Conference Papers

Pages

Chang C, Sussman A, Saltz J. Scheduling in a high performance remote-sensing data server. In: Proceedings of the Eighth SIAM Conference on Parallel Processing for Scientific Computing. SIAM.; 1997.
Andrade H, Kurc T, Sussman A, Saltz J. Scheduling multiple data visualization query workloads on a shared memory machine. In: Parallel and Distributed Processing Symposium., Proceedings International, IPDPS 2002, Abstracts and CD-ROM. IEEE; 2002. 1. p. 11-18p.
Plaisant C, Shneiderman B. Scheduling on-off home control devices. In: Proceedings of the SIGCHI conference on Human factors in computing systems: Reaching through technology. New York, NY, USA: ACM; 1991. 4. p. 459-460p. (CHI '91).
Demaine ED, Ghodsi M, Hajiaghayi MT, Sayedi-Roshkhar AS, Zadimoghaddam M. Scheduling to minimize gaps and power consumption. In: Proceedings of the nineteenth annual ACM symposium on Parallel algorithms and architectures.; 2007. 4. p. 46-54p.
Bateni MH, Golab L, Hajiaghayi MT, Karloff H. Scheduling to minimize staleness and stretch in real-time data warehouses. In: Proceedings of the twenty-first annual symposium on Parallelism in algorithms and architectures.; 2009. 2. p. 29-38p.
Sarcia S, Basili VR, Cantone G. Scope error detection and handling concerning software estimation models. In: Proceedings of the 2009 3rd International Symposium on Empirical Software Engineering and Measurement. Washington, DC, USA: IEEE Computer Society; 2009. 1. p. 123-132p. (ESEM '09).
Spring N, Wetherall D, Anderson T. Scriptroute: A public Internet measurement facility. In: Proceedings of the 4th conference on USENIX Symposium on Internet Technologies and Systems-Volume 4.; 2003. 1. p. 17.
Lu W, M. Wu. Seam carving estimation using forensic hash. In: Proceedings of the thirteenth ACM multimedia workshop on Multimedia and security. New York, NY, USA: ACM; 2011. 9. p. 9-14p. (MM&Sec '11).
Song S, JaJa JF. Search and Access Strategies for Web Archives. In: Proceedings of IS&T Archiving 2009.; 2009.
Daumé H, Langford J, Marcu D. Search-based structured prediction as classification. In: NIPS Workshop on Advances in Structured Learning for Text and Speech Processing, Whistler, Canada.; 2005.
Tom Yeh, Katz B. Searching documentation using text, OCR, and image. In: Proceedings of the 32nd international ACM SIGIR conference on Research and development in information retrieval. New York, NY, USA: ACM; 2009. 7. p. 776-777p. (SIGIR '09).
Oard D, Leuski A. Searching recorded speech based on the temporal extent of topic labels. In: AAAI Spring Symposium on Intelligent Multimedia Knowledge Management.; 2003.
Tom Yeh, Tollmar K, Darrell T. Searching the web with mobile images for location recognition. In: Computer Vision and Pattern Recognition, 2004. CVPR 2004. Proceedings of the 2004 IEEE Computer Society Conference on. Vol 2. IEEE; 2004. 7. p. 76-81p.
Song Z, Roussopoulos N. SEB-tree: An approach to index continuously moving objects. In: Mobile Data Management.; 2003. 3. p. 340-344p.
Dumitras T, Neamtiu I, Tilevich E. Second ACM Workshop on Hot Topics in Software Upgrades (HotSWUp 2009). ACM; 2009. 7. p. 705-706p. (OOPSLA '09).
Pillai JK, Patel VM, Chellappa R, Ratha NK. Sectored Random Projections for Cancelable Iris Biometrics. In: 2010 IEEE International Conference on Acoustics Speech and Signal Processing (ICASSP). IEEE; 2010. 1. p. 1838-1841p.
Lu W, Varna AL, Swaminathan A, M. Wu. Secure image retrieval through feature protection. In: Acoustics, Speech and Signal Processing, 2009. ICASSP 2009. IEEE International Conference on.; 2009. 1. p. 1533-1536p.
Katz J, Malka L. Secure text processing with applications to private DNA matching. In: Proceedings of the 17th ACM conference on Computer and communications security. New York, NY, USA: ACM; 2010. 4. p. 485-492p. (CCS '10).
Lu W, Varna A, M. Wu. Secure video processing: Problems and challenges. In: Acoustics, Speech and Signal Processing (ICASSP), 2011 IEEE International Conference on.; 2011. 5. p. 5856-5859p.
Mao Y, M. Wu. Security evaluation for communication-friendly encryption of multimedia. In: Image Processing, 2004. ICIP '04. 2004 International Conference on. Vol 1.; 2004. 5. p. 569-572p. Vol. p. 1-569p. - 572 Vol. 1.
Mao Y, M. Wu. Security Issues in Cooperative Communications: Tracing Adversarial Relays. In: Acoustics, Speech and Signal Processing, 2006. ICASSP 2006 Proceedings. 2006 IEEE International Conference on. Vol 4.; 2006. I. IV - IV.
Swaminathan A, Mao Y, M. Wu. Security of feature extraction in image hashing. In: Acoustics, Speech, and Signal Processing, 2005. Proceedings. (ICASSP '05). IEEE International Conference on. Vol 2.; 2005. i. ii/p. 1041-p. ii/1044 Vol. p. 2-p. ii/p. 1041-p. ii/1044 Vol. 2.
