Publications
Export 1377 results:
Author Title Type [ Year] Filters: First Letter Of Last Name is R [Clear All Filters]
2011. A large-scale benchmark dataset for event recognition in surveillance video. Computer Vision and Pattern Recognition (CVPR), 2011 IEEE Conference on. :3153-3160.
2011. Link prediction by de-anonymization: How We Won the Kaggle Social Network Challenge. :1825-1834.
2011. Long-term effects of ocean warming on the prokaryotic community: evidence from the vibrios. The ISME Journal. 6(1):21-30.
2011. Metagenomic 16S rDNA Targeted PCR-DGGE in Determining Bacterial Diversity in Aquatic Ecosystem. Bangladesh Journal of Microbiology. 27(2)
2011. Motivation for Participation in Online Neighborhood Watch Communities: An Empirical Study Involving Invitation Letters. Privacy, Security, Risk and Trust (PASSAT), 2011 IEEE Third International Conference on and 2011 IEEE Third International Confernece on Social Computing (SocialCom). :760-765.
2011. MultiOtter: Multiprocess Symbolic Execution. Technical Reports of the Computer Science Department.
2011. New models and algorithms for throughput maximization in broadcast scheduling. Approximation and Online Algorithms. :71-82.
2011. Odd Leaf Out: Improving Visual Recognition with Games. Privacy, security, risk and trust (passat), 2011 ieee third international conference on and 2011 ieee third international conference on social computing (socialcom). :87-94.
2011. Optimal Verification of Operations on Dynamic Sets. Advances in Cryptology – CRYPTO 2011. :91-110.
2011. Overview of the MPEG Reconfigurable Video Coding Framework. Journal of Signal Processing Systems. 63(2):251-263.
2011. P2C2: Programmable pixel compressive camera for high speed imaging. 2011 IEEE Conference on Computer Vision and Pattern Recognition (CVPR). :329-336.
2011. Predicting author blog channels with high value future posts for monitoring. Proceedings of the Twenty-Fifth Conference on Artificial Intelligence (AAAI).
2011. Predicting author blog channels with high value future posts for monitoring. Proceedings of the Twenty-Fifth Conference on Artificial Intelligence (AAAI).
2011. Recommendations in social media for brand monitoring. Proceedings of the fifth ACM conference on Recommender systems. :345-348.
2011. Recommendations in social media for brand monitoring. Proceedings of the fifth ACM conference on Recommender systems. :345-348.
2011. Research Directions in Data Wrangling: Visualizations and Transformations for Usable and Credible Data. Information VisualizationInformation Visualization. 10(4):271-288.
2011. Secure Efficient Multiparty Computing of Multivariate Polynomials and Applications. Applied Cryptography and Network Security. :130-146.
2011. Semantic similarity in a taxonomy: An information-based measure and its application to problems of ambiguity in natural language. Arxiv preprint arXiv:1105.5444.
2011. SilverLine: Data and Network Isolation for Cloud Services. 2nd USENIX Workshop on Hot Topics in Cloud Computing.
2011. Spam or ham?: characterizing and detecting fraudulent "not spam" reports in web mail systems Proceedings of the 8th Annual Collaboration, Electronic messaging, Anti-Abuse and Spam Conference. :210-219.
2011. Suppression subtractive hybridization PCR isolation of cDNAs from a Caribbean soft coral. Electronic Journal of Biotechnology. 14(1):8-9.
2011. Suppression subtractive hybridization PCR isolation of cDNAs from a Caribbean soft coral. Electronic Journal of Biotechnology. 14(1):8-9.