Publications

Export 7151 results:
Author Title [ Type(Desc)] Year
Journal Articles
Elman H.  2005.  Preconditioning strategies for models of incompressible flow. Journal of Scientific Computing. 25(1):347-366.
Louis VR, Russek-Cohen E, Choopun N, Rivera ING, Gangle B, Jiang SC, Rubin A, Patz JA, Huq A, Colwell RR.  2003.  Predictability of Vibrio Cholerae in Chesapeake Bay. Applied and Environmental MicrobiologyAppl. Environ. Microbiol.. 69(5):2773-2785.
Wu S, Elsayed T, Rand W, Raschid L.  2011.  Predicting author blog channels with high value future posts for monitoring. Proceedings of the Twenty-Fifth Conference on Artificial Intelligence (AAAI).
Schulz R, Reggia JA.  2002.  Predicting nearest agent distances in artificial worlds. Artificial life. 8(3):247-264.
Constantin de Magny G, Long W, Brown CW, Hood RR, Huq A, Murtugudde R, Colwell RR.  2009.  Predicting the distribution of Vibrio spp. in the Chesapeake Bay: a Vibrio cholerae case study. EcoHealth. 6(3):378-389.
Hannenhalli S, Levy S.  2002.  Predicting Transcription Factor Synergism. Nucleic Acids ResearchNucl. Acids Res.. 30(19):4278-4284.
Colwell RR, Unnikrishnan A, Jutla A, Huq A, Akanda A.  2015.  Predictive Time Series Analysis Linking Bengal Cholera with Terrestrial Water Storage Measured from Gravity Recovery and Climate Experiment Sensors. The American Journal of Tropical Medicine and Hygiene. 93(6):1179-1186.
Shneiderman B.  1993.  Preface to Sparks of Innovation in Human-Computer Interaction. Sparks of innovation in human-computer interaction.
Mount SM, Salz HK.  2000.  Pre-Messenger RNA Processing Factors in the Drosophila Genome. The Journal of Cell BiologyJ Cell Biol. 150(2):F37-F44-F37-F44.
Cleaveland R, Steffen B.  1990.  A preorder for partial process specifications. CONCUR'90 Theories of Concurrency: Unification and Extension. :141-151.
Bhattacharya R, Chatterjee S, Bhattacharyya SS.  2012.  Preparation and probing of coherent vibrational wave packets in the ground electronic state of HD^{+}. Physical Review A. 85(3)
Hwang E, Prabhakaran B, V.S. Subrahmanian.  2002.  Presentation planning for distributed VoD systems. Knowledge and Data Engineering, IEEE Transactions on. 14(5):1059-1077.
Yilmaz C, Memon AM, Porter A, Krishna AS, Schmidt DC, Gokhale A, Natarajan B.  2004.  Preserving distributed systems critical properties: a model-driven approach. Software, IEEE. 21(6):32-40.
Mittal P, Papamanthou C, Song D.  2012.  Preserving Link Privacy in Social Network Based Systems. arXiv:1208.6189 [cs].
Greene S, Marchionini G, Plaisant C, Shneiderman B.  2000.  Previews and overviews in digital libraries: Designing surrogates to support visual information seeking. Journal of the American Society for Information Science. 51(4):380-393.
Haley BJ, Grim CJ, Hasan NA, Taviani E, Chun J, Brettin TS, Bruce DC, Challacombe JF, Detter CJ, Han CS et al..  2010.  The pre‐seventh pandemic Vibrio cholerae BX 330286 El Tor genome: evidence for the environment as a genome reservoir. Environmental Microbiology Reports. 2(1):208-216.
Alexander DS, Menage PB, Keromytis AD, Arbaugh WA, Anagnostakis KG, Smith JM.  2001.  The price of safety in an active network. Journal of Communications and Networks. 3(1):4-18.
Khuller S, Vishkin U, Young N.  1994.  A primal-dual parallel approximation technique applied to weighted set and vertex covers. Journal Algorithms. 17(2):280-289.
Khan Z, Ford MJ, Cusanovich DA, Mitrano A, Pritchard JK, Gilad Y.  2013.  Primate Transcript and Protein Expression Levels Evolve Under Compensatory Selection Pressures. Science. 342(6162):1100-1104.
Vaswani N, Chellappa R.  2006.  Principal components null space analysis for image and video classification. Image Processing, IEEE Transactions on. 15(7):1816-1830.
Roussopoulos N, Kang H.  1986.  Principles and techniques in the design of ADMS+((advanced data-base management system)). Computer. 19:19-23.
Kim J-S, Andrade H, Sussman A.  2007.  Principles for designing data-/compute-intensive distributed applications and middleware systems for heterogeneous environments. Journal of Parallel and Distributed Computing. 67(7):755-771.
Cleaveland R, L\üttgen G, Natarajan V, Sims S.  1996.  Priorities for modeling and verifying distributed systems. Tools and Algorithms for the Construction and Analysis of Systems. :278-297.
Cleaveland R, Hennessy M.  1990.  Priorities in process algebras. Information and Computation. 87(1-2):58-77.
Cukier M, Panjwani S.  2009.  Prioritizing Vulnerability Remediation by Determining Attacker-Targeted Vulnerabilities. Security Privacy, IEEE. 7(1):42-48.

Pages