Publications

Export 1858 results:
Author Title [ Type(Asc)] Year
Filters: First Letter Of Last Name is C  [Clear All Filters]
Book Chapters
Chen C-houh, Härdle W, Unwin A, Jank W, Shmueli G, Plaisant C, Shneiderman B.  2008.  Visualizing Functional Data with an Application to eBay’s Online Auctions. Handbook of Data VisualizationHandbook of Data Visualization. :873-898.
Guo F, Chellappa R.  2006.  Video Mensuration Using a Stationary Camera. Computer Vision – ECCV 2006Computer Vision – ECCV 2006. 3953:164-176.
desJardins M, Getoor L, Koller D.  2000.  Using Feature Hierarchies in Bayesian Network Learning. Abstraction, Reformulation, and Approximation. 1864:260-270.
Schlesinger JD, Okurowski ME, Conroy JM, O'Leary DP, Taylor A, Hobbs J, Wilson HT.  2002.  Understanding Machine Performance in the Context of Human Performance for Multi-document Summarization. DUC 02 Conference ProceedingsDUC 02 Conference Proceedings.
Chang Y, Raschid L, Dorr BJ.  1994.  Transforming queries from a relational schema to an object schema: A prototype based on F-logic. Methodologies for Intelligent SystemsMethodologies for Intelligent Systems. 869:154-163.
Nguyen H V, Banerjee A, Burlina P, Broadwater J, Chellappa R.  2011.  Tracking and Identification via Object Reflectance Using a Hyperspectral Video Camera. Machine Vision Beyond Visible SpectrumMachine Vision Beyond Visible Spectrum. 1:201-219.
Bolle R, Aloimonos Y, Fermüller C.  1997.  Toward motion picture grammars. Computer Vision — ACCV'98Computer Vision — ACCV'98. 1352:283-290.
Card SK, Mackinlay JD, Shneiderman B.  1999.  Text in 3D+ time. Readings in information visualizationReadings in information visualization. :451-451.
Card SK, Mackinlay JD, Shneiderman B.  1999.  Text in 3D. Readings in information visualizationReadings in information visualization. :440-441.
Card SK, Mackinlay JD, Shneiderman B.  1999.  Text in 2D. Readings in information visualizationReadings in information visualization. :431-431.
Card SK, Mackinlay JD, Shneiderman B.  1999.  Text in 1D. Readings in information visualizationReadings in information visualization. :411-412.
Ahn J-wook, Taieb-Maimon M, Sopan A, Plaisant C, Shneiderman B.  2011.  Temporal Visualization of Social Network Dynamics: Prototypes for Nation of Neighbors. Social Computing, Behavioral-Cultural Modeling and PredictionSocial Computing, Behavioral-Cultural Modeling and Prediction. 6589:309-316.
Colwell RR.  2004.  A Tangled Bank: Reflections on the Tree of Life and Human Health. Assembling the Tree of LifeAssembling the Tree of Life. :18-18.
Nixon MS, Tan T, Chellappa R.  2006.  Subjects Allied to Gait. Human Identification Based on GaitHuman Identification Based on Gait. :5-15.
Powell D, Cukier M, Arlat J.  1996.  On stratified sampling for high coverage estimations. Dependable Computing — EDCC-2. 1150:35-54.
Turaga P, Veeraraghavan A, Srivastava A, Chellappa R.  2010.  Statistical Analysis on Manifolds and Its Applications to Video Analysis. Video Search and MiningVideo Search and Mining. 287:115-144.
Sharma P, Khurana U, Shneiderman B, Scharrenbroich M, Locke J.  2011.  Speeding Up Network Layout and Centrality Measures for Social Computing Goals. Social Computing, Behavioral-Cultural Modeling and PredictionSocial Computing, Behavioral-Cultural Modeling and Prediction. 6589:244-251.
Cheong LF, Fermüller C, Aloimonos Y.  1996.  Spatiotemporal representations for visual navigation. Computer Vision — ECCV '96Computer Vision — ECCV '96. 1064:671-684.
Cheong LF, Fermüller C, Aloimonos Y.  1996.  Spatiotemporal representations for visual navigation. Computer Vision — ECCV '96Computer Vision — ECCV '96. 1064:671-684.
Kaâniche M, Kanoun K, Cukier M, Martini M.  1994.  Software reliability analysis of three successive generations of a Switching System. Dependable Computing — EDCC-1. 852:471-490.
Bessiere K, Ceaparu I, Lazar J, Robinson J, Shneiderman B.  2004.  Social and psychological influences on computer user frustration. Media access: Social and psychological dimensions of new technology useMedia access: Social and psychological dimensions of new technology use. :91-103.
Choi SGeol, Dachman-Soled D, Malkin T, Wee H.  2009.  Simple, Black-Box Constructions of Adaptively Secure Protocols. Theory of Cryptography. :387-402.
Nixon MS, Tan T, Chellappa R.  2006.  Silhouette-Based Approaches. Human Identification Based on GaitHuman Identification Based on Gait. :45-105.
Zajic D, Dorr BJ, Lin J, O'Leary DP, Conroy JM, Schlesinger JD.  2006.  Sentence Trimming and Selection: Mixing and Matching. DUC 06 Conference Proceedings.
Albanese M, Turaga P, Chellappa R, Pugliese A, Subrahmanian V.  2010.  Semantic Video Content Analysis. Video Search and MiningVideo Search and Mining. 287:147-176.

Pages