Conference Papers

Pages

Deshpande A, Sarawagi S. Probabilistic graphical models and their role in databases. In: Proceedings of the 33rd international conference on Very large data bases. VLDB Endowment; 2007. 1. p. 1435-1436p. (VLDB '07).
Zhou SK, Chellappa R. Probabilistic identity characterization for face recognition. In: Computer Vision and Pattern Recognition, 2004. CVPR 2004. Proceedings of the 2004 IEEE Computer Society Conference on. Vol 2.; 2004. I. II-p. 805-p. II-812 Vol.p. 2-p. II-p. 805-p. II-812 Vol.2.
Chellappa R, Kruger V, Zhou S. Probabilistic recognition of human faces from video. In: Image Processing. 2002. Proceedings. 2002 International Conference on. Vol 1.; 2002. I. I-p. 41-p. I-44 vol.p. 1-p. I-p. 41-p. I-44 vol.1.
Darwish K, Oard D. Probabilistic structured query methods. In: Proceedings of the 26th annual international ACM SIGIR conference on Research and development in informaion retrieval. New York, NY, USA: ACM; 2003. 3. p. 338-344p. (SIGIR '03).
Elgammal A, Duraiswami R, Davis LS. Probabilistic tracking in joint feature-spatial spaces. In: Computer Vision and Pattern Recognition, 2003. Proceedings. 2003 IEEE Computer Society Conference on. Vol 1.; 2003. I. I-p. 781-p. I-788 vol.p. 1-p. I-p. 781-p. I-788 vol.1.
Resnik P. Probabilistic tree-adjoining grammar as a framework for statistical natural language processing. In: Proceedings of the 14th conference on Computational linguistics-Volume 2.; 1992. 4. p. 418-424p.
Sanders WH, Cukier M, Webber F, Pal P, Watro R. Probabilistic validation of intrusion tolerance.; 2002. 7. p. 78-79p.
Kraus S, V.S. Subrahmanian, Tas NC. Probabilistically survivable mass. In: INTERNATIONAL JOINT CONFERENCE ON ARTIFICIAL INTELLIGENCE. Vol 18.; 2003. 7. p. 789-795p.
Kang H-, Doermann D. Product approximation by minimizing the upper bound of Bayes error rate for Bayesian combination of classifiers. In: Pattern Recognition, 2004. ICPR 2004. Proceedings of the 17th International Conference on. Vol 1.; 2004. 2. p. 252-255p. Vol.p. 1-252p. - 255 Vol.1.
Ramsbrock D, Berthier R, Cukier M. Profiling Attacker Behavior Following SSH Compromises.; 2007. 1. p. 119-124p.
Marchionini G, Haas S, Shneiderman B, Plaisant C, Hert CA. Project highlight: toward the statistical knowledge network. In: Proceedings of the 2004 annual national conference on Digital government research. Digital Government Society of North America; 2004. 1. 125:p. 1-125p. :p. 2-125p. :p. 1-125p. :2. (dg.o '04).
Shneiderman B, Churchill E, Fischer G, Goldberg K. Promoting social creativity: a component of a national initiative for social participation. In: Proceedings of the seventh ACM conference on Creativity and cognition. New York, NY, USA: ACM; 2009. 7. p. 7-8p. (C&C '09).
Reggia JA. Properties of a competition-based activation mechanism in neuromimetic network models. In: Proceedings of the First International Conference on Neural Networks.; 1987.
Minker J, Perlis D. Protected circumscription. In: Proc. Workshop on Non-Monotonic Reasoning.; 1984. 3. p. 337-343p.
Sabnis C, Cukier M, Ren J, Rubel P, Sanders WH, Bakken DE, et al. Proteus: a flexible infrastructure to implement adaptive fault tolerance in AQuA.; 1999. 1. p. 149-168p.
