Publications
Export 7148 results:
[ Author] Title Type Year Filters: Efficient-model-checking-buchi-tableau-automata%E2%8B%86 is [Clear All Filters]
2009. RNA Colony Blot Hybridization Method for Enumeration of Culturable Vibrio Cholerae and Vibrio Mimicus Bacteria. Applied and Environmental MicrobiologyAppl. Environ. Microbiol.. 75(17):5439-5444.
2010. Occurrence of the Vibrio cholerae seventh pandemic VSP-I island and a new variant. OMICS: A Journal of Integrative Biology. 14(1):1-7.
2009. Detection of toxigenic Vibrio cholerae O1 in freshwater lakes of the former Soviet Republic of Georgia. Environmental Microbiology Reports. 2(1):2-6.
2014. Viewing Marine Bacteria, Their Activity and Response to Environmental Drivers from Orbit. Microbial Ecology. (38):489-500.
1994. A study of affine matching with bounded sensor error. International Journal of Computer Vision. 13(1):7-32.
2007. VAST 2007 Contest - Blue Iguanodon. Visual Analytics Science and Technology, 2007. VAST 2007. IEEE Symposium on. :231-232.
2008. VAST 2008 Challenge: Introducing mini-challenges. Visual Analytics Science and Technology, 2008. VAST '08. IEEE Symposium on. :195-196.
2006. VAST 2006 Contest - A Tale of Alderwood. Visual Analytics Science And Technology, 2006 IEEE Symposium On. :215-216.
2009. VAST 2009 challenge: An insider threat. Visual Analytics Science and Technology, 2009. VAST 2009. IEEE Symposium on. :243-244.
2003. Which comes first, usability or utility? Proceedings of the 14th IEEE Visualization 2003 (VIS'03). :112–-112–.
2010. VAST 2010 Challenge: Arms dealings and pandemics. Visual Analytics Science and Technology (VAST), 2010 IEEE Symposium on. :263-264.
2009. The Ins and Outs of Home Networking: The Case for Useful and Usable Domestic Networking. ACM Trans. Comput.-Hum. Interact.. 16(2):8:1-8:28.
2011. Limits of computational differential privacy in the client/server setting. Theory of Cryptography. :417-431.
2010. A new framework for efficient password-based authenticated key exchange. Proceedings of the 17th ACM conference on Computer and communications security. :516-525.
1987. Mapping a single-assignment language onto the Warp systolic array. Functional Programming Languages and Computer Architecture. :347-363.
2006. Towards Dependability in Everyday Software Using Software Telemetry. Engineering of Autonomic and Autonomous Systems, IEEE International Workshop on. :9-18.
2006. What do high-level memory models mean for transactions? Proceedings of the 2006 workshop on Memory system performance and correctness - MSPC '06. :62-62.
1996. Space/time trade-offs for associative memory. Pattern Recognition, 1996., Proceedings of the 13th International Conference on. 4:296-302vol.4-296-302vol.4.
2007. Assessment of WENO methods with shock-confining filtering for LES of compressible turbulence. AIAA Paper 2007. 4198