default search action
Michael E. Lesk
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [i6]Siddartha Dalal, Sierra Vo, Michael Lesk, Wesley Yuan:
Finding Emotions in Faces: A Meta-Classifier. CoRR abs/2208.09678 (2022)
2010 – 2019
- 2019
- [c32]Michael Lesk, Janice Bially Mattern, Heather Moulaison Sandy:
Are Papers with Open Data More Credible? An Analysis of Open Data Availability in Retracted PLoS Articles. iConference 2019: 154-161 - 2016
- [c31]Janet Lazar, Michael Lesk:
The Trumpet Shall Sound: De-anonymising jazz recordings. EVA 2016 - [c30]Soo-yeon Hwang, Melissa H. Cragin, Michael Lesk, Yu-Hung Lin, Daniel O'Connor:
Issues of Dealing with Fluid Data in Digital Libraries. JCDL 2016: 279-280 - [r1]Michael Lesk:
The Convergence of Curation. Handbook of Science and Technology Convergence 2016: 95-112 - 2015
- [j72]Michael Lesk:
Safety Risks-Human Error or Mechanical Failure?: Lessons from Railways. IEEE Secur. Priv. 13(2): 99-102 (2015) - [j71]Michael Lesk:
Ideas Ahead of Their Time: Digital Time Stamping. IEEE Secur. Priv. 13(4): 76-79 (2015) - [j70]Michael Lesk:
License Creep. IEEE Secur. Priv. 13(6): 85-88 (2015) - [j69]Michael Lesk:
The new knowledge infrastructure. Int. J. Digit. Libr. 16(1): 3-4 (2015) - [j68]Michael Lesk:
Library science: The word on our archival future. Nat. 520(7548): 435 (2015) - [j67]Michael Lesk:
How many scientific papers are not original? Proc. Natl. Acad. Sci. USA 112(1): 6-7 (2015) - [c29]Shahé Navasart Sanentz, Michael Lesk:
Toward a semantic stability index (SSI) via a preliminary exploration of translation looping. ASIST 2015: 1-4 - 2014
- [j66]Michael Lesk:
Caller ID: Whose Privacy? IEEE Secur. Priv. 12(2): 77-79 (2014) - [j65]Michael Lesk:
Does the Cloud of Surveillance Have a Silver Lining? IEEE Secur. Priv. 12(3): 78-81 (2014) - [j64]Michael Lesk:
Staffing for Security: Don't Optimize. IEEE Secur. Priv. 12(4): 71-73 (2014) - [j63]Michael Lesk:
Trust, but Verify. IEEE Secur. Priv. 12(6): 94-96 (2014) - [c28]Michael Lesk, Annamarie Klose:
Summarising Pictures. EVA 2014 - 2013
- [j62]Michael Lesk:
Privateers in Cyberspace: Aargh! IEEE Secur. Priv. 11(3): 81-84 (2013) - [j61]Michael Lesk:
Big Data, Big Brother, Big Money. IEEE Secur. Priv. 11(4): 85-89 (2013) - [j60]Kelly Caine, Michael Lesk:
Security and Privacy in Health IT. IEEE Secur. Priv. 11(6): 10-11 (2013) - [j59]Michael Lesk:
Electronic Medical Records: Confidentiality, Care, and Epidemiology. IEEE Secur. Priv. 11(6): 19-24 (2013) - [j58]Michael Lesk:
The Old Is New Again. IEEE Secur. Priv. 11(6): 77-79 (2013) - [p1]Michael Lesk:
From Descriptions to Duplicates to Data. Electronic Visualisation in Arts and Culture 2013: 9-23 - 2012
- [j57]Michael Lesk:
Your Memory Is Now a Vendor Service. IEEE Secur. Priv. 10(1): 88-90 (2012) - [j56]Michael Lesk:
The Clouds Roll By. IEEE Secur. Priv. 10(3): 84-87 (2012) - [j55]Michael Lesk:
Georgia on My Mind. IEEE Secur. Priv. 10(4): 88-90 (2012) - [j54]Michael Lesk:
The Price of Privacy. IEEE Secur. Priv. 10(5): 79-81 (2012) - [j53]Michael Lesk:
