Publications

Export 3364 results:
Author Title [ Type(Desc)] Year
Filters: First Letter Of Last Name is S  [Clear All Filters]
Book Chapters
Yaman F, Adali S, Nau DS, Sapino M, Subrahmanian V.  2004.  Plan Databases: Model and Algebra. Foundations of Information and Knowledge Systems. 2942:302-319.
Yaman F, Adali S, Nau DS, Sapino M, Subrahmanian V.  2004.  Plan Databases: Model and Algebra. Foundations of Information and Knowledge Systems. 2942:302-319.
Yaman F, Adali S, Nau DS, Sapino M, Subrahmanian V.  2004.  Plan Databases: Model and Algebra. Foundations of Information and Knowledge Systems. 2942:302-319.
Au T-C, Kuter U, Nau DS.  2009.  Planning for Interactions among Autonomous Agents. Programming Multi-Agent Systems. 5442:1-23.
Shen E, Elaine Shi, Waters B.  2009.  Predicate Privacy in Encryption Systems. Theory of Cryptography. 5444:457-473.
Shen E, Elaine Shi, Waters B.  2009.  Predicate Privacy in Encryption Systems. Theory of Cryptography. 5444:457-473.
Zhou S, Chellappa R.  2002.  Probabilistic Human Recognition from Video. Computer Vision — ECCV 2002Computer Vision — ECCV 2002. 2352:173-183.
Udrea O, Yu D, Hung E, Subrahmanian V.  2005.  Probabilistic Ontologies and Relational Databases. On the Move to Meaningful Internet Systems 2005: CoopIS, DOA, and ODBASEOn the Move to Meaningful Internet Systems 2005: CoopIS, DOA, and ODBASE. 3760:1-17.
Basili VR, Zelkowitz MV, Sjøberg DIK, Johnson P, Cowling AJ.  2007.  Protocols in the use of empirical software engineering artifacts. Empirical Software EngineeringEmpirical Software Engineering. 12:107-119.
Srinivasan A.  2007.  Randomized Algorithms and Probabilistic Analysis in Wireless Networking. Stochastic Algorithms: Foundations and ApplicationsStochastic Algorithms: Foundations and Applications. 4665:54-57.
Pemmaraju S, Srinivasan A.  2008.  The Randomized Coloring Procedure with Symmetry-Breaking. Automata, Languages and ProgrammingAutomata, Languages and Programming. 5125:306-319.
Keil-Slawik R, Plaisant C, Shneiderman B.  1993.  Remote direct manipulation: A case study of a telemedicine workstation. Sparks of innovation in human-computer interactionSparks of innovation in human-computer interaction. :51-51.
Aris A, Shneiderman B, Plaisant C, Shmueli G, Jank W.  2005.  Representing Unevenly-Spaced Time Series Data for Visualization and Interactive Exploration. Human-Computer Interaction - INTERACT 2005Human-Computer Interaction - INTERACT 2005. 3585:835-846.
Aris A, Shneiderman B, Plaisant C, Shmueli G, Jank W.  2005.  Representing Unevenly-Spaced Time Series Data for Visualization and Interactive Exploration. Human-Computer Interaction - INTERACT 2005Human-Computer Interaction - INTERACT 2005. 3585:835-846.
Tulyakov S, Jaeger S, Govindaraju V, Doermann D.  2008.  Review of Classifier Combination Methods. Studies in Computational Intelligence: Machine Learning in Document Analysis and RecognitionStudies in Computational Intelligence: Machine Learning in Document Analysis and Recognition. :361-386.
Anagnostakis K, Hicks MW, Ioannidis S, Keromytis A, Smith J.  2000.  Scalable Resource Control in Active Networks. Active NetworksActive Networks. 1942:343-357.
Plaisant C, Shneiderman B, Battagtia J.  1993.  Scheduling home control devices: a case study of the transition from the research project to a product. Sparks of innovation in human-computer interactionSparks of innovation in human-computer interaction. :205-205.
Kumar V, Marathe M, Parthasarathy S, Srinivasan A.  2005.  Scheduling on Unrelated Machines Under Tree-Like Precedence Constraints. Approximation, Randomization and Combinatorial Optimization. Algorithms and TechniquesApproximation, Randomization and Combinatorial Optimization. Algorithms and Techniques. 3624:609-609.
Dachman-Soled D, Kalai YTauman.  2012.  Securing Circuits against Constant-Rate Tampering. Advances in Cryptology – CRYPTO 2012. :533-551.
North C, Shneiderman B, Plaisant C, Kang H, Bederson BB.  2003.  Seeing the World Through Image Libraries. The craft of information visualization: readings and reflectionsThe craft of information visualization: readings and reflections. :47-47.
Albanese M, Turaga P, Chellappa R, Pugliese A, Subrahmanian V.  2010.  Semantic Video Content Analysis. Video Search and MiningVideo Search and Mining. 287:147-176.
Albanese M, Turaga P, Chellappa R, Pugliese A, Subrahmanian V.  2010.  Semantic Video Content Analysis. Video Search and MiningVideo Search and Mining. 287:147-176.
Albanese M, Turaga P, Chellappa R, Pugliese A, Subrahmanian V.  2010.  Semantic Video Content Analysis. Video Search and MiningVideo Search and Mining. 287:147-176.
Zajic D, Dorr BJ, Lin J, O'Leary DP, Conroy JM, Schlesinger JD.  2006.  Sentence Trimming and Selection: Mixing and Matching. DUC 06 Conference Proceedings.
Papamanthou C, Shi E, Tamassia R.  2013.  Signatures of Correct Computation. Theory of Cryptography. :222-242.

Pages