Publications

Export 853 results:
Author [ Title(Desc)] Type Year
Filters: First Letter Of Last Name is F  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
B
Fong A, Ashktorab Z, Froehlich J.  2013.  Bear-with-me: an embodied prototype to explore tangible two-way exchanges of emotional language. CHI'13 Extended Abstracts on Human Factors in Computing Systems.
Fong A, Ashktorab Z, Froehlich J.  2013.  Bear-with-me: an embodied prototype to explore tangible two-way exchanges of emotional language. CHI'13 Extended Abstracts on Human Factors in Computing Systems.
Duderstadt J, Arms W, Messina P, Ellisman M, Atkins D, Fox E, Shneiderman B, Nissenbaum H, Lederberg J.  2001.  Becoming a Scholar in the Digital Age.
Perdisci R, Lee W, Feamster N.  2010.  Behavioral clustering of HTTP-based malware and signature generation using malicious network traces. Proceedings of the 7th USENIX conference on Networked systems design and implementation. :26-26.
Aloimonos Y, Duriç Z, Fermüller C, Huang L, Rivlin E, Sharma R.  1992.  Behavioral Visual Motion Analysis,". Proceedings, DARPA Image Understanding Workshop. :521-541.
Ji H, Fermüller C.  2007.  Better flow estimation from color images. EURASIP Journal on Advances in Signal Processing. 2007(1):133-133.
Ji H, Fermüller C.  2010.  Better Flow Estimation from Color Images-Volume 2007, Article ID 53912, 9 pages. EURASIP Journal on Advances in Signal Processing. 2007(23)
Nikolova S, Boyd-Graber J, Fellbaum C, Cook P.  2009.  Better vocabularies for assistive communication aids: connecting terms using semantic networks and untrained annotators. Proceedings of the 11th international ACM SIGACCESS conference on Computers and accessibility. :171-178.
Friedman B, Levenson N, Shneiderman B, Suchman L, Winograd T.  1994.  Beyond accuracy, reliability, and efficiency: criteria for a good computer system. Conference companion on Human factors in computing systems. :195-198.
Phelps C, Madhavan G, Rappuoli R, Colwell RR, Fineberg H.  2017.  Beyond cost-effectiveness: Using systems analysis for infectious disease preparedness. Vaccine. 35:A46-A49.
Brodský T, Fermüller C, Aloimonos Y.  1998.  Beyond the Epipolar Constraint: Integrating 3D Motion and Structure Estimation. 3D Structure from Multiple Images of Large-Scale Environments3D Structure from Multiple Images of Large-Scale Environments. 1506:109-123.
Ji H, Fermüller C.  2004.  Bias in Shape Estimation. Computer Vision - ECCV 2004Computer Vision - ECCV 2004. 3023:405-416.
Fermüller C, Aloimonos Y, Malm H.  2002.  Bias in visual motion processes: A theory predicting illusions. Statistical Methods in Video Processing.(in conjunction with European Conference on Computer Vision).
Lumezanu C, Feamster N, Klein H.  2012.  #bias: Measuring the Tweeting Behavior of Propagandists. Sixth International AAAI Conference on Weblogs and Social Media.
Fomin EDDFV, Hajiaghayi MT, Thilikos DM.  2004.  Bidimensional Parameters and Local Treewidth. Latin 2004: Theoretical Informatics: 6th Latin American Symposium, Buenos Aires, Argentina, April 5-8, 2004: Proceedings. :109-109.
Bitsakos K, Yi H, Yi L, Fermüller C.  2008.  Bilateral symmetry of object silhouettes under perspective projection. 19th International Conference on Pattern Recognition, 2008. ICPR 2008. :1-4.
Florczyk SJ, Simon M, Juba D, P. Pine S, Sarkar S, Chen D, Baker PJ, Bodhak S, Cardone A, Brady MC et al..  2017.  A Bioinformatics 3D Cellular Morphotyping Strategy for Assessing Biomaterial Scaffold Niches. ACS Biomaterials Science & Engineering. 3(10):2302-2313.
Farrell R, Oza O, Zhang N, Morariu VI, Darrell T, Davis LS.  2011.  Birdlets: Subordinate categorization using volumetric primitives and pose-normalized appearance. Computer Vision (ICCV), 2011 IEEE International Conference on. :161-168.
Ramachandran A, Sarma AD, Feamster N.  2007.  Bitstore: An incentive-compatible solution for blocked downloads in bittorrent. Proc. Joint Workshop on The Economics of Networked Systems and Incentive-Based Computing (NetEcon).
Zhang J, Luo X, Perdisci R, Gu G, Lee W, Feamster N.  2011.  Boosting the scalability of botnet detection using adaptive traffic sampling. Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security. :124-134.
Feamster N, Mao Z M, Rexford J.  2004.  BorderGuard: detecting cold potatoes from peers. Proceedings of the 4th ACM SIGCOMM conference on Internet measurement. :213-218.
Fernández JA, Minker J.  1995.  Bottom-up computation of perfect models for disjunctive theories. The Journal of logic programming. 25(1):33-51.
Sundaresan S, de Donato W, Feamster N, Teixeira R, Crawford S, Pescapè A.  2011.  Broadband internet performance: A view from the gateway. SIGCOMM-Computer Communication Review. 41(4):134-134.
Ramachandran A, Seetharaman S, Feamster N, Vazirani V.  2007.  Building a Better Mousetrap. GIT-CSS-07-01
Antonakakis M, Perdisci R, Dagon D, Lee W, Feamster N.  2010.  Building a dynamic reputation system for DNS. 19th Usenix Security Symposium.

Pages