Publications
Export 7151 results:
Author Title [ Type] Year Filters: Conversion-viable-nonculturable-vibrio-cholerae-culturable-state-co%E2%80%90culture-eukaryotic is [Clear All Filters]
2008. Script-Independent Text Line Segmentation in Freestyle Handwritten Documents. IEEETransactions on Pattern Analysis and Machine Intelligence. :1313-1329.
2008. Searching Electronic Health Records for Temporal Patterns in Patient Histories: A Case Study with Microsoft Amalga. AMIA Annual Symposium ProceedingsAMIA Annu Symp Proc. 2008:601-605.
2003. Searching large collections of recorded speech: A preliminary study. Proceedings of the American Society for Information Science and Technology. 40(1):330-339.
2008. Searching the world’s herbaria: A system for visual identification of plant species. Computer Vision–ECCV 2008. :116-129.
2006. Seasonal Cholera Caused by Vibrio Cholerae Serogroups O1 and O139 in the Coastal Aquatic Environment of Bangladesh. Applied and Environmental MicrobiologyAppl. Environ. Microbiol.. 72(6):4096-4104.
2008. Seasonal Cholera from Multiple Small Outbreaks, Rural Bangladesh. Emerging Infectious DiseasesEmerg Infect Dis. 14(5):831-833.
2006. Secondary Structure Spatial Conformation Footprint: A Novel Method for Fast Protein Structure Comparison and Classification. BMC Structural Biology. 6(12)
2004. Section-level relationships of North American ıt Agalinis (Orobanchaceae) based on DNA sequence analysis of three chloroplast gene regions. BMC Evol Biol. 4:15-15.
1998. A secure active network environment architecture: realization in SwitchWare. IEEE Network. 12(3):37-45.
2010. Secure and robust iris recognition using random projections and sparse representations. Pattern Analysis and Machine Intelligence, IEEE Transactions on. (99):1-1.
2007. A Secure DHT via the Pigeonhole Principle. Technical Reports of the Computer Science Department, CS-TR-4884.
2001. Secure Health Information Sharing System: SHARE. Proceedings of the AMIA SymposiumProc AMIA Symp. :1060-1060.
2012. Secure multi-party computation of boolean circuits with applications to privacy in on-line marketplaces. Topics in Cryptology–CT-RSA 2012. :416-432.
2003. A secure PLAN. IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews. 33(3):413-426.
2005. Secure remote authentication using biometric data. Advances in Cryptology–EUROCRYPT 2005. :147-163.
2005. Secure requirements elicitation through triggered message sequence charts. Distributed Computing and Internet Technology. :273-282.
2004. Secure routing in ad hoc networks. Workshop on Security of ad hoc and Sensor Networks: Proceedings of the 2 nd ACM workshop on Security of ad hoc and sensor networks.