Publications

Export 1830 results:
Author Title [ Type(Desc)] Year
Filters: First Letter Of Last Name is D  [Clear All Filters]
Book Chapters
Dix J, Kuter U, Nau DS.  2003.  Planning in Answer Set Programming Using Ordered Task Decomposition. KI 2003: Advances in Artificial Intelligence. 2821:490-504.
Deshpande A.  2009.  PrDB: Managing Large-Scale Correlated Probabilistic Databases (Abstract). Scalable Uncertainty ManagementScalable Uncertainty Management. 5785:1-1.
Wang L, Deshpande A.  2008.  Predictive Modeling-Based Data Collection in Wireless Sensor Networks. Wireless Sensor NetworksWireless Sensor Networks. 4913:34-51.
Hori O, Doermann D.  1996.  Quantitative Measurement of the Performance of Raster-to-vector Conversion Algorithms. Graphics Recognition: Methods and ApplicationsGraphics Recognition: Methods and Applications. :57-68.
Pemmaraju S, Srinivasan A.  2008.  The Randomized Coloring Procedure with Symmetry-Breaking. Automata, Languages and ProgrammingAutomata, Languages and Programming. 5125:306-319.
Tulyakov S, Jaeger S, Govindaraju V, Doermann D.  2008.  Review of Classifier Combination Methods. Studies in Computational Intelligence: Machine Learning in Document Analysis and RecognitionStudies in Computational Intelligence: Machine Learning in Document Analysis and Recognition. :361-386.
Dachman-Soled D, Malkin T, Raykova M, Yung M.  2011.  Secure Efficient Multiparty Computing of Multivariate Polynomials and Applications. Applied Cryptography and Network Security. :130-146.
Dachman-Soled D, Kalai YTauman.  2012.  Securing Circuits against Constant-Rate Tampering. Advances in Cryptology – CRYPTO 2012. :533-551.
De Floriani L, Lee M.  2004.  Selective refinement on nested tetrahedral meshes. Geometric Modeling for Scientific VisualizationGeometric Modeling for Scientific Visualization. :329-344.
Zajic D, Dorr BJ, Lin J, O'Leary DP, Conroy JM, Schlesinger JD.  2006.  Sentence Trimming and Selection: Mixing and Matching. DUC 06 Conference Proceedings.
Choi SGeol, Dachman-Soled D, Malkin T, Wee H.  2009.  Simple, Black-Box Constructions of Adaptively Secure Protocols. Theory of Cryptography. :387-402.
Fermüller C, Aloimonos Y.  2001.  Statistics Explains Geometrical Optical Illusions. Foundations of Image UnderstandingFoundations of Image Understanding. 628:409-445.
Dorr BJ, Jordan PW, Benoit JW.  1999.  A Survey of Current Paradigms in Machine Translation. Advances in Computers. Volume 49:1-68.
O'Leary DP.  1995.  The SVD in Image Restoration. SVD and Signal Processing III: Algorithms, Architectures, and ApplicationsSVD and Signal Processing III: Algorithms, Architectures, and Applications. :315-322.
Dorr BJ, Habash N, Traum D.  1998.  A Thematic Hierarchy for Efficient Generation from Lexical-Conceptual Structure. Machine Translation and the Information SoupMachine Translation and the Information Soup. 1529:333-343.
Dix J, Munoz-Avila H, Nau DS, Zhang L.  2002.  Theoretical and Empirical Aspects of a Planner in a Multi-agent Environment. Logics in Artificial Intelligence. 2424:173-185.
Feamster N, Balazinska M, Wang W, Balakrishnan H, Karger D.  2003.  Thwarting Web Censorship with Untrusted Messenger Discovery. Privacy Enhancing TechnologiesPrivacy Enhancing Technologies. 2760:125-140.
Chang Y, Raschid L, Dorr BJ.  1994.  Transforming queries from a relational schema to an object schema: A prototype based on F-logic. Methodologies for Intelligent SystemsMethodologies for Intelligent Systems. 869:154-163.
Dorr BJ.  1992.  A two-level knowledge representation for machine translation: Lexical semantics and tense/aspect. Lexical Semantics and Knowledge RepresentationLexical Semantics and Knowledge Representation. 627:269-287.
Varadan R, Assfalg M, Fushman D.  2005.  Using NMR Spectroscopy to Monitor Ubiquitin Chain Conformation and Interactions with Ubiquitin‐Binding Domains. Ubiquitin and Protein Degradation, Part B. Volume 399:177-192.
Massa P, Bhattacharjee B.  2004.  Using Trust in Recommender Systems: An Experimental Analysis. Trust ManagementTrust Management. 2995:221-235.
Eaton C, Plaisant C, Drizd T.  2005.  Visualizing Missing Data: Graph Interpretation User Study. Human-Computer Interaction - INTERACT 2005. 3585:861-872.
Froehlich J, Chen M, Smith I, Potter F.  2006.  Voting with Your Feet: An Investigative Study of the Relationship Between Place Visit Behavior and Preference. UbiComp 2006: Ubiquitous Computing. 4206:333-350.
Kembhavi A, Tom Yeh, Davis LS.  2010.  Why Did the Person Cross the Road (There)? Scene Understanding Using Probabilistic Logic Models and Common Sense Reasoning Computer Vision – ECCV 2010. 6312:693-706.
Kembhavi A, Tom Yeh, Davis LS.  2010.  Why Did the Person Cross the Road (There)? Scene Understanding Using Probabilistic Logic Models and Common Sense Reasoning Computer Vision – ECCV 2010. 6312:693-706.

Pages