Publications

Export 7151 results:
Author Title [ Type(Asc)] Year
Filters: Conversion-viable-nonculturable-vibrio-cholerae-culturable-state-co%E2%80%90culture-eukaryotic is   [Clear All Filters]
Conference Papers
Cole R, Vishkin U.  1986.  Approximate scheduling, exact scheduling, and applications to parallel algorithms. Proceedings Symposium on Foundations of Computer Science. :478-491.
Arya S, Mount D.  1995.  Approximate range searching. Proceedings of the eleventh annual symposium on Computational geometry. :172-181.
Goodrich MT, Matias Y, Vishkin U.  1993.  Approximate parallel prefix computation and its applications. Parallel Processing Symposium, 1993., Proceedings of Seventh International. :318-325.
Arya S, Mount D.  1993.  Approximate nearest neighbor queries in fixed dimensions. Proceedings of the fourth annual ACM-SIAM Symposium on Discrete algorithms. :271-280.
Hussein ME, Abd-Almageed W.  2009.  Approximate kernel matrix computation on GPUs forlarge scale learning applications. Proceedings of the 23rd international conference on Supercomputing. :511-512.
Raykar VC, Duraiswami R.  2005.  Approximate expressions for the mean and the covariance of the maximum likelihood estimator for acoustic source localization. Acoustics, Speech, and Signal Processing, 2005. Proceedings. (ICASSP '05). IEEE International Conference on. 3:iii/73-iii/76Vol.3-iii/73-iii/76Vol.3.
Shirdhonkar S, Jacobs DW.  2008.  Approximate earth mover's distance in linear time. Computer Vision and Pattern Recognition, 2008. CVPR 2008. IEEE Conference on. :1-8.
Chu D, Deshpande A, Hellerstein JM, Hong W.  2006.  Approximate Data Collection in Sensor Networks using Probabilistic Models. Proceedings of the 22nd International Conference on Data Engineering, 2006. ICDE '06. :48-48.
Cole R, Vishkin U.  1986.  Approximate and exact parallel scheduling with applications to list, tree and graph problems. 27th Annual Symposium on Foundations of Computer Science. :478-491.
Tanin E, Samet H.  2002.  APPOINT: an Approach for Peer-to-Peer Offloading the INTernet. Proceedings of the 2002 annual national conference on Digital government research. :1-7.
Das R, Hwang YS, Uysal M, Saltz J, Sussman A.  1993.  Applying the CHAOS/PARTI library to irregular problems in computational chemistry and computational aerodynamics. Scalable Parallel Libraries Conference, 1993., Proceedings of the. :45-56.
Condon E, Cukier M, He T.  2007.  Applying Software Reliability Models on Security Incidents. :159-168.
Plishker W, Zaki GF, Bhattacharyya SS, Clancy C, Kuykendall J.  2011.  Applying graphics processor acceleration in a software defined radio prototyping environment. 2011 22nd IEEE International Symposium on Rapid System Prototyping (RSP). :67-73.
Fraser T, Petroni J., Arbaugh WA.  2006.  Applying flow-sensitive CQUAL to verify MINIX authorization check placement. Proceedings of the 2006 workshop on Programming languages and analysis for security. :3-6.
Rose A, Shneiderman B, Plaisant C.  1995.  An applied ethnographic method for redesigning user interfaces. Proceedings of the 1st conference on Designing interactive systems: processes, practices, methods, & techniques. :115-122.
Minter J, Perlis D.  1984.  Applications or Protected Circumscription. 7th International Conference on Automated Deduction, Napa, California, USA, May 14-16, 1984: proceedings. 170:414-414.
Bai P, Prabhakaran B, Srinivasan A.  1999.  Application-layer broker for scalable Internet services with resource reservation. Proceedings of the seventh ACM international conference on Multimedia (Part 2). :103-106.
Josyula DP, Fults S, Anderson ML, Wilson S, Perlis D.  2007.  Application of MCL in a dialog agent. Third Language and Technology Conference.
Spring N, Wolski R.  1998.  Application level scheduling of gene sequence comparison on metacomputers. Proceedings of the 12th international conference on Supercomputing. :141-148.
Shao J, Zhou SK, Chellappa R.  2004.  Appearance-based tracking and recognition using the 3D trilinear tensor. Acoustics, Speech, and Signal Processing, 2004. Proceedings. (ICASSP '04). IEEE International Conference on. 3:iii-613-16vol.3-iii-613-16vol.3.
Li J, Zhou SK, Chellappa R.  2005.  Appearance modeling under geometric context. Computer Vision, 2005. ICCV 2005. Tenth IEEE International Conference on. 2:1252-1259Vol.2-1252-1259Vol.2.
Capellades MB, Doermann D, DeMenthon D, Chellappa R.  2003.  An appearance based approach for human and object tracking. Image Processing, 2003. ICIP 2003. Proceedings. 2003 International Conference on. 2:II-85-8vol.3-II-85-8vol.3.
Perpich JM, Perry DE, Porter A, Votta LG, Wade MW.  1997.  Anywhere, Anytime Code Inspections: Using the Web to Remove Inspection Bottlenecks in Large-Scale Software Development. Software Engineering, International Conference on. :14-14.
Wang ZJ, M. Wu, Trappe W, Liu KJR.  2003.  Anti-collusion of group-oriented fingerprinting. Multimedia and Expo, 2003. ICME '03. Proceedings. 2003 International Conference on. 2:II-217-20vol.2-II-217-20vol.2.
Trappe W, M. Wu, Liu KJR.  2002.  Anti-collusion codes: multi-user and multimedia perspectives. Image Processing. 2002. Proceedings. 2002 International Conference on. 2:II-149-II-152vol.2-II-149-II-152vol.2.

Pages