Publications

Export 1377 results:
Author Title [ Type(Asc)] Year
Filters: First Letter Of Last Name is R  [Clear All Filters]
Journal Articles
Resnik P.  2011.  Semantic similarity in a taxonomy: An information-based measure and its application to problems of ambiguity in natural language. Arxiv preprint arXiv:1105.5444.
Mitamura T, Miller K, Dorr BJ, Farwell D, Habash N, Helmreich S, Hovy E, Levin L, Rambow O, Reeder F et al..  2004.  Semantic Annotation for Interlingual Representation of Multilingual Texts. Workshop Programme. :19-19.
Mitamura T, Miller K, Dorr BJ, Farwell D, Habash N, Helmreich S, Hovy E, Levin L, Rambow O, Reeder F et al..  2004.  Semantic Annotation for Interlingual Representation of Multilingual Texts. Workshop Programme. :19-19.
Dorr BJ, Green R, Levin L, Rambow O, Farwell D, Habash N, Helmreich S, Hovy E, Miller KJ, Mitamura T et al..  2004.  Semantic annotation and lexico-syntactic paraphrase. Proceedings of the 4th International Conference on Language Resources and Evaluation (LREC) Workshop on Building Lexical Resources from Semantically Annotated Corpora. :47-52.
Reggia JA, Lohn JD, Chou HH.  1998.  Self-replicating structures: evolution, emergence, and computation. Artificial Life. 4(3):283-302.
Reggia JA, Sutton III GG.  1988.  Self-processing networks and their biomedical implications. Proceedings of the IEEE. 76(6):680-692.
Roussopoulos N, Mark L.  1985.  SELF-DESCRIBING AND SELF-DOCUMENTING DATABASE SYSTEMS. Languages for automation. :275-275.
Martin CE, Reggia JA.  2010.  Self-assembly of neural networks viewed as swarm intelligence. Swarm Intelligence. 4(1):1-36.
Resnik P.  1996.  Selectional constraints: an information-theoretic model and its computational realization. Cognition. 61(1-2):127-159.
Roussopoulos N, Yeh RT.  1985.  SEES—A Software testing Environment Support System. IEEE Transactions on Software Engineering. SE-11(4):355-366.
Aloimonos Y, Fermüller C, Rosenfeld A.  1995.  Seeing and understanding: representing the visual world. ACM Comput. Surv.. 27(3):307-309.
Ramachandran A, Mundada Y, Tariq MB, Feamster N.  2008.  Securing enterprise networks using traffic tainting. Special Interest Group on Data Communication.
Ray A, Sengupta B, Cleaveland R.  2005.  Secure requirements elicitation through triggered message sequence charts. Distributed Computing and Internet Technology. :273-282.
Gennaro R, Katz J, Krawczyk H, Rabin T.  2010.  Secure network coding over the integers. Public Key Cryptography–PKC 2010. :142-160.
Choi S, Hwang KW, Katz J, Malkin T, Rubenstein D.  2012.  Secure multi-party computation of boolean circuits with applications to privacy in on-line marketplaces. Topics in Cryptology–CT-RSA 2012. :416-432.
Bhattacharjee B, Rodrigues R, Kouznetsov P.  2007.  Secure lookup without (constrained) flooding. WRAITS 2007.
Pillai J, Patel VM, Chellappa R, Ratha N.  2010.  Secure and robust iris recognition using random projections and sparse representations. Pattern Analysis and Machine Intelligence, IEEE Transactions on. (99):1-1.
Belhumeur P, Chen D, Feiner S, Jacobs DW, Kress W, Ling H, Lopez I, Ramamoorthi R, Sheorey S, White S.  2008.  Searching the world’s herbaria: A system for visual identification of plant species. Computer Vision–ECCV 2008. :116-129.
Jong F D, Oard D, Ordelman R, Raaijmakers S.  2007.  Searching spontaneous conversational speech. ACM SIGIR Forum. 41:104-104.
Plaisant C, Lam S, Shneiderman B, Smith MS, Roseman D, Marchand G, Gillam M, Feied C, Handler J, Rappaport H.  2008.  Searching Electronic Health Records for Temporal Patterns in Patient Histories: A Case Study with Microsoft Amalga. AMIA Annual Symposium ProceedingsAMIA Annu Symp Proc. 2008:601-605.
Plaisant C, Lam S, Shneiderman B, Smith MS, Roseman D, Marchand G, Gillam M, Feied C, Handler J, Rappaport H.  2008.  Searching Electronic Health Records for Temporal Patterns in Patient Histories: A Case Study with Microsoft Amalga. AMIA Annual Symposium ProceedingsAMIA Annu Symp Proc. 2008:601-605.
Roussopoulos N, Mark L.  1985.  Schema manipulation in self-describing and self-documenting data models. International Journal of Parallel Programming. 14(1):1-28.
Zadorozhny V, Raschid L, Gal A.  2008.  SCALABLE CATALOG INFRASTRUCTURE FOR MANAGING ACCESS COSTS AND SOURCE SELECTION IN WIDE AREA NETWORKS. International Journal of Cooperative Information Systems. 17(1):77-109.
Nagarajan N, Read TD, Pop M.  2008.  Scaffolding and Validation of Bacterial Genome Assemblies Using Optical Restriction Maps. Bioinformatics. 24(10):1229-1235.
Reggia JA, Nau DS.  1983.  S., Wang. PY, Diagnostic Expert Systems Based on a Set Covering Model. International Journal on Man-Machine studies. 19:437–46O-437–46O.

Pages