Publications

Export 7151 results:
Author Title [ Type(Asc)] Year
Journal Articles
Druin A, Bederson BB, Rose A, Weeks A.  2009.  From New Zealand to Mongolia: Co-designing and deploying a digital library for the world's children. Special issue of Children, Youth and Environments: Children in Technological Environments: Interaction, Development, and Design.
Getoor L, Koller D, Friedman N.  2000.  From instances to classes in probabilistic relational models. Proc. ICML 2000 Workshop on Attribute-Value and Relational Learning.
O'Leary DP, Stewart G.W.  1987.  From Determinacy to Systaltic Arrays. Computers, IEEE Transactions on. C-36(11):1355-1359.
Hochheiser H, Shneiderman B.  2010.  From bowling alone to tweeting together: technology-mediated social participation. Interactions. 17(2):64-67.
Cukier M, Arlat J, Powell D.  1998.  Frequentist and Bayesian Coverage Estimations for Stratified Fault-Injection. DEPENDABLE COMPUTING AND FAULT TOLERANT SYSTEMS. 11:43-62.
Varna AL, Chuang WH, Wu M.  2010.  A framework for theoretical analysis of content fingerprinting. Proc. of SPIE Media Forensics and Security.
Corrada Bravo H, Page D, Ramakrishnan R, Shavlik J, Costa VS.  2005.  A framework for set-oriented computation in inductive logic programming and its application in generalizing inverse entailment. Inductive Logic Programming. :69-86.
Shneiderman B.  1997.  A framework for search interfaces. IEEE Software. 14(2):18-20.
Methé BA, Nelson KE, Pop M, Creasy HH, Giglio MG, Huttenhower C, Gevers D, Petrosino JF, Abubucker S, Badger JH.  2012.  A framework for human microbiome research. Nature. 486:215-221.
Jacobs DW, Rokers B, Rudra A, Liu Z.  2001.  Fragment completion in humans and machines. NIPS. :27-34.
Elman H, Ramage A.  2006.  Fourier analysis of multigrid for a model two-dimensional convection-diffusion equation. BIT Numerical Mathematics. 46(2):283-306.
Chan TF, Elman H.  1989.  Fourier Analysis of Iterative Methods for Elliptic Problems. SIAM Review. 31(1):20-49.
Stewart G.W.  1999.  Four algorithms for the efficient computation of truncated pivoted QR approximations to a sparse matrix. Numerische Mathematik. 83(2):313-323.
Shaman J., Solomon S., Colwell RR, Field C.B.  2013.  Fostering advances in interdisciplinary climate science. Proceedings of the National Academy of Sciences. (Supplement_114869243Supplement_1):3653-3656.
Canetti R, Halevi S, Katz J.  2003.  A forward-secure public-key encryption scheme. Advances in Cryptology—Eurocrypt 2003. :646-646.
Canetti R, Halevi S, Katz J.  2007.  A forward-secure public-key encryption scheme. Journal of Cryptology. 20(3):265-294.
Bierman G, Hicks MW, Sewell P, Stoyle G.  2003.  Formalizing dynamic software updating. Proceedings of the Second International Workshop on Unanticipated Software Evolution (USE).
Ramasamy HV, Cukier M, Sanders WH.  2003.  Formal verification of an intrusion-tolerant group membership protocol. IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS E SERIES D. 86(12):2612-2622.
Tian J, Zelkowitz MV.  1992.  A formal program complexity model and its application. Journal of Systems and Software. 17(3):253-266.
Ray A, Cleaveland R.  2004.  Formal Modeling Of Middleware-based Distributed Systems. Electronic Notes in Theoretical Computer Science. 108:21-37.
Reggia JA, Nau DS, Wang PY, Peng Y.  1985.  A formal model of diagnostic inference, II. Algorithmic solution and application. Information Sciences. 37(1-3):257-285.
Reggia JA, Nau DS, Wang P, Peng Y.  1985.  A formal model of abductive inference. Information Sciences. 37:227-285.
Grant J, Kraus S, Perlis D.  2005.  Formal approaches to teamwork. We Will Show Them: Essays in Honour of Dov Gabbay. 1:39-68.
Tse C, Krafft C, Mayergoyz ID, McAvoy P, Tseng C-Y.  2005.  Forensic recovery of hard disk data by using the spin-stand imaging technique. Proceedings of SPIE. 5778(1):595-606.
Lu W, Varna AL, Wu M.  2010.  Forensic hash for multimedia information. SPIE Media Forensics and Security. :7541–0Y-7541–0Y.

Pages