Publications

Export 197 results:
Author Title [ Type(Asc)] Year
Filters: First Letter Of Title is B  [Clear All Filters]
Conference Papers
Farrell R, Oza O, Zhang N, Morariu VI, Darrell T, Davis LS.  2011.  Birdlets: Subordinate categorization using volumetric primitives and pose-normalized appearance. Computer Vision (ICCV), 2011 IEEE International Conference on. :161-168.
Gyger Jr LS, Spranklin BW, Gupta SK, Bruck HA.  2006.  Bio-inspired, Modular, and Multifunctional Thermal and Impact Protected (TIPed) Embedded Sensing Controls Actuation Power Element (ESCAPE) Structures.
Elaine Shi, Perrig A, Van Doorn L.  2005.  BIND: a fine-grained attestation service for secure distributed systems. :154-168.
Wolf C, Doermann D.  2002.  Binarization of low quality text using a Markov random field model. Pattern Recognition, 2002. Proceedings. 16th International Conference on. 3:160-163vol.3-160-163vol.3.
Shet VD, Neumann J, Ramesh V, Davis LS.  2007.  Bilattice-based Logical Reasoning for Human Detection. Computer Vision and Pattern Recognition, 2007. CVPR '07. IEEE Conference on. :1-8.
Bitsakos K, Yi H, Yi L, Fermüller C.  2008.  Bilateral symmetry of object silhouettes under perspective projection. 19th International Conference on Pattern Recognition, 2008. ICPR 2008. :1-4.
Fomin EDDFV, Hajiaghayi MT, Thilikos DM.  2004.  Bidimensional Parameters and Local Treewidth. Latin 2004: Theoretical Informatics: 6th Latin American Symposium, Buenos Aires, Argentina, April 5-8, 2004: Proceedings. :109-109.
Yahav I, Raschid L, Andrade H.  2007.  Bid based scheduler with backfilling for a multiprocessor system. Proceedings of the ninth international conference on Electronic commerce. :459-468.
Vishkin U.  1992.  Biconnectivity Approximations and Graph Carvings. Proceedings of the Twenty-fourth Annual ACM Symposium on the Theory of Computing, Victoria, British Columbia, Canada, May 4-6, 1992. :759-759.
Lumezanu C, Feamster N, Klein H.  2012.  #bias: Measuring the Tweeting Behavior of Propagandists. Sixth International AAAI Conference on Weblogs and Social Media.
Shneiderman B.  1993.  Beyond the graphical user interface (abstract). Proceedings of the 1993 ACM conference on Computer science. :510–-510–.
Friedman B, Levenson N, Shneiderman B, Suchman L, Winograd T.  1994.  Beyond accuracy, reliability, and efficiency: criteria for a good computer system. Conference companion on Human factors in computing systems. :195-198.
Nikolova S, Boyd-Graber J, Fellbaum C, Cook P.  2009.  Better vocabularies for assistive communication aids: connecting terms using semantic networks and untrained annotators. Proceedings of the 11th international ACM SIGACCESS conference on Computers and accessibility. :171-178.
Goldberg L A, Paterson M, Srinivasan A, Sweedyk E.  1997.  Better approximation guarantees for job-shop scheduling. Proceedings of the eighth annual ACM-SIAM symposium on Discrete algorithms. :599-608.
Vishkin U, Smolyaninov I.  2004.  Bending light for multi-chip virtual PRAMs? Proc. 3rd Workshop on Non-Slicon Computation, held in conjunction with the 31st International Symposium on Computer Architecture (ISCA 2004). :19-23.
Hollingsworth J, Guven E, Akinlar C.  1998.  Benchmarking a network of PCs running parallel applications. Performance, Computing and Communications, 1998. IPCCC '98., IEEE International. :1-7.
Bertini E, Perer A, Plaisant C, Santucci G.  2008.  BELIV'08: Beyond time and errors: novel evaluation methods for information visualization. CHI '08 extended abstracts on Human factors in computing systems. :3913-3916.
Anand P, King J, Boyd-Graber J, Wagner E, Martell C, Oard D, Resnik P.  2011.  Believe Me—We Can Do This! Annotating Persuasive Acts in Blog Text. Workshops at the Twenty-Fifth AAAI Conference on Artificial Intelligence.
Perdisci R, Lee W, Feamster N.  2010.  Behavioral clustering of HTTP-based malware and signature generation using malicious network traces. Proceedings of the 7th USENIX conference on Networked systems design and implementation. :26-26.
Bilge L, Dumitras T.  2012.  Before We Knew It: An Empirical Study of Zero-day Attacks in the Real World. CCS '12 Proceedings of the 2012 ACM conference on Computer and Communications Security. :833-844.
Gupta P, Doermann D, DeMenthon D.  2002.  Beam Search for Feature Selection in Automatic SVMDefect Classification. International Conference on Pattern Recognition. :212-215.
Daumé H, Marcu D.  2005.  Bayesian summarization at DUC and a suggestion for extrinsic evaluation. Document understanding conference.
Qian G, Chellappa R, Zheng Q.  2002.  Bayesian structure from motion using inertial information. Image Processing. 2002. Proceedings. 2002 International Conference on. 3:III-425-III-428vol.3-III-425-III-428vol.3.
Daumé H, Marcu D.  2006.  Bayesian query-focused summarization. Proceedings of the 21st International Conference on Computational Linguistics and the 44th annual meeting of the Association for Computational Linguistics. :305-312.
Daumé H.  2009.  Bayesian multitask learning with latent hierarchies. Proceedings of the Twenty-Fifth Conference on Uncertainty in Artificial Intelligence. :135-142.

Pages