Publications

Export 7151 results:
Author [ Title(Asc)] Type Year
Filters: Conversion-viable-nonculturable-vibrio-cholerae-culturable-state-co%E2%80%90culture-eukaryotic is   [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
B
Feamster N, Mao Z M, Rexford J.  2004.  BorderGuard: detecting cold potatoes from peers. Proceedings of the 4th ACM SIGCOMM conference on Internet measurement. :213-218.
Bobba RB, Eschenauer L, Gligor V, Arbaugh WA.  2003.  Bootstrapping security associations for routing in mobile ad-hoc networks. IEEE Global Telecommunications Conference, 2003. GLOBECOM '03. 3:1511-1515vol.3-1511-1515vol.3.
Hwa R, Resnik P, Weinberg A, Cabezas C, Kolak O.  2005.  Bootstrapping parsers via syntactic projection across parallel texts. Nat. Lang. Eng.. 11(3):311-325.
Milner S, Llorca J, Anibha A, Vishkin U.  2006.  A bootstrapping model for directional wireless networks. Communications Letters, IEEE. 10(12):840-842.
Liu F, Vishkin U, Milner S.  2006.  Bootstrapping free-space optical networks. Selected Areas in Communications, IEEE Journal on. 24(12):13-22.
Zhang J, Luo X, Perdisci R, Gu G, Lee W, Feamster N.  2011.  Boosting the scalability of botnet detection using adaptive traffic sampling. Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security. :124-134.
Shneiderman B.  2002.  Book Preview-Leonardo's Laptop: Human Needs and the New Computing Technologies. Interactions-New York. 9(4):43-43.
Shneiderman B.  1997.  Book Preview-Designing the User Interface: Strategies for Effective Human-Computer Interaction. Interactions-New York. 4(5):61-61.
Cummings MP.  2004.  A book like its cover. Heredity. 93(2):234-235.
Gopalan R, Taheri S, Turaga P, Chellappa R.  2012.  A Blur-robust Descriptor with Applications to Face Recognition. IEEE Transactions on Pattern Analysis and Machine Intelligence. PP(99):1-1.
Zhang Z, Klassen E, Srivastava A, Turaga P, Chellappa R.  2011.  Blurring-invariant Riemannian metrics for comparing signals and images. 2011 IEEE International Conference on Computer Vision (ICCV). :1770-1775.
Eisenstat S, Elman H, Schlutz M.  1988.  Block-Preconditioned Conjugate-Gradient-Like Methods for Numerical Reservoir Simulation. SPE Reservoir EngineeringSPERE. 3(1)
O'Leary DP, Wu Y-J J.  1996.  A Block-GTH Algorithm for Finding the Stationary Vector of a Markov Chain. SIAM Journal on Matrix Applications. 17:470-488.
Powell CE, Elman H.  2009.  Block-diagonal preconditioning for spectral stochastic finite-element systems. IMA Journal of Numerical Analysis. 29(2):350-350.
Elman H, Silvester DJ, Wathen AJ.  2002.  Block preconditioners for the discrete incompressible Navier–Stokes equations. International Journal for Numerical Methods in Fluids. 40(3‐4):333-344.
Elman H, Howle VE, Shadid J, Shuttleworth R, Tuminaro R.  2006.  Block preconditioners based on approximate commutators. SIAM Journal on Scientific Computing. 27(5):1651-1668.
Stewart G.W.  2008.  Block Gram–Schmidt Orthogonalization. SIAM Journal on Scientific Computing. 31(1):761-775.
JaJa JF, Ryu K W.  1994.  The block distributed memory model for shared memory multiprocessors. Parallel Processing Symposium, 1994. Proceedings., Eighth International. :752-756.
JaJa JF, Ryu K W.  1996.  The block distributed memory model. Parallel and Distributed Systems, IEEE Transactions on. 7(8):830-840.
O'Leary DP.  1980.  The block conjugate gradient algorithm and related methods. Linear Algebra and its Applications. 29:293-322.
Pruessner A, O'Leary DP.  2003.  Blind Deconvolution Using a Regularized Structured Total Least Norm Approach. SIAM J. on Matrix Analysis and Applications. 24:1018-1037.
Katz J, Yerukhimovich A.  2009.  On black-box constructions of predicate encryption from trapdoor permutations. Advances in Cryptology–ASIACRYPT 2009. :197-213.
Choi SGeol, Dachman-Soled D, Malkin T, Wee H.  2008.  Black-Box Construction of a Non-malleable Encryption Scheme from Any Semantically Secure One. Theory of Cryptography. :427-444.
Dachman-Soled D, Lindell Y, Mahmoody M, Malkin T.  2011.  On the Black-Box Complexity of Optimally-Fair Coin Tossing. Theory of Cryptography. :450-467.
Levin D, LaCurts K, Spring N, Bhattacharjee B.  2008.  Bittorrent is an auction: analyzing and improving bittorrent's incentives. Proceedings of the ACM SIGCOMM 2008 conference on Data communication. :243-254.

Pages