Publications
Export 7151 results:
Author [ Title] Type Year Filters: Some-history-conjugate-gradient-and-lanczos-algorithms-1948%E2%80%931976 is [Clear All Filters]
2000. Assessment of Temperature Fluctuation Models for RANS Simulations of Hypersonic Reacting Flows. 38th AIAA Aerospace Sciences Meeting and Exhibit.
2001. Assessment of the k-epsilon turbulence model for compressible flows using direct simulation data. 39th AIAA Aerospace Sciences Meeting and Exhibit.
2007. Assessment of WENO methods with shock-confining filtering for LES of compressible turbulence. AIAA Paper 2007. 4198
2010. Assessor error in stratified evaluation. Proceedings of the 19th ACM international conference on Information and knowledge management. :539-548.
2009. Assigning cameras to subjects in video surveillance systems. Robotics and Automation, 2009. ICRA '09. IEEE International Conference on. :837-843.
1986. Assignment and scheduling in parallel matrix factorization. Linear Algebra and its Applications. 77:275-299.
2011. Associating the visual representation of user interfaces with their internal structures and metadata. Proceedings of the 24th annual ACM symposium on User interface software and technology. :245-256.
2007. Association of Vibrio Cholerae O1 El Tor and O139 Bengal with the Copepods Acartia Tonsa and Eurytemora Affinis. Applied and Environmental MicrobiologyAppl. Environ. Microbiol.. 73(24):7926-7933.
2000. An assumptive logic programming methodology for parsing. Tools with Artificial Intelligence, 2000. ICTAI 2000. Proceedings. 12th IEEE International Conference on. :11-18.
2005. Asymptotically Optimal Quantum Circuits for d-Level Systems. Physical Review LettersPhys. Rev. Lett.. 94(23):230502-230502.
2008. Athos: Efficient Authentication of Outsourced File Systems: Information Security. Lecture Notes in Computer Science. :80-96.
1994. An Atlas of Drosophila Genes: Sequences and Molecular Features. Journal of Heredity. 85(6):495-496.
2009. Attacking cryptographic schemes based on "perturbation polynomials". Proceedings of the 16th ACM conference on Computer and communications security. :1-10.
1999. Attacks on digital watermarks. Signals, Systems, and Computers, 1999. Conference Record of the Thirty-Third Asilomar Conference on. 2:1508-1512vol.2-1508-1512vol.2.
2006. Attribute Grammar-Based Event Recognition and Anomaly Detection. Computer Vision and Pattern Recognition Workshop, 2006. CVPRW '06. Conference on. :107-107.
2010. Audio visual scene analysis using spherical arrays and cameras.. The Journal of the Acoustical Society of America. 127(3):1979-1979.
2003. AUDIO-P2. 1: PITCH AND TIMBRE MANIPULATIONS USING CORTICAL REPRESENTATION OF SOUND. IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS SPEECH AND SIGNAL PROCESSING. 5
2000. An audio-video front-end for multimedia applications. 2000 IEEE International Conference on Systems, Man, and Cybernetics. 2:786-791vol.2-786-791vol.2.
2003. Augmented intelligibility in simultaneous multi-talker environments. Proc. International Conference on Auditory Display (ICAD’03). :71-74.
2005. An Augmented Visual Query Mechanism for Finding Patterns in Time Series Data (2002). Institute for Systems Research Technical Reports.