Conference Papers

Pages

Greif I, Curtis B, Krasner H, Malone TW, Shneiderman B. Computer-supported cooperative work (panel): is this REALLY a new field of research?. In: Proceedings of the SIGCHI/GI conference on Human factors in computing systems and graphics interface. New York, NY, USA: ACM; 1987. 2. p. 227-228p. (CHI '87).
Horprasert T, Yacoob Y, Davis LS. Computing 3-D head orientation from a monocular image sequence. In: Automatic Face and Gesture Recognition, 1996., Proceedings of the Second International Conference on.; 1996. 2. p. 242-247p.
Celikkan U, Cleaveland R. Computing diagnostic tests for incorrect processes. In: Proc. IFIP WG6. 1 12th Intl. Symp. on Protocol Specification, Testing, and Verification.; 1992. 2. p. 263-278p.
Kanungo T, Mount D, Netanyahu NS, Piatko C, Silverman R, Wu AY. Computing nearest neighbors for moving points and applications to clustering. In: Proceedings of the tenth annual ACM-SIAM symposium on Discrete algorithms. Philadelphia, PA, USA: Society for Industrial and Applied Mathematics; 1999. 9. p. 931-932p. (SODA '99).
Bazinet AL, Cummings MP. Computing the Tree of Life: Leveraging the Power of Desktop and Service Grids. In: Parallel and Distributed Processing Workshops and Phd Forum (IPDPSW), 2011 IEEE International Symposium on.; 2011. 1. p. 1896-1902p.
Srinivasan A, Zuckerman D. Computing with very weak random sources. In: , 35th Annual Symposium on Foundations of Computer Science, 1994 Proceedings. IEEE; 1994. 2. p. 264-275p.
Mohammad S, Dorr BJ, Hirst G. Computing word-pair antonymy. In: Proceedings of the Conference on Empirical Methods in Natural Language Processing. Stroudsburg, PA, USA: Association for Computational Linguistics; 2008. 9. p. 982-991p. (EMNLP '08).
Refaey MA, Elsayed KM, Hanafy SM, Davis LS. Concurrent transition and shot detection in football videos using Fuzzy Logic. In: Image Processing (ICIP), 2009 16th IEEE International Conference on.; 2009. 4. p. 4341-4344p.
Jacobs DW, Weinshall D, Gdalyahu Y. Condensing image databases when retrieval is based on non-metric distances. In: Computer Vision, 1998. Sixth International Conference on.; 1998. 5. p. 596-601p.
Swaminathan A, Mao Y, Su G-, Gou H, Varna AL, He S, et al. Confidentiality-preserving rank-ordered search. In: Proceedings of the 2007 ACM workshop on Storage security and survivability. New York, NY, USA: ACM; 2007. 7. p. 7-12p. (StorageSS '07).
Corretjer I, Hsu C, Bhattacharyya SS. Configuration and representation of large-scale dataflow graphs using the dataflow interchange format. In: Proceedings of the IEEE Workshop on Signal Processing Systems, Banff, Canada.; 2006. 1. p. 10-15p.
Dachman-Soled D, Sreedhar V. Configuration Reasoning and Ontology For Web. In: IEEE International Conference on Services Computing, 2007. SCC 2007.; 2007. 3. p. 387-394p.
Chang J, Boyd-Graber J, Blei DM. Connections between the lines: augmenting social networks with text. In: Proceedings of the 15th ACM SIGKDD international conference on Knowledge discovery and data mining. New York, NY, USA: ACM; 2009. 1. p. 169-178p. (KDD '09).
Li J, Deshpande A. Consensus answers for queries over probabilistic databases. In: Proceedings of the twenty-eighth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems. New York, NY, USA: ACM; 2009. 2. p. 259-268p. (PODS '09).
Lee M, De Floriani L, Samet H. Constant-time navigation in four-dimensional nested simplicial meshes. In: Shape Modeling Applications, 2004. Proceedings.; 2004. 2. p. 221-230p.
