Publications

Export 7151 results:
Author [ Title(Desc)] Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
O
Winder RK, Reggia JA, Weems SA, Bunting MF.  2009.  An oscillatory hebbian network model of short-term memory. Neural computation. 21(3):741-761.
Basili VR, Seaman C, Tesoriero R, Zelkowitz MV.  1999.  OSMA Software Program: Domain Analysis Guidebook. Technical Reports from UMIACS, UMIACS-TR-99-16.
Fermüller C, Pless R, Aloimonos Y.  2000.  The Ouchi illusion as an artifact of biased flow estimation. Vision Research. 40(1):77-95.
Khan Z, Herman RA, Wallen K, Balch T.  2005.  An outdoor 3-D visual tracking system for the study of spatial navigation and memory in rhesus monkeys. Behavior Research Methods. 37(3):453-463.
Danovaro E, De Floriani L, Puppo E, Samet H.  2007.  Out-of-core Multi-resolution Terrain Modeling. Spatial data on the Web: modeling and management. :43-43.
Ghosh S K, Mount D.  1987.  An output sensitive algorithm for computing visibility graphs. Foundations of Computer Science, 1987., 28th Annual Symposium on. :11-19.
Feamster N.  2010.  Outsourcing home network security. Proceedings of the 2010 ACM SIGCOMM workshop on Home networks. :37-42.
Danovaro E, De Floriani L, Puppo E, Samet H.  2006.  Out–of–Core Multiresolution Terrain Modeling. Modeling and Management of Geographical Data over Distributed Architectures. Springer–Verlag.
Heyman DP, O'Leary DP.  1998.  Overcoming Instability In Computing The Fundamental Matrix For A Markov Chain. SIAM Journal on Matrix Analysis and Applications. 19(2):534-540.
Brakerski Z, Kalai YT, Katz J, Vaikuntanathan V.  2010.  Overcoming the Hole in the Bucket: Public-Key Cryptography Resilient to Continual Memory Leakage. Foundations of Computer Science (FOCS), 2010 51st Annual IEEE Symposium on. :501-510.
Parker A, Nau DS, V.S. Subrahmanian.  2006.  Overconfidence or paranoia? search in imperfect-information games PROCEEDINGS OF THE NATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE. 21:1045-1045.
Elaine Shi, Stoica I, Andersen DG, Perrig A.  2006.  OverDoSe: A generic DDoS protection service using an overlay network.
Chalfoun J, Cardone A, Dima AA, Allen DP, Halter MW.  2010.  Overlap-based cell tracker. The Journal of Research of the National Institute of Standards and Technology. 115(6)
Bhattacharjee B, Rabinovich M.  2010.  Overlay Networking and Resiliency. Guide to Reliable Internet Services and Applications. :221-251.
Fekete JD, Wang D, Dang N, Aris A, Plaisant C.  2003.  Overlaying graph links on treemaps. IEEE Symposium on Information Visualization Conference Compendium (demonstration).
Card SK, Mackinlay JD, Shneiderman B.  1999.  Overview+ detail. Readings in information visualizationReadings in information visualization. :285-286.
Minker J.  1998.  An overview of cooperative answering in databases. Flexible Query Answering Systems. :282-285.
Plaisant C.  1991.  An overview of Hyperties, its user interface and data model. Hypermedia/Hypertext And Object-Oriented Databases. Chapman & Hall. :17-31.
Garain U, Paik J, Pal T, Majumder P, Doermann D, Oard D.  2011.  Overview of the FIRE 2011 RISOTTask. FIRE.
Bhattacharyya SS, Eker J, Janneck JW, Lucarz C, Mattavelli M, Raulet M.  2011.  Overview of the MPEG Reconfigurable Video Coding Framework. Journal of Signal Processing Systems. 63(2):251-263.
Suh B, Bederson BB.  2002.  OZONE: A zoomable interface for navigating ontology information. Proceedings of the Working Conference on Advanced Visual Interfaces. :139-143.
P
Kurkulos M, Weinberg JM, Roy D, Mount SM.  1994.  P element-mediated in vivo deletion analysis of white-apricot: deletions between direct repeats are strongly favored.. GeneticsGenetics. 136(3):1001-1011.
Sen P, Deshpande A, Getoor L.  2009.  P r DB: managing and exploiting rich correlations in probabilistic databases. The VLDB Journal. 18(5):1065-1090.
Reddy D, Veeraraghavan A, Chellappa R.  2011.  P2C2: Programmable pixel compressive camera for high speed imaging. 2011 IEEE Conference on Computer Vision and Pattern Recognition (CVPR). :329-336.
Sherwood R, Bhattacharjee B, Srinivasan A.  2002.  P5 : a protocol for scalable anonymous communication. 2002 IEEE Symposium on Security and Privacy, 2002. Proceedings. :58-70.

Pages