Publications

Export 7151 results:
Author [ Title(Desc)] Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
W
Arbaugh WA, Fithen WL, McHugh J.  2000.  Windows of Vulnerability: A Case Study Analysis. Computer. 33(12):52-59.
Shin M, Ma J, Mishra A, Arbaugh WA.  2006.  Wireless Network Security and Interworking. Proceedings of the IEEE. 94(2):455-466.
Carr R, Raboin E, Parker A, Nau DS.  2009.  Within epsilon of optimal play in the cultaptation social learning game. :1327-1328.
Housley R, Arbaugh WA.  2003.  WLAN problems and solutions. Communications of the ACM. 46(5):31-34.
Ma H, Doermann D.  2004.  Word Level Script Identification on Scanned Document Images. SPIEConference on Document Recognition and Retrieval. :124-135.
Lopez A, Resnik P.  2006.  Word-based alignment, phrase-based translation: What’s the link. Proc. of AMTA. :90-99.
Lopez A, Nossal M, Hwa R, Resnik P.  2002.  Word-level Alignment for Multilingual Resource Acquisition.
Resnik P.  1998.  WordNet and class-based probabilities. WordNet: An electronic lexical database. :239-263.
Resnik P.  1992.  Wordnet and distributional analysis: A class-based approach to lexical discovery. AAAI workshop on statistically-based natural language processing techniques. :56-64.
Lazar J, Jones A, Shneiderman B.  2006.  Workplace user frustration with computers: an exploratory investigation of the causes and severity. Behaviour & Information Technology. 25(3):239-251.
Blackburn SM, Diwan A, Hauswirth M, Memon AM, Sweeney PF.  2010.  Workshop on experimental evaluation of software and systems in computer science (Evaluate 2010). Proceedings of the ACM international conference companion on Object oriented programming systems languages and applications companion. :291-292.
Minker J.  1999.  The Workshop on Logic-Based Artificial Intelligence. AI Magazine. 20(4):97-97.
Hotho A, Sure Y, Getoor L.  2004.  A workshop report: mining for and from the Semantic Web at KDD 2004. SIGKDD Explor. Newsl.. 6(2):142-143.
desJardins M.  1993.  Workshop summary: AAAI-92 Workshop on Constraining Learning with Prior Knowledge. ACM SIGART Bulletin. 4(3):11-13.
Plaisant C, Marchimini G, Bruns T, Komlodi A, Campbell L, Rose A, Ding GM, Beale Jr J, Nolet V, Shneiderman B et al..  2003.  The World's Information in Digital Libraries. The craft of information visualization: readings and reflectionsThe craft of information visualization: readings and reflections. :149-149.
Papamanthou C, Paparrizos K, Samaras N, Stergiou K.  2008.  Worst case examples of an exterior point algorithm for the assignment problem. Discrete Optimization. 5(3):605-614.
Gruser J, Raschid L, Vidal ME, Bright L.  1998.  Wrapper generation for Web accessible data sources. 3rd IFCIS International Conference on Cooperative Information Systems, 1998. Proceedings. :14-23.
X
Berkovich E, Nuzman J, Franklin M, Jacob B, Vishkin U.  1999.  XMT-M: A Scalable Decentralized Processor. UMIACS-TR-99-55
Y
O'Leary DP.  1991.  Yet another polynomial preconditioner for the conjugate gradient algorithm. Linear Algebra and its Applications. 154–156:377-388.
Vishnoi A, Kryazhimskiy S, Bazykin GA, Hannenhalli S, Plotkin JB.  2010.  Young Proteins Experience More Variable Selection Pressures Than Old Proteins. Genome ResearchGenome Res.. 20(11):1574-1581.
Mishra A, Shin M, Arbaugh WA.  2002.  Your 802.11 network has no clothes. IEEE Communications Magazine. 9:44-51.
Chetty M, Banks R, Brush A.J., Donner J, Grinter R.  2012.  You'Re Capped: Understanding the Effects of Bandwidth Caps on Broadband Use in the Home. SIGCHI '12. :3021-3030.
Z
Hassin R, Khuller S.  2001.  z-Approximations. Journal of Algorithms. 41(2):429-442.
Good L, Bederson BB.  2002.  Zoomable user interfaces as a medium for slide show presentations. Information Visualization. 1(1):35-35.
Bederson BB, Hollan JD, Stewart J, Rogers D, Druin A, Vick D, Ring L, Grose E, Forsythe C.  1997.  A zooming web browser. Human Factors in Web Development.

Pages