de Souza C, Froehlich J, Dourish P. Seeking the source: software source code as a social and technical artifact. In: Proceedings of the 2005 international ACM SIGGROUP conference on Supporting group work. New York, NY, USA: ACM; 2005. 1. p. 197-206p. (GROUP '05).
Zhao L, Davis LS. Segmentation and appearance model building from an image sequence. In: Image Processing, 2005. ICIP 2005. IEEE International Conference on. Vol 1.; 2005. I. I - p. 321-4p. - I - p. 321-4p.
Zheng Y, Li H, Doermann D. Segmentation and Identification of Handwriting in Noisy Documents. In: IAPRConference on Document Analysis System.; 2002. 9. p. 95-105p.
Sundaresan A, Chellappa R. Segmentation and Probabilistic Registration of Articulated Body Models. In: Pattern Recognition, 2006. ICPR 2006. 18th International Conference on. Vol 2.; 2006. 9. p. 92-96p.
Cardone A, Chalfoun J, Peskin A, Bajcsy P, Kociolek M, Bhadriraju K, et al. Segmentation and sub-cellular feature-based analysis of microscopy images. In: BioImage Informatics Conference .; 2015.
Kumar J, Kang L, Doermann D, Abd-Almageed W. Segmentation of Handwritten Textlines in Presence of Touching Components. In: Intl. Conf. on Document Analysis and Recognition (ICDAR 11).; 2011. 1. p. 109-113p.
Yacoob Y, Davis LS. Segmentation using Meta-texture Saliency. In: Computer Vision, 2007. ICCV 2007. IEEE 11th International Conference on.; 2007. 1. p. 1-8p.
Jacobs DW, Chennubhotla C. Segmenting independently moving, noisy points. In: Motion of Non-Rigid and Articulated Objects, 1994., Proceedings of the 1994 IEEE Workshop on.; 1994. 9. p. 96-103p.
Davis LS. Segmenting people in small groups. In: Proceedings of the 4th ACM international workshop on Video surveillance and sensor networks. New York, NY, USA: ACM; 2006. 1. p. 1-2p. (VSSN '06).
Gong J, Oard D. Selecting hierarchical clustering cut points for web person-name disambiguation. In: Proceedings of the 32nd international ACM SIGIR conference on Research and development in information retrieval. New York, NY, USA: ACM; 2009. 7. p. 778-779p. (SIGIR '09).
Dorr BJ, Gaasterland T. Selecting Tense, Aspect, and Connecting Words In Language Generation. In: In Proceedings of IJCAI-95.; 1995. 1. p. 1299-1305p.
Resnik P. Selectional preference and sense disambiguation. In: Proceedings of the ACL SIGLEX Workshop on Tagging Text with Lexical Semantics: Why, What, and How.; 1997. 5. p. 52-57p.
Eaton E, desJardins M, others. Selective transfer between learning tasks using task-based boosting. In: Twenty-Fifth AAAI Conference on Artificial Intelligence.; 2011.
Brodsky T, Fermüller C, Aloimonos Y. Self-calibration from image derivatives. In: Sixth International Conference on Computer Vision, 1998. IEEE; 1998. 8. p. 83-89p.
Perlis D. Self-reference, knowledge, belief, and modality. In: Proc 5th National Conference on AI.; 1986. 4. p. 416-420p.
Resnik P. Semantic classes and syntactic ambiguity. In: Proceedings of the workshop on Human Language Technology.; 1993. 2. p. 278-283p.
Grant J, Gryz J, Minker J, Raschid L. Semantic query optimization for object databases. In: Data Engineering, 1997. Proceedings. 13th International Conference on.; 1997. 4. p. 444-453p.
Grant J, Gryz J, Minker J, Raschid L. Semantic query optimization for object databases. In: Data Engineering, 1997. Proceedings. 13th International Conference on.; 1997. 4. p. 444-453p.
Chuang W-, M. Wu. Semi non-intrusive training for cell-phone camera model linkage. In: Information Forensics and Security (WIFS), 2010 IEEE International Workshop on.; 2010. 1. p. 1-6p.
Resnik P, Melamed ID. Semi-automatic acquisition of domain-specific translation lexicons. In: Proceedings of the fifth conference on Applied natural language processing.; 1997. 3. p. 340-347p.
Han B, Davis LS. Semi-Parametric Model-Based Clustering for DNA Microarray Data. In: Pattern Recognition, 2006. ICPR 2006. 18th International Conference on. Vol 3.; 2006. 3. p. 324-327p.
Daumé H. Semi-supervised or semi-unsupervised?. In: Proceedings of the NAACL HLT Workshop on Semisupervised Learning for Natural Language Processing.; 2009. 8. p. 84-85p.
Froehlich J, Neumann J, Oliver N. Sensing and predicting the pulse of the city through shared bicycling. In: International Joint Conference on Artificial Intelligence.; 2009. 1. p. 1420-1426p.
Kanagal B, Li J, Deshpande A. Sensitivity analysis and explanations for robust query evaluation in probabilistic databases. In: Proceedings of the 2011 international conference on Management of data.; 2011. 8. p. 841-852p.
Benamara F, Cesarano C, Picariello A, Reforgiato D, V.S. Subrahmanian. Sentiment analysis: Adjectives and adverbs are better than adjectives alone. In: Proceedings of the International Conference on Weblogs and Social Media (ICWSM).; 2007.
Eaton E, desJardins M. Set-Based Boosting for Instance-Level Transfer. In: Data Mining Workshops, 2009. ICDMW '09. IEEE International Conference on. IEEE; 2009. 4. p. 422-428p.

Pages