Publications

Export 1435 results:
Author Title [ Type(Desc)] Year
Filters: First Letter Of Last Name is K  [Clear All Filters]
Journal Articles
Kanodia JS, Kim Y, Tomer R, Khan Z, Chung K, Storey JD, Lu H, Keller PJ, Shvartsman SY.  2011.  A computational statistics approach for estimating the spatial range of morphogen gradients. Development. 138(22):4867-4874.
Kanodia JS, Kim Y, Tomer R, Khan Z, Chung K, Storey JD, Lu H, Keller PJ, Shvartsman SY.  2011.  A computational statistics approach for estimating the spatial range of morphogen gradients. Development. 138(22):4867-4874.
Kanodia JS, Kim Y, Tomer R, Khan Z, Chung K, Storey JD, Lu H, Keller PJ, Shvartsman SY.  2011.  A computational statistics approach for estimating the spatial range of morphogen gradients. Development. 138(22):4867-4874.
Li J, Deshpande A, Khuller S.  2009.  On Computing Compression Trees for Data Collection in Sensor Networks. arXiv:0907.5442.
Khuller S.  1989.  On computing graph closures. Information Processing Letters. 31(5):249-255.
Khuller S, Martinez M, Nau DS, Sliva A, Simari G, Subrahmanian V.  2007.  Computing most probable worlds of action probabilistic logic programs: scalable estimation for 10^30,000 worlds. Annals of Mathematics and Artificial Intelligence. 51(2):295-331.
Sidhu T, Klavans J, Jimmy Lin.  2007.  Concept disambiguation for improved subject access using multiple knowledge sources. Proceedings of the Workshop on Language Technology for Cultural Heritage Data (LaTeCH 2007). :25-25.
Dorr BJ, Voss C, Peterson E, Kiker M.  1994.  Concept-based lexical selection. Proceedings of the AAAI-94 Fall Symposium on Knowledge Representation for Natural Language Processing in Implemented Systems.
Roussopoulos N, Karagiannis D.  2009.  Conceptual modeling: past, present and the continuum of the future. Conceptual Modeling: Foundations and Applications. :139-152.
Hazay C, Katz J, Koo CY, Lindell Y.  2007.  Concurrently-secure blind signatures without random oracles or setup assumptions. Theory of Cryptography. :323-341.
Hazay C, Katz J, Koo CY, Lindell Y.  2007.  Concurrently-secure blind signatures without random oracles or setup assumptions. Theory of Cryptography. :323-341.
Katz J, Malka L.  2011.  Constant-Round Private Function Evaluation with Linear Complexity. Advances in Cryptology–ASIACRYPT 2011. :556-571.
Katz J, Koo CY.  2005.  On constructing universal one-way hash functions from arbitrary one-way functions. Journal of Cryptology.
Katz J, Koo CY.  2005.  On constructing universal one-way hash functions from arbitrary one-way functions. Journal of Cryptology.
Kuniavsky M, Vaughan M, Bederson BB, Shneiderman B, Rau PLP, from Menus T, Lane DM, Napier HA, Peres SC, Sándor A.  2005.  Content Index to Volume 18. INTERNATIONAL JOURNAL OF HUMAN–COMPUTER INTERACTION. 18(3):367-368.
Khandelia M, Bambha NK, Bhattacharyya SS.  2006.  Contention-conscious transaction ordering in multiprocessor DSP systems. IEEE Transactions on Signal Processing. 54(2):556-569.
Senoh M, Ghosh‐Banerjee J, Ramamurthy T, Hamabata T, Kurakawa T, Takeda M, Colwell RR, Nair BG, Takeda Y.  2010.  Conversion of viable but nonculturable Vibrio cholerae to the culturable state by co‐culture with eukaryotic cells. Microbiology and Immunology. 54(9):502-507.
Voytas DF, Cummings MP, Koniczny A, Ausubel FM, Rodermel SR.  1992.  copia-like retrotransposons are ubiquitous among plants. Proc Natl Acad Sci USA. 89(15):7124-7128.
Aloimonos Y, Kamgar-Parsi B.  1980.  Correspondence from Correspondence. Optical Society of America, Topical Meeting on Machine Vision. :46-51.
Kingsford C, Zaslavsky E, Singh M.  2011.  A cost-aggregating integer linear program for motif finding. Journal of Discrete Algorithms. 9(4):326-334.
Morisio M, Seaman CB, Basili VR, Parra AT, Kraft SE, Condon SE.  2002.  COTS-based software development: Processes and open issues. Journal of Systems and Software. 61(3):189-199.
Shneiderman B, Fischer G, Czerwinski M, Resnick M, Myers B, Candy L, Edmonds E, Eisenberg M, Giaccardi E, Hewett T et al..  2006.  Creativity Support Tools: Report From a U.S. National Science Foundation Sponsored Workshop. International Journal of Human-Computer Interaction. 20(2):61-77.
Klawe M, Shneiderman B.  2005.  Crisis and opportunity in computer science. Commun. ACM. 48(11):27-28.
Carpenter MR, Kalburge SS, Borowski JD, Peters MC, Colwell RR, E. Boyd F.  2017.  CRISPR-Cas and Contact-Dependent Secretion Systems Present on Excisable Pathogenicity Islands with Conserved Recombination Modules. Journal of Bacteriology. (10)
Huq A, Sack BR, Nizam A, Longini IM, Nair BG, Ali A, Morris GJ, Khan HMN, Siddique KA, Yunus M et al..  2005.  Critical Factors Influencing the Occurrence of Vibrio Cholerae in the Environment of Bangladesh. Applied and Environmental MicrobiologyAppl. Environ. Microbiol.. 71(8):4645-4654.

Pages