Publications

Export 7151 results:
Author Title Type [ Year(Desc)]
Filters: Believe-me%E2%80%94we-can-do-annotating-persuasive-acts-blog-text is   [Clear All Filters]
2009
Liu B, Pop M.  2009.  ARDB-Antibiotic Resistance Genes Database. Nucleic Acids Research. 37(Database):D443-D447-D443-D447.
Nau DS.  2009.  Artificial Intelligence and Automation. Springer Handbook of Automation. :249-268.
Wong EW, Tse TH, Glass RL, Basili VR, Chen TY.  2009.  An assessment of systems and software engineering scholars and institutions (2002–2006). Journal of Systems and Software. 82(8):1370-1373.
El-Alfy H, Jacobs DW, Davis LS.  2009.  Assigning cameras to subjects in video surveillance systems. Robotics and Automation, 2009. ICRA '09. IEEE International Conference on. :837-843.
Albrecht M, Gentry C, Halevi S, Katz J.  2009.  Attacking cryptographic schemes based on "perturbation polynomials". Proceedings of the 16th ACM conference on Computer and communications security. :1-10.
Fleischmann KR, Oard D, Cheng AS, Wang P, Ishita E.  2009.  Automatic classification of human values: Applying computational thinking to information ethics. Proceedings of the American Society for Information Science and Technology. 46(1):1-4.
Sims JJ, Haririnia A, Dickinson BC, Fushman D, Cohen RE.  2009.  Avid interactions underlie the Lys63-linked polyubiquitin binding specificities observed for UBA domains. Nature Structural & Molecular Biology. 16(8):883-889.
Daumé H.  2009.  Bayesian multitask learning with latent hierarchies. Proceedings of the Twenty-Fifth Conference on Uncertainty in Artificial Intelligence. :135-142.
Nikolova S, Boyd-Graber J, Fellbaum C, Cook P.  2009.  Better vocabularies for assistive communication aids: connecting terms using semantic networks and untrained annotators. Proceedings of the 11th international ACM SIGACCESS conference on Computers and accessibility. :171-178.
Jakupciak JP, Colwell RR.  2009.  Biological agent detection technologies. Molecular Ecology Resources. 9(s1):51-57.
Sen P, Deshpande A, Getoor L.  2009.  Bisimulation-based approximate lifted inference. Proceedings of the Twenty-Fifth Conference on Uncertainty in Artificial Intelligence. :496-505.
Katz J, Yerukhimovich A.  2009.  On black-box constructions of predicate encryption from trapdoor permutations. Advances in Cryptology–ASIACRYPT 2009. :197-213.
Powell CE, Elman H.  2009.  Block-diagonal preconditioning for spectral stochastic finite-element systems. IMA Journal of Numerical Analysis. 29(2):350-350.
Caragea GC, Saybasili AB, Wen X, Vishkin U.  2009.  Brief announcement: performance potential of an easy-to-program PRAM-on-chip prototype versus state-of-the-art processor. Proceedings of the twenty-first annual symposium on Parallelism in algorithms and architectures. :163-165.
Gumerov NA, Duraiswami R.  2009.  A broadband fast multipole accelerated boundary element method for the three dimensional Helmholtz equation. The Journal of the Acoustical Society of America. 125(1):191-205.
Jimmy Lin.  2009.  Brute force and indexed approaches to pairwise document similarity comparisons with MapReduce. Proceedings of the 32nd international ACM SIGIR conference on Research and development in information retrieval. :155-162.
Chockler G, Dekel E, JaJa JF, Jimmy Lin.  2009.  Call for Papers: Special Issue of the Journal of Parallel and Distributed Computing: Cloud Computing. J. Parallel Distrib. Comput.. 69(9):813–-813–.
Sliva A, V.S. Subrahmanian, Martinez V, Simari G.  2009.  CAPE: Automatically Predicting Changes in Group Behavior. Mathematical Methods in Counterterrorism. :253-269.
Doppa JR, Yu J, Tadepalli P, Getoor L.  2009.  Chance-constrained programs for link prediction. Proceedings of Workshop on Analyzing Networks and Learning with Graphs at NIPS Conference.
Han B, Ji L, Lee S, Miller RR, Bhattacharjee B.  2009.  Channel Access Throttling for Improving WLAN QoS. Sensor, Mesh and Ad Hoc Communications and Networks, 2009. SECON '09. 6th Annual IEEE Communications Society Conference on. :1-9.
Han B, Ji L, Lee S, Miller RR, Bhattacharjee B.  2009.  Channel Access Throttling for Overlapping BSS Management. Communications, 2009. ICC '09. IEEE International Conference on. :1-6.
Ananthanarayanan A, Gupta SK, Bruck HA.  2009.  Characterization and control of pin diameter during in-mold assembly of mesoscale revolute joints. North American Manufacturing Research Institute. 37
Bin Tariq M, Mansy A, Feamster N, Ammar M.  2009.  Characterizing VLAN-induced sharing in a campus network. Proceedings of the 9th ACM SIGCOMM conference on Internet measurement conference. :116-121.
Shneiderman B.  2009.  Civic Collaboration. ScienceScience. 325(5940):540-540.
Zhuolin Jiang, Li SF, Jia XP, Zhu HL.  2009.  Classic triangular mesh subdivision algorithm. Jisuanji Gongcheng/ Computer Engineering. 35(6):7-10.

Pages