Publications

Export 228 results:
Author Title Type [ Year(Asc)]
Filters: First Letter Of Title is U  [Clear All Filters]
2008
Zhu G, Yu X, Li Y, Doermann D.  2008.  Unconstrained Language Identification Using AShape Codebook. The 11th International Conference on Frontiers in Handwritting Recognition (ICFHR 2008). :13-18.
Nagarajan N, Kingsford C.  2008.  Uncovering Genomic Reassortments among Influenza Strains by Enumerating Maximal Bicliques. IEEE International Conference on Bioinformatics and Biomedicine, 2008. BIBM '08. :223-230.
Basili VR, Carver JC, Cruzes D, Hochstein LM, Hollingsworth J, Shull F, Zelkowitz MV.  2008.  Understanding the High-Performance-Computing Community: A Software Engineer's Perspective. Software, IEEE. 25(4):29-36.
Guven T, La RJ, Shayman MA, Bhattacharjee B.  2008.  A Unified Framework for Multipath Routing for Unicast and Multicast Traffic. Networking, IEEE/ACM Transactions on. 16(5):1038-1051.
Goyal V, Katz J.  2008.  Universally composable multi-party computation with an unreliable common reference string. Theory of Cryptography. :142-154.
Oard D.  2008.  Unlocking the Potential of the Spoken Word. Science. 321(5897):1787-1788.
Martin, M.P, Priebe S, Wu M.  2008.  Upstream and downstream in unsteadiness of STBLI using DNS data in two con gurations. 46th AIAA Aerospace Sciences Meeting.
Martin, M.P, Priebe S, Wu M.  2008.  Upstream and downstream influence on the unsteadiness of STBLI using DNS data in two configurations. AIAA Paper 2008-0719, 46, h.
Chrun D, Cukier M, Sneeringer G.  2008.  On the Use of Security Metrics Based on Intrusion Prevention System Event Data: An Empirical Analysis. :49-58.
Oard D, He D, Wang J.  2008.  User-assisted query translation for interactive cross-language information retrieval. Information Processing & Management. 44(1):181-211.
Kules B, Shneiderman B.  2008.  Users can change their web search tactics: Design guidelines for categorized overviews. Information Processing & Management. 44(2):463-484.
Xie Q, Memon AM.  2008.  Using a pilot study to derive a GUI model for automated testing. ACM Transactions on Software Engineering and Methodology (TOSEM). 18(2):7:1–7:35-7:1–7:35.
Osadchy M, Jacobs DW, Ramamoorthi R, Tucker D.  2008.  Using specularities in comparing 3D models and 2D images. Computer Vision and Image Understanding. 111(3):275-294.
Klasnja P, Harrison BL, LeGrand L, LaMarca A, Froehlich J, Hudson SE.  2008.  Using wearable sensors and real time inference to understand human recall of routine activities. Proceedings of the 10th international conference on Ubiquitous computing. :154-163.
2007
Chaiyanan S, Chaiyanan S, Grim C, Maugel T, Huq A, Colwell RR.  2007.  Ultrastructure of coccoid viable but non‐culturable Vibrio cholerae. Environmental Microbiology. 9(2):393-402.
V.S. Subrahmanian.  2007.  Uncertainty in logic programming: Some recollections. Association for Logic Programming Newsletter. 20(2)
Alharbi A, Rand W, Riolo R.  2007.  Understanding the Semantics of the Genetic Algorithm in Dynamic Environments. Applications of Evolutionary Computing. :657-667.
Mao Y, M. Wu.  2007.  Unicity Distance of Robust Image Hashing. Information Forensics and Security, IEEE Transactions on. 2(3):462-467.
Kingsford C, Delcher AL, Salzberg SL.  2007.  A unified model explaining the offsets of overlapping and near-overlapping prokaryotic genes. Molecular biology and evolution. 24(9):2091-2091.
Schurr SP, Tits A, O'Leary DP.  2007.  Universal Duality in Conic Convex Optimization. Mathematical Programming A. 109(1):69-88.
Shneiderman B.  2007.  Universal Usability: A grand challenge for HCI. Universal usability: Designing computer interfaces for user diversity.
Katz J.  2007.  Universally composable multi-party computation using tamper-proof hardware. Advances in Cryptology-EUROCRYPT 2007. :115-128.
Horvitz O, Katz J.  2007.  Universally-composable two-party computation in two rounds. Proceedings of the 27th annual international cryptology conference on Advances in cryptology. :111-129.
Khadilkar M, Feamster N, Sanders M, Clark R.  2007.  Usage-based dhcp lease time optimization. Proceedings of the 7th ACM SIGCOMM conference on Internet measurement. :71-76.
Jimmy Lin.  2007.  User simulations for evaluating answers to question series. Information Processing & Management. 43(3):717-729.

Pages