Publications

Export 383 results:
[ Author(Asc)] Title Type Year
Filters: First Letter Of Last Name is H  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
H
Hurter C, Girouard A, Riche N, Plaisant C.  2011.  Active progress bars: facilitating the switch to temporary activities. Proceedings of the 2011 annual conference extended abstracts on Human factors in computing systems. :1963-1968.
Huq A, Sack BR, Nizam A, Longini IM, Nair BG, Ali A, Morris GJ, Khan HMN, Siddique KA, Yunus M et al..  2005.  Critical Factors Influencing the Occurrence of Vibrio Cholerae in the Environment of Bangladesh. Applied and Environmental MicrobiologyAppl. Environ. Microbiol.. 71(8):4645-4654.
Huq A, Anwar R, Colwell RR, McDonald MD, Khan R, Jutla A, Akanda S.  2017.  Assessment of Risk of Cholera in Haiti following Hurricane Matthew. The American Journal of Tropical Medicine and Hygiene. 97(3):896-903.
Huq A, Grim CJ, Colwell RR.  2011.  Aquatic Realm and Cholera. Epidemiological and Molecular Aspects on Cholera. :311-339.
Huq A, Grim C, Colwell RR, Nair BG.  2006.  Detection, Isolation, and Identification of Vibrio cholerae from the Environment. Current Protocols in MicrobiologyCurrent Protocols in Microbiology. :6A.5.1-6A.5.38-6A.5.1-6A.5.38.
Huq A, Whitehouse CA, Grim CJ, Alam M, Colwell RR.  2008.  Biofilms in water, its role and impact in human disease transmission. Current Opinion in Biotechnology. 19(3):244-247.
Huq A, Hasan N, Akanda A, Whitcombe E, Colwell RR, Haley B, Alam M, Jutla A, R. Sack B.  2013.  Environmental Factors Influencing Epidemic Cholera. The American Journal of Tropical Medicine and Hygiene. 89(3):597-607.
Hunter S, Jones P, Mitchell A, Apweiler R, Attwood TK, Bateman A, Bernard T, Binns D, Bork P, Burge S et al..  2012.  InterPro in 2011: new developments in the family and domain prediction database.. Nucleic Acids Res. 40(Database issue):D306-12.
Hung E, Getoor L, V.S. Subrahmanian.  2003.  PXML: a probabilistic semistructured data model and algebra. Data Engineering, 2003. Proceedings. 19th International Conference on. :467-478.
Hung E, Deng Y, V.S. Subrahmanian.  2004.  TOSS: an extension of TAX with ontologies and similarity queries. Proceedings of the 2004 ACM SIGMOD international conference on Management of data. :719-730.
Hung E, Deng Y, V.S. Subrahmanian.  2005.  RDF aggregate queries and views. Data Engineering, 2005. ICDE 2005. Proceedings. 21st International Conference on. :717-728.
Hung E, Getoor L, V.S. Subrahmanian.  2007.  Probabilistic interval XML. ACM Transactions on Computational Logic (TOCL). 8(4)
[Anonymous].  1995.  Dissertations. ACM SIGCHI Bulletin. 27(1):73-75.
Humphrey SM, Shneiderman B.  1992.  DISSERTATIONS: ABSTRACTS OF INTEREST. ACM SIGCHI Bulletin. 24(2):58-75.
Hui A, Vaczlavik L, De Floriani L.  2006.  A decomposition-based representation for 3D simplicial complexes. Proceedings of the fourth Eurographics symposium on Geometry processing. :101-110.
Hui A, De Floriani L.  2007.  Topological Decompositions for 3D Non-manifold Simplicial Shapes. CS-TR-4855
Hui A, De Floriani L.  2007.  A two-level topological decomposition for non-manifold simplicial shapes. Proceedings of the 2007 ACM symposium on Solid and physical modeling. :355-360.
Hui A, De Floriani L.  2006.  A dimension-independent simplicial data structure for non-manifold shapes. CS-TR-4794
Huang S, Cohen MB, Memon AM.  2010.  Repairing GUI Test Suites Using a Genetic Algorithm. Software Testing, Verification and Validation (ICST), 2010 Third International Conference on. :245-254.
Huang Y, Feamster N, Lakhina A, Xu J(J).  2007.  Diagnosing network disruptions with network-wide analysis. SIGMETRICS Perform. Eval. Rev.. 35(1):61-72.
Huang Y, Katz J, Evans D.  2012.  Quid Pro Quo-tocols: Strengthening Semi-Honest Protocols with Dual Execution. IEEE Symposium on Security and Privacy.
Huang C-M, O'Leary DP.  1992.  Preconditioning parallel multisplittings for solving linear systems of equations. Proceedings of the 6th international conference on Supercomputing. :478-484.
Huang M, DeMenthon D, Doermann D, Golebiowski L.  2005.  Document Ranking by Layout Relevance. ICDAR. :362-366.
Huang Y, Malka L, Evans D, Katz J.  2011.  Efficient privacy-preserving biometric identification. Network and Distributed System Security Symposium.
Huang L, Aloimonos Y.  1994.  How normal flow constrains relative depth for an active observer. Image and vision computing. 12(7):435-445.

Pages