Publications

Export 228 results:
Author Title [ Type(Desc)] Year
Filters: First Letter Of Title is U  [Clear All Filters]
Conference Papers
Elsaka E, Moustafa WE, Nguyen B, Memon AM.  2010.  Using methods & measures from network analysis for gui testing. Software Testing, Verification, and Validation Workshops (ICSTW), 2010 Third International Conference on. :240-246.
Nau DS, Gupta SK, Kramer TR, Regli WC, Zhang G.  1993.  Using MRSEVs to develop machining alternatives.
Eaton E, desJardins M, Stevenson J.  2007.  Using multiresolution learning for transfer in image classification. Proceedings of the 22nd national conference on Artificial intelligence - Volume 2. :1852-1853.
Madnani N, Ayan N F, Resnik P, Dorr BJ.  2007.  Using paraphrases for parameter tuning in statistical machine translation. Proceedings of the Second Workshop on Statistical Machine Translation. :120-127.
Madnani N, Ayan NF, Resnik P, Dorr BJ.  2007.  Using paraphrases for parameter tuning in statistical machine translation. Proceedings of the Second Workshop on Statistical Machine Translation. :120-127.
Deshpande A, Guestrin C, Madden S.  2005.  Using probabilistic models for data management in acquisitional environments. Proc. CIDR. :317-328.
Mihaila GA, Raschid L, Vidal ME.  2000.  Using quality of data metadata for source selection and ranking. Proceedings of the Third International Workshop on the Web and Databases, WebDB. :93-98.
Roussopoulos N, Mylopoulos J.  1975.  Using semantic networks for data base management. Proceedings of the 1st International Conference on Very Large Data Bases. :144-172.
Osadchy M, Jacobs DW, Ramamoorthi R.  2003.  Using specularities for recognition. Computer Vision, 2003. Proceedings. Ninth IEEE International Conference on. :1512-1519vol.2-1512-1519vol.2.
Raman V, Deshpande A, Hellerstein JM.  2003.  Using state modules for adaptive query processing. 19th International Conference on Data Engineering, 2003. Proceedings. :353-364.
Castillo CD, Jacobs DW.  2007.  Using Stereo Matching for 2-D Face Recognition Across Pose. Computer Vision and Pattern Recognition, 2007. CVPR '07. IEEE Conference on. :1-8.
Reisner E, Song C, Ma KK, Foster JS, Porter A.  2010.  Using symbolic evaluation to understand behavior in configurable software systems. Software Engineering, 2010 ACM/IEEE 32nd International Conference on. 1:445-454.
Snelick R, JaJa JF, Kacker R, Lyon G.  1993.  Using Synthetic-Perturbation Techniques for Tuning Shared Memory Programs. Parallel Processing, 1993. ICPP 1993. International Conference on. 2:2-10.
Ling H, Jacobs DW.  2005.  Using the inner-distance for classification of articulated shapes. Computer Vision and Pattern Recognition, 2005. CVPR 2005. IEEE Computer Society Conference on. 2:719-726vol.2-719-726vol.2.
Lerman K, Getoor L, Minton S, Knoblock C.  2004.  Using the structure of Web sites for automatic segmentation of tables. Proceedings of the 2004 ACM SIGMOD international conference on Management of data. :119-130.
Memon AM, Xie Q.  2004.  Using transient/persistent errors to develop automated test oracles for event-driven software. Automated Software Engineering, 2004. Proceedings. 19th International Conference on. :186-195.
Sarcia' S A, Basili VR, Cantone G.  2009.  Using uncertainty as a model selection and comparison criterion. Proceedings of the 5th International Conference on Predictor Models in Software Engineering. :18:1–18:9-18:1–18:9.
Schwartz M, Gupta SK, Anand DK, Brough JE, Kavetsky R.  2007.  Using virtual demonstrations for creating multi-media training instructions.
Plaisant C, Chintalapani G, Lukehart C, Schiro D, Ryan J.  2003.  Using Visualization Tools to Gain Insight Into Your Data. SPE Annual Technical Conference and Exhibition.
Klasnja P, Harrison BL, LeGrand L, LaMarca A, Froehlich J, Hudson SE.  2008.  Using wearable sensors and real time inference to understand human recall of routine activities. Proceedings of the 10th international conference on Ubiquitous computing. :154-163.
Chajewska U, Getoor L, Norman J, Shahar Y.  1998.  Utility elicitation as a classification problem. Proceedings of the Fourteenth conference on Uncertainty in artificial intelligence. :79-88.
Au TC, Nau DS, V.S. Subrahmanian.  2004.  Utilizing volatile external information during planning. Proceedings of the European Conference on Artificial Intelligence (ECAI). :647-651.
Journal Articles
Mount SM, Pettersson I, Hinterberger M, Karmas A, Steitz JA.  1983.  The U1 small nuclear RNA-protein complex selectively binds a 5′ splice site in vitro. Cell. 33(2):509-518.
Verma R, Peters NR, D'Onofrio M, Tochtrop GP, Sakamoto KM, Varadan R, Zhang M, Coffino P, Fushman D, Deshaies RJ et al..  2004.  Ubistatins Inhibit Proteasome-Dependent Degradation by Binding the Ubiquitin Chain. Science. 306(5693):117-120.
Zhu Y, Bavier A, Feamster N, Rangarajan S, Rexford J.  2008.  UFO: a resilient layered routing architecture. ACM SIGCOMM Computer Communication Review. 38(5):59-62.

Pages