Publications

Export 3364 results:
Author Title Type [ Year(Asc)]
Filters: First Letter Of Last Name is S  [Clear All Filters]
2008
Gerevini A, Kuter U, Nau DS, Saetti A, Waisbrot N.  2008.  Combining Domain-Independent Planning and HTN Planning: The Duet Planner. :573-577.
Wu PF, Qu Y, Preece J, Fleischmann K, Golbeck J, Jaeger P, Shneiderman B.  2008.  Community response grid (CRG) for a university campus: Design requirements and implications. Proceedings of the 5th International ISCRAM Conference. :34-43.
Berthier R, Korman D, Cukier M, Hiltunen M, Vesonder G, Sheleheda D.  2008.  On the Comparison of Network Attack Datasets: An Empirical Analysis. :39-48.
Samet H.  2008.  Complexity and Accessibility: Sorting in space: multidimensional, spatial, and metric data structures for CG applications. International Conference on Computer Graphics and Interactive Techniques.
Reddy D, Sankaranarayanan AC, Cevher V, Chellappa R.  2008.  Compressed sensing for multi-view tracking and 3-D voxel reconstruction. Image Processing, 2008. ICIP 2008. 15th IEEE International Conference on. :221-224.
Cevher V, Sankaranarayanan A, Duarte M, Reddy D, Baraniuk R, Chellappa R.  2008.  Compressive sensing for background subtraction. Computer Vision–ECCV 2008. :155-168.
Essien K, Hannenhalli S, Stoeckert CJ.  2008.  Computational Analysis of Constraints on Noncoding Regions, Coding Regions and Gene Expression in Relation to Plasmodium Phenotypic Diversity. PLoS ONEPLoS ONE. 3(9):e3122-e3122.
Martinez V, Simari GI, Sliva A, V.S. Subrahmanian.  2008.  Computational cultural dynamics. IEEE intelligent systems. 23(4):51-57.
Martinez V, Simari GI, Sliva A, V.S. Subrahmanian.  2008.  Computational cultural dynamics. IEEE intelligent systems. 23(4):51-57.
Martinez V, Simari GI, Sliva A, V.S. Subrahmanian.  2008.  Computational cultural dynamics. IEEE intelligent systems. 23(4):51-57.
Chellappa R, Cuntoor NP, Joo SW, V.S. Subrahmanian, Turaga P.  2008.  Computational Vision Approaches for Event Modeling. Understanding Events. 1(9):473-522.
Stantchev G, Juba D, Dorland W, Varshney A.  2008.  Confluent Volumetric Visualization of Gyrokinetic Turbulence. Plasma Science, IEEE Transactions on. 36(4):1112-1113.
Albanese M, Chellappa R, Moscato V, Picariello A, V.S. Subrahmanian, Turaga P, Udrea O.  2008.  A Constrained Probabilistic Petri Net Framework for Human Activity Detection in Video. Multimedia, IEEE Transactions on. 10(6):982-996.
Deshmukh AS, Banerjee A G, Gupta SK, Sriram RD.  2008.  Content-based assembly search: A step towards assembly reuse. Computer-Aided Design. 40(2):244-261.
Martinez V, Simari GI, Sliva A, V.S. Subrahmanian.  2008.  CONVEX: Similarity-Based Algorithms for Forecasting Group Behavior. Intelligent Systems, IEEE. 23(4):51-57.
Martinez V, Simari GI, Sliva A, V.S. Subrahmanian.  2008.  CONVEX: Similarity-Based Algorithms for Forecasting Group Behavior. Intelligent Systems, IEEE. 23(4):51-57.
Martinez V, Simari GI, Sliva A, V.S. Subrahmanian.  2008.  CONVEX: Similarity-Based Algorithms for Forecasting Group Behavior. Intelligent Systems, IEEE. 23(4):51-57.
Shneiderman B.  2008.  Copernican challenges face those who suggest that collaboration, not computation are the driving energy for socio-technical systems that characterize Web 2.0.. Science. 319:1349-1350.
Gupta A, Srinivasan A, Tardos É.  2008.  Cost-Sharing Mechanisms for Network Design. Algorithmica. 50(1):98-119.
Stonedahl F, Rand W, Wilensky U.  2008.  CrossNet: a framework for crossover with network-based chromosomal representations. Proceedings of the 10th annual conference on Genetic and evolutionary computation. :1057-1064.
Zhao H, Plaisant C, Shneiderman B, Lazar J.  2008.  Data Sonification for Users with Visual Impairment: A Case Study with Georeferenced Data. ACM Trans. Comput.-Hum. Interact.. 15(1):4:1–4:28-4:1–4:28.
Varna AL, Swaminathan A, M. Wu.  2008.  A decision theoretic framework for analyzing binary hash-based content identification systems. Proceedings of the 8th ACM workshop on Digital rights management. :67-76.
Elaine Shi, Waters B.  2008.  Delegating Capabilities in Predicate Encryption Systems. Automata, Languages and Programming. 5126:560-578.
Fei Wu P, Qu Y, Fleischmann K, Golbeck J, Jaeger P, Preece J, Shneiderman B.  2008.  Designing community-based emergency communication system: A preliminary study. Proceedings of the American Society for Information Science and Technology. 45(1):1-3.
Swaminathan A, M. Wu, Liu KJR.  2008.  Digital image forensics via intrinsic fingerprints. Information Forensics and Security, IEEE Transactions on. 3(1):101-117.

Pages