Publications

Export 1254 results:
Author Title [ Type(Asc)] Year
Filters: First Letter Of Last Name is G  [Clear All Filters]
Conference Papers
Licamele L, Bilgic M, Getoor L, Roussopoulos N.  2005.  Capital and benefit in social networks. Proceedings of the 3rd international workshop on Link discovery. :44-51.
Feamster N, Gray A.  2008.  Can great research be taught?: independent research with cross-disciplinary thinking and broader impact Proceedings of the 39th SIGCSE technical symposium on Computer science education. :471-475.
Deshpande A, Nath S, Gibbons PB, Seshan S.  2003.  Cache-and-query for wide area sensor databases. Proceedings of the 2003 ACM SIGMOD international conference on Management of data. :503-514.
Oard D, Soergel D, Doermann D, Huang X, Murray CG, Wang J, Ramabhadran B, Franz M, Gustman S, Mayfield J et al..  2004.  Building an information retrieval test collection for spontaneous conversational speech. Proceedings of the 27th annual international ACM SIGIR conference on Research and development in information retrieval. :41-48.
Shneiderman B, Colwell RR, Diamond S, Greenhalgh P, Wulf W.  2007.  Bridging art and science with creativity support tools. Proceedings of the 6th ACM SIGCHI conference on Creativity & cognition. :309-309.
Bobba RB, Eschenauer L, Gligor V, Arbaugh WA.  2003.  Bootstrapping security associations for routing in mobile ad-hoc networks. IEEE Global Telecommunications Conference, 2003. GLOBECOM '03. 3:1511-1515vol.3-1511-1515vol.3.
Zhang J, Luo X, Perdisci R, Gu G, Lee W, Feamster N.  2011.  Boosting the scalability of botnet detection using adaptive traffic sampling. Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security. :124-134.
Sen P, Deshpande A, Getoor L.  2009.  Bisimulation-based approximate lifted inference. Proceedings of the Twenty-Fifth Conference on Uncertainty in Artificial Intelligence. :496-505.
Gyger Jr LS, Spranklin BW, Gupta SK, Bruck HA.  2006.  Bio-inspired, Modular, and Multifunctional Thermal and Impact Protected (TIPed) Embedded Sensing Controls Actuation Power Element (ESCAPE) Structures.
Gyger Jr LS, Spranklin BW, Gupta SK, Bruck HA.  2006.  Bio-inspired, Modular, and Multifunctional Thermal and Impact Protected (TIPed) Embedded Sensing Controls Actuation Power Element (ESCAPE) Structures.
Goldberg L A, Paterson M, Srinivasan A, Sweedyk E.  1997.  Better approximation guarantees for job-shop scheduling. Proceedings of the eighth annual ACM-SIAM symposium on Discrete algorithms. :599-608.
Hollingsworth J, Guven E, Akinlar C.  1998.  Benchmarking a network of PCs running parallel applications. Performance, Computing and Communications, 1998. IPCCC '98., IEEE International. :1-7.
Gupta P, Doermann D, DeMenthon D.  2002.  Beam Search for Feature Selection in Automatic SVMDefect Classification. International Conference on Pattern Recognition. :212-215.
Lee S, Levin D, Gopalakrishnan V, Bhattacharjee B.  2007.  Backbone construction in selfish wireless networks. Proceedings of the 2007 ACM SIGMETRICS international conference on Measurement and modeling of computer systems. :121-132.
Oard D, Demner-Fushman D, Hajic J, Ramabhadran B, Gustman S, Byrne WJ, Soergel D, Dorr BJ, Resnik P, Picheny M.  2002.  Automatic transcription of Czech language oral history in the MALACH project: resources and initial experiments. Proceedings of the The 5th International Conference on Text, Speech and Dialogue. :57-64.
Alva U, Gupta SK.  1999.  Automated punch shape synthesis for sheet metal bending operations.
Gu R, Piat J, Raulet M, Janneck JW, Bhattacharyya SS.  2010.  Automated generation of an efficient MPEG-4 Reconfigurable Video Coding decoder implementation. 2010 Conference on Design and Architectures for Signal and Image Processing (DASIP). :265-272.
Alva U, Gupta SK, Gupta RK.  2000.  Automated design of sheet metal bending tools.
Alva U, Gupta SK, Gupta RK.  2000.  Automated design of sheet metal bending tools.
Albrecht M, Gentry C, Halevi S, Katz J.  2009.  Attacking cryptographic schemes based on "perturbation polynomials". Proceedings of the 16th ACM conference on Computer and communications security. :1-10.
Xingyuan L, Doermann D, Oh W, Gao W.  1999.  ARobust Method for Unknown Forms Analysis. ICDAR. :531-534.
Drury J, Resnik P, Weinberg A, Gennari S, Aoshima S.  2002.  Argument structure saturation in a constraint based model.
Sayeed A, Elsayed T, Garera N, Alexander D, Xu T, Oard D, Yarowsky D, Piatko C.  2009.  Arabic Cross-Document Coreference Resolution. Proceedings of the ACL-IJCNLP 2009 Conference Short Papers$}$. :357-360.
Goodrich MT, Matias Y, Vishkin U.  1993.  Approximate parallel prefix computation and its applications. Parallel Processing Symposium, 1993., Proceedings of Seventh International. :318-325.
Smith MA, Shneiderman B, Milic-Frayling N, Mendes Rodrigues E, Barash V, Dunne C, Capone T, Perer A, Gleave E.  2009.  Analyzing (social media) networks with NodeXL. Proceedings of the fourth international conference on Communities and technologies. :255-264.

Pages