Publications

Export 7151 results:
Author [ Title(Asc)] Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
A
Demner-Fushman D, Jimmy Lin.  2007.  Answering Clinical Questions with Knowledge-Based and Statistical Techniques. Computational Linguistics. 33(1):63-103.
Reggia JA, Perricone BT, Nau DS, Peng Y.  1985.  Answer Justification in Diagnostic Expert Systems-Part II: Supporting Plausible Justifications. Biomedical Engineering, IEEE Transactions on. (4):268-272.
Reggia JA, Perricone B, Nau DS, Peng Y.  1985.  Answer justification in abductive expert systems for diagnostic problem solving. IEEE Transactions on Biomedical Engineering.
Bethencourt J, Chan H, Perrig A, Elaine Shi, Song D.  2006.  Anonymous multi-attribute encryption with range query and conditional decryption.
Colwell RR.  2003.  ANNUAL REVIEW & FORECAST REPORTS-THE OCEANS: TO PROTECT AND TO PLOW. Sea Technology. 44(1):33-34.
Meyers A, Fang AC, Ferro L, Kübler S, Jia-Lin T, Palmer M, Poesio M, Dolbey A, Schuler KK, Loper E et al..  2006.  Annotation compatibility working group report. Proceedings of the Workshop on Frontiers in Linguistically Annotated Corpora 2006. :38-53.
Katz B, Jimmy Lin.  2002.  Annotating the semantic web using natural language. Proceedings of the 2nd workshop on NLP and XML - Volume 17. :1-8.
Udrea O, Recupero D R, V.S. Subrahmanian.  2010.  Annotated RDF. ACM Trans. Comput. Logic. 11(2):10:1–10:41-10:1–10:41.
Udrea O, Recupero D, V.S. Subrahmanian.  2006.  Annotated rdf. The Semantic Web: Research and Applications. 4011:487-501.
Shakarian P, Parker A, Simari G, V.S. Subrahmanian.  2011.  Annotated probabilistic temporal logic. ACM Trans. Comput. Logic. 12(2):14:1–14:44-14:1–14:44.
Mount D.  1998.  ANN programming manual.
Mount D, Arya S.  1997.  ANN: A library for approximate nearest neighbor searching. CGC 2nd Annual Fall Workshop on Computational Geometry.
Fermüller C, Ji H.  2005.  On the Anisotropy in the Perception of Stereoscopic Slant. Journal of VisionJ Vis. 5(8):516-516.
Ordóñez P, desJardins M, Lombardi M, Lehmann CU, Fackler J.  2010.  An animated multivariate visualization for physiological and clinical data in the ICU. Proceedings of the 1st ACM International Health Informatics Symposium. :771-779.
Neumann J, Fermüller C, Aloimonos Y.  2001.  Animated heads: From 3d motion fields to action descriptions. Proceedings of the IFIP TC5/WG5. 10:1-11.
Li Y, Zheng Y, Doermann D, Jaeger S.  2006.  ANew Algorithm for Detecting Text Line in Handwritten Documents. 10th International Workshop on Frontiers in Handwriting Recognition. :35-40.
Yoon I-C, Sussman A, Porter A.  2005.  And away we go: understanding the complexity of launching complex HPC applications. Proceedings of the second international workshop on Software engineering for high performance computing system applications. :45-49.
Berthier R, Arjona J, Cukier M.  2009.  Analyzing the process of installing rogue software. :560-565.
Mount D, Netanyahu NS, Zuck E.  2004.  Analyzing the number of samples required for an approximate Monte-Carlo LMS line estimator. Theory and Applications of Recent Robust MethodsTheory and Applications of Recent Robust Methods. :207-219.
Katz J, Smith A.  2006.  Analyzing the HB and HB+ protocols in the “large error” case. IACR ePrint report. 326:2006-2006.
Hansen D, Shneiderman B, Smith MA.  2010.  Analyzing Social Media Networks with NodeXL: Insights from a Connected World. :302.
Smith MA, Shneiderman B, Milic-Frayling N, Mendes Rodrigues E, Barash V, Dunne C, Capone T, Perer A, Gleave E.  2009.  Analyzing (social media) networks with NodeXL. Proceedings of the fourth international conference on Communities and technologies. :255-264.
Hansen D, Shneiderman B, Smith MA.  2010.  Analyzing Social Media Networks with NodeXL.
Basili VR, Zelkowitz MV.  1978.  Analyzing medium-scale software development. Proceedings of the 3rd international conference on Software engineering. :116-123.
Hicks MW.  2007.  Analyzing information flow. Conference on Programming Language Design and Implementation: Proceedings of the 2007 workshop on Programming languages and analysis for security.

Pages