Publications
Export 490 results:
[ Author] Title Type Year Filters: First Letter Of Last Name is C [Clear All Filters]
2001. Supervised sense tagging using support vector machines. Proceedings of the Second International Workshop on Evaluating Word Sense Disambiguation Systems (SENSEVAL-2). :59-62.
2004. Project portfolio earned value management using treemaps. Proceedings of the Project Management Institute Research Conference.
2010. Serodiversity and ecological distribution of Vibrio parahaemolyticus in the Venetian Lagoon, Northeast Italy. Environmental Microbiology Reports. 2(1):151-157.
2010. Effect on Human Cells of Environmental Vibrio Parahaemolyticus Strains Carrying Type III Secretion System 2. Infection and ImmunityInfect. Immun.. 78(7):3280-3287.
2010. Perturbing the Ubiquitin Pathway Reveals How Mitosis Is Hijacked to Denucleate and Regulate Cell Proliferation and Differentiation In Vivo. PLoS ONEPLoS ONE. 5(10):e13331-e13331.
2005. Design and implementation of a routing control platform. Proceedings of the 2nd conference on Symposium on Networked Systems Design & Implementation - Volume 2. :15-28.
1988. An empirical comparison of pie vs. linear menus. Proceedings of the SIGCHI conference on Human factors in computing systems. :95-100.
2001. Rescuing a destabilized protein fold through backbone cyclization. Journal of Molecular Biology. 308(5):1045-1062.
2010. WATTR: a method for self-powered wireless sensing of water activity in the home. Proceedings of the 12th ACM international conference on Ubiquitous computing. :169-172.
2006. Comprehensive analysis of alternative splicing in rice and comparative analyses with Arabidopsis. BMC Genomics. 7(1):327-327.
1998. Phylogenetic relationships of platyhelminthes based on 18S ribosomal gene sequences. Mol Phylogenet Evol. 10(1):1-10.
2004. Adaptively-Secure, Non-Interactive Public-Key Encryption. Model reduction methods for vector autoregressive processes. :150-150.
2012. Efficient Password Authenticated Key Exchange via Oblivious Transfer. Public Key Cryptography – PKC 2012. :449-466.
2003. A forward-secure public-key encryption scheme. Advances in Cryptology—Eurocrypt 2003. :646-646.
2005. Universally composable password-based key exchange. Advances in Cryptology–Eurocrypt 2005. :557-557.
2004. Chosen-ciphertext security from identity-based encryption. Advances in Cryptology-Eurocrypt 2004. :207-222.
2011. IA*: An adjacency-based representation for non-manifold simplicial shapes in arbitrary dimensions. Computers & Graphics. 35(3):747-753.
2011. A Decomposition-based Approach to Modeling and Understanding Arbitrary Shapes. Eurographics Italian Chapter Conference 2011. :53-60.
2013. Quantification of Vibrio parahaemolyticus, Vibrio vulnificus and Vibrio cholerae in French Mediterranean coastal lagoons. Research in Microbiology. 164(8):867-874.
2003. An appearance based approach for human and object tracking. Image Processing, 2003. ICIP 2003. Proceedings. 2003 International Conference on. 2:II-85-8vol.3-II-85-8vol.3.