Publications

Export 1734 results:
Author Title Type [ Year(Asc)]
Filters: First Letter Of Last Name is M  [Clear All Filters]
2012
Minker J.  2012.  Scientific Freedom and Human Rights. :564.
Choi S, Hwang KW, Katz J, Malkin T, Rubenstein D.  2012.  Secure multi-party computation of boolean circuits with applications to privacy in on-line marketplaces. Topics in Cryptology–CT-RSA 2012. :416-432.
Martineau J, Mokashi R, Chapman D, Grasso M, Brady M, Yesha Y, Yesha Y, Cardone A, Dima A.  2012.  Sub-cellular feature detection and automated extraction of collocalized actin and myosin regions. the 2nd ACM SIGHIT symposiumProceedings of the 2nd ACM SIGHIT symposium on International health informatics - IHI '12. :399.
Martineau J, Mokashi R, Chapman D, Grasso M, Brady M, Yesha Y, Yesha Y, Cardone A, Dima A.  2012.  Sub-cellular feature detection and automated extraction of collocalized actin and myosin regions. the 2nd ACM SIGHIT symposiumProceedings of the 2nd ACM SIGHIT symposium on International health informatics - IHI '12. :399.
Martineau J, Mokashi R, Chapman D, Grasso M, Brady M, Yesha Y, Yesha Y, Cardone A, Dima A.  2012.  Sub-cellular feature detection and automated extraction of collocalized actin and myosin regions. the 2nd ACM SIGHIT symposiumProceedings of the 2nd ACM SIGHIT symposium on International health informatics - IHI '12. :399.
Banakar V, Constantin de Magny G, Jacobs J, Murtugudde R, Huq A, J. Wood R, Colwell RR.  2012.  Temporal and Spatial Variability in the Distribution of Vibrio vulnificus in the Chesapeake Bay: A Hindcast Study. EcoHealth. :1-12.
Motiwala M, Dhamdhere A, Feamster N, Lakhina A.  2012.  Towards a cost model for network traffic. SIGCOMM Comput. Commun. Rev.. 42(1):54-60.
Katz J, MacKenzie P, Taban G, Gligor V.  2012.  Two-server password-only authenticated key exchange. Journal of Computer and System Sciences. 78(2):651-669.
Ricaldi JN, Fouts DE, Selengut JD, Harkins DM, Patra KP, Moreno A, Lehmann JS, Purushe J, Sanka R, Torres M et al..  2012.  Whole genome analysis of Leptospira licerasiae provides insight into leptospiral evolution and pathogenicity.. PLoS Negl Trop Dis. 6(10):e1853.
Ricaldi JN, Fouts DE, Selengut JD, Harkins DM, Patra KP, Moreno A, Lehmann JS, Purushe J, Sanka R, Torres M et al..  2012.  Whole genome analysis of Leptospira licerasiae provides insight into leptospiral evolution and pathogenicity.. PLoS Negl Trop Dis. 6(10):e1853.
2011
Molinaro C, Sliva A, V.S. Subrahmanian.  2011.  Abduction in Annotated Probabilistic Temporal Logic. Technical Communications of the 27th International Conference on Logic Programming (ICLP'11). 11:240-250.
Van Horn D, Might M.  2011.  Abstracting Abstract Machines: A Systematic Approach to Higher-Order Program Analysis. arXiv:1105.1743 [cs].
Chen D, Bilgic M, Getoor L, Jacobs DW, Mihalkova L, Tom Yeh.  2011.  Active inference for retrieval in camera networks. Person-Oriented Vision (POV), 2011 IEEE Workshop on. :13-20.
Chen D, Bilgic M, Getoor L, Jacobs DW, Mihalkova L, Tom Yeh.  2011.  Active inference for retrieval in camera networks. Person-Oriented Vision (POV), 2011 IEEE Workshop on. :13-20.
Arya S, da Fonseca GD, Mount D.  2011.  Approximate polytope membership queries. Proceedings of 43rd Annual ACM Symposium on Theory of Computing. :579-586.
Koponen T, Shenker S, Balakrishnan H, Feamster N, Ganichev I, Ghodsi A, Godfrey BP, McKeown N, Parulkar G, Raghavan B et al..  2011.  Architecting for innovation. SIGCOMM Comput. Commun. Rev.. 41(3):24-36.
Chang T-H, Tom Yeh, Miller R.  2011.  Associating the visual representation of user interfaces with their internal structures and metadata. Proceedings of the 24th annual ACM symposium on User interface software and technology. :245-256.
Svec P, Gupta SK.  2011.  Automated Planning Logic Synthesis for Autonomous Unmanned Vehicles in Competitive Environments with Deceptive Adversaries. New Horizons in Evolutionary Robotics. 341:171-193.
Oh S, Hoogs A, Perera A, Cuntoor N, Chen C-C, Lee J T, Mukherjee S, Aggarwal JK, Lee H, Davis LS et al..  2011.  AVSS 2011 demo session: A large-scale benchmark dataset for event recognition in surveillance video. Advanced Video and Signal-Based Surveillance (AVSS), 2011 8th IEEE International Conference on. :527-528.
Anand P, King J, Boyd-Graber J, Wagner E, Martell C, Oard D, Resnik P.  2011.  Believe Me—We Can Do This! Annotating Persuasive Acts in Blog Text. Workshops at the Twenty-Fifth AAAI Conference on Artificial Intelligence.
Farrell R, Oza O, Zhang N, Morariu VI, Darrell T, Davis LS.  2011.  Birdlets: Subordinate categorization using volumetric primitives and pose-normalized appearance. Computer Vision (ICCV), 2011 IEEE International Conference on. :161-168.
Dachman-Soled D, Lindell Y, Mahmoody M, Malkin T.  2011.  On the Black-Box Complexity of Optimally-Fair Coin Tossing. Theory of Cryptography. :450-467.
Dachman-Soled D, Lindell Y, Mahmoody M, Malkin T.  2011.  On the Black-Box Complexity of Optimally-Fair Coin Tossing. Theory of Cryptography. :450-467.
Cho S, Zwick A, Regier JC, Mitter C, Cummings MP, Yao J, Du Z, Zhao H, Kawahara AY, Weller S et al..  2011.  Can Deliberately Incomplete Gene Sample Augmentation Improve a Phylogeny Estimate for the Advanced Moths and Butterflies (Hexapoda: Lepidoptera)? Systematic BiologySyst Biol. 60(6):782-796.
Chafekar D, Anil Kumar V, Marathe M, Parthasarathy S, Srinivasan A.  2011.  Capacity of wireless networks under SINR interference constraints. Wireless Networks. 17(7):1605-1624.

Pages