Export 7055 results:
[ Author(Desc)] Title Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
Alam M, Sadique A, Bhuiyan NA, Nair GB, Siddique AK, Sack DA, Ahsan S, Huq A, Sack RB, Colwell RR et al..  2006.  Effect of transport at ambient temperature on detection and isolation of Vibrio cholerae from environmental samples. Applied and environmental microbiology. 72(3):2185-2190.
Alam M, Islam A, Bhuiyan NA, Rahim N, Hossain A, Khan GY, Ahmed D, Watanabe H, Izumiya H, Faruque ASG et al..  2011.  Clonal transmission, dual peak, and off-season cholera in Bangladesh. Infection Ecology & Epidemiology. 1
Alam M, Chowdhury WB, Bhuiyan NA, Islam A, Hasan NA, Nair BG, Watanabe H, Siddique AK, Huq A, Sack BR et al..  2009.  Serogroup, Virulence, and Genetic Traits of Vibrio Parahaemolyticus in the Estuarine Ecosystem of Bangladesh. Applied and Environmental MicrobiologyAppl. Environ. Microbiol.. 75(19):6268-6274.
Alam M, Sultana M, Nair GB, Siddique AK, Hasan NA, Sack RB, Sack DA, Ahmed KU, Sadique A, Watanabe H et al..  2007.  Viable but nonculturable Vibrio cholerae O1 in biofilms in the aquatic environment and their role in cholera transmission. Proceedings of the National Academy of Sciences. 104(45):17801-17801.
Alam M, Islam TM, Rashed S M, Johura F-T, Bhuiyan NA, Delgado G, Morales R, Mendez J L, Navarro A, Watanabe H et al..  2012.  Vibrio Cholerae Classical Biotype Strains Reveal Distinct Signatures in Mexico. Journal of Clinical MicrobiologyJ. Clin. Microbiol..
Alameh R, Zazworka N, Hollingsworth J.  2007.  Performance Measurement of Novice HPC Programmers Code. Proceedings of the 3rd International Workshop on Software Engineering for High Performance Computing Applications. :3–-3–.
Albanese M, Chellappa R, Moscato V, Picariello A, V.S. Subrahmanian, Turaga P, Udrea O.  2008.  A Constrained Probabilistic Petri Net Framework for Human Activity Detection in Video. Multimedia, IEEE Transactions on. 10(6):982-996.
Albanese M, Turaga P, Chellappa R, Pugliese A, Subrahmanian V.  2010.  Semantic Video Content Analysis. Video Search and MiningVideo Search and Mining. 287:147-176.
Albanese M, Fayzullin M, Picariello A, V.S. Subrahmanian.  2006.  The priority curve algorithm for video summarization. Information Systems. 31(7):679-695.
Albanese M, Chellappa R, Cuntoor N, Moscato V, Picariello A, V.S. Subrahmanian, Udrea O.  2010.  PADS: A Probabilistic Activity Detection Framework for Video Data. Pattern Analysis and Machine Intelligence, IEEE Transactions on. 32(12):2246-2261.
Albanese M, Moscato V, Picariello A, V.S. Subrahmanian, Udrea O.  2007.  Detecting stochastically scheduled activities in video. International Joint Conference on Artificial Intelligence. :1802-1807.
Albanese M, V.S. Subrahmanian.  2007.  T-rex: A domain-independent system for automated cultural information extraction. Proceedings of the First International Conference on Computational Cultural Dynamics (ICCCD 2007).
Albanese M, Pugliese A, V.S. Subrahmanian, Udrea O.  2007.  MAGIC: A Multi-Activity Graph Index for Activity Detection. Information Reuse and Integration, 2007. IRI 2007. IEEE International Conference on. :267-272.
Alborzi H, Samet H.  2007.  Execution time analysis of a top-down R-tree construction algorithm. Information Processing Letters. 101(1):6-12.
Alborzi H, Druin A, Montemayor J, Platner M, Porteous J, Sherman L, Boltman A, Taxén G, Best J, Hammer J et al..  2000.  Designing StoryRooms: interactive storytelling spaces for children. Proceedings of the 3rd conference on Designing interactive systems: processes, practices, methods, and techniques. :95-104.
Albrecht M, Gentry C, Halevi S, Katz J.  2009.  Attacking cryptographic schemes based on "perturbation polynomials". Proceedings of the 16th ACM conference on Computer and communications security. :1-10.
Alex D, Robert R, V.S. Subrahmanian.  2001.  Probabilistic temporal databases. ACM Transaction on Database Systems. 26(1):41-95.
Alexander DS, Arbaugh WA, Keromytis AD, Smith JM.  1998.  A secure active network environment architecture: realization in SwitchWare. IEEE Network. 12(3):37-45.
Alexander S, Arbaugh WA, Keromytis AD, Smith JM.  1998.  Safety and security of programmable network infrastructures. IEEE Communications Magazine. 36(10):84-92.
Alexander DS, Hicks MW, Kakkar P, Keromytis AD, Shaw M, Moore JT, Gunter CA, Jim T, Nettles SM, Smith JM.  1998.  The switchware active network implementation. The ML Workshop, International Conference on Functional Programming (ICFP).
Alexander DS, Menage PB, Keromytis AD, Arbaugh WA, Anagnostakis KG, Smith JM.  2001.  The price of safety in an active network. Journal of Communications and Networks. 3(1):4-18.
Alexander DS, Arbaugh WA, Keromytis AD, Muir S, Smith JM.  2000.  Secure quality of service handling: SQoSH. IEEE Communications Magazine. 38(4):106-112.
Alexander DS, Arbaugh WA, Hicks MW, Kakkar P, Keromytis AD, Moore JT, Gunter CA, Nettles SM, Smith JM.  1998.  The SwitchWare active network architecture. IEEE Network. 12(3):29-36.
Alford R, Kuter U, Nau DS.  2009.  Translating HTNs to PDDL: A small amount of domain knowledge can go a long way. :1629-1634.
Algazi VR, Duda RO, Duraiswami R, Gumerov NA, Tang Z.  2002.  Approximating the head-related transfer function using simple geometric models of the head and torso. The Journal of the Acoustical Society of America. 112:2053-2053.