Publications

Export 7151 results:
Author [ Title(Desc)] Type Year
Filters: Genomic-analysis-icevchban8-atypical-genetic-element-vibrio-cholerae is   [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
P
Pratt TW, Zelkowitz MV.  1984.  Programming languages: design and implementation.
Zelkowitz MV.  2001.  Programming languages: designing and implementation. BeOing: Electronic Industry Press. 6:46-65.
Vishkin U.  1998.  Project for Developing Computer Science Agenda(s) for High-Performance Computing: An Organizer's Summary. UMIACS-TR-94-129
Marchionini G, Haas S, Shneiderman B, Plaisant C, Hert CA.  2004.  Project highlight: toward the statistical knowledge network. Proceedings of the 2004 annual national conference on Digital government research. :125:1–125:2-125:1–125:2.
Cable JH, Ordonez JF, Chintalapani G, Plaisant C.  2004.  Project portfolio earned value management using treemaps. Proceedings of the Project Management Institute Research Conference.
Basri R, Jacobs DW.  2001.  Projective alignment with regions. Pattern Analysis and Machine Intelligence, IEEE Transactions on. 23(5):519-527.
Xu Y, Ji H, Fermüller C.  2006.  A Projective Invariant for Textures. 2006 IEEE Computer Society Conference on Computer Vision and Pattern Recognition. 2:1932-1939.
Roitman H, Gal A, Raschid L.  2006.  ProMo-A Scalable and Efficient Framework for Online Data Delivery. Lecture notes in computer science. 4032:359-359.
Ouhammouch M, Langham GE, Hausner W, Simpson AJ, El-Sayed NM, Geiduschek PE.  2005.  Promoter architecture and response to a positive regulator of archaeal transcription. Molecular Microbiology. 56(3):625-637.
Hannenhalli S, Levy S.  2001.  Promoter prediction in the human genome. Bioinformatics. 17(Suppl 1):S90-S96-S90-S96.
Froehlich J.  2009.  Promoting energy efficient behaviors in the home through feedback: The role of human-computer interaction. Proc. HCIC Workshop. 9
Froehlich J.  2009.  Promoting energy efficient behaviors in the home through feedback: The role of human-computer interaction. Proc. HCIC Workshop. 9
Plaisant C, Fekete J-D, Grinstein G.  2008.  Promoting Insight-Based Evaluation of Visualizations: From Contest to Benchmark Repository. Visualization and Computer Graphics, IEEE Transactions on. 14(1):120-134.
Shneiderman B, Churchill E, Fischer G, Goldberg K.  2009.  Promoting social creativity: a component of a national initiative for social participation. Proceedings of the seventh ACM conference on Creativity and cognition. :7-8.
Shneiderman B.  2002.  Promoting universal usability with multi-layer interface design. ACM SIGCAPH Computers and the Physically Handicapped. (73-74):1-8.
Shneiderman B.  2005.  Promoting Universal Usability with Multi-Layer Interface Design (2003). Institute for Systems Research Technical Reports.
Ateniese G, Kamara S, Katz J.  2009.  Proofs of storage from homomorphic identification protocols. Advances in Cryptology–ASIACRYPT 2009. :319-333.
Reggia JA.  1987.  Properties of a competition-based activation mechanism in neuromimetic network models. Proceedings of the First International Conference on Neural Networks.
Hjaltason GR, Samet H.  2003.  Properties of embedding methods for similarity searching in metric spaces. Pattern Analysis and Machine Intelligence, IEEE Transactions on. 25(5):530-549.
Basu MK, Selengut JD, Haft DH.  2011.  ProPhylo: partial phylogenetic profiling to guide protein family construction and assignment of biological process.. BMC Bioinformatics. 12:434.
Minker J, Perlis D.  1984.  Protected circumscription. Proc. Workshop on Non-Monotonic Reasoning. :337-343.
Shneiderman B.  1993.  Protecting rights in user interface designs. Sparks of innovation in human-computer interaction. :351-351.
Khan Z, Bloom JS, Garcia BA, Singh M, Kruglyak L.  2009.  Protein quantification across hundreds of experimental conditions. Proceedings of the National Academy of Sciences. 106(37):15544-15548.
Sabnis C, Cukier M, Ren J, Rubel P, Sanders WH, Bakken DE, Karr D.  1999.  Proteus: a flexible infrastructure to implement adaptive fault tolerance in AQuA. :149-168.
Spring N, Wetherall D.  2000.  A protocol-independent technique for eliminating redundant network traffic. ACM SIGCOMM Computer Communication Review. 30(4):87-95.

Pages