Pujara |
Jay |
2016 |
Probabilistic Models for Scalable Knowledge Graph
Construction |
Lise Getoor |
Ozdemir |
Bahadir |
2016 |
Learning Binary Code Representations for Effective and Efficient Image Retrieval |
Larry Davis |
Purohit |
Manish |
2016 |
Data-Aware Scheduling in Datacenters |
Samir Khuller |
Rastogi |
Aseem |
2016 |
Language-Based Techniques for Practical and
Trustworthy Secure Multi-
Party Computations |
Michael Hicks |
Quamar |
Abdul |
2016 |
Building Efficient and Cost-Effective Cloud-Based Big Data Management Systems |
Amol Deshpande |
Rastegari |
Mohammad |
2016 |
Rich and Efficient Visual Data Representation |
Larry Davis |
Abolhassani |
Melika |
2016 |
Assignment Problems with Economic Applications |
Mohammad Hajiaghayi |
Robbins |
Bryan |
2016 |
A Binary Classifier for Test Case
Feasibility Applied to Automatically Generated Tests |
|
Adelman |
Ross |
2016 |
Fast and Accurate Boundary Element Methods in Three
Dimensions |
Ramani Duraiswami |
Sahu |
Avinash |
2016 |
Data Driven Approaches to
Identify Determinants of Heart Diseases and
Cancer Resistance |
|
Buntain |
Cody |
2016 |
Discovering Credible Events in Near Real Time from Social Media Streams |
Jennifer Golbeck |
Sawant |
Anshul |
2016 |
Computational Analysis of Intelligent Agents: Social and Strategic Settings |
V.S. Subrahmanian |
Chen |
Jun-Cheng |
2016 |
Robust Representations for Unconstrained Face Verification and Its Applications |
|
Banerjee |
Ishan |
2016 |
Event-Code Interaction Directed Test Cases |
|
Yang |
Fan |
2016 |
Leveraging Multiple Features for Image Retrieval
and Matching |
Larry Davis |
Hara |
Kotaro |
2016 |
Scalable Methods to Collect and Visualize Sidewalk Accessibility Data for People with Mobility Impairments |
|
Bhargava |
Preeti |
2016 |
Towards Proactive Context-Aware
Computing and Systems |
Ashok Agrawala |
Bondugula |
Sravanthi |
2016 |
Efficient Image and Video Representations for Retrieval |
Larry Davis |
Oh |
Uran |
2016 |
Accessible On-Body Interaction for People With Visual Impairments |
|
Chaturvedi |
Snigdha |
2016 |
Structured Approaches to Exploring Inter-Personal Relationships in Natural Language Test |
Hal Daumé III |
He |
He |
2016 |
Sequential Decisions and Predictions in Natural Language Processing |
Hal Daumé III |
Ramesh |
Arti |
2016 |
A Probabilistic Approach to Modeling Socio-Behavioral Interactions |
Lise Getoor |
Elsaka |
Ethar |
2016 |
Automated Software Debugging Using Hybrid
Static/Dynamic Analysis |
|
Huang |
Di-Wei |
2016 |
Self-Organizing Map Neural Architectures Based on Limit Cycle Attractors |
James Reggia |
Yalcin |
Mehmet Adil |
2016 |
Towards Rapid, Effective, and Expressive Visual Data Exploration |
Ben Bederson |
Jeon |
Jinseong |
2016 |
Framework Synthesis for Symbolic Execution
of Event-Driven Frameworks |
Jeffrey Foster |
Liu |
Chang |
2016 |
Trace Oblivious Program Execution |
Michael HicksElaine Shi |
Long |
Teng |
2016 |
Collaborative Testing of Shared Software Components |
Alan Sussman |
Malik |
Sana |
2016 |
A Visual Analytics Approach to Comparing Cohorts of Event Sequences |
Ben Shneiderman |
Milton |
Leslie |
2016 |
User Behavioral Modeling of Web-based
Systems for Continuous User Authentication |
|
Malozemoff |
Alexis |
2016 |
Efficient Secure Computation for Real-world Settings and
Security Models |
Jonathan Katz |
Khamis |
Sameh |
2015 |
Leveraging Structure in Activity
Recognition: Context and Spatiotemporal Dynamics |
Larry Davis |
Rekatsinas |
Theodoros |
2015 |
Quality-Aware Data Source Management |
Amol Deshpande |
Lampton |
James |
2015 |
Pig Squeal: Bridging Batch and Streaming
Processing Using
Incremental Updates |
Ashok Agrawala |
Stuckman |
Jeffrey |
2015 |
Continuous, Effort-Aware Prediction of
Software Security Defects |
James Purtilo |
Liaghat |
Vahid |
2015 |
Primal-Dual Techniques for Online
Algorithms and Mechanisms |
Mohammad Hajiaghayi |
Bach |
Stephen |
2015 |
Hinge-Loss Markov Random Fields and
Probabilistic Soft Logic:
A Scalable Approach to Structured
Prediction |
Lise Getoor |
Mardziel |
Piotr |
2015 |
Modeling, Quantifying, and Limiting Adversary
Knowledge |
Michael Hicks |
Chen |
Xi |
2015 |
Context Driven Scene
Understanding |
Larry Davis |
Nandy |
Kaustav |
2015 |
Segmentation and Informatics in
Multi-Dimensional Fluorescence
Optical Microscopy Images |
|
Kang |
Chanhyun |
2015 |
Diffusion, Infection and Social (Information)
Network Database |
V.S. Subrahmanian |
Nguyen |
Viet An |
2015 |
Guided Probabilistic Topic Models for Agenda-Setting
and Framing |
Philip Resnik |
Raboin |
Eric |
2015 |
Model-Predictive Strategy
Generation for Multi-Agent
Pursuit-Evasion Games |
Dana Nau |
Sarpatwar |
Kanthi Kiran |
2015 |
Allocation Algorithms for Networks with Scarce
Resources |
Samir Khuller |
Saur |
Karla |
2015 |
Dynamic Upgrades for High Availability
Systems |
Michael HicksJeffery Foster |
Sharma |
Abhishek |
2015 |
Learning from Multiple Views of Data |
David Jacobs |
Teo |
Ching Lik |
2015 |
Computational Mid-Level Vision:
From Border Ownership to Categorical
Object Recognition |
John Aloimonos |
Shivashankar |
Vikas |
2015 |
Hierarchical Goal Networks:
Formalisms and Algorithms for Learning and Acting |
Dana Nau |
Yang |
Yezhou |
2015 |
Manipulation Action Understanding for
Observation and Execution |
John Aloimonos |
Soares |
Joao |
2015 |
Efficient Image Segmentation and
Segment-Based Analysis in Computer Vision Applications |
David Jacobs |