Publications
Export 7151 results:
Author Title [ Type] Year Filters: Conversion-viable-nonculturable-vibrio-cholerae-culturable-state-co%E2%80%90culture-eukaryotic is [Clear All Filters]
2001. Automated Validation of Software Models. Automated Software Engineering, International Conference on. :91-91.
1998. Automated recovery in a secure bootstrap process. Proceedings of the Symposium on Network and Distributed Systems Security (NDSS’98). :155-167.
2007. Automated gui testing guided by usage profiles. Proceedings of the twenty-second IEEE/ACM international conference on Automated software engineering. :333-342.
2010. Automated generation of an efficient MPEG-4 Reconfigurable Video Coding decoder implementation. 2010 Conference on Design and Architectures for Signal and Image Processing (DASIP). :265-272.
2007. Automated detection of persistent kernel control-flow attacks. Proceedings of the 14th ACM conference on Computer and communications security. :103-115.
2004. Automated cluster-based Web service performance tuning. 13th IEEE International Symposium on High performance Distributed Computing, 2004. Proceedings. :36-44.
2008. Authenticated out-of-band communication over social links. Proceedings of the first workshop on Online social networks. :61-66.
2008. Authenticated Hash Tables. CCS '08 Proceedings of the 15th ACM Conference on Computer and Communications Security . :437-448.
2008. Augmenting spatio-textual search with an infectious disease ontology. Data Engineering Workshop, 2008. ICDEW 2008. IEEE 24th International Conference on. :266-269.
2000. An audio-video front-end for multimedia applications. 2000 IEEE International Conference on Systems, Man, and Cybernetics. 2:786-791vol.2-786-791vol.2.
2006. Attribute Grammar-Based Event Recognition and Anomaly Detection. Computer Vision and Pattern Recognition Workshop, 2006. CVPRW '06. Conference on. :107-107.
1999. Attacks on digital watermarks. Signals, Systems, and Computers, 1999. Conference Record of the Thirty-Third Asilomar Conference on. 2:1508-1512vol.2-1508-1512vol.2.
2009. Attacking cryptographic schemes based on "perturbation polynomials". Proceedings of the 16th ACM conference on Computer and communications security. :1-10.
2000. An assumptive logic programming methodology for parsing. Tools with Artificial Intelligence, 2000. ICTAI 2000. Proceedings. 12th IEEE International Conference on. :11-18.
2011. Associating the visual representation of user interfaces with their internal structures and metadata. Proceedings of the 24th annual ACM symposium on User interface software and technology. :245-256.
2009. Assigning cameras to subjects in video surveillance systems. Robotics and Automation, 2009. ICRA '09. IEEE International Conference on. :837-843.
2010. Assessor error in stratified evaluation. Proceedings of the 19th ACM international conference on Information and knowledge management. :539-548.
2001. Assessment of the k-epsilon turbulence model for compressible flows using direct simulation data. 39th AIAA Aerospace Sciences Meeting and Exhibit.
2000. Assessment of Temperature Fluctuation Models for RANS Simulations of Hypersonic Reacting Flows. 38th AIAA Aerospace Sciences Meeting and Exhibit.