Publications

Export 7151 results:
Author Title [ Type(Asc)] Year
Filters: Block-preconditioners-discrete-incompressible-navier%E2%80%93stokes-equations is   [Clear All Filters]
Journal Articles
Godfrey P, Gryz J, Minker J.  1996.  Semantic query optimization for bottom-up evaluation. Foundations of Intelligent Systems. :561-571.
Mitamura T, Miller K, Dorr BJ, Farwell D, Habash N, Helmreich S, Hovy E, Levin L, Rambow O, Reeder F et al..  2004.  Semantic Annotation for Interlingual Representation of Multilingual Texts. Workshop Programme. :19-19.
Dorr BJ, Green R, Levin L, Rambow O, Farwell D, Habash N, Helmreich S, Hovy E, Miller KJ, Mitamura T et al..  2004.  Semantic annotation and lexico-syntactic paraphrase. Proceedings of the 4th International Conference on Language Resources and Evaluation (LREC) Workshop on Building Lexical Resources from Semantically Annotated Corpora. :47-52.
Basili VR, Zelkowitz MV, McGarry F, Page J, Waligora S, Pajerski R.  1995.  SEL's software process improvement program. Software, IEEE. 12(6):83-87.
Reggia JA, Lohn JD, Chou HH.  1998.  Self-replicating structures: evolution, emergence, and computation. Artificial Life. 4(3):283-302.
Reggia JA, Sutton III GG.  1988.  Self-processing networks and their biomedical implications. Proceedings of the IEEE. 76(6):680-692.
Anderson ML, Fults S, Josyula DP, Oates T, Perlis D, Wilson S, Wright D.  2008.  A self-help guide for autonomous systems. AI Magazine. 29(2):67-67.
Roussopoulos N, Mark L.  1985.  SELF-DESCRIBING AND SELF-DOCUMENTING DATABASE SYSTEMS. Languages for automation. :275-275.
Brodskỳ T, Fermüller C.  2004.  Self-Calibration from Image Derivatives. International Journal of Computer Vision. 48(2):91-114.
Martin CE, Reggia JA.  2010.  Self-assembly of neural networks viewed as swarm intelligence. Swarm Intelligence. 4(1):1-36.
Getoor L, Taskar B, Koller D.  2001.  Selectivity estimation using probabilistic models. ACM SIGMOD Record. 30(2):461-472.
Cignoni P, De Floriani L, Magillo P, Puppo E, Scopigno R.  2004.  Selective refinement queries for volume visualization of unstructured tetrahedral meshes. Visualization and Computer Graphics, IEEE Transactions on. 10(1):29-45.
Chatterjee S, Bhattacharyya SS.  2010.  Selective excitation of LI2 by chirped laser pulses with all possible interstate radiative couplings. The Journal of Chemical Physics. 133(16):164313-164313-9.
Resnik P.  1996.  Selectional constraints: an information-theoretic model and its computational realization. Cognition. 61(1-2):127-159.
Berry C, Hannenhalli S, Leipzig J, Bushman FD.  2006.  Selection of Target Sites for Mobile DNA Integration in the Human Genome. PLoS Comput BiolPLoS Comput Biol. 2(11):e157-e157.
Ostroff D, Shneiderman B.  1988.  Selection devices for user of an electronic encyclopedia: An empirical comparison of four possibilities. Information Processing & Management. 24(6):665-680.
Chalfoun J, Kociolek M, Dima A, Halter M, Cardone A, Peskin A, Bajcsy P, Brady M.  2013.  Segmenting time-lapse phase contrast images of adjacent NIH 3T3 cells.. Journal of microscopy. 249(1):41-52.
Yacoob Y, Davis LS.  2009.  Segmentation using appearance of mesostructure roughness. International journal of computer vision. 83(3):248-273.
Yacoob Y, Davis LS.  2006.  Segmentation of planar objects and their shadows in motion sequences. International journal of computer vision. 67(1):53-69.
Roussopoulos N, Yeh RT.  1985.  SEES—A Software testing Environment Support System. IEEE Transactions on Software Engineering. SE-11(4):355-366.
Aloimonos Y, Fermüller C, Rosenfeld A.  1995.  Seeing and understanding: representing the visual world. ACM Comput. Surv.. 27(3):307-309.
Jiwnani K, Zelkowitz MV.  2002.  Security Testing using a Susceptibility Matrix. International Symposioum on Software Reliability Engineering. 13
Mishra A, Petroni Jr NL, Arbaugh WA, Fraser T.  2004.  Security issues in IEEE 802.11 wireless local area networks: a survey. Wireless Communications and Mobile Computing. 4(8):821-833.
Arbaugh WA, Davin JR, Farber DJ, Smith JM.  1998.  Security for virtual private intranets. Computer. 31(9):48-55.
Lu W, Varna AL, Wu M.  2010.  Security analysis for privacy preserving search of multimedia. Image Processing (ICIP). :26-29.

Pages