Publications

Export 3364 results:
Author Title Type [ Year(Asc)]
Filters: First Letter Of Last Name is S  [Clear All Filters]
2009
Sen P, Deshpande A, Getoor L.  2009.  Bisimulation-based approximate lifted inference. Proceedings of the Twenty-Fifth Conference on Uncertainty in Artificial Intelligence. :496-505.
Caragea GC, Saybasili AB, Wen X, Vishkin U.  2009.  Brief announcement: performance potential of an easy-to-program PRAM-on-chip prototype versus state-of-the-art processor. Proceedings of the twenty-first annual symposium on Parallelism in algorithms and architectures. :163-165.
Sliva A, V.S. Subrahmanian, Martinez V, Simari G.  2009.  CAPE: Automatically Predicting Changes in Group Behavior. Mathematical Methods in Counterterrorism. :253-269.
Sliva A, V.S. Subrahmanian, Martinez V, Simari G.  2009.  CAPE: Automatically Predicting Changes in Group Behavior. Mathematical Methods in Counterterrorism. :253-269.
Sliva A, V.S. Subrahmanian, Martinez V, Simari G.  2009.  CAPE: Automatically Predicting Changes in Group Behavior. Mathematical Methods in Counterterrorism. :253-269.
Shneiderman B.  2009.  Civic Collaboration. ScienceScience. 325(5940):540-540.
Conroy JM, Schlesinger JD, O'Leary DP.  2009.  CLASSY 2009: Summarization and Metrics. TAC 2009 Workshop ProceedingsTAC 2009 Workshop Proceedings.
Zheleva E, Sharara H, Getoor L.  2009.  Co-evolution of social and affiliation networks. Proceedings of the 15th ACM SIGKDD international conference on Knowledge discovery and data mining. :1007-1016.
Namata G, Sen P, Bilgic M, Getoor L.  2009.  Collective classification for text classification. Text Mining: Classification, Clustering, and ApplicationsText Mining: Classification, Clustering, and Applications. :51-69.
Alwen J, Katz J, Lindell Y, Persiano G, Shelat A, Visconti I.  2009.  Collusion-free multiparty computation in the mediated model. Advances in Cryptology-CRYPTO 2009. :524-540.
Siddiquie B, Vitaladevuni SN, Davis LS.  2009.  Combining multiple kernels for efficient image classification. Applications of Computer Vision (WACV), 2009 Workshop on. :1-8.
Swaminathan A, M. Wu, Liu KJR.  2009.  Component forensics. Signal Processing Magazine, IEEE. 26(2):38-48.
Dodis Y, Katz J, Smith A, Walfish S.  2009.  Composability and on-line deniability of authentication. Theory of Cryptography. :146-162.
Seydou F, Duraiswami R, Seppänen T, Gumerov NA.  2009.  Computation of singular and hypersingular boundary integrals by Green identity and application to boundary value problems. Engineering Analysis with Boundary Elements. 33(8–9):1124-1131.
Seydou F, Duraiswami R, Seppänen T, Gumerov NA.  2009.  Computation of singular and hypersingular boundary integrals by Green identity and application to boundary value problems. Engineering Analysis with Boundary Elements. 33(8–9):1124-1131.
Klavans JL, Sheffield C, Abels E, Jimmy Lin, Passonneau R, Sidhu T, Soergel D.  2009.  Computational linguistics for metadata building (CLiMB): using text mining for the automatic identification, categorization, and disambiguation of subject terms for image metadata. Multimedia Tools and Applications. 42(1):115-138.
Klavans JL, Sheffield C, Abels E, Jimmy Lin, Passonneau R, Sidhu T, Soergel D.  2009.  Computational linguistics for metadata building (CLiMB): using text mining for the automatic identification, categorization, and disambiguation of subject terms for image metadata. Multimedia Tools and Applications. 42(1):115-138.
Klavans JL, Sheffield C, Abels E, Jimmy Lin, Passonneau R, Sidhu T, Soergel D.  2009.  Computational linguistics for metadata building (CLiMB): using text mining for the automatic identification, categorization, and disambiguation of subject terms for image metadata. Multimedia Tools and Applications. 42(1):115-138.
Chow R, Golle P, Jakobsson M, Elaine Shi, Staddon J, Masuoka R, Molina J.  2009.  Controlling data in the cloud: outsourcing computation without outsourcing control. :85-90.
Chow R, Golle P, Jakobsson M, Elaine Shi, Staddon J, Masuoka R, Molina J.  2009.  Controlling data in the cloud: outsourcing computation without outsourcing control. :85-90.
Gopalakrishnan V, Bhattacharjee B, Ramakrishnan KK, Jana R, Srivastava D.  2009.  CPM: Adaptive Video-on-Demand with Cooperative Peer Assists and Multicast. INFOCOM 2009, IEEE. :91-99.
Fischer G, Jennings P, Maher M L, Resnick M, Shneiderman B.  2009.  Creativity challenges and opportunities in social computing. Proceedings of the 27th international conference extended abstracts on Human factors in computing systems. :3283-3286.
Shneiderman B.  2009.  Creativity Support Tools: A Grand Challenge for HCI Researchers. Engineering the User InterfaceEngineering the User Interface. :1-9.
Corcoran BJ, Swamy N, Hicks MW.  2009.  Cross-tier, label-based security enforcement for web applications. Proceedings of the 35th SIGMOD international conference on Management of data. :269-282.
Essien K, Vigneau S, Apreleva S, Singh LN, Bartolomei MS, Hannenhalli S.  2009.  CTCF binding site classes exhibit distinct evolutionary, genomic, epigenomic and transcriptomic features. Genome Biology. 10(11):R131-R131.

Pages