Conference Papers
(Publications are listed alphabetically by title)
Pages
Associating the visual representation of user interfaces with their internal structures and metadata. In: Proceedings of the 24th annual ACM symposium on User interface software and technology. New York, NY, USA: ACM; 2011. 2. p. 245-256p. (UIST '11).
Attacking cryptographic schemes based on "perturbation polynomials". In: Proceedings of the 16th ACM conference on Computer and communications security. New York, NY, USA: ACM; 2009. 1. p. 1-10p. (CCS '09).
Attacking the bottlenecks of backfilling schedulers. In: Cluster Computing.; 2000.
Attacks on digital watermarks. In: Signals, Systems, and Computers, 1999. Conference Record of the Thirty-Third Asilomar Conference on. Vol 2.; 1999. 1. p. 1508-1512p. vol.p. 2-1508p. -1512 vol.2.
Attentive toys. In: International Conference on Multimedia and Expo. Vol 22.; 2001. 2. p. 25.
Attribute Grammar-Based Event Recognition and Anomaly Detection. In: Computer Vision and Pattern Recognition Workshop, 2006. CVPRW '06. Conference on.; 2006. 1. p. 107.
Augmenting spatio-textual search with an infectious disease ontology. In: Data Engineering Workshop, 2008. ICDEW 2008. IEEE 24th International Conference on.; 2008. 2. p. 266-269p.
Authenticated Hash Tables. In: CCS '08 Proceedings of the 15th ACM Conference on Computer and Communications Security . ACM; 2008. 4. p. 437-448p. (CCS '08).
Authenticated out-of-band communication over social links. In: Proceedings of the first workshop on Online social networks. New York, NY, USA: ACM; 2008. 6. p. 61-66p. (WOSN '08).
Authentication in the clouds: a framework and its application to mobile users. ACM; 2010. 1. p. 1-6p. (CCSW '10).
Automated checking for Windows host vulnerabilities.; 2005. 1. 10 pp. -p. 148-10p. pp. -148.
Automated cluster-based Web service performance tuning. In: 13th IEEE International Symposium on High performance Distributed Computing, 2004. Proceedings. IEEE; 2004. 3. p. 36-44p.
Automated detection of persistent kernel control-flow attacks. In: Proceedings of the 14th ACM conference on Computer and communications security. New York, NY, USA: ACM; 2007. 1. p. 103-115p. (CCS '07).
Automated generation of an efficient MPEG-4 Reconfigurable Video Coding decoder implementation. In: 2010 Conference on Design and Architectures for Signal and Image Processing (DASIP).; 2010. 2. p. 265-272p.
Automated gui testing guided by usage profiles. In: Proceedings of the twenty-second IEEE/ACM international conference on Automated software engineering. New York, NY, USA: ACM; 2007. 3. p. 333-342p. (ASE '07).
Automated recovery in a secure bootstrap process. In: Proceedings of the Symposium on Network and Distributed Systems Security (NDSS’98).; 1998. 1. p. 155-167p.
Automated Validation of Software Models. In: Automated Software Engineering, International Conference on. Los Alamitos, CA, USA: IEEE Computer Society; 2001. 9. p. 91.
Automatic database system conversion: schema revision, data translation, and source-to-source program transformation. In: Proceedings of the June 7-10, 1982, national computer conference. New York, NY, USA: ACM; 1982. 5. p. 579-587p. (AFIPS '82).
Automatic Document Logo Detection. In: The 9th International Conference on Document Analysis and Recognition (ICDAR 2007). Curitiba, Brazil; 2007. 8. p. 864-868p.
Automatic Identification of Text In Digital Video Key Frames. In: Proceedings of International Conference on Pattern Recognition.; 1998. 1. p. 129-132p.
Automatic matched filter recovery via the audio camera. In: Acoustics Speech and Signal Processing (ICASSP), 2010 IEEE International Conference on.; 2010. 2. p. 2826-2829p.
Automatic position calibration of multiple microphones. In: Acoustics, Speech, and Signal Processing, 2004. Proceedings. (ICASSP '04). IEEE International Conference on. Vol 4.; 2004. i. iv-p. 69-p. iv-72 vol.p. 4-p. iv-p. 69-p. iv-72 vol.4.
Automatic program analysis and evaluation. In: Proceedings of the 2nd international conference on Software engineering. Los Alamitos, CA, USA: IEEE Computer Society Press; 1976. 1. p. 158-163p. (ICSE '76).
Automatic software interference detection in parallel applications. In: Proceedings of the 2007 ACM/IEEE conference on Supercomputing. Reno, Nevada: ACM; 2007. 1. 14:p. 1-14p. :p. 12-14p. :p. 1-14p. :12. (SC '07).
Automatic target recognition based on simultaneous sparse representation. In: Image Processing (ICIP), 2010 17th IEEE International Conference on.; 2010. 1. p. 1377-1380p.
