Publications

Export 7151 results:
Author Title [ Type(Desc)] Year
Journal Articles
Ouhammouch M, Langham GE, Hausner W, Simpson AJ, El-Sayed NM, Geiduschek PE.  2005.  Promoter architecture and response to a positive regulator of archaeal transcription. Molecular Microbiology. 56(3):625-637.
Hannenhalli S, Levy S.  2001.  Promoter prediction in the human genome. Bioinformatics. 17(Suppl 1):S90-S96-S90-S96.
Froehlich J.  2009.  Promoting energy efficient behaviors in the home through feedback: The role of human-computer interaction. Proc. HCIC Workshop. 9
Froehlich J.  2009.  Promoting energy efficient behaviors in the home through feedback: The role of human-computer interaction. Proc. HCIC Workshop. 9
Plaisant C, Fekete J-D, Grinstein G.  2008.  Promoting Insight-Based Evaluation of Visualizations: From Contest to Benchmark Repository. Visualization and Computer Graphics, IEEE Transactions on. 14(1):120-134.
Shneiderman B.  2002.  Promoting universal usability with multi-layer interface design. ACM SIGCAPH Computers and the Physically Handicapped. (73-74):1-8.
Ateniese G, Kamara S, Katz J.  2009.  Proofs of storage from homomorphic identification protocols. Advances in Cryptology–ASIACRYPT 2009. :319-333.
Hjaltason GR, Samet H.  2003.  Properties of embedding methods for similarity searching in metric spaces. Pattern Analysis and Machine Intelligence, IEEE Transactions on. 25(5):530-549.
Basu MK, Selengut JD, Haft DH.  2011.  ProPhylo: partial phylogenetic profiling to guide protein family construction and assignment of biological process.. BMC Bioinformatics. 12:434.
Shneiderman B.  1993.  Protecting rights in user interface designs. Sparks of innovation in human-computer interaction. :351-351.
Khan Z, Bloom JS, Garcia BA, Singh M, Kruglyak L.  2009.  Protein quantification across hundreds of experimental conditions. Proceedings of the National Academy of Sciences. 106(37):15544-15548.
Spring N, Wetherall D.  2000.  A protocol-independent technique for eliminating redundant network traffic. ACM SIGCOMM Computer Communication Review. 30(4):87-95.
Sane N, Ford J, Harris AI, Bhattacharyya SS.  2012.  Prototyping scalable digital signal processing systems for radio astronomy using dataflow models. Radio Science. 47(3):n/a-n/a.
Kumar VSA, Marathe MV, Parthasarathy S, Srinivasan A.  2007.  Provable algorithms for joint optimization of transport, routing and MAC layers in wireless ad hoc networks. Proc. DialM-POMC Workshop on Foundations of Mobile Computing.
Anil Kumar VS, Marathe MV, Parthasarathy S, Srinivasan A, Zust S.  2006.  Provable algorithms for parallel generalized sweep scheduling. Journal of Parallel and Distributed Computing. 66(6):807-821.
Kuah B-T, Shneiderman B.  1998.  Providing Advisory Notices for UNIX Command Users: Design, Implementation, and Empirical Evaluations. Technical Reports of the Computer Science Department.
Miller M, Perlis D.  1987.  Proving self-utterances. Journal of Automated Reasoning. 3(3):329-338.
Daescu O, Luo J, Mount D.  2006.  Proximity problems on line segments spanned by points. Computational Geometry. 33(3):115-129.
Bernstein LB, Mount SM, Weiner AM.  1983.  Pseudogenes for human small nuclear RNA U3 appear to arise by integration of self-primed reverse transcripts of the RNA into new chromosomal sites. CellCell. 32(2):461-472.
Brooks R, Sheppard S, Shneiderman B.  1985.  The Psychology of Program Documentation. Conference on Software Maintenance, 1985, Sheraton Inn Washington-Northwest, November 11-13, 1985. :191-191.
Everett L, Vo A, Hannenhalli S.  2009.  PTM-Switchboard--a database of posttranslational modifications of transcription factors, the mediating enzymes and target genes. Nucleic Acids ResearchNucleic Acids Research. 37(Database):D66-D71-D66-D71.
Katz J.  2010.  Public-Key Cryptography. Handbook of Information and Communication Security. :21-34.
Snellman EA, Sullivan ER, Colwell RR.  2002.  Purification and properties of the extracellular lipase, LipA, of Acinetobacter sp. RAG‐1. European Journal of Biochemistry. 269(23):5771-5779.
Earl C, Might M, Van Horn D.  2010.  Pushdown Control-Flow Analysis of Higher-Order Programs. arXiv:1007.4268 [cs].
Perlis D.  1991.  Putting One's Foot in One's Head–Part I: Why. Noûs. :435-455.

Pages