|
Search the dblp DataBase
Robert Lee:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Shuxin Li, Robert Lee, Sheau-Dong Lang
Detecting outliers in interval data. [Citation Graph (0, 0)][DBLP] ACM Southeast Regional Conference, 2006, pp:290-295 [Conf]
- Katherine Everitt, Scott R. Klemmer, Robert Lee, James A. Landay
Two worlds apart: bridging the gap between physical and virtual media for distributed design collaboration. [Citation Graph (0, 0)][DBLP] CHI, 2003, pp:553-560 [Conf]
- Scott R. Klemmer, Michael Thomsen, Ethan Phelps-Goodman, Robert Lee, James A. Landay
Where do web sites come from?: capturing and interacting with design history. [Citation Graph (0, 0)][DBLP] CHI, 2002, pp:1-8 [Conf]
- Chandrasekhar Boyapati, Robert Lee, Martin C. Rinard
Ownership types for safe programming: preventing data races and deadlocks. [Citation Graph (0, 0)][DBLP] OOPSLA, 2002, pp:211-230 [Conf]
- Edward Council, Robert Lee
Videotape from the 1990 virtual reality conference. [Citation Graph (0, 0)][DBLP] Computers & Graphics, 1992, v:16, n:2, pp:241- [Journal]
- Richard Sharp, Jacob Adams, Raghu Machiraju, Robert Lee, Robert Crane
Physics-Based Subsurface Visualization of Human Tissue. [Citation Graph (0, 0)][DBLP] IEEE Trans. Vis. Comput. Graph., 2007, v:13, n:3, pp:620-629 [Journal]
Media Meets Semantic Web - How the BBC Uses DBpedia and Linked Data to Make Connections. [Citation Graph (, )][DBLP]
Mining Distance-Based Outliers from Categorical Data. [Citation Graph (, )][DBLP]
Locality-Based Server Profiling for Intrusion Detection. [Citation Graph (, )][DBLP]
Locality-based Profile Analysis for Secondary Intrusion Detection. [Citation Graph (, )][DBLP]
Bounds on a graph's security number. [Citation Graph (, )][DBLP]
Search in 0.002secs, Finished in 0.003secs
|