A Personal History of Digital Libraries. Libr. Hi Tech 30(4): 592-603 (2012) - [j52]Carl E. Landwehr, Dan Boneh, John C. Mitchell, Steven M. Bellovin, Susan Landau, Michael E. Lesk:
Privacy and Cybersecurity: The Next 100 Years. Proc. IEEE 100(Centennial-Issue): 1659-1673 (2012) - 2011
- [j51]Michael Lesk:
What Is Information Worth? IEEE Secur. Priv. 9(1): 88-90 (2011) - [j50]Michael Lesk:
Salmon, Songs, and Blankets: Creativity on the Northwest Coast. IEEE Secur. Priv. 9(3): 78-81 (2011) - [j49]Michael Lesk:
Reading: From Paper to Pixels. IEEE Secur. Priv. 9(4): 76-79 (2011) - [j48]Michael Lesk:
Cybersecurity and Economics. IEEE Secur. Priv. 9(6): 76-79 (2011) - [j47]Judith Gelernter, Michael Lesk:
Use of Ontologies for Data Integration and Curation. Int. J. Digit. Curation 6(1): 70-78 (2011) - 2010
- [j46]Michael Lesk:
Son of Carterfone: Network Neutrality or Regulation? IEEE Secur. Priv. 8(3): 77-82 (2010) - [j45]Michael Lesk:
Do the Luddites Ever Win? IEEE Secur. Priv. 8(5): 79-82 (2010) - [c27]Arden Kirkland, Michael Lesk, Allison Steffmann:
Context for costumes: faceted access to historic costumes. EVA 2010
2000 – 2009
- 2009
- [j44]Michael Lesk:
Reading Over Your Shoulder. IEEE Secur. Priv. 7(3): 78-81 (2009) - [j43]Michael Lesk:
Incentives to Innovate: Improve the Past or Break with It? IEEE Secur. Priv. 7(5): 78-81 (2009) - [c26]Judith Gelernter, Michael E. Lesk:
Text mining for indexing. JCDL 2009: 467-468 - [e1]Cecilia S. Gal, Paul B. Kantor, Michael E. Lesk:
Protecting Persons While Protecting the People, Second Annual Workshop on Information Privacy and National Security, ISIPS 2008, New Brunswick, NJ, USA, May 12, 2008. Revised Selected Papers. Lecture Notes in Computer Science 5661, Springer 2009, ISBN 978-3-642-10232-5 [contents] - 2008
- [j42]Michael E. Lesk:
Forum Shopping on the Internet. IEEE Secur. Priv. 6(1): 78-80 (2008) - [j41]Michael E. Lesk:
Digital Rights Management and Individualized Pricing. IEEE Secur. Priv. 6(3): 76-79 (2008) - [j40]Michael Lesk:
Recycling Information: Science Through Data Mining. Int. J. Digit. Curation 3(1): 154-157 (2008) - [c25]Aleksandra Sarcevic, Michael E. Lesk, Ivan Marsic, Randall S. Burd:
Quantifying adaptation parameters for information support of trauma teams. CHI Extended Abstracts 2008: 3303-3308 - [c24]Judith Gelernter, Michael E. Lesk:
Traditional resources help interpret texts. BooksOnline 2008: 17-20 - [c23]Aleksandra Sarcevic, Ivan Marsic, Michael E. Lesk, Randall S. Burd:
Transactive memory in trauma resuscitation. CSCW 2008: 215-224 - [c22]Paul B. Kantor, Michael E. Lesk:
The Challenges of Seeking Security While Respecting Privacy. ISIPS 2008: 1-10 - [c21]Judith Gelernter, Michael Lesk:
Creating a searchable map library via data mining. JCDL 2008: 452 - 2007
- [j39]Michael Lesk:
South Korea's Way to the Future. IEEE Secur. Priv. 5(2): 85-87 (2007) - [j38]Michael Lesk:
The New Front Line: Estonia under Cyberassault. IEEE Secur. Priv. 5(4): 76-79 (2007) - [c20]Michael E. Lesk:
Managing 3D: our next problem. Multimedia Information Retrieval 2007: 1 - [c19]Jia Li, Shih-Fu Chang, Michael Lesk, Rainer Lienhart, Jiebo Luo, Arnold W. M. Smeulders:
