Publications

Export 149 results:
[ Author(Desc)] Title Type Year
Filters: First Letter Of Last Name is T  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
T
Tabatabaee V, Kashyap A, Bhattacharjee B, La RJ, Shayman MA.  2007.  Robust Routing with Unknown Traffic Matrices. INFOCOM 2007. 26th IEEE International Conference on Computer Communications. IEEE. :2436-2440.
Tabatabaee V, Tiwari A, Hollingsworth J.  2005.  Parallel Parameter Tuning for Applications with Performance Variability. Proceedings of the 2005 ACM/IEEE conference on Supercomputing. :57–-57–.
Tabatabaee V, Hollingsworth J.  2007.  Automatic software interference detection in parallel applications. Proceedings of the 2007 ACM/IEEE conference on Supercomputing. :14:1–14:12-14:1–14:12.
Tabatabaee V, Bhattacharjee B, La RJ, Shayman MA.  2005.  Differentiated traffic engineering for QoS provisioning. INFOCOM 2005. 24th Annual Joint Conference of the IEEE Computer and Communications Societies. Proceedings IEEE. 4:2349-2359vol.4-2349-2359vol.4.
Tagamets MA, Horwitz B, Reggia JA.  1995.  A large-scale neural model linking local neuronal dynamics to positron emission tomography (PET) regional cerebral blood ffow (rCBF) data. Soc Neurosci Abstr. 21:1988-1988.
Tagamets MA, Reggia JA.  1989.  A data flow implementation of a competition-based connectionist model* 1. Journal of Parallel and Distributed Computing. 6(3):704-714.
Taheri S, Turaga P, Chellappa R.  2011.  Towards view-invariant expression analysis using analytic shape manifolds. 2011 IEEE International Conference on Automatic Face & Gesture Recognition and Workshops (FG 2011). :306-313.
Tahmoush D, Samet H.  2007.  A new database for medical images and information. Proceedings of SPIE-Medical Imaging.
Tahmoush D, Samet H.  2010.  A Web Database for Computer-Aided Detection and Diagnosis of Medical Images. Digital Mammography. :265-272.
Tahmoush D, Samet H.  2006.  Archimedes, an archive of medical images. American Medical Informatics Association 2006 Annual Symposium Proceedings Biomedical and Health Informatics: From Foundations to Applications to Policy, Washington, DC, DW Bates, JH Holmes, and G. Kuperman, editors.
Tahmoush D, Samet H.  2007.  An improved asymmetry measure to detect breast cancer. Proceedings of SPIE. 6514(1):65141Q-65141Q-9-65141Q-65141Q-9.
Tahmoush D, Samet H.  2006.  Image Similarity and Asymmetry to Improve Computer-Aided Detection of Breast Cancer. Digital Mammography. :221-228.
Tahmoush D, Samet H.  2007.  A web collaboration system for content-based image retrieval of medical images. Proceedings of SPIE–Medical Imaging. 6516
Tahmoush D, Samet H.  2008.  High-Dimensional Similarity Retrieval Using Dimensional Choice. Similarity Search and Applications, 2008. SISAP 2008. First International Workshop on. :35-42.
Tahmoush D, Samet H.  2006.  Using image similarity and asymmetry to detect breast cancer. Proc. of SPIE Vol. 6144:61441S–1-61441S–1.
Tai G-C, Korman CE, Mayergoyz ID.  1994.  A parallel-in-time method for the transient simulation of SOI devices with drain current overshoots. Computer-Aided Design of Integrated Circuits and Systems, IEEE Transactions on. 13(8):1035-1044.
Tai G-C, Korman CE, Mayergoyz ID.  1994.  Simulation of the transient characteristics of partially- and fully-depleted SOI MOSFETs. Solid-State Electronics. 37(7):1387-1394.
Tai G-C, Korman CE, Mayergoyz ID.  1996.  Simulation of the logic switching characteristics of hot-carrier-degraded ultra-thin SOI CMOS inverters. Solid-State Electronics. 39(11):1669-1674.
Takala SL, Coulibaly D, Thera MA, Batchelor AH, Cummings MP, Escalante AA, Ouattara A, Traoré K, Niangaly A, Djimdé AA et al..  2009.  Extreme polymorphism in a vaccine antigen and risk of clinical malaria: implications for vaccine development. Sci Transl Med. 1(2):2ra5-2ra5.
Talledo M, Rivera ING, Lipp EK, Neale A, Karaolis D, Huq A, Colwell RR.  2003.  Characterization of a Vibrio cholerae phage isolated from the coastal water of Peru. Environmental Microbiology. 5(5):350-354.
Tamassia R, Palazzi B, Papamanthou C.  2009.  Graph Drawing for Security Visualization. Graph Drawing. :2-13.
Tamizi M, Weinstein M, Cukier M.  2005.  Automated checking for Windows host vulnerabilities. :10pp.-148-10pp.-148.
Tammara TAC, Bederson BB.  1999.  Does zooming improve image browsing. Proceedings of the fourth ACM conference on Digital libraries. :130-137.
Tan L, Cleaveland R.  2002.  Evidence-based model checking. Computer Aided Verification. :641-680.
Tan L, Cleaveland R.  2001.  Simulation revisited. Tools and Algorithms for the Construction and Analysis of Systems. :480-495.

Pages