Publications
Export 292 results:
Author Title [ Type] Year Filters: First Letter Of Title is F [Clear All Filters]
1989. Functional and psychosocial effects of multimodality limb-sparing therapy in patients with soft tissue sarcomas. Journal of Clinical Oncology. 7(9):1217-1217.
2006. Functional Analysis of Hes-1 in Preadipocytes. Molecular EndocrinologyMolecular Endocrinology. 20(3):698-705.
1991. Fully deadline-coupled planning: One step at a time. Methodologies for Intelligent Systems. :589-599.
1994. Fully abstract characterizations of testing preorders for probabilistic processes. CONCUR'94: Concurrency Theory. :497-512.
2007. Full Spectrum Modeling: From Simplicity to Elaboration and Realism in Urban Pattern Formation. North american association computational social and organization sciences conference (NAACSOS).
1995. A front-end generator for verification tools. Tools and Algorithms for the Construction and Analysis of Systems. :153-173.
2008. From Videos to Verbs: Mining Videos for Activities using a cascade of dynamical systems (Supplemental Material). Relation. 10(1.13):9944-9944.
1994. From syntactic encodings to thematic roles: Building lexical entries for interlingual MT. Machine Translation. 9(3):221-250.
2006. From sample similarity to ensemble similarity: probabilistic distance measures in reproducing kernel Hilbert space. Pattern Analysis and Machine Intelligence, IEEE Transactions on. 28(6):917-929.
2009. From New Zealand to Mongolia: Co-designing and deploying a digital library for the world's children. Special issue of Children, Youth and Environments: Children in Technological Environments: Interaction, Development, and Design.
2000. From instances to classes in probabilistic relational models. Proc. ICML 2000 Workshop on Attribute-Value and Relational Learning.
2010. From bowling alone to tweeting together: technology-mediated social participation. Interactions. 17(2):64-67.
1998. Frequentist and Bayesian Coverage Estimations for Stratified Fault-Injection. DEPENDABLE COMPUTING AND FAULT TOLERANT SYSTEMS. 11:43-62.
2010. A framework for theoretical analysis of content fingerprinting. Proc. of SPIE Media Forensics and Security.
2005. A framework for set-oriented computation in inductive logic programming and its application in generalizing inverse entailment. Inductive Logic Programming. :69-86.
2006. Fourier analysis of multigrid for a model two-dimensional convection-diffusion equation. BIT Numerical Mathematics. 46(2):283-306.
1999. Four algorithms for the efficient computation of truncated pivoted QR approximations to a sparse matrix. Numerische Mathematik. 83(2):313-323.