Publications
Export 1435 results:
Author [ Title] Type Year Filters: First Letter Of Last Name is K [Clear All Filters]
2018. Spores and soil from six sides: interdisciplinarity and the environmental biology of anthrax (Bacillus anthracis). Biological Reviews. (4):1813-1831.
2018. Spores and soil from six sides: interdisciplinarity and the environmental biology of anthrax (Bacillus anthracis). Biological Reviews. (4):1813-1831.
2018. Spores and soil from six sides: interdisciplinarity and the environmental biology of anthrax (Bacillus anthracis). Biological Reviews. (4):1813-1831.
2011. Speeding Up Network Layout and Centrality Measures for Social Computing Goals. Social Computing, Behavioral-Cultural Modeling and PredictionSocial Computing, Behavioral-Cultural Modeling and Prediction. 6589:244-251.
1993. Speech versus mouse commands for word processing: an empirical evaluation. International Journal of Man-Machine Studies. 39(4):667-687.
1999. Specifying the PLAN Network Programming Langauge. Electronic Notes in Theoretical Computer Science. 26:87-104.
2010. Special Section on Distributed Camera Networks: Sensing, Processing, Communication, and Implementation. Image Processing, IEEE Transactions on. 19(10):2513-2515.
2004. Special issue: 35th Annual ACM Symposium on Theory of Computing. Journal of Computer and System Sciences. 69(3):305-305.
1999. Special effect edit detection using VideoTrails: a comparison with existing techniques. Proceedings of SPIE - Conference on Storage and Retrieval for Image and Video Databases VII. :302-313.
1999. Solution Structure of the Proapoptotic Molecule BID: A Structural Basis for Apoptotic Agonists and Antagonists. Cell. 96(5):625-634.
2005. Software synthesis from the dataflow interchange format. Proceedings of the 2005 workshop on Software and compilers for embedded systems. :37-49.
1994. Software reliability analysis of three successive generations of a Switching System. Dependable Computing — EDCC-1. 852:471-490.
1994. Software reliability analysis of three successive generations of a Switching System. Dependable Computing — EDCC-1. 852:471-490.
2009. Smooth projective hashing and password-based authenticated key exchange from lattices. Advances in Cryptology–ASIACRYPT 2009. :636-652.
1994. Slipped-strand mispairing in a plastid gene: ıt rpoC2 in grasses (Poaceae). Mol Biol Evol. 11(1):1-8.
1994. Slipped-strand mispairing in a plastid gene: ıt rpoC2 in grasses (Poaceae). Mol Biol Evol. 11(1):1-8.
1993. Situated reasoning within tight deadlines and realistic space and computation bounds. Proc. Common Sense. 93
1994. Simulation of the transient characteristics of partially- and fully-depleted SOI MOSFETs. Solid-State Electronics. 37(7):1387-1394.
1996. Simulation of the logic switching characteristics of hot-carrier-degraded ultra-thin SOI CMOS inverters. Solid-State Electronics. 39(11):1669-1674.
2000. Simulation based learning environments and the use of learning histories. CHI '00 extended abstracts on Human factors in computing systems. :2-3.
2000. Simulation based learning environments and the use of learning histories. CHI '00 extended abstracts on Human factors in computing systems. :2-3.
2005. Simulation and Secure Computation-Handling Expected Polynomial-Time Strategies in Simulation-Based Security Proofs. Lecture Notes in Computer Science. 3378:128-149.