Publications

Export 1254 results:
Author [ Title(Desc)] Type Year
Filters: First Letter Of Last Name is G  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
C
Elman H, Golub GH, Starke G.  1994.  On the convergence of line iterative methods for cyclically reduced non-symmetrizable linear systems. Numerische Mathematik. 67(2):177-190.
Senoh M, Ghosh‐Banerjee J, Ramamurthy T, Colwell RR, Miyoshi S-ichi, Nair BG, Takeda Y.  2012.  Conversion of viable but nonculturable enteric bacteria to culturable by co‐culture with eukaryotic cells. Microbiology and Immunology. 56(5):342-345.
Senoh M, Ghosh‐Banerjee J, Ramamurthy T, Hamabata T, Kurakawa T, Takeda M, Colwell RR, Nair BG, Takeda Y.  2010.  Conversion of viable but nonculturable Vibrio cholerae to the culturable state by co‐culture with eukaryotic cells. Microbiology and Immunology. 54(9):502-507.
Gupta A, Mittal A, Davis LS.  2007.  COST: An Approach for Camera Selection and Multi-Object Inference Ordering in Dynamic Scenes. Computer Vision, 2007. ICCV 2007. IEEE 11th International Conference on. :1-8.
Goodrich MT, Papamanthou C, Tamassia R.  2007.  On the Cost of Persistence and Authentication in Skip Lists. Experimental Algorithms. :94-107.
Sen P, Getoor L.  2006.  Cost-sensitive learning with conditional Markov networks. Proceedings of the 23rd international conference on Machine learning. :801-808.
Gupta A, Srinivasan A, Tardos É.  2008.  Cost-Sharing Mechanisms for Network Design. Algorithmica. 50(1):98-119.
Lee W, Dagon D, Giffin J, Feamster N, Ollman G, Westby J, Wesson R, Vixie P.  2011.  Countering Botnets: Anomaly-Based Detection, Comprehensive Analysis, and Efficient Mitigation.
Gupta A, Srinivasan A.  2003.  On the Covering Steiner Problem. FST TCS 2003: Foundations of Software Technology and Theoretical Computer ScienceFST TCS 2003: Foundations of Software Technology and Theoretical Computer Science. 2914:244-251.
Gopalakrishnan V, Bhattacharjee B, Ramakrishnan KK, Jana R, Srivastava D.  2009.  CPM: Adaptive Video-on-Demand with Cooperative Peer Assists and Multicast. INFOCOM 2009, IEEE. :91-99.
Shneiderman B, Fischer G, Czerwinski M, Resnick M, Myers B, Candy L, Edmonds E, Eisenberg M, Giaccardi E, Hewett T et al..  2006.  Creativity Support Tools: Report From a U.S. National Science Foundation Sponsored Workshop. International Journal of Human-Computer Interaction. 20(2):61-77.
Gehl J, Shneiderman B.  2000.  Credit for computer crashes? Ubiquity. 1(31):2-9.
Mayfield J, Alexander D, Dorr BJ, Eisner J, Elsayed T, Finin T, Fink C, Freedman M, Garera N, McNamee P et al..  2009.  Cross-document coreference resolution: A key technology for learning by reading. AAAI Spring Symposium on Learning by Reading and Learning to Read.
Oard D, Demner-Fushman D, Hajič J, Ramabhadran B, Gustman S, Byrne W, Soergel D, Dorr BJ, Resnik P, Picheny M.  2006.  Cross-Language Access to Recorded Speech in the MALACH Project. Text, Speech and DialogueText, Speech and Dialogue. 2448:197-212.
Ponnusamy D, Kozlova EV, Sha J, Erova TE, Azar SR, Fitts EC, Kirtley ML, Tiner BL, Andersson JA, Grim CJ et al..  2016.  Cross-talk among flesh-eating Aeromonas hydrophila strains in mixed infection leading to necrotizing fasciitis. Proceedings of the National Academy of Sciences. 11312161268(3321029):722-727.
Gupta SK, Das D, Regli WC, Nau DS.  1995.  Current Trends and Future Challenges in Automated Manufacturability Analysis. ISR; TR 1995-16
Yao Z, Gupta SK.  2004.  Cutter path generation for 2.5D milling by combining multiple different cutter path patterns. International Journal of Production Research. 42(11):2141-2161.
Jim T, Morrisett G, Grossman D, Hicks MW, Cheney J, Wang Y.  2002.  Cyclone: A safe dialect of C. USENIX Annual Technical Conference. :275-288.
Grossman D, Hicks MW, Jim T, Morrisett G.  2005.  Cyclone: A type-safe dialect of C. C/C++ Users Journal. 23(1):112-139.
Grossman D, Morrisett G, Jim T, Hicks MW, Wang Y, Cheney J.  2001.  Cyclone User's Manual, Version 0.1. 3. Computer Science Technical Reports.
D
Gou H, M. Wu.  2004.  Data hiding in curves for collusion-resistant digital fingerprinting. Image Processing, 2004. ICIP '04. 2004 International Conference on. 1:51-54Vol.1-51-54Vol.1.
Gou H, M. Wu.  2005.  Data hiding in curves with application to fingerprinting maps. Signal Processing, IEEE Transactions on. 53(10):3988-4005.
Balazinska M, Deshpande A, Franklin MJ, Gibbons PB, Gray J, Hansen M, Liebhold M, Nath S, Szalay A, Tao V.  2007.  Data Management in the Worldwide Sensor Web. IEEE Pervasive Computing. 6(2):30-40.
Balazinska M, Deshpande A, Franklin MJ, Gibbons PB, Gray J, Hansen M, Liebhold M, Nath S, Szalay A, Tao V.  2007.  Data Management in the Worldwide Sensor Web. IEEE Pervasive Computing. 6(2):30-40.
Golubchik L, Khuller S, Kim YA, Shargorodskaya S, Wan YC.  2004.  Data migration on parallel disks. Algorithms–ESA 2004. :689-701.

Pages