2011

(Publications for 2011 are listed alphabetically by title)

Garg R, Varna AL, M. Wu.  2011.  "Seeing" ENF: natural time stamp for digital video via optical sensing and signal processing. Proceedings of the 19th ACM international conference on Multimedia. :23-32.
Martinelli Filho JE, Lopes RM, Rivera ING, Colwell RR.  2011.  Vibrio Cholerae O1 Detection in Estuarine and Coastal Zooplankton. Journal of Plankton Research. 33(1):51-62.
Dachman-Soled D, Servedio RA.  2011.  A Canonical Form for Testing Boolean Function Properties. Approximation, Randomization, and Combinatorial Optimization. Algorithms and Techniques. :460-471.
Tom Yeh, White B, San Pedro J, Katz B, Davis LS.  2011.  A case for query by image and text content: searching computer help using screenshots and keywords. Proceedings of the 20th international conference on World wide web. :775-784.
Tom Yeh, White B, San Pedro J, Katz B, Davis LS.  2011.  A case for query by image and text content: searching computer help using screenshots and keywords. Proceedings of the 20th international conference on World wide web. :775-784.
Layman L, Basili VR, Zelkowitz MV, Fisher KL.  2011.  A case study of measuring process risk for early insights into software safety. Software Engineering (ICSE), 2011 33rd International Conference on. :623-632.
Weissman A, Petrov M, Gupta SK.  2011.  A computational framework for authoring and searching product design specifications. Advanced Engineering Informatics. 25(3):516-534.
Kanodia JS, Kim Y, Tomer R, Khan Z, Chung K, Storey JD, Lu H, Keller PJ, Shvartsman SY.  2011.  A computational statistics approach for estimating the spatial range of morphogen gradients. Development. 138(22):4867-4874.
Winternitz LB, Nicholls SO, Tits Aé, O'Leary DP.  2011.  A Constraint-Reduced Variant of Mehrotra's Predictor-Corrector Algorithm. Computational Optimization and Applications.
Teo CL, Yang Y, Daumé H, Fermüller C, Aloimonos Y.  2011.  A Corpus-Guided Framework for Robotic Visual Perception. Workshops at the Twenty-Fifth AAAI Conference on Artificial Intelligence.
Kingsford C, Zaslavsky E, Singh M.  2011.  A cost-aggregating integer linear program for motif finding. Journal of Discrete Algorithms. 9(4):326-334.
Canino D, De Floriani L.  2011.  A Decomposition-based Approach to Modeling and Understanding Arbitrary Shapes. Eurographics Italian Chapter Conference 2011. :53-60.
Jorstad A, Jacobs DW, Trouve A.  2011.  A deformation and lighting insensitive metric for face recognition based on dense correspondences. Computer Vision and Pattern Recognition (CVPR), 2011 IEEE Conference on. :2353-2360.
Shen C-C, Wu H-H, Sane N, Plishker W, Bhattacharyya SS.  2011.  A design tool for efficient mapping of multimedia applications onto heterogeneous platforms. 2011 IEEE International Conference on Multimedia and Expo (ICME). :1-6.
Wagstrom P, Martino J, von Kaenel J, Chetty M, Thomas J, Jones L.  2011.  A Dive into Online Community Properties. CSCW '11. :725-728.
Roitman H, Gal A, Raschid L.  2011.  A Dual Framework and Algorithms for Targeted Online Data Delivery. IEEE Transactions on Knowledge and Data Engineering. 23(1):5-21.
Wei Z, JaJa JF.  2011.  A Fast Algorithm for Constructing Inverted Files on Heterogeneous Platforms. Parallel Distributed Processing Symposium (IPDPS), 2011 IEEE International. :1124-1134.
Ramachandran M, Veeraraghavan A, Chellappa R.  2011.  A Fast Bilinear Structure from Motion Algorithm Using a Video Sequence and Inertial Sensors. IEEE Transactions on Pattern Analysis and Machine Intelligence. 33(1):186-193.
Oh S, Hoogs A, Perera A, Cuntoor N, Chen C-C, Lee J T, Mukherjee S, Aggarwal JK, Lee H, Davis LS et al..  2011.  A large-scale benchmark dataset for event recognition in surveillance video. Computer Vision and Pattern Recognition (CVPR), 2011 IEEE Conference on. :3153-3160.
Froehlich J, Larson E, Saba E, Campbell T, Atlas L, Fogarty J, Patel S.  2011.  A Longitudinal Study of Pressure Sensing to Infer Real-World Water Usage Events in the Home. Pervasive Computing. 6696:50-69.
Froehlich J, Larson E, Saba E, Campbell T, Atlas L, Fogarty J, Patel S.  2011.  A Longitudinal Study of Pressure Sensing to Infer Real-World Water Usage Events in the Home. Pervasive ComputingPervasive Computing. 6696:50-69.
Horak MN, Nowick SM, Carlberg M, Vishkin U.  2011.  A Low-Overhead Asynchronous Interconnection Network for GALS Chip Multiprocessors. Computer-Aided Design of Integrated Circuits and Systems, IEEE Transactions on. 30(4):494-507.
Licamele L, Getoor L.  2011.  A method for the detection of meaningful and reproducible group signatures from gene expression profiles. Journal of Bioinformatics and Computational Biology. 9(3):431-451.
Wu H-H, Shen C-C, Sane N, Plishker W, Bhattacharyya SS.  2011.  A Model-Based Schedule Representation for Heterogeneous Mapping of Dataflow Graphs. 2011 IEEE International Symposium on Parallel and Distributed Processing Workshops and Phd Forum (IPDPSW). :70-81.
Schwartz WR, da Silva RD, Davis LS, Pedrini H.  2011.  A novel feature descriptor based on the shearlet transform. Image Processing (ICIP), 2011 18th IEEE International Conference on. :1033-1036.
Srinivasan BV, Zotkin DN, Duraiswami R.  2011.  A partial least squares framework for speaker recognition. Acoustics, Speech and Signal Processing (ICASSP), 2011 IEEE International Conference on. :5276-5279.
Plangprasopchok A, Lerman K, Getoor L.  2011.  A probabilistic approach for learning folksonomies from structured data. Proceedings of the fourth ACM international conference on Web search and data mining. :555-564.
Yu M, Rexford J, Sun X, Rao S, Feamster N.  2011.  A survey of virtual LAN usage in campus networks. Communications Magazine, IEEE. 49(7):98-103.
Ahn JW, Plaisant C, Shneiderman B.  2011.  A task taxonomy of network evolution analysis. University of Maryland, Human-Computer Interaction Lab Tech Report HCIL-2011-09.
Haghpanah Y, desJardins M, others.  2011.  A trust model for supply chain management. The 10th International Conference on Autonomous Agents and Multiagent Systems-Volume 3. :1375-1376.
Molinaro C, Sliva A, V.S. Subrahmanian.  2011.  Abduction in Annotated Probabilistic Temporal Logic. Technical Communications of the 27th International Conference on Logic Programming (ICLP'11). 11:240-250.
Wobbrock JO, Kane SK, Gajos KZ, Harada S, Froehlich J.  2011.  Ability-based design: Concept, principles and examples. ACM Transactions on Accessible Computing (TACCESS). 3(3)
Yaklichkin S Y, Darnell DK, Pier MV, Antin PB, Hannenhalli S.  2011.  Accelerated evolution of 3'avian FOXE1 genes, and thyroid and feather specific expression of chicken FoxE1. BMC Evolutionary Biology. 11(1):302-302.
Liu B, Gibbons T, Ghodsi M, Treangen T, Pop M.  2011.  Accurate and fast estimation of taxonomic profiles from metagenomic shotgun sequences. BMC Genomics. 12(Suppl 2):S4-S4.
Khan Z, Amini S, Bloom JS, Ruse C, Caudy AA, Kruglyak L, Singh M, Perlman DH, Tavazoie S.  2011.  Accurate proteome-wide protein quantification from high-resolution 15N mass spectra. Genome Biology. 12(12)
Ramadan S, Davis LS.  2011.  Action recognition using Partial Least Squares and Support Vector Machines. Image Processing (ICIP), 2011 18th IEEE International Conference on. :533-536.
Chen D, Bilgic M, Getoor L, Jacobs DW, Mihalkova L, Tom Yeh.  2011.  Active inference for retrieval in camera networks. Person-Oriented Vision (POV), 2011 IEEE Workshop on. :13-20.
Chen D, Bilgic M, Getoor L, Jacobs DW, Mihalkova L, Tom Yeh.  2011.  Active inference for retrieval in camera networks. Person-Oriented Vision (POV), 2011 IEEE Workshop on. :13-20.
Hurter C, Girouard A, Riche N, Plaisant C.  2011.  Active progress bars: facilitating the switch to temporary activities. Proceedings of the 2011 annual conference extended abstracts on Human factors in computing systems. :1963-1968.
