Publications
Export 7151 results:
Author Title Type [ Year] Filters: Conversion-viable-nonculturable-vibrio-cholerae-culturable-state-co%E2%80%90culture-eukaryotic is [Clear All Filters]
2000. An API for Runtime Code Patching. International Journal of High Performance Computing Applications. 14(4):317-329.
2000. Approximating low-congestion routing and column-restricted packing problems. Information Processing Letters. 74(1–2):19-25.
2000. Approximation Algorithms for Disjoint Paths and Related Routing and Packing Problems. Mathematics of Operations ResearchMathematics of Operations Research. 25(2):255-280.
2000. Approximation algorithms with bounded performance guarantees for the clustered traveling salesman problem. Algorithmica. 28(4):422-437.
2000. Assessment of Temperature Fluctuation Models for RANS Simulations of Hypersonic Reacting Flows. 38th AIAA Aerospace Sciences Meeting and Exhibit.
2000. An assumptive logic programming methodology for parsing. Tools with Artificial Intelligence, 2000. ICTAI 2000. Proceedings. 12th IEEE International Conference on. :11-18.
2000. An audio-video front-end for multimedia applications. 2000 IEEE International Conference on Systems, Man, and Cybernetics. 2:786-791vol.2-786-791vol.2.
2000. Automatic deployment of application-specific metadata and code in MOCHA. Advances in Database Technology—EDBT 2000. :69-85.
2000. Automatic Text Detection and Tracking in Digital Video. IEEE Transactions on Image Processing - Special Issue on Image and Video Processing for Digital Libraries. 9(1):147-156.
2000. Breakout Session Report: Principles and Methods. Perceptual Organization for Artificial Vision Systems. :17-28.
2000. Building a Chinese-English Mapping Between Verb Concepts for Multilingual Applications. Envisioning Machine Translation in the Information FutureEnvisioning Machine Translation in the Information Future. 1934:345-363.
2000. A Case for Evolutionary Genomics and the Comprehensive Examination of Sequence Biodiversity. Molecular Biology and EvolutionMol Biol Evol. 17(12):1776-1788.
2000. A chosen ciphertext attack against several e-mail encryption protocols. Ninth USENIX Security Symposium.
2000. Chromatic nearest neighbor searching: A query sensitive approach. Computational Geometry. 17(3–4):97-119.
2000. Chromosome Identification Using Hidden Markov Models: Comparison with Neural Networks, Singular Value Decomposition, Principal Components Analysis, and Fisher Discriminant Analysis. Laboratory Investigation. 80(11):1629-1641.
2000. Class representation and image retrieval with non-metric distances. IEEE Transactions on Pattern Analysis and Machine Intelligence (TPAMI). 22(583-600):1-1.