Publications
Export 1425 results:
Author Title Type [ Year] Filters: First Letter Of Last Name is H [Clear All Filters]
2008. Activity sensing in the wild: a field trial of ubifit garden. Proceeding of the twenty-sixth annual SIGCHI conference on Human factors in computing systems. :1797-1806.
2008. The ASC-Alliance Projects: A Case Study of Large-Scale Parallel Scientific Code Development. Computer. 41(3):50-58.
2008. Biofilms in water, its role and impact in human disease transmission. Current Opinion in Biotechnology. 19(3):244-247.
2008. CiCUTS: Combining System Execution Modeling Tools with Continuous Integration Environments. Engineering of Computer-Based Systems, IEEE International Conference on the. :66-75.
2008. Computational Analysis of Constraints on Noncoding Regions, Coding Regions and Gene Expression in Relation to Plasmodium Phenotypic Diversity. PLoS ONEPLoS ONE. 3(9):e3122-e3122.
2008. Computing word-pair antonymy. Proceedings of the Conference on Empirical Methods in Natural Language Processing. :982-991.
2008. Contextual effects for version-consistent dynamic software updating and safe concurrent programming. Proceedings of the 35th annual ACM SIGPLAN-SIGACT symposium on Principles of programming languages. :37-49.
2008. Covariability of Vibrio Cholerae Microdiversity and Environmental Parameters. Applied and Environmental MicrobiologyAppl. Environ. Microbiol.. 74(9):2915-2920.
2008. Delegating Capabilities in Predicate Encryption Systems. Automata, Languages and Programming. 5126:560-578.
2008. Directing javascript with arrows (functional pearl). Technical Reports of the Computer Science Department.
2008. The draft genome of the transgenic tropical fruit tree papaya (Carica papaya Linnaeus). Nature. 452(7190):991-996.
2008. Dynamic Rebinding for Marshalling and Update, Via Redex-Time and Destruct-Time Reduction. Journal of Functional Programming. 18(04):437-502.
2008. Effective Visualization of File System Access-Control. Visualization for Computer Security. :18-25.
2008. Efficient Integrity Checking of Untrusted Network Storage. StorageSS '08 Proceedings of the 4th ACM International Workshop on Storage Security and Survivability . :43-54.
2008. An Environment for Conducting Families of Software Engineering Experiments. Software Development. Volume 74:175-200.
2008. Eukaryotic Transcription Factor Binding Sites—modeling and Integrative Search Methods. BioinformaticsBioinformatics. 24(11):1325-1331.
2008. Fable: A Language for Enforcing User-defined Security Policies. IEEE Symposium on Security and Privacy, 2008. SP 2008. :369-383.
2008. Finding Corrupted Computers Using Imperfect Intrusion Prevention System Event Data. Computer Safety, Reliability, and Security. 5219:221-234.
2008. Flow Algorithms for Parallel Query Optimization. IEEE 24th International Conference on Data Engineering, 2008. ICDE 2008. :754-763.
2008. Formalizing Soundness of Contextual Effects. Theorem Proving in Higher Order LogicsTheorem Proving in Higher Order Logics. 5170:262-277.
2008. A Framework for Software Engineering Experimental Replications. Engineering of Complex Computer Systems, 2008. ICECCS 2008. 13th IEEE International Conference on. :203-212.
2008. Functional Diversification of Paralogous Transcription Factors via Divergence in DNA Binding Site Motif and in Expression. PLoS ONEPLoS ONE. 3(6):e2345-e2345.