Publications
Export 1202 results:
Author Title Type [ Year] Filters: First Letter Of Last Name is L [Clear All Filters]
2012. Whole genome analysis of Leptospira licerasiae provides insight into leptospiral evolution and pathogenicity.. PLoS Negl Trop Dis. 6(10):e1853.
2011. Accurate and fast estimation of taxonomic profiles from metagenomic shotgun sequences. BMC Genomics. 12(Suppl 2):S4-S4.
2011. On Achieving the" Best of Both Worlds" in Secure Multiparty Computation. SIAM Journal on Computing. 40(1):122-122.
2011. Adapting a map query interface for a gesturing touch screen interface. Proceedings of the 20th international conference companion on World wide web. :257-260.
2011. AVSS 2011 demo session: A large-scale benchmark dataset for event recognition in surveillance video. Advanced Video and Signal-Based Surveillance (AVSS), 2011 8th IEEE International Conference on. :527-528.
2011. AVSS 2011 demo session: A large-scale benchmark dataset for event recognition in surveillance video. Advanced Video and Signal-Based Surveillance (AVSS), 2011 8th IEEE International Conference on. :527-528.
2011. Bacillus Anthracis Comparative Genome Analysis in Support of the Amerithrax Investigation. Proceedings of the National Academy of SciencesPNAS. 108(12):5027-5032.
2011. Boosting the scalability of botnet detection using adaptive traffic sampling. Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security. :124-134.
2011. Boosting the scalability of botnet detection using adaptive traffic sampling. Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security. :124-134.
2011. A case study of measuring process risk for early insights into software safety. Software Engineering (ICSE), 2011 33rd International Conference on. :623-632.
2011. Comparing Social Tags to Microblogs. Privacy, security, risk and trust (passat), 2011 IEEE third international conference on and 2011 IEEE third international conference on social computing (socialcom). :1380-1383.
2011. Complete Fairness in Secure Two-Party Computation. Journal of the ACM. 58(6):24:1–24:37-24:1–24:37.
2011. A computational statistics approach for estimating the spatial range of morphogen gradients. Development. 138(22):4867-4874.
2011. Countering Botnets: Anomaly-Based Detection, Comprehensive Analysis, and Efficient Mitigation.
2011. Cross Language Entity Linking. IJCNLP: International Joint Conference on Natural Language Processing.
2011. Disaggregated End-Use Energy Sensing for the Smart Grid. IEEE Pervasive Computing. 10(1):28-39.
2011. DNACLUST: accurate and efficient clustering of phylogenetic marker genes. BMC Bioinformatics. 12(1):271-271.
2011. Domain adaptation for object recognition: An unsupervised approach. 2011 IEEE International Conference on Computer Vision (ICCV). :999-1006.
2011. EFFICIENT PARALLEL NON-NEGATIVE LEAST SQUARES ON MULTI-CORE ARCHITECTURES. SIAM Journal on Scientific Computing. 33(5):2848-2863.
2011. Empirical Studies in Information Visualization: Seven Scenarios. Visualization and Computer Graphics, IEEE Transactions on. PP(99):1-1.
2011. Entropy rate superpixel segmentation. 2011 IEEE Conference on Computer Vision and Pattern Recognition (CVPR). :2097-2104.
2011. Face Tracking and Recognition in Video. Handbook of Face RecognitionHandbook of Face Recognition. :323-351.
2011. Fast solvers for models of ICEO microfluidic flows. International Journal for Numerical Methods in Fluids. 65(4):383-404.