Publications

Export 1734 results:
Author [ Title(Desc)] Type Year
Filters: First Letter Of Last Name is M  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
T
Hannenhalli S, Putt ME, Gilmore JM, Wang J, Parmacek MS, Epstein JA, Morrisey EE, Margulies KB, Cappola TP.  2006.  Transcriptional Genomics Associates FOX Transcription Factors With Human Heart Failure. Circulation. 114(12):1269-1276.
Doermann D, Ma H, Karagol-Ayan B, Oard D.  2001.  Translation lexicon acquisition from bilingual dictionaries. Proceedings of SPIE. 4670:37-37.
Maffucci A, Mayergoyz ID.  2001.  Transmission Lines and Lumped Circuits. Academic Press Series in Electromagnetism.
Maffucci A, Mayergoyz ID.  2001.  Transmission Lines and Lumped Circuits. Academic Press Series in Electromagnetism.
Hicks MW, Jagannathan S, Kelsey R, Moore JT, Ungureanu C.  1999.  Transparent communication for distributed objects in Java. Proceedings of the ACM 1999 conference on Java Grande. :160-170.
Madnani N, Jimmy Lin, Dorr BJ.  2007.  TREC 2007 ciQA Task: University of Maryland. Proceedings of TREC.
Daumé H, Marcu D.  2004.  A tree-position kernel for document compression. Proceedings of the Fourth Document Understanding Conference (DUC 2004). :6-7.
Bhatia S, Motiwala M, Muhlbauer W, Mundada Y, Valancius V, Bavier A, Feamster N, Peterson L, Rexford J.  2008.  Trellis: a platform for building flexible, fast virtual networks on commodity hardware. Proceedings of the 2008 ACM CoNEXT Conference. :72:1–72:6-72:1–72:6.
Bhatia S, Motiwala M, Muhlbauer W, Mundada Y, Valancius V, Bavier A, Feamster N, Peterson L, Rexford J.  2008.  Trellis: a platform for building flexible, fast virtual networks on commodity hardware. Proceedings of the 2008 ACM CoNEXT Conference. :72:1–72:6-72:1–72:6.
Bhatia S, Motiwala M, Muhlbauer W, Mundada Y, Valancius V, Bavier A, Feamster N, Peterson L, Rexford J.  2008.  Trellis: a platform for building flexible, fast virtual networks on commodity hardware. Proceedings of the 2008 ACM CoNEXT Conference. :72:1–72:6-72:1–72:6.
Browne HK, Arbaugh WA, McHugh J, Fithen WL.  2001.  A trend analysis of exploitations. 2001 IEEE Symposium on Security and Privacy, 2001. S&P 2001. Proceedings. :214-229.
Tilghman S, Astin HS, Brinkley W, Chilton MD, Cummings MP, Ehrenberg RG, Fox MF, Glenn K, Green PJ, Hans S et al..  1998.  Trends in the Early Careers of Life Scientists.
Tilghman S, Astin HS, Brinkley W, Chilton MD, Cummings MP, Ehrenberg RG, Fox MF, Glenn K, Green PJ, Hans S et al..  1998.  Trends in the early careers of life scientists - Preface and executive summary. Mol Biol Cell. 9(11):3007-3015.
Khuller S, Mitchell JSB.  1990.  On a triangle counting problem. Information Processing Letters. 33(6):319-321.
Lumezanu C, Baden R, Spring N, Bhattacharjee B.  2009.  Triangle Inequality and Routing Policy Violations in the Internet. Passive and Active Network MeasurementPassive and Active Network Measurement. 5448:45-54.
Hicks B, King D, McDaniel P, Hicks MW.  2006.  Trusted declassification:: high-level policy for a security-typed language. Proceedings of the 2006 workshop on Programming languages and analysis for security. :65-74.
Morselli R, Bhattacharjee B, Katz J, Keleher P.  2004.  Trust-preserving set operations. INFOCOM 2004. Twenty-third AnnualJoint Conference of the IEEE Computer and Communications Societies. 4:2231-2241vol.4-2231-2241vol.4.
Acharya A, Uysal M, Bennett R, Mendelson A, Beynon M, Hollingsworth J, Saltz J, Sussman A.  1996.  Tuning the performance of I/O-intensive parallel applications. Proceedings of the fourth workshop on I/O in parallel and distributed systems: part of the federated computing research conference. :15-27.
Martin, M.P, Smits A, Wu M, Ringuette M.  2006.  The turbulence structure of shockwave and boundary layer interaction in a compression corner. 44th AIAA Aerospace Meeting and Exhibit. 2006
Shneiderman B, Rao R, Andrews K, Ahlberg C, Brodbeck D, Jewitt T, Mackinlay J.  2005.  Turning information visualization innovations into commercial products: lessons to guide the next success. IEEE Symposium on Information Visualization, 2005. INFOVIS 2005. :241-244.
Zhang X-N, Mount SM.  2009.  Two Alternatively Spliced Isoforms of the Arabidopsis SR45 Protein Have Distinct Roles during Normal Plant Development. Plant PhysiologyPlant Physiol.. 150(3):1450-1458.
Katz J, MacKenzie P, Taban G, Gligor V.  2005.  Two-server password-only authenticated key exchange. Applied Cryptography and Network Security. :175-206.
Katz J, MacKenzie P, Taban G, Gligor V.  2012.  Two-server password-only authenticated key exchange. Journal of Computer and System Sciences. 78(2):651-669.
Miller M, Perlis D.  1991.  Typicality constants and range defaults: Some pros and cons of a cognitive model of default reasoning. Methodologies for Intelligent Systems. :560-569.
U
Mount SM, Pettersson I, Hinterberger M, Karmas A, Steitz JA.  1983.  The U1 small nuclear RNA-protein complex selectively binds a 5′ splice site in vitro. Cell. 33(2):509-518.

Pages