Publications

Search
Export 1425 results:
Author [ Title(Desc)] Type Year
Filters: First Letter Of Last Name is H  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
A
Hellerstein JM, Franklin MJ, Chandrasekaran S, Deshpande A, Hildrum K, Madden S, Raman V, Shah MA.  2000.  Adaptive query processing: Technology in evolution. IEEE Data Engineering Bulletin. 23(2):7-18.
Hellerstein JM, Franklin MJ, Chandrasekaran S, Deshpande A, Hildrum K, Madden S, Raman V, Shah MA.  2000.  Adaptive query processing: Technology in evolution. IEEE Data Engineering Bulletin. 23(2):7-18.
Canetti R, Halevi S, Katz J.  2005.  Adaptively-secure, non-interactive public-key encryption. Theory of Cryptography. :150-168.
Canetti R, Halevi S, Katz J.  2004.  Adaptively-Secure, Non-Interactive Public-Key Encryption. Model reduction methods for vector autoregressive processes. :150-150.
W Easterday R, Kausrud KL, Star B, Heier L, Haley BJ, Ageyev V, Colwell RR, Stenseth NChr.  2012.  An additional step in the transmission of Yersinia pestis? The ISME Journal. (2):231-236.
W Easterday R, Kausrud KL, Star B, Heier L, Haley BJ, Ageyev V, Colwell RR, Stenseth NChr.  2012.  An additional step in the transmission of Yersinia pestis? The ISME Journal. (2):231-236.
Doermann D, Sauvola J, Haapakoski S, Kauniskangas H, Seppanen T, Pietikainen M.  1997.  ADistributed Management System for Testing Document Image Database Analysis Algorithms. ICDAR. :989-995.
HAMMOUD R, Porikli F, Davis LS.  2010.  Advanced tracking systems: computational approaches to be introduced to new series. Augmented vision & reality. 1
El-Sayed NM, Hegde P, Quackenbush J, Melville SE, Donelson JE.  2000.  The African trypanosome genome. International Journal for Parasitology. 30(4):329-345.
Ertugay O, Hicks MW, Smith J, Kornblum J.  2000.  Agents in Network Management. Technical Reports (CIS).
Horvitz E, Getoor L, Guestrin C, Hendler J, Konstan J, Subramanian D, Wellman M, Kautz H.  2010.  AI Theory and Practice: A Discussion on Hard Challenges and Opportunities Ahead. AI Magazine. 31(3):103-114.
Horvitz E, Getoor L, Guestrin C, Hendler J, Konstan J, Subramanian D, Wellman M, Kautz H.  2010.  AI Theory and Practice: A Discussion on Hard Challenges and Opportunities Ahead. AI Magazine. 31(3):103-114.
Demaine ED, Hajiaghayi MT, Kawarabayashi K.  2005.  Algorithmic graph minor theory: Decomposition, approximation, and coloring. Foundations of Computer Science, 2005. FOCS 2005. 46th Annual IEEE Symposium on. :637-646.
Agarwal PK, Guibas LJ, Edelsbrunner H, Erickson J, Isard M, Har-Peled S, Hershberger J, Jensen C, Kavraki L, Koehl P et al..  2002.  Algorithmic issues in modeling motion. ACM Comput. Surv.. 34(4):550-572.
Agarwal PK, Guibas LJ, Edelsbrunner H, Erickson J, Isard M, Har-Peled S, Hershberger J, Jensen C, Kavraki L, Koehl P et al..  2002.  Algorithmic issues in modeling motion. ACM Comput. Surv.. 34(4):550-572.
Dhaliwal S, Gupta SK, Huang J, Priyadarshini A.  2003.  Algorithms for computing global accessibility cones. Journal of Computing and Information Science in Engineering. 3:200-200.
Condon A, Deshpande A, Hellerstein L, Wu N.  2009.  Algorithms for distributional and adversarial pipelined filter ordering problems. ACM Trans. Algorithms. 5(2):24:1–24:34-24:1–24:34.
Han B, Ji L, Lee S, Bhattacharjee B, Miller RR.  2009.  All Bits Are Not Equal - A Study of IEEE 802.11 Communication Bit Errors. INFOCOM 2009, IEEE. :1602-1610.
Hannenhalli S, Russell RB.  2000.  Analysis and prediction of functional sub-types from protein sequence alignments. Journal of Molecular Biology. 303(1):61-76.
Hannenhalli S, Russell RB.  2001.  Analysis and prediction of protein functional sub-types from protein sequence alignments. EP20000203764(EP1096411)
Condon E, He A, Cukier M.  2008.  Analysis of Computer Security Incident Data Using Time Series Models. :77-86.
Varna AL, He S, Swaminathan A, M. Wu.  2007.  Analysis of Nonlinear Collusion Attacks on Fingerprinting Systems for Compressed Multimedia. Image Processing, 2007. ICIP 2007. IEEE International Conference on. 2:II-133-II-136-II-133-II-136.
Diehl S, Diehl F, El-Sayed NM, Clayton C, Hoheisel JD.  2002.  Analysis of stage-specific gene expression in the bloodstream and the procyclic form of Trypanosoma brucei using a genomic DNA-microarray. Molecular and Biochemical Parasitology. 123(2):115-123.
Falk J, Zebelein C, Keinert J, Haubelt C, Teich J, Bhattacharyya SS.  2011.  Analysis of SystemC actor networks for efficient synthesis. ACM Trans. Embed. Comput. Syst.. 10(2):18:1-18:34.
Hicks MW.  2007.  Analyzing information flow. Conference on Programming Language Design and Implementation: Proceedings of the 2007 workshop on Programming languages and analysis for security.

Pages