Yu X, Fermüller C, Teo C L, Yang Y, Aloimonos Y.  2011.  Active scene recognition with vision and language. 2011 IEEE International Conference on Computer Vision (ICCV). :810-817.
Sharara H, Getoor L, Norton M.  2011.  Active Surveying: A Probabilistic Approach for Identifying Key Opinion Leaders. Twenty-Second International Joint Conference on Artificial Intelligence.
Samet H, Teitler BE, Adelfio MD, Lieberman MD.  2011.  Adapting a map query interface for a gesturing touch screen interface. Proceedings of the 20th international conference companion on World wide web. :257-260.
Garay JA, Katz J, Kumaresan R, Zhou HS.  2011.  Adaptively secure broadcast, revisited. Proceedings of the 30th Annual ACM Symposium on Principles of Distributed Computing.
Chellappa R, Turaga P.  2011.  Advances in Video-Based Biometrics. Advances in Imaging and Electron Physics. 83:183-203.
Rand W, Rust RT.  2011.  Agent-based modeling in marketing: Guidelines for rigor. International Journal of Research in Marketing. 28(3):181-193.
Wong EW, Tse TH, Glass RL, Basili VR, Chen TY.  2011.  An assessment of systems and software engineering scholars and institutions (2003–2007 and 2004–2008). Journal of Systems and Software. 84(1):162-168.
Nutanong S, Jacox EH, Samet H.  2011.  An incremental Hausdorff distance calculation algorithm. Proceedings of the VLDB Endowment. 4(8):506-517.
Boltcheva D, Canino D, Merino Aceituno S, Léon J-C, De Floriani L, Hétroy F.  2011.  An iterative algorithm for homology computation on simplicial shapes. Computer-Aided Design. 43(11):1457-1467.
Falk J, Zebelein C, Keinert J, Haubelt C, Teich J, Bhattacharyya SS.  2011.  Analysis of SystemC actor networks for efficient synthesis. ACM Trans. Embed. Comput. Syst.. 10(2):18:1-18:34.
Guerra Gómez J, Wongsuphasawat K, Wang TD, Pack M, Plaisant C.  2011.  Analyzing Incident Management Event Sequences with Interactive Visualization. Transportation Research Board 90th Annual Meeting Compendium of Papers.
Shakarian P, Parker A, Simari G, V.S. Subrahmanian.  2011.  Annotated probabilistic temporal logic. ACM Trans. Comput. Logic. 12(2):14:1–14:44-14:1–14:44.
Seymour J J, Tuzo J, desJardins M.  2011.  Ant Colony Optimization in a Changing Environment. 2011 AAAI Fall Symposium Series.
Plishker W, Zaki GF, Bhattacharyya SS, Clancy C, Kuykendall J.  2011.  Applying graphics processor acceleration in a software defined radio prototyping environment. 2011 22nd IEEE International Symposium on Rapid System Prototyping (RSP). :67-73.
Arya S, da Fonseca GD, Mount D.  2011.  Approximate polytope membership queries. Proceedings of 43rd Annual ACM Symposium on Theory of Computing. :579-586.
Pei G, Anil Kumar VS, Parthasarathy S, Srinivasan A.  2011.  Approximation algorithms for throughput maximization in wireless networks with delay constraints. 2011 Proceedings IEEE INFOCOM. :1116-1124.
Huq A, Grim CJ, Colwell RR.  2011.  Aquatic Realm and Cholera. Epidemiological and Molecular Aspects on Cholera. :311-339.
Koponen T, Shenker S, Balakrishnan H, Feamster N, Ganichev I, Ghodsi A, Godfrey BP, McKeown N, Parulkar G, Raghavan B et al..  2011.  Architecting for innovation. SIGCOMM Comput. Commun. Rev.. 41(3):24-36.
Haeupler B, Saha B, Srinivasan A.  2011.  Article 28 (28 pages)-New Constructive Aspects of the Lovász Local Lemma. Journal of the ACM-Association for ComputingMachinery. 58(6)
Chang T-H, Tom Yeh, Miller R.  2011.  Associating the visual representation of user interfaces with their internal structures and metadata. Proceedings of the 24th annual ACM symposium on User interface software and technology. :245-256.
Oh S, Hoogs A, Perera A, Cuntoor N, Chen C-C, Lee J T, Mukherjee S, Aggarwal JK, Lee H, Davis LS et al..  2011.  AVSS 2011 demo session: A large-scale benchmark dataset for event recognition in surveillance video. Advanced Video and Signal-Based Surveillance (AVSS), 2011 8th IEEE International Conference on. :527-528.
Rasko DA, Worsham PL, Abshire TG, Stanley ST, Bannan JD, Wilson MR, Langham RJ, Decker SR, Jiang L, Read TD et al..  2011.  Bacillus Anthracis Comparative Genome Analysis in Support of the Amerithrax Investigation. Proceedings of the National Academy of SciencesPNAS. 108(12):5027-5032.
Koren S, Treangen TJ, Pop M.  2011.  Bambus 2: scaffolding metagenomes. Bioinformatics. 27(21):2964-2971.
Anand P, King J, Boyd-Graber J, Wagner E, Martell C, Oard D, Resnik P.  2011.  Believe Me—We Can Do This! Annotating Persuasive Acts in Blog Text. Workshops at the Twenty-Fifth AAAI Conference on Artificial Intelligence.
Farrell R, Oza O, Zhang N, Morariu VI, Darrell T, Davis LS.  2011.  Birdlets: Subordinate categorization using volumetric primitives and pose-normalized appearance. Computer Vision (ICCV), 2011 IEEE International Conference on. :161-168.
Zhang Z, Klassen E, Srivastava A, Turaga P, Chellappa R.  2011.  Blurring-invariant Riemannian metrics for comparing signals and images. 2011 IEEE International Conference on Computer Vision (ICCV). :1770-1775.
Zhang J, Luo X, Perdisci R, Gu G, Lee W, Feamster N.  2011.  Boosting the scalability of botnet detection using adaptive traffic sampling. Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security. :124-134.
Caragea GC, Vishkin U.  2011.  Brief announcement: better speedups for parallel max-flow. Proceedings of the 23rd ACM symposium on Parallelism in algorithms and architectures. :131-134.
Sundaresan S, de Donato W, Feamster N, Teixeira R, Crawford S, Pescapè A.  2011.  Broadband internet performance: A view from the gateway. SIGCOMM-Computer Communication Review. 41(4):134-134.
Sharma A, Jacobs DW.  2011.  Bypassing synthesis: PLS for face recognition with pose, low-resolution and sketch. Computer Vision and Pattern Recognition (CVPR), 2011 IEEE Conference on. :593-600.
Cho S, Zwick A, Regier JC, Mitter C, Cummings MP, Yao J, Du Z, Zhao H, Kawahara AY, Weller S et al..  2011.  Can Deliberately Incomplete Gene Sample Augmentation Improve a Phylogeny Estimate for the Advanced Moths and Butterflies (Hexapoda: Lepidoptera)? Systematic BiologySyst Biol. 60(6):782-796.
Chafekar D, Anil Kumar V, Marathe M, Parthasarathy S, Srinivasan A.  2011.  Capacity of wireless networks under SINR interference constraints. Wireless Networks. 17(7):1605-1624.
Halter M, Sisan DR, Chalfoun J, Stottrup BL, Cardone A, Dima AA, Tona A, Plant AL, Elliott JT.  2011.  Cell cycle dependent TN-C promoter activity determined by live cell imaging.. Cytometry. Part A : the journal of the International Society for Analytical Cytology. 79(3):192-202.
Salles-Loustau G, Berthier R, Collange E, Sobesto B, Cukier M.  2011.  Characterizing Attackers and Attacks: An Empirical Study. :174-183.
Khan A, Bartram L, Blevis E, DiSalvo C, Froehlich J, Kurtenbach G.  2011.  CHI 2011 sustainability community invited panel: challenges ahead. 2011 annual conference extended abstracts on Human factors in computing systems. :73-76.
Alam M, Islam A, Bhuiyan NA, Rahim N, Hossain A, Khan GY, Ahmed D, Watanabe H, Izumiya H, Faruque ASG et al..  2011.  Clonal transmission, dual peak, and off-season cholera in Bangladesh. Infection Ecology & Epidemiology. 1(1)
Neamtiu I., Dumitras T.  2011.  Cloud software upgrades: Challenges and opportunities. 2011 International Workshop on the Maintenance and Evolution of Service-Oriented and Cloud-Based Systems (MESOCA) . :1-10.
Namata G M, Kok S, Getoor L.  2011.  Collective graph identification. Proceedings of the 17th ACM SIGKDD international conference on Knowledge discovery and data mining. :87-95.
