Publications

Export 1669 results:
Author [ Title(Desc)] Type Year
Filters: First Letter Of Last Name is B  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
B
Lee S, Levin D, Gopalakrishnan V, Bhattacharjee B.  2007.  Backbone construction in selfish wireless networks. Proceedings of the 2007 ACM SIGMETRICS international conference on Measurement and modeling of computer systems. :121-132.
Zagoria R, Reggia JA, Price T, Banko M.  1981.  Bayesian classification in medicine: The transferability question. Proceedings of the Fifth Annual Symposium on Computer Applications in Medical Care. :250-252.
Ayres DL, Darling A, Zwickl DJ, Beerli P, Holder MT, Lewis PO, Huelsenbeck JP, Ronquist F, Swofford DL, Cummings MP et al..  2012.  BEAGLE: An Application Programming Interface and High-Performance Computing Library for Statistical Phylogenetics. Systematic BiologySyst Biol. 61(1):170-173.
Bilge L, Dumitras T.  2012.  Before We Knew It: An Empirical Study of Zero-day Attacks in the Real World. CCS '12 Proceedings of the 2012 ACM conference on Computer and Communications Security. :833-844.
Anand P, King J, Boyd-Graber J, Wagner E, Martell C, Oard D, Resnik P.  2011.  Believe Me—We Can Do This! Annotating Persuasive Acts in Blog Text. Workshops at the Twenty-Fifth AAAI Conference on Artificial Intelligence.
Bertini E, Plaisant C, Santucci G.  2007.  BELIV'06: beyond time and errors: novel evaluation methods for information visualization. interactions. 14(3):59-60.
Bertini E, Perer A, Plaisant C, Santucci G.  2008.  BELIV'08: Beyond time and errors: novel evaluation methods for information visualization. CHI '08 extended abstracts on Human factors in computing systems. :3913-3916.
Satinoff B, Boyd-Graber J.  2012.  Besting the Quiz Master: Crowdsourcing Incremental Classification Games. Empirical Methods in Natural Language Processing.
Nikolova S, Boyd-Graber J, Fellbaum C, Cook P.  2009.  Better vocabularies for assistive communication aids: connecting terms using semantic networks and untrained annotators. Proceedings of the 11th international ACM SIGACCESS conference on Computers and accessibility. :171-178.
Ko MY, Murthy PK, Bhattacharyya SS.  2007.  Beyond single-appearance schedules: Efficient DSP software synthesis using nested procedure calls. ACM Transactions on Embedded Computing Systems (TECS). 6(2):14–es-14–es.
Brodský T, Fermüller C, Aloimonos Y.  1998.  Beyond the Epipolar Constraint: Integrating 3D Motion and Structure Estimation. 3D Structure from Multiple Images of Large-Scale Environments3D Structure from Multiple Images of Large-Scale Environments. 1506:109-123.
Cardone A, Amelot J, Li-Baboud Y-S, Brady M, Bajcsy P.  2012.  Biases from model assumptions in texture sub-cellular image segmentation. SPIE Newsroom. 13
Cardone A, Amelot J, Li-Baboud Y-S, Brady M, Bajcsy P.  2012.  Biases from model assumptions in texture sub-cellular image segmentation. SPIE Newsroom. 13
Bitsakos K, Yi H, Yi L, Fermüller C.  2008.  Bilateral symmetry of object silhouettes under perspective projection. 19th International Conference on Pattern Recognition, 2008. ICPR 2008. :1-4.
Hu Y, Boyd-Graber J, III HDaume, Z Ying I.  2013.  Binary to Bushy: Bayesian Hierarchical Clustering with the Beta Coalescent. :1079-1087.
Florczyk SJ, Simon M, Juba D, P. Pine S, Sarkar S, Chen D, Baker PJ, Bodhak S, Cardone A, Brady MC et al..  2017.  A Bioinformatics 3D Cellular Morphotyping Strategy for Assessing Biomaterial Scaffold Niches. ACS Biomaterials Science & Engineering. 3(10):2302-2313.
Florczyk SJ, Simon M, Juba D, P. Pine S, Sarkar S, Chen D, Baker PJ, Bodhak S, Cardone A, Brady MC et al..  2017.  A Bioinformatics 3D Cellular Morphotyping Strategy for Assessing Biomaterial Scaffold Niches. ACS Biomaterials Science & Engineering. 3(10):2302-2313.
Florczyk SJ, Simon M, Juba D, P. Pine S, Sarkar S, Chen D, Baker PJ, Bodhak S, Cardone A, Brady MC et al..  2017.  A Bioinformatics 3D Cellular Morphotyping Strategy for Assessing Biomaterial Scaffold Niches. ACS Biomaterials Science & Engineering. 3(10):2302-2313.
Florczyk SJ, Simon M, Juba D, P. Pine S, Sarkar S, Chen D, Baker PJ, Bodhak S, Cardone A, Brady MC et al..  2017.  A Bioinformatics 3D Cellular Morphotyping Strategy for Assessing Biomaterial Scaffold Niches. ACS Biomaterials Science & Engineering. 3(10):2302-2313.
Gyger Jr LS, Spranklin BW, Gupta SK, Bruck HA.  2006.  Bio-inspired, Modular, and Multifunctional Thermal and Impact Protected (TIPed) Embedded Sensing Controls Actuation Power Element (ESCAPE) Structures.
Levin D, LaCurts K, Spring N, Bhattacharjee B.  2008.  Bittorrent is an auction: analyzing and improving bittorrent's incentives. Proceedings of the ACM SIGCOMM 2008 conference on Data communication. :243-254.
Bobba RB, Eschenauer L, Gligor V, Arbaugh WA.  2003.  Bootstrapping security associations for routing in mobile ad-hoc networks. IEEE Global Telecommunications Conference, 2003. GLOBECOM '03. 3:1511-1515vol.3-1511-1515vol.3.
Varshney A, Wright WV, Brooks Jr FP.  1993.  Bounding the number of neighbors in protein molecules. UNC-CS-TR-93-039
Levin D, Bender A, Lumezanu C, Spring N, Bhattacharjee B.  2007.  Boycotting and extorting nodes in an internetwork. NetE-con+ IBC.
Levin D, Bender A, Lumezanu C, Spring N, Bhattacharjee B.  2007.  Boycotting and extorting nodes in an internetwork. NetE-con+ IBC.

Pages