Publications

Export 1858 results:
Author [ Title(Desc)] Type Year
Filters: First Letter Of Last Name is C  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
F
Ceaparu I, Shneiderman B.  2004.  Finding governmental statistical data on the Web: A study of categorically organized links for the FedStats topics page. Journal of the American Society for Information Science and Technology. 55(11):1008-1015.
Ceaparu I, Shneiderman B.  2005.  Finding Governmental Statistical Data on the Web: Three Empirical Studies of the FedStats Topics Page (2003). Institute for Systems Research Technical Reports.
Ceaparu I, Shneiderman B.  2004.  Finding Governmental Statistical Data on the Web: Three Empirical Studies of the FedStats Topics Page. Journal of the American Society for Information Science and Technology. 55:1008-1015.
Jacobs DW, Chennubhotla C.  1994.  Finding structurally consistent motion correspondences. Pattern Recognition, 1994. Vol. 1 - Conference A: Computer Vision Image Processing., Proceedings of the 12th IAPR International Conference on. 1:650-653vol.1-650-653vol.1.
Nagarajan N, Cook C, Di Bonaventura M P, Ge H, Richards A, Bishop-Lilly KA, DeSalle R, Read TD, Pop M.  2010.  Finishing genomes with limited resources: lessons from an ensemble of microbial genomes. BMC Genomics. 11(1):242-242.
Bonsignore EM, Dunne C, Rotman D, Smith M, Capone T, Hansen DL, Shneiderman B.  2009.  First Steps to Netviz Nirvana: Evaluating Social Network Analysis with NodeXL. International Conference on Computational Science and Engineering, 2009. CSE '09. 4:332-339.
Card SK, Mackinlay JD, Shneiderman B.  1999.  Fisheye views. Readings in information visualizationReadings in information visualization. :311-311.
Condon A, Deshpande A, Hellerstein L, Wu N.  2006.  Flow algorithms for two pipelined filter ordering problems. Proceedings of the twenty-fifth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems. :193-202.
Consolvo S, Klasnja P, McDonald DW, Avrahami D, Froehlich J, LeGrand L, Libby R, Mosher K, Landay JA.  2008.  Flowers or a robot army?: encouraging awareness & activity with personal, mobile displays Proceedings of the 10th international conference on Ubiquitous computing. :54-63.
Card SK, Mackinlay JD, Shneiderman B.  1999.  Focus+ context. Readings in information visualizationReadings in information visualization. :306-309.
Paluska, Saff, Yeh, Chen.  2003.  Footloose: a case for physical eventual consistency and selective conflict resolution. Mobile Computing Systems and Applications, 2003. Proceedings. Fifth IEEE Workshop on. :170-179.
Ray A, Cleaveland R.  2004.  Formal Modeling Of Middleware-based Distributed Systems. Electronic Notes in Theoretical Computer Science. 108:21-37.
Ramasamy HV, Cukier M, Sanders WH.  2002.  Formal specification and verification of a group membership protocol for an intrusion-tolerant group communication system. :9-18.
Ramasamy HV, Cukier M, Sanders WH.  2003.  Formal verification of an intrusion-tolerant group membership protocol. IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS E SERIES D. 86(12):2612-2622.
Canetti R, Halevi S, Katz J.  2007.  A forward-secure public-key encryption scheme. Journal of Cryptology. 20(3):265-294.
Canetti R, Halevi S, Katz J.  2003.  A forward-secure public-key encryption scheme. Advances in Cryptology—Eurocrypt 2003. :646-646.
Shaman J., Solomon S., Colwell RR, Field C.B.  2013.  Fostering advances in interdisciplinary climate science. Proceedings of the National Academy of Sciences. (Supplement_114869243Supplement_1):3653-3656.
Chan TF, Elman H.  1989.  Fourier Analysis of Iterative Methods for Elliptic Problems. SIAM Review. 31(1):20-49.
Methé BA, Nelson KE, Pop M, Creasy HH, Giglio MG, Huttenhower C, Gevers D, Petrosino JF, Abubucker S, Badger JH.  2012.  A framework for human microbiome research. Nature. 486:215-221.
Corrada Bravo H, Page D, Ramakrishnan R, Shavlik J, Costa VS.  2005.  A framework for set-oriented computation in inductive logic programming and its application in generalizing inverse entailment. Inductive Logic Programming. :69-86.
Corrada Bravo H, Page D, Ramakrishnan R, Shavlik J, Costa VS.  2005.  A framework for set-oriented computation in inductive logic programming and its application in generalizing inverse entailment. Inductive Logic Programming. :69-86.
Mendonca MG, Maldonado JC, de Oliveira MCF, Carver J, Fabbri CPF, Shull F, Travassos GH, Hohn EN, Basili VR.  2008.  A Framework for Software Engineering Experimental Replications. Engineering of Complex Computer Systems, 2008. ICECCS 2008. 13th IEEE International Conference on. :203-212.
Varna AL, Chuang WH, Wu M.  2010.  A framework for theoretical analysis of content fingerprinting. Proc. of SPIE Media Forensics and Security.
Colwell RR, Faruque SM, Nair GB.  2004.  Free-Living to Freewheeling: The Evolution of Vibrio cholerae from Innocence to Infamy. Infectious Disease and Host-Pathogen EvolutionInfectious Disease and Host-Pathogen Evolution. :198-198.
Cukier M, Arlat J, Powell D.  1998.  Frequentist and Bayesian Coverage Estimations for Stratified Fault-Injection. DEPENDABLE COMPUTING AND FAULT TOLERANT SYSTEMS. 11:43-62.

Pages