Kim H, Sundaresan S, Chetty M, Feamster N, Edwards KW.  2011.  Communicating with caps: managing usage caps in home networks. ACM SIGCOMM Computer Communication Review. 41(4):470-471.
Kim H, Sundaresan S, Chetty M, Feamster N, W. Edwards K.  2011.  Communicating with Caps: Managing Usage Caps in Home Networks. SIGCOMM Comput. Commun. Rev.. 41(4):470-471.
Lai V, Rajashekar C, Rand W.  2011.  Comparing Social Tags to Microblogs. Privacy, security, risk and trust (passat), 2011 IEEE third international conference on and 2011 IEEE third international conference on social computing (socialcom). :1380-1383.
Templeton T C, Fleischmann KR, Boyd-Graber J.  2011.  Comparing values and sentiment using Mechanical Turk. Proceedings of the 2011 iConference. :783-784.
Gordon DS, Hazay C, Katz J, Lindell Y.  2011.  Complete Fairness in Secure Two-Party Computation. Journal of the ACM. 58(6):24:1–24:37-24:1–24:37.
Patel VM, Easley GR, Chellappa R.  2011.  Component-based restoration of speckled images. 2011 18th IEEE International Conference on Image Processing (ICIP). :2797-2800.
Vitali M, De Floriani L, Magillo P.  2011.  Computing morse decompositions for triangulated terrains: an analysis and an experimental evaluation. Image Analysis and Processing–ICIAP 2011. :565-574.
Bazinet AL, Cummings MP.  2011.  Computing the Tree of Life: Leveraging the Power of Desktop and Service Grids. Parallel and Distributed Processing Workshops and Phd Forum (IPDPSW), 2011 IEEE International Symposium on. :1896-1902.
Katz J, Malka L.  2011.  Constant-Round Private Function Evaluation with Linear Complexity. Advances in Cryptology–ASIACRYPT 2011. :556-571.
Zajic D, Maxwell M, Doermann D, Rodrigues P, Bloodgood M.  2011.  Correcting Errors in Digital Lexicographic Resources Using a Dictionary Manipulation Language. Electronic lexicography in the 21st century: new applications for new users (eLEX2011). :297-301.
Xie B, Tom Yeh, Walsh G, Watkins I, Huang M.  2011.  Co‐designing contextual tutorials for older adults on searching health information on the internet. Proceedings of the American Society for Information Science and Technology. 48(1):1-4.
Tom Yeh, Chang T-H, Xie B, Walsh G, Watkins I, Wongsuphasawat K, Huang M, Davis LS, Bederson BB.  2011.  Creating contextual help for GUIs using screenshots. Proceedings of the 24th annual ACM symposium on User interface software and technology. :145-154.
McNamee P, Mayfield J, Lawrie D, Oard D, Doermann D.  2011.  Cross Language Entity Linking. IJCNLP: International Joint Conference on Natural Language Processing.
Shen C-C, Plishker W, Bhattacharyya SS.  2011.  Dataflow-based Design and Implementation of Image Processing Applications. Technical Reports from UMIACS.
Bhattacharyya SS, Shen C-C, Plishker W, Sane N, Wu H-H, Gu R.  2011.  Dataflow-Based Implementation of Layered Sensing Applications.
Moustafa WE, Namata G, Deshpande A, Getoor L.  2011.  Declarative analysis of noisy information networks. 2011 IEEE 27th International Conference on Data Engineering Workshops (ICDEW). :106-111.
Bejgerowski W, Gerdes J, Gupta SK, Bruck H.  2011.  Design and fabrication of miniature compliant hinges for multi-material compliant mechanisms. The International Journal of Advanced Manufacturing Technology. 57(5):437-452.
Cho I, Shen C-C, Potbhare S, Bhattacharyya SS, Goldsman N.  2011.  Design methods for Wireless Sensor Network Building Energy Monitoring Systems. 2011 IEEE 36th Conference on Local Computer Networks (LCN). :974-981.
Ananthanarayanan A, Ehrlich L, Desai JP, Gupta SK.  2011.  Design of Revolute Joints for In-Mold Assembly Using Insert Molding. Journal of Mechanical Design. 133:121010-121010.
Chung JM, Chung M, O'Leary DP.  2011.  Designing Optimal Spectral Filters for Inverse Problems. SIAM Journal on Scientific Computing. 33(6)
Rodrigues P, Zajic D, Bloodgood M, Ye P, Doermann D.  2011.  Detecting Structural Irregularity in Electronic Dictionaries Using Language Modeling. Electronic lexicography in the 21st century: new applications for new users (eLEX2011). :227-232.
Bryce RC, Sampath S, Memon AM.  2011.  Developing a Single Model and Test Prioritization Strategies for Event-Driven Software. Software Engineering, IEEE Transactions on. 37(1):48-64.
Čomić L, De Floriani L.  2011.  Dimension-independent simplification and refinement of Morse complexes. Graphical Models. 73(5):261-285.
Korpal M, Ell BJ, Buffa FM, Ibrahim T, Blanco MA, Celià-Terrassa T, Mercatali L, Khan Z, Goodarzi H, Hua Y et al..  2011.  Direct targeting of Sec23a by miR-200s influences cancer cell secretome and promotes metastatic colonization. Nature Medicine. 17(9):1101-1108.
Ma K-K, Yit Phang K, Foster JS, Hicks MW.  2011.  Directed Symbolic Execution. Static AnalysisStatic Analysis. 6887:95-111.
Froehlich J, Larson E, Gupta S, Cohn G, Reynolds M, Patel S.  2011.  Disaggregated End-Use Energy Sensing for the Smart Grid. IEEE Pervasive Computing. 10(1):28-39.
Mesmoudi MM, De Floriani L, Magillo P.  2011.  Discrete Curvature Estimators: an Experimental Evaluation. DISI-TR-11-12
Sankaranarayanan AC, Chellappa R, Baraniuk RG.  2011.  Distributed Sensing and Processing for Multi-Camera Networks. Distributed Video Sensor NetworksDistributed Video Sensor Networks. :85-101.
Ghodsi M, Liu B, Pop M.  2011.  DNACLUST: accurate and efficient clustering of phylogenetic marker genes. BMC Bioinformatics. 12(1):271-271.
Kumar J, Pillai J, Doermann D.  2011.  Document Image Classification and Labeling using Multiple Instance Learning. Intl. Conf. on Document Analysis and Recognition (ICDAR 11). :1059-1063.
Gopalan R, Li R, Chellappa R.  2011.  Domain adaptation for object recognition: An unsupervised approach. 2011 IEEE International Conference on Computer Vision (ICCV). :999-1006.
Mardziel P, Magill S, Hicks MW, Srivatsa M.  2011.  Dynamic Enforcement of Knowledge-Based Security Policies. Computer Security Foundations Symposium (CSF), 2011 IEEE 24th. :114-128.
An J-hoon(D), Chaudhuri A, Foster JS, Hicks MW.  2011.  Dynamic inference of static types for ruby. Proceedings of the 38th annual ACM SIGPLAN-SIGACT symposium on Principles of programming languages. :459-472.
Chen D, Bilgic M, Getoor L, Jacobs DW.  2011.  Dynamic Processing Allocation in Video. Pattern Analysis and Machine Intelligence, IEEE Transactions on. 33(11):2174-2187.
Sahami M, desJardins M, Dodds Z, Neller T.  2011.  Educational advances in artificial intelligence. Proceedings of the 42nd ACM technical symposium on Computer science education. :81-82.
Luo Y, Duraiswami R.  2011.  EFFICIENT PARALLEL NON-NEGATIVE LEAST SQUARES ON MULTI-CORE ARCHITECTURES. SIAM Journal on Scientific Computing. 33(5):2848-2863.
Huang Y, Malka L, Evans D, Katz J.  2011.  Efficient privacy-preserving biometric identification. Network and Distributed System Security Symposium.
Huang Y, Shen C, Evans D, Katz J, Shelat A.  2011.  Efficient Secure Computation with Garbled Circuits. Information Systems Security. :28-48.
Brefeld U, Getoor L, Macskassy SA.  2011.  Eighth workshop on mining and learning with graphs. SIGKDD Explor. Newsl.. 12(2):63-65.
Lam H, Bertini E, Isenberg P, Plaisant C, Carpendale S.  2011.  Empirical Studies in Information Visualization: Seven Scenarios. Visualization and Computer Graphics, IEEE Transactions on. PP(99):1-1.
Deshpande A, Khuller S, Malekian A, Toossi M.  2011.  Energy efficient monitoring in sensor networks. Algorithmica. 59(1):94-114.
Liu M-Y, Tuzel O, Ramalingam S, Chellappa R.  2011.  Entropy rate superpixel segmentation. 2011 IEEE Conference on Computer Vision and Pattern Recognition (CVPR). :2097-2104.
