Publications

Search
Export 1425 results:
Author [ Title(Desc)] Type Year
Filters: First Letter Of Last Name is H  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
A
Hochstein L, Basili VR.  2008.  The ASC-Alliance Projects: A Case Study of Large-Scale Parallel Scientific Code Development. Computer. 41(3):50-58.
Huq A, Anwar R, Colwell RR, McDonald MD, Khan R, Jutla A, Akanda S.  2017.  Assessment of Risk of Cholera in Haiti following Hurricane Matthew. The American Journal of Tropical Medicine and Hygiene. 97(3):896-903.
Webber W, Oard D, Scholer F, Hedin B.  2010.  Assessor error in stratified evaluation. Proceedings of the 19th ACM international conference on Information and knowledge management. :539-548.
Hovemeyer D, Pugh W, Spacco J.  2006.  Atomic instructions in java. ECOOP 2002—Object-Oriented Programming. :5-16.
Albrecht M, Gentry C, Halevi S, Katz J.  2009.  Attacking cryptographic schemes based on "perturbation polynomials". Proceedings of the 16th ACM conference on Computer and communications security. :1-10.
Haritaoglu I, Cozzi A, Koons D, Flickner M, Zotkin DN, Yacoob Y.  2001.  Attentive toys. International Conference on Multimedia and Expo. 22:25-25.
Zotkin DN, Duraiswami R, Davis LS, Haritaoglu I.  2000.  An audio-video front-end for multimedia applications. 2000 IEEE International Conference on Systems, Man, and Cybernetics. 2:786-791vol.2-786-791vol.2.
Keogh E, Hochheiser H, Shneiderman B.  2005.  An Augmented Visual Query Mechanism for Finding Patterns in Time Series Data (2002). Institute for Systems Research Technical Reports.
Keogh E, Hochheiser H, Shneiderman B.  2002.  An Augmented Visual Query Mechanism for Finding Patterns in Time Series Data. Flexible Query Answering SystemsFlexible Query Answering Systems. 2522:240-250.
Chung I-H, Hollingsworth J.  2004.  Automated cluster-based Web service performance tuning. 13th IEEE International Symposium on High performance Distributed Computing, 2004. Proceedings. :36-44.
Petroni, Jr. NL, Hicks MW.  2007.  Automated detection of persistent kernel control-flow attacks. Proceedings of the 14th ACM conference on Computer and communications security. :103-115.
Roy A, Halder B, Garain U, Doermann D.  2012.  Automatic Authentication of Banknotes. IEEE Transactions on Information Forensics & Security.
Williams CC, Hollingsworth J.  2005.  Automatic Mining of Source Code Repositories to Improve Bug Finding Techniques. IEEE Transactions on Software Engineering. 31(6):466-480.
Byrne W, Doermann D, Franz M, Gustman S, Hajic J, Oard D, Picheny M, Psutka J, Ramabhadran B.  2004.  Automatic recognition of spontaneous speech for access to multilingual oral history archives. IEEE Transactions on Speech and Audio Processing, Special Issue on Spontaneous Speech Processing. 12(4):420-435.
Tabatabaee V, Hollingsworth J.  2007.  Automatic software interference detection in parallel applications. Proceedings of the 2007 ACM/IEEE conference on Supercomputing. :14:1–14:12-14:1–14:12.
Oard D, Demner-Fushman D, Hajic J, Ramabhadran B, Gustman S, Byrne WJ, Soergel D, Dorr BJ, Resnik P, Picheny M.  2002.  Automatic transcription of Czech language oral history in the MALACH project: resources and initial experiments. Proceedings of the The 5th International Conference on Text, Speech and Dialogue. :57-64.
Hendler J, Nau DS, Parsia B, Sirin E, Wu D.  2006.  Automatic web services composition using Shop2.
Wu D, Parsia B, Sirin E, Hendler J, Nau DS.  2003.  Automating DAML-S Web Services Composition Using SHOP2. The Semantic Web - ISWC 2003. 2870:195-210.
Sims JJ, Haririnia A, Dickinson BC, Fushman D, Cohen RE.  2009.  Avid interactions underlie the Lys63-linked polyubiquitin binding specificities observed for UBA domains. Nature Structural & Molecular Biology. 16(8):883-889.
Oh S, Hoogs A, Perera A, Cuntoor N, Chen C-C, Lee J T, Mukherjee S, Aggarwal JK, Lee H, Davis LS et al..  2011.  AVSS 2011 demo session: A large-scale benchmark dataset for event recognition in surveillance video. Advanced Video and Signal-Based Surveillance (AVSS), 2011 8th IEEE International Conference on. :527-528.
B
Kim K, Chalidabhongse TH, Harwood D, Davis LS.  2004.  Background modeling and subtraction by codebook construction. Image Processing, 2004. ICIP '04. 2004 International Conference on. 5:3061-3064Vol.5-3061-3064Vol.5.
Kim K, Harwood D, Davis LS.  2005.  Background updating for visual surveillance. Advances in Visual Computing. :337-346.
Hannenhalli S, Hayes WS, Hatzigeorgiou AG, Fickett JW.  1999.  Bacterial Start Site Prediction. Nucleic Acids ResearchNucl. Acids Res.. 27(17):3577-3582.
Hannenhalli S, Hayes WS, Hatzigeorgiou AG, Fickett JW.  1999.  Bacterial Start Site Prediction. Nucleic Acids ResearchNucl. Acids Res.. 27(17):3577-3582.
Hannenhalli S, Hayes WS, Hatzigeorgiou AG, Fickett JW.  1999.  Bacterial Start Site Prediction. Nucleic Acids ResearchNucl. Acids Res.. 27(17):3577-3582.

Pages