Publications

Export 1830 results:
Author [ Title(Desc)] Type Year
Filters: First Letter Of Last Name is D  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
V
Drizd T, Eaton C, Plaisant C.  2011.  Visualizing Missing Data: Graph Interpretation User Study. IFIP Lecture Notes in Computer Science (LNCS). 3585(3585):861-872.
Eaton C, Plaisant C, Drizd T.  2005.  Visualizing Missing Data: Graph Interpretation User Study. Human-Computer Interaction - INTERACT 2005. 3585:861-872.
Agrawal M, Doermann D.  2009.  Voronoi++: ADynamic Page Segmentation approach based on Voronoi and Docstrum features. International Conference on Document Analysis and Recognition (ICDAR '09). :1011-1015.
Froehlich J, Chen M, Smith I, Potter F.  2006.  Voting with Your Feet: An Investigative Study of the Relationship Between Place Visit Behavior and Preference. UbiComp 2006: Ubiquitous Computing. 4206:333-350.
W
Darsa L, Costa B, Varshney A.  1998.  Walkthroughs of complex environments using image-based simplification. Computers & Graphics. 22(1):55-69.
Dumais S, Banko M, Brill E, Jimmy Lin, Ng A.  2002.  Web question answering: is more always better? Proceedings of the 25th annual international ACM SIGIR conference on Research and development in information retrieval. :291-298.
Daumé H, Brill E.  2004.  Web search intent induction via automatic query reformulation. Proceedings of HLT-NAACL 2004: Short Papers on XX. :49-52.
White B, Tom Yeh, Jimmy Lin, Davis LS.  2010.  Web-scale computer vision using MapReduce for multimedia data mining. Proceedings of the Tenth International Workshop on Multimedia Data Mining. :9:1–9:10-9:1–9:10.
Nandi A, Bhattacharjee B, Druschel P.  2009.  What a mesh: understanding the design tradeoffs for streaming multicast. SIGMETRICS Perform. Eval. Rev.. 37(2):85-86.
Egerstedt M., Balch T, Dellaert F., Delmotte F., Khan Z.  2005.  What Are the Ants Doing? Vision-Based Tracking and Reconstruction of Control Programs Proceedings of the 2005 IEEE International Conference on Robotics and Automation, 2005. ICRA 2005. :4182-4187.
Egerstedt M., Balch T, Dellaert F., Delmotte F., Khan Z.  2005.  What Are the Ants Doing? Vision-Based Tracking and Reconstruction of Control Programs Proceedings of the 2005 IEEE International Conference on Robotics and Automation, 2005. ICRA 2005. :4182-4187.
Piatetsky-Shapiro G, Djeraba C, Getoor L, Grossman R, Feldman R, Zaki M.  2006.  What are the grand challenges for data mining? - KDD-2006 panel report ACM SIGKDD Explorations Newsletter. 8(2):70-77.
Druin A.  2005.  What children can teach us: Developing digital libraries for children with children. Library Quarterly. 75(1):20-41.
Stewart J, Raybourn E, Bederson BB, Druin A.  1998.  When Two Hands Are Better Than One: Enhancing Collaboration Using Single Display Groupware. CHI’98. Extended Abstracts. :287-288.
Sundaresan S, Feamster N, Dicioccio L, Teixeira R.  2010.  Which Factors Affect Access Network Performance? GT-CS-10-04
Domke J, Karapurkar A, Aloimonos Y.  2008.  Who killed the directed model? Computer Vision and Pattern Recognition, IEEE Computer Society Conference on. :1-8.
Istrail S, Sutton GG, Florea L, Halpern AL, Mobarry CM, Lippert R, Walenz B, Shatkay H, Dew I, Miller JR et al..  2004.  Whole-genome shotgun assembly and comparison of human genome assemblies. Proceedings of the National Academy of Sciences of the United States of America. 101(7):1916-1916.
Kembhavi A, Tom Yeh, Davis LS.  2010.  Why Did the Person Cross the Road (There)? Scene Understanding Using Probabilistic Logic Models and Common Sense Reasoning Computer Vision – ECCV 2010. 6312:693-706.
Kembhavi A, Tom Yeh, Davis LS.  2010.  Why Did the Person Cross the Road (There)? Scene Understanding Using Probabilistic Logic Models and Common Sense Reasoning Computer Vision – ECCV 2010. 6312:693-706.
Dumitras T, Narasimhan P.  2009.  Why Do Upgrades Fail and What Can We Do About It?: Toward Dependable, Online Upgrades in Enterprise System Middleware'09 Proceedings of the 10th ACM/IFIP/USENIX International Conference on Middleware. :18:1-18:20.
Bitansky N, Dachman-Soled D, Garg S, Jain A, Kalai YTauman, López-Alt A, Wichs D.  2013.  Why “Fiat-Shamir for Proofs” Lacks a Proof. Theory of Cryptography. :182-201.
Gumerov NA, Duraiswami R.  2009.  Wideband fast multipole accelerated boundary element methods for the three-dimensional Helmholtz equation.. The Journal of the Acoustical Society of America. 125(4):2566-2566.
Jimmy Lin, Demner-Fushman D.  2006.  Will pyramids built of nuggets topple over? Proceedings of the main conference on Human Language Technology Conference of the North American Chapter of the Association of Computational Linguistics. :383-390.
Agrawal M, Davis LS.  2004.  Window-based, discontinuity preserving stereo. Computer Vision and Pattern Recognition, 2004. CVPR 2004. Proceedings of the 2004 IEEE Computer Society Conference on. 1:I-66-I-73Vol.1-I-66-I-73Vol.1.
Ma H, Doermann D.  2004.  Word Level Script Identification on Scanned Document Images. SPIEConference on Document Recognition and Retrieval. :124-135.

Pages