Publications

Found 4135 results
[ Author(Desc)] Title Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
B
Berman, P., Fößmeier U., Karpinski M., Kaufmann M., & Zelikovsky A. (1994).  Approaching the 5/4-Approximation for Rectilinear Steiner Trees.
Berman, P., Karpinski M., Larmore L. L., Plandowski W., & Rytter W. (1996).  The Complexity of Two-Dimensional Compressed Pattern Matching.
Berman, P., Charikar M., & Karpinski M. (1997).  On-Line Load Balancing for Related Machines.
Bermudez-Edo, M.., Hurtado-Torres N.., & Aragon-Correa J.. A. (2010).  The Importance of Trusting Beliefs Linked to the Corporate Website for Diffusion of Recruiting-Related Online Innovations. Information Technology and Management. 11(4), 177-189.
Bernardis, E., & Yu S. X. (2011).  Pop Out Many Small Structures from a Very Large Microscopic Image. Medical Image Analysis. 690-707.
Bernasconi, A., & Codenotti B. (1993).  Sensitivity of Boolean Functions, Harmonic Analysis, and Circuit Complexity.
Bernd, J., Gordo B., Choi J., Morgan B., Henderson N., Egelman S., et al. (2015).  Teaching Privacy: Multimedia Making a Difference. IEEE MultiMedia. 12-19.
Bernd, J., Borth D., Elizalde B. Martinez, Friedland G., Gallagher H., Gottlieb L., et al. (2015).  The YLI?MED Corpus: Characteristics, Procedures, and Plans.
Bernd, J., & Corley J. (2017).  Teach Global Impact: A Resource for CSP (or Any CS Class!). Proceedings of the 2017 ACM SIGCSE Technical Symposium on Computer Science Education. 699.
Bernd, J., Frik A., Johnson M., & Malkin N. (In Press).  Smart Home Bystanders: Further Complexifying a Complex Context. Proceedings of the 2nd annual Symposium on Applications of Contextual Integrity.
Bernd, J., Frik A., Johnson M., & Malkin N. (2019).  Smart Home Bystanders: Further Complexifying a Complex Context. Proceedings of the 2nd Symposium on Applications of Contextual Integrity.
Bernd, J., Borth D., Carrano C., Choi J., Elizalde B. Martinez, Friedland G., et al. (2015).  Kickstarting the Commons: The YFCC100M and the YLI Corpora. 1-6.
Bernhardt, M. (1996).  Design and Implementation of a Web-based Tool for ATM Connection Management.
Bernini, C.., Codenotti B., Leoncini M., & Resta G. (1991).  Incomplete Factorizations for Certain Toeplitz Matrices.
Bertasius, G., Torresani L., Yu S. X., & Shi J. (2016).  Convolutional Random Walk Networks for Semantic Image Segmentation.
Bertasius, G., Yu S. X., Park H. Soo, & Shi J. (2016).  Am I a Baller? Basketball Skill Assessment using First-Person Cameras.
Bertasius, G., Yu S. X., & Shi J. (2016).  Exploiting Visual-Spatial First-Person Co-Occurrence for Action-Object Detection without Labels.
Bertasius, G., Park H. Soo, Yu S. X., & Shi J. (2016).  First Person Action-Object Detection with EgoNet.
Berthold, M. R., & Huber K-P.. (1997).  Constructing Fuzzy Graphs from Examples.
Bertoni, A., Campadelli P., Morpurgo A., & Panizza S. (1992).  Polynomial Uniform Convergence and Polynomial-Sample Learnability.
Bertoni, A., & Dorigo M. (1993).  Implicit Parallelism in Genetic Algorithms.
Bettati, R., & Gupta A. (1995).  Dynamic Resource Migration for Multi-Party Real-Time Communication.
Bettinson, M., & Bird S. (2018).  Image-Gesture-Voice: A Web Component for Eliciting Speech. Proceedings of the LREC 2018 Workshop.
Bettinson, M., & Bird S. (2017).  Developing a suite of mobile applications for collaborative language documentation. Proceedings of the Second Workshop on the Use of Computational Methods in the Study of Endangered Languages.
Beverly, R., & Allman M. (2013).  Findings and Implications from Data Mining the IMC Review Process. ACM SIGCOMM Computer Communication Review. 3(1), 23-29.

Pages