Publications

Export 636 results:
Author [ Title(Desc)] Type Year
Filters: First Letter Of Last Name is N  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
H
Neumann J, Fermüller C, Aloimonos Y.  2004.  A hierarchy of cameras for 3D photography. Computer Vision and Image Understanding. 96(3):274-293.
Leddy MB, Plumlee MH, Kantor RS, Nelson KL, Miller SE, Kennedy LC, Stamps BW, Spear JR, Hasan NA, Colwell RR.  2018.  High-Throughput DNA Sequencing To Profile Microbial Water Quality Of Potable Reuse.
Nirkhe M, Kraus S, Miller M, Perlis D.  1997.  How to (plan to) meet a deadline between now and then. Journal of Logic and Computation. 7(1):109-109.
Sirin E, Parsia B, Wu D, Hendler J, Nau DS.  2004.  HTN planning for Web Service composition using SHOP2. Web Semantics: Science, Services and Agents on the World Wide Web. 1(4):377-396.
Dix J, Kuter U, Nau DS.  2002.  HTN Planning in Answer Set Programming. UMIACS-TR-2002-18
Nixon MS, Tan T, Chellappa R.  2006.  Human identification based on gait.
Klinzing DC, Choi SYoung, Hasan NA, Matias RR, Tayag E, Geronimo J, Skowronski E, Rashed SM, Kawashima K, C. Rosenzweig N et al..  2015.  Hybrid Vibrio cholerae El Tor Lacking SXT Identified as the Cause of a Cholera Outbreak in the Philippines. mBio. (2)
Nasr-Azadani F, Khan R, Rahimikollu J, Unnikrishnan A, Akanda A, Alam M, Huq A, Jutla A, Colwell RR.  2017.  Hydroclimatic sustainability assessment of changing climate on cholera in the Ganges-Brahmaputra basin. Advances in Water Resources. 108:332-344.
I
Bozo-Hurtado L, García-Amado M, Chistoserdov A, Varela R, Narvaez J, Colwell RR, Suárez P.  2013.  Identification of bacteria in enrichment cultures of sulfate reducers in the Cariaco Basin water column employing Denaturing Gradient Gel Electrophoresis of 16S ribosomal RNA gene fragments. Aquatic Biosystems. 9(1):17.
Del Canto F, Botkin DJ, Valenzuela P, Popov V, Ruiz-Perez F, Nataro JP, Levine MM, Stine OC, Pop M, Torres AG et al..  2012.  Identification of Coli Surface Antigen 23, a Novel Adhesin of Enterotoxigenic Escherichia coli. Infection and immunity. 80(8):2791-2801.
Nakamura T, Hochstein L, Basili VR.  2006.  Identifying domain-specific defect classes using inspections and change history. Proceedings of the 2006 ACM/IEEE international symposium on Empirical software engineering. :346-355.
Namata, Jr. G MS, Getoor L.  2009.  Identifying graphs from noisy and incomplete data. Proceedings of the 1st ACM SIGKDD Workshop on Knowledge Discovery from Uncertain Data. :23-29.
Paparizos S, Joshi A S, Getoor L, Ntoulas A.  2010.  Identifying Modifiers in Web Queries Over Structured Data. 12/473,286
Gupta SK, Nau DS, Regli WC.  1998.  IMACS: a case study in real-world planning. Intelligent Systems and their Applications, IEEE. 13(3):49-60.
Le Moigne J, Cole-Rhodes A, Eastman R, Jain P, Joshua A, Memarsadeghi N, Mount D, Netanyahu N, Morisette J, Uko-Ozoro E.  2006.  Image Registration and Fusion Studies for the Integration of Multiple Remote Sensing Data. Acoustics, Speech and Signal Processing, 2006. ICASSP 2006 Proceedings. 2006 IEEE International Conference on. 5:V-V.
LeMoigne J, Netanyahu NS, Eastman RD.  2011.  Image Registration for Remote Sensing. :515.
Nagy JG, O'Leary DP.  2002.  Image Restoration through Subimages and Confidence Images. Electronic Transactions on Numerical Analysis. 13:22-37.
Narayanan KA, O'Leary DP, Rosenfeld A.  1982.  Image Smoothing and Segmentation by Cost Minimization. IEEE Transactions on Systems, Man, and Cybernetics. SMC-12:91-96.
Dix J, Muñoz-Avila H, Nau DS, Zhang L.  2003.  IMPACTing SHOP: Putting an AI Planner Into a Multi-Agent Environment. Annals of Mathematics and Artificial Intelligence. 37(4):381-407.
Bell C, Nerode A, Ng RT, V.S. Subrahmanian.  2004.  Implementing stable semantics by linear programming. Logic Programming and Non-Monotonic Reasoning, Proceedings of the Second International Workshop. 7:23-42.
Bell C, Nerode A, Ng RT, V.S. Subrahmanian.  2004.  Implementing stable semantics by linear programming. Logic Programming and Non-Monotonic Reasoning, Proceedings of the Second International Workshop. 7:23-42.
Elaine Shi, Niu Y, Jakobsson M, Chow R.  2011.  Implicit Authentication through Learning User Behavior. Information Security. 6531:99-113.
Mount D, Netanyahu NS, LeMoigne J.  1998.  Improved algorithms for robust point pattern matching and applications to image registration. Proceedings of the fourteenth annual symposium on Computational geometry. :155-164.
Nam B, Sussman A.  2003.  Improving access to multi-dimensional self-describing scientific datasets. 3rd IEEE/ACM International Symposium on Cluster Computing and the Grid, 2003. Proceedings. CCGrid 2003. :172-179.
Hara K, Azenkot S, Campbell M, Bennett CL, Le V, Pannella S, Moore R, Minckler K, Ng RH, Froehlich J.  2013.  Improving public transit accessibility for blind riders by crowdsourcing bus stop landmark locations with Google street view. The 15th International ACM SIGACCESS Conference. :16-8.

Pages