Journal Articles

Pages

Rios-Berrios M, Sharma P, Lee T, Schwartz R, Shneiderman B. TreeCovery: Coordinated dual treemap visualization for exploring the Recovery Act. Government Information Quarterly. 2011.
Johnson B, Shneiderman B. Treemaps. Sparks of innovation in human-computer interaction. 1993;284:309.
Lee B, Parr CS, Plaisant C, Bederson BB, Veksler VD, Gray WD, et al. TreePlus: Interactive Exploration of Networks with Enhanced Tree Layouts. Visualization and Computer Graphics, IEEE Transactions on. 2006;12(6):1414-1426.
Tilghman S, Astin HS, Brinkley W, Chilton MD, Cummings MP, Ehrenberg RG, et al. Trends in the early careers of life scientists - Preface and executive summary. Mol Biol Cell. 1998;9(11):3007-3015.
Phang KY, Foster JS, Hicks MW, Sazawal V. Triaging Checklists: a Substitute for a PhD in Static Analysis. Evaluation and Usability of Programming Languages and Tools (PLATEAU) PLATEAU 2009. 2009.
Litwin WA, Roussopoulos N, Levy G, Hong W. Trie hashing with controlled load. IEEE Transactions on Software Engineering. 1991;17(7):678-691.
Sengupta B, Cleaveland R. Triggered message sequence charts. ACM SIGSOFT Software Engineering Notes. 2002;27:167.
Zheleva E, Kolcz A, Getoor L. Trusting spam reporters: A reporter-based reputation system for email filtering. ACM Transactions on Information Systems (TOIS). 2008;27(1):3:1-3:27-3:1-3:27.
Perlis D. Truth and meaning (research note). Artificial intelligence. 1989;39(2):245-250.
Bartholomeu DC, Silva RA, Galvão LM, El-Sayed NM, Donelson JE, Teixeira SM. Trypanosoma cruzi: RNA structure and post-transcriptional control of tubulin gene expression. Experimental Parasitology. 2002;102(3-4):123-133.
Wong PC, Chen C, Görg C, Shneiderman B, Stasko J, Thomas J. Tutorial-Graph Analytics — Lessons Learned and Challenges Ahead. IEEE Computer Graphics and Applications. 2011;31(5):18.
Brosey M, Shneiderman B. Two experimental comparisons of relational and hierarchical database models. International Journal of Man-Machine Studies. 1978;10(6):625-637.
Seydou F, Gumerov NA, Duraiswami R. Two methods for solving a 3D acoustic inverse scattering problem. The Journal of the Acoustical Society of America. 2003;113(4):2191.
Katz J, MacKenzie P, Taban G, Gligor V. Two-server password-only authenticated key exchange. Journal of Computer and System Sciences. 2012;78(2):651-669.
Katz J, MacKenzie P, Taban G, Gligor V. Two-server password-only authenticated key exchange. Applied Cryptography and Network Security. 2005:175-206.
Cleaveland R, Panangaden P. Type theory and concurrency. International Journal of Parallel Programming. 1988;17(2):153-206.
Verma R, Peters NR, D'Onofrio M, Tochtrop GP, Sakamoto KM, Varadan R, et al. Ubistatins Inhibit Proteasome-Dependent Degradation by Binding the Ubiquitin Chain. Science. 2004;306(5693):117-120.
Zhu Y, Bavier A, Feamster N, Rangarajan S, Rexford J. UFO: a resilient layered routing architecture. ACM SIGCOMM Computer Communication Review. 2008;38(5):59-62.
Langmead B, Trapnell C, Pop M, Salzberg SL. Ultrafast and memory-efficient alignment of short DNA sequences to the human genome. Genome Biology. 2009;10(3):R25.
Chaiyanan S, Chaiyanan S, Grim C, Maugel T, Huq A, Colwell RR. Ultrastructure of coccoid viable but non‐culturable Vibrio cholerae. Environmental Microbiology. 2007;9(2):393-402.
Zajic D, Dorr BJ, Jimmy Lin, Schwartz R. Umd/bbn at mse2005. Proceedings of the MSE2005 track of the Association for Computational Linguistics Workshop on Intrinsic and Extrinsic Evaluation Meatures for MT and/or Summarization, Ann Arbor, MI. 2005.
Tran S, Lin Z, Harwood D, Davis LS. UMD_VDT, an Integration of Detection and Tracking Methods for Multiple Human Tracking. Multimodal Technologies for Perception of Humans. 2008:179-190.
Alter TD, Jacobs DW. Uncertainty propagation in model-based recognition. International Journal of Computer Vision. 1998;27(2):127-159.
Sharara H, Singh L, Getoor L, Mann J. Understanding actor loyalty to event-based groups in affiliation networks. Social Network Analysis and Mining. 2011;1(2):115-126.
Tsui C-, Wang P, Fleischmann K, Oard D, Sayeed A. Understanding IT Innovations Through Computational Analysis of Discourse. ICIS 2009 Proceedings. 2009.
Li-Baboud Y-, Cardone A, Chalfoun J, Bajcsy P, Elliott J. Understanding the impact of image quality on segmentation accuracy. SPIE Newsroom. 2013.
Alharbi A, Rand W, Riolo R. Understanding the Semantics of the Genetic Algorithm in Dynamic Environments. Applications of Evolutionary Computing. 2007:657-667.
Getoor L, Rhee JT, Koller D, Small P. Understanding tuberculosis epidemiology using structured statistical models. Artificial Intelligence in Medicine. 2004;30(3):233-256.
Guerra‐Filho G, Aloimonos Y. Understanding visuo‐motor primitives for motion synthesis and analysis. Computer Animation and Virtual Worlds. 2006;17(3‐4):207-217.
Mao Y, M. Wu. Unicity Distance of Robust Image Hashing. Information Forensics and Security, IEEE Transactions on. 2007;2(3):462-467.

Pages