Publications
Export 620 results:
Author Title [ Type] Year Filters: First Letter Of Last Name is T [Clear All Filters]
2002. CHI@20: fighting our way from marginality to power. CHI '02 extended abstracts on Human factors in computing systems. :688-691.
2002. Collusion-resistant fingerprinting for multimedia. Acoustics, Speech, and Signal Processing (ICASSP), 2002 IEEE International Conference on. 4:IV-3309-IV-3312-IV-3309-IV-3312.
2011. Comparing values and sentiment using Mechanical Turk. Proceedings of the 2011 iConference. :783-784.
2003. A comparison of peer-to-peer search methods. Proceedings of the Sixth International Workshop on the Web and Databases.
2010. A Computational Framework for Real-Time Unmanned Sea Surface Vehicle Motion Simulation. 3:51-61.
1997. A constant-factor approximation algorithm for packet routing, and balancing local vs. global criteria. Proceedings of the twenty-ninth annual ACM symposium on Theory of computing. :636-643.
2011. A Corpus-Guided Framework for Robotic Visual Perception. Workshops at the Twenty-Fifth AAAI Conference on Artificial Intelligence.
2000. Data hiding in digital binary image. Multimedia and Expo, 2000. ICME 2000. 2000 IEEE International Conference on. 1:393-396vol.1-393-396vol.1.
1979. Database Program Conversion: A Framework For Research. Fifth International Conference on Very Large Data Bases, 1979. :299-312.
2010. Decoupling policy from configuration in campus and enterprise networks. Local and Metropolitan Area Networks (LANMAN), 2010 17th IEEE Workshop on. :1-6.
2011. A deformation and lighting insensitive metric for face recognition based on dense correspondences. Computer Vision and Pattern Recognition (CVPR), 2011 IEEE Conference on. :2353-2360.
1997. Design and evaluation of incremental data structures and algorithms for dynamic query interfaces. IEEE Symposium on Information Visualization, 1997. Proceedings. :81-86.
2000. Designing StoryRooms: interactive storytelling spaces for children. Proceedings of the 3rd conference on Designing interactive systems: processes, practices, methods, and techniques. :95-104.
2001. Detecting format string vulnerabilities with type qualifiers. Proceedings of the 10th conference on USENIX Security Symposium-Volume 10. :16-16.
2004. Developing Locally Relevant Software Applications for Rural Areas: A South African Example. SAICSIT '04. :239-243.
1999. Developing the next generation of Earth science data systems: the Global Land Cover Facility. Geoscience and Remote Sensing Symposium, 1999. IGARSS '99 Proceedings. IEEE 1999 International. 1:616-618vol.1-616-618vol.1.
2005. Differentiated traffic engineering for QoS provisioning. INFOCOM 2005. 24th Annual Joint Conference of the IEEE Computer and Communications Societies. Proceedings IEEE. 4:2349-2359vol.4-2349-2359vol.4.
2007. Discovering interesting usage patterns in text collections: integrating text mining with visualization. Proceedings of the sixteenth ACM conference on Conference on information and knowledge management. :213-222.
2008. Distinguishing persistent failures from transient losses. Proceedings of the 2008 ACM CoNEXT Conference. :50:1–50:2-50:1–50:2.
1997. The distributed information search component (disco) and the world wide web. Proc. of ACM SIGMOD Conf. on Management of Data.
2005. A distributed quadtree index for peer-to-peer settings. PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON DATA ENGINEERING. 21:254-254.
1999. Does zooming improve image browsing. Proceedings of the fourth ACM conference on Digital libraries. :130-137.
2009. Dynamic Provable Data Possession. CCS '09 Proceedings of the 16th ACM Conference on Computer and Communications Security . :213-222.