Publications

Export 480 results:
Author Title Type [ Year(Asc)]
Filters: First Letter Of Title is P  [Clear All Filters]
2009
Cukier M, Panjwani S.  2009.  Prioritizing Vulnerability Remediation by Determining Attacker-Targeted Vulnerabilities. Security Privacy, IEEE. 7(1):42-48.
Han B, Davis LS.  2009.  Probabilistic fusion-based parameter estimation for visual tracking. Computer Vision and Image Understanding. 113(4):435-445.
Gupta A, Kembhavi A, Davis LS.  2009.  Probabilistic graphical models. IEEE transactions on pattern analysis and machine intelligence. 31(10):1775-1789.
[Anonymous].  2009.  Proceedings of the 1st ACM SIGKDD Workshop on Knowledge Discovery from Uncertain Data.
Furr M, An JD, Foster JS.  2009.  Profile-guided static typing for dynamic scripting languages. ACM SIGPLAN Notices. 44(10):283-300.
Froehlich J.  2009.  Promoting energy efficient behaviors in the home through feedback: The role of human-computer interaction. Proc. HCIC Workshop. 9
Froehlich J.  2009.  Promoting energy efficient behaviors in the home through feedback: The role of human-computer interaction. Proc. HCIC Workshop. 9
Shneiderman B, Churchill E, Fischer G, Goldberg K.  2009.  Promoting social creativity: a component of a national initiative for social participation. Proceedings of the seventh ACM conference on Creativity and cognition. :7-8.
Ateniese G, Kamara S, Katz J.  2009.  Proofs of storage from homomorphic identification protocols. Advances in Cryptology–ASIACRYPT 2009. :319-333.
Khan Z, Bloom JS, Garcia BA, Singh M, Kruglyak L.  2009.  Protein quantification across hundreds of experimental conditions. Proceedings of the National Academy of Sciences. 106(37):15544-15548.
Everett L, Vo A, Hannenhalli S.  2009.  PTM-Switchboard--a database of posttranslational modifications of transcription factors, the mediating enzymes and target genes. Nucleic Acids ResearchNucleic Acids Research. 37(Database):D66-D71-D66-D71.
Clark R, Feamster N, Nayak A, Reimers A.  2009.  Pushing Enterprise Security Down the Network Stack. GT-CS-09-03
2008
Ramachandran A, Bhandankar K, Tariq MB, Feamster N.  2008.  Packets with provenance. GT-CS-08-02
JaJa JF, Shi Q, Varshney A.  2008.  Parallel Algorithms for Volumetric Surface Construction.
Juba D, Varshney A.  2008.  Parallel, stochastic measurement of molecular surface area. Journal of Molecular Graphics and Modelling. 27(1):82-87.
Khoo Y P, Foster JS, Hicks MW, Sazawal V.  2008.  Path projection for user-centered static analysis tools. Proceedings of the 8th ACM SIGPLAN-SIGSOFT workshop on Program analysis for software tools and engineering. :57-63.
Motiwala M, Elmore M, Feamster N, Vempala S.  2008.  Path splicing. SIGCOMM Comput. Commun. Rev.. 38(4):27-38.
Swaminathan A, M. Wu, Liu KJR.  2008.  A pattern classification framework for theoretical analysis of component forensics. Acoustics, Speech and Signal Processing, 2008. ICASSP 2008. IEEE International Conference on. :1665-1668.
Kim Y, Varshney A.  2008.  Persuading Visual Attention through Geometry. Visualization and Computer Graphics, IEEE Transactions on. 14(4):772-782.
Yardi S, Feamster N, Bruckman A.  2008.  Photo-based authentication using social networks. Proceedings of the first workshop on Online social networks. :55-60.
Tom Yeh, Lee JJ, Darrell T.  2008.  Photo-based question answering. Proceedings of the 16th ACM international conference on Multimedia. :389-398.
Hochstein L, Basili VR, Vishkin U, Gilbert J.  2008.  A pilot study to compare programming effort for two parallel programming models. Journal of Systems and Software. 81(11):1920-1930.
Last M, Luta G, Orso A, Porter A, Young S.  2008.  Pooled ANOVA. Computational Statistics & Data Analysis. 52(12):5215-5228.
Chellappa R, Aggarwal G.  2008.  Pose and Illumination Issues in Face-and Gait-Based Identification. Advances in Biometrics. :307-322.
Lin Z, Davis LS.  2008.  A pose-invariant descriptor for human detection and segmentation. Computer Vision–ECCV 2008. :423-436.

Pages