Publications

Export 1254 results:
Author [ Title(Desc)] Type Year
Filters: First Letter Of Last Name is G  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
A
Alva U, Gupta SK.  1999.  Automated punch shape synthesis for sheet metal bending operations.
Svec P, Gupta SK.  2012.  Automated synthesis of action selection policies for unmanned vehicles operating in adverse environments. Autonomous Robots. 32(2):149-164.
Roy A, Halder B, Garain U, Doermann D.  2012.  Automatic Authentication of Banknotes. IEEE Transactions on Information Forensics & Security.
Geyken A, Boyd-Graber J.  2003.  Automatic classification of multi-word expressions in print dictionaries. Lingvisticae Investigationes. 26(2):187-202.
Byrne W, Doermann D, Franz M, Gustman S, Hajic J, Oard D, Picheny M, Psutka J, Ramabhadran B.  2004.  Automatic recognition of spontaneous speech for access to multilingual oral history archives. IEEE Transactions on Speech and Audio Processing, Special Issue on Spontaneous Speech Processing. 12(4):420-435.
Oard D, Demner-Fushman D, Hajic J, Ramabhadran B, Gustman S, Byrne WJ, Soergel D, Dorr BJ, Resnik P, Picheny M.  2002.  Automatic transcription of Czech language oral history in the MALACH project: resources and initial experiments. Proceedings of the The 5th International Conference on Text, Speech and Dialogue. :57-64.
B
Conroy JM, Schlesinger JD, O'Leary DP, Goldstein J.  2006.  Back to Basics: CLASSY 2006. DUC 06 Conference ProceedingsDUC 06 Conference Proceedings.
Lee S, Levin D, Gopalakrishnan V, Bhattacharjee B.  2007.  Backbone construction in selfish wireless networks. Proceedings of the 2007 ACM SIGMETRICS international conference on Measurement and modeling of computer systems. :121-132.
desJardins M, Rathod P, Getoor L.  2005.  Bayesian network learning with abstraction hierarchies and context-specific independence. Machine Learning: ECML 2005. :485-496.
Lee SHee, Kalejta RF, Kerry J, Semmes OJohn, O’Connor CM, Khan Z, Garcia BA, Shenk T, Murphy E.  2012.  BclAF1 restriction factor is neutralized by proteasomal degradation and microRNA repression during human cytomegalovirus infection. Proceedings of the National Academy of Sciences. 109(24):9575-9580.
Gupta P, Doermann D, DeMenthon D.  2002.  Beam Search for Feature Selection in Automatic SVMDefect Classification. International Conference on Pattern Recognition. :212-215.
Hollingsworth J, Guven E, Akinlar C.  1998.  Benchmarking a network of PCs running parallel applications. Performance, Computing and Communications, 1998. IPCCC '98., IEEE International. :1-7.
Goldberg L A, Paterson M, Srinivasan A, Sweedyk E.  1997.  Better approximation guarantees for job-shop scheduling. Proceedings of the eighth annual ACM-SIAM symposium on Discrete algorithms. :599-608.
Goldberg L A, Paterson M, Srinivasan A, Sweedyk E.  2001.  Better Approximation Guarantees for Job-Shop Scheduling. SIAM Journal on Discrete Mathematics. 14(1):67-67.
Gupta A, Davis LS.  2008.  Beyond nouns: Exploiting prepositions and comparative adjectives for learning visual classifiers. Computer Vision–ECCV 2008. :16-29.
Grand J, Cummings MP, Rebelo TG, Ricketts TH, Neel MC.  2007.  Biased data reduce efficiency and effectiveness of conservation reserve networks. Ecology Letters. 10(5):364-374.
Huq A, Whitehouse CA, Grim CJ, Alam M, Colwell RR.  2008.  Biofilms in water, its role and impact in human disease transmission. Current Opinion in Biotechnology. 19(3):244-247.
Gevers D, Pop M, Schloss PD, Huttenhower C.  2012.  Bioinformatics for the Human Microbiome Project. PLoS Computational Biology. 8(11):e1002779.
Gyger Jr LS, Spranklin BW, Gupta SK, Bruck HA.  2006.  Bio-inspired, Modular, and Multifunctional Thermal and Impact Protected (TIPed) Embedded Sensing Controls Actuation Power Element (ESCAPE) Structures.
Gyger Jr LS, Spranklin BW, Gupta SK, Bruck HA.  2006.  Bio-inspired, Modular, and Multifunctional Thermal and Impact Protected (TIPed) Embedded Sensing Controls Actuation Power Element (ESCAPE) Structures.
Sen P, Deshpande A, Getoor L.  2009.  Bisimulation-based approximate lifted inference. Proceedings of the Twenty-Fifth Conference on Uncertainty in Artificial Intelligence. :496-505.
Golubchik L, Cheng WC, Chou C-F, Khuller S, Samet H, Wan JC.  2003.  Bistro: a scalable and secure data transfer service for digital government applications. Commun. ACM. 46(1):50-51.
Golubchik L, Cheng WC, Chou C-F, Khuller S, Samet H, Wan JC.  2003.  Bistro: a scalable and secure data transfer service for digital government applications. Communications of the ACM. 46(1):50-51.
Gopalan R, Taheri S, Turaga P, Chellappa R.  2012.  A Blur-robust Descriptor with Applications to Face Recognition. IEEE Transactions on Pattern Analysis and Machine Intelligence. PP(99):1-1.
Zhang J, Luo X, Perdisci R, Gu G, Lee W, Feamster N.  2011.  Boosting the scalability of botnet detection using adaptive traffic sampling. Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security. :124-134.

Pages