Publications

Export 1435 results:
Author Title [ Type(Asc)] Year
Filters: First Letter Of Last Name is K  [Clear All Filters]
Journal Articles
Chen B, Kaufman A, Mueller K, Varshney A.  2002.  State of the art in data representation for visualization. IEEE Visualization Tutorial.
Molden RC, Goya J, Khan Z, Garcia BA.  2014.  Stable isotope labeling of phosphoproteins for large-scale phosphorylation rate determination. Molecular & Cellular Proteomics.
Carlson CJ, Getz WM, Kausrud KL, Cizauskas CA, Blackburn JK, Carrillo FABustos, Colwell RR, W. Easterday R, Ganz HH, Kamath PL et al..  2018.  Spores and soil from six sides: interdisciplinarity and the environmental biology of anthrax (Bacillus anthracis). Biological Reviews. (4):1813-1831.
Carlson CJ, Getz WM, Kausrud KL, Cizauskas CA, Blackburn JK, Carrillo FABustos, Colwell RR, W. Easterday R, Ganz HH, Kamath PL et al..  2018.  Spores and soil from six sides: interdisciplinarity and the environmental biology of anthrax (Bacillus anthracis). Biological Reviews. (4):1813-1831.
Carlson CJ, Getz WM, Kausrud KL, Cizauskas CA, Blackburn JK, Carrillo FABustos, Colwell RR, W. Easterday R, Ganz HH, Kamath PL et al..  2018.  Spores and soil from six sides: interdisciplinarity and the environmental biology of anthrax (Bacillus anthracis). Biological Reviews. (4):1813-1831.
Carlson CJ, Getz WM, Kausrud KL, Cizauskas CA, Blackburn JK, Carrillo FABustos, Colwell RR, W. Easterday R, Ganz HH, Kamath PL et al..  2018.  Spores and soil from six sides: interdisciplinarity and the environmental biology of anthrax (Bacillus anthracis). Biological Reviews. (4):1813-1831.
Karl LR, Pettey M, Shneiderman B.  1993.  Speech versus mouse commands for word processing: an empirical evaluation. International Journal of Man-Machine Studies. 39(4):667-687.
Kakkar P, Hicks MW, Moore J, Gunter CA.  1999.  Specifying the PLAN Network Programming Langauge. Electronic Notes in Theoretical Computer Science. 26:87-104.
Chellappa R, Heinzelman W, Konrad J, Schonfeld D, Wolf M.  2010.  Special Section on Distributed Camera Networks: Sensing, Processing, Communication, and Implementation. Image Processing, IEEE Transactions on. 19(10):2513-2515.
Khanna S, Srinivasan A.  2004.  Special issue: 35th Annual ACM Symposium on Theory of Computing. Journal of Computer and System Sciences. 69(3):305-305.
Roark B, Harper M, Charniak E, Dorr BJ, Johnson M, Kahn J, Liu Y, Ostendorf M, Hale J, Krasnyanskaya A et al..  2006.  SParseval: Evaluation metrics for parsing speech. Proc. LREC.
Roark B, Harper M, Charniak E, Dorr BJ, Johnson M, Kahn J, Liu Y, Ostendorf M, Hale J, Krasnyanskaya A et al..  2006.  SParseval: Evaluation metrics for parsing speech. Proc. LREC.
McDonnell JM, Fushman D, Milliman CL, Korsmeyer SJ, Cowburn D.  1999.  Solution Structure of the Proapoptotic Molecule BID: A Structural Basis for Apoptotic Agonists and Antagonists. Cell. 96(5):625-634.
Katz J, Vaikuntanathan V.  2009.  Smooth projective hashing and password-based authenticated key exchange from lattices. Advances in Cryptology–ASIACRYPT 2009. :636-652.
Cummings MP, King LM, Kellogg EA.  1994.  Slipped-strand mispairing in a plastid gene: ıt rpoC2 in grasses (Poaceae). Mol Biol Evol. 11(1):1-8.
Cummings MP, King LM, Kellogg EA.  1994.  Slipped-strand mispairing in a plastid gene: ıt rpoC2 in grasses (Poaceae). Mol Biol Evol. 11(1):1-8.
Tai G-C, Korman CE, Mayergoyz ID.  1994.  Simulation of the transient characteristics of partially- and fully-depleted SOI MOSFETs. Solid-State Electronics. 37(7):1387-1394.
Tai G-C, Korman CE, Mayergoyz ID.  1996.  Simulation of the logic switching characteristics of hot-carrier-degraded ultra-thin SOI CMOS inverters. Solid-State Electronics. 39(11):1669-1674.
Katz J, Lindell Y.  2005.  Simulation and Secure Computation-Handling Expected Polynomial-Time Strategies in Simulation-Based Security Proofs. Lecture Notes in Computer Science. 3378:128-149.
Kurc T, Catalyurek U, Zhang X, Saltz J, Martino R, Wheeler M, Peszyńska M, Sussman A, Hansen C, Sen M et al..  2005.  A simulation and data analysis system for large-scale, data-driven oil reservoir simulation studies. Concurrency and Computation: Practice and Experience. 17(11):1441-1467.
Khuller S, Matias Y.  1995.  A simple randomized sieve algorithm for the closest-pair problem. Information and Computation. 118(1):34-37.
Boneh D, Freeman D, Katz J, Waters B.  2009.  Signing a linear subspace: Signature schemes for network coding. Public Key Cryptography–PKC 2009. :68-87.
Katz J, Vaikuntanathan V.  2009.  Signature schemes with bounded leakage resilience. Advances in Cryptology–ASIACRYPT 2009. :703-720.
Nau DS, Au TC, Ilghami O, Kuter U, Murdock JW, Wu D, Yaman F.  2003.  SHOP2: An HTN planning system. J. Artif. Intell. Res. (JAIR). 20:379-404.
Kotidis1⋆ Y, Sismanis Y, Roussopoulos N.  2001.  Shared index scans for data warehouses. Data Warehousing and Knowledge Discovery. :307-316.

Pages