Publications

Export 620 results:
Author Title [ Type(Desc)] Year
Filters: First Letter Of Last Name is T  [Clear All Filters]
Conference Papers
Aiken A, Foster JS, Kodumal J, Terauchi T.  2003.  Checking and inferring local non-aliasing. ACM SIGPLAN Notices. 38:129-140.
Shneiderman B, Card S, Norman DA, Tremaine M, Waldrop MM.  2002.  CHI@20: fighting our way from marginality to power. CHI '02 extended abstracts on Human factors in computing systems. :688-691.
Trappe W, M. Wu, Liu KJR.  2002.  Collusion-resistant fingerprinting for multimedia. Acoustics, Speech, and Signal Processing (ICASSP), 2002 IEEE International Conference on. 4:IV-3309-IV-3312-IV-3309-IV-3312.
Templeton T C, Fleischmann KR, Boyd-Graber J.  2011.  Comparing values and sentiment using Mechanical Turk. Proceedings of the 2011 iConference. :783-784.
Tsoumakos D, Roussopoulos N.  2003.  A comparison of peer-to-peer search methods. Proceedings of the Sixth International Workshop on the Web and Databases.
Thakur A, Gupta SK.  2010.  A Computational Framework for Real-Time Unmanned Sea Surface Vehicle Motion Simulation. 3:51-61.
Srinivasan A, Teo C-P.  1997.  A constant-factor approximation algorithm for packet routing, and balancing local vs. global criteria. Proceedings of the twenty-ninth annual ACM symposium on Theory of computing. :636-643.
Teo CL, Yang Y, Daumé H, Fermüller C, Aloimonos Y.  2011.  A Corpus-Guided Framework for Robotic Visual Perception. Workshops at the Twenty-Fifth AAAI Conference on Artificial Intelligence.
M. Wu, Tang E, Lin B.  2000.  Data hiding in digital binary image. Multimedia and Expo, 2000. ICME 2000. 2000 IEEE International Conference on. 1:393-396vol.1-393-396vol.1.
Taylor RW, Fry JP, Shneiderman B, Smith DCP, Su SYW.  1979.  Database Program Conversion: A Framework For Research. Fifth International Conference on Very Large Data Bases, 1979. :299-312.
Feamster N, Nayak A, Kim H, Clark R, Mundada Y, Ramachandran A, bin Tariq M.  2010.  Decoupling policy from configuration in campus and enterprise networks. Local and Metropolitan Area Networks (LANMAN), 2010 17th IEEE Workshop on. :1-6.
Jorstad A, Jacobs DW, Trouve A.  2011.  A deformation and lighting insensitive metric for face recognition based on dense correspondences. Computer Vision and Pattern Recognition (CVPR), 2011 IEEE Conference on. :2353-2360.
Tanin E, Beigel R, Shneiderman B.  1997.  Design and evaluation of incremental data structures and algorithms for dynamic query interfaces. IEEE Symposium on Information Visualization, 1997. Proceedings. :81-86.
Alborzi H, Druin A, Montemayor J, Platner M, Porteous J, Sherman L, Boltman A, Taxén G, Best J, Hammer J et al..  2000.  Designing StoryRooms: interactive storytelling spaces for children. Proceedings of the 3rd conference on Designing interactive systems: processes, practices, methods, and techniques. :95-104.
Shankar U, Talwar K, Foster JS, Wagner D.  2001.  Detecting format string vulnerabilities with type qualifiers. Proceedings of the 10th conference on USENIX Security Symposium-Volume 10. :16-16.
Chetty M, Tucker W, Blake E.  2004.  Developing Locally Relevant Software Applications for Rural Areas: A South African Example. SAICSIT '04. :239-243.
Lindsay FE, Townshend JRG, JaJa JF, Humphries J, Plaisant C, Shneiderman B.  1999.  Developing the next generation of Earth science data systems: the Global Land Cover Facility. Geoscience and Remote Sensing Symposium, 1999. IGARSS '99 Proceedings. IEEE 1999 International. 1:616-618vol.1-616-618vol.1.
Tabatabaee V, Bhattacharjee B, La RJ, Shayman MA.  2005.  Differentiated traffic engineering for QoS provisioning. INFOCOM 2005. 24th Annual Joint Conference of the IEEE Computer and Communications Societies. Proceedings IEEE. 4:2349-2359vol.4-2349-2359vol.4.
Don A, Zheleva E, Gregory M, Tarkan S, Auvil L, Clement T, Shneiderman B, Plaisant C.  2007.  Discovering interesting usage patterns in text collections: integrating text mining with visualization. Proceedings of the sixteenth ACM conference on Conference on information and knowledge management. :213-222.
Cunha Í, Teixeira R, Feamster N, Diot C.  2008.  Distinguishing persistent failures from transient losses. Proceedings of the 2008 ACM CoNEXT Conference. :50:1–50:2-50:1–50:2.
Naacke H, Kapitskaia O, Tomasic A, Bonnet P, Raschid L, Amouroux R.  1997.  The distributed information search component (disco) and the world wide web. Proc. of ACM SIGMOD Conf. on Management of Data.
Tanin E, Harwood A, Samet H.  2005.  A distributed quadtree index for peer-to-peer settings. PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON DATA ENGINEERING. 21:254-254.
Wagstrom P, Martino J, von Kaenel J, Chetty M, Thomas J, Jones L.  2011.  A Dive into Online Community Properties. CSCW '11. :725-728.
Tammara TAC, Bederson BB.  1999.  Does zooming improve image browsing. Proceedings of the fourth ACM conference on Digital libraries. :130-137.
Erway C, Küp\ccü A, Papamanthou C, Tamassia R.  2009.  Dynamic Provable Data Possession. CCS '09 Proceedings of the 16th ACM Conference on Computer and Communications Security . :213-222.

Pages