Publications

Export 624 results:
Author Title [ Type(Desc)] Year
Filters: First Letter Of Title is C  [Clear All Filters]
Book Chapters
Dachman-Soled D, Mahmoody M, Malkin T.  2014.  Can Optimally-Fair Coin Tossing Be Based on One-Way Functions? Theory of Cryptography. :217-239.
Dachman-Soled D, Servedio RA.  2011.  A Canonical Form for Testing Boolean Function Properties. Approximation, Randomization, and Combinatorial Optimization. Algorithms and Techniques. :460-471.
Choi SGeol, Dachman-Soled D, Yung M.  2012.  On the Centrality of Off-Line E-Cash to Concrete Partial Information Games. Security and Cryptography for Networks. :264-280.
Blake-Hall J, Walker O, Fushman D.  2004.  Characterization of the Overall Rotational Diffusion of a Protein From 15N Relaxation Measurements and Hydrodynamic Calculations. Protein NMR Techniques. 278:139-159.
Conroy JM, Schlesinger JD, O'Leary DP.  2009.  CLASSY 2009: Summarization and Metrics. TAC 2009 Workshop ProceedingsTAC 2009 Workshop Proceedings.
Conroy JM, O'Leary DP, Schlesinger JD.  2006.  CLASSYArabic and English Multi-Document Summarization. Multi-Lingual Summarization Evaluation 2006Multi-Lingual Summarization Evaluation 2006.
Dunlavy DM, Conroy JM, O'Leary TJ, O'Leary DP.  2003.  Clustering and Summarizing Medline Abstracts. BISTI 2003 Symposium on Digital Biology: The Emerging ParadigmBISTI 2003 Symposium on Digital Biology: The Emerging Paradigm.
Nikolova S, Boyd-Graber J, Fellbaum C.  2012.  Collecting Semantic Similarity Ratings to Connect Concepts in Assistive Communication Tools. Modeling, Learning, and Processing of Text Technological Data StructuresModeling, Learning, and Processing of Text Technological Data Structures. 370:81-93.
Namata G, Sen P, Bilgic M, Getoor L.  2009.  Collective classification for text classification. Text Mining: Classification, Clustering, and ApplicationsText Mining: Classification, Clustering, and Applications. :51-69.
Bhattacharya I, Getoor L.  2009.  Collective relational clustering. Constrained Clustering: Advances in Algorithms, Theory, and ApplicationsConstrained Clustering: Advances in Algorithms, Theory, and Applications. :221-244.
Hannenhalli S, Hubbell E, Lipshutz R, Pevzner P.  2002.  Combinatorial Algorithms for Design of DNA Arrays. Chip TechnologyChip Technology. 77:1-19.
Jaeger S, Ma H, Doermann D.  2008.  Combining Classifiers with Informational Confidence. Studies in Computational Intelligence: Machine Learning in Document Analysis and RecognitionStudies in Computational Intelligence: Machine Learning in Document Analysis and Recognition. :163-192.
O'Leary DP.  1998.  Commentary on Lanczos's `Analytical and Practical Curve Fitting of Equidistant Data'. Cornelius Lanczos Collected Published Papers with CommentariesCornelius Lanczos Collected Published Papers with Commentaries. 5:3-433to3-434-3-433to3-434.
Hicks MW, Moore J, Nettles S.  2001.  Compiling PLAN to SNAP. Active NetworksActive Networks. 2207:134-151.
Au T-C, Muñoz-Avila H, Nau DS.  2002.  On the Complexity of Plan Adaptation by Derivational Analogy in a Universal Classical Planning Framework. Advances in Case-Based Reasoning. 2416:199-206.
Slaughters L, Shneiderman B, Marchionini G.  1997.  Comprehension and object recognition capabilities for presentations of simultaneous video key frame surrogates. Research and Advanced Technology for Digital LibrariesResearch and Advanced Technology for Digital Libraries. 1324:41-54.
Sankaranarayanan A, Turaga P, Baraniuk R, Chellappa R.  2010.  Compressive Acquisition of Dynamic Scenes. Computer Vision – ECCV 2010Computer Vision – ECCV 2010. 6311:129-142.
Dachman-Soled D, Gennaro R, Krawczyk H, Malkin T.  2012.  Computational Extractors and Pseudorandomness. Theory of Cryptography. :383-403.
Chellappa R, Chowdhury A RK.  2006.  Computer Vision, Statistics in. Encyclopedia of Statistical SciencesEncyclopedia of Statistical Sciences.
Dorr BJ.  1991.  Conceptual Basis of the Lexicon in Machine Translation. Lexical acquisition: exploiting on-line resources to build a lexiconLexical acquisition: exploiting on-line resources to build a lexicon. :263-263.
O'Leary DP.  1996.  Conjugate Gradients and Related KMP Algorithms: The Beginnings. Linear and Nonlinear Conjugate Gradient-Related MethodsLinear and Nonlinear Conjugate Gradient-Related Methods. :1-8.
Evans P, Donahue G, Hannenhalli S.  2006.  Conservation Patterns in cis-Elements Reveal Compensatory Mutations. Comparative GenomicsComparative Genomics. 4205:186-199.
Monahemi M, Barlow J, O'Leary DP.  1991.  Considerations on Loop Transfer Recovery for Non-minimum Phase Plants. Proceedings of the AIAA Aircraft Design Systems and Operations MeetingProceedings of the AIAA Aircraft Design Systems and Operations Meeting. AIAA-91-3086
Goodrich MT, Papamanthou C, Tamassia R.  2007.  On the Cost of Persistence and Authentication in Skip Lists. Experimental Algorithms. :94-107.
Gupta A, Srinivasan A.  2003.  On the Covering Steiner Problem. FST TCS 2003: Foundations of Software Technology and Theoretical Computer ScienceFST TCS 2003: Foundations of Software Technology and Theoretical Computer Science. 2914:244-251.

Pages