Publications

Search
Export 508 results:
[ Author(Asc)] Title Type Year
Filters: First Letter Of Last Name is B  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
B
Byrne W, Doermann D, Franz M, Gustman S, Hajic J, Oard D, Picheny M, Psutka J, Ramabhadran B.  2004.  Automatic recognition of spontaneous speech for access to multilingual oral history archives. IEEE Transactions on Speech and Audio Processing, Special Issue on Spontaneous Speech Processing. 12(4):420-435.
Byrka J, Ghodsi M, Srinivasan A.  2010.  LP-rounding algorithms for facility-location problems. arXiv:1007.3611.
Byrka J, Srinivasan A, Swamy C.  2010.  Fault-Tolerant Facility Location: A Randomized Dependent LP-Rounding Algorithm. Integer Programming and Combinatorial OptimizationInteger Programming and Combinatorial Optimization. 6080:244-257.
Buzek O, Resnik P, Bederson BB.  2010.  Error driven paraphrase annotation using Mechanical Turk. Proceedings of the NAACL HLT 2010 Workshop on Creating Speech and Language Data with Amazon's Mechanical Turk. :217-221.
Butler K, Payne T, Shneiderman B, Brennan P, Zhang J.  2011.  Re-engineering health care with information technology: the role of computer-human interaction. PART 2 ———– Proceedings of the 2011 annual conference extended abstracts on Human factors in computing systems. :451-454.
Butler S, Hajiaghayi MT, Kleinberg RD, Leighton T.  2009.  Hat guessing games. SIAM review. 51(2):399-413.
Bushman F, Lewinski M, Ciuffi A, Barr S, Leipzig J, Hannenhalli S, Hoffmann C.  2005.  Genome-wide analysis of retroviral DNA integration. Nat Rev MicroNat Rev Micro. 3(11):848-858.
Burnett S, Feamster N, Vempala S.  2010.  Chipping away at censorship firewalls with user-generated content. Proc. 19th USENIX Security Symposium, Washington, DC.
Burnett S, Feamster N, Vempala S.  2010.  Circumventing censorship with collage. Proceedings of the ACM SIGCOMM 2010 conference. :471-472.
Burke ER, Gomez RD, Madabhushi R, Mayergoyz ID.  1994.  Calculation of head sensitivity function from 3-D magnetic fields. Magnetics, IEEE Transactions on. 30(6):4278-4280.
Buono P, Aris A, Plaisant C, Khella A, Shneiderman B.  2005.  Interactive Pattern Search in Time Series (2004). Institute for Systems Research Technical Reports.
Buono P, Aris A, Plaisant C, Khella A, Shneiderman B.  2005.  Interactive pattern search in time series. Proceedings of SPIE. 5669(1):175-186.
Buono P, Plaisant C, Simeone A, Aris A, Shneiderman B, Shmueli G, Jank W.  2007.  Similarity-Based Forecasting with Simultaneous Previews: A River Plot Interface for Time Series Forecasting. Information Visualization, 2007. IV '07. 11th International Conference. :191-196.
Buonanno E, Katz J, Yung M.  2002.  Incremental unforgeable encryption. Fast Software Encryption. :317-325.
Bultan T, Gerber R, Pugh W.  1997.  Symbolic model checking of infinite state systems using Presburger arithmetic. Computer Aided Verification. :400-411.
Bultan T, Gerber R, Pugh W.  1999.  Model-checking concurrent systems with unbounded integer variables: symbolic representations, approximations, and experimental results. ACM Transactions on Programming Languages and SystemsACM Trans. Program. Lang. Syst.. 21(4):747-789.
Bullock SS, Brennen GK, O’Leary DP.  2005.  Time reversal and n-qubit canonical decompositions. Journal of Mathematical Physics. 46(6):062104-062104-19-062104-062104-19.
Bullock SS, O'Leary DP.  2009.  Locality bounds on hamiltonians for stabilizer codes. Quantum Info. Comput.. 9(5):487-499.
Bullock SS, O’Leary DP, Brennen GK.  2005.  Asymptotically Optimal Quantum Circuits for d-Level Systems. Physical Review LettersPhys. Rev. Lett.. 94(23):230502-230502.
Bulka B, Gaston M, desJardins M.  2007.  Local strategy learning in networked multi-agent team formation. Autonomous Agents and Multi-Agent Systems. 15(1):29-45.
Budowle B, Connell ND, Bielecka-Oder A, Colwell RR, Corbett CR, Fletcher J, Forsman M, Kadavy DR, Markotic A, Morse SA et al..  2014.  Validation of high throughput sequencing and microbial forensics applications. Investigative Genetics. 5(1):9.
Buck J, Shneiderman B.  1976.  An internship in information systems: Combining computer science education with realistic problems. SIGCSE Bull.. 8(3):80-83.
Buck B, Hollingsworth J.  2000.  An API for Runtime Code Patching. International Journal of High Performance Computing Applications. 14(4):317-329.
Buck BR, Hollingsworth J.  2006.  A New Hardware Monitor Design to Measure Data Structure-Specific Cache Eviction Information. International Journal of High Performance Computing Applications. 20(3):353-363.
Buck BR, Hollingsworth J.  2000.  Using hardware performance monitors to isolate memory bottlenecks. Proceedings of the 2000 ACM/IEEE conference on Supercomputing (CDROM). :40-40.

Pages