Bazinet |
Adam |
2015 |
Computational Methods to Advance Phylogenomic
Workflows |
Michael Cummings |
Chelaru |
Florin |
2015 |
Epiviz: Integrated Visual Analysis
Software for Genomics |
|
Chen |
Xi |
2015 |
Context Driven Scene
Understanding |
Larry Davis |
Dinalankara |
Wikum |
2015 |
Anti-Profiles for Anomaly Classification
and Regression |
Hector Corrada Bravo |
Hill |
Christopher |
2015 |
Novel Methods for Comparing and
Evaluating Single and Metagenomic Assemblies |
Mihai Pop |
Jackson |
Gary |
2015 |
Parallel Computing With P2P Desktop Grids |
Alan Sussman |
Jain |
Rajiv |
2015 |
Searching Heterogeneous Document Image
Collections |
David Jacobs |
Kang |
Chanhyun |
2015 |
Diffusion, Infection and Social (Information)
Network Database |
V.S. Subrahmanian |
Khamis |
Sameh |
2015 |
Leveraging Structure in Activity
Recognition: Context and Spatiotemporal Dynamics |
Larry Davis |
Khani |
Mohammadreza |
2015 |
Revenue Efficient Mechanisms for
Online Advertising |
Mohammad Hajiaghayi |
Khurana |
Udayan |
2015 |
Historical Graph Data Management |
Amol Deshpande |
Lampton |
James |
2015 |
Pig Squeal: Bridging Batch and Streaming
Processing Using
Incremental Updates |
Ashok Agrawala |
Liaghat |
Vahid |
2015 |
Primal-Dual Techniques for Online
Algorithms and Mechanisms |
Mohammad Hajiaghayi |
London |
Benjamin |
2015 |
On the Stability of Structured Prediction |
Lise Getoor |
Mardziel |
Piotr |
2015 |
Modeling, Quantifying, and Limiting Adversary
Knowledge |
Michael Hicks |
Nandy |
Kaustav |
2015 |
Segmentation and Informatics in
Multi-Dimensional Fluorescence
Optical Microscopy Images |
|
Nguyen |
Viet An |
2015 |
Guided Probabilistic Topic Models for Agenda-Setting
and Framing |
Philip Resnik |
Raboin |
Eric |
2015 |
Model-Predictive Strategy
Generation for Multi-Agent
Pursuit-Evasion Games |
Dana Nau |
Rekatsinas |
Theodoros |
2015 |
Quality-Aware Data Source Management |
Amol Deshpande |
Sarpatwar |
Kanthi Kiran |
2015 |
Allocation Algorithms for Networks with Scarce
Resources |
Samir Khuller |
Saur |
Karla |
2015 |
Dynamic Upgrades for High Availability
Systems |
Jeffery Foster |
Sharma |
Abhishek |
2015 |
Learning from Multiple Views of Data |
David Jacobs |
Shivashankar |
Vikas |
2015 |
Hierarchical Goal Networks:
Formalisms and Algorithms for Learning and Acting |
Dana Nau |
Soares |
Joao |
2015 |
Efficient Image Segmentation and
Segment-Based Analysis in Computer Vision Applications |
David Jacobs |
Stuckman |
Jeffrey |
2015 |
Continuous, Effort-Aware Prediction of
Software Security Defects |
James Purtilo |
Teo |
Ching Lik |
2015 |
Computational Mid-Level Vision:
From Border Ownership to Categorical
Object Recognition |
John Aloimonos |
Yang |
Yezhou |
2015 |
Manipulation Action Understanding for
Observation and Execution |
John Aloimonos |
Alford |
Ronald |
2014 |
Search Complexities for HTN Planning |
Dana Nau |
Bista |
Sujal |
2014 |
Visual Computing Tools for Studying Micro-Scale Diffusion |
Amitabh Varshney |
Biswas |
Arijit |
2014 |
Semi-Supervised and Active Image Clustering with Pairwise
Constraints from Humans |
David Jacobs |
Cheng |
Kan Leung |
2014 |
Agent Modeling in Repeated Stochastic Games |
Dana Nau |
Chitnis |
Rajesh |
2014 |
Directed Graphs: Fixed-Parameter
Tractability and Beyond |
Mohammad Hajiaghayi |
Fontana |
Peter |
2014 |
Towards A Unified Theory of Timed Automata |
Rance Cleaveland |
Groce |
Adam |
2014 |
New Notions and Mechanisms for Statistical
Privacy |
Jonathan Katz |
Hu |
Yuening |
2014 |
Expressive Knowledge Resources in
Probabilistic Models |
Jordan Boyd-Graber |
Jiang |
Jiarong |
2014 |
Efficient Non-Deterministic Search in Structural Prediction: A Case Study
On Syntactic Parsing |
Hal Daumé III |
Kayyoor |
Ashwin |
2014 |
Minimizing Resource Consumption
through Workload Consolidation in
Large-Scale Distributed Data Platforms |
Amol Deshpande |
Lam |
Michael |
2014 |
Automated Floating-Point Precision Analysis |
Jeffrey K. Hollingsworth |
Luo |
Yuancheng |
2014 |
Fast Numerical and Machine
Learning Algorithms for Spatial Audio Reproduction |
Ramani Duraiswami |
Monroe |
Megan |
2014 |
Interactive Event Sequence Query and Transformation |
Ben Shneiderman |
Quinn |
Alexander |
2014 |
Crowdsourcing Decision Support: Frugal Human
Computation for
Efficient Decision Input Acquisition |
Ben Bederson |
Sayyadi |
Hassan |
2014 |
Authority Flow-Based Ranking in Heterogeneous Networks: Prediction,
Personalization, and Learning to Rank |
Louiqa Raschid |
Stoker |
Geoffrey |
2014 |
Analyzing the Combined Effects of Measurement
Error and Perturbation
Error on Performance Announcement |
Jeffrey K. Hollingsworth |
Summers-Stay |
Douglas |
2014 |
Productive Vision: Methods for Automatic Image Comprehension |
John Aloimonos |
Sylvester |
Jared |
2014 |
Neurocomputational Methods for Autonomous
Executive Control |
James Reggia |
Williams |
Gleneesha |
2014 |
Shrink-Wrapped Security: Tightly Coupling Situation and Security |
Ashok Agrawala |
Wood |
Derrick |
2014 |
Comparative and Computational Methods for Microbial Genomics |
Mihai Pop |
Zhai |
Ke |
2014 |
Probabilistic Bayesian Models -Scalable Inference and Application |
Jordan Boyd-Graber |
Asadi |
Nima |
2013 |
Multi-Stage Search Architectures for Streaming Documents |
|
Carr |
James Ryan |
2013 |
Generation and Analysis of Strategies in an
Evolutionary Social Learning Game |
Dana Nau |