Publications

Export 7148 results:
[ Author(Asc)] Title Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
L
Li Y, Yu X, Ho J, Fushman D, Allewell NM, Tuchman M, Shi D.  2010.  Reversible Post-Translational Carboxylation Modulates the Enzymatic Activity of N-Acetyl-l-ornithine Transcarbamylase. Biochemistry. 49(32):6887-6895.
Li X, Gupta SK.  2003.  Manufacturability Analysis of Multi-Material Objects Molded by Rotary Platen Multi-Shot Molding Process. 2003:353-365.
Li ST, Ge QJ, Varshney A.  2001.  Web-based interactive design of freeform motions. Proceedings of the ASME 2001 Design Engineering Technical Conferences and Computers and Information in Engineering Conference.
Li Y, Fermüller C, Aloimonos Y, Ji H.  2010.  Learning shift-invariant sparse representation of actions. 2010 IEEE Conference on Computer Vision and Pattern Recognition (CVPR). :2630-2637.
Li JH, Levy R, Yu M, Bhattacharjee B.  2006.  A scalable key management and clustering scheme for ad hoc networks. Proceedings of the 1st international conference on Scalable information systems.
Li H, Doermann D.  1998.  Automatic Identification of Text In Digital Video Key Frames. Proceedings of International Conference on Pattern Recognition. :129-132.
Li J, Deshpande A, Khuller S.  2009.  On Computing Compression Trees for Data Collection in Sensor Networks. arXiv:0907.5442.
Li J, Plaisant C, Shneiderman B.  1998.  Data object and label placement for information abundant visualizations. Proceedings of the 1998 workshop on New paradigms in information visualization and manipulation. :41-48.
Lewinski MK, Yamashita M, Emerman M, Ciuffi A, Marshall H, Crawford G, Collins F, Shinn P, Leipzig J, Hannenhalli S et al..  2006.  Retroviral DNA Integration: Viral and Cellular Determinants of Target-Site Selection. PLoS PathogPLoS Pathog. 2(6):e60-e60.
Lewinski MK, Bisgrove D, Shinn P, Chen H, Hoffmann C, Hannenhalli S, Verdin E, Berry CC, Ecker JR, Bushman FD.  2005.  Genome-Wide Analysis of Chromosomal Features Repressing Human Immunodeficiency Virus Transcription. Journal of VirologyJ. Virol.. 79(11):6610-6619.
Levy S, Hannenhalli S, Workman C.  2001.  Enrichment of Regulatory Signals in Conserved Non-Coding Genomic Sequence. BioinformaticsBioinformatics. 17(10):871-877.
Levy S, Hannenhalli S.  2002.  Identification of transcription factor binding sites in the human genome sequence. Mammalian Genome. 13(9):510-514.
Levow G-A, Oard D, Resnik P.  2005.  Dictionary-based techniques for cross-language information retrieval. Information Processing & Management. 41(3):523-547.
Levow GA, Dorr BJ, Lin D.  2000.  Construction of Chinese-English Semantic Hierarchy for Information Retrieval.
Levow GA, Oard D, Resnik P.  2005.  Dictionary-based cross-language retrieval. Information Processing and Management. 41:523-547.
Levow G-A, Oard D, Resnik P.  2001.  Rapidly retargetable interactive translingual retrieval. Proceedings of the first international conference on Human language technology research. :1-5.
Levitan S, Reggia JA.  2000.  A computational model of lateralization and asymmetries in cortical maps. Neural computation. 12(9):2037-2062.
Levitan S, Stoica I, Reggia JA.  1999.  A model of lateralization and asymmetries in cortical maps. Neural Networks, 1999. IJCNN'99. International Joint Conference on. 1:121-124.
Levitan S, Reggia JA.  1999.  Interhemispheric effects on map organization following simulated cortical lesions. Artificial intelligence in medicine. 17(1):59-85.
Levin D, Spring N, Bhattacharjee B.  2009.  Systems-compatible incentives. Game Theory for Networks, 2009. GameNets '09. International Conference on. :100-106.
Levin D, Baden R, Lumezanu C, Spring N, Bhattacharjee B.  2008.  Motivating participation in internet routing overlays. Proceedings of the 3rd international workshop on Economics of networked systems. :91-96.
Levin D, Sherwood R, Bhattacharjee B.  2006.  Fair file swarming with FOX. Proc. 5th IPTPS.
Levin D, LaCurts K, Spring N, Bhattacharjee B.  2008.  Bittorrent is an auction: analyzing and improving bittorrent's incentives. Proceedings of the ACM SIGCOMM 2008 conference on Data communication. :243-254.
Levin D, Bender A, Lumezanu C, Spring N, Bhattacharjee B.  2007.  Boycotting and extorting nodes in an internetwork. NetE-con+ IBC.
Levi S-T, Agrawala AK.  1994.  Fault tolerant system design. :440.

Pages