Publications

Export 7148 results:
[ Author(Desc)] Title Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
D
Diehl S, Diehl F, El-Sayed NM, Clayton C, Hoheisel JD.  2002.  Analysis of stage-specific gene expression in the bloodstream and the procyclic form of Trypanosoma brucei using a genomic DNA-microarray. Molecular and Biochemical Parasitology. 123(2):115-123.
Diehl CP, Namata G, Getoor L.  2007.  Relationship identification for social network discovery. PROCEEDINGS OF THE NATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE. 22(1):546-546.
Dietterich TG, Domingos P, Getoor L, Muggleton S, Tadepalli P.  2008.  Structured machine learning: the next ten years. Machine Learning. 73(1):3-23.
Dikshit P, Guimaraes K, Ramamurthy M, Agrawala AK, Larsen RL.  1989.  Dynamic bin packing problem. SIAM Journal on Computing. 12(14):227-258.
Dillencourt MB, Mount D, Netanyahu NS.  1992.  A randomized algorithm for slope selection. International Journal of Computational Geometry and Applications. 2(1):1-27.
Dillencourt MB, Mount D, Saalfeld AJ.  1993.  On The Maximum Number of Intersections of Two Polyhedra in 2 and 3 Dimensions. Proceedings of the Fifth Canadian Conference on Computational Geometry, Waterloo, Ontario. :49-54.
Dingermann T, Sharp S, Appel B, DeFranco D, Mount SM, Heiermann R, Pongs O, Söll D.  1981.  Transcription of cloned tRNA and 5S RNA genes in a Drosophila cell free extract. Nucleic Acids ResearchNucl. Acids Res.. 9(16):3907-3918.
Dix J, Kraus S, V.S. Subrahmanian.  2002.  Agents dealing with time and uncertainty. Proceedings of the first international joint conference on Autonomous agents and multiagent systems: part 2. :912-919.
Dix J, Munoz-Avila H, Nau DS, Zhang L.  2002.  Theoretical and Empirical Aspects of a Planner in a Multi-agent Environment. Logics in Artificial Intelligence. 2424:173-185.
Dix J, Kuter U, Nau DS.  2003.  Planning in Answer Set Programming Using Ordered Task Decomposition. KI 2003: Advances in Artificial Intelligence. 2821:490-504.
Dix J, Muñoz-Avila H, Nau DS, Zhang L.  2002.  Planning in a multi-agent environment: theory and practice. :944-945.
Dix J, Kraus S, V.S. Subrahmanian.  2001.  Temporal agent programs. Artificial Intelligence. 127(1):87-135.
Dix A, Jones W, Czerwinski M, Teevan J, Plaisant C, Moran TP.  2005.  The Challenge of Personal Information Management. INTERACT'05: Communicating Naturally through Computers (Adjunct Proceedings).
Dix J, Muñoz-Avila H, Nau DS, Zhang L.  2003.  IMPACTing SHOP: Putting an AI Planner Into a Multi-Agent Environment. Annals of Mathematics and Artificial Intelligence. 37(4):381-407.
Dix J, Kuter U, Nau DS.  2002.  HTN Planning in Answer Set Programming. UMIACS-TR-2002-18
Djikeng A, Raverdy S, Foster JS, Bartholomeu D, Zhang Y, El-Sayed NM, Carlow C.  2007.  Cofactor-independent phosphoglycerate mutase is an essential gene in procyclic form Trypanosoma brucei. Parasitology research. 100(4):887-892.
Doan K, Plaisant C, Shneiderman B, Bruns T.  1997.  Query previews for networked information systems: a case study with NASA environmental data. SIGMOD Record. 26(1):75-81.
Doan K, Plaisant C, Shneiderman B.  1995.  QUERY PREVIEWS IN NETWORKED INFORMATION SYSTEMS. Institute for Systems Research Technical Reports.
Dodis Y, Katz J, Smith A, Walfish S.  2009.  Composability and on-line deniability of authentication. Theory of Cryptography. :146-162.
Dodis Y, Franklin M, Katz J, Miyaji A, Yung M.  2004.  A generic construction for intrusion-resilient public-key encryption. Topics in Cryptology–CT-RSA 2004. :1997-1997.
Dodis Y, Franklin M, Katz J, Miyaji A, Yung M.  2003.  Intrusion-resilient public-key encryption. Topics in Cryptology—CT-RSA 2003. :19-32.
Dodis Y, Katz J.  2005.  Chosen-ciphertext security of multiple encryption. Theory of Cryptography. :188-209.
Dodis Y, Katz J, Xu S, Yung M.  2002.  Key-insulated public key cryptosystems. Advances in Cryptology—Eurocrypt 2002. :65-82.
Dodis Y, Katz J, Reyzin L, Smith A.  2006.  Robust fuzzy extractors and authenticated key agreement from close secrets. Advances in Cryptology-CRYPTO 2006. :232-250.
Dodis Y, Katz J, Xu S, Yung M.  2002.  Strong key-insulated signature schemes. Public Key Cryptography—PKC 2003. :130-144.

Pages