Publications

Export 7151 results:
Author Title [ Type(Desc)] Year
Conference Papers
Chellappa R, Zhou S, Li B.  2002.  Bayesian methods for face recognition from video. Acoustics, Speech, and Signal Processing (ICASSP), 2002 IEEE International Conference on. 4:IV-4068-IV-4071-IV-4068-IV-4071.
Daumé H, Campbell L.  2007.  A Bayesian model for discovering typological implications. ANNUAL MEETING-ASSOCIATION FOR COMPUTATIONAL LINGUISTICS. 45:65-65.
Daumé H.  2009.  Bayesian multitask learning with latent hierarchies. Proceedings of the Twenty-Fifth Conference on Uncertainty in Artificial Intelligence. :135-142.
Daumé H, Marcu D.  2006.  Bayesian query-focused summarization. Proceedings of the 21st International Conference on Computational Linguistics and the 44th annual meeting of the Association for Computational Linguistics. :305-312.
Qian G, Chellappa R, Zheng Q.  2002.  Bayesian structure from motion using inertial information. Image Processing. 2002. Proceedings. 2002 International Conference on. 3:III-425-III-428vol.3-III-425-III-428vol.3.
Daumé H, Marcu D.  2005.  Bayesian summarization at DUC and a suggestion for extrinsic evaluation. Document understanding conference.
Gupta P, Doermann D, DeMenthon D.  2002.  Beam Search for Feature Selection in Automatic SVMDefect Classification. International Conference on Pattern Recognition. :212-215.
Bilge L, Dumitras T.  2012.  Before We Knew It: An Empirical Study of Zero-day Attacks in the Real World. CCS '12 Proceedings of the 2012 ACM conference on Computer and Communications Security. :833-844.
Perdisci R, Lee W, Feamster N.  2010.  Behavioral clustering of HTTP-based malware and signature generation using malicious network traces. Proceedings of the 7th USENIX conference on Networked systems design and implementation. :26-26.
Anand P, King J, Boyd-Graber J, Wagner E, Martell C, Oard D, Resnik P.  2011.  Believe Me—We Can Do This! Annotating Persuasive Acts in Blog Text. Workshops at the Twenty-Fifth AAAI Conference on Artificial Intelligence.
Bertini E, Perer A, Plaisant C, Santucci G.  2008.  BELIV'08: Beyond time and errors: novel evaluation methods for information visualization. CHI '08 extended abstracts on Human factors in computing systems. :3913-3916.
Hollingsworth J, Guven E, Akinlar C.  1998.  Benchmarking a network of PCs running parallel applications. Performance, Computing and Communications, 1998. IPCCC '98., IEEE International. :1-7.
Vishkin U, Smolyaninov I.  2004.  Bending light for multi-chip virtual PRAMs? Proc. 3rd Workshop on Non-Slicon Computation, held in conjunction with the 31st International Symposium on Computer Architecture (ISCA 2004). :19-23.
Goldberg L A, Paterson M, Srinivasan A, Sweedyk E.  1997.  Better approximation guarantees for job-shop scheduling. Proceedings of the eighth annual ACM-SIAM symposium on Discrete algorithms. :599-608.
Nikolova S, Boyd-Graber J, Fellbaum C, Cook P.  2009.  Better vocabularies for assistive communication aids: connecting terms using semantic networks and untrained annotators. Proceedings of the 11th international ACM SIGACCESS conference on Computers and accessibility. :171-178.
Friedman B, Levenson N, Shneiderman B, Suchman L, Winograd T.  1994.  Beyond accuracy, reliability, and efficiency: criteria for a good computer system. Conference companion on Human factors in computing systems. :195-198.
Shneiderman B.  1993.  Beyond the graphical user interface (abstract). Proceedings of the 1993 ACM conference on Computer science. :510–-510–.
Lumezanu C, Feamster N, Klein H.  2012.  #bias: Measuring the Tweeting Behavior of Propagandists. Sixth International AAAI Conference on Weblogs and Social Media.
Vishkin U.  1992.  Biconnectivity Approximations and Graph Carvings. Proceedings of the Twenty-fourth Annual ACM Symposium on the Theory of Computing, Victoria, British Columbia, Canada, May 4-6, 1992. :759-759.
Yahav I, Raschid L, Andrade H.  2007.  Bid based scheduler with backfilling for a multiprocessor system. Proceedings of the ninth international conference on Electronic commerce. :459-468.
Fomin EDDFV, Hajiaghayi MT, Thilikos DM.  2004.  Bidimensional Parameters and Local Treewidth. Latin 2004: Theoretical Informatics: 6th Latin American Symposium, Buenos Aires, Argentina, April 5-8, 2004: Proceedings. :109-109.
Bitsakos K, Yi H, Yi L, Fermüller C.  2008.  Bilateral symmetry of object silhouettes under perspective projection. 19th International Conference on Pattern Recognition, 2008. ICPR 2008. :1-4.
Shet VD, Neumann J, Ramesh V, Davis LS.  2007.  Bilattice-based Logical Reasoning for Human Detection. Computer Vision and Pattern Recognition, 2007. CVPR '07. IEEE Conference on. :1-8.
Wolf C, Doermann D.  2002.  Binarization of low quality text using a Markov random field model. Pattern Recognition, 2002. Proceedings. 16th International Conference on. 3:160-163vol.3-160-163vol.3.
Elaine Shi, Perrig A, Van Doorn L.  2005.  BIND: a fine-grained attestation service for secure distributed systems. :154-168.

Pages