Guo W, Jank W, Rand W.  2011.  Estimating Functional Agent-Based Models: An Application to Bid Shading in Online Markets Format. Proceedings of the Genetic and Evolutionary Computation Conference (GECCO 2011).
Fang H-ren, O'Leary DP.  2011.  Euclidean distance matrix completion problems. Optimization Methods and Software. :1-23.
Hayden C, Smith E, Hardisty E, Hicks MW, Foster JS.  2011.  Evaluating Dynamic Software Update Safety Using Systematic Testing. IEEE Transactions on Software Engineering. PP(99):1-1.
Gove R, Dunne C, Shneiderman B, Klavans J, Dorr BJ.  2011.  Evaluating visual and statistical exploration of scientific literature networks. 2011 IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC). :217-224.
Hansen D, Smith MA, Shneiderman B.  2011.  EventGraphs: Charting Collections of Conference Connections. 2011 44th Hawaii International Conference on System Sciences (HICSS). :1-10.
Hicks MW, Nettles S, Seong-Kyu S, Shannon S.  2011.  Evolution in Action: Using Active Networking to Evolve Network Support for Mobility. IFIP Lecture Notes in Computer Science (LNCS). 2546(2546):146-161.
Ni J, Turaga P, Patel VM, Chellappa R.  2011.  Example-Driven Manifold Priors for Image Deconvolution. Image Processing, IEEE Transactions on. 20(11):3086-3096.
Gu R, Janneck JW, Raulet M, Bhattacharyya SS.  2011.  Exploiting Statically Schedulable Regions in Dataflow Programs. Journal of Signal Processing Systems. 63(1):129-142.
Getoor L, Mihalkova L.  2011.  Exploiting statistical and relational information on the web and in social media. Proceedings of the fourth ACM international conference on Web search and data mining. :9-10.
Chuang W-H, Su H, M. Wu.  2011.  Exploring compression effects for improved source camera identification using strongly compressed video. Image Processing (ICIP), 2011 18th IEEE International Conference on. :1953-1956.
Gopalan R, Schwartz WR, Chellappa R, Srivastava A.  2011.  Face Detection. Visual Analysis of HumansVisual Analysis of Humans. :71-90.
Bhanu B, Govindaraju V.  2011.  Face Tracking and Recognition in a Camera Network. Multibiometrics for Human IdentificationMultibiometrics for Human Identification.
Chellappa R, Du M, Turaga P, Zhou S K.  2011.  Face Tracking and Recognition in Video. Handbook of Face RecognitionHandbook of Face Recognition. :323-351.
Zou WWW, Chellappa R, Yuen PC.  2011.  Face tracking in low resolution videos under illumination variations. 2011 18th IEEE International Conference on Image Processing (ICIP). :781-784.
Guo H, Robson Schwartz W, Davis LS.  2011.  Face verification using large feature sets and one shot similarity. Biometrics (IJCB), 2011 International Joint Conference on. :1-8.
Kumar J, Doermann D.  2011.  Fast Rule-line Removal using Integral Images and Support Vector Machines. Intl. Conf. on Document Analysis and Recognition (ICDAR 11). :584-588.
Shuttleworth RR, Elman H, Long KR, Templeton JA.  2011.  Fast solvers for models of ICEO microfluidic flows. International Journal for Numerical Methods in Fluids. 65(4):383-404.
Huang Y, Evans D, Katz J, Malka L.  2011.  Faster secure two-party computation using garbled circuits. USENIX Security Symposium.
Rotman D, Vieweg S, Yardi S, Chi E, Preece J, Shneiderman B, Pirolli P, Glaisyer T.  2011.  From slacktivism to activism: participatory culture in the age of social media. Proceedings of the 2011 annual conference extended abstracts on Human factors in computing systems. :819-822.
Wu S, Raschid L, Rand W.  2011.  Future link prediction in the blogosphere for recommendation. Proceedings of the International Conference on Weblogs and Social Media (ICWSM).
Sharara H, Sopan A, Namata G, Getoor L, Singh L.  2011.  G-PARE: A visual analytic tool for comparative analysis of uncertain graphs. Visual Analytics Science and Technology (VAST), 2011 IEEE Conference on. :61-70.
Dewey FE, Perez MV, Wheeler MT, Watt C, Spin J, Langfelder P, Horvath S, Hannenhalli S, Cappola TP, Ashley EA.  2011.  Gene Coexpression Network Topology of Cardiac Development, Hypertrophy, and FailureClinical Perspective. Circulation: Cardiovascular GeneticsCirc Cardiovasc Genet. 4(1):26-35.
Vishnoi A, Sethupathy P, Simola D, Plotkin JB, Hannenhalli S.  2011.  Genome-Wide Survey of Natural Selection on Functional, Structural, and Network Properties of Polymorphic Sites in Saccharomyces Paradoxus. Molecular Biology and EvolutionMol Biol Evol. 28(9):2615-2627.
Yalçın MA, Weiss K, De Floriani L.  2011.  GPU algorithms for diamond-based multiresolution terrain processing. Eurographics Symposium on Parallel Graphics and Visualization. :10-11.
Wong P C, Chen C, Gorg C, Shneiderman B, Stasko J, Thomas J.  2011.  Graph Analytics-Lessons Learned and Challenges Ahead. IEEE Computer Graphics and Applications. 31(5):18-29.
Rodrigues EM, Milic-Frayling N, Smith M, Shneiderman B, Hansen D.  2011.  Group-in-a-Box Layout for Multi-faceted Analysis of Communities. Privacy, Security, Risk and Trust (PASSAT), 2011 IEEE Third International Conference on and 2011 IEEE Third International Confernece on Social Computing (SocialCom). :354-361.
Yuan X, Cohen MB, Memon AM.  2011.  GUI Interaction Testing: Incorporating Event Context. Software Engineering, IEEE Transactions on. 37(4):559-574.
Schatz MC, Phillippy AM, Sommer DD, Delcher AL, Puiu D, Narzisi G, Salzberg SL, Pop M.  2011.  Hawkeye and AMOS: Visualizing and Assessing the Quality of Genome Assemblies. Briefings in Bioinformatics.
Hourcade J P, Bullock-Rest NE, Friedman B, Nelson M, Shneiderman B, Zaphiris P.  2011.  HCI for peace: from idealism to concrete steps. PART 2 ———– Proceedings of the 2011 annual conference extended abstracts on Human factors in computing systems. :613-616.
Sundaresan S, Feamster N, Teixeira R, Tang A, W. Edwards K, Grinter RE, Chetty M, de Donato W.  2011.  Helping Users Shop for ISPs with Internet Nutrition Labels. ACM SIGCOMM Workshop on Home Networks '11. :13-18.
Plishker W, Sane N, Kiemb M, Bhattacharyya SS.  2011.  Heterogeneous Design in Functional DIF. Transactions on High-Performance Embedded Architectures and Compilers IV. :391-408.
Tobin-Hochstadt S, Van Horn D.  2011.  Higher-Order Symbolic Execution via Contracts. arXiv:1103.1362 [cs].
Minker J.  2011.  Homage to Michael Gelfond on His 65 th Birthday. Logic programming, knowledge representation, and nonmonotonic reasoning. :1-11.
Valancius V, Lumezanu C, Feamster N, Johari R, Vazirani VV.  2011.  How Many Tiers? Pricing in the Internet Transit Market SIGCOMM-Computer Communication Review. 41(4):194-194.
Condon E, Cummins E, Afoulki Z, Cukier M.  2011.  How secure are networked office devices? :465-472.
Basri R, Jacobs DW.  2011.  Illumination modeling for face recognition. Handbook of face recognition. :169-195.
Mei X, Ling H, Jacobs DW.  2011.  Illumination Recovery From Image With Cast Shadows Via Sparse Representation. Image Processing, IEEE Transactions on. 20(8):2366-2377.
Patel VM, Wu T, Biswas S, Phillips PJ, Chellappa R.  2011.  Illumination robust dictionary-based face recognition. 2011 18th IEEE International Conference on Image Processing (ICIP). :777-780.
Patel VM, Pillai JK, Chellappa R.  2011.  Image and Video-Based Biometrics. Visual Analysis of HumansVisual Analysis of Humans. :437-454.
Siddiquie B, Feris RS, Davis LS.  2011.  Image ranking and retrieval based on multi-attribute queries. Computer Vision and Pattern Recognition (CVPR), 2011 IEEE Conference on. :801-808.
LeMoigne J, Netanyahu NS, Eastman RD.  2011.  Image Registration for Remote Sensing. :515.
Elaine Shi, Niu Y, Jakobsson M, Chow R.  2011.  Implicit Authentication through Learning User Behavior. Information Security. 6531:99-113.