Automatic Text Tracking In Digital Videos. In: Proceedings of IEEE 1998 Workshop on Multimedia Signal Processing.; 1998. 2. p. 21-26p.
Automatic thumbnail cropping and its effectiveness. In: Proceedings of the 16th annual ACM symposium on User interface software and technology. New York, NY, USA: ACM; 2003. 9. p. 95-104p. (UIST '03).
Automatic thumbnail cropping and its effectiveness. In: Proceedings of the 16th annual ACM symposium on User interface software and technology.; 2003. 9. p. 95-104p.
Automatic transcription of Czech language oral history in the MALACH project: resources and initial experiments. In: Proceedings of the The 5th International Conference on Text, Speech and Dialogue.; 2002. 5. p. 57-64p.
Automatic video summarization for wireless and mobile environments. In: 2004 IEEE International Conference on Communications. Vol 3. IEEE; 2004. 1. p. 1532-1536p. Vol.p. 3-1532p. - 1536 Vol.3.
Automatically Tracking and Analyzing the Behavior of Live Insect Colonies. In: AGENTS '01 Proceedings of the Fifth International Conference on Autonomous Agents . ACM; 2001. 5. p. 521-528p. (AGENTS '01).
Average relative radiance transform for subpixel detection. In: Geoscience and Remote Sensing Symposium, 2005. IGARSS '05. Proceedings. 2005 IEEE International. Vol 5.; 2005. 3. p. 3565-3568p.
AVideo Text Detection System Based on Automated Training. In: ICPR. Vol 2.; 2000. 2. p. 223-226p.
AVSS 2011 demo session: A large-scale benchmark dataset for event recognition in surveillance video. In: Advanced Video and Signal-Based Surveillance (AVSS), 2011 8th IEEE International Conference on.; 2011. 5. p. 527-528p.
Backbone construction in selfish wireless networks. In: Proceedings of the 2007 ACM SIGMETRICS international conference on Measurement and modeling of computer systems. New York, NY, USA: ACM; 2007. 1. p. 121-132p. (SIGMETRICS '07).
Background modeling and subtraction by codebook construction. In: Image Processing, 2004. ICIP '04. 2004 International Conference on. Vol 5.; 2004. 3. p. 3061-3064p. Vol. p. 5-3061p. - 3064 Vol. 5.
Balancing performance and data freshness in web database servers. In: Proceedings of the 29th international conference on Very large data bases-Volume 29.; 2003. 3. p. 393-404p.
Barrier pointing: using physical edges to assist target acquisition on mobile device touch screens. In: Proceedings of the 9th international ACM SIGACCESS conference on Computers and accessibility, October.; 2007. 1. p. 15-17p.
Bayesian classification in medicine: The transferability question. In: Proceedings of the Fifth Annual Symposium on Computer Applications in Medical Care.; 1981. 2. p. 250-252p.
Bayesian methods for face recognition from video. In: Acoustics, Speech, and Signal Processing (ICASSP), 2002 IEEE International Conference on. Vol 4.; 2002. I. IV-4068 -IV-p. 4071-p. IV-4068 -IV-4071.
Bayesian multitask learning with latent hierarchies. In: Proceedings of the Twenty-Fifth Conference on Uncertainty in Artificial Intelligence.; 2009. 1. p. 135-142p.
Bayesian query-focused summarization. In: Proceedings of the 21st International Conference on Computational Linguistics and the 44th annual meeting of the Association for Computational Linguistics. Stroudsburg, PA, USA: Association for Computational Linguistics; 2006. 3. p. 305-312p. (ACL-44).
Bayesian structure from motion using inertial information. In: Image Processing. 2002. Proceedings. 2002 International Conference on. Vol 3.; 2002. I. III-p. 425-p. III-428 vol.p. 3-p. III-p. 425-p. III-428 vol.3.
Bayesian summarization at DUC and a suggestion for extrinsic evaluation. In: Document understanding conference.; 2005.
Beam Search for Feature Selection in Automatic SVMDefect Classification. In: International Conference on Pattern Recognition.; 2002. 2. p. 212-215p.
Before We Knew It: An Empirical Study of Zero-day Attacks in the Real World. In: CCS '12 Proceedings of the 2012 ACM conference on Computer and Communications Security. ACM; 2012. 8. p. 833-844p. (CCS '12).
Behavioral clustering of HTTP-based malware and signature generation using malicious network traces. In: Proceedings of the 7th USENIX conference on Networked systems design and implementation. Berkeley, CA, USA: USENIX Association; 2010. 2. p. 26. (NSDI'10).
Believe Me—We Can Do This! Annotating Persuasive Acts in Blog Text. In: Workshops at the Twenty-Fifth AAAI Conference on Artificial Intelligence.; 2011.