Yang |
Fan |
2016 |
Leveraging Multiple Features for Image Retrieval
and Matching |
Larry Davis |
Hara |
Kotaro |
2016 |
Scalable Methods to Collect and Visualize Sidewalk Accessibility Data for People with Mobility Impairments |
|
Bhargava |
Preeti |
2016 |
Towards Proactive Context-Aware
Computing and Systems |
Ashok Agrawala |
Bondugula |
Sravanthi |
2016 |
Efficient Image and Video Representations for Retrieval |
Larry Davis |
Oh |
Uran |
2016 |
Accessible On-Body Interaction for People With Visual Impairments |
|
Chaturvedi |
Snigdha |
2016 |
Structured Approaches to Exploring Inter-Personal Relationships in Natural Language Test |
Hal Daumé III |
He |
He |
2016 |
Sequential Decisions and Predictions in Natural Language Processing |
Hal Daumé III |
Ramesh |
Arti |
2016 |
A Probabilistic Approach to Modeling Socio-Behavioral Interactions |
Lise Getoor |
Elsaka |
Ethar |
2016 |
Automated Software Debugging Using Hybrid
Static/Dynamic Analysis |
|
Huang |
Di-Wei |
2016 |
Self-Organizing Map Neural Architectures Based on Limit Cycle Attractors |
James Reggia |
Yalcin |
Mehmet Adil |
2016 |
Towards Rapid, Effective, and Expressive Visual Data Exploration |
Ben Bederson |
Jeon |
Jinseong |
2016 |
Framework Synthesis for Symbolic Execution
of Event-Driven Frameworks |
Jeffrey Foster |
Liu |
Chang |
2016 |
Trace Oblivious Program Execution |
Michael HicksElaine Shi |
Long |
Teng |
2016 |
Collaborative Testing of Shared Software Components |
Alan Sussman |
Malik |
Sana |
2016 |
A Visual Analytics Approach to Comparing Cohorts of Event Sequences |
Ben Shneiderman |
Milton |
Leslie |
2016 |
User Behavioral Modeling of Web-based
Systems for Continuous User Authentication |
|
Malozemoff |
Alexis |
2016 |
Efficient Secure Computation for Real-world Settings and
Security Models |
Jonathan Katz |
Mondal |
Jayanta |
2016 |
Real-Time Querying and Analytics on Large Dynamic
Graphs |
Amol Deshpande |
Miller |
Andrew |
2016 |
Provable Security for Cryptocurrencies |
Jonathan Katz |
Park |
Young Sam |
2016 |
Active Data Collection Techniques to Understand Online Scammers and Cybercriminals |
Elaine Shi |
Nagaraja |
Varun |
2016 |
Context Models for Understanding Images and Videos |
Larry Davis |
Pujara |
Jay |
2016 |
Probabilistic Models for Scalable Knowledge Graph
Construction |
Lise Getoor |
Ozdemir |
Bahadir |
2016 |
Learning Binary Code Representations for Effective and Efficient Image Retrieval |
Larry Davis |
Purohit |
Manish |
2016 |
Data-Aware Scheduling in Datacenters |
Samir Khuller |
Rastogi |
Aseem |
2016 |
Language-Based Techniques for Practical and
Trustworthy Secure Multi-
Party Computations |
Michael Hicks |
Quamar |
Abdul |
2016 |
Building Efficient and Cost-Effective Cloud-Based Big Data Management Systems |
Amol Deshpande |
Rastegari |
Mohammad |
2016 |
Rich and Efficient Visual Data Representation |
Larry Davis |
Abolhassani |
Melika |
2016 |
Assignment Problems with Economic Applications |
Mohammad Hajiaghayi |
Robbins |
Bryan |
2016 |
A Binary Classifier for Test Case
Feasibility Applied to Automatically Generated Tests |
|
Adelman |
Ross |
2016 |
Fast and Accurate Boundary Element Methods in Three
Dimensions |
Ramani Duraiswami |
Sharma |
Abhishek |
2015 |
Learning from Multiple Views of Data |
David Jacobs |
Teo |
Ching Lik |
2015 |
Computational Mid-Level Vision:
From Border Ownership to Categorical
Object Recognition |
John Aloimonos |
Shivashankar |
Vikas |
2015 |
Hierarchical Goal Networks:
Formalisms and Algorithms for Learning and Acting |
Dana Nau |
Yang |
Yezhou |
2015 |
Manipulation Action Understanding for
Observation and Execution |
John Aloimonos |
Soares |
Joao |
2015 |
Efficient Image Segmentation and
Segment-Based Analysis in Computer Vision Applications |
David Jacobs |
Bazinet |
Adam |
2015 |
Computational Methods to Advance Phylogenomic
Workflows |
Michael Cummings |
Chelaru |
Florin |
2015 |
Epiviz: Integrated Visual Analysis
Software for Genomics |
Hector Corrado-Bravo |
Dinalankara |
Wikum |
2015 |
Anti-Profiles for Anomaly Classification
and Regression |
Hector Corrada Bravo |
Adelfio |
Marco |
2015 |
Automated Structural and Spatial
Comprehension of Data Tables |
Hanan Samet |
Hill |
Christopher |
2015 |
Novel Methods for Comparing and
Evaluating Single and Metagenomic Assemblies |
Mihai Pop |
Ahmed |
Ejaz |
2015 |
Understanding Objects in the
Visual World |
Larry Davis |
Khani |
Mohammadreza |
2015 |
Revenue Efficient Mechanisms for
Online Advertising |
Mohammad Hajiaghayi |
Jackson |
Gary |
2015 |
Parallel Computing With P2P Desktop Grids |
Alan Sussman |
Khurana |
Udayan |
2015 |
Historical Graph Data Management |
Amol Deshpande |
Jain |
Rajiv |
2015 |
Searching Heterogeneous Document Image
Collections |
David Jacobs |
London |
Benjamin |
2015 |
On the Stability of Structured Prediction |
Lise Getoor |
Khamis |
Sameh |
2015 |
Leveraging Structure in Activity
Recognition: Context and Spatiotemporal Dynamics |
Larry Davis |
Rekatsinas |
Theodoros |
2015 |
Quality-Aware Data Source Management |
Amol Deshpande |
Lampton |
James |
2015 |
Pig Squeal: Bridging Batch and Streaming
Processing Using
Incremental Updates |
Ashok Agrawala |
Stuckman |
Jeffrey |
2015 |
Continuous, Effort-Aware Prediction of
Software Security Defects |
James Purtilo |