1998.  The switchware active network implementation. The ML Workshop, International Conference on Functional Programming (ICFP).
Newsome J, Elaine Shi, Song D, Perrig A.  2004.  The sybil attack in sensor networks: analysis & defenses. :259-268.
Au T-C, Kraus S, Nau DS.  2008.  Synthesis of strategies from interaction traces. :855-862.
Gupta SK, Nau DS.  1993.  A Systematic Approach for Analyzing the Manufacturability of Machined Parts. ISR; TR 1993-76
Gupta SK, Nau DS.  1995.  Systematic approach to analysing the manufacturability of machined parts. Computer-Aided Design. 27(5):323-342.
T
Kuter U, Nau DS, Pistore M, Traverso P.  2009.  Task decomposition on abstract states, for planning under nondeterminism. Artificial Intelligence. 173(5–6):669-695.
North C, Shneiderman B.  1997.  A Taxonomy of Multiple Window Coordination. Institute for Systems Research Technical Reports.

Pages