New challenges in multimedia research for the increasingly connected and fast growing digital society. Multimedia Information Retrieval 2007: 3-10 - 2006
- [j37]Michael E. Lesk:
Should Indexing Be Fair Use? The Battle over Google Book Search. IEEE Secur. Priv. 4(2): 80-83 (2006) - 2005
- [j36]Serge Abiteboul, Rakesh Agrawal, Philip A. Bernstein, Michael J. Carey, Stefano Ceri, W. Bruce Croft, David J. DeWitt, Michael J. Franklin, Hector Garcia-Molina, Dieter Gawlick, Jim Gray, Laura M. Haas, Alon Y. Halevy, Joseph M. Hellerstein, Yannis E. Ioannidis, Martin L. Kersten, Michael J. Pazzani, Michael Lesk, David Maier, Jeffrey F. Naughton, Hans-Jörg Schek, Timos K. Sellis, Avi Silberschatz, Michael Stonebraker, Richard T. Snodgrass, Jeffrey D. Ullman, Gerhard Weikum, Jennifer Widom, Stanley B. Zdonik:
The Lowell database research self-assessment. Commun. ACM 48(5): 111-118 (2005) - [j35]Michael E. Lesk:
Salute the Broadcast Flag. IEEE Secur. Priv. 3(3): 84-87 (2005) - 2004
- [j34]Michael Lesk:
Micropayments: An Idea Whose Time Has Passed Twice? IEEE Secur. Priv. 2(1): 61-63 (2004) - [j33]Michael Lesk:
Shedding Light on Creativity: The History of Photography. IEEE Secur. Priv. 2(2): 62-64 (2004) - [j32]Michael Lesk:
Copyright and Creativity. IEEE Secur. Priv. 2(3): 76-78 (2004) - [j31]Michael Lesk:
Bigger Share of a Smaller Pie. IEEE Secur. Priv. 2(4): 62-64 (2004) - 2003
- [j30]Michael Lesk:
The mindset of dependability. Commun. ACM 46(1): 136 (2003) - [j29]Michael Lesk:
Copyright Extension: Eldred v. Ashcroft. IEEE Secur. Priv. 1(1): 76-78 (2003) - [j28]Michael Lesk:
Copyright Enforcement or Censorship: New Uses for the DMCA? IEEE Secur. Priv. 1(2): 67-69 (2003) - [j27]Michael Lesk:
The Good, the Bad, and the Ugly: What Might Change if We Had Good DRM. IEEE Secur. Priv. 1(3): 63-66 (2003) - [j26]Michael Lesk:
Making the Copyright Law Work. IEEE Secur. Priv. 1(4): 73-74 (2003) - [j25]Michael Lesk:
Chicken Little and the Recorded Music Crisis. IEEE Secur. Priv. 1(5): 73-75 (2003) - [j24]Michael Lesk:
Feist and Facts: If Data Is Protected, Will It Be More or Less Available? IEEE Secur. Priv. 1(6): 68-70 (2003) - [i5]Serge Abiteboul, Rakesh Agrawal, Philip A. Bernstein, Michael J. Carey, Stefano Ceri, W. Bruce Croft, David J. DeWitt, Michael J. Franklin, Hector Garcia-Molina, Dieter Gawlick, Jim Gray, Laura M. Haas, Alon Y. Halevy, Joseph M. Hellerstein, Yannis E. Ioannidis, Martin L. Kersten, Michael J. Pazzani, Michael Lesk, David Maier, Jeffrey F. Naughton, Hans-Jörg Schek, Timos K. Sellis, Avi Silberschatz, Michael Stonebraker, Richard T. Snodgrass, Jeffrey D. Ullman, Gerhard Weikum, Jennifer Widom, Stanley B. Zdonik:
The Lowell Database Research Self Assessment. CoRR cs.DB/0310006 (2003) - 2000
- [c18]Michael Lesk, Katsuo Ikeda:
Opening Remarks. Kyoto International Conference on Digital Libraries 2000: 1 - [c17]Michael Lesk:
US Digital Library Research - Broadening our Reach. Kyoto International Conference on Digital Libraries 2000: 2-17
1990 – 1999
- 1999
- [j23]Michael Lesk:
Perspectives on DLI-2 - Growing the Field. D Lib Mag. 5(7/8) (1999) - [i4]Michael Lesk:
