Publications
Export 1734 results:
Author Title [ Type] Year Filters: First Letter Of Last Name is M [Clear All Filters]
1991. Typicality constants and range defaults: Some pros and cons of a cognitive model of default reasoning. Methodologies for Intelligent Systems. :560-569.
1983. The U1 small nuclear RNA-protein complex selectively binds a 5′ splice site in vitro. Cell. 33(2):509-518.
2007. Ultrastructure of coccoid viable but non‐culturable Vibrio cholerae. Environmental Microbiology. 9(2):393-402.
2004. Uncertainty in visual processes predicts geometrical optical illusions. Vision Research. 44(7):727-749.
2011. Understanding actor loyalty to event-based groups in affiliation networks. Social Network Analysis and Mining. 1(2):115-126.
2007. Unicity Distance of Robust Image Hashing. Information Forensics and Security, IEEE Transactions on. 2(3):462-467.
2009. A unified approach to scheduling on unrelated parallel machines. J. ACM. 56(5):28:1–28:31-28:1–28:31.
1988. A united approach to finding enclosing and enclosed triangles. Proceedings of 26th Allerton Conference on Communication, Control and Computing.
2005. Universally composable password-based key exchange. Advances in Cryptology–Eurocrypt 2005. :557-557.
2008. Upstream and downstream influence on the unsteadiness of STBLI using DNS data in two configurations. AIAA Paper 2008-0719, 46, h.
2011. Usability and Accessibility in Consumer Health Informatics: Current Trends and Future Challenges. American Journal of Preventive Medicine. 40(5, Supplement 2):S187-S197-S187-S197.
2003. Use of the SAND spatial browser for digital government applications. Commun. ACM. 46(1):61-64.
2003. User interface evaluation and empirically-based evolution of a prototype experience management tool. Software Engineering, IEEE Transactions on. 29(9):838-850.
2008. Using a pilot study to derive a GUI model for automated testing. ACM Transactions on Software Engineering and Methodology (TOSEM). 18(2):7:1–7:35-7:1–7:35.
1997. Using content-derived names for configuration management. ACM SIGSOFT Software Engineering Notes. 22(3):104-109.
1993. Using differential technlques to efficiently support transaction time. The VLDB JournalVLDB Journal. 2(1):75-111.
2002. Using independent auditors as intrusion detection systems. Information and Communications Security. :291-302.
2005. Using Non-random Associations for Predicting Latency in WANs. Web Information Systems Engineering – WISE 2005.
1996. Using priorities to combine knowledge bases. International Journal of Cooperative Information Systems. 5(2):333-333.
2009. Using reverse engineering for automated usability evaluation of GUI-based applications. Human-Centered Software Engineering. :335-355.
2009. Using Satellite Images of Environmental Changes to Predict Infectious Disease Outbreaks. Emerging Infectious DiseasesEmerg Infect Dis. 15(9):1341-1346.