Park S, O’Leary DP.  2011.  Implicitly-weighted total least squares. Linear Algebra and its Applications. 435(3):560-577.
Katz J, Schröder D, Yerukhimovich A.  2011.  Impossibility of blind signatures from one-way permutations. Theory of Cryptography. :615-629.
Hettinger AZ, Rackoff A, Wongsuphasawat K, Cheng H, Fairbanks RJ, Plaisant C, Smith MS.  2011.  Improved Identification and Visualization of Emergency Department Patient Visits. Annals of Emergency Medicine. 58(4):S309-S309.
Minton SN, Michelson M, See K, Macskassy S, Gazen BC, Getoor L.  2011.  Improving Classifier Performance by Autonomously Collecting Background Knowledge from the Web. 2011 10th International Conference on Machine Learning and Applications Workshops. :1-6.
Kawahara AY, Ohshima I, Kawakita A, Regier JC, Mitter C, Cummings MP, Davis DR, Wagner DL, De Prinis J, Lopez-Vaamonde C.  2011.  Increased gene sampling provides stronger support for higher-level groups within gracillariid leaf mining moths and relatives (Lepidoptera: Gracillariidae). BMC Evol Biol. 11:182
Kerren A, Plaisant C, Stasko JT.  2011.  Information Visualization: State of the Field and New Research Directions. Information VisualizationInformation Visualization. 10(4):269-270.
Calvert KL, Edwards KW, Feamster N, Grinter RE, Deng Y, Zhou X.  2011.  Instrumenting home networks. SIGCOMM Comput. Commun. Rev.. 41(1):84-89.
Kirschner AKT, Schauer S, Steinberger B, Wilhartitz I, Grim CJ, Huq A, Colwell RR, Herzig A, Sommer R.  2011.  Interaction of Vibrio cholerae non-O1/non-O139 with Copepods, Cladocerans and Competing Bacteria in the Large Alkaline Lake Neusiedler See, Austria. Microbial ecology. 61(3):496-506.
Singh S P, Baden R, Lee C, Bhattacharjee B, La R, Shayman M.  2011.  IP geolocation in metropolitan areas. Proceedings of the ACM SIGMETRICS joint international conference on Measurement and modeling of computer systems. :155-156.
Srinivasan BV, Garcia-Romero D, Zotkin DN, Duraiswami R.  2011.  Kernel partial least squares for speaker recognition. Twelfth Annual Conference of the International Speech Communication Association.
Dondera R, Davis LS.  2011.  Kernel PLS regression for robust monocular pose estimation. Computer Vision and Pattern Recognition Workshops (CVPRW), 2011 IEEE Computer Society Conference on. :24-30.
Srinivasan B V, Duraiswami R.  2011.  Kernelized Renyi distance for subset selection and similarity scoring. Technical Reports of the Computer Science Department.
Tzoukermann E, Neumann J, Kosecka J, Fermüller C, Perera I, Ferraro F, Sapp B, Chaudhry R, Singh G.  2011.  Language Models for Semantic Extraction and Filtering in Video Action Recognition. Workshops at the Twenty-Fifth AAAI Conference on Artificial Intelligence.
Zhuolin Jiang, Lin Z, Davis LS.  2011.  Learning a discriminative dictionary for sparse coding via label consistent K-SVD. Computer Vision and Pattern Recognition (CVPR), 2011 IEEE Conference on. :1697-1704.
Getoor L, Mihalkova L.  2011.  Learning statistical models from relational data. Proceedings of the 2011 international conference on Management of data. :1195-1198.
Mihalkova L, Moustafa W, Getoor L.  2011.  Learning to predict web collaborations. Workshop on User Modeling for Web Applications (UMWA-11).
Wongsuphasawat K, Guerra Gómez J A, Plaisant C, Wang T D, Taieb-Maimon M, Shneiderman B.  2011.  LifeFlow: visualizing an overview of event sequences. Proceedings of the 2011 annual conference on Human factors in computing systems. :1747-1756.
Wongsuphasawat K, Guerra Gómez J A, Plaisant C, Wang T, Taieb-Maimon M, Shneiderman B.  2011.  LifeFlow: visualizing an overview of event sequences (video preview). Proceedings of the 2011 annual conference extended abstracts on Human factors in computing systems. :507-510.
Swamy N, Guts N, Leijen D, Hicks MW.  2011.  Lightweight monadic programming in ML. Proceedings of the 16th ACM SIGPLAN international conference on Functional programming. :15-27.
Groce A, Katz J, Yerukhimovich A.  2011.  Limits of computational differential privacy in the client/server setting. Theory of Cryptography. :417-431.
Brakerski Z, Katz J, Segev G, Yerukhimovich A.  2011.  Limits on the power of zero-knowledge proofs in cryptographic constructions. Theory of Cryptography. :559-578.
Zhou X, Garcia-Romero D, Duraiswami R, Espy-Wilson C, Shamma S.  2011.  Linear versus Mel Frequency Cepstral Coefficients for Speaker Recognition. IEEE Automatic Speech Recognition and Understanding Workshop.
Srinivasan A.  2011.  Local Balancing Influences Global Structure in Social Networks. Proceedings of the National Academy of SciencesPNAS. 108(5):1751-1752.
Schwartz W, Davis LS, Pedrini H.  2011.  Local Response Context Applied to Pedestrian Detection. Progress in Pattern Recognition, Image Analysis, Computer Vision, and Applications. :181-188.
Belhumeur PN, Jacobs DW, Kriegman DJ, Kumar N.  2011.  Localizing parts of faces using a consensus of exemplars. Computer Vision and Pattern Recognition (CVPR), 2011 IEEE Conference on. :545-552.
Pratikakis P, Foster JS, Hicks MW.  2011.  LOCKSMITH: Practical static race detection for C. ACM Trans. Program. Lang. Syst.. 33(1):3:1–3:55-3:1–3:55.
Vezzulli L, Brettar I, Pezzati E, Reid PC, Colwell RR, Höfle MG, Pruzzo C.  2011.  Long-term effects of ocean warming on the prokaryotic community: evidence from the vibrios. The ISME Journal. 6(1):21-30.
Dorr BJ, Olive J, McCary J, Christianson C.  2011.  Machine Translation Evaluation and Optimization. Handbook of Natural Language Processing and Machine TranslationHandbook of Natural Language Processing and Machine Translation. :745-843.
Michelson M, Macskassy SA, Minton SN, Getoor L.  2011.  Materializing multi-relational databases from the web using taxonomic queries. Proceedings of the fourth ACM international conference on Web search and data mining. :355-364.
Li J, Deshpande A.  2011.  Maximizing Expected Utility for Stochastic Combinatorial Optimization Problems. 2011 IEEE 52nd Annual Symposium on Foundations of Computer Science (FOCS). :797-806.
Azar Y, Mądry A, Moscibroda T, Panigrahi D, Srinivasan A.  2011.  Maximum bipartite flow in networks with adaptive channel width. Theoretical Computer Science. 412(24):2577-2587.
Patro R, Ip C Y, Bista S, Cho SS, Thirumalai D, Varshney A.  2011.  MDMap: A system for data-driven layout and exploration of molecular dynamics simulations. Biological Data Visualization (BioVis), 2011 IEEE Symposium on. :111-118.
Markowitz E, Bernstam EV, Herskovic J, Zhang J, Shneiderman B, Plaisant C, Johnson TR.  2011.  Medication Reconciliation: Work Domain Ontology, Prototype Development, and a Predictive Model. AMIA Annual Symposium ProceedingsAMIA Annu Symp Proc. 2011:878-887.
Hasan NA, Chowdhury BW, Rahim N, Sultana M, Shabnam AS, Mai V, Ali A, Morris GJ, Sack BR, Huq A et al..  2011.  Metagenomic 16S rDNA Targeted PCR-DGGE in Determining Bacterial Diversity in Aquatic Ecosystem. Bangladesh Journal of Microbiology. 27(2)
Bhattacharyya SS.  2011.  Methods for design and implementation of dynamic signal processing systems. 2011 International Conference on Embedded Computer Systems (SAMOS). :i-i.
Neller T W, desJardins M, Oates T, Taylor ME.  2011.  Model AI Assignments 2011. Second AAAI Symposium on Educational Advances in Artificial Intelligence.
Kedilaya S, Plishker W, Purkovic A, Johnson B, Bhattacharyya SS.  2011.  Model-based precision analysis and optimization for digital signal processors. Proceedings of the European Signal Processing Conference. :506-510.
Varna AL, M. Wu.  2011.  Modeling and Analysis of Correlated Binary Fingerprints for Content Identification. Information Forensics and Security, IEEE Transactions on. 6(3):1146-1159.
