Publications
Export 7151 results:
Author Title [ Type] Year Filters: Conversion-viable-nonculturable-vibrio-cholerae-culturable-state-co%E2%80%90culture-eukaryotic is [Clear All Filters]
1989. Assessing others' knowledge and ignorance. Proceedings of the 4th International Symposium on Methodologies for Intelligent Systems.
2004. ASPIRE: automated systematic protocol implementation robustness evaluation. Software Engineering Conference, 2004. Proceedings. 2004 Australian. :241-250.
2012. Ask WINE: Are We Safer Today? Evaluating Operating System Security Through Big Data Analysis LEET'12 Proceedings of the 5th USENIX conference on Large-Scale Exploits and Emergent Threats. :11-11.
2006. ARobust Stamp Detection Framework on Degraded Documents. International Conference on Document Recognition and Retrieval XIII. :1-9.
2008. An area-efficient high-throughput hybrid interconnection network for single-chip parallel processing. Proceedings of the 45th annual Design Automation Conference. :435-440.
2005. Are GSM phones THE solution for localization? Mobile Computing Systems and Applications, 2006. WMCSA'06. Proceedings. 7th IEEE Workshop on. :34-42.
2010. Are developers complying with the process: an XP study. Proceedings of the 2010 ACM-IEEE International Symposium on Empirical Software Engineering and Measurement. :14:1–14:10-14:1–14:10.
1996. Archiving, indexing, and retrieval of video in compressed domain. SPIEConference on Multimedia Storage and Archiving Systems. 2916:78-89.
2006. An architecture for specification-based detection of semantic integrity violations in kernel dynamic data. Proceedings of the 15th conference on USENIX Security Symposium. :20-20.
2005. An architectural level design methodology for embedded face detection. Proceedings of the 3rd IEEE/ACM/IFIP international conference on Hardware/software codesign and system synthesis. :136-141.
2003. Architectural Interaction Diagrams: AIDs for System Modeling. Software Engineering, International Conference on. :396-396.
2006. Archimedes, an archive of medical images. American Medical Informatics Association 2006 Annual Symposium Proceedings Biomedical and Health Informatics: From Foundations to Applications to Policy, Washington, DC, DW Bates, JH Holmes, and G. Kuperman, editors.
2004. Arbitrate-and-move primitives for high throughput on-chip interconnection networks. Circuits and Systems, 2004. ISCAS '04. Proceedings of the 2004 International Symposium on. 2:II-441-4Vol.2-II-441-4Vol.2.
2009. Arabic Cross-Document Coreference Resolution. Proceedings of the ACL-IJCNLP 2009 Conference Short Papers$}$. :357-360.
1998. AQuA: an adaptive architecture that provides dependable distributed objects. Seventeenth IEEE Symposium on Reliable Distributed Systems. :245-253.
2009. ApproxRank: Estimating Rank for a Subgraph. IEEE 25th International Conference on Data Engineering, 2009. ICDE '09. :54-65.
2005. Approximation results for probabilistic survivability. Multi-Agent Security and Survivability, 2005 IEEE 2nd Symposium on. :1-10.
2011. Approximation algorithms for throughput maximization in wireless networks with delay constraints. 2011 Proceedings IEEE INFOCOM. :1116-1124.
2007. Approximation algorithms for stochastic and risk-averse optimization. Proceedings of the eighteenth annual ACM-SIAM symposium on Discrete algorithms. :1305-1313.
1998. Approximation algorithms for multiple-tool miling. Proceedings of the fourteenth annual symposium on Computational geometry. :297-306.
2008. Approximation Algorithms for Computing Capacity of Wireless Networks with SINR Constraints. IEEE INFOCOM 2008. The 27th Conference on Computer Communications. :1166-1174.
1997. Approximating hyper-rectangles: learning and pseudo-random sets. Proceedings of the twenty-ninth annual ACM symposium on Theory of computing. :314-323.