Publications

Search
Export 7150 results:
Author Title Type [ Year(Asc)]
2013
Li I, Froehlich J, Larsen JE, Grevet C, Ramirez E.  2013.  Personal informatics in the wild: hacking habits for health & happiness. CHI '13 Extended Abstracts on Human Factors in Computing Systems. :3179-3182.
Shi E, Stefanov E, Papamanthou C.  2013.  Practical Dynamic Proofs of Retrievability. CCS '13 Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security . :325-336.
Khan Z, Ford MJ, Cusanovich DA, Mitrano A, Pritchard JK, Gilad Y.  2013.  Primate Transcript and Protein Expression Levels Evolve Under Compensatory Selection Pressures. Science. 342(6162):1100-1104.
Cantet F, Hervio-Heath D, Caro A, Le Mennec C, Monteil C, Quéméré C, Jolivet-Gougeon A, Colwell RR, Monfort P.  2013.  Quantification of Vibrio parahaemolyticus, Vibrio vulnificus and Vibrio cholerae in French Mediterranean coastal lagoons. Research in Microbiology. 164(8):867-874.
Ye P, Kumar J, Kang L, Doermann D.  2013.  Real-time No-Reference Image Quality Assessment based on Filter Learning. International Conference on Computer Vision and Pattern Recognition (CVPR).
Ye Q, Doermann D.  2013.  Scene Text Detection via Integrated Discrimination of Component Appearance and Consensus.
Chalfoun J, Kociolek M, Dima A, Halter M, Cardone A, Peskin A, Bajcsy P, Brady M.  2013.  Segmenting time-lapse phase contrast images of adjacent NIH 3T3 cells.. Journal of microscopy. 249(1):41-52.
Papamanthou C, Shi E, Tamassia R.  2013.  Signatures of Correct Computation. Theory of Cryptography. :222-242.
Mozumder PK, Nahar S, M Naser N, Alam M, Huq A, R Sack B, Colwell RR.  2013.  Species composition of limnetic zooplankton from the southern coastal areas (Mathbaria and Bakerganj) in Bangladesh. Journal of the Asiatic Society of Bangladesh, Science. 38(1)
Cardone A, Pant H, Hassan SA.  2013.  Specific and Non-Specific Protein Association in Solution: Computation of Solvent Effects and Prediction of First-Encounter Modes for Efficient Configurational Bias Monte Carlo Simulations. The Journal of Physical Chemistry B. 117(41):12360-12374.
Boyd-Graber J, Glasgow K, Zajac JS.  2013.  Spoiler Alert: Machine Learning Approaches to Detect Social Media Posts with Revelatory Information.
Papamanthou C, Shi E, Tamassia R, Yi K.  2013.  Streaming Authenticated Data Structures. Advances in Cryptology – EUROCRYPT 2013. :353-370.
Kumar J, Ye P, Doermann D.  2013.  Structural similarity for document image classification and retrieval. Pattern Recognition Letters.
Dumitras T, Narasimhan P.  2013.  A study of unpredictability in fault-tolerant middleware. Computer Networks. 57(3):682-698.
Haft DH, Selengut JD, Richter RA, Harkins D, Basu MK, Beck E.  2013.  TIGRFAMs and Genome Properties in 2013.. Nucleic Acids Res. 41(Database issue):D387-95.
Li-Baboud Y-S, Cardone A, Chalfoun J, Bajcsy P, Elliott J.  2013.  Understanding the impact of image quality on segmentation accuracy. SPIE Newsroom.
Kumar J, Doermann D.  2013.  Unsupervised Classification of Structurally Similar Document Images. International Conference on Document Analysis and Recognition.
Jutla A, Akanda AShafqat, Huq A, Faruque ASyed Golam, Colwell RR, Islam S.  2013.  A water marker monitored by satellites to predict seasonal endemic cholera. Remote Sensing Letters. 4472741982394456(8):822-831.
Bitansky N, Dachman-Soled D, Garg S, Jain A, Kalai YTauman, López-Alt A, Wichs D.  2013.  Why “Fiat-Shamir for Proofs” Lacks a Proof. Theory of Cryptography. :182-201.
2012
W Easterday R, Kausrud KL, Star B, Heier L, Haley BJ, Ageyev V, Colwell RR, Stenseth NChr.  2012.  An additional step in the transmission of Yersinia pestis? The ISME Journal. (2):231-236.
Memon AM.  2012.  Advances in Computers.
Lin HC, Goldstein S, Mendelowitz L, Zhou S, Wetzel J, Schwartz DC, Pop M.  2012.  AGORA: Assembly Guided by Optical Restriction Alignment. BMC bioinformatics. 13(1)
Haft DH, Payne SH, Selengut JD.  2012.  Archaeosortases and exosortases are widely distributed systems linking membrane transit with posttranslational modification.. J Bacteriol. 194(1):36-48.
Dumitras T, Efstathopoulos P.  2012.  Ask WINE: Are We Safer Today? Evaluating Operating System Security Through Big Data Analysis LEET'12 Proceedings of the 5th USENIX conference on Large-Scale Exploits and Emergent Threats. :11-11.
Svec P, Gupta SK.  2012.  Automated synthesis of action selection policies for unmanned vehicles operating in adverse environments. Autonomous Robots. 32(2):149-164.

Pages