Publications

Export 1858 results:
Author [ Title(Desc)] Type Year
Filters: First Letter Of Last Name is C  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
U
Chrun D, Cukier M, Sneeringer G.  2008.  On the Use of Security Metrics Based on Intrusion Prevention System Event Data: An Empirical Analysis. :49-58.
Chrun D, Cukier M, Sneeringer G.  2008.  On the Use of Security Metrics Based on Intrusion Prevention System Event Data: An Empirical Analysis. :49-58.
Lazar J, Jones A, Bessiere K, Ceaparu I, Shneiderman B.  2005.  User Frustration with Technology in the Workplace (2004). Institute for Systems Research Technical Reports.
Chimera R, Shneiderman B.  1993.  User interface consistency: an evaluation of original and revised interfaces for a videodisk library. Sparks of innovation in human-computer interaction. :259-259.
Cheng KL, Zuckerman I, Kuter U, Nau DS.  2010.  Using a Social Orientation Model for the Evolution of Cooperative Societies. :431-438.
desJardins M, Getoor L, Koller D.  2000.  Using Feature Hierarchies in Bayesian Network Learning. Abstraction, Reformulation, and Approximation. 1864:260-270.
Hierons RM, Krause P, Lüttgen G, Simons AJH, Vilkomir S, Woodward MR, Zedan H, Bogdanov K, Bowen JP, Cleaveland R et al..  2009.  Using formal specifications to support testing. ACM Computing Surveys. 41:1-76.
Cardone A, Gupta SK, Mount D.  2005.  Using Iterative Strategies for Aligning Attributed Points in Space. ISR-TR-2005-2
Ford TE, Colwell RR, Rose JB, Morse SS, Rogers DJ, Yates TL.  2009.  Using Satellite Images of Environmental Changes to Predict Infectious Disease Outbreaks. Emerging Infectious DiseasesEmerg Infect Dis. 15(9):1341-1346.
Castillo CD, Jacobs DW.  2007.  Using Stereo Matching for 2-D Face Recognition Across Pose. Computer Vision and Pattern Recognition, 2007. CVPR '07. IEEE Conference on. :1-8.
Castillo CD, Jacobs DW.  2009.  Using Stereo Matching with General Epipolar Geometry for 2D Face Recognition across Pose. Pattern Analysis and Machine Intelligence, IEEE Transactions on. 31(12):2298-2304.
Sarcia' S A, Basili VR, Cantone G.  2009.  Using uncertainty as a model selection and comparison criterion. Proceedings of the 5th International Conference on Predictor Models in Software Engineering. :18:1–18:9-18:1–18:9.
Card SK, Mackinlay JD, Shneiderman B.  1999.  Using vision to think. Readings in information visualization: using vision to think. :579-581.
Plaisant C, Chintalapani G, Lukehart C, Schiro D, Ryan J.  2003.  Using Visualization Tools to Gain Insight Into Your Data. SPE Annual Technical Conference and Exhibition.
Olsen MB, Dorr BJ, Clark DJ.  1997.  Using WordNet to Posit Hierarchical Structure in Levin's Verb Classes.
Chajewska U, Getoor L, Norman J, Shahar Y.  1998.  Utility elicitation as a classification problem. Proceedings of the Fourteenth conference on Uncertainty in artificial intelligence. :79-88.
V
Ray A, Morschhaeuser I, Ackermann C, Cleaveland R, Shelton C, Martin C.  2009.  Validating Automotive Control Software Using Instrumentation-Based Verification. Automated Software Engineering, International Conference on. :15-25.
Reyna-Fabian ME, Laclette JP, Cummings MP, García-Varela M.  2010.  Validating the systematic position of ıt Plationus Segers, Murugan & Dumont, 1993 (Rotifera: Brachionidae) using sequences of the large subunit of the nuclear ribosomal DNA and of cytochrome C oxidase. Hydrobiologia. 644(1):361-370.
Budowle B, Connell ND, Bielecka-Oder A, Colwell RR, Corbett CR, Fletcher J, Forsman M, Kadavy DR, Markotic A, Morse SA et al..  2014.  Validation of high throughput sequencing and microbial forensics applications. Investigative Genetics. 5(1):9.
Budowle B, Connell ND, Bielecka-Oder A, Colwell RR, Corbett CR, Fletcher J, Forsman M, Kadavy DR, Markotic A, Morse SA et al..  2014.  Validation of high throughput sequencing and microbial forensics applications. Investigative Genetics. 5(1):9.
Budowle B, Connell ND, Bielecka-Oder A, Colwell RR, Corbett CR, Fletcher J, Forsman M, Kadavy DR, Markotic A, Morse SA et al..  2014.  Validation of high throughput sequencing and microbial forensics applications. Investigative Genetics. 5(1):9.
Cheng A-S, Fleischmann KR, Wang P, Ishita E, Oard D.  2010.  Values of Stakeholders in the Net Neutrality Debate: Applying Content Analysis to Telecommunications Policy. Hawaii International Conference on System Sciences. :1-10.
Zhang W, Guo Y, Meth R, Sokoloff H, Pope A, Strat T, Chellappa R.  2011.  Variable remapping of images from very different sources. 2011 18th IEEE International Conference on Image Processing (ICIP). :1501-1504.
Islam MS, Talukder KA, Khan NH, Mahmud ZH, Rahman MZ, Nair GB, Siddique AKM, Yunus M, Sack DA, Sack RB et al..  2004.  Variation of toxigenic Vibrio cholerae O1 in the aquatic environment of Bangladesh and its correlation with the clinical strains. Microbiology and immunology. 48(10):773-777.
Zaki GF, Plishker W, Bhattacharyya SS, Clancy C, Kuykendall J.  2011.  Vectorization and mapping of software defined radio applications on heterogeneous multi-processor platforms. 2011 IEEE Workshop on Signal Processing Systems (SiPS). :31-36.

Pages