Publications

Export 7151 results:
Author Title [ Type(Asc)] Year
Journal Articles
Minker J, Seipel D.  2002.  Disjunctive logic programming: A survey and assessment. Computational Logic: Logic Programming and Beyond. :171-197.
O'Leary DP.  1982.  A Discrete Newton Algorithm for Minimizing a Function of Many Variables. Mathematical Programming. 23:20-33.
JOSEPH SB, Mount D, Papadimitriou CH.  1987.  THE DISCRETE GEODESIC PROBLEM. SIAM Journal on Computing (SICOMP). 16(4)
Mesmoudi M M, De Floriani L, Port U.  2008.  Discrete Distortion in Triangulated 3‐Manifolds. Computer Graphics Forum. 27(5):1333-1340.
Mesmoudi M, De Floriani L, Magillo P.  2009.  Discrete distortion for surface meshes. Image Analysis and Processing–ICIAP 2009. :652-661.
Spencer JH, Srinivasan A, Tetali P.  2001.  The discrepancy of permutation families. Unpublished manuscript.
Taviani E, Grim CJ, Choi J, Chun J, Haley B, Hasan NA, Huq A, Colwell RR.  2010.  Discovery of novel Vibrio cholerae VSP‐II genomic islands using comparative genomic analysis. FEMS Microbiology Letters. 308(2):130-137.
McKeown R, Feldman NH, Lidz J, Boyd-Graber J.  Submitted.  Discovering Pronoun Categories using Discourse Information. Proceedings of the 35th Annual Conference of the Cognitive Science Society.
Shneiderman B.  2006.  Discovering business intelligence using treemap visualizations. B-EYE-Network-Boulder, CO, USA, April. 11
Sherwood R, Bender A, Spring N.  2008.  Discarte: a disjunctive internet cartographer. ACM SIGCOMM Computer Communication Review. 38(4):303-314.
Larson E, Froehlich J, Campbell T, Haggerty C, Atlas L, Fogarty J, Patel SN.  2012.  Disaggregated water sensing from a single, pressure-based sensor: An extended analysis of HydroSense using staged experiments. Pervasive and Mobile Computing. 8(1):82-102.
Froehlich J, Larson E, Gupta S, Cohn G, Reynolds M, Patel S.  2011.  Disaggregated End-Use Energy Sensing for the Smart Grid. IEEE Pervasive Computing. 10(1):28-39.
Nguyen V-A, Boyd-Graber J, Altschul SF.  2013.  Dirichlet Mixtures, the Dirichlet Process, and the Structure of Protein Space. Journal of Computational Biology. 20PDF icon cmb%2E2012%2E0244.pdf (292.43 KB)
Brodsky T, Fermüller C, Aloimonos Y.  1998.  Directions of Motion Fields are Hardly Ever Ambiguous. International Journal of Computer Vision. 26(1):5-24.
Korpal M, Ell BJ, Buffa FM, Ibrahim T, Blanco MA, Celià-Terrassa T, Mercatali L, Khan Z, Goodarzi H, Hua Y et al..  2011.  Direct targeting of Sec23a by miR-200s influences cancer cell secretome and promotes metastatic colonization. Nature Medicine. 17(9):1101-1108.
Fermüller C, Aloimonos Y.  1995.  Direct Perception of Three-Dimensional Motion from Patterns of Visual Motion. ScienceScience. 270(5244):1973-1976.
Fermüller C, Aloimonos Y.  1997.  DIRECT MOTION PERCEPTION. Visual navigation: from biological systems to unmanned ground vehicles. :135-135.
Shneiderman B, Maes P.  1997.  Direct manipulation vs. interface agents. Interactions. 4(6):42-61.
Shneiderman B.  1981.  Direct manipulation: A step beyond programming languages (abstract only). ACM SIGSOC Bulletin. 13(2-3):143-143.
Lipp EK, Rivera ING, Gil AI, Espeland EM, Choopun N, Louis VR, Russek-Cohen E, Huq A, Colwell RR.  2003.  Direct Detection of Vibrio Cholerae and ctxA in Peruvian Coastal Water and Plankton by PCR. Applied and Environmental MicrobiologyAppl. Environ. Microbiol.. 69(6):3676-3680.
Shneiderman B, Kang H.  2005.  Direct Annotation: A Drag-and-Drop Strategy for Labeling Photos (2000). Institute for Systems Research Technical Reports.
Čomić L, De Floriani L.  2011.  Dimension-independent simplification and refinement of Morse complexes. Graphical Models. 73(5):261-285.
De Floriani L, Hui A.  2006.  A Dimension-Independent Representation for Multiresolution Nonmanifold Meshes. Journal of Computing and Information Science in Engineering. 6(4):397-404.
De Floriani L, Čomić L.  2012.  Dimension-independent multi-resolution morse complexes. Computers & Graphics.
Swaminathan A, M. Wu, Liu KJR.  2008.  Digital image forensics via intrinsic fingerprints. Information Forensics and Security, IEEE Transactions on. 3(1):101-117.

Pages