Publications

Export 7151 results:
Author [ Title(Desc)] Type Year
Filters: Conversion-viable-nonculturable-vibrio-cholerae-culturable-state-co%E2%80%90culture-eukaryotic is   [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
P
Hourcade JP, Bederson BB, Druin A.  2004.  Preschool children's use of mouse buttons. CHI'04 extended abstracts on Human factors in computing systems. :1411-1412.
Hwang E, Prabhakaran B, V.S. Subrahmanian.  2002.  Presentation planning for distributed VoD systems. Knowledge and Data Engineering, IEEE Transactions on. 14(5):1059-1077.
Miller M, Perlis D.  1993.  Presentations and this and that: logic in action. Proceedings of the 15th Annual Conference of the Cognitive Science Society, Boulder, Colorado. 251
Hombsek K, Bederson BB, Plaisant C.  2003.  Preserving Context with Zoomable User Interfaces. The craft of information visualization: readings and reflectionsThe craft of information visualization: readings and reflections. :83-83.
Yilmaz C, Memon AM, Porter A, Krishna AS, Schmidt DC, Gokhale A, Natarajan B.  2004.  Preserving distributed systems critical properties: a model-driven approach. Software, IEEE. 21(6):32-40.
Mittal P, Papamanthou C, Song D.  2012.  Preserving Link Privacy in Social Network Based Systems. arXiv:1208.6189 [cs].
Zheleva E, Getoor L.  2008.  Preserving the privacy of sensitive relationships in graph data. Proceedings of the 1st ACM SIGKDD international conference on Privacy, security, and trust in KDD. :153-171.
Greene S, Marchionini G, Plaisant C, Shneiderman B.  2000.  Previews and overviews in digital libraries: Designing surrogates to support visual information seeking. Journal of the American Society for Information Science. 51(4):380-393.
Haley BJ, Grim CJ, Hasan NA, Taviani E, Chun J, Brettin TS, Bruce DC, Challacombe JF, Detter CJ, Han CS et al..  2010.  The pre‐seventh pandemic Vibrio cholerae BX 330286 El Tor genome: evidence for the environment as a genome reservoir. Environmental Microbiology Reports. 2(1):208-216.
Alexander DS, Menage PB, Keromytis AD, Arbaugh WA, Anagnostakis KG, Smith JM.  2001.  The price of safety in an active network. Journal of Communications and Networks. 3(1):4-18.
Khuller S, Vishkin U, Young N.  1994.  A primal-dual parallel approximation technique applied to weighted set and vertex covers. Journal Algorithms. 17(2):280-289.
Khan Z, Ford MJ, Cusanovich DA, Mitrano A, Pritchard JK, Gilad Y.  2013.  Primate Transcript and Protein Expression Levels Evolve Under Compensatory Selection Pressures. Science. 342(6162):1100-1104.
Vaswani N, Chellappa R.  2006.  Principal components null space analysis for image and video classification. Image Processing, IEEE Transactions on. 15(7):1816-1830.
Dorr BJ.  1987.  Principle-Based Parsing for Machine Translation.
Roussopoulos N, Kang H.  1986.  Principles and techniques in the design of ADMS+((advanced data-base management system)). Computer. 19:19-23.
Kim J-S, Andrade H, Sussman A.  2007.  Principles for designing data-/compute-intensive distributed applications and middleware systems for heterogeneous environments. Journal of Parallel and Distributed Computing. 67(7):755-771.
Aloimonos Y, Rosenfeld A.  1994.  Principles of computer vision. Handbook of pattern recognition and image processing (vol. 2). :1-15.
Zelkowitz MV, Shaw AC, Gannon JD.  1979.  Principles of software engineering and design.
Martin, M.P, Piomelli U, Candler GV, Center A H P C R, of Minnesota U.  1999.  A Priori Test of SGS Models in Compressible Turbulence.
Cleaveland R, L\üttgen G, Natarajan V, Sims S.  1996.  Priorities for modeling and verifying distributed systems. Tools and Algorithms for the Construction and Analysis of Systems. :278-297.
Cleaveland R, Hennessy M.  1990.  Priorities in process algebras. Information and Computation. 87(1-2):58-77.
Yoon I-C, Sussman A, Memon AM, Porter A.  2009.  Prioritizing component compatibility tests via user preferences. Software Maintenance, 2009. ICSM 2009. IEEE International Conference on. :29-38.
Cukier M, Panjwani S.  2009.  Prioritizing Vulnerability Remediation by Determining Attacker-Targeted Vulnerabilities. Security Privacy, IEEE. 7(1):42-48.
Cleaveland R, Lüttgen G, Natarajan V.  2007.  Priority and abstraction in process algebra. Information and Computation. 205(9):1426-1458.
Fayzullin M, V.S. Subrahmanian, Albanese M, Picariello A.  2004.  The priority curve algorithm for video summarization. Proceedings of the 2nd ACM international workshop on Multimedia databases. :28-35.

Pages