Publications

Export 467 results:
Author [ Title(Asc)] Type Year
Filters: First Letter Of Title is M  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
M
Basili VR, Chang S, Gannon J, Katz E, Panlilio-Yap MN, Ramsey C L, Zelkowitz MV, Bailey J, Kruesi E, Sheppard S.  1984.  Monitoring an Ada software development. ACM SIG Ada Letters. IV(1):32-39.
Maniatis P, Dietz M, Papamanthou C.  2011.  MOMMIE Knows Best: Systematic Optimizations for Verifiable Distributed Algorithms. HotOS'13 Proceedings of the 13th USENIX Conference on Hot Topics in Operating Systems . :30-30.
Rahaman M.Habibur, Islam T, Colwell RR, Alam M.  2015.  Molecular tools in understanding the evolution of Vibrio cholerae. Frontiers in Microbiology. (e0120311154e00398-13822020380817190)
Kohlsdorf T, Cummings MP, Lynch VJ, Stopper GF, Takahashi K, Wagner GP.  2008.  A molecular footprint of limb loss: sequence variation of the autopodial identity gene Hoxa-13. J Mol Evol. 67(6):581-593.
Haley BJ, Kokashvili T, Tskshvediani A, Janelidze N, Mitaishvili N, Grim CJ, Constantin_de_Magny G, Chen AJ, Taviani E, Eliashvili T et al..  2014.  Molecular diversity and predictability of Vibrio parahaemolyticus along the Georgian coastal zone of the Black Sea. Frontiers in Microbiology. 5
Baida RCP, Santos MRM, Carmo MS, Yoshida N, Ferreira D, Ferreira A T, El Sayed NM, Andersson B, da Silveira J F.  2006.  Molecular Characterization of Serine-, Alanine-, and Proline-Rich Proteins of Trypanosoma cruzi and Their Possible Role in Host Cell Infection. Infect. Immun.. 74(3):1537-1546.
Wu M, Liu B.  2001.  Modulation and multiplexing techniques for multimedia data hiding. Proc. of SPIE ITcom’01, SPIE vol. 4518
Srivastava S, Hicks MW, Foster JS, Jenkins P.  2008.  Modular Information Hiding and Type-Safe Linking for C. IEEE Transactions on Software Engineering. 34(3):357-376.
Shih Y-T, Elman H.  1999.  Modified streamline diffusion schemes for convection-diffusion problems. Computer Methods in Applied Mechanics and Engineering. 174(1-2):137-151.
Fang H, O'Leary DP.  2007.  Modified Cholesky Algorithms: A Catalog with New Approaches. Mathematical Programming.
Hilke J, Lohn J, Reggia JA, Navarro R.  1994.  A modified cellular automata model of nucleotide interactions and DNA replication.
Hilke J, Reggia JA, Navarro-Gonzalez R, Lohn J.  1995.  A modified cellular automata model of nucleotide interactions and non-enzymatic transcription of DNA. inbs. :136-136.
Roussopoulos N, Delis A.  1991.  Modern client-server DBMS architectures. ACM SIGMOD RecordSIGMOD Rec.. 20(3):52-61.
Vishkin U, Caragea GC, Lee B.  2007.  Models for advancing PRAM and other algorithms into parallel programs for a PRAM-On-Chip platform. IN HANDBOOK OF PARALLEL COMPUTING: MODELS, ALGORITHMS AND APPLICATIONS, EDITORS.
Vishkin U, Caragea GC, Lee B.  2006.  Models for Advancing PRAM and Other Algorithms into Parallel Programs for a PRAM-On-Chip Platform. Technical Reports from UMIACS, UMIACS-UMIACS-TR-2006-21.
Zhang Z, Kalluri SNV, JaJa JF, Liang S, Townshend JRG.  1998.  Models and high-performance algorithms for global BRDF retrieval. Computational Science Engineering, IEEE. 5(4):16-29.
Rust BW, O'Leary DP, Mullen KM.  2010.  Modelling Type 1a Supernova Light Curves. Exponential Data Fitting and Its ApplicationsExponential Data Fitting and Its Applications. :169-186.
Reggia JA, Berndt RS.  1986.  Modelling reading aloud and its relevance to acquired dyslexia. Computer methods and programs in biomedicine. 22(1):13-19.
Nanda H, Benabdelkedar C, Davis LS.  2003.  Modelling pedestrian shapes for outlier detection: a neural net based approach. Intelligent Vehicles Symposium, 2003. Proceedings. IEEE. :428-433.
Eubank S, Guclu H, Kumar AVS, Marathe MV, Srinivasan A, Toroczkai Z|[aacute]|n, Wang N.  2004.  Modelling disease outbreaks in realistic urban social networks. Nature. 429(6988):180-184.
Juba D, Varshney A.  2007.  Modelling and rendering large volume data with gaussian radial basis functions. UMIACS-TR-2007-22
Eaton E, desJardins M, Lane T.  2008.  Modeling Transfer Relationships Between Learning Tasks for Improved Inductive Transfer. Machine Learning and Knowledge Discovery in DatabasesMachine Learning and Knowledge Discovery in Databases. 5211:317-332.
Nguyen V-A, Boyd-Graber J, Resnik P, Cai DA, Midberry JE, Wang Y.  2013.  Modeling topic control to detect influence in conversations using nonparametric topic models. Machine Learning. :1-41.
Valancius V, Lumezanu C, Feamster N, Johari R, Vazirani VV.  2011.  Modeling Tiered Pricing in the Internet Transit Market. Arxiv preprint arXiv:1112.3740.
Rosenfeld SN, Rus I, Cukier M.  2006.  Modeling the Symptomatic Fixes Archetype in Enterprise Computer Security. 1:178-188.

Pages