Publications
Export 1858 results:
Author [ Title] Type Year Filters: First Letter Of Last Name is C [Clear All Filters]
2008. On the Use of Security Metrics Based on Intrusion Prevention System Event Data: An Empirical Analysis. :49-58.
2008. On the Use of Security Metrics Based on Intrusion Prevention System Event Data: An Empirical Analysis. :49-58.
2005. User Frustration with Technology in the Workplace (2004). Institute for Systems Research Technical Reports.
1993. User interface consistency: an evaluation of original and revised interfaces for a videodisk library. Sparks of innovation in human-computer interaction. :259-259.
2000. Using Feature Hierarchies in Bayesian Network Learning. Abstraction, Reformulation, and Approximation. 1864:260-270.
2009. Using Satellite Images of Environmental Changes to Predict Infectious Disease Outbreaks. Emerging Infectious DiseasesEmerg Infect Dis. 15(9):1341-1346.
2007. Using Stereo Matching for 2-D Face Recognition Across Pose. Computer Vision and Pattern Recognition, 2007. CVPR '07. IEEE Conference on. :1-8.
2009. Using Stereo Matching with General Epipolar Geometry for 2D Face Recognition across Pose. Pattern Analysis and Machine Intelligence, IEEE Transactions on. 31(12):2298-2304.
2009. Using uncertainty as a model selection and comparison criterion. Proceedings of the 5th International Conference on Predictor Models in Software Engineering. :18:1–18:9-18:1–18:9.
1999. Using vision to think. Readings in information visualization: using vision to think. :579-581.
2003. Using Visualization Tools to Gain Insight Into Your Data. SPE Annual Technical Conference and Exhibition.
1998. Utility elicitation as a classification problem. Proceedings of the Fourteenth conference on Uncertainty in artificial intelligence. :79-88.
2009. Validating Automotive Control Software Using Instrumentation-Based Verification. Automated Software Engineering, International Conference on. :15-25.
2010. Validating the systematic position of ıt Plationus Segers, Murugan & Dumont, 1993 (Rotifera: Brachionidae) using sequences of the large subunit of the nuclear ribosomal DNA and of cytochrome C oxidase. Hydrobiologia. 644(1):361-370.
2014. Validation of high throughput sequencing and microbial forensics applications. Investigative Genetics. 5(1):9.
2014. Validation of high throughput sequencing and microbial forensics applications. Investigative Genetics. 5(1):9.
2014. Validation of high throughput sequencing and microbial forensics applications. Investigative Genetics. 5(1):9.
2010. Values of Stakeholders in the Net Neutrality Debate: Applying Content Analysis to Telecommunications Policy. Hawaii International Conference on System Sciences. :1-10.
2011. Variable remapping of images from very different sources. 2011 18th IEEE International Conference on Image Processing (ICIP). :1501-1504.
2004. Variation of toxigenic Vibrio cholerae O1 in the aquatic environment of Bangladesh and its correlation with the clinical strains. Microbiology and immunology. 48(10):773-777.
2011. Vectorization and mapping of software defined radio applications on heterogeneous multi-processor platforms. 2011 IEEE Workshop on Signal Processing Systems (SiPS). :31-36.