Jajodia S, Kudo M, V.S. Subrahmanian. Provisional authorizations. In: E-commerce Security and Privacy. Vol 2.; 2001. 1. p. 133-159p.
Aloimonos Y. Purposive and qualitative active vision. In: Proceedings of 10th International Conference on Pattern Recognition, 1990. Vol i. IEEE; 1990. 3. p. 346-360p. vol.p. 1-346p. -360 vol.1.
Boyd-Graber J, Blei D. PUTOP: turning predominant senses into a topic model for word sense disambiguation. In: Proceedings of the 4th International Workshop on Semantic Evaluations. Stroudsburg, PA, USA: Association for Computational Linguistics; 2007. 2. p. 277-281p. (SemEval '07).
Shneiderman B. Putting the human factor into systems development. In: Proceedings of the eighteenth annual computer personnel research conference. New York, NY, USA: ACM; 1981. 1. p. 1-13p. (SIGCPR '81).
Jimmy Lin, Madnani N, Dorr BJ. Putting the user in the loop: interactive Maximal Marginal Relevance for query-focused summarization. In: Human Language Technologies: The 2010 Annual Conference of the North American Chapter of the Association for Computational Linguistics. Stroudsburg, PA, USA: Association for Computational Linguistics; 2010. 3. p. 305-308p. (HLT '10).
Hung E, Getoor L, V.S. Subrahmanian. PXML: a probabilistic semistructured data model and algebra. In: Data Engineering, 2003. Proceedings. 19th International Conference on.; 2003. 4. p. 467-478p.
Shulman D, Fermüller C. Qualitative depth and FOE information via smoothed flow. In: Proceedings of the 20th workshop of the Austrian Association for Pattern Recognition (OAGM/AAPR) on Pattern recognition 1996. Munich, Germany, Germany: R. Oldenbourg Verlag GmbH; 1996. 2. p. 207-213p.
Ramasamy HV, Pandey P, Lyons J, Cukier M, Sanders WH. Quantifying the cost of providing intrusion tolerance in group communication systems.; 2002. 2. p. 229-238p.
Parameswaran V, Chellappa R. Quasi-invariants for human action representation and recognition. In: Pattern Recognition, 2002. Proceedings. 16th International Conference on. Vol 1.; 2002. 3. p. 307-310p. vol.p. 1-307p. - 310 vol.1.
Zhang K, Andrade H, Raschid L, Sussman A. Query planning for the grid: adapting to dynamic resource availability. In: Cluster Computing and the Grid, IEEE International Symposium on. Vol 2. Los Alamitos, CA, USA: IEEE Computer Society; 2005. 7. p. 751-758p.
Donn K, Plaisant C, Shneiderman B. Query previews in networked information systems. In: Research and Technology Advances in Digital Libraries, 1996. ADL '96., Proceedings of the Third Forum on.; 1996. 1. p. 120-129p.
Donn K, Plaisant C, Shneiderman B. Query previews in networked information systems. In: Proceedings of the Third Forum on Research and Technology Advances in Digital Libraries, 1996. ADL '96. IEEE; 1996. 1. p. 120-129p.
Plaisant C, Bruns T, Shneiderman B, Doan K. Query previews in networked information systems: the case of EOSDIS. In: CHI '97 extended abstracts on Human factors in computing systems: looking to the future. New York, NY, USA: ACM; 1997. 2. p. 202-203p. (CHI EA '97).
Vidal M, Raschid L, Marquez N, Cardenas M, Wu Y. Query Rewriting in the Semantic Web7. In: Data Engineering Workshops, 22nd International Conference on. Los Alamitos, CA, USA: IEEE Computer Society; 2006. 7. p. 7.
Silaghi B, Bhattacharjee B, Keleher P. Query routing in the TerraDir distributed directory. In: Proceedings of the SPIE ITCOM. Vol 4868.; 2002. 2. p. 299-309p.
