Potter |
Richard |
1999 |
Pixel Data Access: Interprocess Communication in the User Interface for End-User Programming and Graphical Macros |
Ben Shneiderman |
Postow |
Brian |
2002 |
Object based computation |
Carl Herbert Smith |
Popescu |
Catalin |
2000 |
Fast Evaluation of Intergrated-Services TCP/IP Networks |
A. Udaya Shankar |
Pleszkoch |
Mark |
1990 |
Machine learning with queries and oracles |
William Gasarch |
Pless |
Robert |
2000 |
Visual shape |
John Aloimonos |
Phillippy |
Adam |
2010 |
Whole-Genome Sequence Analysis for Pathogen
Detection and Diagnostics |
Steven Salzberg |
Petroni |
Nick |
2007 |
Property-Based Integrity Monitoring of Operating System Kernels |
William Arbaugh, Michael Hicks |
Petroni |
Nick |
2007 |
Property-Based Integrity Monitoring of Operating System Kernels |
William Arbaugh, Michael Hicks |
Peskov |
Denis |
2022 |
Gathering Natural Language Processing Data Using Experts |
Jordan Boyd-Graber |
Perer |
Adam |
2008 |
Integrating Statistics and Visualization to
Improve Exploratory Social Network Analysis |
Ben Shneiderman |
Peng |
Yun |
1985 |
A formalization of parsimonious covering and probabilistic reasoning in abductive diagnostic inference |
James Reggia |
Peng |
Shangfu |
2019 |
High-Throughput Network Distance Computations for Spatial Analytics Inside Any Store |
Hanan Samet |
Peng |
Feng |
2006 |
High Performance Xpath Evaluation in XML Streams |
Sudarshan S. Chawathe |
Peleg |
Shmuel |
1979 |
Ambiguity reduction in probabilistic networks |
Azriel Rosenfeld |
Pearson |
Glenn |
1988 |
Foot-operated cursor-position controls for computer workstations :$esign, implementation, and evaluation |
Ben Shneiderman |
Pawagi |
Shaunak |
1986 |
Incremental graph algorithms for parallel random access machines |
Ramakrishnan |
Patro |
Robert |
2012 |
Computationally Comparing Biological Networks and Reconstructing Their Evolution |
Carl Kingsford |
Patra |
Sunandita |
2020 |
Acting, Planning, and Learning Using Hierarchical Operational Models |
Dana Nau |
Patkar |
Sushant |
2021 |
Fantastic Sources Of Tumor Heterogeneity And How To Characterize Them |
Soheil Feizi |
Parthasarathy |
Srinivasan |
2006 |
Resource Allocation in Networked and Distributed Environments |
Aravind Srinivasan |
Parker |
James |
2020 |
Advanced Language-based Techniques for Correct, Secure Networked Systems |
Michael Hicks |
Parker |
Austin |
2008 |
Spatial Probabilistic Temporal Databases |
Dana NauV.S. Subrahmanian |
Park |
Young Sam |
2016 |
Active Data Collection Techniques to Understand Online Scammers and Cybercriminals |
Elaine Shi |
Park |
Jun-cheol |
1998 |
Automatic Synthesis of Time Dependent Communication Protocols |
|
Park |
Sungwoo |
2011 |
Matrix Reduction in Numerical Optimization |
Dianne O'Leary |
Park |
Eunhui |
2013 |
Dynamic Data Structures for Geometric Search and Retrieval |
David Mount |
Park |
Deok |
2018 |
Visual Analytics for Open-Ended Tasks in Text Mining |
Niklas Elmqvist |
Parikh |
Josephine |
1977 |
Automatic cloud classification and segmentation |
Azriel Rosenfeld |
Parameswaran |
Vasudev |
2004 |
Viewpoint Invariance in Visual Human Motion Analysis |
|
Pan |
Zhijian |
2007 |
Artificial Evolution of Self-Replicating Structures in Cellular Automata |
James Reggia |
Pachulski |
Andrew |
2020 |
STRUCTANT: A CONTEXT-AWARE TASK MANAGEMENT FRAMEWORK FOR HETEROGENEOUS COMPUTATIONAL ENVIRONMENTS |
Ashok Agrawala |
Ozdemir |
Bahadir |
2016 |
Learning Binary Code Representations for Effective and Efficient Image Retrieval |
Larry Davis |
Ozcan |
Fatma |
2001 |
Improving the Performance of Heterogeneous Data Sources and Agents |
|
Ostertag |
Eduardo |
1992 |
A Classification system for software reuse |
Hendler |
Ondov |
Brian |
2020 |
Revealing Perceptual Proxies in Comparative Data Visualization |
Niklas Elmqvist |
Oh |
Uran |
2016 |
Accessible On-Body Interaction for People With Visual Impairments |
|
Ogale |
Abhijit |
2004 |
The Compositional Character of Visual Correspondence |
John Aloimonos |
North |
Christopher |
2000 |
A user interface for coordinating visualizations based on relational schemata :3nap-together visualization |
Ben Shneiderman |
Noh |
Sam |
1993 |
Characterizing the Execution of Applications on Massively Parallel Systems |
Ashok Agrawala |
Niu |
Xing |
2019 |
Formality Style Transfer Within and Across Languages with Limited Supervision |
Marine Carpuat |
Nishigaki |
Morimichi |
2012 |
The Image Torque Operator for Mid-Level Vision:
Theory and Experiment |
John Aloimonos |
Nirkhe |
Vivek |
1992 |
|
Satish Kumar Tripathi |
Nguyen |
Bao |
2013 |
Testing GUI-Based Software with Undetermined Input Spaces |
|
Nguyen |
Phuc |
2019 |
Higher-order Symbolic Execution |
David Van Horn |
Nguyen |
Viet An |
2015 |
Guided Probabilistic Topic Models for Agenda-Setting
and Framing |
Philip Resnik |
Nguyen |
Khanh Xuan |
2022 |
ENRICHING COMMUNICATION BETWEEN HUMANS AND AI AGENTS |
Hal Daumé III |
Ng |
Raymond |
1992 |
Reasoning with uncertainty in deductive databases and logic programs |
|
Ng |
Yue |
2018 |
Video Understanding with Deep Networks |
Larry Davis |
Neuman |
Jan |
2004 |
Computer Vision in the Space of Light Rays: Plenoptic Video Geometry and Polydioptric Camera Design |
John Aloimonos |
Netanyahu |
Nathan |
1992 |
Computationally efficient algorithms for robust estimation |
David MountAzriel Rosenfeld |