Publications

Export 7148 results:
[ Author(Desc)] Title Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
B
Berman P, Hannenhalli S, Karpinski M.  2002.  1.375-Approximation Algorithm for Sorting by Reversals. Algorithms — ESA 2002Algorithms — ESA 2002. 2461:401-408.
Berman P, Hannenhalli S.  1996.  Fast sorting by reversal. Combinatorial Pattern MatchingCombinatorial Pattern Matching. 1075:168-185.
Bernardo M, Cleaveland R.  1999.  A Theory of Efficiency for Markovian Processes. University of Bologna.
Bernstein LB, Mount SM, Weiner AM.  1983.  Pseudogenes for human small nuclear RNA U3 appear to arise by integration of self-primed reverse transcripts of the RNA into new chromosomal sites. CellCell. 32(2):461-472.
Berriman M, Ghedin E, Hertz-Fowler C, Blandin G, Renauld H, Bartholomeu DC, Lennard NJ, Caler E, Hamlin NE, Haas B et al..  2005.  The genome of the African trypanosome Trypanosoma brucei. Science. 309(5733):416-416.
Berry MW, Pulatova SA, Stewart G.W.  2005.  Algorithm 844: Computing sparse reduced-rank approximations to sparse matrices. ACM Transactions on Mathematical Software-TOMS. 31(2):252-269.
Berry C, Hannenhalli S, Leipzig J, Bushman FD.  2006.  Selection of Target Sites for Mobile DNA Integration in the Human Genome. PLoS Comput BiolPLoS Comput Biol. 2(11):e157-e157.
Berthier R, Cukier M.  2008.  The Deployment of a Darknet on an Organization-Wide Network: An Empirical Analysis. :59-68.
Berthier R, Cukier M.  2009.  An evaluation of connection characteristics for separating network attacks. International Journal of Security and Networks. 4(1):110-124.
Berthier R, Cukier M, Hiltunen M, Kormann D, Vesonder G, Sheleheda D.  2010.  Nfsight: netflow-based network awareness tool.
Berthier R, Arjona J, Cukier M.  2009.  Analyzing the process of installing rogue software. :560-565.
Berthier R, Korman D, Cukier M, Hiltunen M, Vesonder G, Sheleheda D.  2008.  On the Comparison of Network Attack Datasets: An Empirical Analysis. :39-48.
Bertini E, Perer A, Plaisant C, Santucci G.  2008.  BELIV'08: Beyond time and errors: novel evaluation methods for information visualization. CHI '08 extended abstracts on Human factors in computing systems. :3913-3916.
Bertini E, Plaisant C, Santucci G.  2007.  BELIV'06: beyond time and errors: novel evaluation methods for information visualization. interactions. 14(3):59-60.
Bertotti G, Mayergoyz ID.  2006.  The Science of Hysteresis: Mathematical modeling and applications.
Bertotti G, Mayergoyz ID, Serpico C, d'Aquino M.  2003.  Geometrical analysis of precessional switching and relaxation in uniformly magnetized bodies. Magnetics, IEEE Transactions on. 39(5):2501-2503.
Bertotti G, Mayergoyz ID, Serpico C.  2003.  Critical fields and pulse durations for precessional switching of thin magnetic films. Magnetics, IEEE Transactions on. 39(5):2504-2506.
Bertotti G, Mayergoyz ID, Serpico C.  2002.  Perturbation technique for LLG dynamics in uniformly magnetized bodies subject to RF fields. Magnetics, IEEE Transactions on. 38(5):2403-2405.
Bertrand F, Bramley R, Bernholdt DE, Kohl JA, Sussman A, Larson JW, Damevski KB.  2006.  Data redistribution and remote method invocation for coupled components. Journal of Parallel and Distributed Computing. 66(7):931-946.
Bertrand F, Bramley R, Sussman A, Bernholdt DE, Kohl JA, Larson JW, Damevski KB.  2005.  Data Redistribution and Remote Method Invocation in Parallel Component Architectures. Parallel and Distributed Processing Symposium, International. 1:40b-40b.
Berwick R, Weinberg A.  1985.  Deterministic parsing: A modern view. 15:15-33.
Berwick RC, Weinberg A.  1983.  Syntactic constraints and efficient parsability. :119-122.
Bessiere K, Ceaparu I, Lazar J, Robinson J, Shneiderman B.  2005.  Social and Psychological Influences on Computer User Frustration (Newhagen book chapter, 2002). Institute for Systems Research Technical Reports.
Bessiere K, Ceaparu I, Lazar J, Robinson J, Shneiderman B.  2004.  Social and psychological influences on computer user frustration. Media access: Social and psychological dimensions of new technology useMedia access: Social and psychological dimensions of new technology use. :91-103.
Bessière K, Newhagen JE, Robinson JP, Shneiderman B.  2006.  A model for computer frustration: the role of instrumental and dispositional factors on incident, session, and post-session frustration and mood. Computers in Human Behavior. 22(6):941-961.

Pages