default search action
Lee Iverson
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2000 – 2009
- 2009
- [c15]Vanesa Mirzaee, Lee Iverson:
Tagging: Behaviour and motivations. ASIST 2009: 1-5 - [c14]Maryam Najafian Razavi, Lee Iverson:
Improving personal privacy in social systems with people-tagging. GROUP 2009: 11-20 - 2008
- [c13]Maryam Najafian Razavi, Lee Iverson:
Supporting selective information sharing with people-tagging. CHI Extended Abstracts 2008: 3423-3428 - [c12]Lee Iverson, Maryam Najafian Razavi, Vanesa Mirzaee:
Personal and Social Information Management with OPNTAG. ICEIS (5) 2008: 195-203 - 2007
- [c11]Vanesa Mirzaee, Lee Iverson, Samia Khan:
Tagging & utility: The effects of social tagging on a collaborative task. ASIST 2007: 1-5 - [c10]David Botta, Rodrigo Werlinger, André Gagné, Konstantin Beznosov, Lee Iverson, Sidney S. Fels, Brian D. Fisher:
Towards understanding IT security professionals and their tools. SOUPS 2007: 100-111 - 2006
- [c9]Nelson Siu, Lee Iverson, Anthony Tang:
Going with the flow: email awareness and task management. CSCW 2006: 441-450 - [c8]Maryam Najafian Razavi, Lee Iverson:
A grounded theory of information sharing behavior in a personal learning space. CSCW 2006: 459-468 - [c7]Xiang Cao, Lee Iverson:
Intentional access management: making access control usable for end-users. SOUPS 2006: 20-31 - 2005
- [c6]Lee Iverson:
Network-Oriented Document Abstraction Language: Structure and Reference for the Rest of the Web. Extreme Markup Languages® 2005 - [c5]Vanesa Mirzaee, Babak Hamidzadeh, Lee Iverson:
Managing change in ontologies. IRI 2005: 253-258 - 2004
- [c4]Lee Iverson:
Collaboration in digital libraries: a conceptual framework. JCDL 2004: 380 - 2002
- [j6]Lee Iverson:
Report on eLibrary@UBC 4: Research, Collaboration and the Digital Library - Visions for 2010. D Lib Mag. 8(12) (2002) - 2000
- [c3]Martin Reddy, Lee Iverson, Yvan G. Leclerc:
Under the hood of GeoVRML 1.0. Web3D 2000: 23-28
1990 – 1999
- 1999
- [j5]Martin Reddy, Yvan G. Leclerc, Lee Iverson, Nat Bletter:
TerraVision II: Visualizing Massive Terrain Databases in VRML. IEEE Computer Graphics and Applications 19(2): 30-38 (1999) - 1997
- [j4]Walter M. Neuenschwander, Pascal Fua, Lee Iverson, Gábor Székely, Olaf Kübler:
Ziplock Snakes. Int. J. Comput. Vis. 25(3): 191-201 (1997) - 1993
- [p1]Steven W. Zucker, Allan Dobbins, Lee Iverson, Benjamin B. Kimia, Allen R. Tannenbaum:
From Curve Detection to Shape Description: an outline. Computer Vision: Systems, Theory and Applications 1993: 25-39 - 1990
- [j3]Steven W. Zucker, Lee Iverson, Robert A. Hummel:
Coherent Compound Motion: Corners and Nonrigid Configurations. Neural Comput. 2(1): 44-57 (1990) - [c2]Steven W. Zucker, Allan Dobbins, Lee Iverson:
On the computational neurobiology of curve detection. BMVC 1990: 1-8
1980 – 1989
- 1989
- [j2]Steven W. Zucker, Allan Dobbins, Lee Iverson:
Two Stages of Curve Detection Suggest Two Styles of Visual Computation. Neural Comput. 1(1): 68-81 (1989) - 1988
- [c1]Steven W. Zucker, Chantal David, Allan Dobbins, Lee Iverson:
The Organization Of Curve Detection: Coarse Tangent Fields And Fine Spline Coverings. ICCV 1988: 568-577 - 1987
- [j1]Steven W. Zucker, Lee Iverson:
From orientation selection to optical flow. Comput. Vis. Graph. Image Process. 37(2): 196-220 (1987)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:16 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint