Publications
Export 7151 results:
Author [ Title] Type Year Filters: Computational-studies-synaptic-alterations-alzheimer%E2%80%99s-disease is [Clear All Filters]
1998. Two Algorithms for the The Efficient Computation of Truncated Pivoted QR Approximations to a Sparse Matrix. UMIACS-TR-98-12
2009. Two Alternatively Spliced Isoforms of the Arabidopsis SR45 Protein Have Distinct Roles during Normal Plant Development. Plant PhysiologyPlant Physiol.. 150(3):1450-1458.
2011. A Two Degree of Freedom Nanopositioner With Electrothermal Actuator for Decoupled Motion. :447-457.
1993. Two dimensional pattern matching in a digitized image. Combinatorial Pattern Matching. :134-151.
1978. Two experimental comparisons of relational and hierarchical database models. International Journal of Man-Machine Studies. 10(6):625-637.
2003. Two methods for solving a 3D acoustic inverse scattering problem. The Journal of the Acoustical Society of America. 113(4):2191-2191.
1992. Two miniature pan-tilt devices. Robotics and Automation, 1992. Proceedings., 1992 IEEE International Conference on. :658-663.
2002. Two techniques for reconciling algorithm parallelism with memory constraints. Proceedings of the fourteenth annual ACM symposium on Parallel algorithms and architectures. :95-98.
1990. Two-directional record layout for multiple inheritance. Proceedings of the ACM SIGPLAN 1990 conference on Programming language design and implementation. :85-91.
2002. Two-frame multi-scale optical flow estimation using wavelet decomposition. Acoustics, Speech, and Signal Processing (ICASSP), 2002 IEEE International Conference on. 4:IV-3588-IV-3591-IV-3588-IV-3591.
1992. A two-level knowledge representation for machine translation: Lexical semantics and tense/aspect. Lexical Semantics and Knowledge RepresentationLexical Semantics and Knowledge Representation. 627:269-287.
2007. A two-level topological decomposition for non-manifold simplicial shapes. Proceedings of the 2007 ACM symposium on Solid and physical modeling. :355-360.
2005. Two-server password-only authenticated key exchange. Applied Cryptography and Network Security. :175-206.
2012. Two-server password-only authenticated key exchange. Journal of Computer and System Sciences. 78(2):651-669.
2005. A Type and Effect System for Flexible Abstract Interpretation of Java: (Extended Abstract). Electronic Notes in Theoretical Computer Science. 131:111-124.
1991. Typicality constants and range defaults: Some pros and cons of a cognitive model of default reasoning. Methodologies for Intelligent Systems. :560-569.
1983. The U1 small nuclear RNA-protein complex selectively binds a 5′ splice site in vitro. Cell. 33(2):509-518.
2009. UbiGreen: investigating a mobile tool for tracking and supporting green transportation habits. Proceedings of the 27th international conference on Human factors in computing systems. :1043-1052.
2004. Ubistatins Inhibit Proteasome-Dependent Degradation by Binding the Ubiquitin Chain. Science. 306(5693):117-120.