Publications

Export 7148 results:
[ Author(Asc)] Title Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
L
Li J, Saha B, Deshpande A.  2009.  A unified approach to ranking in probabilistic databases. Proceedings of the VLDB Endowment. 2(1):502-513.
Li Z, Duraiswami R.  2007.  Flexible and Optimal Design of Spherical Microphone Arrays for Beamforming. Audio, Speech, and Language Processing, IEEE Transactions on. 15(2):702-714.
Li Y, Long PM, Srinivasan A.  2001.  Improved Bounds on the Sample Complexity of Learning. Journal of Computer and System Sciences. 62(3):516-527.
Li H, Doermann D.  1998.  Automatic Identification of Text In Digital Video Key Frames. Proceedings of International Conference on Pattern Recognition. :129-132.
Li J, Deshpande A.  2011.  Maximizing Expected Utility for Stochastic Combinatorial Optimization Problems. 2011 IEEE 52nd Annual Symposium on Foundations of Computer Science (FOCS). :797-806.
Li H, Kia O, Doermann D.  1999.  Text Enhancement in Digital Video. Proceedings of SPIE - Conference on Document Recognition and Retrieval VI. :2-9.
Li Y, Zheng Y, Doermann D, Jaeger S.  2006.  Script-Independent Text Line Segmentation in Freestyle Handwritten Documents. LAMP-TR-136, CS-TR-4836, UMIACS-TR-2006-51, CFAR-TR-1017
Li ST, Ge QJ, Varshney A.  2001.  Web-based interactive design of freeform motions. Proceedings of the ASME 2001 Design Engineering Technical Conferences and Computers and Information in Engineering Conference.
Lewinski MK, Bisgrove D, Shinn P, Chen H, Hoffmann C, Hannenhalli S, Verdin E, Berry CC, Ecker JR, Bushman FD.  2005.  Genome-Wide Analysis of Chromosomal Features Repressing Human Immunodeficiency Virus Transcription. Journal of VirologyJ. Virol.. 79(11):6610-6619.
Lewinski MK, Yamashita M, Emerman M, Ciuffi A, Marshall H, Crawford G, Collins F, Shinn P, Leipzig J, Hannenhalli S et al..  2006.  Retroviral DNA Integration: Viral and Cellular Determinants of Target-Site Selection. PLoS PathogPLoS Pathog. 2(6):e60-e60.
Levy S, Hannenhalli S, Workman C.  2001.  Enrichment of Regulatory Signals in Conserved Non-Coding Genomic Sequence. BioinformaticsBioinformatics. 17(10):871-877.
Levy S, Hannenhalli S.  2002.  Identification of transcription factor binding sites in the human genome sequence. Mammalian Genome. 13(9):510-514.
Levow GA, Oard D, Resnik P.  2005.  Dictionary-based cross-language retrieval. Information Processing and Management. 41:523-547.
Levow G-A, Oard D, Resnik P.  2005.  Dictionary-based techniques for cross-language information retrieval. Information Processing & Management. 41(3):523-547.
Levow GA, Dorr BJ, Lin D.  2000.  Construction of Chinese-English Semantic Hierarchy for Information Retrieval.
Levow G-A, Oard D, Resnik P.  2001.  Rapidly retargetable interactive translingual retrieval. Proceedings of the first international conference on Human language technology research. :1-5.
Levitan S, Reggia JA.  2000.  A computational model of lateralization and asymmetries in cortical maps. Neural computation. 12(9):2037-2062.
Levitan S, Stoica I, Reggia JA.  1999.  A model of lateralization and asymmetries in cortical maps. Neural Networks, 1999. IJCNN'99. International Joint Conference on. 1:121-124.
Levitan S, Reggia JA.  1999.  Interhemispheric effects on map organization following simulated cortical lesions. Artificial intelligence in medicine. 17(1):59-85.
Levin D, Spring N, Bhattacharjee B.  2009.  Systems-compatible incentives. Game Theory for Networks, 2009. GameNets '09. International Conference on. :100-106.
Levin D, Baden R, Lumezanu C, Spring N, Bhattacharjee B.  2008.  Motivating participation in internet routing overlays. Proceedings of the 3rd international workshop on Economics of networked systems. :91-96.
Levin D, Sherwood R, Bhattacharjee B.  2006.  Fair file swarming with FOX. Proc. 5th IPTPS.
Levin D, LaCurts K, Spring N, Bhattacharjee B.  2008.  Bittorrent is an auction: analyzing and improving bittorrent's incentives. Proceedings of the ACM SIGCOMM 2008 conference on Data communication. :243-254.
Levin D, Bender A, Lumezanu C, Spring N, Bhattacharjee B.  2007.  Boycotting and extorting nodes in an internetwork. NetE-con+ IBC.
Levi S-T, Agrawala AK.  1994.  Fault tolerant system design. :440.

Pages