Publications

Export 7148 results:
[ Author(Desc)] Title Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
W
Wong PC, Chen C, Görg C, Shneiderman B, Stasko J, Thomas J.  2011.  Tutorial-Graph Analytics — Lessons Learned and Challenges Ahead. IEEE Computer Graphics and Applications. 31(5):18-18.
Wong P C, Chen C, Gorg C, Shneiderman B, Stasko J, Thomas J.  2011.  Graph Analytics-Lessons Learned and Challenges Ahead. IEEE Computer Graphics and Applications. 31(5):18-29.
Wong EW, Tse TH, Glass RL, Basili VR, Chen TY.  2009.  An assessment of systems and software engineering scholars and institutions (2002–2006). Journal of Systems and Software. 82(8):1370-1373.
Wong HS, Wu M, Joyce RA, Guan L, Kung SY.  2000.  A Neural Network Approach for Predicting Network Resource Requirements in Video Transmission Systems. Proc. IEEE Pacific RIM Conference on Multimedia, Sydney, Australia.
Wong EW, Tse TH, Glass RL, Basili VR, Chen TY.  2008.  An assessment of systems and software engineering scholars and institutions (2001–2005). Journal of Systems and Software. 81(6):1059-1062.
Wongsuphasawat K, Plaisant C, Shneiderman B.  2009.  Querying timestamped event sequences by exact search or similarity-based search: design and empirical evaluation. HCIL-2009-20
Wongsuphasawat K, Shneiderman B.  2009.  Finding comparable temporal categorical records: A similarity measure with an interactive visualization. IEEE Symposium on Visual Analytics Science and Technology, 2009. VAST 2009. :27-34.
Wongsuphasawat K, Guerra Gómez J A, Plaisant C, Wang T D, Taieb-Maimon M, Shneiderman B.  2011.  LifeFlow: visualizing an overview of event sequences. Proceedings of the 2011 annual conference on Human factors in computing systems. :1747-1756.
Wongsuphasawat K, Guerra Gómez J A, Plaisant C, Wang T, Taieb-Maimon M, Shneiderman B.  2011.  LifeFlow: visualizing an overview of event sequences (video preview). Proceedings of the 2011 annual conference extended abstracts on Human factors in computing systems. :507-510.
Wongsuphasawat K, Plaisant C, Taieb-Maimon M, Shneiderman B.  2012.  Querying event sequences by exact match or similarity search: Design and empirical evaluation. Interacting with Computers. 24(2):55-68.
Wonnacott WPD.  1994.  Experiences with Constraint-based Array Dependence Analysis. Principles and practice of constraint programming: second international workshop, PPCP'94, Rosario, Orcas Island, WA, USA, May 2-4, 1994: proceedings. :312-312.
Woods W, Uckun S, Kohane I, Bates J, Hulthage I, Gasser L, Hanks S, Gini M, Ram A, desJardins M et al..  1994.  AAAI 1994 Spring Symposium Series Reports. AI Magazine. 15(3):22-22.
Woodson SA, Mount SM.  1999.  The RNA World.
M. Wu, Swaminathan A, Mao Y.  2010.  Data hiding in compiled program binaries for supplementing computer functionality. 11/445,374(7840789)
Wu J S-C, Sussman A.  2004.  Flexible Control of Data Transfers between Parallel Programs. Proceedings of the 5th IEEE/ACM International Workshop on Grid Computing. :226-234.
Wu M.  2010.  Picturing signal processing [From the Editor]. Signal Processing Magazine, IEEE. 27(1):2-3.
M. Wu, Liu B.  1999.  Digital watermarking using shuffling. Image Processing, 1999. ICIP 99. Proceedings. 1999 International Conference on. 1:291-295vol.1-291-295vol.1.
M. Wu, Liu B.  1999.  Attacks on digital watermarks. Signals, Systems, and Computers, 1999. Conference Record of the Thirty-Third Asilomar Conference on. 2:1508-1512vol.2-1508-1512vol.2.
Wu H, Sankaranarayanan AC, Chellappa R.  2007.  In Situ Evaluation of Tracking Algorithms Using Time Reversed Chains. Computer Vision and Pattern Recognition, 2007. CVPR '07. IEEE Conference on. :1-8.
M. Wu, Liu B.  2003.  Multimedia Data Hiding.
M. Wu, Liu B.  2001.  Watermarking scheme for image authentication. (6285775)
M. Wu, Liu B.  2003.  Data hiding in image and video .I. Fundamental issues and solutions. Image Processing, IEEE Transactions on. 12(6):685-695.
Wu X, M. Wu.  2002.  A recognition algorithm for Chinese characters in diverse fonts. Image Processing. 2002. Proceedings. 2002 International Conference on. 3:981-984vol.3-981-984vol.3.
Wu M.  2003.  Joint security robustness enhancement for quantization embedding. Image Processing, 2003. ICIP 2003. Proceedings. 2003 International Conference on. 2:II-483-6vol.3-II-483-6vol.3.
M. Wu, Fridrich J, Goljan M, Gou H.  2005.  Handling uneven embedding capacity in binary images: a revisit. Proceedings of SPIE. 5681(1):194-205.

Pages