Mitchell JS, Mount D, Suri S. Query-sensitive ray shooting. In: Proceedings of the tenth annual symposium on Computational geometry. New York, NY, USA: ACM; 1994. 3. p. 359-368p. (SCG '94).
BHATTACHARVA I, Getoor L, Licamele L. Query-time entity resolution. In: International conference on knowledge discovery and data mining.; 2006. 5. p. 529-534p.
Kantere V, Tsoumakos D, Roussopoulos N. Querying structured data in an unstructured P2P system. In: Proceedings of the 6th annual ACM international workshop on Web information and data management - WIDM '04. Washington DC, USA; 2004. 6. p. 64.
Chialin TK, Kurc T, Chang C, Ferreira R, Sussman A, Saltz J. Querying Very Large Multi-dimensional Datasets in ADR. In: In Proceedings of SC99: High Performance Networking and Computing.; 1999.
Bleiholder J, Naumann F, Raschid L, Vidal ME. Querying Web-Accessible Life Science Sources: Which paths to choose?. In: Proceedings of VLDB Workshop on Information Integration on the Web (IIWeb-2004).; 2004. 8. p. 83.
Jimmy Lin, Katz B. Question answering from the web using knowledge annotation and knowledge mining techniques. In: Proceedings of the twelfth international conference on Information and knowledge management. New York, NY, USA: ACM; 2003. 1. p. 116-123p. (CIKM '03).
Coppersmith D, Gamarnik D, Hajiaghayi MT, Sorkin GB. Random MAX SAT, random MAX CUT, and their phase transitions. In: Proceedings of the fourteenth annual ACM-SIAM symposium on Discrete algorithms.; 2003. 3. p. 364-373p.
Arya S, Mount D, Smid M. Randomized and deterministic algorithms for geometric spanners of small diameter. In: Foundations of Computer Science, 1994 Proceedings., 35th Annual Symposium on.; 1994. 7. p. 703-712p.
Vishkin U. Randomized speed-ups in parallel computation. In: Proceedings of the sixteenth annual ACM symposium on Theory of computing.; 1984. 2. p. 230-239p.
Zhou S, Chellappa R. Rank constrained recognition under unknown illuminations. In: Analysis and Modeling of Faces and Gestures, 2003. AMFG 2003. IEEE International Workshop on.; 2003. 1. p. 11-18p.
Wang L, Metzler D, Jimmy Lin. Ranking under temporal constraints. In: Proceedings of the 19th ACM international conference on Information and knowledge management. New York, NY, USA: ACM; 2010. 7. p. 79-88p. (CIKM '10).
Xie Q, Memon AM. Rapid "crash testing" for continuously evolving GUI-based software applications. In: Software Maintenance, 2005. ICSM'05. Proceedings of the 21st IEEE International Conference on.; 2005. 4. p. 473-482p.
Wu H-, Kee H, Sane N, Plishker W, Bhattacharyya SS. Rapid prototyping for digital signal processing systems using Parameterized Synchronous Dataflow graphs. In: 2010 21st IEEE International Symposium on Rapid System Prototyping (RSP).; 2010. 1. p. 1-7p.
Levow G-, Oard D, Resnik P. Rapidly retargetable interactive translingual retrieval. In: Proceedings of the first international conference on Human language technology research. Stroudsburg, PA, USA: Association for Computational Linguistics; 2001. 1. p. 1-5p. (HLT '01).
Hung E, Deng Y, V.S. Subrahmanian. RDF aggregate queries and views. In: Data Engineering, 2005. ICDE 2005. Proceedings. 21st International Conference on.; 2005. 7. p. 717-728p.
Butler K, Payne T, Shneiderman B, Brennan P, Zhang J. Re-engineering health care with information technology: the role of computer-human interaction. In: PART 2 ———– Proceedings of the 2011 annual conference extended abstracts on Human factors in computing systems. New York, NY, USA: ACM; 2011. 4. p. 451-454p. (CHI EA '11).

Pages