Publications

Export 7148 results:
[ Author(Asc)] Title Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
B
Basili VR.  2010.  Learning Through Application: The Maturing ofthe QIP in the SEL. Making Software: What Really Works, and Why We Believe ItMaking Software: What Really Works, and Why We Believe It. :65-65.
Basili VR, Lindvall M, Shull F.  2002.  A light-weight process for capturing and evolving defect reduction experience. Engineering of Complex Computer Systems, 2002. Proceedings. Eighth IEEE International Conference on. :129-132.
Basili VR, Zelkowitz MV, Layman L, Dangle K, Diep M.  2010.  Obtaining valid safety data for software safety measurement and process improvement. Proceedings of the 2010 ACM-IEEE International Symposium on Empirical Software Engineering and Measurement. :46:1–46:4-46:1–46:4.
Basili VR.  2001.  Editorial: Open source and empirical software engineering. Empirical Software Engineering. 6(3):193-194.
Basili VR, Zelkowitz MV.  1978.  Analyzing medium-scale software development. Proceedings of the 3rd international conference on Software engineering. :116-123.
Basili VR.  2006.  The past, present, and future of experimental software engineering. Journal of the Brazilian Computer Society. 12(3):7-12.
Basili VR, Zelkowitz MV, McGarry F, Page J, Waligora S, Pajerski R.  1995.  SEL's software process improvement program. Software, IEEE. 12(6):83-87.
Basili VR, Zelkowitz MV.  1979.  Measuring software development characteristics in the local environment. Computers & Structures. 10(1–2):39-43.
Basili VR.  2005.  Evolving and packaging reading technologies. Foundations of Empirical Software Engineering: The Legacy of Victor R. BasiliFoundations of Empirical Software Engineering: The Legacy of Victor R. Basili. 1:362-362.
Basili VR.  2005.  Using measurement to build core competencies in software. Seminar sponsored by Data and Analysis Center for Software.
Bartholomew JC, Pearson AD, Stenseth NC, LeDuc JW, Hirschberg DL, Colwell RR.  2015.  Building Infectious Disease Research Programs to Promote Security and Enhance Collaborations with Countries of the Former Soviet Union. Frontiers in Public Health. 35361632
Bartholomeu D, El-Sayed NM, Melville SE.  2004.  Sequencing Strategies for Parasite Genomes. METHODS IN MOLECULAR BIOLOGY-CLIFTON THEN TOTOWA-. 270:1-16.
Bartholomeu DC, Silva RA, Galvão LMC, El-Sayed NM, Donelson JE, Teixeira SMR.  2002.  Trypanosoma cruzi: RNA structure and post-transcriptional control of tubulin gene expression. Experimental Parasitology. 102(3-4):123-133.
Barrett L, Davis A, Dorr BJ.  2001.  Interpretation of Compound Nominals Using WordNet. Computational Linguistics and Intelligent Text ProcessingComputational Linguistics and Intelligent Text Processing. 2004:169-181.
Barrett C, Cook D, Hicks G, Faber V, Marathe A, Marathe M, Srinivasan A, Sussmann Y, Thornquist H.  2001.  Experimental Analysis of Algorithms for Bilateral-Contract Clearing Mechanisms Arising in Deregulated Power Industry. Algorithm EngineeringAlgorithm Engineering. 2141:172-184.
Barrett C, Beckman R, Bisset K, Chen J, DuBois T, Eubank S, Kumar AVS, Lewis B, Marathe MV, Srinivasan A et al..  2012.  Optimizing epidemic protection for socially essential workers. Proceedings of the 2nd ACM SIGHIT International Health Informatics Symposium. :31-40.
Baroff J, Simon R, Gilman F, Shneiderman B.  1987.  Direct manipulation user interfaces for expert systems. Expert systems: the user interfaceExpert systems: the user interface. :99-125.
Barni R, Comba J, Varshney A.  2009.  Salient Clustering for View-dependent Multiresolution Rendering. Computer Graphics and Image Processing (SIBGRAPI), 2009 XXII Brazilian Symposium on. :56-63.
Barlow JB, Monahemi MM, O'Leary DP.  1992.  Constrained Matrix Sylvester Equations. SIAM Journal on Matrix Analysis and Applications. 13(1):1-9.
Barfourosh AA, Nezhad HRM, Anderson M, Perlis D.  2002.  ALLI: An Information Integration System Based on Active Logic Framework. Proceedings of the Third International Conference on Management Information Systems, Greece. :339-348.
Barequet G, Duncan CA, Goodrich MT, Kumar S, Pop M.  1999.  Efficient perspective-accurate silhouette computation. Proceedings of the fifteenth annual symposium on Computational geometry. :417-418.
Barash V, Smith M, Getoor L, Welser HT.  2009.  Distinguishing knowledge vs social capital in social media with roles and context. Proceedings of the ICWSM. 9
Baras JS, Ball M, Karne RK, Kelley S, Jang KD, Plaisant C, Roussopoulos N, Stathatos K, Vakhutinsky A, Jaibharat V et al..  1996.  Integrated network management of hybrid networks. AIP Conference Proceedings. 361(1):345-350.
Baras JS, Ball M, Karne RK, Kelley S, Jang KD, Plaisant C, Roussopoulos N, Stathatos K, Vakhutinsky A, Valluri J.  1996.  Hybrid network management (communication systems). 16th AIAA International Communications Satellite Systems Conference.
Baras JS, Katz J, Altman E.  2011.  Decision and Game Theory for Security: Second International Conference, GameSec 2011, College Park, MD, Maryland, USA, November 14-15, 2011, Proceedings.

Pages