Xu Q, desJardins M. Constrained spectral clustering under a local proximity structure assumption. In: In Proceedings of the 18th International Conference of the Florida Artificial Intelligence Research Society (FLAIRS-05).; 2005.
Gupta A, Mittal A, Davis LS. Constraint Integration for Multiview Pose Estimation of Humans with Self-Occlusions. In: 3D Data Processing, Visualization, and Transmission, Third International Symposium on.; 2006. 9. p. 900-907p.
Plangprasopchok A, Lerman K, Getoor L. Constructing folksonomies by integrating structured metadata. In: Proceedings of the 19th international conference on World wide web. New York, NY, USA: ACM; 2010. 1. p. 1165-1166p. (WWW '10).
Plangprasopchok A, Lerman K, Getoor L. Constructing Folksonomies by Integrating Structured Metadata with Relational Clustering. In: Workshops at the Twenty-Fourth AAAI Conference on Artificial Intelligence.; 2010.
Lim S-, Mittal A, Davis LS. Constructing task visibility intervals for a surveillance system. In: Proceedings of the third ACM international workshop on Video surveillance & sensor networks. New York, NY, USA: ACM; 2005. 1. p. 141-148p. (VSSN '05).
Banerjee S, Kommareddy C, Kar K, Bhattacharjee B, Khuller S. Construction of an efficient overlay multicast infrastructure for real-time applications. In: INFOCOM 2003. Twenty-Second Annual Joint Conference of the IEEE Computer and Communications. IEEE Societies. Vol 2.; 2003. 1. p. 1521-1531p. vol.p. 2-1521p. - 1531 vol.2.
Chetty M. Contemporary domestic infrastructures and technology design. In: SIGCHI EA '09. ACM; 2009. 3. p. 3109-3112p. (CHI EA '09).
Liang J, Doermann D. Content Features for Logical Document Labeling. In: Proc. SPIE Conference on Document Recognition and Retrieval X.; 2003. 1. p. 189-196p.
Kauniskangas H, Sauvola J, Pietikainen M, Doermann D. Content-based Image Retrieval Using Composite Features. In: Proceedings of the 1997 Scandinavian Conference on Image Analysis.; 1997. 3. p. 35-42p.
Folkers A, Samet H. Content-based image retrieval using Fourier descriptors on a logo database. In: Pattern Recognition, 2002. Proceedings. 16th International Conference on. Vol 3.; 2002. 5. p. 521-524p. vol.p. 3-521p. - 524 vol.3.
Gupta A, Chen T, Chen F, Kimber D, Davis LS. Context and observation driven latent variable model for human pose estimation. In: Computer Vision and Pattern Recognition, 2008. CVPR 2008. IEEE Conference on.; 2008. 1. p. 1-8p.
Agrawal M, Doermann D. Context-Aware and Content-Based Dynamic Voronoi Page Segmentation. In: The Nineth IAPRInternational Workshop on Document Analysis Systems.; 2010. 7. p. 73-80p.
Wang L, Oard D. Context-based message expansion for disentanglement of interleaved text conversations. In: Proceedings of Human Language Technologies: The 2009 Annual Conference of the North American Chapter of the Association for Computational Linguistics.; 2009. 2. p. 200-208p.
Neamtiu I, Hicks MW, Foster JS, Pratikakis P. Contextual effects for version-consistent dynamic software updating and safe concurrent programming. In: Proceedings of the 35th annual ACM SIGPLAN-SIGACT symposium on Principles of programming languages. New York, NY, USA: ACM; 2008. 3. p. 37-49p. (POPL '08).
Iwerks GS, Samet H, Smith K. Continuous k-nearest neighbor queries for continuously moving points with updates. In: Proceedings of the 29th international conference on Very large data bases-Volume 29.; 2003. 5. p. 512-523p.
Abd-Almageed W, Smith CE. Contour migration: solving object ambiguity with shape-space visual guidance. In: IEEE/RSJ International Conference on Intelligent Robots and Systems, 2002. Vol 1. IEEE; 2002. 3. p. 330-335p. vol.p. 1-330p. - 335 vol.1.
