Publications

Export 7148 results:
[ Author(Asc)] Title Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
B
Basili VR.  2010.  Learning Through Application: The Maturing ofthe QIP in the SEL. Making Software: What Really Works, and Why We Believe ItMaking Software: What Really Works, and Why We Believe It. :65-65.
Basili VR, Zelkowitz MV, Layman L, Dangle K, Diep M.  2010.  Obtaining valid safety data for software safety measurement and process improvement. Proceedings of the 2010 ACM-IEEE International Symposium on Empirical Software Engineering and Measurement. :46:1–46:4-46:1–46:4.
Basili VR.  2001.  Editorial: Open source and empirical software engineering. Empirical Software Engineering. 6(3):193-194.
Basili VR.  2006.  The past, present, and future of experimental software engineering. Journal of the Brazilian Computer Society. 12(3):7-12.
Basili VR, Zelkowitz MV.  1978.  Analyzing medium-scale software development. Proceedings of the 3rd international conference on Software engineering. :116-123.
Basili VR.  2005.  Using measurement to build core competencies in software. Seminar sponsored by Data and Analysis Center for Software.
Basili VR, Zelkowitz MV, McGarry F, Page J, Waligora S, Pajerski R.  1995.  SEL's software process improvement program. Software, IEEE. 12(6):83-87.
Basili VR.  2005.  Evolving and packaging reading technologies. Foundations of Empirical Software Engineering: The Legacy of Victor R. BasiliFoundations of Empirical Software Engineering: The Legacy of Victor R. Basili. 1:362-362.
Basili VR, Zelkowitz MV.  1979.  Measuring software development characteristics in the local environment. Computers & Structures. 10(1–2):39-43.
Basili VR, Turner AJ.  2005.  Iterative enhancement: a practical technique for software development. Foundations of Empirical Software Engineering: The Legacy of Victor R. BasiliFoundations of Empirical Software Engineering: The Legacy of Victor R. Basili. 1:28-28.
Bartholomew JC, Pearson AD, Stenseth NC, LeDuc JW, Hirschberg DL, Colwell RR.  2015.  Building Infectious Disease Research Programs to Promote Security and Enhance Collaborations with Countries of the Former Soviet Union. Frontiers in Public Health. 35361632
Bartholomeu DC, Silva RA, Galvão LMC, El-Sayed NM, Donelson JE, Teixeira SMR.  2002.  Trypanosoma cruzi: RNA structure and post-transcriptional control of tubulin gene expression. Experimental Parasitology. 102(3-4):123-133.
Bartholomeu D, El-Sayed NM, Melville SE.  2004.  Sequencing Strategies for Parasite Genomes. METHODS IN MOLECULAR BIOLOGY-CLIFTON THEN TOTOWA-. 270:1-16.
Barrett L, Davis A, Dorr BJ.  2001.  Interpretation of Compound Nominals Using WordNet. Computational Linguistics and Intelligent Text ProcessingComputational Linguistics and Intelligent Text Processing. 2004:169-181.
Barrett C, Beckman R, Bisset K, Chen J, DuBois T, Eubank S, Kumar AVS, Lewis B, Marathe MV, Srinivasan A et al..  2012.  Optimizing epidemic protection for socially essential workers. Proceedings of the 2nd ACM SIGHIT International Health Informatics Symposium. :31-40.
Barrett C, Cook D, Hicks G, Faber V, Marathe A, Marathe M, Srinivasan A, Sussmann Y, Thornquist H.  2001.  Experimental Analysis of Algorithms for Bilateral-Contract Clearing Mechanisms Arising in Deregulated Power Industry. Algorithm EngineeringAlgorithm Engineering. 2141:172-184.
Baroff J, Simon R, Gilman F, Shneiderman B.  1987.  Direct manipulation user interfaces for expert systems. Expert systems: the user interfaceExpert systems: the user interface. :99-125.
Barni R, Comba J, Varshney A.  2009.  Salient Clustering for View-dependent Multiresolution Rendering. Computer Graphics and Image Processing (SIBGRAPI), 2009 XXII Brazilian Symposium on. :56-63.
Barlow JB, Monahemi MM, O'Leary DP.  1992.  Constrained Matrix Sylvester Equations. SIAM Journal on Matrix Analysis and Applications. 13(1):1-9.
Barfourosh AA, Nezhad HRM, Anderson M, Perlis D.  2002.  ALLI: An Information Integration System Based on Active Logic Framework. Proceedings of the Third International Conference on Management Information Systems, Greece. :339-348.
Barequet G, Duncan CA, Goodrich MT, Kumar S, Pop M.  1999.  Efficient perspective-accurate silhouette computation. Proceedings of the fifteenth annual symposium on Computational geometry. :417-418.
Barash V, Smith M, Getoor L, Welser HT.  2009.  Distinguishing knowledge vs social capital in social media with roles and context. Proceedings of the ICWSM. 9
[Anonymous].  2011.  GameSec'11: Proceedings of the Second international conference on Decision and Game Theory for Security.
Baras JS, Atallah GC, Ball M, Goli S, Karne RK, Kelley S, Kumar H, Plaisant C, Roussopoulos N, Schneiderman B et al..  1995.  Next generation network management technology. AIP Conference Proceedings. 325(1):75-82.
Baras JS, Ball M, Karne RK, Kelley S, Jang KD, Plaisant C, Roussopoulos N, Stathatos K, Vakhutinsky A, Jaibharat V et al..  1996.  Integrated network management of hybrid networks. AIP Conference Proceedings. 361(1):345-350.

Pages