Publications

Export 7151 results:
Author Title [ Type(Asc)] Year
Filters: Conversion-viable-nonculturable-vibrio-cholerae-culturable-state-co%E2%80%90culture-eukaryotic is   [Clear All Filters]
Conference Papers
Gupta A, Mittal A, Davis LS.  2007.  COST: An Approach for Camera Selection and Multi-Object Inference Ordering in Dynamic Scenes. Computer Vision, 2007. ICCV 2007. IEEE 11th International Conference on. :1-8.
Bröcheler M, Pugliese A, V.S. Subrahmanian.  2010.  COSI: Cloud Oriented Subgraph Identification in Massive Social Networks. Advances in Social Networks Analysis and Mining (ASONAM), 2010 International Conference on. :248-255.
Reggia JA, Sutton III GG, Lynne C, D'Autrechy SC, Armentrout SL.  2000.  Cortical inhibition as explained by the competitive distribution hypothesis. Network models for control and processing. :31-62.
Feamster N, Balakrishnan H.  2005.  Correctness properties for Internet routing. Allerton Conference on Communication, Control, and Computing.
Zajic D, Maxwell M, Doermann D, Rodrigues P, Bloodgood M.  2011.  Correcting Errors in Digital Lexicographic Resources Using a Dictionary Manipulation Language. Electronic lexicography in the 21st century: new applications for new users (eLEX2011). :297-301.
Teo CL, Yang Y, Daumé H, Fermüller C, Aloimonos Y.  2011.  A Corpus-Guided Framework for Robotic Visual Perception. Workshops at the Twenty-Fifth AAAI Conference on Artificial Intelligence.
Manson J, Pugh W.  2001.  Core semantics of multithreaded Java. Proceedings of the 2001 joint ACM-ISCOPE conference on Java Grande - JGI '01. :29-38.
Petroni J., Fraser T, Molina J, Arbaugh WA.  2004.  Copilot - a coprocessor-based kernel runtime integrity monitor. Proceedings of the 13th conference on USENIX Security Symposium - Volume 13. :13-13.
Mao Y, M. Wu.  2005.  Coordinated sensor deployment for improving secure communications and sensing coverage. Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks. :117-128.
Lee S, Sherwood R, Bhattacharjee B.  2003.  Cooperative peer groups in NICE. INFOCOM 2003. Twenty-Second Annual Joint Conference of the IEEE Computer and Communications. IEEE Societies. 2:1272-1282vol.2-1272-1282vol.2.
Druin A.  1999.  Cooperative inquiry: developing new technologies for children with children. Proceedings of the SIGCHI conference on Human factors in computing systems: the CHI is the limit. :592-599.
Lapizco-Encinas G, Kingsford C, Reggia JA.  2009.  A cooperative combinatorial Particle Swarm Optimization algorithm for side-chain packing. IEEE Swarm Intelligence Symposium, 2009. SIS '09. :22-29.
Sherwood R, Braud R, Bhattacharjee B.  2004.  A cooperative bulk transfer protocol. IEEE Infocom.
Matias Y, Vishkin U.  1991.  Converting high probability into nearly-constant time—with applications to parallel hashing. Proceedings of the twenty-third annual ACM symposium on Theory of computing. :307-316.
Chow R, Golle P, Jakobsson M, Elaine Shi, Staddon J, Masuoka R, Molina J.  2009.  Controlling data in the cloud: outsourcing computation without outsourcing control. :85-90.
Wolverton M, desJardins M.  1998.  Controlling communication in distributed planning using irrelevance reasoning. Proceedings of the fifteenth national/tenth conference on Artificial intelligence/Innovative applications of artificial intelligence. :868-874.
El-Sana J, Varshney A.  1997.  Controlled simplification of genus for polygonal models. Visualization '97., Proceedings. :403-410.
Kuter U, Nau DS.  2006.  Controlled search over compact state representations, in nondeterministic planning domains and beyond. 21:1638-1638.
Bederson BB, Wallace RS, Schwartz EL.  1993.  Control and design of the spherical pointing motor. , 1993 IEEE International Conference on Robotics and Automation, 1993. Proceedings. :630-636vol.2-630-636vol.2.
Gupta H, Roy Chowdhury AK, Chellappa R.  2004.  Contour-based 3D Face Modeling from a Monocular Video. Proceedings of the British Machine Vision Conference. :39.1-39.10-39.1-39.10.
Aloimonos Y, Basu A, Brown CM.  1985.  Contour, orientation and motion. Proceedings: Image Understanding Workshop (Miami Beach, FL, December 9–10, 1985). :129-136.
Abd-Almageed W, Smith CE.  2002.  Contour migration: solving object ambiguity with shape-space visual guidance. IEEE/RSJ International Conference on Intelligent Robots and Systems, 2002. 1:330-335vol.1-330-335vol.1.
Iwerks GS, Samet H, Smith K.  2003.  Continuous k-nearest neighbor queries for continuously moving points with updates. Proceedings of the 29th international conference on Very large data bases-Volume 29. :512-523.
Neamtiu I, Hicks MW, Foster JS, Pratikakis P.  2008.  Contextual effects for version-consistent dynamic software updating and safe concurrent programming. Proceedings of the 35th annual ACM SIGPLAN-SIGACT symposium on Principles of programming languages. :37-49.
Wang L, Oard D.  2009.  Context-based message expansion for disentanglement of interleaved text conversations. Proceedings of Human Language Technologies: The 2009 Annual Conference of the North American Chapter of the Association for Computational Linguistics. :200-208.

Pages