Publications

Found 4090 results
[ Author(Desc)] Title Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
B
Bermudez-Edo, M.., Hurtado-Torres N.., & Aragon-Correa J.. A. (2010).  The Importance of Trusting Beliefs Linked to the Corporate Website for Diffusion of Recruiting-Related Online Innovations. Information Technology and Management. 11(4), 177-189.
Bernardis, E., & Yu S. X. (2011).  Pop Out Many Small Structures from a Very Large Microscopic Image. Medical Image Analysis. 690-707.
Bernasconi, A., & Codenotti B. (1993).  Sensitivity of Boolean Functions, Harmonic Analysis, and Circuit Complexity.
Bernd, J., Frik A., Johnson M., & Malkin N. (In Press).  Smart Home Bystanders: Further Complexifying a Complex Context. Proceedings of the 2nd annual Symposium on Applications of Contextual Integrity.
Bernd, J., Borth D., Carrano C., Choi J., Elizalde B. Martinez, Friedland G., et al. (2015).  Kickstarting the Commons: The YFCC100M and the YLI Corpora. 1-6.
Bernd, J., Gordo B., Choi J., Morgan B., Henderson N., Egelman S., et al. (2015).  Teaching Privacy: Multimedia Making a Difference. IEEE MultiMedia. 12-19.
Bernd, J., Borth D., Elizalde B. Martinez, Friedland G., Gallagher H., Gottlieb L., et al. (2015).  The YLI?MED Corpus: Characteristics, Procedures, and Plans.
Bernd, J., & Corley J. (2017).  Teach Global Impact: A Resource for CSP (or Any CS Class!). Proceedings of the 2017 ACM SIGCSE Technical Symposium on Computer Science Education. 699.
Bernhardt, M. (1996).  Design and Implementation of a Web-based Tool for ATM Connection Management.
Bernini, C.., Codenotti B., Leoncini M., & Resta G. (1991).  Incomplete Factorizations for Certain Toeplitz Matrices.
Bertasius, G., Park H. Soo, Yu S. X., & Shi J. (2016).  First Person Action-Object Detection with EgoNet.
Bertasius, G., Torresani L., Yu S. X., & Shi J. (2016).  Convolutional Random Walk Networks for Semantic Image Segmentation.
Bertasius, G., Yu S. X., Park H. Soo, & Shi J. (2016).  Am I a Baller? Basketball Skill Assessment using First-Person Cameras.
Bertasius, G., Yu S. X., & Shi J. (2016).  Exploiting Visual-Spatial First-Person Co-Occurrence for Action-Object Detection without Labels.
Berthold, M. R., & Huber K-P.. (1997).  Constructing Fuzzy Graphs from Examples.
Bertoni, A., & Dorigo M. (1993).  Implicit Parallelism in Genetic Algorithms.
Bertoni, A., Campadelli P., Morpurgo A., & Panizza S. (1992).  Polynomial Uniform Convergence and Polynomial-Sample Learnability.
Bettati, R., & Gupta A. (1995).  Dynamic Resource Migration for Multi-Party Real-Time Communication.
Bettinson, M., & Bird S. (2017).  Developing a suite of mobile applications for collaborative language documentation. Proceedings of the Second Workshop on the Use of Computational Methods in the Study of Endangered Languages.
Bettinson, M., & Bird S. (2018).  Image-Gesture-Voice: A Web Component for Eliciting Speech. Proceedings of the LREC 2018 Workshop.
Beverly, R., & Allman M. (2013).  Findings and Implications from Data Mining the IMC Review Process. ACM SIGCOMM Computer Communication Review. 3(1), 23-29.
Bhagat, S., Carvey H., & Shriberg E. (2003).  Automatically Generated Prosodic Cues to Lexically Ambiguous Dialog Acts in Multiparty Meetings. Proceedings of the 15th International Congress of Phonetic Sciences (ICPhS 2003).
Bhandarkar, S.., Reddy A.. L. N., Allman M., & Blanton E. (2006).  RFC 4653: Improving the Robustness of TCP to Non-Congestion Events.
Bharghavan, V., Demers A. J., Shenker S., & Zhang L. (1994).  MACAW: A Media Access Protocol for Wireless LAN's. Proceedings of the Conference on Communications Architectures, Protocols and Applications (SIGCOMM '94). 212-225.
Bhattacharya, A. A., Culler D. E., Friedman E., Ghodsi A., Shenker S., & Stoica I. (2013).  Hierarchical Scheduling for Diverse Datacenter Workloads.

Pages