Publications
Export 1858 results:
Author [ Title] Type Year Filters: First Letter Of Last Name is C [Clear All Filters]
2004. Finding governmental statistical data on the Web: A study of categorically organized links for the FedStats topics page. Journal of the American Society for Information Science and Technology. 55(11):1008-1015.
2005. Finding Governmental Statistical Data on the Web: Three Empirical Studies of the FedStats Topics Page (2003). Institute for Systems Research Technical Reports.
2004. Finding Governmental Statistical Data on the Web: Three Empirical Studies of the FedStats Topics Page. Journal of the American Society for Information Science and Technology. 55:1008-1015.
1994. Finding structurally consistent motion correspondences. Pattern Recognition, 1994. Vol. 1 - Conference A: Computer Vision Image Processing., Proceedings of the 12th IAPR International Conference on. 1:650-653vol.1-650-653vol.1.
2010. Finishing genomes with limited resources: lessons from an ensemble of microbial genomes. BMC Genomics. 11(1):242-242.
2009. First Steps to Netviz Nirvana: Evaluating Social Network Analysis with NodeXL. International Conference on Computational Science and Engineering, 2009. CSE '09. 4:332-339.
1999. Fisheye views. Readings in information visualizationReadings in information visualization. :311-311.
2006. Flow algorithms for two pipelined filter ordering problems. Proceedings of the twenty-fifth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems. :193-202.
2008. Flowers or a robot army?: encouraging awareness & activity with personal, mobile displays Proceedings of the 10th international conference on Ubiquitous computing. :54-63.
1999. Focus+ context. Readings in information visualizationReadings in information visualization. :306-309.
2003. Footloose: a case for physical eventual consistency and selective conflict resolution. Mobile Computing Systems and Applications, 2003. Proceedings. Fifth IEEE Workshop on. :170-179.
2004. Formal Modeling Of Middleware-based Distributed Systems. Electronic Notes in Theoretical Computer Science. 108:21-37.
2002. Formal specification and verification of a group membership protocol for an intrusion-tolerant group communication system. :9-18.
2003. Formal verification of an intrusion-tolerant group membership protocol. IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS E SERIES D. 86(12):2612-2622.
2003. A forward-secure public-key encryption scheme. Advances in Cryptology—Eurocrypt 2003. :646-646.
2013. Fostering advances in interdisciplinary climate science. Proceedings of the National Academy of Sciences. (Supplement_114869243Supplement_1):3653-3656.
2005. A framework for set-oriented computation in inductive logic programming and its application in generalizing inverse entailment. Inductive Logic Programming. :69-86.
2005. A framework for set-oriented computation in inductive logic programming and its application in generalizing inverse entailment. Inductive Logic Programming. :69-86.
2008. A Framework for Software Engineering Experimental Replications. Engineering of Complex Computer Systems, 2008. ICECCS 2008. 13th IEEE International Conference on. :203-212.
2010. A framework for theoretical analysis of content fingerprinting. Proc. of SPIE Media Forensics and Security.
2004. Free-Living to Freewheeling: The Evolution of Vibrio cholerae from Innocence to Infamy. Infectious Disease and Host-Pathogen EvolutionInfectious Disease and Host-Pathogen Evolution. :198-198.
1998. Frequentist and Bayesian Coverage Estimations for Stratified Fault-Injection. DEPENDABLE COMPUTING AND FAULT TOLERANT SYSTEMS. 11:43-62.