Publications

Export 216 results:
[ Author(Desc)] Title Type Year
Filters: First Letter Of Title is G  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
F
Freedman MJ, Vutukuru M, Feamster N, Balakrishnan H.  2005.  Geographic locality of IP prefixes. Proceedings of the 5th ACM SIGCOMM conference on Internet Measurement. :13-13.
Frenkel A.I, Menard L.D, Northrup P., Rodriguez J.A, Zypman F., Dachman-Soled D, Gao S.-P., Xu H., Yang J.C, Nuzzo R.G.  2007.  Geometry and Charge State of Mixed‐Ligand Au13 Nanoclusters. X-RAY ABSORPTION FINE STRUCTURE - XAFS13: 13th International Conference. 882:749-751.
G
Garg R, Varna AL, M. Wu.  2010.  Gradient descent approach for secure localization in resource constrained wireless sensor networks. Acoustics Speech and Signal Processing (ICASSP), 2010 IEEE International Conference on. :1854-1857.
Getoor L.  2010.  Graph Identification. Advances in Intelligent Data Analysis IX: 9th International Symposium. :6-6.
Giancarlo R, Hannenhalli S.  2008.  Guest Editors' Introduction to the Special Section on Algorithms in Bioinformatics. IEEE/ACM Transactions on Computational Biology and Bioinformatics. 5(4):482-483.
Gordon S, Katz J, Vaikuntanathan V.  2010.  A group signature scheme from lattice assumptions. Advances in Cryptology-ASIACRYPT 2010. :395-412.
Grim CJ, Hasan NA, Taviani E, Haley B, Chun J, Brettin TS, Bruce DC, Detter CJ, Han CS, Chertkov O et al..  2010.  Genome Sequence of Hybrid Vibrio Cholerae O1 MJ-1236, B-33, and CIRS101 and Comparative Genomics with V. Cholerae. Journal of BacteriologyJ. Bacteriol.. 192(13):3524-3533.
Guha S, Khuller S.  1998.  Greedy strikes back: improved facility location algorithms. Proceedings of the ninth annual ACM-SIAM symposium on Discrete algorithms. :649-657.
Gupta SK, Nau DS, Zhang GM.  1992.  Generation of Machining Alternatives for Machinability Evaluation. ISR; TR 1992-106
Gupta SK, Nau DS.  1993.  Generation of alternative feature-based models and precedence orderings for machining applications. :465-466.
Gupta SK, Nau DS, Zhang GM.  1992.  General of Machining Alternatives for Machinability Evaluation. ISR; TR 1992-106
Gupta SK, Saini SK, Spranklin BW, Yao Z.  2005.  Geometric algorithms for computing cutter engagement functions in 2.5D milling operations. Computer-Aided Design. 37(14):1469-1480.
H
Han Z, Lin C-K, Goldsman N, Mayergoyz ID, Yu S, Stettler M.  1999.  Gate leakage current simulation by Boltzmann transport equation and its dependence on the gate oxide thickness. Simulation of Semiconductor Processes and Devices, 1999. SISPAD '99. 1999 International Conference on. :247-250.
Hannenhalli S, Chappey C, Koonin EV, Pevzner PA.  1995.  Genome Sequence Comparison and Scenarios for Gene Rearrangements: A Test Case. Genomics. 30(2):299-311.
Hao X, Varshney A.  2006.  Geometry-guided computation of 3D electrostatics for large biomolecules. Computer Aided Geometric Design. 23(6):545-557.
Hasan N.A, Choi S.Y, Eppinger M., Clark P.W, Chen A., Alam M., Haley B.J, Taviani E., Hine E., Su Q. et al..  2012.  Genomic diversity of 2010 Haitian cholera outbreak strains. Proceedings of the National Academy of Sciences. :E2010-E2017.
He S, Wu M.  2005.  Group-based joint coding and embedding technique for multimedia fingerprinting. Proc. SPIE. 5681:96-105.
Heller J, Shneiderman B.  1972.  A graph theoretic model of data structures. SIGIR Forum. 7(4):36-44.
J
Jacobs DW.  1987.  GROPER: A Grouping Based Object Recognition System for Two-Dimensional Objects. IEEE Workshop on Computer Vision. :164-169.
Jacobs DW.  1994.  Generalizing invariants for 3-D to 2-D matching. Applications of Invariance in Computer Vision. :415-434.
Jacobs DW.  1989.  Grouping for recognition. AI Memos (1959 - 2004).
James F, Lai J, Suhm B, Balentine B, Makhoul J, Nass C, Shneiderman B.  2002.  Getting real about speech: overdue or overhyped? CHI '02 extended abstracts on Human factors in computing systems. :708-709.
K
Kale A, Cuntoor N, Yegnanarayana B, Rajagopalan A, Chellappa R.  2005.  Gait-based human identification using appearance matching. Optical and Digital Techniques for Information Security. :271-295.
Kale A, Cuntoor N, Yegnanarayana B, Rajagopalan AN, Chellappa R.  2003.  Gait Analysis for Human Identification. Audio- and Video-Based Biometric Person AuthenticationAudio- and Video-Based Biometric Person Authentication. 2688:1058-1058.

Pages