Publications
Export 1389 results:
Author Title [ Type] Year Filters: First Letter Of Last Name is P [Clear All Filters]
2011. Component-based restoration of speckled images. 2011 18th IEEE International Conference on Image Processing (ICIP). :2797-2800.
2010. Community-based, collaborative testing and analysis. Proceedings of the FSE/SDP workshop on Future of software engineering research. :239-244.
2000. Communication complexity of document exchange. Proceedings of the eleventh annual ACM-SIAM symposium on Discrete algorithms. :197-206.
1995. Code generation for multiple mappings. Frontiers of Massively Parallel Computation, 1995. Proceedings. Frontiers '95., Fifth Symposium on the. :332-341.
2005. Clustering Techniques for Out-of-Core Multi-resolution Modeling. Visualization Conference, IEEE. :113-113.
2007. Classifying Computer Generated Charts. Content-Based Multimedia Indexing, 2007. CBMI '07. International Workshop on. :85-92.
1987. Circumscription as introspection. Proceedings of the Second International Symposium on Methodologies for intelligent systems. :440-444.
2008. CiCUTS: Combining System Execution Modeling Tools with Continuous Integration Environments. Engineering of Computer-Based Systems, IEEE International Conference on the. :66-75.
2003. The Challenge of Missing and Uncertain Data. Proceedings of the 14th IEEE Visualization 2003 (VIS'03). :100–-100–.
2004. The challenge of information visualization evaluation. Proceedings of the working conference on Advanced visual interfaces. :109-116.
2010. Cellular traffic offloading through opportunistic communications: a case study. Proceedings of the 5th ACM workshop on Challenged networks. :31-38.
2008. Capacity of Asynchronous Random-Access Scheduling in Wireless Networks. IEEE INFOCOM 2008. The 27th Conference on Computer Communications. :1148-1156.
1998. Bringing treasures to the surface: previews and overviews in a prototype for the Library of Congress National Digital Library. CHI 98 conference summary on Human factors in computing systems. :187-188.
1997. Bringing treasures to the surface: iterative design for the Library of Congress National Digital Library Program. Proceedings of the SIGCHI conference on Human factors in computing systems. :518-525.
2011. Boosting the scalability of botnet detection using adaptive traffic sampling. Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security. :124-134.
1997. Better approximation guarantees for job-shop scheduling. Proceedings of the eighth annual ACM-SIAM symposium on Discrete algorithms. :599-608.
2008. BELIV'08: Beyond time and errors: novel evaluation methods for information visualization. CHI '08 extended abstracts on Human factors in computing systems. :3913-3916.
2008. BELIV'08: Beyond time and errors: novel evaluation methods for information visualization. CHI '08 extended abstracts on Human factors in computing systems. :3913-3916.
2010. Behavioral clustering of HTTP-based malware and signature generation using malicious network traces. Proceedings of the 7th USENIX conference on Networked systems design and implementation. :26-26.
1981. Bayesian classification in medicine: The transferability question. Proceedings of the Fifth Annual Symposium on Computer Applications in Medical Care. :250-252.
2011. AVSS 2011 demo session: A large-scale benchmark dataset for event recognition in surveillance video. Advanced Video and Signal-Based Surveillance (AVSS), 2011 8th IEEE International Conference on. :527-528.