Publications

Export 1734 results:
Author Title [ Type(Desc)] Year
Filters: First Letter Of Last Name is M  [Clear All Filters]
Journal Articles
Miller M, Perlis D.  1991.  Typicality constants and range defaults: Some pros and cons of a cognitive model of default reasoning. Methodologies for Intelligent Systems. :560-569.
Mount SM, Pettersson I, Hinterberger M, Karmas A, Steitz JA.  1983.  The U1 small nuclear RNA-protein complex selectively binds a 5′ splice site in vitro. Cell. 33(2):509-518.
Chaiyanan S, Chaiyanan S, Grim C, Maugel T, Huq A, Colwell RR.  2007.  Ultrastructure of coccoid viable but non‐culturable Vibrio cholerae. Environmental Microbiology. 9(2):393-402.
Fermüller C, Malm H.  2004.  Uncertainty in visual processes predicts geometrical optical illusions. Vision Research. 44(7):727-749.
Sharara H, Singh L, Getoor L, Mann J.  2011.  Understanding actor loyalty to event-based groups in affiliation networks. Social Network Analysis and Mining. 1(2):115-126.
Mao Y, M. Wu.  2007.  Unicity Distance of Robust Image Hashing. Information Forensics and Security, IEEE Transactions on. 2(3):462-467.
Arya S, da Fonseca G, Mount D.  2010.  A unified approach to approximate proximity searching. Algorithms–ESA 2010. :374-385.
Kumar AVS, Marathe MV, Parthasarathy S, Srinivasan A.  2009.  A unified approach to scheduling on unrelated parallel machines. J. ACM. 56(5):28:1–28:31-28:1–28:31.
Alivisatos A.P, Blaser M.J, Brodie E.L, Chun M., Dangl J.L, Donohue T.J, Dorrestein P.C, Gilbert J.A, Green J.L, Jansson J.K et al..  2015.  A unified initiative to harness Earth's microbiomes. Science. (62607551614341176):507-508.
Alivisatos A.P, Blaser M.J, Brodie E.L, Chun M., Dangl J.L, Donohue T.J, Dorrestein P.C, Gilbert J.A, Green J.L, Jansson J.K et al..  2015.  A unified initiative to harness Earth's microbiomes. Science. (62607551614341176):507-508.
Alivisatos A.P, Blaser M.J, Brodie E.L, Chun M., Dangl J.L, Donohue T.J, Dorrestein P.C, Gilbert J.A, Green J.L, Jansson J.K et al..  2015.  A unified initiative to harness Earth's microbiomes. Science. (62607551614341176):507-508.
Mount D, Chandran S.  1988.  A united approach to finding enclosing and enclosed triangles. Proceedings of 26th Allerton Conference on Communication, Control and Computing.
Canetti R, Halevi S, Katz J, Lindell Y, MacKenzie P.  2005.  Universally composable password-based key exchange. Advances in Cryptology–Eurocrypt 2005. :557-557.
Martin, M.P, Priebe S, Wu M.  2008.  Upstream and downstream influence on the unsteadiness of STBLI using DNS data in two configurations. AIAA Paper 2008-0719, 46, h.
Goldberg L, Lide B, Lowry S, Massett HA, O'Connell T, Preece J, Quesenbery W, Shneiderman B.  2011.  Usability and Accessibility in Consumer Health Informatics: Current Trends and Future Challenges. American Journal of Preventive Medicine. 40(5, Supplement 2):S187-S197-S187-S197.
Samet H, Alborzi H, Brabec F, Esperança C, Hjaltason GR, Morgan F, Tanin E.  2003.  Use of the SAND spatial browser for digital government applications. Commun. ACM. 46(1):61-64.
Seaman CB, Mendonca MG, Basili VR, Kim YM.  2003.  User interface evaluation and empirically-based evolution of a prototype experience management tool. Software Engineering, IEEE Transactions on. 29(9):838-850.
Xie Q, Memon AM.  2008.  Using a pilot study to derive a GUI model for automated testing. ACM Transactions on Software Engineering and Methodology (TOSEM). 18(2):7:1–7:35-7:1–7:35.
Hollingsworth J, Miller EL.  1997.  Using content-derived names for configuration management. ACM SIGSOFT Software Engineering Notes. 22(3):104-109.
Jensen CS, Mark L, Roussopoulos N, Sells T.  1993.  Using differential technlques to efficiently support transaction time. The VLDB JournalVLDB Journal. 2(1):75-111.
Molina J, Arbaugh WA.  2002.  Using independent auditors as intrusion detection systems. Information and Communications Security. :291-302.
Raschid L, Ye Q, Zadorozhny V, Gal A, Murthy H.  2005.  Using Non-random Associations for Predicting Latency in WANs. Web Information Systems Engineering – WISE 2005.
Pradhan S, Minker J.  1996.  Using priorities to combine knowledge bases. International Journal of Cooperative Information Systems. 5(2):333-333.
Memon AM.  2009.  Using reverse engineering for automated usability evaluation of GUI-based applications. Human-Centered Software Engineering. :335-355.
Ford TE, Colwell RR, Rose JB, Morse SS, Rogers DJ, Yates TL.  2009.  Using Satellite Images of Environmental Changes to Predict Infectious Disease Outbreaks. Emerging Infectious DiseasesEmerg Infect Dis. 15(9):1341-1346.

Pages