Publications

Export 47 results:
Author Title [ Type(Desc)] Year
Filters: Keyword is Internet  [Clear All Filters]
Conference Papers
Spring N, Chesire M, Berryman M, Sahasranaman V, Anderson T, Bershad B.  2000.  Receiver based management of low bandwidth access links. IEEE INFOCOM 2000. Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies. Proceedings. 1:245-254vol.1-245-254vol.1.
Tanin E, Brabec F, Samet H.  2002.  Remote access to large spatial databases. Proceedings of the 10th ACM international symposium on Advances in geographic information systems. :5-10.
Arbaugh WA, Farber DJ, Smith JM.  1997.  A secure and reliable bootstrap architecture. , 1997 IEEE Symposium on Security and Privacy, 1997. Proceedings. :65-71.
Friedman B, Thomas JC, Grudin J, Nass C, Nissenbaum H, Schlager M, Shneiderman B.  1999.  Trust me, I'm accountable: trust and accountability online. CHI '99 extended abstracts on Human factors in computing systems. :79-80.
Kuo K-T, Phuvoravan S, Bhattacharjee B, Jun La R, Shayman M, Chang H S.  2003.  On the use of flow migration for handling short-term overloads. Global Telecommunications Conference, 2003. GLOBECOM '03. IEEE. 6:3108-3112vol.6-3108-3112vol.6.
Chrun D, Cukier M, Sneeringer G.  2008.  On the Use of Security Metrics Based on Intrusion Prevention System Event Data: An Empirical Analysis. :49-58.
North C, Shneiderman B, Plaisant C.  1996.  User controlled overviews of an image library: a case study of the visible human. Proceedings of the first ACM international conference on Digital libraries. :74-82.
Roitman H, Gal A, Raschid L.  2009.  Web Monitoring 2.0: Crossing Streams to Satisfy Complex Data Needs. IEEE 25th International Conference on Data Engineering, 2009. ICDE '09. :1215-1218.
Gruser J, Raschid L, Vidal ME, Bright L.  1998.  Wrapper generation for Web accessible data sources. 3rd IFCIS International Conference on Cooperative Information Systems, 1998. Proceedings. :14-23.
Chetty M, Banks R, Brush A.J., Donner J, Grinter R.  2012.  You'Re Capped: Understanding the Effects of Bandwidth Caps on Broadband Use in the Home. SIGCHI '12. :3021-3030.
Journal Articles
Tanin E, Shneiderman B, Xie H.  2007.  Browsing large online data tables using generalized query previews. Information Systems. 32(3):402-423.
Bryce RC, Sampath S, Memon AM.  2011.  Developing a Single Model and Test Prioritization Strategies for Event-Driven Software. Software Engineering, IEEE Transactions on. 37(1):48-64.
Dorai GK, Yacoob Y.  2002.  Embedded grammar tags: advancing natural language interaction on the Web. Intelligent Systems, IEEE. 17(1):48-53.
Brown JR, van Dam A, Earnshaw R, Encarnacao J, Guedj R, Preece J, Shneiderman B, Vince J.  1999.  Human-centered computing, online communities, and virtual environments. IEEE Computer Graphics and Applications. 19(6):70-74.
Feamster N, Johari R, Balakrishnan H.  2007.  Implications of Autonomy for the Expressiveness of Policy Routing. Networking, IEEE/ACM Transactions on. 15(6):1266-1279.
Bavier A, Feamster N, Huang M, Peterson L, Rexford J.  2006.  In VINI veritas: realistic and controlled network experimentation. SIGCOMM Comput. Commun. Rev.. 36(4):3-14.
Banerjee S, Lee S, Bhattacharjee B, Srinivasan A.  2006.  Resilient multicast using overlays. IEEE/ACM Transactions on Networking. 14(2):237-248.
Banerjee S, Bhattacharjee B.  2002.  Scalable secure group communication over IP multicast. Selected Areas in Communications, IEEE Journal on. 20(8):1511-1527.
Hicks MW, Keromytis AD, Smith JM.  2003.  A secure PLAN. IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews. 33(3):413-426.
Arbaugh WA, Davin JR, Farber DJ, Smith JM.  1998.  Security for virtual private intranets. Computer. 31(9):48-55.
Haft DH, Selengut JD, Richter RA, Harkins D, Basu MK, Beck E.  2013.  TIGRFAMs and Genome Properties in 2013.. Nucleic Acids Res. 41(Database issue):D387-95.
Shroff N, Turaga P, Chellappa R.  2010.  Video Précis: Highlighting Diverse Aspects of Videos. IEEE Transactions on Multimedia. 12(8):853-868.

Pages