Journal Articles

Pages

Doppa J, Yu J, Tadepalli P, Getoor L. Learning algorithms for link prediction based on chance constraints. Machine Learning and Knowledge Discovery in Databases. 2010:344-360.
Wagstaff K, desJardins M, Eaton E, Montminy J. Learning and visualizing user preferences over sets. American Association for Artificial Intelligence (AAAI). 2007.
Cho S, Reggia JA. Learning competition and cooperation. Neural computation. 1993;5(2):242-259.
Ramanathan N, Chellappa R. Learning Facial Aging Models: A Face Recognition Perspective. Biometrics: theory, methods, and applications. 2009;9:271.
Ilghami O, Nau DS, Muñoz-Avila H, Aha DW. Learning preconditions for planning from plan traces and HTN structure. Computational Intelligence. 2005;21(4):388-413.
Getoor L, Friedman N, Koller D, Taskar B. Learning probabilistic models of relational structure. MACHINE LEARNING-INTERNATIONAL WORKSHOP. 2001:170-177.
Getoor L. Learning probabilistic relational models. Abstraction, Reformulation, and Approximation. 2000:322-323.
Friedman N, Getoor L, Koller D, Pfeffer A. Learning probabilistic relational models. International Joint Conference on Artificial Intelligence. 1999;16:1300-1309.
Gruser JR, Raschid L, Zadorozhny V, Zhan T. Learning response time for websources using query feedback and application in query optimization. The VLDB Journal—The International Journal on Very Large Data Bases. 2000;9(1):18-37.
Getoor L. Learning Structure From Statistical Models. IEEE Data Engineering Bulletin. 2003;26(3):11-18.
Getoor L, Friedman N, Koller D. Learning structured statistical models from relational data. Linköping Electronic Articles in Computer and Information Science. 2002;7:13.
Sato T, Kameya Y, De Raedt L, Dietterich T, Getoor L, Muggleton SH. Learning through failure. Probabilistic, Logical and Relational Learning-Towards a Synthesis. 2006;(05051).
Ahmed Syed N, Feamster N, Gray A. Learning To Predict Bad Behavior. NIPS 2007 Workshop on Machine Learning in Adversarial Environments for Computer Security. 2008.
Mihalkova L, Moustafa W, Getoor L. Learning to predict web collaborations. Workshop on User Modeling for Web Applications (UMWA-11). 2011.
Smith M, desJardins M. Learning to trust in the competence and commitment of agents. Autonomous Agents and Multi-Agent Systems. 2009;18(1):36-82.
Elman H, Howle VE, Shadid J, Silvester D, Tuminaro R. Least squares preconditioners for stabilized discretizations of the Navier-Stokes equations. SIAM J. Sci. Comput. 2007;30(1):290-311.
Murray GC, Dorr BJ, Jimmy Lin, Hajič J, Pecina P. Leveraging recurrent phrase structure in large-scale ontology translation. Proceedings of the 11th Annual Conference of the European Association for Machine Translation. 2006.
Voss CR, Dorr BJ, Sencan MU. Lexical allocation in interlingua-based machine translation of spatial expressions. Working Notes for IJCAI-95 Workshop on the Representation and Processing of Spatial Expressions, Montreal, Canada. 1995.
Rose A, Ellis J, Plaisant C, Greene S. Life cycle of user interface techniques: The DJJ information system design Process. Technical Reports of the Computer Science Department. 1998.
Plaisant C, Mushlin R, Snyder A, Li J, Heller D, Shneiderman B. LifeLines: using visualization to enhance navigation and analysis of patient records. In Proceedings of the 1998 American Medical Informatic Association Annual Fall SymposiumProc AMIA Symp. 1998:76-80.
Plaisant C, Mushlin R, Snyder A, Li J, Heller D, Shneiderman B. LifeLines: using visualization to enhance navigation and analysis of patient records. Proceedings of the AMIA Symposium. 1998:76-80.
Bafna V, Hannenhalli S, Rice K, Vawter L. Ligand-Receptor Pairing Via Tree Comparison. Journal of Computational Biology. 2000;7(1-2):59-70.
Etherington DW, Kraus S, Perlis D. Limited scope and circumscriptive reasoning. International Journal of Expert Systems. 1990;3(3):207-217.
Groce A, Katz J, Yerukhimovich A. Limits of computational differential privacy in the client/server setting. Theory of Cryptography. 2011:417-431.
Brakerski Z, Katz J, Segev G, Yerukhimovich A. Limits on the power of zero-knowledge proofs in cryptographic constructions. Theory of Cryptography. 2011:559-578.
Zhou X, Garcia-Romero D, Duraiswami R, Espy-Wilson C, Shamma S. Linear versus Mel Frequency Cepstral Coefficients for Speaker Recognition. IEEE Automatic Speech Recognition and Understanding Workshop. 2011.
Getoor L, Licamele L. Link Mining for the Semantic Web, Position Statement. Proceedings of the Dagstuhl Seminar in Machine Learning for the Semantic Web. 2005.
Getoor L. Link mining: a new data mining challenge. ACM SIGKDD Explorations Newsletter. 2003;5(1):84-89.
Getoor L, Diehl CP. Link mining: a survey. ACM SIGKDD Explorations Newsletter. 2005;7(2):3-12.
Bilgic M, Getoor L. Link-based active learning. NIPS Workshop on Analyzing Networks and Learning with Graphs. 2009.
Getoor L. Link-based classification. Advanced methods for knowledge discovery from complex data. 2005:189-207.
Basili VR, Lindvall M, Regardie M, Seaman C, Heidrich J, Munch J, et al. Linking Software Development and Business Strategy Through Measurement. Computer. 2010;43(4):57-65.
JaJa JF, Ryu K. Load balancing and routing on the hypercube and related networks. Journal of Parallel and Distributed Computing. 1992;14(4):431-435.
Srinivasan A. Local Balancing Influences Global Structure in Social Networks. Proceedings of the National Academy of SciencesPNAS. 2011;108(5):1751-1752.
Du X, Smolka SA, Cleaveland R. Local model checking and protocol analysis. International Journal on Software Tools for Technology Transfer (STTT). 1999;2(3):219-241.

Pages