Publications

Export 7148 results:
[ Author(Asc)] Title Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
L
Li Y, Long PM, Srinivasan A.  2001.  Improved Bounds on the Sample Complexity of Learning. Journal of Computer and System Sciences. 62(3):516-527.
Li J, Deshpande A.  2009.  Consensus answers for queries over probabilistic databases. Proceedings of the twenty-eighth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems. :259-268.
Li H, Doermann D.  1998.  Automatic Text Tracking In Digital Videos. Proceedings of IEEE 1998 Workshop on Multimedia Signal Processing. :21-26.
Li H, Doermann D.  2002.  Text Quality Estimation in Digital Video. SPIE Conf. on Document Recognition and Information Retrieval. :232-243.
Li JH, Bhattacharjee B, Yu M, Levy R.  2008.  A scalable key management and clustering scheme for wireless ad hoc and sensor networks. Future Generation Computer Systems. 24(8):860-869.
Li Y, Zheng Y, Doermann D, Jaeger S.  2006.  ANew Algorithm for Detecting Text Line in Handwritten Documents. 10th International Workshop on Frontiers in Handwriting Recognition. :35-40.
Li ST, Ge QJ, Varshney A.  2001.  Web-based interactive design of freeform motions. Proceedings of the ASME 2001 Design Engineering Technical Conferences and Computers and Information in Engineering Conference.
Li R, Chellappa R, Zhou SK.  2009.  Learning multi-modal densities on Discriminative Temporal Interaction Manifold for group activity recognition. Computer Vision and Pattern Recognition, 2009. CVPR 2009. IEEE Conference on. :2450-2457.
Lewinski MK, Bisgrove D, Shinn P, Chen H, Hoffmann C, Hannenhalli S, Verdin E, Berry CC, Ecker JR, Bushman FD.  2005.  Genome-Wide Analysis of Chromosomal Features Repressing Human Immunodeficiency Virus Transcription. Journal of VirologyJ. Virol.. 79(11):6610-6619.
Lewinski MK, Yamashita M, Emerman M, Ciuffi A, Marshall H, Crawford G, Collins F, Shinn P, Leipzig J, Hannenhalli S et al..  2006.  Retroviral DNA Integration: Viral and Cellular Determinants of Target-Site Selection. PLoS PathogPLoS Pathog. 2(6):e60-e60.
Levy S, Hannenhalli S, Workman C.  2001.  Enrichment of Regulatory Signals in Conserved Non-Coding Genomic Sequence. BioinformaticsBioinformatics. 17(10):871-877.
Levy S, Hannenhalli S.  2002.  Identification of transcription factor binding sites in the human genome sequence. Mammalian Genome. 13(9):510-514.
Levow G-A, Oard D, Resnik P.  2001.  Rapidly retargetable interactive translingual retrieval. Proceedings of the first international conference on Human language technology research. :1-5.
Levow G-A, Oard D, Resnik P.  2005.  Dictionary-based techniques for cross-language information retrieval. Information Processing & Management. 41(3):523-547.
Levow GA, Oard D, Resnik P.  2005.  Dictionary-based cross-language retrieval. Information Processing and Management. 41:523-547.
Levow GA, Dorr BJ, Lin D.  2000.  Construction of Chinese-English Semantic Hierarchy for Information Retrieval.
Levitan S, Reggia JA.  2000.  A computational model of lateralization and asymmetries in cortical maps. Neural computation. 12(9):2037-2062.
Levitan S, Stoica I, Reggia JA.  1999.  A model of lateralization and asymmetries in cortical maps. Neural Networks, 1999. IJCNN'99. International Joint Conference on. 1:121-124.
Levitan S, Reggia JA.  1999.  Interhemispheric effects on map organization following simulated cortical lesions. Artificial intelligence in medicine. 17(1):59-85.
Levin D, Spring N, Bhattacharjee B.  2009.  Systems-compatible incentives. Game Theory for Networks, 2009. GameNets '09. International Conference on. :100-106.
Levin D, Baden R, Lumezanu C, Spring N, Bhattacharjee B.  2008.  Motivating participation in internet routing overlays. Proceedings of the 3rd international workshop on Economics of networked systems. :91-96.
Levin D, Sherwood R, Bhattacharjee B.  2006.  Fair file swarming with FOX. Proc. 5th IPTPS.
Levin D, LaCurts K, Spring N, Bhattacharjee B.  2008.  Bittorrent is an auction: analyzing and improving bittorrent's incentives. Proceedings of the ACM SIGCOMM 2008 conference on Data communication. :243-254.
Levin D, Bender A, Lumezanu C, Spring N, Bhattacharjee B.  2007.  Boycotting and extorting nodes in an internetwork. NetE-con+ IBC.
Levi S-T, Agrawala AK.  1994.  Fault tolerant system design. :440.

Pages