Publications

Export 853 results:
Author [ Title(Desc)] Type Year
Filters: First Letter Of Last Name is F  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
D
Konte M, Feamster N, Jung J.  2009.  Dynamics of online scam hosting infrastructure. Passive and Active Network Measurement. :219-228.
E
Getoor L, Ottosson G, Fromherz M, Carlson B.  1997.  Effective redundant constraints for online scheduling. PROCEEDINGS OF THE NATIONAL CONFERENCE ON ARTIFICIAL IN℡LIGENCE. :302-307.
Dickinson BC, Varadan R, Fushman D.  2007.  Effects of cyclization on conformational dynamics and binding properties of Lys48-linked di-ubiquitin. Protein Science. 16(3):369-378.
Cheong LF, Fermüller C, Aloimonos Y.  1998.  Effects of Errors in the Viewing Geometry on Shape Estimation. Computer Vision and Image Understanding. 71(3):356-372.
Cheong LF, Fermüller C, Aloimonos Y.  1998.  Effects of Errors in the Viewing Geometry on Shape Estimation* 1,* 2. Computer Vision and Image Understanding. 71(3):356-372.
Fallah-Adl H, JaJa JF, Liang S, Kaufman YJ, Townshend J.  1995.  Efficient Algorithms for Atmospheric Correction of Remotely Sensed Data. Supercomputing, 1995. Proceedings of the IEEE/ACM SC95 Conference. :12-12.
Fallah-Adl H, JaJa JF, Liang S.  1996.  Efficient algorithms for estimating atmospheric parameters for surface reflectance retrieval. Parallel Processing, 1996., Proceedings of the 1996 International Conference on. 2:132-141vol.2-132-141vol.2.
Ryabov YE, Geraghty C, Varshney A, Fushman D.  2006.  An Efficient Computational Method for Predicting Rotational Diffusion Tensors of Globular Proteins Using an Ellipsoid Representation. Journal of the American Chemical Society. 128(48):15432-15444.
Friedman N, Getoor L.  1999.  Efficient learning using constrained sufficient statistics. Proceedings of the 7th International Workshop on Artificial Intelligence and Statistics (AISTATS-99).
Canetti R, Dachman-Soled D, Vaikuntanathan V, Wee H.  2012.  Efficient Password Authenticated Key Exchange via Oblivious Transfer. Public Key Cryptography – PKC 2012. :449-466.
Roussopoulos N, Faloutsos C, Sellis T.  1988.  An efficient pictorial database system for PSQL. IEEE Transactions on Software Engineering. 14(5):639-650.
Fuchsbauer G, Katz J, Naccache D.  2010.  Efficient rational secret sharing in standard communication networks. Theory of Cryptography. :419-436.
Dachman-Soled D, Malkin T, Raykova M, Yung M.  2009.  Efficient Robust Private Set Intersection. Applied Cryptography and Network Security. :125-142.
Hayden CM, Hardisty EA, Hicks MW, Foster JS.  2009.  Efficient systematic testing for dynamically updatable software. Proceedings of the 2nd International Workshop on Hot Topics in Software Upgrades. :9:1–9:5-9:1–9:5.
Hayden CM, Hardisty EA, Hicks MW, Foster JS.  2009.  Efficient systematic testing for dynamically updatable software. Proceedings of the 2nd International Workshop on Hot Topics in Software Upgrades. :9-9.
Peckerar M, Sander D, Srivastava A, Foli A, Vishkin U.  2007.  Electron beam and optical proximity effect reduction for nanolithography: New results. Journal of Vacuum Science & Technology B. 25(6):2288-2294.
Faruque SM, Sack DA, Sack BR, Colwell RR, Takeda Y, Nair BG.  2003.  Emergence and Evolution of Vibrio Cholerae O139. Proceedings of the National Academy of SciencesPNAS. 100(3):1304-1309.
Feamster N, Jung J, Balakrishnan H.  2005.  An empirical study of "bogon" route advertisements. SIGCOMM Comput. Commun. Rev.. 35(1):63-70.
Friedler SA, Tan Y L, Peer NJ, Shneiderman B.  2008.  Enabling teachers to explore grade patterns to identify individual needs and promote fairer student assessment. Computers & Education. 51(4):1467-1485.
Deshpande A, Khuller S, Malekian A, Toossi M.  2008.  Energy Efficient Monitoring in Sensor Networks. LATIN 2008: Theoretical InformaticsLATIN 2008: Theoretical Informatics. 4957:436-448.
Olsen M, Dorr BJ, Thomas S.  1998.  Enhancing Automatic Acquisition of Thematic Structure in a Large-Scale Lexicon for Mandarin Chinese. Machine Translation and the Information SoupMachine Translation and the Information Soup. 1529:41-50.
Hill VR, Humphrys MS, Kahler AM, Boncy J, Tarr CL, Huq A, Chen A, Katz LS, Mull BJ, Derado G et al..  2015.  Environmental Surveillance for Toxigenic Vibrio cholerae in Surface Waters of Haiti. The American Journal of Tropical Medicine and Hygiene. 92(1):118-125.
Fang H-ren, O'Leary DP.  2011.  Euclidean distance matrix completion problems. Optimization Methods and Software. :1-23.
Chang S, Van Horn D, Felleisen M.  2010.  Evaluating Call-By-Need on the Control Stack. arXiv:1009.3174 [cs].
Hayden C, Smith E, Hardisty E, Hicks MW, Foster JS.  2011.  Evaluating Dynamic Software Update Safety Using Systematic Testing. IEEE Transactions on Software Engineering. PP(99):1-1.

Pages