Publications

Export 1389 results:
Author Title [ Type(Asc)] Year
Filters: First Letter Of Last Name is P  [Clear All Filters]
Conference Papers
Patel VM, Easley GR, Chellappa R.  2011.  Component-based restoration of speckled images. 2011 18th IEEE International Conference on Image Processing (ICIP). :2797-2800.
Cukier M, Panjwani S.  2007.  A Comparison between Internal and External Malicious Traffic. :109-114.
Memon AM, Porter A, Sussman A.  2010.  Community-based, collaborative testing and analysis. Proceedings of the FSE/SDP workshop on Future of software engineering research. :239-244.
Cormode G, Paterson M, Sahinalp S C, Vishkin U.  2000.  Communication complexity of document exchange. Proceedings of the eleventh annual ACM-SIAM symposium on Discrete algorithms. :197-206.
Perlis D.  1988.  Commonsense set theory. Meta-Level Architectures and Reflection. :87-98.
Kelly W, Pugh W, Rosser E.  1995.  Code generation for multiple mappings. Frontiers of Massively Parallel Computation, 1995. Proceedings. Frontiers '95., Fifth Symposium on the. :332-341.
Danovaro E, De Floriani L, Puppo E, Samet H.  2005.  Clustering Techniques for Out-of-Core Multi-resolution Modeling. Visualization Conference, IEEE. :113-113.
Prasad VSN, Siddiquie B, Golbeck J, Davis LS.  2007.  Classifying Computer Generated Charts. Content-Based Multimedia Indexing, 2007. CBMI '07. International Workshop on. :85-92.
Perlis D.  1987.  Circumscription as introspection. Proceedings of the Second International Symposium on Methodologies for intelligent systems. :440-444.
Hill JH, Schmidt DC, Porter A, Slaby JM.  2008.  CiCUTS: Combining System Execution Modeling Tools with Continuous Integration Environments. Engineering of Computer-Based Systems, IEEE International Conference on the. :66-75.
Eaton C, Plaisant C, Drizd T.  2003.  The Challenge of Missing and Uncertain Data. Proceedings of the 14th IEEE Visualization 2003 (VIS'03). :100–-100–.
Plaisant C.  2004.  The challenge of information visualization evaluation. Proceedings of the working conference on Advanced visual interfaces. :109-116.
Han B, Hui P, Kumar AVS, Marathe MV, Pei G, Srinivasan A.  2010.  Cellular traffic offloading through opportunistic communications: a case study. Proceedings of the 5th ACM workshop on Challenged networks. :31-38.
Sinha R, Paredis CJJ, Gupta SK, Khosla PK.  1998.  Capturing articulation in assemblies from component geometry.
Chafekar D, Levin D, Kumar VSA, Marathe MV, Parthasarathy S, Srinivasan A.  2008.  Capacity of Asynchronous Random-Access Scheduling in Wireless Networks. IEEE INFOCOM 2008. The 27th Conference on Computer Communications. :1148-1156.
Plaisant C, Marchionini G, Komlodi A.  1998.  Bringing treasures to the surface: previews and overviews in a prototype for the Library of Congress National Digital Library. CHI 98 conference summary on Human factors in computing systems. :187-188.
Plaisant C, Marchionini G, Bruns T, Komlodi A, Campbell L.  1997.  Bringing treasures to the surface: iterative design for the Library of Congress National Digital Library Program. Proceedings of the SIGCHI conference on Human factors in computing systems. :518-525.
Zhang J, Luo X, Perdisci R, Gu G, Lee W, Feamster N.  2011.  Boosting the scalability of botnet detection using adaptive traffic sampling. Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security. :124-134.
Elaine Shi, Perrig A, Van Doorn L.  2005.  BIND: a fine-grained attestation service for secure distributed systems. :154-168.
Goldberg L A, Paterson M, Srinivasan A, Sweedyk E.  1997.  Better approximation guarantees for job-shop scheduling. Proceedings of the eighth annual ACM-SIAM symposium on Discrete algorithms. :599-608.
Bertini E, Perer A, Plaisant C, Santucci G.  2008.  BELIV'08: Beyond time and errors: novel evaluation methods for information visualization. CHI '08 extended abstracts on Human factors in computing systems. :3913-3916.
Bertini E, Perer A, Plaisant C, Santucci G.  2008.  BELIV'08: Beyond time and errors: novel evaluation methods for information visualization. CHI '08 extended abstracts on Human factors in computing systems. :3913-3916.
Perdisci R, Lee W, Feamster N.  2010.  Behavioral clustering of HTTP-based malware and signature generation using malicious network traces. Proceedings of the 7th USENIX conference on Networked systems design and implementation. :26-26.
Zagoria R, Reggia JA, Price T, Banko M.  1981.  Bayesian classification in medicine: The transferability question. Proceedings of the Fifth Annual Symposium on Computer Applications in Medical Care. :250-252.
Oh S, Hoogs A, Perera A, Cuntoor N, Chen C-C, Lee J T, Mukherjee S, Aggarwal JK, Lee H, Davis LS et al..  2011.  AVSS 2011 demo session: A large-scale benchmark dataset for event recognition in surveillance video. Advanced Video and Signal-Based Surveillance (AVSS), 2011 8th IEEE International Conference on. :527-528.

Pages