Publications

Export 3364 results:
Author Title Type [ Year(Desc)]
Filters: First Letter Of Last Name is S  [Clear All Filters]
2009
Mohapatra SS, Mantri CK, Mohapatra H, Colwell RR, Singh DV.  2009.  Analysis of clonally related environmental Vibrio cholerae O1 El Tor isolated before 1992 from Varanasi, India reveals origin of SXT‐ICEs belonging to O139 and O1 serogroups. Environmental Microbiology Reports. 2(1):50-57.
Serpico C, d'Aquino M, Bertotti G, Mayergoyz ID.  2009.  Analytical Description of Quasi-Random Magnetization Relaxation to Equilibrium. Magnetics, IEEE Transactions on. 45(11):5224-5227.
Smith MA, Shneiderman B, Milic-Frayling N, Mendes Rodrigues E, Barash V, Dunne C, Capone T, Perer A, Gleave E.  2009.  Analyzing (social media) networks with NodeXL. Proceedings of the fourth international conference on Communities and technologies. :255-264.
Smith MA, Shneiderman B, Milic-Frayling N, Mendes Rodrigues E, Barash V, Dunne C, Capone T, Perer A, Gleave E.  2009.  Analyzing (social media) networks with NodeXL. Proceedings of the fourth international conference on Communities and technologies. :255-264.
Sayeed A, Elsayed T, Garera N, Alexander D, Xu T, Oard D, Yarowsky D, Piatko C.  2009.  Arabic Cross-Document Coreference Resolution. Proceedings of the ACL-IJCNLP 2009 Conference Short Papers$}$. :357-360.
Saha S, Kianzad V, Schlessman J, Aggarwal G, Bhattacharyya SS, Chellappa R, Wolf W.  2009.  An architectural level design methodology for smart camera applications. International Journal of Embedded Systems. 4(1):83-97.
Saha S, Kianzad V, Schlessman J, Aggarwal G, Bhattacharyya SS, Chellappa R, Wolf W.  2009.  An architectural level design methodology for smart camera applications. International Journal of Embedded Systems. 4(1):83-97.
Sims JJ, Haririnia A, Dickinson BC, Fushman D, Cohen RE.  2009.  Avid interactions underlie the Lys63-linked polyubiquitin binding specificities observed for UBA domains. Nature Structural & Molecular Biology. 16(8):883-889.
Sen P, Deshpande A, Getoor L.  2009.  Bisimulation-based approximate lifted inference. Proceedings of the Twenty-Fifth Conference on Uncertainty in Artificial Intelligence. :496-505.
Caragea GC, Saybasili AB, Wen X, Vishkin U.  2009.  Brief announcement: performance potential of an easy-to-program PRAM-on-chip prototype versus state-of-the-art processor. Proceedings of the twenty-first annual symposium on Parallelism in algorithms and architectures. :163-165.
Sliva A, V.S. Subrahmanian, Martinez V, Simari G.  2009.  CAPE: Automatically Predicting Changes in Group Behavior. Mathematical Methods in Counterterrorism. :253-269.
Sliva A, V.S. Subrahmanian, Martinez V, Simari G.  2009.  CAPE: Automatically Predicting Changes in Group Behavior. Mathematical Methods in Counterterrorism. :253-269.
Sliva A, V.S. Subrahmanian, Martinez V, Simari G.  2009.  CAPE: Automatically Predicting Changes in Group Behavior. Mathematical Methods in Counterterrorism. :253-269.
Shneiderman B.  2009.  Civic Collaboration. ScienceScience. 325(5940):540-540.
Conroy JM, Schlesinger JD, O'Leary DP.  2009.  CLASSY 2009: Summarization and Metrics. TAC 2009 Workshop ProceedingsTAC 2009 Workshop Proceedings.
Zheleva E, Sharara H, Getoor L.  2009.  Co-evolution of social and affiliation networks. Proceedings of the 15th ACM SIGKDD international conference on Knowledge discovery and data mining. :1007-1016.
Namata G, Sen P, Bilgic M, Getoor L.  2009.  Collective classification for text classification. Text Mining: Classification, Clustering, and ApplicationsText Mining: Classification, Clustering, and Applications. :51-69.
Alwen J, Katz J, Lindell Y, Persiano G, Shelat A, Visconti I.  2009.  Collusion-free multiparty computation in the mediated model. Advances in Cryptology-CRYPTO 2009. :524-540.
Siddiquie B, Vitaladevuni SN, Davis LS.  2009.  Combining multiple kernels for efficient image classification. Applications of Computer Vision (WACV), 2009 Workshop on. :1-8.
Swaminathan A, M. Wu, Liu KJR.  2009.  Component forensics. Signal Processing Magazine, IEEE. 26(2):38-48.
Dodis Y, Katz J, Smith A, Walfish S.  2009.  Composability and on-line deniability of authentication. Theory of Cryptography. :146-162.
Seydou F, Duraiswami R, Seppänen T, Gumerov NA.  2009.  Computation of singular and hypersingular boundary integrals by Green identity and application to boundary value problems. Engineering Analysis with Boundary Elements. 33(8–9):1124-1131.
Seydou F, Duraiswami R, Seppänen T, Gumerov NA.  2009.  Computation of singular and hypersingular boundary integrals by Green identity and application to boundary value problems. Engineering Analysis with Boundary Elements. 33(8–9):1124-1131.
Klavans JL, Sheffield C, Abels E, Jimmy Lin, Passonneau R, Sidhu T, Soergel D.  2009.  Computational linguistics for metadata building (CLiMB): using text mining for the automatic identification, categorization, and disambiguation of subject terms for image metadata. Multimedia Tools and Applications. 42(1):115-138.
Klavans JL, Sheffield C, Abels E, Jimmy Lin, Passonneau R, Sidhu T, Soergel D.  2009.  Computational linguistics for metadata building (CLiMB): using text mining for the automatic identification, categorization, and disambiguation of subject terms for image metadata. Multimedia Tools and Applications. 42(1):115-138.

Pages