Publications

Export 197 results:
Author Title Type [ Year(Asc)]
Filters: First Letter Of Title is B  [Clear All Filters]
2005
Khuller S, Kim Y-A, Wan Y-C J.  2005.  Broadcasting on networks of workstations. Proceedings of the seventeenth annual ACM symposium on Parallelism in algorithms and architectures. :279-288.
Tanin E, Plaisant C, Shneiderman B.  2005.  Broadening Access to Large Online Databases by Generalizing Query Previews (2000). Institute for Systems Research Technical Reports.
Tanin E, Shneiderman B.  2005.  Browsing Large Online Data Tables Using Generalized Query Previews (2001). Institute for Systems Research Technical Reports.
Seo J, Bakay M, Chen Y-W, Hilmer S, Shneiderman B, Hoffman EP.  2005.  Building a Coherent Data Pipeline in Microarray Data Analyses: Optimization of Signal/Noise Ratios Using an Interactive Visualization Tool and a Novel Noise Filtering Method (2003). Institute for Systems Research Technical Reports.
He S, M. Wu.  2005.  Building efficient and effective multimedia fingerprints via joint coding and embedding. Proceedings of the 7th workshop on Multimedia and security. :127-136.
2004
Kim K, Chalidabhongse TH, Harwood D, Davis LS.  2004.  Background modeling and subtraction by codebook construction. Image Processing, 2004. ICIP '04. 2004 International Conference on. 5:3061-3064Vol.5-3061-3064Vol.5.
Qian G, Chellappa R.  2004.  Bayesian self-calibration of a moving camera. Computer Vision and Image Understanding. 95(3):287-316.
Zajic D, Dorr BJ, Schwartz R.  2004.  Bbn/umd at duc-2004: Topiary. Proceedings of the HLT-NAACL 2004 Document Understanding Workshop, Boston. :112-119.
Vishkin U, Smolyaninov I.  2004.  Bending light for multi-chip virtual PRAMs? Proc. 3rd Workshop on Non-Slicon Computation, held in conjunction with the 31st International Symposium on Computer Architecture (ISCA 2004). :19-23.
Ji H, Fermüller C.  2004.  Bias in Shape Estimation. Computer Vision - ECCV 2004Computer Vision - ECCV 2004. 3023:405-416.
Fomin EDDFV, Hajiaghayi MT, Thilikos DM.  2004.  Bidimensional Parameters and Local Treewidth. Latin 2004: Theoretical Informatics: 6th Latin American Symposium, Buenos Aires, Argentina, April 5-8, 2004: Proceedings. :109-109.
Katz J.  2004.  Binary tree encryption: Constructions and applications. Information Security and Cryptology-ICISC 2003. :1-11.
Cummings MP.  2004.  A book like its cover. Heredity. 93(2):234-235.
Feamster N, Mao Z M, Rexford J.  2004.  BorderGuard: detecting cold potatoes from peers. Proceedings of the 4th ACM SIGCOMM conference on Internet measurement. :213-218.
Reuter K, Druin A.  2004.  Bringing together children and books: An initial descriptive study of children's book searching and selection behavior in a digital library. Proceedings of the American Society for Information science and Technology. 41(1):339-348.
Murthy PK, Bhattacharyya SS.  2004.  Buffer merging—a powerful technique for reducing memory requirements of synchronous dataflow specifications. ACM Transactions on Design Automation of Electronic Systems (TODAES). 9(2):212-237.
Williams CC, Hollingsworth J.  2004.  Bug driven bug finders. Proceedings of the International Workshop on Mining Software Repositories. :70-74.
Oard D, Soergel D, Doermann D, Huang X, Murray CG, Wang J, Ramabhadran B, Franz M, Gustman S, Mayfield J et al..  2004.  Building an information retrieval test collection for spontaneous conversational speech. Proceedings of the 27th annual international ACM SIGIR conference on Research and development in information retrieval. :41-48.
Hourcade JP, Bederson BB, Druin A.  2004.  Building KidPad: an application for children's collaborative storytelling. Software: Practice and Experience. 34(9):895-914.
2003
Labrinidis A, Roussopoulos N.  2003.  Balancing performance and data freshness in web database servers. Proceedings of the 29th international conference on Very large data bases-Volume 29. :393-404.
Jacobs DW.  2003.  BAYESIAN AND STATISTICAL APPROACHES TO VISION-Natural Image Statistics and Perceptual Inference-What makes viewpoint-invariant properties perceptually salient? Journal of the Optical Society of America-A-Optics Image Science and Vision. 20(7):1304-1320.
Golubchik L, Cheng WC, Chou C-F, Khuller S, Samet H, Wan JC.  2003.  Bistro: a scalable and secure data transfer service for digital government applications. Communications of the ACM. 46(1):50-51.
Golubchik L, Cheng WC, Chou C-F, Khuller S, Samet H, Wan JC.  2003.  Bistro: a scalable and secure data transfer service for digital government applications. Commun. ACM. 46(1):50-51.
Pruessner A, O'Leary DP.  2003.  Blind Deconvolution Using a Regularized Structured Total Least Norm Approach. SIAM J. on Matrix Analysis and Applications. 24:1018-1037.
Bobba RB, Eschenauer L, Gligor V, Arbaugh WA.  2003.  Bootstrapping security associations for routing in mobile ad-hoc networks. IEEE Global Telecommunications Conference, 2003. GLOBECOM '03. 3:1511-1515vol.3-1511-1515vol.3.

Pages