Publications
Export 1425 results:
Author Title [ Type] Year Filters: First Letter Of Last Name is H [Clear All Filters]
1998. Enhancing Automatic Acquisition of Thematic Structure in a Large-Scale Lexicon for Mandarin Chinese. Machine Translation and the Information SoupMachine Translation and the Information Soup. 1529:41-50.
2008. Effective Visualization of File System Access-Control. Visualization for Computer Security. :18-25.
2002. DUSTer: A Method for Unraveling Cross-Language Divergences for Statistical Word-Level Alignment. Machine Translation: From Research to Real UsersMachine Translation: From Research to Real Users. 2499:31-43.
2002. DUSTer: A Method for Unraveling Cross-Language Divergences for Statistical Word-Level Alignment. Machine Translation: From Research to Real UsersMachine Translation: From Research to Real Users. 2499:31-43.
2006. Detection, Isolation, and Identification of Vibrio cholerae from the Environment. Current Protocols in MicrobiologyCurrent Protocols in Microbiology. :6A.5.1-6A.5.38-6A.5.1-6A.5.38.
2008. Delegating Capabilities in Predicate Encryption Systems. Automata, Languages and Programming. 5126:560-578.
1998. De-amortization of Algorithms. Computing and CombinatoricsComputing and Combinatorics. 1449:4-14.
2006. Cross-Language Access to Recorded Speech in the MALACH Project. Text, Speech and DialogueText, Speech and Dialogue. 2448:197-212.
2006. Conservation Patterns in cis-Elements Reveal Compensatory Mutations. Comparative GenomicsComparative Genomics. 4205:186-199.
2003. Automating DAML-S Web Services Composition Using SHOP2. The Semantic Web - ISWC 2003. 2870:195-210.
2002. An Augmented Visual Query Mechanism for Finding Patterns in Time Series Data. Flexible Query Answering SystemsFlexible Query Answering Systems. 2522:240-250.
2006. Applications of Parameterized st-Orientations in Graph Drawing Algorithms. Graph Drawing. :355-367.
2004. Adaptively-Secure, Non-Interactive Public-Key Encryption. Model reduction methods for vector autoregressive processes. :150-150.
2000. Active Networking Means Evolution (or Enhanced Extensibility Required). Active NetworksActive Networks. 1942:16-32.
2005. Active Constrained Clustering by Examining Spectral Eigenvectors. Discovery ScienceDiscovery Science. 3735:294-307.
2002. 1.375-Approximation Algorithm for Sorting by Reversals. Algorithms — ESA 2002Algorithms — ESA 2002. 2461:401-408.