Publications

Export 7151 results:
Author [ Title(Asc)] Type Year
Filters: Block-preconditioners-discrete-incompressible-navier%E2%80%93stokes-equations is   [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
C
Perlis D.  1987.  Circumscribing with sets. Artificial Intelligence. 31(2):201-211.
Vishkin U, Nuzman JF.  2004.  Circuit architecture for reduced-synchrony on-chip interconnect. 10/166,008(6768336)
Hill JH, Schmidt DC, Porter A, Slaby JM.  2008.  CiCUTS: Combining System Execution Modeling Tools with Continuous Integration Environments. Engineering of Computer-Based Systems, IEEE International Conference on the. :66-75.
Moore JT, Hicks MW, Nettles S.  1999.  Chunks in PLAN: Language support for programs as packets. PROCEEDINGS OF THE ANNUAL ALLERTON CONFERENCE ON COMMUNICATION CONTROL AND COMPUTING. 37:PROCEEDINGSOFTHEANNUALALLERTONCONFERENCEONCOMMUNICATIONCONTROLANDCOMPUTING-PROCEEDINGSOFTHEANNUALALLERTONCONFER.
Conroy JM, Kolda TG, O'Leary DP, O'Leary TJ.  2000.  Chromosome Identification Using Hidden Markov Models: Comparison with Neural Networks, Singular Value Decomposition, Principal Components Analysis, and Fisher Discriminant Analysis. Laboratory Investigation. 80(11):1629-1641.
Mount D, Netanyahu NS, Silverman R, Wu AY.  2000.  Chromatic nearest neighbor searching: A query sensitive approach. Computational Geometry. 17(3–4):97-119.
Aloimonos Y, Fermüller C.  2005.  Chromatic Induction and Perspective Distortion. Journal of VisionJ Vis. 5(8):1026-1026.
Dodis Y, Katz J.  2005.  Chosen-ciphertext security of multiple encryption. Theory of Cryptography. :188-209.
Boneh D, Canetti R, Halevi S, Katz J.  2007.  Chosen-ciphertext security from identity-based encryption. SIAM Journal on Computing. 36(5):1301-1328.
Canetti R, Halevi S, Katz J.  2004.  Chosen-ciphertext security from identity-based encryption. Advances in Cryptology-Eurocrypt 2004. :207-222.
Katz J, Schneier B.  2000.  A chosen ciphertext attack against several e-mail encryption protocols. Ninth USENIX Security Symposium.
Colwell RR.  2005.  Cholera: the killer from the deep. The Biochemist.
Sanhueza D, Chevillon C, Colwell RR, Babonneau J, Marion E, Marsollier L, gan çoisé.  2016.  Chitin promotes Mycobacterium ulcerans growth. FEMS Microbiology Ecology. 928565871(6):fiw067.
Keleher PJ, Spring N, Bhattacharjee B.  2007.  Chit-based access control.
Burnett S, Feamster N, Vempala S.  2010.  Chipping away at censorship firewalls with user-generated content. Proc. 19th USENIX Security Symposium, Washington, DC.
Dorr BJ, Levow G-A, Lin D, Thomas S.  2000.  Chinese-English Semantic Resource Construction.
Fails JA, Druin A, Guha ML, Chipman G, Simms S, Churaman W.  2005.  Child's play: a comparison of desktop and physical interactive environments. Proceedings of the 2005 conference on Interaction design and children. :48-55.
Druin A, Foss E, Hutchinson H, Golub E, Hatley L.  2010.  Children's roles using keyword search interfaces at home. Proceedings of the 28th international conference on Human factors in computing systems. :413-422.
Druin A, Weeks A, Massey S, Bederson BB.  2007.  Children's interests and concerns when using the international children's digital library: a four-country case study. Proceedings of the 7th ACM/IEEE-CS joint conference on Digital libraries. :167-176.
Druin A.  2010.  Children as codesigners of new technologies: Valuing the imagination to transform what is possible. New Directions for Youth Development. 2010(128):35-43.
Druin A, Fast C.  2002.  The child as learner, critic, inventor, and technology design partner: An analysis of three years of Swedish student journals. International Journal of Technology and Design Education. 12(3):189-213.
Shneiderman B, Card S, Norman DA, Tremaine M, Waldrop MM.  2002.  CHI@20: fighting our way from marginality to power. CHI '02 extended abstracts on Human factors in computing systems. :688-691.
Khan A, Bartram L, Blevis E, DiSalvo C, Froehlich J, Kurtenbach G.  2011.  CHI 2011 sustainability community invited panel: challenges ahead. 2011 annual conference extended abstracts on Human factors in computing systems. :73-76.
Schmidt JP, Siegel A, Srinivasan A.  1993.  Chernoff-Hoeffding bounds for applications with limited independence. Proceedings of the fourth annual ACM-SIAM Symposium on Discrete algorithms. :331-340.
Shneiderman B.  1974.  The chemistry of control structures. ACM SIGPLAN Notices. 9(12):29-34.

Pages