Publications
Export 7151 results:
Author Title Type [ Year] Filters: Conversion-viable-nonculturable-vibrio-cholerae-culturable-state-co%E2%80%90culture-eukaryotic is [Clear All Filters]
2008. A Fast Algorithm for Learning a Ranking Function from Large-Scale Data Sets. Pattern Analysis and Machine Intelligence, IEEE Transactions on. 30(7):1158-1170.
2008. Fast browsing of archived Web contents. 8th International Web Archiving Workshop, Aarhus, Denmark..
2008. Fast concurrent object classification and localization. CSAIL Technical Reports (July 1, 2003 - present).
2008. Fast, easy, and cheap: Construction of statistical machine translation models with MapReduce. Proceedings of the Third Workshop on Statistical Machine Translation. :199-207.
2008. Fast monitoring of traffic subpopulations. Proceedings of the 8th ACM SIGCOMM conference on Internet measurement. :257-270.
2008. Fast multipole accelerated boundary element method (FMBEM) for solution of 3D scattering problems. The Journal of the Acoustical Society of America. 123(5):3419-3419.
2008. Fast Multipole Accelerated Boundary Element Methods for the 3D Helmholtz Equation. Technical Reports from UMIACS UMIACS-TR-2008-03.
2008. Fast multipole methods on graphics processors. Journal of Computational Physics. 227(18):8290-8313.
2008. A Fast Similarity Join Algorithm Using Graphics Processing Units. Data Engineering, 2008. ICDE 2008. IEEE 24th International Conference on. :1111-1120.
2008. A Feature Generation Algorithm with Applications to Biological Sequence Classification. Computational Methods. :355-355.
2008. On the fidelity of 802.11 packet traces. Proceedings of the 9th international conference on Passive and active network measurement. :132-141.
2008. Figaro: A Novel Statistical Method for Vector Sequence Removal. Bioinformatics. 24(4):462-467.
2008. Fighting spam, phishing, and online scams at the network level. Proceedings of the 4th Asian Conference on Internet Engineering. :39-40.
2008. Finding Corrupted Computers Using Imperfect Intrusion Prevention System Event Data. Computer Safety, Reliability, and Security. 5219:221-234.
2008. Fixing ally's growing pains with velocity modeling. Proceedings of the 8th ACM SIGCOMM conference on Internet measurement. :337-342.
2008. Flow Algorithms for Parallel Query Optimization. IEEE 24th International Conference on Data Engineering, 2008. ICDE 2008. :754-763.
2008. Flowers or a robot army?: encouraging awareness & activity with personal, mobile displays Proceedings of the 10th international conference on Ubiquitous computing. :54-63.
2008. Formalizing Soundness of Contextual Effects. Theorem Proving in Higher Order LogicsTheorem Proving in Higher Order Logics. 5170:262-277.
2008. Fpga-based prototype of a pram-on-chip processor. Proceedings of the 5th conference on Computing frontiers. :55-66.
2008. A Framework for Software Engineering Experimental Replications. Engineering of Complex Computer Systems, 2008. ICECCS 2008. 13th IEEE International Conference on. :203-212.
2008. From Videos to Verbs: Mining Videos for Activities using a cascade of dynamical systems (Supplemental Material). Relation. 10(1.13):9944-9944.