Publications

Search
Export 7150 results:
Author [ Title(Desc)] Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
W
Istrail S, Sutton GG, Florea L, Halpern AL, Mobarry CM, Lippert R, Walenz B, Shatkay H, Dew I, Miller JR et al..  2004.  Whole-genome shotgun assembly and comparison of human genome assemblies. Proceedings of the National Academy of Sciences of the United States of America. 101(7):1916-1916.
Chetty M, Banks R, Harper R, Regan T, Sellen A, Gkantsidis C, Karagiannis T, Key P.  2010.  Who's Hogging the Bandwidth: The Consequences of Revealing the Invisible in the Home. SIGCHI '10. :659-668.
O'Leary DP.  1995.  Why Broyden's Nonsymmetric Method Terminates on Linear Equations. SIAM Journal on Optimization. 5:231-235.
Kembhavi A, Tom Yeh, Davis LS.  2010.  Why Did the Person Cross the Road (There)? Scene Understanding Using Probabilistic Logic Models and Common Sense Reasoning Computer Vision – ECCV 2010. 6312:693-706.
Zotenko E, Mestre J, O'Leary DP, Przytycka TM.  2008.  Why Do Hubs in the Yeast Protein Interaction Network Tend To Be Essential: Reexamining the Connection between the Network Topology and Essentiality. PLoS Comput BiolPLoS Comput Biol. 4(8):e1000140-e1000140.
Dumitras T, Narasimhan P.  2009.  Why Do Upgrades Fail and What Can We Do About It?: Toward Dependable, Online Upgrades in Enterprise System Middleware'09 Proceedings of the 10th ACM/IFIP/USENIX International Conference on Middleware. :18:1-18:20.
Bitansky N, Dachman-Soled D, Garg S, Jain A, Kalai YTauman, López-Alt A, Wichs D.  2013.  Why “Fiat-Shamir for Proofs” Lacks a Proof. Theory of Cryptography. :182-201.
Chetty M, Haslem D, Baird A, Ofoha U, Sumner B, Grinter R.  2011.  Why is My Internet Slow?: Making Network Speeds Visible SIGCHI '11. :1889-1898.
Shneiderman B.  2003.  Why not make interfaces better than 3D reality? IEEE Computer Graphics and Applications. 23(6):12-15.
Shneiderman B.  2005.  Why Not Make Interfaces Better than 3D Reality? (2004) Institute for Systems Research Technical Reports.
Zadorozhny V, Gal A, Raschid L, Ye Q.  2004.  Wide area performance monitoring using aggregate latency profiles. Web Engineering. :771-775.
Chowdhury AM, Chellappa R, Keaton T.  2002.  Wide baseline image registration using prior information. Multimedia Signal Processing, 2002 IEEE Workshop on. :37-40.
Roy-Chowdhury AK, Chellappa R, Keaton T.  2004.  Wide baseline image registration with application to 3-D face modeling. Multimedia, IEEE Transactions on. 6(3):423-434.
Valancius V, Feamster N, Rexford J, Nakao A.  2010.  Wide-area route control for distributed services. Proceedings of the 2010 USENIX conference on USENIX annual technical conference. :2-2.
Konte M, Feamster N.  2011.  Wide-area routing dynamics of malicious networks. Proceedings of the ACM SIGCOMM 2011 conference. :432-433.
Gumerov NA, Duraiswami R.  2009.  Wideband fast multipole accelerated boundary element methods for the three-dimensional Helmholtz equation.. The Journal of the Acoustical Society of America. 125(4):2566-2566.
Castillo CD, Jacobs DW.  2011.  Wide-baseline stereo for face recognition with large pose variation. Computer Vision and Pattern Recognition (CVPR), 2011 IEEE Conference on. :537-544.
Rand W, Blikstein P, Wilensky U.  2006.  Widgets, Planets, and Demons: the Case for the Integration of Human, Embedded, and Virtual Agents via Mediation. Proceedings of Swarmfest.
Jimmy Lin, Demner-Fushman D.  2006.  Will pyramids built of nuggets topple over? Proceedings of the main conference on Human Language Technology Conference of the North American Chapter of the Association of Computational Linguistics. :383-390.
Lifshitz J, Shneiderman B.  1991.  Window control strategies for hypertext traversal: An empirical study. Proc. 29th Annual ACM DC Technical Symposium.
Lifshitz K, Shneiderman B.  1987.  Window control strategies for on-line text traversal. Department of Computer Science and Human Computer Interaction Laboratory, University of Maryland, College Park, MD (correspondence with B. Schneiderman).
Agrawal M, Davis LS.  2004.  Window-based, discontinuity preserving stereo. Computer Vision and Pattern Recognition, 2004. CVPR 2004. Proceedings of the 2004 IEEE Computer Society Conference on. 1:I-66-I-73Vol.1-I-66-I-73Vol.1.
Chung JM, Easley GR, O'Leary DP.  2011.  Windowed Spectral Regularization of Inverse Problems. SIAM Journal on Scientific Computing. 33(6)
Shneiderman B, Alavi M, Norman K, Borkowski E Y.  1995.  Windows of opportunity in electronic classrooms. Communications of the ACM. 38(11):19-24.
Arbaugh WA, Fithen WL, McHugh J.  2000.  Windows of Vulnerability: A Case Study Analysis. Computer. 33(12):52-59.

Pages