Publications

Search
Export 3363 results:
Author [ Title(Desc)] Type Year
Filters: First Letter Of Last Name is S  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
A
Hansen D, Shneiderman B, Smith MA.  2010.  Analyzing Social Media Networks with NodeXL: Insights from a Connected World. :302.
Hansen D, Shneiderman B, Smith MA.  2010.  Analyzing Social Media Networks with NodeXL: Insights from a Connected World. :302.
Katz J, Smith A.  2006.  Analyzing the HB and HB+ protocols in the “large error” case. IACR ePrint report. 326:2006-2006.
Yoon I-C, Sussman A, Porter A.  2005.  And away we go: understanding the complexity of launching complex HPC applications. Proceedings of the second international workshop on Software engineering for high performance computing system applications. :45-49.
Shakarian P, Parker A, Simari G, V.S. Subrahmanian.  2011.  Annotated probabilistic temporal logic. ACM Trans. Comput. Logic. 12(2):14:1–14:44-14:1–14:44.
Shakarian P, Parker A, Simari G, V.S. Subrahmanian.  2011.  Annotated probabilistic temporal logic. ACM Trans. Comput. Logic. 12(2):14:1–14:44-14:1–14:44.
Shakarian P, Parker A, Simari G, V.S. Subrahmanian.  2011.  Annotated probabilistic temporal logic. ACM Trans. Comput. Logic. 12(2):14:1–14:44-14:1–14:44.
Udrea O, Recupero D R, V.S. Subrahmanian.  2010.  Annotated RDF. ACM Trans. Comput. Logic. 11(2):10:1–10:41-10:1–10:41.
Udrea O, Recupero D, V.S. Subrahmanian.  2006.  Annotated rdf. The Semantic Web: Research and Applications. 4011:487-501.
Meyers A, Fang AC, Ferro L, Kübler S, Jia-Lin T, Palmer M, Poesio M, Dolbey A, Schuler KK, Loper E et al..  2006.  Annotation compatibility working group report. Proceedings of the Workshop on Frontiers in Linguistically Annotated Corpora 2006. :38-53.
Bethencourt J, Chan H, Perrig A, Elaine Shi, Song D.  2006.  Anonymous multi-attribute encryption with range query and conditional decryption.
Bethencourt J, Chan H, Perrig A, Elaine Shi, Song D.  2006.  Anonymous multi-attribute encryption with range query and conditional decryption.
Seymour J J, Tuzo J, desJardins M.  2011.  Ant Colony Optimization in a Changing Environment. 2011 AAAI Fall Symposium Series.
Don A, Brennan S, Laurel B, Shneiderman B.  1992.  Anthropomorphism: from Eliza to Terminator 2. Proceedings of the SIGCHI conference on Human factors in computing systems. :67-70.
Shao J, Zhou SK, Chellappa R.  2004.  Appearance-based tracking and recognition using the 3D trilinear tensor. Acoustics, Speech, and Signal Processing, 2004. Proceedings. (ICASSP '04). IEEE International Conference on. 3:iii-613-16vol.3-iii-613-16vol.3.
Srivastava S, Hicks MW, Foster JS.  2007.  Appendix to CMod: Modular Information Hiding and Type-Safe Linking for C. Technical Reports of the Computer Science Department.
Spring N, Wolski R.  1998.  Application level scheduling of gene sequence comparison on metacomputers. Proceedings of the 12th international conference on Supercomputing. :141-148.
Bai P, Prabhakaran B, Srinivasan A.  1999.  Application-layer broker for scalable Internet services with resource reservation. Proceedings of the seventh ACM international conference on Multimedia (Part 2). :103-106.
Card SK, Mackinlay JD, Shneiderman B.  1999.  Applications and implications. Readings in information visualization. :625-635.
Ran Y, Zheng Q, Chellappa R, Strat TM.  2010.  Applications of a Simple Characterization of Human Gait in Surveillance. Systems, Man, and Cybernetics, Part B: Cybernetics, IEEE Transactions on. 40(4):1009-1020.
Rose A, Shneiderman B, Plaisant C.  1995.  An applied ethnographic method for redesigning user interfaces. Proceedings of the 1st conference on Designing interactive systems: processes, practices, methods, & techniques. :115-122.
Madnani N, Resnik P, Dorr BJ, Schwartz R.  2008.  Applying automatically generated semantic knowledge: A case study in machine translation. NSF Symposium on Semantic Knowledge Discovery, Organization and Use.
Iseki O, Shneiderman B.  1986.  Applying direct manipulation concepts: direct manipulation dik operating system (DMDOS). SIGSOFT Softw. Eng. Notes. 11(2):22-26.
Krishna AS, Yilmaz C, Memon AM, Porter A, Schmidt DC, Gokhale A, Natarajan B.  2004.  Applying Model-based Distributed Continuous Quality Assurance Processes to Enhance Persistent Software Attributes. IEEE Software. 21(6):32-40.
Das R, Hwang YS, Uysal M, Saltz J, Sussman A.  1993.  Applying the CHAOS/PARTI library to irregular problems in computational chemistry and computational aerodynamics. Scalable Parallel Libraries Conference, 1993., Proceedings of the. :45-56.

Pages