Publications

Export 7151 results:
Author Title [ Type(Desc)] Year
Conference Papers
Tom Yeh, White B, San Pedro J, Katz B, Davis LS.  2011.  A case for query by image and text content: searching computer help using screenshots and keywords. Proceedings of the 20th international conference on World wide web. :775-784.
Tom Yeh, White B, San Pedro J, Katz B, Davis LS.  2011.  A case for query by image and text content: searching computer help using screenshots and keywords. Proceedings of the 20th international conference on World wide web. :775-784.
Feamster N, Balakrishnan H, Rexford J, Shaikh A, van der Merwe J.  2004.  The case for separating routing from routers. Proceedings of the ACM SIGCOMM workshop on Future directions in network architecture. :5-12.
Layman L, Basili VR, Zelkowitz MV, Fisher KL.  2011.  A case study of measuring process risk for early insights into software safety. Software Engineering (ICSE), 2011 33rd International Conference on. :623-632.
Chipman G, Druin A, Beer D, Fails JA, Guha ML, Simms S.  2006.  A case study of tangible flags: a collaborative technology to enhance field trips. Proceedings of the 2006 conference on Interaction design and children. :1-8.
Kianzad V, Bhattacharyya SS, Qu G.  2005.  CASPER: an integrated energy-driven approach for task graph scheduling on distributed embedded systems. Application-Specific Systems, Architecture Processors, 2005. ASAP 2005. 16th IEEE International Conference on. :191-197.
Herve J, Aloimonos Y.  1990.  Catastrophe theory and computational vision. Proc. AAAI-90 Workshop on Qualitative Vision. :96-100.
Habash N, Dorr BJ.  2003.  A categorial variation database for English. Proceedings of the 2003 Conference of the North American Chapter of the Association for Computational Linguistics on Human Language Technology - Volume 1. :17-23.
Kules B, Kustanowitz J, Shneiderman B.  2006.  Categorizing web search results into meaningful and stable categories using fast-feature techniques. Proceedings of the 6th ACM/IEEE-CS joint conference on Digital libraries. :210-219.
Dyer C, Weese J, Setiawan H, Lopez A, Ture F, Eidelman V, Ganitkevitch J, Blunsom P, Resnik P.  2010.  cdec: A decoder, alignment, and learning framework for finite-state and context-free translation models. Proceedings of the ACL 2010 System Demonstrations. :7-12.
Han B, Hui P, Kumar AVS, Marathe MV, Pei G, Srinivasan A.  2010.  Cellular traffic offloading through opportunistic communications: a case study. Proceedings of the 5th ACM workshop on Challenged networks. :31-38.
Plaisant C.  2004.  The challenge of information visualization evaluation. Proceedings of the working conference on Advanced visual interfaces. :109-116.
Eaton C, Plaisant C, Drizd T.  2003.  The Challenge of Missing and Uncertain Data. Proceedings of the 14th IEEE Visualization 2003 (VIS'03). :100–-100–.
Asgari S, Basili VR, Carver J, Hochstein L, Hollingsworth J, Zelkowitz MV.  2004.  Challenges in Measuring HPCS Learner Productivity in an Age of Ubiquitous Computing: The HPCS Program. In Proceedings of ICSE Workshop on High Productivity Computing. May 2004.
Sayyadi H, Edmonds J, Hristidis V, Raschid L.  2010.  Challenges in personalized authority flow based ranking of social media. Proceedings of the 19th ACM international conference on Information and knowledge management. :1409-1412.
Vidal ME, Raschid L, Mestre J.  2004.  Challenges in selecting paths for navigational queries: Trade-off of benefit of path versus cost of plan. Proceedings of the 7th International Workshop on the Web and Databases: colocated with ACM SIGMOD/PODS 2004. :61-66.
Cleary KR, Levine BA, Norton GS, Mundur PV.  1997.  Challenges in sending large radiology images over military communications channels. Proceedings of SPIE. 3035:230-230.
Han B, Ji L, Lee S, Miller RR, Bhattacharjee B.  2009.  Channel Access Throttling for Improving WLAN QoS. Sensor, Mesh and Ad Hoc Communications and Networks, 2009. SECON '09. 6th Annual IEEE Communications Society Conference on. :1-9.
Han B, Ji L, Lee S, Miller RR, Bhattacharjee B.  2009.  Channel Access Throttling for Overlapping BSS Management. Communications, 2009. ICC '09. IEEE International Conference on. :1-6.
Minker J.  1997.  A characterization of the partial stable models for disjunctive deductive databases. Logic programming: proceedings of the 1997 International Symposium. :245-245.
Salles-Loustau G, Berthier R, Collange E, Sobesto B, Cukier M.  2011.  Characterizing Attackers and Attacks: An Empirical Study. :174-183.
Dogan RI, Getoor L, Wilbur WJ.  2007.  Characterizing RNA Secondary-Structure Features and Their Effects on Splice-Site Prediction. Data Mining Workshops, 2007. ICDM Workshops 2007. Seventh IEEE International Conference on. :89-94.
Bin Tariq M, Mansy A, Feamster N, Ammar M.  2009.  Characterizing VLAN-induced sharing in a campus network. Proceedings of the 9th ACM SIGCOMM conference on Internet measurement conference. :116-121.
Kianzad V, Bhattacharyya SS.  2004.  CHARMED: A multi-objective co-synthesis framework for multi-mode embedded systems. Application-Specific Systems, Architectures and Processors, 2004. Proceedings. 15th IEEE International Conference on. :28-40.
Aiken A, Foster JS, Kodumal J, Terauchi T.  2003.  Checking and inferring local non-aliasing. ACM SIGPLAN Notices. 38:129-140.

Pages