Publications

Export 1425 results:
Author [ Title(Asc)] Type Year
Filters: First Letter Of Last Name is H  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
C
Jimmy Lin, Murray GC, Dorr BJ, Hajič J, Pecina P.  2009.  A cost-effective lexical acquisition process for large-scale thesaurus translation. Language resources and evaluation. 43(1):27-40.
Aloimonos Y, Hervé JY.  1988.  Correspondenceless detection of depth and motion for a planar surface.
Singh LN, Hannenhalli S.  2010.  Correlated Changes Between Regulatory Cis Elements and Condition-Specific Expression in Paralogous Gene Families. Nucleic Acids ResearchNucl. Acids Res.. 38(3):738-749.
Hochheiser H, Shneiderman B.  2005.  Coordinating Overviews and Detail Views of WWW Log Data (2000). Institute for Systems Research Technical Reports.
Hochheiser H, Shneiderman B.  2000.  Coordinating overviews and detail views of WWW log data. Workshop on New Paradigms in Information Visualization and Manipulation (NPIVM 2000), ACM Press.
Senoh M, Ghosh‐Banerjee J, Ramamurthy T, Hamabata T, Kurakawa T, Takeda M, Colwell RR, Nair BG, Takeda Y.  2010.  Conversion of viable but nonculturable Vibrio cholerae to the culturable state by co‐culture with eukaryotic cells. Microbiology and Immunology. 54(9):502-507.
He T, Hong L, Varshney A, Wang SW.  1996.  Controlled topology simplification. Visualization and Computer Graphics, IEEE Transactions on. 2(2):171-184.
He T, Hong L, Varshney A, Wang SW.  1996.  Controlled topology simplification. Visualization and Computer Graphics, IEEE Transactions on. 2(2):171-184.
Neamtiu I, Hicks MW, Foster JS, Pratikakis P.  2008.  Contextual effects for version-consistent dynamic software updating and safe concurrent programming. Proceedings of the 35th annual ACM SIGPLAN-SIGACT symposium on Principles of programming languages. :37-49.
Pratikakis P, Foster JS, Hicks MW.  2006.  Context-sensitive correlation analysis for detecting races. Proceedings of the ACM Conference on Programming Language Design and Implementation (PLDI). :320-331.
Ntoulas A, Hwang H, Getoor L, Paparizos S, Lauw H W.  2010.  Context-Aware Query Recommendations. 12/408,726
Evans P, Donahue G, Hannenhalli S.  2006.  Conservation Patterns in cis-Elements Reveal Compensatory Mutations. Comparative GenomicsComparative Genomics. 4205:186-199.
Corretjer I, Hsu C, Bhattacharyya SS.  2006.  Configuration and representation of large-scale dataflow graphs using the dataflow interchange format. Proceedings of the IEEE Workshop on Signal Processing Systems, Banff, Canada. :10-15.
Swaminathan A, Mao Y, Su G-M, Gou H, Varna AL, He S, M. Wu, Oard D.  2007.  Confidentiality-preserving rank-ordered search. Proceedings of the 2007 ACM workshop on Storage security and survivability. :7-12.
Consolvo S, Harrison B, Smith I, Chen MY, Everitt K, Froehlich J, Landay JA.  2007.  Conducting In Situ Evaluations for and With Ubiquitous Computing Technologies. International Journal of Human-Computer Interaction. 22(1-2):103-118.
Hazay C, Katz J, Koo CY, Lindell Y.  2007.  Concurrently-secure blind signatures without random oracles or setup assumptions. Theory of Cryptography. :323-341.
Refaey MA, Elsayed KM, Hanafy SM, Davis LS.  2009.  Concurrent transition and shot detection in football videos using Fuzzy Logic. Image Processing (ICIP), 2009 16th IEEE International Conference on. :4341-4344.
Castro-Nallar E, Hasan NA, Cebula TA, Colwell RR, Robison RA, W. Johnson E, Crandall KA.  2015.  Concordance and discordance of sequence survey methods for molecular epidemiology. PeerJ. (8105394):e761.
Mohammad S, Dorr BJ, Hirst G.  2008.  Computing word-pair antonymy. Proceedings of the Conference on Empirical Methods in Natural Language Processing. :982-991.
De Floriani L, Panozzo D, Hui A.  2009.  Computing and visualizing a graph-based decomposition for non-manifold shapes. Graph-Based Representations in Pattern Recognition. :62-71.
Horprasert T, Yacoob Y, Davis LS.  1996.  Computing 3-D head orientation from a monocular image sequence. Automatic Face and Gesture Recognition, 1996., Proceedings of the Second International Conference on. :242-247.
Reggia JA, Tabb DR, Price TR, Banko M, Hebel R.  1984.  Computer-aided assessment of transient ischemic attacks. A clinical evaluation.. Archives of neurology. 41(12):1248-1248.
Sen M, Corretjer I, Haim F, Saha S, Bhattacharyya SS, Schlessman J, Wolf W.  2005.  Computer vision on FPGAs: Design methodology and its application to gesture recognition. Computer Vision and Pattern Recognition-Workshops, 2005. CVPR Workshops. IEEE Computer Society Conference on. :133-133.
Cardone A, Brady M, Sriram R., Pant H.C, Hassan S.A.  2016.  Computational study of the inhibitory mechanism of the kinase CDK5 hyperactivity by peptide p5 and derivation of a pharmacophore. Journal of Computer-Aided Molecular Design. 30(6):513-521.
Ruppin E, Horn D, Levy N, Reggia JA.  1996.  Computational studies of synaptic alterations in Alzheimer’s disease. Neural modeling of brain and cognitive disorders. :63-87.

Pages