Publications

Export 7151 results:
Author [ Title(Asc)] Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
Z
Ghosh P, Shneiderman B.  1999.  Zoom-Only Vs Overview-Detail Pair: A Study in Browsing Techniques as Applied to Patient Histories. University of Maryland Technical Report, CS-TR. 4028(99):12-12.
Bederson BB, Hollan JD, Stewart J, Rogers D, Druin A, Vick D, Ring L, Grose E, Forsythe C.  1997.  A zooming web browser. Human Factors in Web Development.
Good L, Bederson BB.  2002.  Zoomable user interfaces as a medium for slide show presentations. Information Visualization. 1(1):35-35.
Hassin R, Khuller S.  2001.  z-Approximations. Journal of Algorithms. 41(2):429-442.
Y
Chetty M, Banks R, Brush A.J., Donner J, Grinter R.  2012.  You'Re Capped: Understanding the Effects of Bandwidth Caps on Broadband Use in the Home. SIGCHI '12. :3021-3030.
Mishra A, Shin M, Arbaugh WA.  2002.  Your 802.11 network has no clothes. IEEE Communications Magazine. 9:44-51.
Vishnoi A, Kryazhimskiy S, Bazykin GA, Hannenhalli S, Plotkin JB.  2010.  Young Proteins Experience More Variable Selection Pressures Than Old Proteins. Genome ResearchGenome Res.. 20(11):1574-1581.
O'Leary DP.  1991.  Yet another polynomial preconditioner for the conjugate gradient algorithm. Linear Algebra and its Applications. 154–156:377-388.
X
Berkovich E, Nuzman J, Franklin M, Jacob B, Vishkin U.  1999.  XMT-M: A Scalable Decentralized Processor. UMIACS-TR-99-55
W
Gruser J, Raschid L, Vidal ME, Bright L.  1998.  Wrapper generation for Web accessible data sources. 3rd IFCIS International Conference on Cooperative Information Systems, 1998. Proceedings. :14-23.
Papamanthou C, Paparrizos K, Samaras N, Stergiou K.  2008.  Worst case examples of an exterior point algorithm for the assignment problem. Discrete Optimization. 5(3):605-614.
Plaisant C, Marchimini G, Bruns T, Komlodi A, Campbell L, Rose A, Ding GM, Beale Jr J, Nolet V, Shneiderman B et al..  2003.  The World's Information in Digital Libraries. The craft of information visualization: readings and reflectionsThe craft of information visualization: readings and reflections. :149-149.
desJardins M.  1993.  Workshop summary: AAAI-92 Workshop on Constraining Learning with Prior Knowledge. ACM SIGART Bulletin. 4(3):11-13.
Hotho A, Sure Y, Getoor L.  2004.  A workshop report: mining for and from the Semantic Web at KDD 2004. SIGKDD Explor. Newsl.. 6(2):142-143.
Minker J.  1999.  The Workshop on Logic-Based Artificial Intelligence. AI Magazine. 20(4):97-97.
Blackburn SM, Diwan A, Hauswirth M, Memon AM, Sweeney PF.  2010.  Workshop on experimental evaluation of software and systems in computer science (Evaluate 2010). Proceedings of the ACM international conference companion on Object oriented programming systems languages and applications companion. :291-292.
Lazar J, Jones A, Shneiderman B.  2006.  Workplace user frustration with computers: an exploratory investigation of the causes and severity. Behaviour & Information Technology. 25(3):239-251.
Resnik P.  1992.  Wordnet and distributional analysis: A class-based approach to lexical discovery. AAAI workshop on statistically-based natural language processing techniques. :56-64.
Resnik P.  1998.  WordNet and class-based probabilities. WordNet: An electronic lexical database. :239-263.
Lopez A, Nossal M, Hwa R, Resnik P.  2002.  Word-level Alignment for Multilingual Resource Acquisition.
Lopez A, Resnik P.  2006.  Word-based alignment, phrase-based translation: What’s the link. Proc. of AMTA. :90-99.
Ma H, Doermann D.  2004.  Word Level Script Identification on Scanned Document Images. SPIEConference on Document Recognition and Retrieval. :124-135.
Housley R, Arbaugh WA.  2003.  WLAN problems and solutions. Communications of the ACM. 46(5):31-34.
Carr R, Raboin E, Parker A, Nau DS.  2009.  Within epsilon of optimal play in the cultaptation social learning game. :1327-1328.
Shin M, Ma J, Mishra A, Arbaugh WA.  2006.  Wireless Network Security and Interworking. Proceedings of the IEEE. 94(2):455-466.

Pages