Publications

Export 1734 results:
Author [ Title(Desc)] Type Year
Filters: First Letter Of Last Name is M  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
W
Zotenko E, Mestre J, O'Leary DP, Przytycka TM.  2008.  Why Do Hubs in the Yeast Protein Interaction Network Tend To Be Essential: Reexamining the Connection between the Network Topology and Essentiality. PLoS Comput BiolPLoS Comput Biol. 4(8):e1000140-e1000140.
Arbaugh WA, Fithen WL, McHugh J.  2000.  Windows of Vulnerability: A Case Study Analysis. Computer. 33(12):52-59.
Shin M, Ma J, Mishra A, Arbaugh WA.  2006.  Wireless Network Security and Interworking. Proceedings of the IEEE. 94(2):455-466.
Shin M, Ma J, Mishra A, Arbaugh WA.  2006.  Wireless Network Security and Interworking. Proceedings of the IEEE. 94(2):455-466.
Ma H, Doermann D.  2004.  Word Level Script Identification on Scanned Document Images. SPIEConference on Document Recognition and Retrieval. :124-135.
Blackburn SM, Diwan A, Hauswirth M, Memon AM, Sweeney PF.  2010.  Workshop on experimental evaluation of software and systems in computer science (Evaluate 2010). Proceedings of the ACM international conference companion on Object oriented programming systems languages and applications companion. :291-292.
Minker J.  1999.  The Workshop on Logic-Based Artificial Intelligence. AI Magazine. 20(4):97-97.
Plaisant C, Marchimini G, Bruns T, Komlodi A, Campbell L, Rose A, Ding GM, Beale Jr J, Nolet V, Shneiderman B et al..  2003.  The World's Information in Digital Libraries. The craft of information visualization: readings and reflectionsThe craft of information visualization: readings and reflections. :149-149.
Y
Mishra A, Shin M, Arbaugh WA.  2002.  Your 802.11 network has no clothes. IEEE Communications Magazine. 9:44-51.

Pages