Publications

Export 969 results:
Author [ Title(Asc)] Type Year
Filters: First Letter Of Last Name is A  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
B
Aloimonos Y, Duriç Z, Fermüller C, Huang L, Rivlin E, Sharma R.  1992.  Behavioral Visual Motion Analysis,". Proceedings, DARPA Image Understanding Workshop. :521-541.
Duderstadt J, Arms W, Messina P, Ellisman M, Atkins D, Fox E, Shneiderman B, Nissenbaum H, Lederberg J.  2001.  Becoming a Scholar in the Digital Age.
Duderstadt J, Arms W, Messina P, Ellisman M, Atkins D, Fox E, Shneiderman B, Nissenbaum H, Lederberg J.  2001.  Becoming a Scholar in the Digital Age.
Fong A, Ashktorab Z, Froehlich J.  2013.  Bear-with-me: an embodied prototype to explore tangible two-way exchanges of emotional language. CHI'13 Extended Abstracts on Human Factors in Computing Systems.
Ayres DL, Darling A, Zwickl DJ, Beerli P, Holder MT, Lewis PO, Huelsenbeck JP, Ronquist F, Swofford DL, Cummings MP et al..  2012.  BEAGLE: An Application Programming Interface and High-Performance Computing Library for Statistical Phylogenetics. Systematic BiologySyst Biol. 61(1):170-173.
Rasko DA, Worsham PL, Abshire TG, Stanley ST, Bannan JD, Wilson MR, Langham RJ, Decker SR, Jiang L, Read TD et al..  2011.  Bacillus Anthracis Comparative Genome Analysis in Support of the Amerithrax Investigation. Proceedings of the National Academy of SciencesPNAS. 108(12):5027-5032.
A
Oh S, Hoogs A, Perera A, Cuntoor N, Chen C-C, Lee J T, Mukherjee S, Aggarwal JK, Lee H, Davis LS et al..  2011.  AVSS 2011 demo session: A large-scale benchmark dataset for event recognition in surveillance video. Advanced Video and Signal-Based Surveillance (AVSS), 2011 8th IEEE International Conference on. :527-528.
Varshney A, Agarwal P, Brooks F, Wright W, Weber H.  1995.  Automatic generation of multiresolution for polygonal models. First Workshop on Simulation and Interaction in Virtual Environments.
Arbaugh WA, Keromytis AD, Farber DJ, Smith JM.  1998.  Automated recovery in a secure bootstrap process. Proceedings of the Symposium on Network and Distributed Systems Security (NDSS’98). :155-167.
Alva U, Gupta SK.  1999.  Automated punch shape synthesis for sheet metal bending operations.
Alva U, Gupta SK.  2001.  Automated design of sheet metal punches for bending multiple parts in a single setup. Robotics and Computer-Integrated Manufacturing. 17(1–2):33-47.
Alva U, Gupta SK, Gupta RK.  2000.  Automated design of sheet metal bending tools.
Keogh E, Hochheiser H, Shneiderman B.  2002.  An Augmented Visual Query Mechanism for Finding Patterns in Time Series Data. Flexible Query Answering SystemsFlexible Query Answering Systems. 2522:240-250.
Albrecht M, Gentry C, Halevi S, Katz J.  2009.  Attacking cryptographic schemes based on "perturbation polynomials". Proceedings of the 16th ACM conference on Computer and communications security. :1-10.
Huq A, Anwar R, Colwell RR, McDonald MD, Khan R, Jutla A, Akanda S.  2017.  Assessment of Risk of Cholera in Haiti following Hurricane Matthew. The American Journal of Tropical Medicine and Hygiene. 97(3):896-903.
Huq A, Anwar R, Colwell RR, McDonald MD, Khan R, Jutla A, Akanda S.  2017.  Assessment of Risk of Cholera in Haiti following Hurricane Matthew. The American Journal of Tropical Medicine and Hygiene. 97(3):896-903.
Dean TL, ALLEN JAMES AUTOR, Aloimonos Y.  1995.  Artificial Intelligence: Theory and Practice. :604.
Dean TL, ALLEN JAMES AUTOR, Aloimonos Y.  1995.  Artificial Intelligence: Theory and Practice. :604.
Baker P, Ogale AS, Fermüller C, Aloimonos Y.  2004.  The Argus eye, a new tool for robotics. IEEE Robotics and Automation Magazine. 11(4):31-38.
Drury J, Resnik P, Weinberg A, Gennari S, Aoshima S.  2002.  Argument structure saturation in a constraint based model.
Petroni Jr NL, Fraser T, Walters AA, Arbaugh WA.  2006.  An architecture for specification-based detection of semantic integrity violations in kernel dynamic data. Proceedings of the 15th conference on USENIX Security Symposium. :20-20.
Pal P, Rubel P, Atighetchi M, Webber F, Sanders WH, Seri M, Ramasamy HG, Lyons J, Courtney T, Agbaria A et al..  2006.  An architecture for adaptive intrusion-tolerant applications. Software: Practice and Experience. 36(11-12):1331-1354.
Pal P, Rubel P, Atighetchi M, Webber F, Sanders WH, Seri M, Ramasamy HG, Lyons J, Courtney T, Agbaria A et al..  2006.  An architecture for adaptive intrusion-tolerant applications. Software: Practice and Experience. 36(11-12):1331-1354.
Saha S, Kianzad V, Schlessman J, Aggarwal G, Bhattacharyya SS, Chellappa R, Wolf W.  2009.  An architectural level design methodology for smart camera applications. International Journal of Embedded Systems. 4(1):83-97.
Kianzad V, Saha S, Schlessman J, Aggarwal G, Bhattacharyya SS, Wolf W, Chellappa R.  2005.  An architectural level design methodology for embedded face detection. Proceedings of the 3rd IEEE/ACM/IFIP international conference on Hardware/software codesign and system synthesis. :136-141.

Pages