Publications

Export 1669 results:
Author Title [ Type(Asc)] Year
Filters: First Letter Of Last Name is B  [Clear All Filters]
Journal Articles
Baker K, Bethard S, Bloodgood M, Brown R, Callison-Burch C, Coppersmith G, Dorr BJ, Filardo W, Giles K, Irvine A et al..  2009.  Semantically informed machine translation (SIMT). SCALE summer workshop final report, Human Language Technology Center Of Excellence.
Baker K, Bethard S, Bloodgood M, Brown R, Callison-Burch C, Coppersmith G, Dorr BJ, Filardo W, Giles K, Irvine A et al..  2009.  Semantically informed machine translation (SIMT). SCALE summer workshop final report, Human Language Technology Center Of Excellence.
Basili VR, Zelkowitz MV, McGarry F, Page J, Waligora S, Pajerski R.  1995.  SEL's software process improvement program. Software, IEEE. 12(6):83-87.
Brodskỳ T, Fermüller C.  2004.  Self-Calibration from Image Derivatives. International Journal of Computer Vision. 48(2):91-114.
Chatterjee S, Bhattacharyya SS.  2010.  Selective excitation of LI2 by chirped laser pulses with all possible interstate radiative couplings. The Journal of Chemical Physics. 133(16):164313-164313-9.
Berry C, Hannenhalli S, Leipzig J, Bushman FD.  2006.  Selection of Target Sites for Mobile DNA Integration in the Human Genome. PLoS Comput BiolPLoS Comput Biol. 2(11):e157-e157.
Berry C, Hannenhalli S, Leipzig J, Bushman FD.  2006.  Selection of Target Sites for Mobile DNA Integration in the Human Genome. PLoS Comput BiolPLoS Comput Biol. 2(11):e157-e157.
Chalfoun J, Kociolek M, Dima A, Halter M, Cardone A, Peskin A, Bajcsy P, Brady M.  2013.  Segmenting time-lapse phase contrast images of adjacent NIH 3T3 cells.. Journal of microscopy. 249(1):41-52.
Chalfoun J, Kociolek M, Dima A, Halter M, Cardone A, Peskin A, Bajcsy P, Brady M.  2013.  Segmenting time-lapse phase contrast images of adjacent NIH 3T3 cells.. Journal of microscopy. 249(1):41-52.
Boyen X, Dodis Y, Katz J, Ostrovsky R, Smith A.  2005.  Secure remote authentication using biometric data. Advances in Cryptology–EUROCRYPT 2005. :147-163.
Bhattacharjee B, Rodrigues R, Kouznetsov P.  2007.  Secure lookup without (constrained) flooding. WRAITS 2007.
Baden R, Bender A, Levin D, Sherwood R, Spring N, Bhattacharjee B.  2007.  A Secure DHT via the Pigeonhole Principle. Technical Reports of the Computer Science Department, CS-TR-4884.
Baden R, Bender A, Levin D, Sherwood R, Spring N, Bhattacharjee B.  2007.  A Secure DHT via the Pigeonhole Principle. Technical Reports of the Computer Science Department, CS-TR-4884.
Baden R, Bender A, Levin D, Sherwood R, Spring N, Bhattacharjee B.  2007.  A Secure DHT via the Pigeonhole Principle. Technical Reports of the Computer Science Department, CS-TR-4884.
Bonatti PA, Kraus S, V.S. Subrahmanian.  2003.  Secure agents. Annals of Mathematics and Artificial Intelligence. 37(1):169-235.
Alam M, Hasan NA, Sadique A, Bhuiyan NA, Ahmed KU, Nusrin S, Nair BG, Siddique AK, Sack BR, Sack DA et al..  2006.  Seasonal Cholera Caused by Vibrio Cholerae Serogroups O1 and O139 in the Coastal Aquatic Environment of Bangladesh. Applied and Environmental MicrobiologyAppl. Environ. Microbiol.. 72(6):4096-4104.
Belhumeur P, Chen D, Feiner S, Jacobs DW, Kress W, Ling H, Lopez I, Ramamoorthi R, Sheorey S, White S.  2008.  Searching the world’s herbaria: A system for visual identification of plant species. Computer Vision–ECCV 2008. :116-129.
Wu W, Niles EG, El-Sayed NM, Berriman M, LoVerde PT.  2006.  Schistosoma mansoni (Platyhelminthes, Trematoda) nuclear receptors: Sixteen new members and a novel subfamily. Gene. 366(2):303-315.
Haas BJ, Berriman M, Hirai H, Cerqueira GG, LoVerde PT, El-Sayed NM.  2007.  Schistosoma mansoni genome: Closing in on a final gene set. Experimental Parasitology. 117(3):225-228.
Bhattacharyya SS, Lee EA.  1993.  Scheduling synchronous dataflow graphs for efficient looping. The Journal of VLSI Signal Processing. 6(3):271-288.
Banerjee S, Bhattacharjee B.  2002.  Scalable secure group communication over IP multicast. Selected Areas in Communications, IEEE Journal on. 20(8):1511-1527.
Banerjee S, Bhattacharjee B.  2002.  Scalable secure group communication over IP multicast. Selected Areas in Communications, IEEE Journal on. 20(8):1511-1527.
Li JH, Bhattacharjee B, Yu M, Levy R.  2008.  A scalable key management and clustering scheme for wireless ad hoc and sensor networks. Future Generation Computer Systems. 24(8):860-869.
Bader DA, JaJa JF, Chellappa R.  1995.  Scalable data parallel algorithms for texture synthesis using Gibbs random fields. Image Processing, IEEE Transactions on. 4(10):1456-1460.
Banerjee S, Bhattacharjee B, Kommareddy C.  2002.  Scalable application layer multicast. SIGCOMM Comput. Commun. Rev.. 32(4):205-217.

Pages