Publications

Search
Export 1388 results:
Author Title [ Type(Desc)] Year
Filters: First Letter Of Last Name is P  [Clear All Filters]
Conference Papers
Hurter C, Girouard A, Riche N, Plaisant C.  2011.  Active progress bars: facilitating the switch to temporary activities. Proceedings of the 2011 annual conference extended abstracts on Human factors in computing systems. :1963-1968.
Hajiaghayi MT, Kleinberg R, Parkes DC.  2004.  Adaptive limited-supply online auctions. Proceedings of the 5th ACM Conference on Electronic Commerce. :71-80.
Doermann D, Sauvola J, Haapakoski S, Kauniskangas H, Seppanen T, Pietikainen M.  1997.  ADistributed Management System for Testing Document Image Database Analysis Algorithms. ICDAR. :989-995.
Parker A, Infantes G, V.S. Subrahmanian, Grant J.  2008.  An AGM-based belief revision mechanism for probabilistic spatio-temporal logics. Proceedings of the 23rd national conference on Artificial intelligence. :511-516.
Kumar AVS, Marathe MV, Parthasarathy S, Srinivasan A.  2005.  Algorithmic aspects of capacity in wireless networks. Proceedings of the 2005 ACM SIGMETRICS international conference on Measurement and modeling of computer systems. :133-144.
Peng T, Balijepalli A, Gupta SK, LeBrun TW.  2006.  Algorithms for on-line monitoring of components in an optical tweezers-based assembly cell. :1-13.
Wang T D, Plaisant C, Quinn AJ, Stanchak R, Murphy S, Shneiderman B.  2008.  Aligning temporal data by sentinel events: discovering patterns in electronic health records. Proceedings of the twenty-sixth annual SIGCHI conference on Human factors in computing systems. :457-466.
Barfourosh AA, Nezhad HRM, Anderson M, Perlis D.  2002.  ALLI: An Information Integration System Based on Active Logic Framework. Proceedings of the Third International Conference on Management Information Systems, Greece. :339-348.
Kanungo T, Mount D, Netanyahu NS, Piatko C, Silverman R, Wu AY.  2000.  The analysis of a simple k-means clustering algorithm. Proceedings of the sixteenth annual symposium on Computational geometry. :100-109.
Smith MA, Shneiderman B, Milic-Frayling N, Mendes Rodrigues E, Barash V, Dunne C, Capone T, Perer A, Gleave E.  2009.  Analyzing (social media) networks with NodeXL. Proceedings of the fourth international conference on Communities and technologies. :255-264.
Yoon I-C, Sussman A, Porter A.  2005.  And away we go: understanding the complexity of launching complex HPC applications. Proceedings of the second international workshop on Software engineering for high performance computing system applications. :45-49.
Meyers A, Fang AC, Ferro L, Kübler S, Jia-Lin T, Palmer M, Poesio M, Dolbey A, Schuler KK, Loper E et al..  2006.  Annotation compatibility working group report. Proceedings of the Workshop on Frontiers in Linguistically Annotated Corpora 2006. :38-53.
Meyers A, Fang AC, Ferro L, Kübler S, Jia-Lin T, Palmer M, Poesio M, Dolbey A, Schuler KK, Loper E et al..  2006.  Annotation compatibility working group report. Proceedings of the Workshop on Frontiers in Linguistically Annotated Corpora 2006. :38-53.
Meyers A, Fang AC, Ferro L, Kübler S, Jia-Lin T, Palmer M, Poesio M, Dolbey A, Schuler KK, Loper E et al..  2006.  Annotation compatibility working group report. Proceedings of the Workshop on Frontiers in Linguistically Annotated Corpora 2006. :38-53.
Meyers A, Fang AC, Ferro L, Kübler S, Jia-Lin T, Palmer M, Poesio M, Dolbey A, Schuler KK, Loper E et al..  2006.  Annotation compatibility working group report. Proceedings of the Workshop on Frontiers in Linguistically Annotated Corpora 2006. :38-53.
Perpich JM, Perry DE, Porter A, Votta LG, Wade MW.  1997.  Anywhere, Anytime Code Inspections: Using the Web to Remove Inspection Bottlenecks in Large-Scale Software Development. Software Engineering, International Conference on. :14-14.
Perpich JM, Perry DE, Porter A, Votta LG, Wade MW.  1997.  Anywhere, Anytime Code Inspections: Using the Web to Remove Inspection Bottlenecks in Large-Scale Software Development. Software Engineering, International Conference on. :14-14.
Perpich JM, Perry DE, Porter A, Votta LG, Wade MW.  1997.  Anywhere, Anytime Code Inspections: Using the Web to Remove Inspection Bottlenecks in Large-Scale Software Development. Software Engineering, International Conference on. :14-14.
Josyula DP, Fults S, Anderson ML, Wilson S, Perlis D.  2007.  Application of MCL in a dialog agent. Third Language and Technology Conference.
Bai P, Prabhakaran B, Srinivasan A.  1999.  Application-layer broker for scalable Internet services with resource reservation. Proceedings of the seventh ACM international conference on Multimedia (Part 2). :103-106.
Minter J, Perlis D.  1984.  Applications or Protected Circumscription. 7th International Conference on Automated Deduction, Napa, California, USA, May 14-16, 1984: proceedings. 170:414-414.
Rose A, Shneiderman B, Plaisant C.  1995.  An applied ethnographic method for redesigning user interfaces. Proceedings of the 1st conference on Designing interactive systems: processes, practices, methods, & techniques. :115-122.
Fraser T, Petroni J., Arbaugh WA.  2006.  Applying flow-sensitive CQUAL to verify MINIX authorization check placement. Proceedings of the 2006 workshop on Programming languages and analysis for security. :3-6.
Plishker W, Zaki GF, Bhattacharyya SS, Clancy C, Kuykendall J.  2011.  Applying graphics processor acceleration in a software defined radio prototyping environment. 2011 22nd IEEE International Symposium on Rapid System Prototyping (RSP). :67-73.
Chafekar D, Kumart VSA, Marathe MV, Parthasarathy S, Srinivasan A.  2008.  Approximation Algorithms for Computing Capacity of Wireless Networks with SINR Constraints. IEEE INFOCOM 2008. The 27th Conference on Computer Communications. :1166-1174.

Pages