Publications

Export 620 results:
Author [ Title(Desc)] Type Year
Filters: First Letter Of Last Name is T  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
C
Hourigan SK, Subramanian P, Hasan NA, Ta A, Klein E, Chettout N, Huddleston K, Deopujari V, Levy S, Baveja R et al..  2018.  Comparison of Infant Gut and Skin Microbiota, Resistome and Virulome Between Neonatal Intensive Care Unit (NICU) Environments. Frontiers in Microbiology.
Tsoumakos D, Roussopoulos N.  2003.  A comparison of peer-to-peer search methods. Proceedings of the Sixth International Workshop on the Web and Databases.
Tian J, Zelkowitz MV.  1995.  Complexity measure evaluation and selection. Software Engineering, IEEE Transactions on. 21(8):641-650.
Slaughters L, Shneiderman B, Marchionini G.  1997.  Comprehension and object recognition capabilities for presentations of simultaneous video key frame surrogates. Research and Advanced Technology for Digital LibrariesResearch and Advanced Technology for Digital Libraries. 1324:41-54.
McIntyre ABR, Ounit R, Afshinnekoo E, Prill RJ, Hénaff E, Alexander N, Minot SS, Danko D, Foox J, Ahsanuddin S et al..  2017.  Comprehensive benchmarking and ensemble approaches for metagenomic classifiers. Genome Biology. (1210)
Sankaranarayanan A, Turaga P, Baraniuk R, Chellappa R.  2010.  Compressive Acquisition of Dynamic Scenes. Computer Vision – ECCV 2010Computer Vision – ECCV 2010. 6311:129-142.
Choi JH, Tang H, Kim S, Pop M.  2010.  Computational Approaches for Genome Assembly Validation. Biological Data Mining. :163-163.
Thakur A, Gupta SK.  2010.  A Computational Framework for Real-Time Unmanned Sea Surface Vehicle Motion Simulation. 3:51-61.
Kanodia JS, Kim Y, Tomer R, Khan Z, Chung K, Storey JD, Lu H, Keller PJ, Shvartsman SY.  2011.  A computational statistics approach for estimating the spatial range of morphogen gradients. Development. 138(22):4867-4874.
Chellappa R, Cuntoor NP, Joo SW, V.S. Subrahmanian, Turaga P.  2008.  Computational Vision Approaches for Event Modeling. Understanding Events. 1(9):473-522.
Reggia JA, Tabb DR, Price TR, Banko M, Hebel R.  1984.  Computer-aided assessment of transient ischemic attacks. A clinical evaluation.. Archives of neurology. 41(12):1248-1248.
Reggia JA, Peng Y, Tuhrim S.  1993.  A connectionist approach to diagnostic problem solving using causal networks. Information sciences. 70(1-2):27-48.
Srinivasan A, Teo C-P.  1997.  A constant-factor approximation algorithm for packet routing, and balancing local vs. global criteria. Proceedings of the twenty-ninth annual ACM symposium on Theory of computing. :636-643.
Albanese M, Chellappa R, Moscato V, Picariello A, V.S. Subrahmanian, Turaga P, Udrea O.  2008.  A Constrained Probabilistic Petri Net Framework for Human Activity Detection in Video. Multimedia, IEEE Transactions on. 10(6):982-996.
Winternitz LB, Nicholls SO, Tits Aé, O'Leary DP.  2011.  A Constraint-Reduced Variant of Mehrotra's Predictor-Corrector Algorithm. Computational Optimization and Applications.
Senoh M, Ghosh‐Banerjee J, Ramamurthy T, Colwell RR, Miyoshi S-ichi, Nair BG, Takeda Y.  2012.  Conversion of viable but nonculturable enteric bacteria to culturable by co‐culture with eukaryotic cells. Microbiology and Immunology. 56(5):342-345.
Senoh M, Ghosh‐Banerjee J, Ramamurthy T, Hamabata T, Kurakawa T, Takeda M, Colwell RR, Nair BG, Takeda Y.  2010.  Conversion of viable but nonculturable Vibrio cholerae to the culturable state by co‐culture with eukaryotic cells. Microbiology and Immunology. 54(9):502-507.
Senoh M, Ghosh‐Banerjee J, Ramamurthy T, Hamabata T, Kurakawa T, Takeda M, Colwell RR, Nair BG, Takeda Y.  2010.  Conversion of viable but nonculturable Vibrio cholerae to the culturable state by co‐culture with eukaryotic cells. Microbiology and Immunology. 54(9):502-507.
Teo CL, Yang Y, Daumé H, Fermüller C, Aloimonos Y.  2011.  A Corpus-Guided Framework for Robotic Visual Perception. Workshops at the Twenty-Fifth AAAI Conference on Artificial Intelligence.
Goodrich MT, Papamanthou C, Tamassia R.  2007.  On the Cost of Persistence and Authentication in Skip Lists. Experimental Algorithms. :94-107.
Gupta A, Srinivasan A, Tardos É.  2008.  Cost-Sharing Mechanisms for Network Design. Algorithmica. 50(1):98-119.
Shneiderman B, Fischer G, Czerwinski M, Resnick M, Myers B, Candy L, Edmonds E, Eisenberg M, Giaccardi E, Hewett T et al..  2006.  Creativity Support Tools: Report From a U.S. National Science Foundation Sponsored Workshop. International Journal of Human-Computer Interaction. 20(2):61-77.
Ponnusamy D, Kozlova EV, Sha J, Erova TE, Azar SR, Fitts EC, Kirtley ML, Tiner BL, Andersson JA, Grim CJ et al..  2016.  Cross-talk among flesh-eating Aeromonas hydrophila strains in mixed infection leading to necrotizing fasciitis. Proceedings of the National Academy of Sciences. 11312161268(3321029):722-727.
D
Tagamets MA, Reggia JA.  1989.  A data flow implementation of a competition-based connectionist model* 1. Journal of Parallel and Distributed Computing. 6(3):704-714.
M. Wu, Tang E, Lin B.  2000.  Data hiding in digital binary image. Multimedia and Expo, 2000. ICME 2000. 2000 IEEE International Conference on. 1:393-396vol.1-393-396vol.1.

Pages