Bhattacharyya SS, Plishker W, Sane N, Shen C-C, Wu H-H.  2011.  Modeling and optimization of dynamic signal processing in resource-aware sensor networks. 2011 8th IEEE International Conference on Advanced Video and Signal-Based Surveillance (AVSS). :449-454.
Weiss K, De Floriani L, Hagen H.  2011.  Modeling Multiresolution 3D Scalar Fields through Regular Simplex Bisection. Scientific Visualization: Interactions, Features, Metaphors. 2:360-377.
Varna AL, M. Wu.  2011.  Modeling temporal correlations in content fingerprints. Acoustics, Speech and Signal Processing (ICASSP), 2011 IEEE International Conference on. :1860-1863.
Valancius V, Lumezanu C, Feamster N, Johari R, Vazirani VV.  2011.  Modeling Tiered Pricing in the Internet Transit Market. Arxiv preprint arXiv:1112.3740.
Maniatis P, Dietz M, Papamanthou C.  2011.  MOMMIE Knows Best: Systematic Optimizations for Verifiable Distributed Algorithms. HotOS'13 Proceedings of the 13th USENIX Conference on Hot Topics in Operating Systems . :30-30.
Violi N, Shneiderman B, Hanson A, Rey PJ.  2011.  Motivation for Participation in Online Neighborhood Watch Communities: An Empirical Study Involving Invitation Letters. Privacy, Security, Risk and Trust (PASSAT), 2011 IEEE Third International Conference on and 2011 IEEE Third International Confernece on Social Computing (SocialCom). :760-765.
Morariu VI, Davis LS.  2011.  Multi-agent event recognition in structured scenarios. Computer Vision and Pattern Recognition (CVPR), 2011 IEEE Conference on. :3289-3296.
Turpie J, Reisner E, Foster JS, Hicks MW.  2011.  MultiOtter: Multiprocess Symbolic Execution. Technical Reports of the Computer Science Department.
Hsu C-J, Pino J L, Bhattacharyya SS.  2011.  Multithreaded Simulation for Synchronous Dataflow Graphs. ACM Trans. Des. Autom. Electron. Syst.. 16(3):25:1-25:23.
Gove R, Gramsky N, Kirby R, Sefer E, Sopan A, Dunne C, Shneiderman B, Taieb-Maimon M.  2011.  NetVisia: Heat Map & Matrix Visualization of Dynamic Social Network Statistics & Content. Privacy, Security, Risk and Trust (PASSAT), 2011 IEEE Third International Conference on and 2011 IEEE Third International Confernece on Social Computing (SocialCom). :19-26.
Chekuri C, Gal A, Im S, Khuller S, Li J, McCutchen R, Moseley B, Raschid L.  2011.  New models and algorithms for throughput maximization in broadcast scheduling. Approximation and Online Algorithms. :71-82.
Treangen TJ, Sommer DD, Angly FE, Koren S, Pop M.  2011.  Next Generation Sequence Assembly with AMOS. Current Protocols in Bioinformatics. 11:1-11.
Ye P, Doermann D.  2011.  No-reference image quality assessment based on visual codebook. Image Processing (ICIP), 2011 18th IEEE International Conference on. :3089-3092.
Conroy JM, Schlesinger JD, O'Leary DP.  2011.  Nouveau-ROUGE: A Novelty Metric for Update Summarization. Computational Linguistics. 37(1):1-8.
Prasad SK, Chtchelkanova A, Das S, Dehne F, Gouda M, Gupta A, JaJa JF, Kant K, La Salle A, LeBlanc R et al..  2011.  NSF/IEEE-TCPP curriculum initiative on parallel and distributed computing: core topics for undergraduates. Proceedings of the 42nd ACM technical symposium on Computer science education. :617-618.
Kim K, Davis LS.  2011.  Object Detection and Tracking for Intelligent Video Surveillance. Multimedia Analysis, Processing and Communications. :265-288.
Elaine Shi, Chan T, Stefanov E, Li M.  2011.  Oblivious RAM with O((logN)^3) Worst-Case Cost. Advances in Cryptology – ASIACRYPT 2011. 7073:197-214.
Gurbanov S, Akhmadov R, Shamkhalova G, Akhmadova S, Haley BJ, Colwell RR, Huq A.  2011.  Occurrence of Vibrio cholerae in Municipal and Natural Waters and Incidence of Cholera in Azerbaijan. EcoHealth. (4):468-477.
Hansen DL, Jacobs DW, Lewis D, Biswas A, Preece J, Rotman D, Stevens E.  2011.  Odd Leaf Out: Improving Visual Recognition with Games. Privacy, security, risk and trust (passat), 2011 ieee third international conference on and 2011 ieee third international conference on social computing (socialcom). :87-94.
Jain R, Doermann D.  2011.  Offline Writer Identification using K-Adjacent Segments. International Conference on Document Analysis and Recognition. :769-773.
Ishai Y, Katz J, Kushilevitz E, Lindell Y, Petrank E.  2011.  On Achieving the" Best of Both Worlds" in Secure Multiparty Computation. SIAM Journal on Computing. 40(1):122-122.
Dachman-Soled D, Lindell Y, Mahmoody M, Malkin T.  2011.  On the Black-Box Complexity of Optimally-Fair Coin Tossing. Theory of Cryptography. :450-467.
Sundaresan A, Chellappa R.  2011.  ON THE ESTIMATION OF 3D HUMAN BODY MODELS AND POSE FROM MULTIPLE CAMERAS. EMERGING TOPICS IN COMPUTER VISION AND ITS APPLICATIONS. :3-25.
Stewart G.W.  2011.  On the Numerical Analysis of Oblique Projectors. SIAM Journal on Matrix Analysis and Applications. 32(1):309-348.
Papamanthou C, Tamassia R, Triandopoulos N.  2011.  Optimal Verification of Operations on Dynamic Sets. Advances in Cryptology – CRYPTO 2011. :91-110.
Garain U, Paik J, Pal T, Majumder P, Doermann D, Oard D.  2011.  Overview of the FIRE 2011 RISOTTask. FIRE.
Bhattacharyya SS, Eker J, Janneck JW, Lucarz C, Mattavelli M, Raulet M.  2011.  Overview of the MPEG Reconfigurable Video Coding Framework. Journal of Signal Processing Systems. 63(2):251-263.
Reddy D, Veeraraghavan A, Chellappa R.  2011.  P2C2: Programmable pixel compressive camera for high speed imaging. 2011 IEEE Conference on Computer Vision and Pattern Recognition (CVPR). :329-336.
Chen X, Jain A, Gupta A, Davis LS.  2011.  Piecing together the segmentation jigsaw using context. Computer Vision and Pattern Recognition (CVPR), 2011 IEEE Conference on. :2001-2008.
desJardins M, Ciavolino A, Deloatch R, Feasley E.  2011.  Playing to Program: Towards an Intelligent Programming Tutor for RUR-PLE. Second AAAI Symposium on Educational Advances in Artificial Intelligence.
Wu S, Elsayed T, Rand W, Raschid L.  2011.  Predicting author blog channels with high value future posts for monitoring. Proceedings of the Twenty-Fifth Conference on Artificial Intelligence (AAAI).
DuBois T, Golbeck J, Srinivasan A.  2011.  Predicting Trust and Distrust in Social Networks. Privacy, Security, Risk and Trust (PASSAT), 2011 IEEE Third International Conference on and 2011 IEEE Third International Confernece on Social Computing (SocialCom). :418-424.
Zheleva E, Getoor L.  2011.  Privacy in social networks: A survey. Social Network Data Analytics. :277-306.
Chan HT-H, Elaine Shi, Song D.  2011.  Private and Continual Release of Statistics. ACM Transactions on Information and System Security (TISSEC). 14(3):26:1-26:24.
Huang Y, Evans D, Katz J.  2011.  Private Set Intersection: Are Garbled Circuits Better than Custom Protocols? 19th Network and Distributed Security Symposium.
Dunne C, Shneiderman B, Gove R, Klavans J, Dorr BJ.  2011.  Rapid understanding of scientific paper collections: integrating statistics, text analysis, and visualization. University of Maryland, Human-Computer Interaction Lab Tech Report HCIL-2011.
Butler K, Payne T, Shneiderman B, Brennan P, Zhang J.  2011.  Re-engineering health care with information technology: the role of computer-human interaction. PART 2 ———– Proceedings of the 2011 annual conference extended abstracts on Human factors in computing systems. :451-454.
Thakur A, Gupta SK.  2011.  Real-time dynamics simulation of unmanned sea surface vehicle for virtual environments. Journal of Computing and Information Science in Engineering. 11:031005-031005.
Bourne D, Corney J, Gupta SK.  2011.  Recent advances and future challenges in automated manufacturing planning. Journal of Computing and Information Science in Engineering. 11:021006-021006.
