Publications

Export 620 results:
Author [ Title(Asc)] Type Year
Filters: First Letter Of Last Name is T  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
P
Kraus S, V.S. Subrahmanian, Tas NC.  2003.  Probabilistically survivable mass. INTERNATIONAL JOINT CONFERENCE ON ARTIFICIAL INTELLIGENCE. 18:789-795.
Getoor L, Friedman N, Koller D, Pfeffer A, Taskar B.  2007.  Probabilistic Relational Models. Introduction to Statistical Relational LearningIntroduction to Statistical Relational Learning. :129-129.
Udrea O, Yu D, Hung E, Subrahmanian V.  2005.  Probabilistic Ontologies and Relational Databases. On the Move to Meaningful Internet Systems 2005: CoopIS, DOA, and ODBASEOn the Move to Meaningful Internet Systems 2005: CoopIS, DOA, and ODBASE. 3760:1-17.
Getoor L, Segal E, Taskar B, Koller D.  2001.  Probabilistic models of text and link structure for hypertext classification. IJCAI workshop on text learning: beyond supervision. :24-29.
Getoor L, Friedman N, Taskar B.  2001.  Probabilistic models of relational structure. In Proc. ICML.
Tsoumakos D, Roussopoulos N.  2003.  Probabilistic knowledge discovery and management for P2P networks. P2P Journal. :15-20.
Zheleva E, Terzi E, Getoor L.  2012.  Privacy in Social Networks. Synthesis Lectures on Data Mining and Knowledge Discovery. 3(1):1-85.
Haley BJ, Grim CJ, Hasan NA, Taviani E, Chun J, Brettin TS, Bruce DC, Challacombe JF, Detter CJ, Han CS et al..  2010.  The pre‐seventh pandemic Vibrio cholerae BX 330286 El Tor genome: evidence for the environment as a genome reservoir. Environmental Microbiology Reports. 2(1):208-216.
Taylor EM, Martin, M.P, Smits AJ.  2005.  Preliminary Study of the Turbulence Structure in Supersonic Boundary Layers using DNS Data. 35th AIAA Fluid Dynamics Conference.
Purang K, Purushothaman D, Traum D, Andersen C, Perlis D.  1999.  Practical reasoning and plan execution with active logic. Proceedings of the IJCAI-99 Workshop on Practical Reasoning and Rationality. :30-38.
Huang Y, Feamster N, Teixeira R.  2008.  Practical issues with using network tomography for fault diagnosis. SIGCOMM Comput. Commun. Rev.. 38(5):53-58.
Mundada Y, Ramachandran A, Tariq MB, Feamster N.  2011.  Practical Data-Leak Prevention for Legacy Applications in Enterprise Networks. GT-CS-11-01
Yue Z, Zhao W, Chellappa R.  2005.  Pose-Encoded Spherical Harmonics for Robust Face Recognition Using a Single Image. Analysis and Modelling of Faces and GesturesAnalysis and Modelling of Faces and Gestures. 3723:229-243.
Liu M-Y, Tuzel O, Veeraraghavan A, Chellappa R, Agrawal A, Okuda H.  2010.  Pose estimation in heavy clutter using a multi-flash camera. Robotics and Automation (ICRA), 2010 IEEE International Conference on. :2028-2035.
Schurr SP, O'Leary DP, Tits A'L.  2009.  A Polynomial-Time Interior-Point Method for Conic Optimization, with Inexact Barrier Evaluations. SIAM Journal on Optimization. 20:548-571.
Yaman F, Adali S, Nau DS, Sapino M, Subrahmanian V.  2004.  Plan Databases: Model and Algebra. Foundations of Information and Knowledge Systems. 2942:302-319.
Tom Yeh, Grauman K, Tollmar K, Darrell T.  2005.  A picture is worth a thousand keywords: image-based object search on a mobile platform. CHI '05 extended abstracts on Human factors in computing systems. :2025-2028.
García-Varela M, Pérez-Ponce de León G, de la Torre P, Cummings MP, Sarma SS, Laclette JP.  2000.  Phylogenetic relationships of Acanthocephala based on analysis of 18S ribosomal RNA gene sequences. J Mol Evol. 50(6):532-540.
Azarian T, Ali A, Johnson JA, Mohr D, Prosperi M, Veras NM, Jubair M, Strickland SL, Rashid MH, Alam MT et al..  2014.  Phylodynamic Analysis of Clinical and Environmental Vibrio cholerae Isolates from Haiti Reveals Diversification Driven by Positive Selection. mBio. (6)
Darrell TJ, Tom Yeh, Tollmar K.  2011.  Photo-based mobile deixis system and related techniques. 10/762,941(7872669)
Darrell TJ, Tom Yeh, Tollmar K.  2011.  Photo-based mobile deixis system and related techniques. 10/762,941(7872669)
Caceres A, Shang F, Wawrousek E, Liu Q, Avidan O, Cvekl A, Yang Y, Haririnia A, Storaska A, Fushman D et al..  2010.  Perturbing the Ubiquitin Pathway Reveals How Mitosis Is Hijacked to Denucleate and Regulate Cell Proliferation and Differentiation In Vivo. PLoS ONEPLoS ONE. 5(10):e13331-e13331.
Pruzzo C, Tarsi R, Del Mar Lleò M, Signoretto C, Zampini M, Pane L, Colwell RR, Canepari P.  2003.  Persistence of adhesive properties in Vibrio cholerae after long‐term exposure to sea water. Environmental Microbiology. 5(10):850-858.
Shneiderman B, Thomas G.  1980.  Path expressions for complex queries and automatic database program conversion. Proceedings of the sixth international conference on Very Large Data Bases - Volume 6. :33-44.

Pages