Publications
Export 7151 results:
Author [ Title] Type Year Filters: End-zero-hit-queries-query-previews-nasa%E2%80%99s-global-change-master-directory is [Clear All Filters]
2011. Analyzing Incident Management Event Sequences with Interactive Visualization. Transportation Research Board 90th Annual Meeting Compendium of Papers.
1993. Analyzing concurrent systems using the Concurrency Workbench. Functional Programming, Concurrency, Simulation and Automated Reasoning. :129-144.
2000. Analyzing Action Representations. Algebraic Frames for the Perception-Action CycleAlgebraic Frames for the Perception-Action Cycle. 1888:1-21.
2009. Analytical Description of Quasi-Random Magnetization Relaxation to Equilibrium. Magnetics, IEEE Transactions on. 45(11):5224-5227.
2002. Analysis of the NICE Application Layer Multicast Protocol. Technical Reports from UMIACS, UMIACS-TR-2002-60.
2003. An Analysis of the Layer 2 Handoff costs in Wireless Local Area Networks. ACM Computer Communications Review. 33(2)
2011. Analysis of SystemC actor networks for efficient synthesis. ACM Trans. Embed. Comput. Syst.. 10(2):18:1-18:34.
2002. Analysis of stage-specific gene expression in the bloodstream and the procyclic form of Trypanosoma brucei using a genomic DNA-microarray. Molecular and Biochemical Parasitology. 123(2):115-123.
2003. An Analysis of Smoothing Effects of Upwinding Strategies for the Convection-Diffusion Equation. SIAM Journal on Numerical Analysis. 40(1):254-281.
2006. Analysis of Shock Motion in a Compression Ramp Configuration using DNS data. Bulletin of the American Physical Society.
1983. Analysis of Relaxation Processes: the Two Node, Two Label Case. IEEE Transactions on Systems, Man, and Cybernetics. SMC-13:618-623.
2003. Analysis of particular phononic structures using single integral equations. The Journal of the Acoustical Society of America. 113(4):2284-2284.
2007. Analysis of Nonlinear Collusion Attacks on Fingerprinting Systems for Compressed Multimedia. Image Processing, 2007. ICIP 2007. IEEE International Conference on. 2:II-133-II-136-II-133-II-136.
2004. Analysis of dataflow programs with interval-limited data-rates. Computer Systems: Architectures, Modeling, and Simulation. :507-518.
1988. Analysis of competition-based spreading activation in connectionist models. International journal of man-machine studies. 28(1):77-97.
2009. Analysis of clonally related environmental Vibrio cholerae O1 El Tor isolated before 1992 from Varanasi, India reveals origin of SXT‐ICEs belonging to O139 and O1 serogroups. Environmental Microbiology Reports. 2(1):50-57.
2001. Analysis of attacks on SDMI audio watermarks. Acoustics, Speech, and Signal Processing, 2001. Proceedings. (ICASSP '01). 2001 IEEE International Conference on. 3:1369-1372vol.3-1369-1372vol.3.
2002. Analysis of approximate nearest neighbor searching with clustered point sets. Data Structures, Near Neighbor Searches, and MethodologyData Structures, Near Neighbor Searches, and Methodology. 59:105-123.
2000. The analysis of a simple k-means clustering algorithm. Proceedings of the sixteenth annual symposium on Computational geometry. :100-109.
2001. The analysis of a probabilistic approach to nearest neighbor searching. Algorithms and Data Structures. :276-286.
2001. Analysis of a donor gene region for a variant surface glycoprotein and its expression site in African trypanosomes. Nucleic acids research. 29(10):2012-2012.