Publications

Export 1377 results:
Author [ Title(Asc)] Type Year
Filters: First Letter Of Last Name is R  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
S
Belhumeur P, Chen D, Feiner S, Jacobs DW, Kress W, Ling H, Lopez I, Ramamoorthi R, Sheorey S, White S.  2008.  Searching the world’s herbaria: A system for visual identification of plant species. Computer Vision–ECCV 2008. :116-129.
Jong F D, Oard D, Ordelman R, Raaijmakers S.  2007.  Searching spontaneous conversational speech. ACM SIGIR Forum. 41:104-104.
Plaisant C, Lam S, Shneiderman B, Smith MS, Roseman D, Marchand G, Gillam M, Feied C, Handler J, Rappaport H.  2008.  Searching Electronic Health Records for Temporal Patterns in Patient Histories: A Case Study with Microsoft Amalga. AMIA Annual Symposium ProceedingsAMIA Annu Symp Proc. 2008:601-605.
Plaisant C, Lam S, Shneiderman B, Smith MS, Roseman D, Marchand G, Gillam M, Feied C, Handler J, Rappaport H.  2008.  Searching Electronic Health Records for Temporal Patterns in Patient Histories: A Case Study with Microsoft Amalga. AMIA Annual Symposium ProceedingsAMIA Annu Symp Proc. 2008:601-605.
Roussopoulos N, Mark L.  1985.  Schema manipulation in self-describing and self-documenting data models. International Journal of Parallel Programming. 14(1):1-28.
Kumar V, Marathe M, Parthasarathy S, Srinivasan A.  2005.  Scheduling on Unrelated Machines Under Tree-Like Precedence Constraints. Approximation, Randomization and Combinatorial Optimization. Algorithms and TechniquesApproximation, Randomization and Combinatorial Optimization. Algorithms and Techniques. 3624:609-609.
Tomasic A, Raschid L, Valduriez P.  1996.  Scaling heterogeneous databases and the design of DISCO. ICDCS. :449-449.
Zadorozhny V, Raschid L, Gal A.  2008.  SCALABLE CATALOG INFRASTRUCTURE FOR MANAGING ACCESS COSTS AND SOURCE SELECTION IN WIDE AREA NETWORKS. International Journal of Cooperative Information Systems. 17(1):77-109.
Nagarajan N, Read TD, Pop M.  2008.  Scaffolding and Validation of Bacterial Genome Assemblies Using Optical Restriction Maps. Bioinformatics. 24(10):1229-1235.
Roitman H, Gal A, Raschid L.  2008.  Satisfying Complex Data Needs using Pull-Based Online Monitoring of Volatile Data Sources. Data Engineering, International Conference on. :1465-1467.
Roitman H, Gal A, Raschid L.  2008.  Satisfying Complex Data Needs using Pull-Based Online Monitoring of Volatile Data Sources. Data Engineering, International Conference on. :1465-1467.
Reggia JA, Nau DS.  1983.  S., Wang. PY, Diagnostic Expert Systems Based on a Set Covering Model. International Journal on Man-Machine studies. 19:437–46O-437–46O.
R
Ranganathan M, Acharya A, Edjlali G, Sussman A, Saltz J.  1996.  Runtime coupling of data-parallel programs. Proceedings of the 10th international conference on Supercomputing. :229-236.
Weems SA, Winder RK, Bunting M, Reggia JA.  2009.  Running memory span: A comparison of behavioral capacity limits with those of an attractor neural network. Cognitive Systems Research. 10(2):161-171.
Brill E, Resnik P.  1994.  A rule-based approach to prepositional phrase attachment disambiguation. Proceedings of the 15th conference on Computational linguistics-Volume 2. :1198-1204.
Sellis T, Roussopoulos N, Faloutsos C.  1987.  The R+-tree: A dynamic index for multi-dimensional data. Proceedings of VLDB 1987. :507-518.
Rosenzweig R, Bronner V, Zhang D, Fushman D, Glickman MH.  2012.  Rpn1 and Rpn2 coordinate ubiquitin processing factors at the proteasome. Journal of Biological ChemistryJ. Biol. Chem..
Reggia JA.  1983.  The Role of Spatial Knowledge in Expert Systems. Representation and Processing of Spatial Knowledge, TR-1275. Dept. of Comp. sci „Univ. of Maryland, May. :3-8.
Zelkowitz MV, Rus L.  2001.  The role of independent verification and validation in maintaining a safety critical evolutionary software in a complex environment: the NASA Space Shuttle program. Software Maintenance, 2001. Proceedings. IEEE International Conference on. :118-126.
Stauder M, Huq A, Pezzati E, Grim CJ, Ramoino P, Pane L, Colwell RR, Pruzzo C, Vezzulli L.  2012.  Role of GbpA protein, an important virulence-related colonization factor, for Vibrio cholerae's survival in the aquatic environment. Environmental Microbiology Reports. (4):439-445.
Dodis Y, Katz J, Reyzin L, Smith A.  2006.  Robust fuzzy extractors and authenticated key agreement from close secrets. Advances in Cryptology-CRYPTO 2006. :232-250.
Rajagopalan AN, Chellappa R, Koterba N.  2003.  Robust Face Recognition in the Presence of Clutter. Audio- and Video-Based Biometric Person AuthenticationAudio- and Video-Based Biometric Person Authentication. 2688:1062-1062.
Grim CJ, Zo Y-G, Hasan NA, Ali A, Chowdhury WB, Islam A, Rashid MH, Alam M, Morris GJ, Huq A et al..  2009.  RNA Colony Blot Hybridization Method for Enumeration of Culturable Vibrio Cholerae and Vibrio Mimicus Bacteria. Applied and Environmental MicrobiologyAppl. Environ. Microbiol.. 75(17):5439-5444.
Konte M, Feamster N.  2012.  Re-wiring Activity of Malicious Networks. Passive and Active MeasurementPassive and Active Measurement. 7192:116-125.
Royer EM, Toh CK, Hicks MW, Kakkar P, Moore JT, Hicks MW, Moore JT, Alexander DS, Gunter CA, Nettles S et al..  2000.  A Review of Current Routing Protocols for Ad Hoc. IEEE Personal Communications. 29:156-71.

Pages