Publications

Export 480 results:
[ Author(Desc)] Title Type Year
Filters: First Letter Of Title is P  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
desJardins M.  1991.  Probabilistic evaluation of bias for learning systems. Proceedings of the Eighth International Workshop on Machine Learning. :495-499.
A
Abd-Almageed W, Kumar J, Doermann D.  2009.  Page Rule-Line Removal using Linear Subspaces in Monochromatic Handwritten Arabic Documents. Intl. Conf. on Document Analysis and Recognition (ICDAR 09). :768-772.
Ahuja SB, Reggia JA.  1986.  The parsimonious covering model for inexact abductive reasoning in diagnostic systems. Recent Developments in the Theory and Applications of Fuzzy Sets. Proceedings of NAFIPS. :86-1986.
Aiken A, Fhndrich M, Foster JS, Su Z.  1998.  Partial online cycle elimination in inclusion constraint graphs. ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI).
Alameh R, Zazworka N, Hollingsworth J.  2007.  Performance Measurement of Novice HPC Programmers Code. Proceedings of the 3rd International Workshop on Software Engineering for High Performance Computing Applications. :3–-3–.
Albanese M, Chellappa R, Cuntoor N, Moscato V, Picariello A, V.S. Subrahmanian, Udrea O.  2010.  PADS: A Probabilistic Activity Detection Framework for Video Data. Pattern Analysis and Machine Intelligence, IEEE Transactions on. 32(12):2246-2261.
Albanese M, Fayzullin M, Picariello A, V.S. Subrahmanian.  2006.  The priority curve algorithm for video summarization. Information Systems. 31(7):679-695.
Alex D, Robert R, V.S. Subrahmanian.  2001.  Probabilistic temporal databases. ACM Transaction on Database Systems. 26(1):41-95.
Alexander DS, Menage PB, Keromytis AD, Arbaugh WA, Anagnostakis KG, Smith JM.  2001.  The price of safety in an active network. Journal of Communications and Networks. 3(1):4-18.
Aloimonos Y, Rosenfeld A.  1994.  Principles of computer vision. Handbook of pattern recognition and image processing (vol. 2). :1-15.
Aloimonos Y.  1990.  Perspective approximations. Image and Vision Computing. 8(3):179-192.
Aloimonos Y.  1990.  Purposive and qualitative active vision. Proceedings of 10th International Conference on Pattern Recognition, 1990. i:346-360vol.1-346-360vol.1.
Andrade H, Kurc T, Catalyurek U, Sussman A, Saltz J.  2002.  Persistent caching in a multiple query optimization framework. Proceedings of the 6th Workshop on Languages, Compilers, and Run-Time Systems for Scalable Computers.
Anil Kumar VS, Marathe MV, Parthasarathy S, Srinivasan A, Zust S.  2006.  Provable algorithms for parallel generalized sweep scheduling. Journal of Parallel and Distributed Computing. 66(6):807-821.
Apostolico A, Iliopoulos C, Landau GM, Schieber B, Vishkin U.  1988.  Parallel construction of a suffix tree with applications. Algorithmica. 3(1):347-365.
Arkin E, Goodrich M, Mitchell J, Mount D, Piatko C, Skiena S.  1993.  Point probe decision trees for geometric concept classes. Algorithms and Data Structures. :95-106.
Arya S, da Fonseca GD, Mount D.  2012.  Polytope approximation and the Mahler volume. Proceedings of the Twenty-Third Annual ACM-SIAM Symposium on Discrete Algorithms. :29-42.
Atalay FB, Mount D, Mitchell J.  2007.  Pointerless implementation of hierarchical simplicial meshes and efficient neighbor finding in arbitrary dimensions. International Journal of Computational Geometry and Applications. 17(6):595-631.
Ateniese G, Kamara S, Katz J.  2009.  Proofs of storage from homomorphic identification protocols. Advances in Cryptology–ASIACRYPT 2009. :319-333.
Au T-C, Kuter U, Nau DS.  2009.  Planning for Interactions among Autonomous Agents. Programming Multi-Agent Systems. 5442:1-23.
Azarian T, Ali A, Johnson JA, Mohr D, Prosperi M, Veras NM, Jubair M, Strickland SL, Rashid MH, Alam MT et al..  2014.  Phylodynamic Analysis of Clinical and Environmental Vibrio cholerae Isolates from Haiti Reveals Diversification Driven by Positive Selection. mBio. (6)

Pages

Modify or remove your filters and try again.