Export 7058 results:
Author Title Type [ Year(Asc)]
Zhuolin Jiang, Lin Z, Davis LS.  2012.  Class consistent k-means: Application to face and action recognition. Computer Vision and Image Understanding. 116(6):730-741.
Song D, Elaine Shi, Fischer I, Shankar U.  2012.  Cloud Data Protection for the Masses. Computer. 45(1):39-45.
Xie B, Tom Yeh, Walsh G, Watkins I, Huang M.  2012.  Co-designing an e-health tutorial for older adults. Proceedings of the 2012 iConference. :240-247.
Nikolova S, Boyd-Graber J, Fellbaum C.  2012.  Collecting Semantic Similarity Ratings to Connect Concepts in Assistive Communication Tools. Modeling, Learning, and Processing of Text Technological Data StructuresModeling, Learning, and Processing of Text Technological Data Structures. 370:81-93.
V.S. Subrahmanian, Mannes A, Sliva A, Shakarian J, Dickerson JP.  2012.  Computational Analysis of Terrorist Groups: Lashkar-e-Taiba.
Dachman-Soled D, Gennaro R, Krawczyk H, Malkin T.  2012.  Computational Extractors and Pseudorandomness. Theory of Cryptography. :383-403.
Wei Z, JaJa JF.  2012.  Constructing Inverted Files: To MapReduce or Not Revisited. UMIACS-TR-2012-03
Senoh M, Ghosh‐Banerjee J, Ramamurthy T, Colwell RR, Miyoshi S-ichi, Nair BG, Takeda Y.  2012.  Conversion of viable but nonculturable enteric bacteria to culturable by co‐culture with eukaryotic cells. Microbiology and Immunology. 56(5):342-345.
Liu B, Faller LL, Klitgord N, Mazumdar V, Ghodsi M, Sommer DD, Gibbons TR, Treangen TJ, Chang YC, Li S.  2012.  Deep Sequencing of the Oral Microbiome Reveals Signatures of Periodontal Disease. PloS one. 7(6)
Han B, Davis LS.  2012.  Density-Based Multifeature Background Subtraction with Support Vector Machine. Pattern Analysis and Machine Intelligence, IEEE Transactions on. 34(5):1017-1023.
Froehlich J, Findlater L, Ostergren M, Ramanathan S, Peterson J, Wragg I, Larson E, Fu F, Bai M, Patel S.  2012.  The design and evaluation of prototype eco-feedback displays for fixture-level water usage data. :2367-2376.
Shen C-C, Wu S, Sane N, Wu H-H, Plishker W, Bhattacharyya SS.  2012.  Design and Synthesis for Multimedia Systems Using the Targeted Dataflow Interchange Format. IEEE Transactions on Multimedia. 14(3):630-640.
Fushman D.  2012.  Determining Protein Dynamics from 15N Relaxation Data by Using DYNAMICS. Protein NMR Techniques. 831:485-511.
Patel VM, Wu T, Biswas S, Phillips P, Chellappa R.  2012.  Dictionary-based Face Recognition Under Variable Lighting and Pose. IEEE Transactions on Information Forensics and Security. PP(99):1-1.
Wang Y-C, Khan Z, Kaschube M, Wieschaus EF.  2012.  Differential positioning of adherens junctions is associated with initiation of epithelial folding. Nature. 484(7394):390-393.
De Floriani L, Čomić L.  2012.  Dimension-independent multi-resolution morse complexes. Computers & Graphics.
Larson E, Froehlich J, Campbell T, Haggerty C, Atlas L, Fogarty J, Patel SN.  2012.  Disaggregated water sensing from a single, pressure-based sensor: An extended analysis of HydroSense using staged experiments. Pervasive and Mobile Computing. 8(1):82-102.
Nelson KS, Khan Z, Molnár I, Mihály J, Kaschube M, Beitel GJ.  2012.  Drosophila Src regulates anisotropic apical surface growth to control epithelial tube size. Nature Cell Biology. 14(5):518-525.
Samet H, Fruin BC, Nutanong S.  2012.  Duking it out at the smartphone mobile app mapping API corral: Apple, Google, and the competition. 1st ACM SIGSPATIAL International Workshop on Mobile Geographic Information Systems (MobiGIS 2012).
Rotman D, Preece J, Hammock J, Procita K, Hansen D, Parr C, Lewis D, Jacobs DW.  2012.  Dynamic changes in motivation in collaborative citizen-science projects. Proceedings of the ACM 2012 conference on Computer Supported Cooperative Work. :217-226.
Kamara S, Papamanthou C, Roeder T.  2012.  Dynamic Searchable Symmetric Encryption. CCS '12 Proceedings of the 2012 ACM Conference on Computer and Communications Security . :965-976.
Gumerov NA, Duraiswami R.  2012.  Efficient FMM accelerated vortex methods in three dimensions via the Lamb-Helmholtz decomposition. arXiv:1201.5430.
Canetti R, Dachman-Soled D, Vaikuntanathan V, Wee H.  2012.  Efficient Password Authenticated Key Exchange via Oblivious Transfer. Public Key Cryptography – PKC 2012. :449-466.
Hu Y, Boyd-Graber J.  2012.  Efficient Tree-Based Topic Modeling. Association for Computational Linguistics.
Goodrich MT, Papamanthou C, Nguyen D, Tamassia R, Lopes CVideira, Ohrimenko O, Triandopoulos N.  2012.  Efficient Verification of Web-content Searching Through Authenticated Web Crawlers. Proc. VLDB Endow.. 5(10):920-931.