Publications

Export 927 results:
Author Title [ Type(Desc)] Year
Filters: First Letter Of Last Name is W  [Clear All Filters]
Conference Papers
Drury J, Resnik P, Weinberg A, Gennari S, Aoshima S.  2002.  Argument structure saturation in a constraint based model.
Webber W, Oard D, Scholer F, Hedin B.  2010.  Assessor error in stratified evaluation. Proceedings of the 19th ACM international conference on Information and knowledge management. :539-548.
M. Wu, Liu B.  1999.  Attacks on digital watermarks. Signals, Systems, and Computers, 1999. Conference Record of the Thirty-Third Asilomar Conference on. 2:1508-1512vol.2-1508-1512vol.2.
Tamizi M, Weinstein M, Cukier M.  2005.  Automated checking for Windows host vulnerabilities. :10pp.-148-10pp.-148.
Oh S, Hoogs A, Perera A, Cuntoor N, Chen C-C, Lee J T, Mukherjee S, Aggarwal JK, Lee H, Davis LS et al..  2011.  AVSS 2011 demo session: A large-scale benchmark dataset for event recognition in surveillance video. Advanced Video and Signal-Based Surveillance (AVSS), 2011 8th IEEE International Conference on. :527-528.
Froehlich J, Wobbrock JO, Kane SK.  2007.  Barrier pointing: using physical edges to assist target acquisition on mobile device touch screens. Proceedings of the 9th international ACM SIGACCESS conference on Computers and accessibility, October. :15-17.
Anand P, King J, Boyd-Graber J, Wagner E, Martell C, Oard D, Resnik P.  2011.  Believe Me—We Can Do This! Annotating Persuasive Acts in Blog Text. Workshops at the Twenty-Fifth AAAI Conference on Artificial Intelligence.
Friedman B, Levenson N, Shneiderman B, Suchman L, Winograd T.  1994.  Beyond accuracy, reliability, and efficiency: criteria for a good computer system. Conference companion on Human factors in computing systems. :195-198.
Wolf C, Doermann D.  2002.  Binarization of low quality text using a Markov random field model. Pattern Recognition, 2002. Proceedings. 16th International Conference on. 3:160-163vol.3-160-163vol.3.
Hwa R, Resnik P, Weinberg A.  2002.  Breaking the resource bottleneck for multilingual applications.
Shneiderman B, Colwell RR, Diamond S, Greenhalgh P, Wulf W.  2007.  Bridging art and science with creativity support tools. Proceedings of the 6th ACM SIGCHI conference on Creativity & cognition. :309-309.
Caragea GC, Saybasili AB, Wen X, Vishkin U.  2009.  Brief announcement: performance potential of an easy-to-program PRAM-on-chip prototype versus state-of-the-art processor. Proceedings of the twenty-first annual symposium on Parallelism in algorithms and architectures. :163-165.
Khuller S, Kim Y-A, Wan Y-C J.  2005.  Broadcasting on networks of workstations. Proceedings of the seventeenth annual ACM symposium on Parallelism in algorithms and architectures. :279-288.
Ko D-I, Won N, Bhattacharyya SS.  2010.  Buffer management for multi-application image processing on multi-core platforms: Analysis and case study. 2010 IEEE International Conference on Acoustics Speech and Signal Processing (ICASSP). :1662-1665.
Williams CC, Hollingsworth J.  2004.  Bug driven bug finders. Proceedings of the International Workshop on Mining Software Repositories. :70-74.
Oard D, Soergel D, Doermann D, Huang X, Murray CG, Wang J, Ramabhadran B, Franz M, Gustman S, Mayfield J et al..  2004.  Building an information retrieval test collection for spontaneous conversational speech. Proceedings of the 27th annual international ACM SIGIR conference on Research and development in information retrieval. :41-48.
Tsui C, Wang P, Fleischmann KR, Sayeed AB, Weinberg A.  2010.  Building an IT Taxonomy with Co-occurrence Analysis, Hierarchical Clustering, and Multidimensional Scaling.
Tsui C, Wang P, Fleischmann KR, Sayeed AB, Weinberg A.  2010.  Building an IT Taxonomy with Co-occurrence Analysis, Hierarchical Clustering, and Multidimensional Scaling.
He S, M. Wu.  2005.  Building efficient and effective multimedia fingerprints via joint coding and embedding. Proceedings of the 7th workshop on Multimedia and security. :127-136.
Tom Yeh, White B, San Pedro J, Katz B, Davis LS.  2011.  A case for query by image and text content: searching computer help using screenshots and keywords. Proceedings of the 20th international conference on World wide web. :775-784.
Tom Yeh, White B, San Pedro J, Katz B, Davis LS.  2011.  A case for query by image and text content: searching computer help using screenshots and keywords. Proceedings of the 20th international conference on World wide web. :775-784.
Dyer C, Weese J, Setiawan H, Lopez A, Ture F, Eidelman V, Ganitkevitch J, Blunsom P, Resnik P.  2010.  cdec: A decoder, alignment, and learning framework for finite-state and context-free translation models. Proceedings of the ACL 2010 System Demonstrations. :7-12.
Dogan RI, Getoor L, Wilbur WJ.  2007.  Characterizing RNA Secondary-Structure Features and Their Effects on Splice-Site Prediction. Data Mining Workshops, 2007. ICDM Workshops 2007. Seventh IEEE International Conference on. :89-94.
Shneiderman B, Card S, Norman DA, Tremaine M, Waldrop MM.  2002.  CHI@20: fighting our way from marginality to power. CHI '02 extended abstracts on Human factors in computing systems. :688-691.
Druin A, Weeks A, Massey S, Bederson BB.  2007.  Children's interests and concerns when using the international children's digital library: a four-country case study. Proceedings of the 7th ACM/IEEE-CS joint conference on Digital libraries. :167-176.

Pages