Publications

Export 7151 results:
Author [ Title(Asc)] Type Year
Filters: Believe-me%E2%80%94we-can-do-annotating-persuasive-acts-blog-text is   [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
D
Sahinalp SC, Vishkin U.  1995.  Data compression using locally consistent parsing. TechnicM report, University of Maryland Department of Computer Science.
Zelkowitz MV.  1984.  Data collection and evaluation for experimental computer science research. Information Processing & Management. 20(1–2):269-276.
Anthony A, desJardins M.  2007.  Data Clustering with a Relational Push-Pull Model. Data Mining Workshops, 2007. ICDM Workshops 2007. Seventh IEEE International Conference on. :189-194.
Buck BR, Hollingsworth J.  2004.  Data Centric Cache Measurement on the Intel ltanium 2 Processor. Proceedings of the 2004 ACM/IEEE conference on Supercomputing. :58–-58–.
Shneiderman B.  1978.  Data Bases: Improving Usability and Effectiveness.
Doermann D, DeMenthon D.  2000.  Data and Content Based Adaptation for Video Over Low Bandwidth Networks. SPIE- Multimedia and Systems Applicaitons III. :69-78.
Memon AM, Banerjee I, Hashmi N, Nagarajan A.  2003.  DART: a framework for regression testing "nightly/daily builds" of GUI applications. Software Maintenance, 2003. ICSM 2003. Proceedings. International Conference on. :410-419.
Petroni NL, Arbaugh WA.  2003.  The dangers of mitigating security design flaws: a wireless case study. IEEE Security & Privacy. 1(1):28-36.
C
Grossman D, Morrisett G, Jim T, Hicks MW, Wang Y, Cheney J.  2001.  Cyclone User's Manual, Version 0.1. 3. Computer Science Technical Reports.
Grossman D, Hicks MW, Jim T, Morrisett G.  2005.  Cyclone: A type-safe dialect of C. C/C++ Users Journal. 23(1):112-139.
Jim T, Morrisett G, Grossman D, Hicks MW, Cheney J, Wang Y.  2002.  Cyclone: A safe dialect of C. USENIX Annual Technical Conference. :275-288.
Pirolli P, Preece J, Shneiderman B.  2010.  Cyberinfrastructure for Social Action on National Priorities. Computer. 43(11):20-21.
Yao Z, Gupta SK.  2004.  Cutter path generation for 2.5D milling by combining multiple different cutter path patterns. International Journal of Production Research. 42(11):2141-2161.
Zotkin DN, Duraiswami R, Davis LS.  2002.  Customizable auditory displays. Proceedings of the International Conference on Auditory Display. :167-176.
Jimmy Lin.  2009.  The Curse of Zipf and Limits to Parallelization: A Look at the Stragglers Problem in MapReduce. Proceedings of LSDS-IR workshop. :57-62.
Nau DS.  2007.  Current Trends in Automated Planning. AI Magazine. 28(4):43-43.
Gupta SK, Das D, Regli WC, Nau DS.  1995.  Current Trends and Future Challenges in Automated Manufacturability Analysis. ISR; TR 1995-16
Preston ND, Daszak P, Colwell RR.  2013.  Current Topics in Microbiology and Immunology One Health: The Human-Animal-Environment Interfaces in Emerging Infectious Diseases The Human Environment Interface: Applying Ecosystem Concepts to Health. 365:83-100.
Zelkowitz MV, Wallace DR, Binkley D.  1998.  Culture conflicts in software engineering technology transfer. NASA Goddard Software Engineering Workshop. :52-52.
V.S. Subrahmanian.  2007.  Cultural modeling in real time. Science. 317(5844):1509-1509.
Roussopoulos N, Kotidis Y.  1998.  The Cubetree Storage Organization. VLDB. :700-700.
Essien K, Vigneau S, Apreleva S, Singh LN, Bartolomei MS, Hannenhalli S.  2009.  CTCF binding site classes exhibit distinct evolutionary, genomic, epigenomic and transcriptomic features. Genome Biology. 10(11):R131-R131.
El-Sayed NM, Patton CL, Harkins PC, Fox RO, Anderson K.  1995.  Crystallization and preliminary X-ray investigation of the recombinant Trypanosoma brucei rhodesiense calmodulin. Proteins: Structure, Function, and Bioinformatics. 21(4):354-357.
Eddins MJ, Varadan R, Fushman D, Pickart CM, Wolberger C.  2007.  Crystal Structure and Solution NMR Studies of Lys48-linked Tetraubiquitin at Neutral pH. Journal of Molecular Biology. 367(1):204-211.
Katz J, Myers S, Ostrovsky R.  2001.  Cryptographic counters and applications to electronic voting. Advances in Cryptology—Eurocrypt 2001. :78-92.

Pages