Chellappa R, Turaga P.  2011.  Recent advances in age and height estimation from still images and video. 2011 IEEE International Conference on Automatic Face & Gesture Recognition and Workshops (FG 2011). :91-96.
Wu S, Rand W, Raschid L.  2011.  Recommendations in social media for brand monitoring. Proceedings of the fifth ACM conference on Recommender systems. :345-348.
Tian Y, Zhang Y, Hurd L, Hannenhalli S, Liu F, Lu M M, Morrisey EE.  2011.  Regulation of Lung Endoderm Progenitor Cell Behavior by miR302/367. DevelopmentDevelopment. 138(7):1235-1245.
Kandel S, Heer J, Plaisant C, Kennedy J, Van Ham F, Riche N H, Weaver C, Lee B, Brodbeck D, Buono P.  2011.  Research Directions in Data Wrangling: Visualizations and Transformations for Usable and Credible Data. Information VisualizationInformation Visualization. 10(4):271-288.
Perlis D.  2011.  Robotson Crusoe–or–What Is Common Sense? Logical Formalizations of Commonsense Reasoning — Papers from the AAAI 2011 Spring Symposium.
De Magny G C, Mozumder PK, Grim CJ, Hasan NA, Naser NM, Alam M, Sack BR, Huq A, Colwell RR.  2011.  Role of Zooplankton Diversity in Vibrio Cholerae Population Dynamics and in the Incidence of Cholera in the Bangladesh Sundarbans. Applied and Environmental Microbiology. 77(17):6125-6132.
Katz J, Vaikuntanathan V.  2011.  Round-optimal password-based authenticated key exchange. Theory of Cryptography. :293-310.
Ip C Y, Varshney A.  2011.  Saliency-Assisted Navigation of Very Large Landscape Images. Visualization and Computer Graphics, IEEE Transactions on. 17(12):1737-1746.
Hu Q, Gumerov NA, Duraiswami R.  2011.  Scalable fast multipole methods on distributed heterogeneous architectures. High Performance Computing, Networking, Storage and Analysis (SC), 2011 International Conference for. :1-12.
Lu W, M. Wu.  2011.  Seam carving estimation using forensic hash. Proceedings of the thirteenth ACM multimedia workshop on Multimedia and security. :9-14.
Gordon D, Katz J, Kolesnikov V, Malkin T, Raykova M, Vahlis Y.  2011.  Secure computation with sublinear amortized work.
Dachman-Soled D, Malkin T, Raykova M, Yung M.  2011.  Secure Efficient Multiparty Computing of Multivariate Polynomials and Applications. Applied Cryptography and Network Security. :130-146.
Lu W, Varna A, M. Wu.  2011.  Secure video processing: Problems and challenges. Acoustics, Speech and Signal Processing (ICASSP), 2011 IEEE International Conference on. :5856-5859.
Kumar J, Kang L, Doermann D, Abd-Almageed W.  2011.  Segmentation of Handwritten Textlines in Presence of Touching Components. Intl. Conf. on Document Analysis and Recognition (ICDAR 11). :109-113.
Eaton E, desJardins M, others.  2011.  Selective transfer between learning tasks using task-based boosting. Twenty-Fifth AAAI Conference on Artificial Intelligence.
Tobin-Hochstadt S, Van Horn D.  2011.  Semantic Solutions to Program Analysis Problems. arXiv:1105.0106 [cs].
Kanagal B, Li J, Deshpande A.  2011.  Sensitivity analysis and explanations for robust query evaluation in probabilistic databases. Proceedings of the 2011 international conference on Management of data. :841-852.
Lam H, Bertini E, Isenberg P, Plaisant C, Carpendale S.  2011.  Seven guiding scenarios for information visualization evaluation. 2011-992-04
Kumar J, Prasad R, Cao H, Abd-Almageed W, Doermann D, Natarajan P.  2011.  Shape Codebook based Handwritten and Machine Printed Text Zone Extraction. Document Recognition and Retrieval. :7874:1-8-7874:1-8.
Mundada Y, Ramachandran A, Feamster N.  2011.  SilverLine: Data and Network Isolation for Cloud Services. 2nd USENIX Workshop on Hot Topics in Cloud Computing.
Weiss K, De Floriani L.  2011.  Simplex and Diamond Hierarchies: Models and Applications. Computer Graphics Forum. 30(8):2127-2155.
Čomić L, De Floriani L, Iuricich F.  2011.  Simplifying morphological representations of 2D and 3D scalar fields. Proceedings of the 19th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems. :437-440.
Templeton TC, Fleischmann KR, Boyd-Graber J.  2011.  Simulating Audiences: Automating Analysis of Values, Attitudes, and Sentiment. Privacy, Security, Risk and Trust (PASSAT), 2011 IEEE Third International Conference on and 2011 IEEE Third International Confernece on Social Computing (SocialCom). :734-737.
Čomić L, Mesmoudi M, De Floriani L.  2011.  Smale-like decomposition and forman theory for discrete scalar fields. Discrete Geometry for Computer Imagery. :477-488.
Lim S-N, Mittal A, Davis LS.  2011.  Smart task-driven video collection. 11/649,393(7961215)
Shneiderman B.  2011.  Social discovery framework: building capacity and seeking solutions. Proceedings of the 8th ACM conference on Creativity and cognition. :307-308.
Patro R, Ip C Y, Bista S, Varshney A.  2011.  Social Snapshot: A System for Temporally Coupled Social Photography. Computer Graphics and Applications, IEEE. 31(1):74-84.
Ramachandran A, Dasgupta A, Feamster N, Weinberger K.  2011.  Spam or ham?: characterizing and detecting fraudulent "not spam" reports in web mail systems Proceedings of the 8th Annual Collaboration, Electronic messaging, Anti-Abuse and Spam Conference. :210-219.
Qiu Q, Zhuolin Jiang, Chellappa R.  2011.  Sparse dictionary-based representation and recognition of action attributes. 2011 IEEE International Conference on Computer Vision (ICCV). :707-714.
Patel VM, Nasrabadi NM, Chellappa R.  2011.  Sparsity-motivated automatic target recognition. Applied OpticsAppl. Opt.. 50(10):1425-1433.
Chellappa R, Cavallaro A, Wu Y, Shan C, Fu Y, Pulli K.  2011.  Special Issue on Video Analysis on Resource-Limited Systems. IEEE Transactions on Circuits and Systems for Video Technology. 21(10):1349-1352.
Sharma P, Khurana U, Shneiderman B, Scharrenbroich M, Locke J.  2011.  Speeding Up Network Layout and Centrality Measures for Social Computing Goals. Social Computing, Behavioral-Cultural Modeling and PredictionSocial Computing, Behavioral-Cultural Modeling and Prediction. 6589:244-251.
Hayden CM, Smith EK, Hicks MW, Foster JS.  2011.  State transfer for clear and efficient runtime updates. 2011 IEEE 27th International Conference on Data Engineering Workshops (ICDEW). :179-184.
Turaga P, Veeraraghavan A, Srivastava A, Chellappa R.  2011.  Statistical Computations on Grassmann and Stiefel Manifolds for Image and Video-Based Recognition. IEEE Transactions on Pattern Analysis and Machine Intelligence. 33(11):2273-2286.
Agrawal M, Doermann D.  2011.  Stroke-like Pattern Noise Removal in Binary Document Images. International Conference on Document Analysis and Recognition. :17-21.
Lopez JV, Ledger A, Santiago-Vázquez LZ, Pop M, Sommer DD, Ranzer LK, Feldman RA, Russell GK.  2011.  Suppression subtractive hybridization PCR isolation of cDNAs from a Caribbean soft coral. Electronic Journal of Biotechnology. 14(1):8-9.
Shekhar S, Patel VM, Chellappa R.  2011.  Synthesis-based recognition of low resolution faces. 2011 International Joint Conference on Biometrics (IJCB). :1-6.
BROECHELER M, V.S. Subrahmanian, Pugliese A.  2011.  SYSTEM AND METHOD FOR DATA MANAGEMENT IN LARGE DATA NETWORKS. WO/2011/032077(WO/2011/032077)
Shneiderman B.  2011.  Technology-mediated social participation: the next 25 years of HCI challenges. Human-Computer Interaction. Design and Development Approaches. :3-14.
Kimes NE, Grim CJ, Johnson WR, Hasan NA, Tall BD, Kothary MH, Kiss H, Munk CA, Tapia R, Green L et al..  2011.  Temperature regulation of virulence factors in the pathogen Vibrio coralliilyticus. The ISME Journal. 6(4):835-846.
Kang L, Doermann D.  2011.  Template based Segmentation of Touching Components in Handwritten Text Lines. 11th Intl. Conf. on Document Analysis and Recognition (ICDAR'11). :569-573.
