Jeffrey

Results: 8213



#Item
261

Voyager: Exploratory Analysis via Faceted Browsing of Visualization Recommendations Kanit Wongsuphasawat, Dominik Moritz, Anushka Anand, Jock Mackinlay, Bill Howe, and Jeffrey Heer Fig. 1. Voyager: a recommendation-power

Add to Reading List

Source URL: www.cs.tufts.edu

- Date: 2016-02-02 07:52:48
    262

    Mining Web Interactions to Automatically Create Mash-Ups Jeffrey P. Bigham Dept. of Computer Science University of Rochester Rochester, NYUSA

    Add to Reading List

    Source URL: webinsight.cs.washington.edu

    - Date: 2009-08-18 15:11:14
      263

      Jeffrey S. Vitter Curriculum Vitæ October.

      Add to Reading List

      Source URL: chancellor3.wp2.olemiss.edu

      - Date: 2016-11-23 10:31:44
        264

        Integrity Constraints for Linked Data Alan Jeffrey and Peter F. Patel–Schneider Alcatel–Lucent Bell Labs Abstract. Linked Data makes one central addition to the Semantic Web principles: all entity URIs should be dere

        Add to Reading List

        Source URL: ceur-ws.org

        - Date: 2011-06-26 10:22:51
          265

          Jeffrey O. Nelson Worth the Wait Edmund Burke: Volume 1, by F. P. Lock. Oxford: Clarendon Press, 1998.

          Add to Reading List

          Source URL: www.mmisi.org

          - Date: 2005-03-16 01:51:12
            266

            The Santa Barbara Oil Spill: A Retrospective Keith C. Clarke, Professor and Chair Jeffrey J. Hemphill, Graduate Student Department of Geography University of California, Santa Barbara Santa Barbara

            Add to Reading List

            Source URL: www.geog.ucsb.edu

            - Date: 2002-05-28 16:37:18
              267

              Jeffrey B. Allen Research Mechanical Engineer US Army Corps of Engineers, Engineer Research & Development Center, Information Technology Laboratory, 3909 Halls Ferry Road, Vicksburg, MS 39180

              Add to Reading List

              Source URL: mae.usu.edu

              - Date: 2016-08-17 16:11:26
                268

                To Make a Robot Secure: An Experimental Analysis of Cyber Security Threats Against Teleoperated Surgical Robotics∗ Tamara Bonaci† , Jeffrey Herron † , Tariq Yusuf‡ , Junjie Yan† , Tadayoshi Kohno‡ , Howard Ja

                Add to Reading List

                Source URL: brl.ee.washington.edu

                - Date: 2015-05-14 18:28:36
                  269

                  Air-Sea Fluxes Over the Gulf Stream Region: Atmospheric Controls and Trends Jeffrey Shaman, R. M. Samelson, Eric Skyllingstad College of Oceanic and Atmospheric Sciences, Oregon State University 1

                  Add to Reading List

                  Source URL: www-po.coas.oregonstate.edu

                  - Date: 2013-02-14 16:00:30
                    270

                    Paragogy Joseph Corneli1 and Charles Jeffrey Danoff2 1 Knowledge Media Institute, The Open University, Milton Keynes, UK, ,

                    Add to Reading List

                    Source URL: ceur-ws.org

                    - Date: 2011-06-22 11:00:38
                      UPDATE