Publications

Export 7151 results:
Author Title [ Type(Asc)] Year
Filters: Conversion-viable-nonculturable-vibrio-cholerae-culturable-state-co%E2%80%90culture-eukaryotic is   [Clear All Filters]
Reports
Kavetsky R, Gupta SK.  2010.  Developing Autonomy for Unmanned Surface Vehicles by Using Virtual Environments.
Aloimonos Y, Basu A.  1986.  Determining the Translation of a Rigidly Moving Surface, without Correspondence,.
Medem A, Teixeira R, Feamster N, Meulle M.  2009.  Determining the causes of intradomain routing changes.
Ceaparu I, Lazar J, Bessiere K, Robinson J, Shneiderman B.  2005.  Determining Causes and Severity of End-User Frustration (2002). Institute for Systems Research Technical Reports.
Shneiderman B, Plaisant C, Botafogo R, Hopkins D, Weiland W.  1998.  Designing to facilitate browsing: A look back at the Hyperties workstation browser. Technical Reports of the Computer Science Department, University of Maryland.
Lychev R, Feamster N.  2009.  Designing Enforceable Network Contracts. GT-CS-09-02
De Floriani L, Fellegara R, Magillo P.  2010.  Design, Analysis and Comparison of Spatial Indexes for Tetrahedral Meshes. DISI-TR-2010-05
Miller M, Perlis D, Purang K.  1998.  Defaults Denied. UMIACS-TR-96-61
Minker J.  1995.  Deductive Databases and Knowledge Base Systems..
Bhattacharyya SS, Shen C-C, Plishker W, Sane N, Wu H-H, Gu R.  2011.  Dataflow-Based Implementation of Layered Sensing Applications.
Shen C-C, Plishker W, Bhattacharyya SS.  2011.  Dataflow-based Design and Implementation of Image Processing Applications. Technical Reports from UMIACS.
Gupta SK, Das D, Regli WC, Nau DS.  1995.  Current Trends and Future Challenges in Automated Manufacturability Analysis. ISR; TR 1995-16
Basili VR, Dangle K, Esker L, Marotta F, Rus I, Brosgol BM, Jamin S, Arthur JD, Ravichandar R, Wisnosky DE.  2008.  CrossTalk: The Journal of Defense Software Engineering. Volume 21, Number 10, October 2008.
Lee W, Dagon D, Giffin J, Feamster N, Ollman G, Westby J, Wesson R, Vixie P.  2011.  Countering Botnets: Anomaly-Based Detection, Comprehensive Analysis, and Efficient Mitigation.
Kang H, Roussopoulos N.  1987.  On Cost-effectiveness of a Semijoin in Distributed Query Processing.. ISR-TR-1987-38
Perlis D, Purang K.  1998.  Conversational Adequacy: Mistakes are the Essence. UMIACS-TR-96-41
Levow GA, Dorr BJ, Lin D.  2000.  Construction of Chinese-English Semantic Hierarchy for Information Retrieval.
Dorr BJ, Lin D, Levow G-A.  2002.  Construction of a Chinese-English Verb Lexicon for Embedded Machine Translation in Cross-Language Information Retrieval.
Wei Z, JaJa JF.  2012.  Constructing Inverted Files: To MapReduce or Not Revisited. UMIACS-TR-2012-03
Wei Z, JaJa JF.  2011.  Constructing Inverted Files on a Cluster of Multicore Processors Near Peak I/O Throughput. UMIACS-TR-2011-03
Dorr BJ, Gaasterland T.  2002.  Constraints on the Generation of Tense, Aspect, and Connecting Words from Temporal Expressions.
Dorr BJ, Voss C.  1992.  Constraining MT divergences: spatial relations in the lexicon and knowledge base.
Aloimonos Y.  1986.  Computing Intrinsic Images..
Kao TC, Mount D.  1991.  Computing generalized Voronoi diagrams in improved time and space bounds.
Liu X, Doermann D.  2008.  Computer Vision and Image Processing Techniques for Mobile Application. LAMP-TR-151

Pages