Publications

Search
Export 1830 results:
Author [ Title(Asc)] Type Year
Filters: First Letter Of Last Name is D  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
Z
Bederson BB, Hollan JD, Stewart J, Rogers D, Druin A, Vick D, Ring L, Grose E, Forsythe C.  1997.  A zooming web browser. Human Factors in Web Development.
Y
Chetty M, Banks R, Brush A.J., Donner J, Grinter R.  2012.  You'Re Capped: Understanding the Effects of Bandwidth Caps on Broadband Use in the Home. SIGCHI '12. :3021-3030.
W
Plaisant C, Marchimini G, Bruns T, Komlodi A, Campbell L, Rose A, Ding GM, Beale Jr J, Nolet V, Shneiderman B et al..  2003.  The World's Information in Digital Libraries. The craft of information visualization: readings and reflectionsThe craft of information visualization: readings and reflections. :149-149.
desJardins M.  1993.  Workshop summary: AAAI-92 Workshop on Constraining Learning with Prior Knowledge. ACM SIGART Bulletin. 4(3):11-13.
Blackburn SM, Diwan A, Hauswirth M, Memon AM, Sweeney PF.  2010.  Workshop on experimental evaluation of software and systems in computer science (Evaluate 2010). Proceedings of the ACM international conference companion on Object oriented programming systems languages and applications companion. :291-292.
Ma H, Doermann D.  2004.  Word Level Script Identification on Scanned Document Images. SPIEConference on Document Recognition and Retrieval. :124-135.
Agrawal M, Davis LS.  2004.  Window-based, discontinuity preserving stereo. Computer Vision and Pattern Recognition, 2004. CVPR 2004. Proceedings of the 2004 IEEE Computer Society Conference on. 1:I-66-I-73Vol.1-I-66-I-73Vol.1.
Jimmy Lin, Demner-Fushman D.  2006.  Will pyramids built of nuggets topple over? Proceedings of the main conference on Human Language Technology Conference of the North American Chapter of the Association of Computational Linguistics. :383-390.
Gumerov NA, Duraiswami R.  2009.  Wideband fast multipole accelerated boundary element methods for the three-dimensional Helmholtz equation.. The Journal of the Acoustical Society of America. 125(4):2566-2566.
Bitansky N, Dachman-Soled D, Garg S, Jain A, Kalai YTauman, López-Alt A, Wichs D.  2013.  Why “Fiat-Shamir for Proofs” Lacks a Proof. Theory of Cryptography. :182-201.
Dumitras T, Narasimhan P.  2009.  Why Do Upgrades Fail and What Can We Do About It?: Toward Dependable, Online Upgrades in Enterprise System Middleware'09 Proceedings of the 10th ACM/IFIP/USENIX International Conference on Middleware. :18:1-18:20.
Kembhavi A, Tom Yeh, Davis LS.  2010.  Why Did the Person Cross the Road (There)? Scene Understanding Using Probabilistic Logic Models and Common Sense Reasoning Computer Vision – ECCV 2010. 6312:693-706.
Kembhavi A, Tom Yeh, Davis LS.  2010.  Why Did the Person Cross the Road (There)? Scene Understanding Using Probabilistic Logic Models and Common Sense Reasoning Computer Vision – ECCV 2010. 6312:693-706.
Istrail S, Sutton GG, Florea L, Halpern AL, Mobarry CM, Lippert R, Walenz B, Shatkay H, Dew I, Miller JR et al..  2004.  Whole-genome shotgun assembly and comparison of human genome assemblies. Proceedings of the National Academy of Sciences of the United States of America. 101(7):1916-1916.
Domke J, Karapurkar A, Aloimonos Y.  2008.  Who killed the directed model? Computer Vision and Pattern Recognition, IEEE Computer Society Conference on. :1-8.
Sundaresan S, Feamster N, Dicioccio L, Teixeira R.  2010.  Which Factors Affect Access Network Performance? GT-CS-10-04
Stewart J, Raybourn E, Bederson BB, Druin A.  1998.  When Two Hands Are Better Than One: Enhancing Collaboration Using Single Display Groupware. CHI’98. Extended Abstracts. :287-288.
Druin A.  2005.  What children can teach us: Developing digital libraries for children with children. Library Quarterly. 75(1):20-41.
Piatetsky-Shapiro G, Djeraba C, Getoor L, Grossman R, Feldman R, Zaki M.  2006.  What are the grand challenges for data mining? - KDD-2006 panel report ACM SIGKDD Explorations Newsletter. 8(2):70-77.
Egerstedt M., Balch T, Dellaert F., Delmotte F., Khan Z.  2005.  What Are the Ants Doing? Vision-Based Tracking and Reconstruction of Control Programs Proceedings of the 2005 IEEE International Conference on Robotics and Automation, 2005. ICRA 2005. :4182-4187.
Egerstedt M., Balch T, Dellaert F., Delmotte F., Khan Z.  2005.  What Are the Ants Doing? Vision-Based Tracking and Reconstruction of Control Programs Proceedings of the 2005 IEEE International Conference on Robotics and Automation, 2005. ICRA 2005. :4182-4187.
Nandi A, Bhattacharjee B, Druschel P.  2009.  What a mesh: understanding the design tradeoffs for streaming multicast. SIGMETRICS Perform. Eval. Rev.. 37(2):85-86.
White B, Tom Yeh, Jimmy Lin, Davis LS.  2010.  Web-scale computer vision using MapReduce for multimedia data mining. Proceedings of the Tenth International Workshop on Multimedia Data Mining. :9:1–9:10-9:1–9:10.
Daumé H, Brill E.  2004.  Web search intent induction via automatic query reformulation. Proceedings of HLT-NAACL 2004: Short Papers on XX. :49-52.
Dumais S, Banko M, Brill E, Jimmy Lin, Ng A.  2002.  Web question answering: is more always better? Proceedings of the 25th annual international ACM SIGIR conference on Research and development in information retrieval. :291-298.

Pages