Publications

Export 1669 results:
Author [ Title(Desc)] Type Year
Filters: First Letter Of Last Name is B  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
C
Bhattacharyya SS, Murthy PK.  2004.  The CBP Parameter: A Module Characterization Approach for DSP Software Optimization. The Journal of VLSI Signal Processing. 38(2):131-146.
Dyer C, Weese J, Setiawan H, Lopez A, Ture F, Eidelman V, Ganitkevitch J, Blunsom P, Resnik P.  2010.  cdec: A decoder, alignment, and learning framework for finite-state and context-free translation models. Proceedings of the ACL 2010 System Demonstrations. :7-12.
El-Sayed NM, Alarcon CM, Beck JC, Sheffield VC, Donelson JE.  1995.  cDNA expressed sequence tags of Trypanosoma brucei rhodesiense provide new insights into the biology of the parasite. Molecular and Biochemical Parasitology. 73(1-2):75-90.
Hajiaghayi MT, Mirrokni SV, Saberi A, Bahl P, Jain K, Qiu L.  2007.  Cell breathing in wireless LANs: Algorithms and evaluation. IEEE Transactions on Mobile Computing. 6(2):164-178.
Asgari S, Basili VR, Carver J, Hochstein L, Hollingsworth J, Zelkowitz MV.  2004.  Challenges in Measuring HPCS Learner Productivity in an Age of Ubiquitous Computing: The HPCS Program. In Proceedings of ICSE Workshop on High Productivity Computing. May 2004.
Han B, Ji L, Lee S, Miller RR, Bhattacharjee B.  2009.  Channel Access Throttling for Improving WLAN QoS. Sensor, Mesh and Ad Hoc Communications and Networks, 2009. SECON '09. 6th Annual IEEE Communications Society Conference on. :1-9.
Han B, Ji L, Lee S, Miller RR, Bhattacharjee B.  2009.  Channel Access Throttling for Overlapping BSS Management. Communications, 2009. ICC '09. IEEE International Conference on. :1-6.
Ananthanarayanan A, Gupta SK, Bruck HA.  2009.  Characterization and control of pin diameter during in-mold assembly of mesoscale revolute joints. North American Manufacturing Research Institute. 37
Chen AJ, Hasan NA, Haley BJ, Taviani E, Tarnowski M, Brohawn K, Johnson CN, Colwell RR, Huq A.  2017.  Characterization of Pathogenic Vibrio parahaemolyticus from the Chesapeake Bay, Maryland. Frontiers in Microbiology.
Blake-Hall J, Walker O, Fushman D.  2004.  Characterization of the Overall Rotational Diffusion of a Protein From 15N Relaxation Measurements and Hydrodynamic Calculations. Protein NMR Techniques. 278:139-159.
Salles-Loustau G, Berthier R, Collange E, Sobesto B, Cukier M.  2011.  Characterizing Attackers and Attacks: An Empirical Study. :174-183.
Bin Tariq M, Mansy A, Feamster N, Ammar M.  2009.  Characterizing VLAN-induced sharing in a campus network. Proceedings of the 9th ACM SIGCOMM conference on Internet measurement conference. :116-121.
Kianzad V, Bhattacharyya SS.  2004.  CHARMED: A multi-objective co-synthesis framework for multi-mode embedded systems. Application-Specific Systems, Architectures and Processors, 2004. Proceedings. 15th IEEE International Conference on. :28-40.
Khan A, Bartram L, Blevis E, DiSalvo C, Froehlich J, Kurtenbach G.  2011.  CHI 2011 sustainability community invited panel: challenges ahead. 2011 annual conference extended abstracts on Human factors in computing systems. :73-76.
Khan A, Bartram L, Blevis E, DiSalvo C, Froehlich J, Kurtenbach G.  2011.  CHI 2011 sustainability community invited panel: challenges ahead. 2011 annual conference extended abstracts on Human factors in computing systems. :73-76.
Druin A, Weeks A, Massey S, Bederson BB.  2007.  Children's interests and concerns when using the international children's digital library: a four-country case study. Proceedings of the 7th ACM/IEEE-CS joint conference on Digital libraries. :167-176.
Burnett S, Feamster N, Vempala S.  2010.  Chipping away at censorship firewalls with user-generated content. Proc. 19th USENIX Security Symposium, Washington, DC.
Keleher PJ, Spring N, Bhattacharjee B.  2007.  Chit-based access control.
Sanhueza D, Chevillon C, Colwell RR, Babonneau J, Marion E, Marsollier L, gan çoisé.  2016.  Chitin promotes Mycobacterium ulcerans growth. FEMS Microbiology Ecology. 928565871(6):fiw067.
Boneh D, Canetti R, Halevi S, Katz J.  2007.  Chosen-ciphertext security from identity-based encryption. SIAM Journal on Computing. 36(5):1301-1328.
Burnett S, Feamster N, Vempala S.  2010.  Circumventing censorship with collage. Proceedings of the ACM SIGCOMM 2010 conference. :471-472.
Shneiderman B, Byrd D, Croft WB.  1997.  Clarifying search: A user-interface framework for text searches. D-lib magazine. 3(1):18-20.
Brown Q, Bonsignore E, Hatley L, Druin A, Walsh G, Foss E, Brewer R, Hammer J, Golub E.  2010.  Clear Panels: a technique to design mobile application interactivity. Proceedings of the 8th ACM Conference on Designing Interactive Systems. :360-363.
Brown Q, Bonsignore E, Hatley L, Druin A, Walsh G, Foss E, Brewer R, Hammer J, Golub E.  2010.  Clear Panels: a technique to design mobile application interactivity. Proceedings of the 8th ACM Conference on Designing Interactive Systems. :360-363.
Brown Q, Bonsignore E, Hatley L, Druin A, Walsh G, Foss E, Brewer R, Hammer J, Golub E.  2010.  Clear Panels: a technique to design mobile application interactivity. Proceedings of the 8th ACM Conference on Designing Interactive Systems. :360-363.

Pages