Publications
Export 1377 results:
Author [ Title] Type Year Filters: First Letter Of Last Name is R [Clear All Filters]
2006. Revealing botnet membership using DNSBL counter-intelligence. Proc. 2nd USENIX Steps to Reducing Unwanted Traffic on the Internet. :49-54.
2012. Re-wiring Activity of Malicious Networks. Passive and Active MeasurementPassive and Active Measurement. 7192:116-125.
2009. RNA Colony Blot Hybridization Method for Enumeration of Culturable Vibrio Cholerae and Vibrio Mimicus Bacteria. Applied and Environmental MicrobiologyAppl. Environ. Microbiol.. 75(17):5439-5444.
2003. Robust Face Recognition in the Presence of Clutter. Audio- and Video-Based Biometric Person AuthenticationAudio- and Video-Based Biometric Person Authentication. 2688:1062-1062.
2006. Robust fuzzy extractors and authenticated key agreement from close secrets. Advances in Cryptology-CRYPTO 2006. :232-250.
2012. Role of GbpA protein, an important virulence-related colonization factor, for Vibrio cholerae's survival in the aquatic environment. Environmental Microbiology Reports. (4):439-445.
2001. The role of independent verification and validation in maintaining a safety critical evolutionary software in a complex environment: the NASA Space Shuttle program. Software Maintenance, 2001. Proceedings. IEEE International Conference on. :118-126.
1983. The Role of Spatial Knowledge in Expert Systems. Representation and Processing of Spatial Knowledge, TR-1275. Dept. of Comp. sci „Univ. of Maryland, May. :3-8.
2012. Rpn1 and Rpn2 coordinate ubiquitin processing factors at the proteasome. Journal of Biological ChemistryJ. Biol. Chem..
1994. A rule-based approach to prepositional phrase attachment disambiguation. Proceedings of the 15th conference on Computational linguistics-Volume 2. :1198-1204.
2009. Running memory span: A comparison of behavioral capacity limits with those of an attractor neural network. Cognitive Systems Research. 10(2):161-171.
1996. Runtime coupling of data-parallel programs. Proceedings of the 10th international conference on Supercomputing. :229-236.
1983. S., Wang. PY, Diagnostic Expert Systems Based on a Set Covering Model. International Journal on Man-Machine studies. 19:437–46O-437–46O.
2008. Satisfying Complex Data Needs using Pull-Based Online Monitoring of Volatile Data Sources. Data Engineering, International Conference on. :1465-1467.
2008. Satisfying Complex Data Needs using Pull-Based Online Monitoring of Volatile Data Sources. Data Engineering, International Conference on. :1465-1467.
2008. Scaffolding and Validation of Bacterial Genome Assemblies Using Optical Restriction Maps. Bioinformatics. 24(10):1229-1235.
2008. SCALABLE CATALOG INFRASTRUCTURE FOR MANAGING ACCESS COSTS AND SOURCE SELECTION IN WIDE AREA NETWORKS. International Journal of Cooperative Information Systems. 17(1):77-109.
2005. Scheduling on Unrelated Machines Under Tree-Like Precedence Constraints. Approximation, Randomization and Combinatorial Optimization. Algorithms and TechniquesApproximation, Randomization and Combinatorial Optimization. Algorithms and Techniques. 3624:609-609.
1985. Schema manipulation in self-describing and self-documenting data models. International Journal of Parallel Programming. 14(1):1-28.
2008. Searching Electronic Health Records for Temporal Patterns in Patient Histories: A Case Study with Microsoft Amalga. AMIA Annual Symposium ProceedingsAMIA Annu Symp Proc. 2008:601-605.
2008. Searching Electronic Health Records for Temporal Patterns in Patient Histories: A Case Study with Microsoft Amalga. AMIA Annual Symposium ProceedingsAMIA Annu Symp Proc. 2008:601-605.