John F. Canny
Affiliations: | Electrical Engineering and Computer Science | University of California, Berkeley, Berkeley, CA, United States |
Area:
Human-Computer Interaction (HCI); Artificial Intelligence (AI); Control, Intelligent Systems, and Robotics (CIR); Graphics (GR); Security (SEC)Google:
"John Canny"Cross-listing: Robotree
Children
Sign in to add trainee
BETA: Related publications
See more...
Publications
You can help our author matching system! If you notice any publications incorrectly attributed to this author, please sign in and mark matches as correct or incorrect. |
Figueroa CA, Luo TC, Jacobo A, et al. (2021) Conversational Physical Activity Coaches for Spanish and English Speaking Women: A User Design Study. Frontiers in Digital Health. 3: 747153 |
Chan DM, Rao R, Huang F, et al. (2019) GPU accelerated t-distributed stochastic neighbor embedding Journal of Parallel and Distributed Computing. 131: 1-13 |
Sapp S, van der Laan MJ, Canny J. (2014) Subsemble: an ensemble method for combining subset-specific algorithm fits. Journal of Applied Statistics. 41: 1247-1259 |
Tewari A, Canny J. (2014) What did spot hide? A question-answering game for preschool children Conference On Human Factors in Computing Systems - Proceedings. 1807-1816 |
Mascolo C, Paulos E, Canny J. (2014) Pervasive analytics and citizen science [Guest editors' introduction] Ieee Pervasive Computing. 13: 18-19 |
Tewari A, Brown T, Canny J. (2013) A question-answering agent using speech driven non-linear machinima Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8108: 129-138 |
Duan Y, Canny J. (2013) Practical distributed privacy-preserving data analysis at large scale Large-Scale Data Analytics. 219-252 |
Chang KH, Chan MK, Canny J. (2011) AnalyzeThis: Unobtrusive mental health monitoring by voice Conference On Human Factors in Computing Systems - Proceedings. 1951-1956 |
Chen Y, Canny JF, Pavlov D. (2010) Behavioral targeting: The art of scaling up simple algorithms Acm Transactions On Knowledge Discovery From Data. 4 |
Duan Y, Canny J. (2009) How to deal with malicious users in privacy-preserving distributed data mining Statistical Analysis and Data Mining. 2: 18-33 |