Ahn J-wook, Taieb-Maimon M, Sopan A, Plaisant C, Shneiderman B.  2011.  Temporal Visualization of Social Network Dynamics: Prototypes for Nation of Neighbors. Social Computing, Behavioral-Cultural Modeling and PredictionSocial Computing, Behavioral-Cultural Modeling and Prediction. 6589:309-316.
Shen C-C, Wang L-H, Cho I, Kim S, Won S, Plishker W, Bhattacharyya SS.  2011.  The DSPCAD Lightweight Dataflow Environment: Introduction to LIDE Version 0.1. Technical Reports from UMIACS.
Chellappa R.  2011.  The evolution of stochastic grammars for representation and recognition of activities in videos. 2011 IEEE International Conference on Computer Vision Workshops (ICCV Workshops). :688-688.
Souza CP, Almeida BC, Colwell RR, Rivera ING.  2011.  The Importance of Chitin in the Marine Environment. Marine Biotechnology. :1-8.
Weiss K, De Floriani L, Fellegara R, Velloso M.  2011.  The PR-star octree: a spatio-topological data structure for tetrahedral meshes. Proceedings of the 19th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems. :92-101.
Abd-Almageed W, Blace RE, Eltoweissy M.  2011.  Threat-Aware Clustering in Wireless Sensor Networks. IFIP Advances in Information and Communication Technology (AICT). 264(264):1-12.
Keceli F, Tzannes A, Caragea GC, Barua R, Vishkin U.  2011.  Toolchain for Programming, Simulating and Studying the XMT Many-Core Architecture. Parallel and Distributed Processing Workshops and Phd Forum (IPDPSW), 2011 IEEE International Symposium on. :1282-1291.
Sane N, Kee H, Seetharaman G, Bhattacharyya SS.  2011.  Topological Patterns for Scalable Representation and Analysis of Dataflow Graphs. Journal of Signal Processing Systems. 65(2):229-244.
Dumitras T, Shou D.  2011.  Toward a Standard Benchmark for Computer Security Research: The Worldwide Intelligence Network Environment (WINE). BADGERS '11 Proceedings of the First Workshop on Building Analysis Datasets and Gathering Experience Returns for Security. :89-96.
Hu Q, Syal M, Gumerov NA, Duraiswami R, Leishman JG.  2011.  Toward improved aeromechanics simulations using recent advancements in scientific computing. Proceedings 67th Annual Forum of the American Helicopter Society. :3-5.
Yoon I, Sussman A, Memon AM, Porter A.  2011.  Towards incremental component compatibility testing. Proceedings of the 14th international ACM Sigsoft symposium on Component based software engineering, CBSE. 11:119-128.
Stefanov E, Elaine Shi, Song D.  2011.  Towards Practical Oblivious RAM. arXiv:1106.3652.
Taheri S, Turaga P, Chellappa R.  2011.  Towards view-invariant expression analysis using analytic shape manifolds. 2011 IEEE International Conference on Automatic Face & Gesture Recognition and Workshops (FG 2011). :306-313.
Nguyen H V, Banerjee A, Burlina P, Broadwater J, Chellappa R.  2011.  Tracking and Identification via Object Reflectance Using a Hyperspectral Video Camera. Machine Vision Beyond Visible SpectrumMachine Vision Beyond Visible Spectrum. 1:201-219.
Castillo CD, Jacobs DW.  2011.  Trainable 3D recognition using stereo matching. Computer Vision Workshops (ICCV Workshops), 2011 IEEE International Conference on. :625-631.
Everett LJ, Jensen ST, Hannenhalli S.  2011.  Transcriptional Regulation Via TF-Modifying Enzymes: An Integrative Model-Based Analysis. Nucleic Acids ResearchNucl. Acids Res.. 39(12):e78-e78-e78-e78.
Rios-Berrios M, Sharma P, Lee T Y, Schwartz R, Shneiderman B.  2011.  TreeCovery: Coordinated dual treemap visualization for exploring the Recovery Act. Government Information Quarterly.
Gomez JAG, Buck-Coleman A, Plaisant C, Shneiderman B.  2011.  TreeVersity: Comparing tree structures by topology and node's attributes differences. 2011 IEEE Conference on Visual Analytics Science and Technology (VAST). :275-276.
Gomez JAG, Buck-Coleman A, Plaisant C, Shneiderman B.  2011.  TreeVersity: Comparing tree structures by topology and node's attributes differences. Visual Analytics Science and Technology (VAST), 2011 IEEE Conference on. :275-276.
Wong PC, Chen C, Görg C, Shneiderman B, Stasko J, Thomas J.  2011.  Tutorial-Graph Analytics — Lessons Learned and Challenges Ahead. IEEE Computer Graphics and Applications. 31(5):18-18.
Sharara H, Singh L, Getoor L, Mann J.  2011.  Understanding actor loyalty to event-based groups in affiliation networks. Social Network Analysis and Mining. 1(2):115-126.
Katz J, Maurer U, Tackmann B, Zikas V.  2011.  Universally composable synchronous computation.
Goldberg L, Lide B, Lowry S, Massett HA, O'Connell T, Preece J, Quesenbery W, Shneiderman B.  2011.  Usability and Accessibility in Consumer Health Informatics: Current Trends and Future Challenges. American Journal of Preventive Medicine. 40(5, Supplement 2):S187-S197-S187-S197.
Pujara J, Daumé H, Getoor L.  2011.  Using classifier cascades for scalable e-mail classification. Collaboration, Electronic Messaging, Anti-Abuse and Spam Conference, ACM International Conference Proceedings Series.
Bhattacharyya SS, Shen C-C, Plishker W, Sane N, Zaki G.  2011.  Using the DSPCAD Integrative Command-Line Environment: User's Guide for DICE Version 1.1. Technical Reports from UMIACS.
Zhang W, Guo Y, Meth R, Sokoloff H, Pope A, Strat T, Chellappa R.  2011.  Variable remapping of images from very different sources. 2011 18th IEEE International Conference on Image Processing (ICIP). :1501-1504.
Zaki GF, Plishker W, Bhattacharyya SS, Clancy C, Kuykendall J.  2011.  Vectorization and mapping of software defined radio applications on heterogeneous multi-processor platforms. 2011 IEEE Workshop on Signal Processing Systems (SiPS). :31-36.
Kembhavi A, Harwood D, Davis LS.  2011.  Vehicle Detection Using Partial Least Squares. Pattern Analysis and Machine Intelligence, IEEE Transactions on. 33(6):1250-1265.
Khurana U, Nguyen V-A, Cheng H-C, Ahn J-wook, Chen X, Shneiderman B.  2011.  Visual Analysis of Temporal Trends in Social Networks Using Edge Color Coding and Metric Timelines. Privacy, Security, Risk and Trust (PASSAT), 2011 IEEE Third International Conference on and 2011 IEEE Third International Confernece on Social Computing (SocialCom). :549-554.
Lieberman MD, Taheri S, Guo H, Mirrashed F, Yahav I, Aris A, Shneiderman B.  2011.  Visual Exploration across Biomedical Databases. IEEE/ACM Transactions on Computational Biology and Bioinformatics. 8(2):536-550.
Yu X, Fermüller C, Aloimonos Y.  2011.  Visual Scene Interpretation as a Dialogue between Vision and Language. Workshops at the Twenty-Fifth AAAI Conference on Artificial Intelligence.
Drizd T, Eaton C, Plaisant C.  2011.  Visualizing Missing Data: Graph Interpretation User Study. IFIP Lecture Notes in Computer Science (LNCS). 3585(3585):861-872.
Jutla AS, Akanda AS, Griffiths JK, Colwell RR, Islam S.  2011.  Warming Oceans, Phytoplankton, and River Discharge: Implications for Cholera Outbreaks. The American Journal of Tropical Medicine and Hygiene. 85(2):303-308.
Stonedahl F, Anderson D, Rand W.  2011.  When does simulated data match real data? Proceedings of the 13th annual conference companion on Genetic and evolutionary computation. :231-232.
Chetty M, Haslem D, Baird A, Ofoha U, Sumner B, Grinter R.  2011.  Why is My Internet Slow?: Making Network Speeds Visible SIGCHI '11. :1889-1898.
Konte M, Feamster N.  2011.  Wide-area routing dynamics of malicious networks. Proceedings of the ACM SIGCOMM 2011 conference. :432-433.
Castillo CD, Jacobs DW.  2011.  Wide-baseline stereo for face recognition with large pose variation. Computer Vision and Pattern Recognition (CVPR), 2011 IEEE Conference on. :537-544.
Chung JM, Easley GR, O'Leary DP.  2011.  Windowed Spectral Regularization of Inverse Problems. SIAM Journal on Scientific Computing. 33(6)