Review - Visualization of Retrieved Documents using a Presentation Server. ACM SIGMOD Digit. Rev. 1 (1999) - [i3]Michael Lesk:
Review - Use and usability in a digital library search system. ACM SIGMOD Digit. Rev. 1 (1999) - [i2]Michael Lesk:
Review - Digital Library Technology for Locating and Accessing Scientific Data. ACM SIGMOD Digit. Rev. 1 (1999) - 1998
- [j22]Michael Lesk:
Real World Searching Panel at SIGIR 97. SIGIR Forum 32(1): 1-4 (1998) - [j21]Philip A. Bernstein, Michael L. Brodie, Stefano Ceri, David J. DeWitt, Michael J. Franklin, Hector Garcia-Molina, Jim Gray, Gerald Held, Joseph M. Hellerstein, H. V. Jagadish, Michael Lesk, David Maier, Jeffrey F. Naughton, Hamid Pirahesh, Michael Stonebraker, Jeffrey D. Ullman:
The Asilomar Report on Database Research. SIGMOD Rec. 27(4): 74-80 (1998) - [i1]Philip A. Bernstein, Michael L. Brodie, Stefano Ceri, David J. DeWitt, Michael J. Franklin, Hector Garcia-Molina, Jim Gray, Gerald Held, Joseph M. Hellerstein, H. V. Jagadish, Michael Lesk, David Maier, Jeffrey F. Naughton, Hamid Pirahesh, Michael Stonebraker, Jeffrey D. Ullman:
The Asilomar Report on Database Research. CoRR cs.DB/9811013 (1998) - 1997
- [b1]Michael Lesk:
Practical Digital Libraries: Books, Bytes, and Bucks. Morgan Kaufmann 1997, ISBN 1-55860-459-6 - [j20]Michael Lesk:
The SMART Lab Report: The Harvard Years (1961-1968). SIGIR Forum 31(1): 2-6 (1997) - [j19]Richard Entlich, Lorrin Garson, Michael Lesk, Lorraine Normore, Jan Olsen, Stuart Weibel:
Making a Digital Library: The Contents of the CORE Project. ACM Trans. Inf. Syst. 15(2): 103-123 (1997) - [c16]Michael Lesk, Douglas R. Cutting, Jan O. Pedersen, Terry Noreault, Matthew B. Koll:
Real Life Information Retrieval: Commercial Search Engines (Panel). SIGIR 1997: 333 - 1996
- [j18]Carolyn J. Crouch, Michael McGill, Michael Lesk, Karen Sparck Jones, Edward A. Fox, Donna Harman, Donald H. Kraft:
Gerald Salton, March 8, 1927 - August 28, 1995. J. Am. Soc. Inf. Sci. 47(2): 108-115 (1996) - [j17]Michael Lesk:
The Future of Software, edited by Derek Leebaert. J. Am. Soc. Inf. Sci. 47(4): 326-327 (1996) - [c15]Michael Lesk:
Digital Libraries Meet Electronic Commerce: On-Screen Intellectual Property. ADL 1996: 58-64 - 1995
- [j16]Richard Entlich, Lorrin Garson, Michael Lesk, Lorraine Normore, Jan Olsen, Stuart Weibel:
Making a Digital Library: The Chemistry Online Retrieval Experiment. Commun. ACM 38(4): 54 (1995) - 1994
- [c14]Michael Lesk:
Which Way to the Future? The Control of Scholary Publication. DL 1994: 33-49 - [c13]Michael Lesk:
Experiments on Access to Digital Libraries: How can Images and Text be Used Together. VLDB 1994: 655-667 - 1991
- [j15]Michael Lesk:
SIGIR '91: The Move Things Change, the More They Stay The Same. SIGIR Forum 25(2): 4-7 (1991) - [c12]Pamela Samuelson, Anthony L. Clapes, Michael Jacobs, Michael Lesk, Bruce Warren:
Legal debate on the copyright look and feel lawsuits: the sequel. CHI 1991: 397-398 - [c11]Dennis E. Egan, Michael Lesk, R. Daniel Ketchum, Carol C. Lochbaum, Joel R. Remde, Michael L. Littman, Thomas K. Landauer:
Hypertext for the Electronic Library? CORE Sample Results. Hypertext 1991: 299-312 - [c10]Michael Lesk:
