Publications

Export 7151 results:
Author [ Title(Desc)] Type Year
Filters: End-zero-hit-queries-query-previews-nasa%E2%80%99s-global-change-master-directory is   [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
S
Dorr BJ, Jordan PW, Benoit JW.  1998.  A Survey of Current Paradigms in Machine Translation.
Dorr BJ, Jordan PW, Benoit JW.  1999.  A Survey of Current Paradigms in Machine Translation. Advances in Computers. Volume 49:1-68.
Namata GM, Sharara H, Getoor L.  2010.  A survey of link mining tasks for analyzing noisy and incomplete networks. Link Mining: Models, Algorithms, and Applications. :107-133.
Oard D, Dorr BJ.  1998.  A Survey of Multilingual Text Retrieval.
desJardins M, Durfee EH, Ortiz J., Wolverton MJ.  1999.  A Survey of Research in Distributed, Continual Planning. AI Magazine. 20(4):13-13.
Cardone A, Gupta SK, Karnik M.  2003.  A Survey of Shape Similarity Assessment Algorithms for Product Design and Manufacturing Applications. Journal of Computing and Information Science in EngineeringJ. Comput. Inf. Sci. Eng.. 3(2):109-118.
Hopkins JK, Spranklin BW, Gupta SK.  2009.  A survey of snake-inspired robot designs. Bioinspiration & Biomimetics. 4(2):021001-021001.
Srinivasan A.  1999.  A survey of the role of multicommodity flow and randomization in network design and routing. American Mathematical Society, Series in Discrete Mathematics and Theoretical Computer Science. 43:271-302.
El-Sayed NM, Donelson JE.  1997.  A survey of the Trypanosoma brucei rhodesiense genome using shotgun sequencing. Molecular and Biochemical Parasitology. 84(2):167-178.
Gupta SK, Anand DK, Brough JE, Kavetsky RA, Schwartz M, Thakur A.  2008.  A Survey of the Virtual Environments-based Assembly Training Applications.
Yu M, Rexford J, Sun X, Rao S, Feamster N.  2011.  A survey of virtual LAN usage in campus networks. Communications Magazine, IEEE. 49(7):98-103.
Bajcsy P, Cardone A, Chalfoun J, Halter M, Juba D, Kociolek M, Majurski M, Peskin A, Simon C, Simon M et al..  2015.  Survey statistics of automated segmentations applied to optical imaging of mammalian cells. BMC bioinformatics. 16:1.
Kim Y, Sutreja N, Froehlich J, Findlater L.  Submitted.  Surveying the Accessibility of Mobile Touchscreen Games for Persons with Motor Impairments: A Preliminary Analysis. terpconnect.umd.edu.
Zelkowitz MV.  1979.  Surveyor's Forum: A Question of Transition. ACM Computing Surveys (CSUR). 11(4):411-412.
Preece J, Shneiderman B.  1995.  Survival of the fittest: the evolution of multimedia user interfaces. ACM Computing Surveys. 27(4):557-559.
Jiwnani K, Zelkowitz MV.  2004.  Susceptibility matrix: a new aid to software auditing. Security Privacy, IEEE. 2(2):16-21.
O'Leary DP.  1995.  The SVD in Image Restoration. SVD and Signal Processing III: Algorithms, Architectures, and ApplicationsSVD and Signal Processing III: Algorithms, Architectures, and Applications. :315-322.
Miner D, desJardins M.  2008.  The swarm application framework. In Proceedings of the 23rd AAAI Conference on Artificial Intelligence (Student Abstract.
RodrIGuez A, Grushin A, Reggia JA, HAUPTMAN AMI, SIPPER M, PAN Z, Reggia JA, GAO D, DARABOS C, GIACOBINI M et al..  2007.  Swarm Intelligence Systems Using Guided Self-Organization for Collective Problem Solving. Advances in Complex Systems. 10(1):5-34.
Anwer M B, Motiwala M, Bin Tariq M, Feamster N.  2010.  SwitchBlade: a platform for rapid deployment of network protocols on programmable hardware. SIGCOMM Comput. Commun. Rev.. 40(4):183-194.
Korman CE, Mayergoyz ID.  1995.  Switching as an exit problem. Magnetics, IEEE Transactions on. 31(6):3545-3547.
Alexander DS, Arbaugh WA, Hicks MW, Kakkar P, Keromytis AD, Moore JT, Gunter CA, Nettles SM, Smith JM.  1998.  The SwitchWare active network architecture. IEEE Network. 12(3):29-36.
Alexander DS, Hicks MW, Kakkar P, Keromytis AD, Shaw M, Moore JT, Gunter CA, Jim T, Nettles SM, Smith JM.  1998.  The switchware active network implementation. The ML Workshop, International Conference on Functional Programming (ICFP).
Newsome J, Elaine Shi, Song D, Perrig A.  2004.  The sybil attack in sensor networks: analysis & defenses. :259-268.
O'Leary DP.  2000.  Symbiosis between Linear Algebra and Optimization. Journal of Computational and Applied Mathematics. 123:447-465.

Pages