Publications

Export 7151 results:
Author Title Type [ Year(Asc)]
2012
Svec P, Gupta SK.  2012.  Automated synthesis of action selection policies for unmanned vehicles operating in adverse environments. Autonomous Robots. 32(2):149-164.
Roy A, Halder B, Garain U, Doermann D.  2012.  Automatic Authentication of Banknotes. IEEE Transactions on Information Forensics & Security.
Lee SHee, Kalejta RF, Kerry J, Semmes OJohn, O’Connor CM, Khan Z, Garcia BA, Shenk T, Murphy E.  2012.  BclAF1 restriction factor is neutralized by proteasomal degradation and microRNA repression during human cytomegalovirus infection. Proceedings of the National Academy of Sciences. 109(24):9575-9580.
Ayres DL, Darling A, Zwickl DJ, Beerli P, Holder MT, Lewis PO, Huelsenbeck JP, Ronquist F, Swofford DL, Cummings MP et al..  2012.  BEAGLE: An Application Programming Interface and High-Performance Computing Library for Statistical Phylogenetics. Systematic BiologySyst Biol. 61(1):170-173.
Bilge L, Dumitras T.  2012.  Before We Knew It: An Empirical Study of Zero-day Attacks in the Real World. CCS '12 Proceedings of the 2012 ACM conference on Computer and Communications Security. :833-844.
Satinoff B, Boyd-Graber J.  2012.  Besting the Quiz Master: Crowdsourcing Incremental Classification Games. Empirical Methods in Natural Language Processing.
Lumezanu C, Feamster N, Klein H.  2012.  #bias: Measuring the Tweeting Behavior of Propagandists. Sixth International AAAI Conference on Weblogs and Social Media.
Cardone A, Amelot J, Li-Baboud Y-S, Brady M, Bajcsy P.  2012.  Biases from model assumptions in texture sub-cellular image segmentation. SPIE Newsroom. 13
Gevers D, Pop M, Schloss PD, Huttenhower C.  2012.  Bioinformatics for the Human Microbiome Project. PLoS Computational Biology. 8(11):e1002779.
Gopalan R, Taheri S, Turaga P, Chellappa R.  2012.  A Blur-robust Descriptor with Applications to Face Recognition. IEEE Transactions on Pattern Analysis and Machine Intelligence. PP(99):1-1.
Choi SGeol, Dachman-Soled D, Yung M.  2012.  On the Centrality of Off-Line E-Cash to Concrete Partial Information Games. Security and Cryptography for Networks. :264-280.
Zhuolin Jiang, Lin Z, Davis LS.  2012.  Class consistent k-means: Application to face and action recognition. Computer Vision and Image Understanding. 116(6):730-741.
Song D, Elaine Shi, Fischer I, Shankar U.  2012.  Cloud Data Protection for the Masses. Computer. 45(1):39-45.
Xie B, Tom Yeh, Walsh G, Watkins I, Huang M.  2012.  Co-designing an e-health tutorial for older adults. Proceedings of the 2012 iConference. :240-247.
Nikolova S, Boyd-Graber J, Fellbaum C.  2012.  Collecting Semantic Similarity Ratings to Connect Concepts in Assistive Communication Tools. Modeling, Learning, and Processing of Text Technological Data StructuresModeling, Learning, and Processing of Text Technological Data Structures. 370:81-93.
V.S. Subrahmanian, Mannes A, Sliva A, Shakarian J, Dickerson JP.  2012.  Computational Analysis of Terrorist Groups: Lashkar-e-Taiba.
Dachman-Soled D, Gennaro R, Krawczyk H, Malkin T.  2012.  Computational Extractors and Pseudorandomness. Theory of Cryptography. :383-403.
Wei Z, JaJa JF.  2012.  Constructing Inverted Files: To MapReduce or Not Revisited. UMIACS-TR-2012-03
Senoh M, Ghosh‐Banerjee J, Ramamurthy T, Colwell RR, Miyoshi S-ichi, Nair BG, Takeda Y.  2012.  Conversion of viable but nonculturable enteric bacteria to culturable by co‐culture with eukaryotic cells. Microbiology and Immunology. 56(5):342-345.
Liu B, Faller LL, Klitgord N, Mazumdar V, Ghodsi M, Sommer DD, Gibbons TR, Treangen TJ, Chang YC, Li S.  2012.  Deep Sequencing of the Oral Microbiome Reveals Signatures of Periodontal Disease. PloS one. 7(6)
Han B, Davis LS.  2012.  Density-Based Multifeature Background Subtraction with Support Vector Machine. Pattern Analysis and Machine Intelligence, IEEE Transactions on. 34(5):1017-1023.
Froehlich J, Findlater L, Ostergren M, Ramanathan S, Peterson J, Wragg I, Larson E, Fu F, Bai M, Patel S.  2012.  The design and evaluation of prototype eco-feedback displays for fixture-level water usage data. :2367-2376.
Shen C-C, Wu S, Sane N, Wu H-H, Plishker W, Bhattacharyya SS.  2012.  Design and Synthesis for Multimedia Systems Using the Targeted Dataflow Interchange Format. IEEE Transactions on Multimedia. 14(3):630-640.
Huq A, Haley BJ, Taviani E, Chen A, Hasan NA, Colwell RR.  2012.  Detection, Isolation, and Identification of Vibrio cholerae from the Environment. Current Protocols in Microbiology. 26(1)
Fushman D.  2012.  Determining Protein Dynamics from 15N Relaxation Data by Using DYNAMICS. Protein NMR Techniques. 831:485-511.

Pages