Publications
Export 7148 results:
[ Author] Title Type Year Filters: Efficient-cryptographic-protocols-preventing-%E2%80%9Cman-middle%E2%80%9D-attacks is [Clear All Filters]
2010. Dense Subgraphs with Restrictions and Applications to Gene Annotation Graphs. Research in Computational Molecular Biology. :456-472.
2006. Dataflow transformations in high-level DSP system design. Proceedings of the International Symposium on System-on-Chip, Tampere, Finland. :131-136.
2007. Structural Biology: Analysis of 'downhill' protein folding; Analysis of protein-folding cooperativity (Reply). Nature. 445(7129):E17-E18-E17-E18.
2003. A 4-Year Study of the Epidemiology of Vibrio Cholerae in Four Rural Areas of Bangladesh. Journal of Infectious DiseasesJ Infect Dis.. 187(1):96-101.
2004. Unobtrusiveness and efficiency in idle cycle stealing for PC grids. Parallel and Distributed Processing Symposium, 2004. Proceedings. 18th International.
1989. List ranking on the Hypercube. Proceedings of the 1989 International Conference on Parallel Processing. 3:20-23.
2004. Resource policing to support fine-grain cycle stealing in networks of workstations. IEEE Transactions on Parallel and Distributed Systems. 15(10):878-892.
1998. Linger longer: Fine-grain cycle stealing for networks of workstations. Proceedings of the 1998 ACM/IEEE Conference on Supercomputing (CDROM). :1-12.
2001. Efficient network and I/O throttling for fine-grain cycle stealing. Proceedings of the 2001 ACM/IEEE conference on Supercomputing (CDROM) - Supercomputing '01. :3-3.
1990. Efficient algorithms for list ranking and for solving graph problems on the hypercube. Parallel and Distributed Systems, IEEE Transactions on. 1(1):83-90.
2000. Exploiting fine-grained idle periods in networks of workstations. IEEE Transactions on Parallel and Distributed Systems. 11(7):683-698.
2006. An Efficient Computational Method for Predicting Rotational Diffusion Tensors of Globular Proteins Using an Ellipsoid Representation. Journal of the American Chemical Society. 128(48):15432-15444.
2006. Interdomain mobility in di-ubiquitin revealed by NMR. Proteins: Structure, Function, and Bioinformatics. 63(4):787-796.
2004. A comparison of bug finding tools for Java. Software Reliability Engineering, 2004. ISSRE 2004. 15th International Symposium on. :245-256.
2008. Residual periodograms for choosing regularization parameters for ill-posed problems. Inverse Problems. 24(3):034005-034005.
2010. Modelling Type 1a Supernova Light Curves. Exponential Data Fitting and Its ApplicationsExponential Data Fitting and Its Applications. :169-186.
1994. Confidence Intervals for Discrete Approximations to Ill-Posed Problems. The Journal of Computational and Graphical Statistics. 3:67-96.
2002. Empirical evaluation of techniques and methods used for achieving and assessing software high dependability. Proc. DSN Workshop on Dependability Benchmarking.
1995. Patterns of functional damage in neural network models of associative memory. Neural computation. 7(5):1105-1127.
1995. A neural model of delusions and hallucinations in schizophrenia. Advances in Neural Information Processing Systems. :149-156.
2001. Cortical Spreading depression and the pathogenesis of brain disorders: a computational and neural network-based investigation. Neurological research. 23(5):447-456.
1999. Pathogenic mechanisms in ischemic damage: a computational study. Computers in biology and medicine. 29(1):39-59.