Publications

Search
Export 1830 results:
Author [ Title(Desc)] Type Year
Filters: First Letter Of Last Name is D  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
B
Ayres DL, Darling A, Zwickl DJ, Beerli P, Holder MT, Lewis PO, Huelsenbeck JP, Ronquist F, Swofford DL, Cummings MP et al..  2012.  BEAGLE: An Application Programming Interface and High-Performance Computing Library for Statistical Phylogenetics. Systematic BiologySyst Biol. 61(1):170-173.
Gupta P, Doermann D, DeMenthon D.  2002.  Beam Search for Feature Selection in Automatic SVMDefect Classification. International Conference on Pattern Recognition. :212-215.
Gupta P, Doermann D, DeMenthon D.  2002.  Beam Search for Feature Selection in Automatic SVMDefect Classification. International Conference on Pattern Recognition. :212-215.
Duderstadt J, Arms W, Messina P, Ellisman M, Atkins D, Fox E, Shneiderman B, Nissenbaum H, Lederberg J.  2001.  Becoming a Scholar in the Digital Age.
Bilge L, Dumitras T.  2012.  Before We Knew It: An Empirical Study of Zero-day Attacks in the Real World. CCS '12 Proceedings of the 2012 ACM conference on Computer and Communications Security. :833-844.
Aloimonos Y, Duriç Z, Fermüller C, Huang L, Rivlin E, Sharma R.  1992.  Behavioral Visual Motion Analysis,". Proceedings, DARPA Image Understanding Workshop. :521-541.
Gupta A, Davis LS.  2008.  Beyond nouns: Exploiting prepositions and comparative adjectives for learning visual classifiers. Computer Vision–ECCV 2008. :16-29.
Resnik P, Olsen MB, Diab M.  1999.  The Bible as a parallel corpus: Annotating the ‘Book of 2000 Tongues’. Computers and the Humanities. 33(1):129-153.
Shet VD, Neumann J, Ramesh V, Davis LS.  2007.  Bilattice-based Logical Reasoning for Human Detection. Computer Vision and Pattern Recognition, 2007. CVPR '07. IEEE Conference on. :1-8.
Shen W, Dorr BJ.  1998.  Bilingual Lexicon Construction Using Large Corpora.
Wolf C, Doermann D.  2002.  Binarization of low quality text using a Markov random field model. Pattern Recognition, 2002. Proceedings. 16th International Conference on. 3:160-163vol.3-160-163vol.3.
Farrell R, Oza O, Zhang N, Morariu VI, Darrell T, Davis LS.  2011.  Birdlets: Subordinate categorization using volumetric primitives and pose-normalized appearance. Computer Vision (ICCV), 2011 IEEE International Conference on. :161-168.
Farrell R, Oza O, Zhang N, Morariu VI, Darrell T, Davis LS.  2011.  Birdlets: Subordinate categorization using volumetric primitives and pose-normalized appearance. Computer Vision (ICCV), 2011 IEEE International Conference on. :161-168.
Sen P, Deshpande A, Getoor L.  2009.  Bisimulation-based approximate lifted inference. Proceedings of the Twenty-Fifth Conference on Uncertainty in Artificial Intelligence. :496-505.
Dachman-Soled D, Lindell Y, Mahmoody M, Malkin T.  2011.  On the Black-Box Complexity of Optimally-Fair Coin Tossing. Theory of Cryptography. :450-467.
Choi SGeol, Dachman-Soled D, Malkin T, Wee H.  2008.  Black-Box Construction of a Non-malleable Encryption Scheme from Any Semantically Secure One. Theory of Cryptography. :427-444.
Seydou F, Duraiswami R, Seppanen T.  2003.  A boundary element method for electromagnetic scattering by multiple cylinders. Antennas and Propagation Society International Symposium, 2003. IEEE. 3:516-519vol.3-516-519vol.3.
Shneiderman B, Colwell RR, Diamond S, Greenhalgh P, Wulf W.  2007.  Bridging art and science with creativity support tools. Proceedings of the 6th ACM SIGCHI conference on Creativity & cognition. :309-309.
Reuter K, Druin A.  2004.  Bringing together children and books: An initial descriptive study of children's book searching and selection behavior in a digital library. Proceedings of the American Society for Information science and Technology. 41(1):339-348.
Marchionini AS, Nation D, Karasik S, Cronnell T, Shneiderman B, Spotfire VDMU, Bederson BB, Data TS, Hochheiser H, Shneiderman B et al..  2003.  Bringing Treasures to the Surface: Previews and Overviews in a Prototype for the Library of Congress National Digital Library. The craft of information visualization: readings and reflections. :388-388.
Gumerov NA, Duraiswami R.  2009.  A broadband fast multipole accelerated boundary element method for the three dimensional Helmholtz equation. The Journal of the Acoustical Society of America. 125(1):191-205.
Sundaresan S, de Donato W, Feamster N, Teixeira R, Crawford S, Pescapè A.  2011.  Broadband internet performance: A view from the gateway. SIGCOMM-Computer Communication Review. 41(4):134-134.
desJardins M, Littman M.  2010.  Broadening student enthusiasm for computer science with a great insights course. Proceedings of the 41st ACM technical symposium on Computer science education. :157-161.
Dorr BJ, Levow G-A, Lin D.  2000.  Building a Chinese-English Mapping Between Verb Concepts for Multilingual Applications. Envisioning Machine Translation in the Information FutureEnvisioning Machine Translation in the Information Future. 1934:345-363.
Antonakakis M, Perdisci R, Dagon D, Lee W, Feamster N.  2010.  Building a dynamic reputation system for DNS. 19th Usenix Security Symposium.

Pages