Kumar |
Jayant |
2013 |
Efficient Machine Learning Methods for Document Image Analysis |
Larry Davis |
Krishnamoorthy |
Shivsubramani |
2013 |
Rover – II: A Context-Aware Middleware for Pervasive
Computing Environment |
Ashok Agrawala |
Ince |
Tugrul |
2013 |
Compilation and Binary Editing for Performance and Security |
Jeffrey K. Hollingsworth |
Mirrashed |
Fatemeh |
2013 |
Domain Adaptive Object Recognition and Detection |
Larry Davis |
Qiu |
Qiang |
2013 |
Face and Action Recognition |
|
Ip |
Cheuk Yiu |
2013 |
Towards Data-Driven Large Scale Scientific Visualization and Exploration |
Amitabh Varshney |
Mukherjee |
Koyel |
2013 |
Algorithmic Approaches to Reducing Resource Costs in Data Centers |
Samir Khuller |
Roos |
Patrick |
2013 |
Evolutionary Game Theoretic Modeling of Decision-Making and Culture |
Dana Nau |
Khoo |
Yit Phang |
2013 |
User-Centered Program Analysis Tools |
Michael HicksJeffery Foster |
Nguyen |
Bao |
2013 |
Testing GUI-Based Software with Undetermined Input Spaces |
|
Tarkan |
Sureyya |
2013 |
Interactive Visual Displays for Results Management
In Complex Medical Workflows |
Ben Shneiderman |
Kumar |
Abhishek |
2013 |
Learning with Multiple Similarities |
Hal Daumé III |
Moustafa |
Walaa El-Din |
2013 |
Declarative Cleaning, Analysis, and Querying of Graph-structured Data |
Amol Deshpande |
Frangiadakis |
Nikolaos |
2012 |
Connectivity and Data Transmission over Wireless Mobile Systems |
Nicholas Roussopoulos |
Tzannes |
Alexandre |
2012 |
Enhancing Productivity and Performance Portability of General-Purpose Parallel Programming |
|
Koren |
Sergey |
2012 |
Genome Assembly: Novel Applications by Harnessing Emerging Sequencing Technologies and Graph Algorithms |
Mihai Pop |
Licamele |
Louis |
2012 |
Knowledge Discovery from Gene Expression Data: Novel Methods for Similarity Search,
Signature Detection, and Confounder Correction |
Lise Getoor |
McCann |
Justin |
2012 |
Automating Performance Diagnosis in Networked Systems |
Michael Hicks |
Hayden |
Christopher |
2012 |
Clear, Correct, and Efficient Dynamic Software Updates |
Michael Hicks, Jeffrey Foster |
Namata |
Galileo |
2012 |
Identifying Graphs from Noisy Observational Data |
Lise Getoor |
Wang |
Lidan |
2012 |
Learning to Efficiently Rank |
|
Hayden |
Christopher |
2012 |
Clear, Correct, and Efficient Dynamic Software Updates |
Michael Hicks, Jeffrey Foster |
Agarwal |
Arvind |
2012 |
Distance Geometry: Application in Data Mining and Machine Learning |
Hal Daumé III |
Wu |
Shanchan |
2012 |
Prediction in Social Media for Monitoring and Recommendation |
Louiqa Raschid |
Guo |
Huimin |
2012 |
Face Recognition and Verification in Unconstrained Environments |
Larry Davis |
Patro |
Robert |
2012 |
Computationally Comparing Biological Networks and Reconstructing Their Evolution |
Carl Kingsford |
Sharara |
Hossam |
2012 |
The Dynamics of Multi-Modal Networks |
Lise Getoor |
Song |
Sukhyun |
2012 |
Decentralized Network Bandwidth Prediction and Node Search |
Alan Sussman |
Hu |
Chang |
2012 |
Crowdsourced Monoligual Translation |
Ben Bederson |
Lieberman |
Michael |
2012 |
Multifaceted Geotagging for Streaming News |
Hanan Samet |
Shroff |
Nitesh |
2012 |
|
|
Gupta |
Neha |
2012 |
Learning Techniques in Multi-Armed Bandits |
Ashok Agrawala |
Lee |
Jaehwan |
2012 |
Decentralized Resource Orchestration for Heterogeneous Grids |
Alan Sussman |
Nishigaki |
Morimichi |
2012 |
The Image Torque Operator for Mid-Level Vision:
Theory and Experiment |
John Aloimonos |
Chen |
Nicholas |
2012 |
The Use of Multiple Slate Devices to Support Active Reading Activities |
François Guimbretière |
Kumaresan |
Ranjit |
2012 |
Broadcast and Verifiable Secret Sharing: New Security Models and Round
Optimal Constructions |
Jonathan Katz |
Alaei |
Saeed |
2012 |
Mechanism Design with General Utilities |
Samir Khuller |
Castillo |
Carlos |
2012 |
Dense Wide-Baseline Stereo Matching and its Application to Face Recognition |
David Jacobs |
Ghodsi |
Mohammadreza |
2012 |
Searching, Clustering and Evaluating Biological Sequences |
Mihai Pop |
Liu |
Bo |
2012 |
Computational Metagenomics: Network, Classification and Assembly |
Mihai Pop |
Baden |
Randolph |
2012 |
Sharing Private Data Over Public Systems |
Bobby Bhattacharjee |
Han |
Bo |
2012 |
Improving Wireless Efficiency: MAC and Above |
Aravind Srinivasan |
Huynh |
Thuan |
2012 |
Extracting Symbolic Representations Learned by Neural Networks |
James Reggia |
Langmead |
Benjamin |
2012 |
Algorithms and High Performance Computing Approaches for
Sequencing-Based Comparative Genomics |
Steven Salzberg |
Wongsuphasawat |
Krist |
2012 |
Interactive Exploration of Temporal Event Sequences |
Ben Shneiderman |
Angiuoli |
Samuel |
2011 |
Methods for High-Throughput Comparative Genomics and
Distributed Sequence Analysis |
Steven Salzberg |
DuBois |
Thomas |
2011 |
Using and Manipulating Probabilistic Connectivity in Social Networks |
Aravind Srinivasan |
Zheleva |
Elena |
2011 |
Prediction, Evolution and Privacy in Social and Affiliation Networks |
Lise Getoor |
Kanagal |
Bhargav |
2011 |
Scalable Statistical Modeling and Query Processing
Over Large-Scale Uncertain Databases |
Amol Deshpande |
Saha |
Barna |
2011 |
Approximation Algorithms for Resources Allocation |
Samir Khuller |