Publications
Export 1202 results:
Author [ Title] Type Year Filters: First Letter Of Last Name is L [Clear All Filters]
2001. The one-inclusion graph algorithm is near-optimal for the prediction model of learning. IEEE Transactions on Information Theory. 47(3):1257-1261.
2001. The one-inclusion graph algorithm is near-optimal for the prediction model of learning. IEEE Transactions on Information Theory. 47(3):1257-1261.
2002. Omnibase: Uniform access to heterogeneous data for question answering. Natural Language Processing and Information Systems. :230-234.
2011. Odd Leaf Out: Improving Visual Recognition with Games. Privacy, security, risk and trust (passat), 2011 ieee third international conference on and 2011 ieee third international conference on social computing (socialcom). :87-94.
2014. Occurrence in Mexico, 1998–2008, of Vibrio cholerae CTX + El Tor carrying an additional truncated CTX prophage. Proceedings of the National Academy of Sciences. 111(27):9917-9922.
2015. Occurrence and Diversity of Clinically Important Vibrio Species in the Aquatic Environment of Georgia. Frontiers in Public Health.
2004. Occurrence and distribution of Vibrio cholerae in the coastal environment of Peru. Environmental Microbiology. 6(7):699-706.
2004. Occurrence and distribution of Vibrio cholerae in the coastal environment of Peru. Environmental Microbiology. 6(7):699-706.
2004. Occurrence and distribution of Vibrio cholerae in the coastal environment of Peru. Environmental Microbiology. 6(7):699-706.
2010. Obtaining valid safety data for software safety measurement and process improvement. Proceedings of the 2010 ACM-IEEE International Symposium on Empirical Software Engineering and Measurement. :46:1–46:4-46:1–46:4.
2007. Oblivious routing on node-capacitated and directed graphs. ACM Transactions on Algorithms (TALG). 3(4):51–es-51–es.
2011. Oblivious RAM with O((logN)^3) Worst-Case Cost. Advances in Cryptology – ASIACRYPT 2011. 7073:197-214.
2011. Oblivious RAM with O((logN)^3) Worst-Case Cost. Advances in Cryptology – ASIACRYPT 2011. 7073:197-214.
2011. NSF/IEEE-TCPP curriculum initiative on parallel and distributed computing: core topics for undergraduates. Proceedings of the 42nd ACM technical symposium on Computer science education. :617-618.
2011. NSF/IEEE-TCPP curriculum initiative on parallel and distributed computing: core topics for undergraduates. Proceedings of the 42nd ACM technical symposium on Computer science education. :617-618.
2002. Nonlinear collusion attacks on independent multimedia fingerprints. submitted to IEEE Trans. on Image Proc.
2003. Nonlinear collusion attacks on independent fingerprints for multimedia. Acoustics, Speech, and Signal Processing, 2003. Proceedings. (ICASSP '03). 2003 IEEE International Conference on. 5:V-664-7vol.5-V-664-7vol.5.
2006. Non-Intrusive Forensic Analysis of Visual Sensors Using Output Images. Acoustics, Speech and Signal Processing, 2006. ICASSP 2006 Proceedings. 2006 IEEE International Conference on. 5:V-V.
2007. Nonintrusive component forensics of visual sensors using output images. Information Forensics and Security, IEEE Transactions on. 2(1):91-106.
2008. NewsStand: a new view on news. Proceedings of the 16th ACM SIGSPATIAL international conference on Advances in geographic information systems. :18:1–18:10-18:1–18:10.
2007. New Trypanosoma cruzi Repeated Element That Shows Site Specificity for Insertion. Eukaryotic Cell. 6(7):1228-1238.
2000. A new relative perturbation theorem for singular subspaces. Linear Algebra and its Applications. 313(1–3):41-51.
2011. New models and algorithms for throughput maximization in broadcast scheduling. Approximation and Online Algorithms. :71-82.