Journal Articles

Pages

Sommer DD, Delcher AL, Salzberg SL, Pop M. Minimus: a fast, lightweight genome assembler. BMC Bioinformatics. 2007;8(1):64.
Ghanem NM, Doermann D, Davis LS, DeMenthon D. Mining tool for surveillance video. SPIE 16th International Symposium on Electronic Imaging, Storage and Retrieval Methods and Applications for Multimedia. 2004;5307:259-270.
Cheng ST, Hwang SI, Agrawala AK. Mission-oriented replication of periodic tasks in real-time distributed systems. Computer Science Technical Report Series; Vol. CS-TR-3256. 1994:24.
Chellappa R, Sankaranarayanan AC, Veeraraghavan A. Mixed state models for automatic target recognition and behavior analysis in video sequences. Proceedings of SPIE. 2008;6967(1):69670Q-11-69670Q-11.
Cuntoor NP, Chellappa R. Mixed-state models for nonstationary multiobject activities. EURASIP J. Appl. Signal Process.. 2007;2007(1):106.
Nath S, Deshpande A, Gibbons PB, Seshan S. MobiCom poster: mining a world of smart sensors. SIGMOBILE Mob. Comput. Commun. Rev.. 2003;7(1):34-36.
Han B, Hui P, Srinivasan A. Mobile data offloading in metropolitan area networks. SIGMOBILE Mob. Comput. Commun. Rev.. 2010;14(4):28-30.
Han B, Hui P, Kumar VS, Marathe MV, Shao J, Srinivasan A. Mobile Data Offloading through Opportunistic Communications and Social Participation. Mobile Computing, IEEE Transactions on. 2012;11(5):821-834.
Liu X, Doermann D. Mobile Retriever: Access to Digital Documents from their Physical Source. International Journal on Document Analysis and Recognition. 2008;11(1):19-27.
Baker K, Bloodgood M, Dorr BJ, Callison-Burch C, Filardo NW, Piatko C, et al. Modality and Negation in SIMT Use of Modality and Negation in Semantically-Informed Syntactic MT. Computational Linguistics. 2012:1-48.
Peng T, Gupta SK. Model and algorithms for point cloud construction using digital projection patterns. Journal of Computing and Information Science in Engineering. 2007;7:372.
Sundaresan A, Chellappa R. Model Driven Segmentation of Articulating Humans in Laplacian Eigenspace. Pattern Analysis and Machine Intelligence, IEEE Transactions on. 2008;30(10):1771-1785.
Seipel D, Minker J, Ruiz C. Model generation and state generation for disjunctive logic programs. The Journal of Logic Programming. 1997;32(1):49-69.
Fernandez JA, Grant J, Minker J. Model theoretic approach to view updates in deductive databases. Journal of Automated Reasoning. 1996;17(2):171-197.
Deshpande A, Guestrin C, Madden S, Hellerstein J, Hong W. Model-based approximate querying in sensor networks. The VLDB Journal. 2005;14(4):417-443.
Kedilaya S, Plishker W, Purkovic A, Johnson B, Bhattacharyya SS. Model-based precision analysis and optimization for digital signal processors. Proceedings of the European Signal Processing Conference. 2011:506-510.
Irizarry RA, Corrada Bravo H. Model-based quality assessment and base-calling for second-generation sequencing data. Johns Hopkins University, Dept. of Biostatistics Working Papers. 2009:184.
Bultan T, Gerber R, Pugh W. Model-checking concurrent systems with unbounded integer variables: symbolic representations, approximations, and experimental results. ACM Transactions on Programming Languages and SystemsACM Trans. Program. Lang. Syst.. 1999;21(4):747-789.
Varna AL, M. Wu. Modeling and Analysis of Correlated Binary Fingerprints for Content Identification. Information Forensics and Security, IEEE Transactions on. 2011;6(3):1146-1159.
Kalaiah A, Varshney A. Modeling and Rendering of Points with Local Geometry. IEEE Transactions on Visualization and Computer Graphics. 2003;9(1):30-42.
Rosenfeld SN, Rus I, Cukier M. Modeling and Simulation of the Escalation Archetype in Computer Security. Symposium on Simulation Software Security (SSSS 06). 2006;38(2):495.
Bowen D, Mayergoyz ID, Zhang Z, McAvoy P, Krafft C, Kroop D. Modeling and Testing of Ethernet Transformers. Magnetics, IEEE Transactions on. 2009;45(10):4793-4796.
Elseaidy W. Modeling and verifying active structural control systems. Science of Computer Programming. 1997;29:99-122.
Cleaveland R, Natarajan V, Sims S, Luettgen G. Modeling and verifying distributed systems using priorities: A case study. Software - Concepts and Tools. 1996;17(2):50-62.
Weiss K, De Floriani L. Modeling and visualization approaches for time-varying volumetric data. Advances in Visual Computing. 2008:1000-1010.
Sankaranarayanan AC, Patro R, Turaga P, Varshney A, Chellappa R. Modeling and visualization of human activities for multicamera networks. EURASIP Journal on Image and Video Processing. 2009;2009.
Feamster N, Rexford J. Modeling BGP route selection within an AS. IEEE/ACM Transactions on Networking. 2004.
Reggia JA, Peng Y. Modeling diagnostic reasoning: a summary of parsimonious covering theory. Computer methods and programs in biomedicine. 1987;25(2):125-134.
Weiss K, De Floriani L, Hagen H. Modeling Multiresolution 3D Scalar Fields through Regular Simplex Bisection. Scientific Visualization: Interactions, Features, Metaphors. 2011;2:360-377.
Ko DI, Bhattacharyya SS. Modeling of block-based DSP systems. The Journal of VLSI Signal Processing. 2005;40(3):289-299.
Motesharrei S, Rivas J, Kalnay E, Asrar GR, Busalacchi AJ, Cahalan RF, et al. Modeling Sustainability: Population, Inequality, Consumption, and Bidirectional Coupling of the Earth and Human Systems. National Science Review. 2016:nww081.
Brown DG, Page SE, Riolo R, Rand W. Modeling the Effects of Greenbelts at the Urban-Rural Fringe. Proceedings of IEMSS 2002. 2002:190-195.
Valancius V, Lumezanu C, Feamster N, Johari R, Vazirani VV. Modeling Tiered Pricing in the Internet Transit Market. Arxiv preprint arXiv:1112.3740. 2011.
Eubank S, Guclu H, Kumar AV, Marathe MV, Srinivasan A, Toroczkai Z|, et al. Modelling disease outbreaks in realistic urban social networks. Nature. 2004;429(6988):180-184.
Reggia JA, Berndt RS. Modelling reading aloud and its relevance to acquired dyslexia. Computer methods and programs in biomedicine. 1986;22(1):13-19.
Zhang Z, Kalluri SN, JaJa JF, Liang S, Townshend JR. Models and high-performance algorithms for global BRDF retrieval. Computational Science Engineering, IEEE. 1998;5(4):16-29.
Roussopoulos N, Delis A. Modern client-server DBMS architectures. ACM SIGMOD RecordSIGMOD Rec.. 1991;20(3):52-61.
Shih Y-, Elman H. Modified streamline diffusion schemes for convection-diffusion problems. Computer Methods in Applied Mechanics and Engineering. 1999;174(1-2):137-151.
Srivastava S, Hicks MW, Foster JS, Jenkins P. Modular Information Hiding and Type-Safe Linking for C. IEEE Transactions on Software Engineering. 2008;34(3):357-376.
Wu M, Liu B. Modulation and multiplexing techniques for multimedia data hiding. Proc. of SPIE ITcom’01, SPIE vol. 2001;4518.

Pages