Publications
Export 1734 results:
Author [ Title] Type Year Filters: First Letter Of Last Name is M [Clear All Filters]
2006. A Bayesian model for supervised clustering with the Dirichlet process prior. Journal of Machine Learning Research. 6(2):1551-1551.
2006. Bayesian query-focused summarization. Proceedings of the 21st International Conference on Computational Linguistics and the 44th annual meeting of the Association for Computational Linguistics. :305-312.
2005. Bayesian summarization at DUC and a suggestion for extrinsic evaluation. Document understanding conference.
2012. BclAF1 restriction factor is neutralized by proteasomal degradation and microRNA repression during human cytomegalovirus infection. Proceedings of the National Academy of Sciences. 109(24):9575-9580.
2011. Believe Me—We Can Do This! Annotating Persuasive Acts in Blog Text. Workshops at the Twenty-Fifth AAAI Conference on Artificial Intelligence.
2017. Beyond cost-effectiveness: Using systems analysis for infectious disease preparedness. Vaccine. 35:A46-A49.
2007. Beyond single-appearance schedules: Efficient DSP software synthesis using nested procedure calls. ACM Transactions on Embedded Computing Systems (TECS). 6(2):14–es-14–es.
2004. Bias in Shape Estimation. Computer Vision - ECCV 2004Computer Vision - ECCV 2004. 3023:405-416.
2002. Bias in visual motion processes: A theory predicting illusions. Statistical Methods in Video Processing.(in conjunction with European Conference on Computer Vision).
2005. The Bible and multilingual optical character recognition. Communications of the ACM. 48(6):124-130.
1999. Binary space parititions in plücker space. Algorithm Engineering and Experimentation. :663-663.
2010. BioNav: An Ontology-Based Framework to Discover Semantic Links in the Cloud of Linked Data. The Semantic Web: Research and Applications. :441-445.
2011. Birdlets: Subordinate categorization using volumetric primitives and pose-normalized appearance. Computer Vision (ICCV), 2011 IEEE International Conference on. :161-168.
2008. Black-Box Construction of a Non-malleable Encryption Scheme from Any Semantically Secure One. Theory of Cryptography. :427-444.
2006. Bootstrapping free-space optical networks. Selected Areas in Communications, IEEE Journal on. 24(12):13-22.
2006. A bootstrapping model for directional wireless networks. Communications Letters, IEEE. 10(12):840-842.
2004. BorderGuard: detecting cold potatoes from peers. Proceedings of the 4th ACM SIGCOMM conference on Internet measurement. :213-218.
1995. Bottom-up computation of perfect models for disjunctive theories. The Journal of logic programming. 25(1):33-51.
2000. Breakout Session Report: Principles and Methods. Perceptual Organization for Artificial Vision Systems. :17-28.