Publications
Export 383 results:
[ Author] Title Type Year Filters: First Letter Of Last Name is H [Clear All Filters]
2000. Performance Benefits of Simultaneous Over Sequential Menus as Task Complexity Increases. International Journal of Human-Computer Interaction. 12(2):173-192.
2005. Visual Specification of Queries for Finding Patterns in Time-Series Data (2001). Institute for Systems Research Technical Reports.
2007. Task-based evaluation of text summarization using Relevance Prediction. Information Processing & Management. 43(6):1482-1499.
2002. Speeding up construction of PMR quadtree-based spatial indexes. The VLDB Journal. 11(2):109-137.
2003. Properties of embedding methods for similarity searching in metric spaces. Pattern Analysis and Machine Intelligence, IEEE Transactions on. 25(5):530-549.
2003. Index-driven similarity search in metric spaces (Survey Article). ACM Trans. Database Syst.. 28(4):517-580.
2006. Recurring genomic breaks in independent lineages support genomic fragility. BMC Evolutionary Biology. 6(1):90-90.
2015. Environmental Surveillance for Toxigenic Vibrio cholerae in Surface Waters of Haiti. The American Journal of Tropical Medicine and Hygiene. 92(1):118-125.
2008. CiCUTS: Combining System Execution Modeling Tools with Continuous Integration Environments. Engineering of Computer-Based Systems, IEEE International Conference on the. :66-75.
1995. A modified cellular automata model of nucleotide interactions and non-enzymatic transcription of DNA. inbs. :136-136.
2007. Analyzing information flow. Conference on Programming Language Design and Implementation: Proceedings of the 2007 workshop on Programming languages and analysis for security.
2002. Experiences with capsule-based active networking. DARPA Active NEtworks Conference and Exposition, 2002. Proceedings. :16-24.
2002. A secure PLAN (extended version). DARPA Active NEtworks Conference and Exposition, 2002. Proceedings. :224-237.
2005. Dynamic updating of information-flow policies. Proceedings of the International Workshop on Foundations of Computer Security (FCS).