Jeffrey Baumes

According to our database1, Jeffrey Baumes authored at least 15 papers between 2004 and 2021.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2021

2020
Viime: Visualization and Integration of Metabolomics Experiments.
J. Open Source Softw., 2020

2012
Using NoSQL databases for streaming network analysis.
Proceedings of the IEEE Symposium on Large Data Analysis and Visualization, 2012

2009
A unified toolkit for information and scientific visualization.
Proceedings of the Visualization and Data Analysis, 2009

2008
ViSAGE: A <i>Vi</i>rtual Laboratory for <i>S</i>imulation and <i>A</i>nalysis of Social <i>G</i>roup <i>E</i>volution.
ACM Trans. Auton. Adapt. Syst., 2008

G-Space: a linear time graph layout.
Proceedings of the Visualization and Data Analysis 2008, 2008

Integration of information and volume visualization for analysis of cell lineage and gene expression during embryogenesis.
Proceedings of the Visualization and Data Analysis 2008, 2008

2007
SIGHTS: A Software System for Finding Coalitions and Leaders in a Social Network.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2007

Intelligence Analysis Using Titan.
Proceedings of the 2nd IEEE Symposium on Visual Analytics Science and Technology, 2007

2006
Algorithms for discovering hidden groups in communications.
PhD thesis, 2006

A new Gödelian argument for hypercomputing minds based on the busy beaver problem.
Appl. Math. Comput., 2006

Finding Hidden Group Structure in a Stream of Communications.
Proceedings of the Intelligence and Security Informatics, 2006

2005
Efficient Identification of Overlapping Communities.
Proceedings of the Intelligence and Security Informatics, 2005

Finding communities by clustering a graph into overlapping subgraphs.
Proceedings of the AC 2005, 2005

2004
Discovering Hidden Groups in Communication Networks.
Proceedings of the Intelligence and Security Informatics, 2004


  Loading...