Publications

Export 7151 results:
Author Title [ Type(Desc)] Year
Journal Articles
Perer A, Shneiderman B, Oard D.  2006.  Using rhythms of relationships to understand e‐mail archives. Journal of the American Society for Information Science and Technology. 57(14):1936-1948.
Ford TE, Colwell RR, Rose JB, Morse SS, Rogers DJ, Yates TL.  2009.  Using Satellite Images of Environmental Changes to Predict Infectious Disease Outbreaks. Emerging Infectious DiseasesEmerg Infect Dis. 15(9):1341-1346.
Vishkin U.  2011.  Using simple abstraction to reinvent computing for parallelism. Commun. ACM. 54(1):75-85.
Osadchy M, Jacobs DW, Ramamoorthi R, Tucker D.  2008.  Using specularities in comparing 3D models and 2D images. Computer Vision and Image Understanding. 111(3):275-294.
Castillo CD, Jacobs DW.  2009.  Using Stereo Matching with General Epipolar Geometry for 2D Face Recognition across Pose. Pattern Analysis and Machine Intelligence, IEEE Transactions on. 31(12):2298-2304.
Snelick R, JaJa JF, Kacker R, Lyon G.  1995.  Using synthetic perturbations and statistical screening to assay shared-memory programs. Information processing letters. 54(3):147-153.
Memon AM.  2004.  Using tasks to automate regression testing of GUIs. International Conference on Artificial intelligence and Applications (AIA 2004). :16-18.
Asahi T, Turo D, Shneiderman B.  1995.  Using Treemaps to Visualize the Analytic Hierarchy Process. Information Systems ResearchInformation Systems Research. 6(4):357-375.
Zhai K, Boyd-Graber J, Asadi N.  2011.  Using Variational Inference and MapReduce to Scale Topic Modeling. arXiv:1107.3765.
Card SK, Mackinlay JD, Shneiderman B.  1999.  Using vision to think. Readings in information visualization: using vision to think. :579-581.
Mann AJ, Perlis D.  1977.  Utility Functions, Public Goods, and Income Redistribution. Public Finance Review. 5(1):9-22.
Plishker W, Dandekar O, Bhattacharyya SS, Shekhar R.  2010.  Utilizing Hierarchical Multiprocessing for Medical Image Registration. IEEE Signal Processing Magazine. 27(2):61-68.
Krishna A, Schmidt D, Memon AM, Porter A, Sevilla D.  2004.  Validating quality of service for reusable software via model-integrated distributed continuous quality assurance. Software Reuse: Methods, Techniques, and Tools. :286-295.
Zelkowitz MV, Wallace D.  1998.  Validating the Benefit of New Software Technology. Software Quality Practitioner. 1
Reyna-Fabian ME, Laclette JP, Cummings MP, García-Varela M.  2010.  Validating the systematic position of ıt Plationus Segers, Murugan & Dumont, 1993 (Rotifera: Brachionidae) using sequences of the large subunit of the nuclear ribosomal DNA and of cytochrome C oxidase. Hydrobiologia. 644(1):361-370.
Duan L, Martin, M.P.  2008.  Validation of a DNS code for wall-bounded turbulence including finite-rate reactions and surface catalysis. AIAA Paper 2008. 645
Budowle B, Connell ND, Bielecka-Oder A, Colwell RR, Corbett CR, Fletcher J, Forsman M, Kadavy DR, Markotic A, Morse SA et al..  2014.  Validation of high throughput sequencing and microbial forensics applications. Investigative Genetics. 5(1):9.
Bilgic M, Getoor L.  2011.  Value of information lattice: exploiting probabilistic independence for effective feature subset acquisition. Journal of Artificial Intelligence Research. 41(2):69-95.
Islam MS, Talukder KA, Khan NH, Mahmud ZH, Rahman MZ, Nair GB, Siddique AKM, Yunus M, Sack DA, Sack RB et al..  2004.  Variation of toxigenic Vibrio cholerae O1 in the aquatic environment of Bangladesh and its correlation with the clinical strains. Microbiology and immunology. 48(10):773-777.
Sato T, Kameya Y, Kurihara K, De Raedt L, Dietterich T, Getoor L, Kersting K, Muggleton SH.  2008.  Variational Bayes via Propositionalization. Probabilistic, Logical and Relational Learning-A Further Synthesis.
Eisenstat SC, Elman H, Schultz MH.  1983.  Variational Iterative Methods for Nonsymmetric Systems of Linear Equations. SIAM Journal on Numerical Analysis. 20(2):345-357.
Minkah N, Hwang Y, Perry K, Van Duyne GD, Hendrickson R, Lefkowitz EJ, Hannenhalli S, Bushman FD.  2007.  Variola virus topoisomerase: DNA cleavage specificity and distribution of sites in Poxvirus genomes. Virology. 365(1):60-69.
Liu X, Doermann D, Li H.  2008.  VCode - Pervasive Data Transfer Using Video Barcode. IEEETransactions on Multimedia. 10(3):361-371.
Mayergoyz ID.  2006.  Vector Preisach models of hysteresis. The Science of Hysteresis: Mathematical modeling and applications. 1:447-447.
Kembhavi A, Harwood D, Davis LS.  2011.  Vehicle Detection Using Partial Least Squares. Pattern Analysis and Machine Intelligence, IEEE Transactions on. 33(6):1250-1265.

Pages