Publications

Export 1435 results:
Author [ Title(Desc)] Type Year
Filters: First Letter Of Last Name is K  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
A
Zotkin DN, Keleher PJ, Perkovic D.  2000.  Attacking the bottlenecks of backfilling schedulers. Cluster Computing.
Haritaoglu I, Cozzi A, Koons D, Flickner M, Zotkin DN, Yacoob Y.  2001.  Attentive toys. International Conference on Multimedia and Expo. 22:25-25.
Keogh E, Hochheiser H, Shneiderman B.  2005.  An Augmented Visual Query Mechanism for Finding Patterns in Time Series Data (2002). Institute for Systems Research Technical Reports.
Keogh E, Hochheiser H, Shneiderman B.  2002.  An Augmented Visual Query Mechanism for Finding Patterns in Time Series Data. Flexible Query Answering SystemsFlexible Query Answering Systems. 2522:240-250.
Gordon S, Katz J, Kumaresan R, Yerukhimovich A.  2010.  Authenticated broadcast with a partially compromised public-key infrastructure. Stabilization, Safety, and Security of Distributed Systems. :144-158.
Gordon S, Katz J, Kumaresan R, Yerukhimovich A.  2010.  Authenticated broadcast with a partially compromised public-key infrastructure. Stabilization, Safety, and Security of Distributed Systems. :144-158.
Kumar M, Gupta SK.  2002.  Automated design of multi-stage molds for manufacturing multi-material objects. Journal of Mechanical Design. 124:399-399.
Arbaugh WA, Keromytis AD, Farber DJ, Smith JM.  1998.  Automated recovery in a secure bootstrap process. Proceedings of the Symposium on Network and Distributed Systems Security (NDSS’98). :155-167.
Kondrak G, Dorr BJ.  2006.  Automatic identification of confusable drug names. Artificial Intelligence in Medicine. 36(1):29-42.
Li H, Doermann D, Kia O.  2000.  Automatic Text Detection and Tracking in Digital Video. IEEE Transactions on Image Processing - Special Issue on Image and Video Processing for Digital Libraries. 9(1):147-156.
Li H, Doermann D, Kia O.  1998.  Automatic Text Detection and Tracking in Digital Video. LAMP-TR-028,CFAR-TR-900,CS-TR-3962
Balch T, Khan Z, Veloso M.  2001.  Automatically Tracking and Analyzing the Behavior of Live Insect Colonies. AGENTS '01 Proceedings of the Fifth International Conference on Autonomous Agents . :521-528.
B
Rasko DA, Worsham PL, Abshire TG, Stanley ST, Bannan JD, Wilson MR, Langham RJ, Decker SR, Jiang L, Read TD et al..  2011.  Bacillus Anthracis Comparative Genome Analysis in Support of the Amerithrax Investigation. Proceedings of the National Academy of SciencesPNAS. 108(12):5027-5032.
Rasko DA, Worsham PL, Abshire TG, Stanley ST, Bannan JD, Wilson MR, Langham RJ, Decker SR, Jiang L, Read TD et al..  2011.  Bacillus Anthracis Comparative Genome Analysis in Support of the Amerithrax Investigation. Proceedings of the National Academy of SciencesPNAS. 108(12):5027-5032.
Rajagopalan AN, Chellappa R, Koterba NT.  2005.  Background learning for robust face recognition with PCA in the presence of clutter. Image Processing, IEEE Transactions on. 14(6):832-843.
Kim K, Chalidabhongse TH, Harwood D, Davis LS.  2004.  Background modeling and subtraction by codebook construction. Image Processing, 2004. ICIP '04. 2004 International Conference on. 5:3061-3064Vol.5-3061-3064Vol.5.
Kim K, Harwood D, Davis LS.  2005.  Background updating for visual surveillance. Advances in Visual Computing. :337-346.
Klavans JL, Resnik P.  1996.  The Balancing Act: Combining Symbolic and Statistical Approaches to Language.
Khuller S, Raghavachari B, Young N.  1995.  Balancing minimum spanning trees and shortest-path trees. Algorithmica. 14(4):305-321.
Prasad V, Kellokumpu V, Davis LS.  2006.  Ballistic hand movements. Articulated Motion and Deformable Objects. :153-164.
Koren S, Treangen TJ, Pop M.  2011.  Bambus 2: scaffolding metagenomes. Bioinformatics. 27(21):2964-2971.
Deligiannakis A, Kotidis Y, Roussopoulos N.  2008.  Bandwidth-constrained queries in sensor networks. The VLDB Journal. 17(3):443-467.
Froehlich J, Wobbrock JO, Kane SK.  2007.  Barrier pointing: using physical edges to assist target acquisition on mobile device touch screens. Proceedings of the 9th international ACM SIGACCESS conference on Computers and accessibility, October. :15-17.
Lee SHee, Kalejta RF, Kerry J, Semmes OJohn, O’Connor CM, Khan Z, Garcia BA, Shenk T, Murphy E.  2012.  BclAF1 restriction factor is neutralized by proteasomal degradation and microRNA repression during human cytomegalovirus infection. Proceedings of the National Academy of Sciences. 109(24):9575-9580.
Lee SHee, Kalejta RF, Kerry J, Semmes OJohn, O’Connor CM, Khan Z, Garcia BA, Shenk T, Murphy E.  2012.  BclAF1 restriction factor is neutralized by proteasomal degradation and microRNA repression during human cytomegalovirus infection. Proceedings of the National Academy of Sciences. 109(24):9575-9580.

Pages