Publications

Export 969 results:
Author [ Title(Desc)] Type Year
Filters: First Letter Of Last Name is A  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
W
Jutla AS, Akanda AS, Griffiths JK, Colwell RR, Islam S.  2011.  Warming Oceans, Phytoplankton, and River Discharge: Implications for Cholera Outbreaks. The American Journal of Tropical Medicine and Hygiene. 85(2):303-308.
Jutla A, Akanda AShafqat, Huq A, Faruque ASyed Golam, Colwell RR, Islam S.  2013.  A water marker monitored by satellites to predict seasonal endemic cholera. Remote Sensing Letters. 4472741982394456(8):822-831.
Campbell T, Larson E, Cohn G, Froehlich J, Alcaide R, Patel SN.  2010.  WATTR: a method for self-powered wireless sensing of water activity in the home. Proceedings of the 12th ACM international conference on Ubiquitous computing. :169-172.
Au T-C, Kuter U, Nau DS.  2005.  Web Service Composition with Volatile Information. The Semantic Web – ISWC 2005. 3729:52-66.
Mishra A, Banerjee S, Arbaugh WA.  2005.  Weighted coloring based channel assignment for WLANs. ACM SIGMOBILE Mobile Computing and Communications Review. 9(3):19-31.
Aloimonos Y.  1994.  What I have learned. CVGIP: Image Understanding. 60(1):74-85.
Fermüller C, Aloimonos Y.  1998.  What is computed by structure from motion algorithms? Computer Vision — ECCV'98. 1406:359-375.
Agrawal A, Raskar R, Chellappa R.  2006.  What Is the Range of Surface Reconstructions from a Gradient Field? Computer Vision – ECCV 2006Computer Vision – ECCV 2006. 3951:578-591.
Anderson ML, Perlis D.  2009.  What puts the “meta” in metacognition? Behavioral and Brain Sciences. 32(02):138-139.
Stonedahl F, Anderson D, Rand W.  2011.  When does simulated data match real data? Proceedings of the 13th annual conference companion on Genetic and evolutionary computation. :231-232.
Hascoët-Zizi M, Ahlberg C, Korfhage R, Plaisant C, Chalmers M, Rao R.  1996.  Where is information visualization technology going? Proceedings of the 9th annual ACM symposium on User interface software and technology. :75-77.
Fermüller C, Aloimonos Y.  1998.  Which shape from motion? Sixth International Conference on Computer Vision, 1998. :689-695.
Domke J, Karapurkar A, Aloimonos Y.  2008.  Who killed the directed model? Computer Vision and Pattern Recognition, IEEE Computer Society Conference on. :1-8.
Agrawal M, Davis LS.  2004.  Window-based, discontinuity preserving stereo. Computer Vision and Pattern Recognition, 2004. CVPR 2004. Proceedings of the 2004 IEEE Computer Society Conference on. 1:I-66-I-73Vol.1-I-66-I-73Vol.1.
Shneiderman B, Alavi M, Norman K, Borkowski E Y.  1995.  Windows of opportunity in electronic classrooms. Communications of the ACM. 38(11):19-24.
Arbaugh WA, Fithen WL, McHugh J.  2000.  Windows of Vulnerability: A Case Study Analysis. Computer. 33(12):52-59.
Shin M, Ma J, Mishra A, Arbaugh WA.  2006.  Wireless Network Security and Interworking. Proceedings of the IEEE. 94(2):455-466.
Housley R, Arbaugh WA.  2003.  WLAN problems and solutions. Communications of the ACM. 46(5):31-34.
Y
Mishra A, Shin M, Arbaugh WA.  2002.  Your 802.11 network has no clothes. IEEE Communications Magazine. 9:44-51.

Pages