Publications

Export 604 results:
Author Title [ Type(Asc)] Year
Filters: First Letter Of Last Name is J  [Clear All Filters]
Journal Articles
Stantchev G, Juba D, Dorland W, Varshney A.  2009.  Using Graphics Processors for High-Performance Computation and Visualization of Plasma Turbulence. Computing in Science Engineering. 11(2):52-59.
Jensen CS, Mark L, Roussopoulos N, Sells T.  1993.  Using differential technlques to efficiently support transaction time. The VLDB JournalVLDB Journal. 2(1):75-111.
Lazar J, Jones A, Bessiere K, Ceaparu I, Shneiderman B.  2005.  User Frustration with Technology in the Workplace (2004). Institute for Systems Research Technical Reports.
Jog N, Shneiderman B.  1994.  User Controlled Smooth Zooming for Information Visualization. Institute for Systems Research Technical Reports.
Alivisatos A.P, Blaser M.J, Brodie E.L, Chun M., Dangl J.L, Donohue T.J, Dorrestein P.C, Gilbert J.A, Green J.L, Jansson J.K et al..  2015.  A unified initiative to harness Earth's microbiomes. Science. (62607551614341176):507-508.
Alter TD, Jacobs DW.  1998.  Uncertainty propagation in model-based recognition. International Journal of Computer Vision. 27(2):127-159.
Johnson B, Shneiderman B.  1993.  Treemaps. Sparks of innovation in human-computer interaction. 284:309-309.
Zhuolin Jiang, Lin Z, Davis LS.  2010.  A tree-based approach to integrated action localization, recognition and segmentation. ECCV Workshops.
Everett LJ, Jensen ST, Hannenhalli S.  2011.  Transcriptional Regulation Via TF-Modifying Enzymes: An Integrative Model-Based Analysis. Nucleic Acids ResearchNucl. Acids Res.. 39(12):e78-e78-e78-e78.
Martin, M.P, Weirs G, Candler GV, Piomelli U, Johnson H, Nompelis I.  2000.  Toward the large-eddy simulation over a hypersonic elliptical cross-section cone. AIAA Paper No. 00-2311.
Regier JC, Zwick A, Cummings MP, Kawahara AY, Cho S, Weller S, Roe A, Baixeras J, Brown JW, Parr C et al..  2009.  Toward reconstructing the evolution of advanced moths and butterflies (Lepidoptera: Ditrysia): an initial molecular study. BMC Evol Biol. 9:280-280.
Berkman O, JaJa JF, Krishnamurthy S, Thurimella R, Vishkin U.  1994.  Top-Bottom Routing around a Rectangle is as Easy as Computing Prefix Minima. SIAM Journal on Computing. 23(3):449-465.
Ward NL, Challacombe JF, Janssen PH, Henrissat B, Coutinho PM, Wu M, Xie G, Haft DH, Sait M, Badger J et al..  2009.  Three genomes from the phylum Acidobacteria provide insight into the lifestyles of these microorganisms in soils.. Appl Environ Microbiol. 75(7):2046-56.
Johnson B, Shneiderman B, Baker MJ, Eick SG.  1999.  TennisViewer: A Browser for Competition Trees. Readings in information visualization: using vision to think. :149-149.
Banakar V, Constantin de Magny G, Jacobs J, Murtugudde R, Huq A, J. Wood R, Colwell RR.  2012.  Temporal and Spatial Variability in the Distribution of Vibrio vulnificus in the Chesapeake Bay: A Hindcast Study. EcoHealth. :1-12.
Banakar V, Constantin de Magny G, Jacobs J, Murtugudde R, Huq A, J. Wood R, Colwell RR.  2012.  Temporal and Spatial Variability in the Distribution of Vibrio vulnificus in the Chesapeake Bay: A Hindcast Study. EcoHealth. :1-12.
Kimes NE, Grim CJ, Johnson WR, Hasan NA, Tall BD, Kothary MH, Kiss H, Munk CA, Tapia R, Green L et al..  2011.  Temperature regulation of virulence factors in the pathogen Vibrio coralliilyticus. The ISME Journal. 6(4):835-846.
Song S, JaJa JF.  2009.  Techniques to audit and certify the long-term integrity of digital archives. International Journal on Digital Libraries. 10(2):123-131.
Shi Q, JaJa JF.  2005.  Techniques for indexing and querying temporal observations for a collection of objects. Algorithms and Computation. :822-834.
Chakrabarti C, JaJa JF.  1990.  Systolic architectures for the computation of the discrete Hartley and the discrete cosine transforms based on prime factor decomposition. Computers, IEEE Transactions on. 39(11):1359-1368.
Kolagotla RK, Yu SS, JaJa JF.  1993.  Systolic architectures for finite-state vector quantization. The Journal of VLSI Signal Processing. 5(2):249-259.
Snelick R, JaJa JF, Kacker R, Lyon G.  2006.  Synthetic‐perturbation techniques for screening shared memory programs. Software: Practice and Experience. 24(8):679-701.
Alexander DS, Hicks MW, Kakkar P, Keromytis AD, Shaw M, Moore JT, Gunter CA, Jim T, Nettles SM, Smith JM.  1998.  The switchware active network implementation. The ML Workshop, International Conference on Functional Programming (ICFP).
Jiwnani K, Zelkowitz MV.  2004.  Susceptibility matrix: a new aid to software auditing. Security Privacy, IEEE. 2(2):16-21.
Bajcsy P, Cardone A, Chalfoun J, Halter M, Juba D, Kociolek M, Majurski M, Peskin A, Simon C, Simon M et al..  2015.  Survey statistics of automated segmentations applied to optical imaging of mammalian cells. BMC bioinformatics. 16:1.

Pages