Publications

Export 7151 results:
Author [ Title(Desc)] Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
C
Fernández1 J A, Minker J, Yahya A.  2007.  COMPUTING PERFECT AND STABLE MODELS USING ORDERED MODEL TREES. Computational Intelligence. 11(1):89-112.
Minker J, Perlis D.  1985.  Computing protected circumscription. The Journal of Logic Programming. 2(4):235-249.
Varshney A, Brooks, F.P. J., Wright WV.  1994.  Computing smooth molecular surfaces. Computer Graphics and Applications, IEEE. 14(5):19-25.
Ruiz C, Minker J.  1995.  Computing stable and partial stable models of extended disjunctive logic programs. Non-Monotonic Extensions of Logic Programming. :205-229.
O'Leary DP, Stewart G.W.  1990.  Computing the eigenvalues and eigenvectors of symmetric arrowhead matrices. Journal of Computational Physics. 90(2):497-505.
Bazinet AL, Cummings MP.  2011.  Computing the Tree of Life: Leveraging the Power of Desktop and Service Grids. Parallel and Distributed Processing Workshops and Phd Forum (IPDPSW), 2011 IEEE International Symposium on. :1896-1902.
Srinivasan A, Zuckerman D.  1994.  Computing with very weak random sources. , 35th Annual Symposium on Foundations of Computer Science, 1994 Proceedings. :264-275.
Mohammad S, Dorr BJ, Hirst G.  2008.  Computing word-pair antonymy. Proceedings of the Conference on Empirical Methods in Natural Language Processing. :982-991.
Srinivasan A.  2010.  Concentration of measure for the analysis of randomized algorithms by Devdatt P. Dubhashi and Alessandro Panconesi Cambridge University Press, 2009. SIGACT News. 41(1):28-30.
Sidhu T, Klavans J, Jimmy Lin.  2007.  Concept disambiguation for improved subject access using multiple knowledge sources. Proceedings of the Workshop on Language Technology for Cultural Heritage Data (LaTeCH 2007). :25-25.
Dorr BJ, Voss C, Peterson E, Kiker M.  1994.  Concept-based lexical selection. Proceedings of the AAAI-94 Fall Symposium on Knowledge Representation for Natural Language Processing in Implemented Systems.
Dorr BJ.  1991.  Conceptual Basis of the Lexicon in Machine Translation. Lexical acquisition: exploiting on-line resources to build a lexiconLexical acquisition: exploiting on-line resources to build a lexicon. :263-263.
Roussopoulos N, Karagiannis D.  2009.  Conceptual modeling: past, present and the continuum of the future. Conceptual Modeling: Foundations and Applications. :139-152.
Castro-Nallar E, Hasan NA, Cebula TA, Colwell RR, Robison RA, W. Johnson E, Crandall KA.  2015.  Concordance and discordance of sequence survey methods for molecular epidemiology. PeerJ. (8105394):e761.
Cleaveland R, Lewis P, Smolka S, Sokolsky O.  1996.  The Concurrency Factory: A development environment for concurrent systems. Computer Aided Verification. :398-401.
Cleaveland R, Parrow J, Steffen B.  1990.  The concurrency workbench. Automatic Verification Methods for Finite State Systems. :24-37.
Cleaveland R, Parrow J, Steffen B.  1993.  The concurrency workbench: a semantics-based tool for the verification of concurrent systems. ACM Transactions on Programming Languages and Systems. 15:36-72.
Gupta SK, Nau DS, Zhang G.  1993.  Concurrent evaluation of machinability during product design. Computer. 26(1):61-63.
Refaey MA, Elsayed KM, Hanafy SM, Davis LS.  2009.  Concurrent transition and shot detection in football videos using Fuzzy Logic. Image Processing (ICIP), 2009 16th IEEE International Conference on. :4341-4344.
Hazay C, Katz J, Koo CY, Lindell Y.  2007.  Concurrently-secure blind signatures without random oracles or setup assumptions. Theory of Cryptography. :323-341.
Jacobs DW, Weinshall D, Gdalyahu Y.  1998.  Condensing image databases when retrieval is based on non-metric distances. Computer Vision, 1998. Sixth International Conference on. :596-601.
Kuter U, Nau DS, Reisner E, Goldman R.  2007.  Conditionalization: Adapting forward-chaining planners to partially observable environments.
Reggia JA, Schulz R, Wilkinson GS, Uriagereka J.  2001.  Conditions enabling the emergence of inter-agent signalling in an artificial world. Artificial Life. 7(1):3-32.
Consolvo S, Harrison B, Smith I, Chen MY, Everitt K, Froehlich J, Landay JA.  2007.  Conducting In Situ Evaluations for and With Ubiquitous Computing Technologies. International Journal of Human-Computer Interaction. 22(1-2):103-118.
Rust BW, O'Leary DP.  1994.  Confidence Intervals for Discrete Approximations to Ill-Posed Problems. The Journal of Computational and Graphical Statistics. 3:67-96.

Pages