Export 479 results:
[ Author(Desc)] Title Type Year
Filters: First Letter Of Last Name is D  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
Dietterich TG, Domingos P, Getoor L, Muggleton S, Tadepalli P.  2008.  Structured machine learning: the next ten years. Machine Learning. 73(1):3-23.
Dikshit P, Guimaraes K, Ramamurthy M, Agrawala AK, Larsen RL.  1989.  Dynamic bin packing problem. SIAM Journal on Computing. 12(14):227-258.
Dillencourt MB, Mount D, Saalfeld AJ.  1993.  On The Maximum Number of Intersections of Two Polyhedra in 2 and 3 Dimensions. Proceedings of the Fifth Canadian Conference on Computational Geometry, Waterloo, Ontario. :49-54.
Dillencourt MB, Mount D, Netanyahu NS.  1992.  A randomized algorithm for slope selection. International Journal of Computational Geometry and Applications. 2(1):1-27.
Dingermann T, Sharp S, Appel B, DeFranco D, Mount SM, Heiermann R, Pongs O, Söll D.  1981.  Transcription of cloned tRNA and 5S RNA genes in a Drosophila cell free extract. Nucleic Acids ResearchNucl. Acids Res.. 9(16):3907-3918.
Dix J, Kraus S, V.S. Subrahmanian.  2001.  Temporal agent programs. Artificial Intelligence. 127(1):87-135.
Dix J, Muñoz-Avila H, Nau DS, Zhang L.  2002.  Planning in a multi-agent environment: theory and practice. :944-945.
Dix J, Kraus S, V.S. Subrahmanian.  2002.  Agents dealing with time and uncertainty. Proceedings of the first international joint conference on Autonomous agents and multiagent systems: part 2. :912-919.
Dix J, Muñoz-Avila H, Nau DS, Zhang L.  2003.  IMPACTing SHOP: Putting an AI Planner Into a Multi-Agent Environment. Annals of Mathematics and Artificial Intelligence. 37(4):381-407.
Dix J, Kuter U, Nau DS.  2002.  HTN Planning in Answer Set Programming. UMIACS-TR-2002-18
Dix J, Munoz-Avila H, Nau DS, Zhang L.  2002.  Theoretical and Empirical Aspects of a Planner in a Multi-agent Environment. Logics in Artificial Intelligence. 2424:173-185.
Dix A, Jones W, Czerwinski M, Teevan J, Plaisant C, Moran TP.  2005.  The Challenge of Personal Information Management. INTERACT'05: Communicating Naturally through Computers (Adjunct Proceedings).
Dix J, Kuter U, Nau DS.  2003.  Planning in Answer Set Programming Using Ordered Task Decomposition. KI 2003: Advances in Artificial Intelligence. 2821:490-504.
Djikeng A, Raverdy S, Foster JS, Bartholomeu D, Zhang Y, El-Sayed NM, Carlow C.  2007.  Cofactor-independent phosphoglycerate mutase is an essential gene in procyclic form Trypanosoma brucei. Parasitology research. 100(4):887-892.
Doan K, Plaisant C, Shneiderman B.  1995.  QUERY PREVIEWS IN NETWORKED INFORMATION SYSTEMS. Institute for Systems Research Technical Reports.
Doan K, Plaisant C, Shneiderman B, Bruns T.  1997.  Query previews for networked information systems: a case study with NASA environmental data. SIGMOD Record. 26(1):75-81.
Dodis Y, Katz J.  2005.  Chosen-ciphertext security of multiple encryption. Theory of Cryptography. :188-209.
Dodis Y, Katz J, Xu S, Yung M.  2002.  Strong key-insulated signature schemes. Public Key Cryptography—PKC 2003. :130-144.
Dodis Y, Franklin M, Katz J, Miyaji A, Yung M.  2003.  Intrusion-resilient public-key encryption. Topics in Cryptology—CT-RSA 2003. :19-32.
Dodis Y, Katz J, Xu S, Yung M.  2002.  Key-insulated public key cryptosystems. Advances in Cryptology—Eurocrypt 2002. :65-82.
Dodis Y, Franklin M, Katz J, Miyaji A, Yung M.  2004.  A generic construction for intrusion-resilient public-key encryption. Topics in Cryptology–CT-RSA 2004. :1997-1997.
Dodis Y, Katz J, Reyzin L, Smith A.  2006.  Robust fuzzy extractors and authenticated key agreement from close secrets. Advances in Cryptology-CRYPTO 2006. :232-250.
Dodis Y, Katz J, Smith A, Walfish S.  2009.  Composability and on-line deniability of authentication. Theory of Cryptography. :146-162.
Doermann D, Rosenfeld A.  1992.  Temporal clues in handwriting. Pattern Recognition, 1992. Vol.II. Conference B: Pattern Recognition Methodology and Systems, Proceedings., 11th IAPR International Conference on. :317-320.
Doermann D, Rivlin E, Weiss I.  1996.  Applying algebraic and differential invariants for logo recognition. Machine Vision and Applications. 9(2):73-86.