Publications

Export 7151 results:
Author Title [ Type(Asc)] Year
Journal Articles
Shin M, Ma J, Mishra A, Arbaugh WA.  2006.  Wireless Network Security and Interworking. Proceedings of the IEEE. 94(2):455-466.
Shneiderman B, Alavi M, Norman K, Borkowski E Y.  1995.  Windows of opportunity in electronic classrooms. Communications of the ACM. 38(11):19-24.
Chung JM, Easley GR, O'Leary DP.  2011.  Windowed Spectral Regularization of Inverse Problems. SIAM Journal on Scientific Computing. 33(6)
Lifshitz K, Shneiderman B.  1987.  Window control strategies for on-line text traversal. Department of Computer Science and Human Computer Interaction Laboratory, University of Maryland, College Park, MD (correspondence with B. Schneiderman).
Lifshitz J, Shneiderman B.  1991.  Window control strategies for hypertext traversal: An empirical study. Proc. 29th Annual ACM DC Technical Symposium.
Rand W, Blikstein P, Wilensky U.  2006.  Widgets, Planets, and Demons: the Case for the Integration of Human, Embedded, and Virtual Agents via Mediation. Proceedings of Swarmfest.
Gumerov NA, Duraiswami R.  2009.  Wideband fast multipole accelerated boundary element methods for the three-dimensional Helmholtz equation.. The Journal of the Acoustical Society of America. 125(4):2566-2566.
Roy-Chowdhury AK, Chellappa R, Keaton T.  2004.  Wide baseline image registration with application to 3-D face modeling. Multimedia, IEEE Transactions on. 6(3):423-434.
Zadorozhny V, Gal A, Raschid L, Ye Q.  2004.  Wide area performance monitoring using aggregate latency profiles. Web Engineering. :771-775.
Shneiderman B.  2003.  Why not make interfaces better than 3D reality? IEEE Computer Graphics and Applications. 23(6):12-15.
Zotenko E, Mestre J, O'Leary DP, Przytycka TM.  2008.  Why Do Hubs in the Yeast Protein Interaction Network Tend To Be Essential: Reexamining the Connection between the Network Topology and Essentiality. PLoS Comput BiolPLoS Comput Biol. 4(8):e1000140-e1000140.
O'Leary DP.  1995.  Why Broyden's Nonsymmetric Method Terminates on Linear Equations. SIAM Journal on Optimization. 5:231-235.
Istrail S, Sutton GG, Florea L, Halpern AL, Mobarry CM, Lippert R, Walenz B, Shatkay H, Dew I, Miller JR et al..  2004.  Whole-genome shotgun assembly and comparison of human genome assemblies. Proceedings of the National Academy of Sciences of the United States of America. 101(7):1916-1916.
Ricaldi JN, Fouts DE, Selengut JD, Harkins DM, Patra KP, Moreno A, Lehmann JS, Purushe J, Sanka R, Torres M et al..  2012.  Whole genome analysis of Leptospira licerasiae provides insight into leptospiral evolution and pathogenicity.. PLoS Negl Trop Dis. 6(10):e1853.
Osadchy M, Lindenbaum M, Jacobs DW.  2004.  Whitening for photometric comparison of smooth surfaces under varying illumination. Computer Vision-ECCV 2004. :217-228.
Katz J.  2008.  Which languages have 4-round zero-knowledge proofs? Theory of Cryptography. :73-88.
Katz J.  2012.  Which Languages Have 4-Round Zero-Knowledge Proofs? Journal of cryptology. 25(1):41-56.
Nau DS, Luštrek M, Parker A, Bratko I, Gams M.  2010.  When is it better not to look ahead? Artificial Intelligence. 174(16–17):1323-1338.
Gasarch W, Golub E, Srinivasan A.  2003.  When does a random Robin Hood win? Theoretical Computer Science. 304(1–3):477-484.
Plaisant C, Carr DA, Hasegawa H.  1992.  When an Intermediate View Matters a 2D-browser Experiment. Institute for Systems Research Technical Reports.
Anderson ML, Perlis D.  2009.  What puts the “meta” in metacognition? Behavioral and Brain Sciences. 32(02):138-139.
Jacobs DW.  2003.  What makes viewpoint-invariant properties perceptually salient? Journal of the Optical Society of America A. 20(7):1304-1320.
Jacobs DW.  2000.  What makes viewpoint invariant properties perceptually salient?: A computational perspective Perceptual organization for artificial vision systems. :121-138.
Aloimonos Y.  1994.  What I have learned. CVGIP: Image Understanding. 60(1):74-85.
Zelkowitz MV.  2012.  What have we learned about software engineering? Communications of the ACM. 55(2):38-39.

Pages