Publications
Export 1669 results:
Author [ Title] Type Year Filters: First Letter Of Last Name is B [Clear All Filters]
2007. Backbone construction in selfish wireless networks. Proceedings of the 2007 ACM SIGMETRICS international conference on Measurement and modeling of computer systems. :121-132.
1981. Bayesian classification in medicine: The transferability question. Proceedings of the Fifth Annual Symposium on Computer Applications in Medical Care. :250-252.
2012. BEAGLE: An Application Programming Interface and High-Performance Computing Library for Statistical Phylogenetics. Systematic BiologySyst Biol. 61(1):170-173.
2012. Before We Knew It: An Empirical Study of Zero-day Attacks in the Real World. CCS '12 Proceedings of the 2012 ACM conference on Computer and Communications Security. :833-844.
2011. Believe Me—We Can Do This! Annotating Persuasive Acts in Blog Text. Workshops at the Twenty-Fifth AAAI Conference on Artificial Intelligence.
2007. BELIV'06: beyond time and errors: novel evaluation methods for information visualization. interactions. 14(3):59-60.
2008. BELIV'08: Beyond time and errors: novel evaluation methods for information visualization. CHI '08 extended abstracts on Human factors in computing systems. :3913-3916.
2012. Besting the Quiz Master: Crowdsourcing Incremental Classification Games. Empirical Methods in Natural Language Processing.
2009. Better vocabularies for assistive communication aids: connecting terms using semantic networks and untrained annotators. Proceedings of the 11th international ACM SIGACCESS conference on Computers and accessibility. :171-178.
2007. Beyond single-appearance schedules: Efficient DSP software synthesis using nested procedure calls. ACM Transactions on Embedded Computing Systems (TECS). 6(2):14–es-14–es.
1998. Beyond the Epipolar Constraint: Integrating 3D Motion and Structure Estimation. 3D Structure from Multiple Images of Large-Scale Environments3D Structure from Multiple Images of Large-Scale Environments. 1506:109-123.
2008. Bilateral symmetry of object silhouettes under perspective projection. 19th International Conference on Pattern Recognition, 2008. ICPR 2008. :1-4.
2017. A Bioinformatics 3D Cellular Morphotyping Strategy for Assessing Biomaterial Scaffold Niches. ACS Biomaterials Science & Engineering. 3(10):2302-2313.
2017. A Bioinformatics 3D Cellular Morphotyping Strategy for Assessing Biomaterial Scaffold Niches. ACS Biomaterials Science & Engineering. 3(10):2302-2313.
2017. A Bioinformatics 3D Cellular Morphotyping Strategy for Assessing Biomaterial Scaffold Niches. ACS Biomaterials Science & Engineering. 3(10):2302-2313.
2017. A Bioinformatics 3D Cellular Morphotyping Strategy for Assessing Biomaterial Scaffold Niches. ACS Biomaterials Science & Engineering. 3(10):2302-2313.
2008. Bittorrent is an auction: analyzing and improving bittorrent's incentives. Proceedings of the ACM SIGCOMM 2008 conference on Data communication. :243-254.
2003. Bootstrapping security associations for routing in mobile ad-hoc networks. IEEE Global Telecommunications Conference, 2003. GLOBECOM '03. 3:1511-1515vol.3-1511-1515vol.3.