Publications

Export 1734 results:
Author Title Type [ Year(Desc)]
Filters: First Letter Of Last Name is M  [Clear All Filters]
2012
Hunter S, Jones P, Mitchell A, Apweiler R, Attwood TK, Bateman A, Bernard T, Binns D, Bork P, Burge S et al..  2012.  InterPro in 2011: new developments in the family and domain prediction database.. Nucleic Acids Res. 40(Database issue):D306-12.
Hunter S, Jones P, Mitchell A, Apweiler R, Attwood TK, Bateman A, Bernard T, Binns D, Bork P, Burge S et al..  2012.  InterPro in 2011: new developments in the family and domain prediction database.. Nucleic Acids Res. 40(Database issue):D306-12.
Earl C, Sergey I, Might M, Van Horn D.  2012.  Introspective Pushdown Analysis of Higher-Order Programs. arXiv:1207.1813 [cs].
Alam M, Islam TM, Rashed S M, Johura F-T, Bhuiyan NA, Delgado G, Morales R, Mendez J L, Navarro A, Watanabe H et al..  2012.  Vibrio Cholerae Classical Biotype Strains Reveal Distinct Signatures in Mexico. Journal of Clinical Microbiology.
Alam M, Islam TM, Rashed S M, Johura F-T, Bhuiyan NA, Delgado G, Morales R, Mendez J L, Navarro A, Watanabe H et al..  2012.  Vibrio Cholerae Classical Biotype Strains Reveal Distinct Signatures in Mexico. Journal of Clinical Microbiology.
Han B, Hui P, Kumar VSA, Marathe MV, Shao J, Srinivasan A.  2012.  Mobile Data Offloading through Opportunistic Communications and Social Participation. Mobile Computing, IEEE Transactions on. 11(5):821-834.
Baker K, Bloodgood M, Dorr BJ, Callison-Burch C, Filardo NW, Piatko C, Levin L, Miller S.  2012.  Modality and Negation in SIMT Use of Modality and Negation in Semantically-Informed Syntactic MT. Computational Linguistics. :1-48.
Mozumder PK, Banu MA, Naser MN, Ali MS, Alam M, Sack RB, Colwell RR, Huq A.  2012.  Occurrence of protozoans & their limnological relationships in some ponds of Mathbaria, Bangladesh. University Journal of Zoology, Rajshahi University. 29(1):69-71.
Barrett C, Beckman R, Bisset K, Chen J, DuBois T, Eubank S, Kumar AVS, Lewis B, Marathe MV, Srinivasan A et al..  2012.  Optimizing epidemic protection for socially essential workers. Proceedings of the 2nd ACM SIGHIT International Health Informatics Symposium. :31-40.
Li I, Medynskiy Y, Froehlich J, Larsen J.  2012.  Personal informatics in practice: improving quality of life through data. :2799-2802.
Arya S, da Fonseca GD, Mount D.  2012.  Polytope approximation and the Mahler volume. Proceedings of the Twenty-Third Annual ACM-SIAM Symposium on Discrete Algorithms. :29-42.
Mittal P, Papamanthou C, Song D.  2012.  Preserving Link Privacy in Social Network Based Systems. arXiv:1208.6189 [cs].
Minker J.  2012.  Scientific Freedom and Human Rights. :564.
Choi S, Hwang KW, Katz J, Malkin T, Rubenstein D.  2012.  Secure multi-party computation of boolean circuits with applications to privacy in on-line marketplaces. Topics in Cryptology–CT-RSA 2012. :416-432.
Martineau J, Mokashi R, Chapman D, Grasso M, Brady M, Yesha Y, Yesha Y, Cardone A, Dima A.  2012.  Sub-cellular feature detection and automated extraction of collocalized actin and myosin regions. the 2nd ACM SIGHIT symposiumProceedings of the 2nd ACM SIGHIT symposium on International health informatics - IHI '12. :399.
Martineau J, Mokashi R, Chapman D, Grasso M, Brady M, Yesha Y, Yesha Y, Cardone A, Dima A.  2012.  Sub-cellular feature detection and automated extraction of collocalized actin and myosin regions. the 2nd ACM SIGHIT symposiumProceedings of the 2nd ACM SIGHIT symposium on International health informatics - IHI '12. :399.
Martineau J, Mokashi R, Chapman D, Grasso M, Brady M, Yesha Y, Yesha Y, Cardone A, Dima A.  2012.  Sub-cellular feature detection and automated extraction of collocalized actin and myosin regions. the 2nd ACM SIGHIT symposiumProceedings of the 2nd ACM SIGHIT symposium on International health informatics - IHI '12. :399.
Banakar V, Constantin de Magny G, Jacobs J, Murtugudde R, Huq A, J. Wood R, Colwell RR.  2012.  Temporal and Spatial Variability in the Distribution of Vibrio vulnificus in the Chesapeake Bay: A Hindcast Study. EcoHealth. :1-12.
Motiwala M, Dhamdhere A, Feamster N, Lakhina A.  2012.  Towards a cost model for network traffic. SIGCOMM Comput. Commun. Rev.. 42(1):54-60.
Katz J, MacKenzie P, Taban G, Gligor V.  2012.  Two-server password-only authenticated key exchange. Journal of Computer and System Sciences. 78(2):651-669.
Ricaldi JN, Fouts DE, Selengut JD, Harkins DM, Patra KP, Moreno A, Lehmann JS, Purushe J, Sanka R, Torres M et al..  2012.  Whole genome analysis of Leptospira licerasiae provides insight into leptospiral evolution and pathogenicity.. PLoS Negl Trop Dis. 6(10):e1853.
Ricaldi JN, Fouts DE, Selengut JD, Harkins DM, Patra KP, Moreno A, Lehmann JS, Purushe J, Sanka R, Torres M et al..  2012.  Whole genome analysis of Leptospira licerasiae provides insight into leptospiral evolution and pathogenicity.. PLoS Negl Trop Dis. 6(10):e1853.
2013
Dachman-Soled D, Malkin T, Raykova M, Venkitasubramaniam M.  2013.  Adaptive and Concurrent Secure Computation from New Adaptive, Non-malleable Commitments. Advances in Cryptology - ASIACRYPT 2013. :316-336.
Preston ND, Daszak P, Colwell RR.  2013.  Current Topics in Microbiology and Immunology One Health: The Human-Animal-Environment Interfaces in Emerging Infectious Diseases The Human Environment Interface: Applying Ecosystem Concepts to Health. 365:83-100.
Chomvarin C., Johura F.-T., Mannan S.B, Jumroenjit W., Kanoktippornchai B., Tangkanakul W., Tantisuwichwong N., Huttayananont S., Watanabe H., Hasan N.A et al..  2013.  Drug response and genetic properties of Vibrio cholerae associated with endemic cholera in north-eastern Thailand, 2003-2011. Journal of Medical Microbiology. :599-609.

Pages