Aloimonos Y, Basu A, Brown CM. Contour, orientation and motion. In: Proceedings: Image Understanding Workshop (Miami Beach, FL, December 9–10, 1985).; 1985. 1. p. 129-136p.
Gupta H, Roy Chowdhury AK, Chellappa R. Contour-based 3D Face Modeling from a Monocular Video. In: Proceedings of the British Machine Vision Conference. British Machine Vision Association; 2004. 3. 39.p. 1-39p. .p. 10-39p. .p. 1-39p. .10.
Bederson BB, Wallace RS, Schwartz EL. Control and design of the spherical pointing motor. In: , 1993 IEEE International Conference on Robotics and Automation, 1993. Proceedings. IEEE; 1993. 6. p. 630-636p. vol.p. 2-630p. -636 vol.2.
El-Sana J, Varshney A. Controlled simplification of genus for polygonal models. In: Visualization '97., Proceedings.; 1997. 4. p. 403-410p.
Wolverton M, desJardins M. Controlling communication in distributed planning using irrelevance reasoning. In: Proceedings of the fifteenth national/tenth conference on Artificial intelligence/Innovative applications of artificial intelligence. Menlo Park, CA, USA: American Association for Artificial Intelligence; 1998. 8. p. 868-874p. (AAAI '98/IAAI '98).
Chow R, Golle P, Jakobsson M, Elaine Shi, Staddon J, Masuoka R, et al. Controlling data in the cloud: outsourcing computation without outsourcing control. ACM; 2009. 8. p. 85-90p. (CCSW '09).
Matias Y, Vishkin U. Converting high probability into nearly-constant time—with applications to parallel hashing. In: Proceedings of the twenty-third annual ACM symposium on Theory of computing.; 1991. 3. p. 307-316p.
Druin A. Cooperative inquiry: developing new technologies for children with children. In: Proceedings of the SIGCHI conference on Human factors in computing systems: the CHI is the limit.; 1999. 5. p. 592-599p.
Lee S, Sherwood R, Bhattacharjee B. Cooperative peer groups in NICE. In: INFOCOM 2003. Twenty-Second Annual Joint Conference of the IEEE Computer and Communications. IEEE Societies. Vol 2.; 2003. 1. p. 1272-1282p. vol.p. 2-1272p. - 1282 vol.2.
Mao Y, M. Wu. Coordinated sensor deployment for improving secure communications and sensing coverage. In: Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks. New York, NY, USA: ACM; 2005. 1. p. 117-128p. (SASN '05).
Petroni J., Fraser T, Molina J, Arbaugh WA. Copilot - a coprocessor-based kernel runtime integrity monitor. In: Proceedings of the 13th conference on USENIX Security Symposium - Volume 13. San Diego, CA: USENIX Association; 2004. 1. p. 13. (SSYM'04).
Manson J, Pugh W. Core semantics of multithreaded Java. In: Proceedings of the 2001 joint ACM-ISCOPE conference on Java Grande - JGI '01. Palo Alto, California, United States; 2001. 2. p. 29-38p.
Zajic D, Maxwell M, Doermann D, Rodrigues P, Bloodgood M. Correcting Errors in Digital Lexicographic Resources Using a Dictionary Manipulation Language. In: Electronic lexicography in the 21st century: new applications for new users (eLEX2011).; 2011. 2. p. 297-301p.
Feamster N, Balakrishnan H. Correctness properties for Internet routing. In: Allerton Conference on Communication, Control, and Computing.; 2005.
Reggia JA, Sutton III GG, Lynne C, D'Autrechy SC, Armentrout SL. Cortical inhibition as explained by the competitive distribution hypothesis. In: Network models for control and processing.; 2000. 3. p. 31-62p.
Bröcheler M, Pugliese A, V.S. Subrahmanian. COSI: Cloud Oriented Subgraph Identification in Massive Social Networks. In: Advances in Social Networks Analysis and Mining (ASONAM), 2010 International Conference on.; 2010. 2. p. 248-255p.

Pages