Publications
Export 1377 results:
Author [ Title] Type Year Filters: First Letter Of Last Name is R [Clear All Filters]
2008. Searching the world’s herbaria: A system for visual identification of plant species. Computer Vision–ECCV 2008. :116-129.
2008. Searching Electronic Health Records for Temporal Patterns in Patient Histories: A Case Study with Microsoft Amalga. AMIA Annual Symposium ProceedingsAMIA Annu Symp Proc. 2008:601-605.
2008. Searching Electronic Health Records for Temporal Patterns in Patient Histories: A Case Study with Microsoft Amalga. AMIA Annual Symposium ProceedingsAMIA Annu Symp Proc. 2008:601-605.
1985. Schema manipulation in self-describing and self-documenting data models. International Journal of Parallel Programming. 14(1):1-28.
2005. Scheduling on Unrelated Machines Under Tree-Like Precedence Constraints. Approximation, Randomization and Combinatorial Optimization. Algorithms and TechniquesApproximation, Randomization and Combinatorial Optimization. Algorithms and Techniques. 3624:609-609.
2008. SCALABLE CATALOG INFRASTRUCTURE FOR MANAGING ACCESS COSTS AND SOURCE SELECTION IN WIDE AREA NETWORKS. International Journal of Cooperative Information Systems. 17(1):77-109.
2008. Scaffolding and Validation of Bacterial Genome Assemblies Using Optical Restriction Maps. Bioinformatics. 24(10):1229-1235.
2008. Satisfying Complex Data Needs using Pull-Based Online Monitoring of Volatile Data Sources. Data Engineering, International Conference on. :1465-1467.
2008. Satisfying Complex Data Needs using Pull-Based Online Monitoring of Volatile Data Sources. Data Engineering, International Conference on. :1465-1467.
1983. S., Wang. PY, Diagnostic Expert Systems Based on a Set Covering Model. International Journal on Man-Machine studies. 19:437–46O-437–46O.
1996. Runtime coupling of data-parallel programs. Proceedings of the 10th international conference on Supercomputing. :229-236.
2009. Running memory span: A comparison of behavioral capacity limits with those of an attractor neural network. Cognitive Systems Research. 10(2):161-171.
1994. A rule-based approach to prepositional phrase attachment disambiguation. Proceedings of the 15th conference on Computational linguistics-Volume 2. :1198-1204.
2012. Rpn1 and Rpn2 coordinate ubiquitin processing factors at the proteasome. Journal of Biological ChemistryJ. Biol. Chem..
1983. The Role of Spatial Knowledge in Expert Systems. Representation and Processing of Spatial Knowledge, TR-1275. Dept. of Comp. sci „Univ. of Maryland, May. :3-8.
2001. The role of independent verification and validation in maintaining a safety critical evolutionary software in a complex environment: the NASA Space Shuttle program. Software Maintenance, 2001. Proceedings. IEEE International Conference on. :118-126.
2012. Role of GbpA protein, an important virulence-related colonization factor, for Vibrio cholerae's survival in the aquatic environment. Environmental Microbiology Reports. (4):439-445.
2006. Robust fuzzy extractors and authenticated key agreement from close secrets. Advances in Cryptology-CRYPTO 2006. :232-250.
2003. Robust Face Recognition in the Presence of Clutter. Audio- and Video-Based Biometric Person AuthenticationAudio- and Video-Based Biometric Person Authentication. 2688:1062-1062.
2009. RNA Colony Blot Hybridization Method for Enumeration of Culturable Vibrio Cholerae and Vibrio Mimicus Bacteria. Applied and Environmental MicrobiologyAppl. Environ. Microbiol.. 75(17):5439-5444.
2012. Re-wiring Activity of Malicious Networks. Passive and Active MeasurementPassive and Active Measurement. 7192:116-125.