Publications

Export 7151 results:
Author Title Type [ Year(Desc)]
Filters: Conversion-viable-nonculturable-vibrio-cholerae-culturable-state-co%E2%80%90culture-eukaryotic is   [Clear All Filters]
2008
Friedler SA, Tan Y L, Peer NJ, Shneiderman B.  2008.  Enabling teachers to explore grade patterns to identify individual needs and promote fairer student assessment. Computers & Education. 51(4):1467-1485.
Deshpande A, Khuller S, Malekian A, Toossi M.  2008.  Energy Efficient Monitoring in Sensor Networks. LATIN 2008: Theoretical InformaticsLATIN 2008: Theoretical Informatics. 4957:436-448.
Ratanasanya S, Mount D, Netanyahu NS, Achalakul T.  2008.  Enhancements in robust feature matching. Electrical Engineering/Electronics, Computer, Telecommunications and Information Technology, 2008. ECTI-CON 2008. 5th International Conference on. 1:505-508.
Bederson BB, Clamage A, Plaisant C.  2008.  Enhancing In-Car Navigation Systems with Personal Experience. Transportation Research Record: Journal of the Transportation Research Board. 2064(-1):33-42.
Hochstein L, Nakamura T, Shull F, Zazworka N, Basili VR, Zelkowitz MV.  2008.  An Environment for Conducting Families of Software Engineering Experiments. Software Development. Volume 74:175-200.
Constantin de Magny G, Murtugudde R, Sapiano MRP, Nizam A, Brown CW, Busalacchi AJ, Yunus M, Nair GB, Gil AI, Lanata CF et al..  2008.  Environmental signatures associated with cholera epidemics. Proceedings of the National Academy of Sciences. 105(46):17676-17676.
Taviani E, Ceccarelli D, Lazaro N, Bani S, Cappuccinelli P, Colwell RR, Colombo MM.  2008.  Environmental Vibrio spp., isolated in Mozambique, contain a polymorphic group of integrative conjugative elements and class 1 integrons. FEMS Microbiology Ecology. 64(1):45-54.
Corrada Bravo H, Eng KH, Keles S, Wahba G, Wright S.  2008.  Estimating Tree-Structured Covariance Matrices via Mixed-Integer Programming with an Application to Phylogenetic Analysis of Gene Expression. 1142
Hannenhalli S.  2008.  Eukaryotic Transcription Factor Binding Sites—modeling and Integrative Search Methods. BioinformaticsBioinformatics. 24(11):1325-1331.
Kules B, Shneiderman B.  2008.  Evaluating Exploratory Search Systems. Information processing & management. 44(2):463-484.
Elaine Shi.  2008.  Evaluating predicates over encrypted data.
Plaisant C, Grinstein G, Scholtz J, Whiting M, O'Connell T, Laskowski S, Chien L, Tat A, Wright W, Gorg C et al..  2008.  Evaluating Visual Analytics at the 2007 VAST Symposium Contest. Computer Graphics and Applications, IEEE. 28(2):12-21.
Tran S, Davis LS.  2008.  Event modeling and recognition using markov logic networks. Computer Vision–ECCV 2008. :610-623.
Ray A, Cleaveland R.  2008.  Executable Specifications for Real-Time Distributed Systems. Electronic Notes in Theoretical Computer Science. 203(4):3-17.
Myers DS, Bazinet AL, Cummings MP.  2008.  Expanding the reach of Grid computing: combining Globus- and BOINC-based systems. Grids for Bioinformatics and Computational BiologyGrids for Bioinformatics and Computational Biology. :71-85.
Ramasamy HGV, Pandey P, Cukier M, Sanders WH.  2008.  Experiences with building an intrusion-tolerant group communication system. Software: Practice and Experience. 38(6):639-666.
Lee WJ, Raschid L, Sayyadi H, Srinivasan P.  2008.  Exploiting ontology structure and patterns of annotation to mine significant associations between pairs of controlled vocabulary terms. Data Integration in the Life Sciences. :44-60.
Natarajan S, Tadepalli P, Fern A, De Raedt L, Dietterich T, Getoor L, Kersting K, Muggleton SH.  2008.  Exploiting Prior Knowledge in Intelligent Assistants: Combining Relational Models with Hierarchies. Probabilistic, Logical and Relational Learning - A Further Synthesis.
Sen P, Deshpande A, Getoor L.  2008.  Exploiting shared correlations in probabilistic databases. Proceedings of the VLDB Endowment. 1(1):809-820.
Taylor M, Yin C-E, M. Wu, Qu G.  2008.  Extended abstract: A hardware-assisted data hiding based approach in building high performance secure execution systems. Hardware-Oriented Security and Trust, 2008. HOST 2008. IEEE International Workshop on. :93-96.
Zhang P, Soergel D, Klavans JL, Oard D.  2008.  Extending sense-making models with ideas from cognition and learning theories. Proceedings of the American Society for Information Science and Technology. 45(1):23-23.
Shneiderman B.  2008.  Extreme visualization: squeezing a billion records into a million pixels. SIGMOD Conference. :3-12.
Brown DG, Robinson DT, An L, Nassauer JI, Zellner M, Rand W, Riolo R, Page SE, Low B, Wang Z.  2008.  Exurbia from the bottom-up: Confronting empirical challenges to characterizing a complex system. Geoforum. 39(2):805-818.
Swamy N, Corcoran BJ, Hicks MW.  2008.  Fable: A Language for Enforcing User-defined Security Policies. IEEE Symposium on Security and Privacy, 2008. SP 2008. :369-383.
Cevher V, Sankaranarayanan AC, Chellappa R.  2008.  Factorized variational approximations for acoustic multi source localization. Acoustics, Speech and Signal Processing, 2008. ICASSP 2008. IEEE International Conference on. :2409-2412.

Pages