Journal Articles

Pages

Kanal L, Perlis D. Uniform accountability for multiple modes of reasoning. International Journal of Approximate Reasoning. 1988;2(3):233-246.
Aloimonos Y. Unifying Shading and Texture Through an Active Observer. Proceedings of the Royal Society of London. B. Biological Sciences. 1989;238(1290):25-37.
Ray A, Cleaveland R. Unit verification: the CARA experience. International Journal on Software Tools for Technology Transfer (STTT). 2004;5(4):351-369.
Dorr BJ. UNITRAN: A PRINCIPLE-BASED PARSER FOR MACHINE TRANSLATION. The MIT parsing volume, 1987-88. 1988;(1):128.
Dorr BJ. UNITRAN: an interlingual approach to machine translation. Proceedings of the Sixth Conference of the American Association of Artificial Intelligence. 1987:534-539.
Schurr SP, Tits A, O'Leary DP. Universal Duality in Conic Convex Optimization. Mathematical Programming A. 2007;109(1):69-88.
Shneiderman B. Universal usability. Communications of the ACM. 2000;43(5):84-91.
Shneiderman B, Hochheiser H. Universal usability as a stimulus to advanced interface design. Behaviour & Information Technology. 2001;20(5):367-376.
Shneiderman B. Universal Usability: A grand challenge for HCI. Universal usability: Designing computer interfaces for user diversity. 2007.
Shneiderman B. Universal Usability: Pushing Human-Computer Interaction Research to Empower Every Citizen. Media access: social and psychological dimensions of new technology use. 2004:255.
Canetti R, Halevi S, Katz J, Lindell Y, MacKenzie P. Universally composable password-based key exchange. Advances in Cryptology–Eurocrypt 2005. 2005:557.
Shneiderman B. University of Maryland, USA. Fifth International Conference on Information Visualisation: 25-27 July 2001 London, England: Proceedings. 2001:3.
Turaga P, Veeraraghavan A, Chellappa R. Unsupervised view and rate invariant clustering of video sequences. Computer Vision and Image Understanding. 2009;113(3):353-371.
Liu KJ, O'Leary DP, Stewart G., Wu Y-. URV ESPRIT for tracking time-varying signals. Signal Processing, IEEE Transactions on. 1994;42(12):3441-3448.
Goldberg L, Lide B, Lowry S, Massett HA, O'Connell T, Preece J, et al. Usability and Accessibility in Consumer Health Informatics: Current Trends and Future Challenges. American Journal of Preventive Medicine. 2011;40(5, Supplement 2):S187-S197 - S187-S197.
Zaitchik B., Guikema S., Haley B., Taviani E., Chen A., Brown M., et al. Use of Environmental Parameters to Model Pathogenic Vibrios in Chesapeake Bay. Journal of Environmental Informatics. 2015.
Samet H, Alborzi H, Brabec F, Esperança C, Hjaltason GR, Morgan F, et al. Use of the SAND spatial browser for digital government applications. Commun. ACM. 2003;46(1):61-64.
Lazar J, Jones A, Bessiere K, Ceaparu I, Shneiderman B. User Frustration with Technology in the Workplace (2004). Institute for Systems Research Technical Reports. 2005.
Seaman CB, Mendonca MG, Basili VR, Kim YM. User interface evaluation and empirically-based evolution of a prototype experience management tool. Software Engineering, IEEE Transactions on. 2003;29(9):838-850.
Vanniamparampil AJ, Shneiderman B, Plaisant C, Rose A. User Interface Reengineering: A Diagnostic Approach. Technical Reports of the Computer Science Department. 1998.
Xie Q, Memon AM. Using a pilot study to derive a GUI model for automated testing. ACM Transactions on Software Engineering and Methodology (TOSEM). 2008;18(2):7:1-7:35-7:1-7:35.
Pujara J, Daumé H, Getoor L. Using classifier cascades for scalable e-mail classification. Collaboration, Electronic Messaging, Anti-Abuse and Spam Conference, ACM International Conference Proceedings Series. 2011.
Hollingsworth J, Miller EL. Using content-derived names for configuration management. ACM SIGSOFT Software Engineering Notes. 1997;22(3):104-109.
Jensen CS, Mark L, Roussopoulos N, Sells T. Using differential technlques to efficiently support transaction time. The VLDB JournalVLDB Journal. 1993;2(1):75-111.
Winder R, Reggia JA. Using distributed partial memories to improve self-organizing collective movements. Systems, Man, and Cybernetics, Part B: Cybernetics, IEEE Transactions on. 2004;34(4):1697-1707.
Hierons RM, Krause P, Lüttgen G, Simons AJ, Vilkomir S, Woodward MR, et al. Using formal specifications to support testing. ACM Computing Surveys. 2009;41:1-76.
Zheleva E, Getoor L, Golbeck J, Kuter U. Using friendship ties and family circles for link prediction. Advances in Social Network Mining and Analysis. 2010:97-113.
Molina J, Arbaugh WA. Using independent auditors as intrusion detection systems. Information and Communications Security. 2002:291-302.
Hochheiser H, Shneiderman B. Using interactive visualizations of WWW log data to characterize access patterns and inform site design. Journal of the American Society for Information Science and Technology. 2001;52(4):331-343.

Pages