The CORE Electronic Chemistry Library. SIGIR 1991: 93-112 - 1990
- [c9]Dick Phillips, Michael Lesk, Michael Hawley, Andries van Dam, Richard J. Beach:
Digital publication: status, opportunities and problems (panel session). SIGGRAPH (Panels) 1990: 1601-1622
1980 – 1989
- 1989
- [j14]Michael Lesk:
Text processing and document manipulation: Proceedings of the international conference, Nottingham, April 1986. JASIS 40(2): 137-139 (1989) - [c8]Michael Lesk:
What To Do When There's Too Much Information. Hypertext 1989: 305-318 - 1988
- [j13]Michael Lesk:
Can Unix Survive Secret Source Code? Comput. Syst. 1(2): 189-199 (1988) - [j12]Michael Lesk:
GRAB - Inverted Indexes with Low Storage Overhead. Comput. Syst. 1(3): 207-220 (1988) - [c7]Christine L. Borgman, Nicholas J. Belkin, W. Bruce Croft, Michael E. Lesk, Thomas K. Landauer:
Retrieval systems for the information seeker: can the role of the intermediary be automated? CHI 1988: 51-53 - 1986
- [j11]Michael Lesk:
Writing to be Searched: A Workshop on Document Generation Principles. SIGIR Forum 19(1-4): 9-14 (1986) - [j10]Michael Lesk:
Information in Data: Using the Oxford English Dictionary on a Computer. SIGIR Forum 20(1-4): 18-21 (1986) - [c6]Michael Lesk:
Automatic sense disambiguation using machine readable dictionaries: how to tell a pine cone from an ice cream cone. SIGDOC 1986: 24-26 - 1985
- [j9]Michael Lesk:
Report on the BCS/IR - SIGIR Meeting. SIGIR Forum 18(2-4): 3-4 (1985) - [j8]Michael Lesk:
SIGIR 1985. SIGIR Forum 18(2-4): 10-15 (1985) - [c5]Michael Lesk:
Graphical Information Resources: Maps and Beyond. SIGIR 1985: 2-8 - 1984
- [j7]Michael Lesk:
Chairman's Message. SIGIR Forum 18(1): 1-2 (1984) - 1983
- [c4]V. J. Geller, Michael Lesk:
User Interfaces to Information Systems: Choices vs. Commands. SIGIR 1983: 130-135 - 1982
- [j6]D. A. Nowitz, Michael E. Lesk:
Implementation of a Unix network. Comput. Commun. 5(1): 30-34 (1982) - [j5]Michael Lesk:
English for Decision Tables Considered Harmful. ACM SIGPLAN Notices 17(7): 88 (1982) - [c3]R. J. Elliott, Michael Lesk:
Route Finding in Street Maps by Computers and People. AAAI 1982: 258-261
1970 – 1979
- 1977
- [c2]Michael E. Lesk, Brian W. Kernighan:
Computer typesetting of technical journals on UNIX. AFIPS National Computer Conference 1977: 879-888
1960 – 1969
- 1969
- [c1]Michael E. Lesk, Gerard Salton:
Interactive search and retrieval methods using automatic information displays. AFIPS Spring Joint Computing Conference 1969: 435-446 - 1968
- [j4]Michael Lesk:
Performance of automatic information systems. Inf. Storage Retr. 4(2): 201-218 (1968) - [j3]Michael E. Lesk, Gerard Salton:
Relevance assessments and retrieval system evaluation. Inf. Storage Retr. 4(4): 343-359 (1968) - [j2]Gerard Salton, Michael Lesk:
Computer Evaluation of Indexing and Text Processing. J. ACM 15(1): 8-36 (1968) - 1965
- [j1]Gerard Salton, Michael E. Lesk:
The SMART automatic document retrieval systems - an illustration. Commun. ACM 8(6): 391-398 (1965)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-04 20:16 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint