Publications
Export 1425 results:
Author Title Type [ Year] Filters: First Letter Of Last Name is H [Clear All Filters]
2010. Technology-Mediated Social Participation: Deep Science and Extreme Technology. Active Media TechnologyActive Media Technology. 6335:1-4.
2010. Unexpected abundance of coenzyme F(420)-dependent enzymes in Mycobacterium tuberculosis and other actinobacteria.. J Bacteriol. 192(21):5788-98.
2010. Using a Trust Model in Decision Making for Supply Chain Management. Workshops at the Twenty-Fourth AAAI Conference on Artificial Intelligence.
2010. Viewpoint Adapting agile software development methodology toward more efficient management of academic research groups.. Communications of the ACM. 53(10):30-30.
2010. Visualizing Threaded Conversation Networks: Mining Message Boards and Email Lists for Actionable Insights. Active Media TechnologyActive Media Technology. 6335:47-62.
2010. Visualizing Threaded Conversation Networks: Mining Message Boards and Email Lists for Actionable Insights. Active Media TechnologyActive Media Technology. 6335:47-62.
2010. Who's Hogging the Bandwidth: The Consequences of Revealing the Invisible in the Home. SIGCHI '10. :659-668.
2010. Workshop on experimental evaluation of software and systems in computer science (Evaluate 2010). Proceedings of the ACM international conference companion on Object oriented programming systems languages and applications companion. :291-292.
2010. Young Proteins Experience More Variable Selection Pressures Than Old Proteins. Genome ResearchGenome Res.. 20(11):1574-1581.
2009. Algorithms for distributional and adversarial pipelined filter ordering problems. ACM Trans. Algorithms. 5(2):24:1–24:34-24:1–24:34.
2009. All Bits Are Not Equal - A Study of IEEE 802.11 Communication Bit Errors. INFOCOM 2009, IEEE. :1602-1610.
2009. Approximate kernel matrix computation on GPUs forlarge scale learning applications. Proceedings of the 23rd international conference on Supercomputing. :511-512.
2009. Attacking cryptographic schemes based on "perturbation polynomials". Proceedings of the 16th ACM conference on Computer and communications security. :1-10.
2009. Avid interactions underlie the Lys63-linked polyubiquitin binding specificities observed for UBA domains. Nature Structural & Molecular Biology. 16(8):883-889.
2009. Channel Access Throttling for Improving WLAN QoS. Sensor, Mesh and Ad Hoc Communications and Networks, 2009. SECON '09. 6th Annual IEEE Communications Society Conference on. :1-9.
2009. Channel Access Throttling for Overlapping BSS Management. Communications, 2009. ICC '09. IEEE International Conference on. :1-6.
2009. Classification of non-manifold singularities from transformations of 2-manifolds. Shape Modeling and Applications, 2009. SMI 2009. IEEE International Conference on. :179-184.
2009. Combining powerful local and global statistics for texture description. IEEE Conference on Computer Vision and Pattern Recognition, 2009. CVPR 2009. :573-580.
2009. Comparative genomics reveals mechanism for short-term and long-term clonal transitions in pandemic Vibrio cholerae. Proceedings of the National Academy of Sciences. 106(36):15442-15447.
2009. Comparative genomics reveals mechanism for short-term and long-term clonal transitions in pandemic Vibrio cholerae. Proceedings of the National Academy of Sciences. 106(36):15442-15447.
2009. A Comprehensive Evaluation Framework and a Comparative Study for Human Detectors. Intelligent Transportation Systems, IEEE Transactions on. 10(3):417-427.
2009. Compressed sensing for Synthetic Aperture Radar imaging. 2009 16th IEEE International Conference on Image Processing (ICIP). :2141-2144.
2009. Computing and visualizing a graph-based decomposition for non-manifold shapes. Graph-Based Representations in Pattern Recognition. :62-71.