Publications

Export 197 results:
Author Title Type [ Year(Asc)]
Filters: First Letter Of Title is B  [Clear All Filters]
2018
Sultana M, Nusrin S, Hasan NA, Sadique A, Ahmed KU, Islam A, Hossain A, Longini I, Nizam A, Huq A et al..  2018.  Biofilms Comprise a Component of the Annual Cycle of Vibrio cholerae in the Bay of Bengal Estuary. mBio. (2):e00483-18.
2017
Phelps C, Madhavan G, Rappuoli R, Colwell RR, Fineberg H.  2017.  Beyond cost-effectiveness: Using systems analysis for infectious disease preparedness. Vaccine. 35:A46-A49.
Florczyk SJ, Simon M, Juba D, P. Pine S, Sarkar S, Chen D, Baker PJ, Bodhak S, Cardone A, Brady MC et al..  2017.  A Bioinformatics 3D Cellular Morphotyping Strategy for Assessing Biomaterial Scaffold Niches. ACS Biomaterials Science & Engineering. 3(10):2302-2313.
2015
Bartholomew JC, Pearson AD, Stenseth NC, LeDuc JW, Hirschberg DL, Colwell RR.  2015.  Building Infectious Disease Research Programs to Promote Security and Enhance Collaborations with Countries of the Former Soviet Union. Frontiers in Public Health. 35361632
2012
Lee SHee, Kalejta RF, Kerry J, Semmes OJohn, O’Connor CM, Khan Z, Garcia BA, Shenk T, Murphy E.  2012.  BclAF1 restriction factor is neutralized by proteasomal degradation and microRNA repression during human cytomegalovirus infection. Proceedings of the National Academy of Sciences. 109(24):9575-9580.
Ayres DL, Darling A, Zwickl DJ, Beerli P, Holder MT, Lewis PO, Huelsenbeck JP, Ronquist F, Swofford DL, Cummings MP et al..  2012.  BEAGLE: An Application Programming Interface and High-Performance Computing Library for Statistical Phylogenetics. Systematic BiologySyst Biol. 61(1):170-173.
Bilge L, Dumitras T.  2012.  Before We Knew It: An Empirical Study of Zero-day Attacks in the Real World. CCS '12 Proceedings of the 2012 ACM conference on Computer and Communications Security. :833-844.
Satinoff B, Boyd-Graber J.  2012.  Besting the Quiz Master: Crowdsourcing Incremental Classification Games. Empirical Methods in Natural Language Processing.
Lumezanu C, Feamster N, Klein H.  2012.  #bias: Measuring the Tweeting Behavior of Propagandists. Sixth International AAAI Conference on Weblogs and Social Media.
Cardone A, Amelot J, Li-Baboud Y-S, Brady M, Bajcsy P.  2012.  Biases from model assumptions in texture sub-cellular image segmentation. SPIE Newsroom. 13
Gevers D, Pop M, Schloss PD, Huttenhower C.  2012.  Bioinformatics for the Human Microbiome Project. PLoS Computational Biology. 8(11):e1002779.
Gopalan R, Taheri S, Turaga P, Chellappa R.  2012.  A Blur-robust Descriptor with Applications to Face Recognition. IEEE Transactions on Pattern Analysis and Machine Intelligence. PP(99):1-1.
2011
Rasko DA, Worsham PL, Abshire TG, Stanley ST, Bannan JD, Wilson MR, Langham RJ, Decker SR, Jiang L, Read TD et al..  2011.  Bacillus Anthracis Comparative Genome Analysis in Support of the Amerithrax Investigation. Proceedings of the National Academy of SciencesPNAS. 108(12):5027-5032.
Koren S, Treangen TJ, Pop M.  2011.  Bambus 2: scaffolding metagenomes. Bioinformatics. 27(21):2964-2971.
Anand P, King J, Boyd-Graber J, Wagner E, Martell C, Oard D, Resnik P.  2011.  Believe Me—We Can Do This! Annotating Persuasive Acts in Blog Text. Workshops at the Twenty-Fifth AAAI Conference on Artificial Intelligence.
Farrell R, Oza O, Zhang N, Morariu VI, Darrell T, Davis LS.  2011.  Birdlets: Subordinate categorization using volumetric primitives and pose-normalized appearance. Computer Vision (ICCV), 2011 IEEE International Conference on. :161-168.
Dachman-Soled D, Lindell Y, Mahmoody M, Malkin T.  2011.  On the Black-Box Complexity of Optimally-Fair Coin Tossing. Theory of Cryptography. :450-467.
Zhang Z, Klassen E, Srivastava A, Turaga P, Chellappa R.  2011.  Blurring-invariant Riemannian metrics for comparing signals and images. 2011 IEEE International Conference on Computer Vision (ICCV). :1770-1775.
Zhang J, Luo X, Perdisci R, Gu G, Lee W, Feamster N.  2011.  Boosting the scalability of botnet detection using adaptive traffic sampling. Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security. :124-134.
Caragea GC, Vishkin U.  2011.  Brief announcement: better speedups for parallel max-flow. Proceedings of the 23rd ACM symposium on Parallelism in algorithms and architectures. :131-134.
Sundaresan S, de Donato W, Feamster N, Teixeira R, Crawford S, Pescapè A.  2011.  Broadband internet performance: A view from the gateway. SIGCOMM-Computer Communication Review. 41(4):134-134.
Sharma A, Jacobs DW.  2011.  Bypassing synthesis: PLS for face recognition with pose, low-resolution and sketch. Computer Vision and Pattern Recognition (CVPR), 2011 IEEE Conference on. :593-600.
2010
Perdisci R, Lee W, Feamster N.  2010.  Behavioral clustering of HTTP-based malware and signature generation using malicious network traces. Proceedings of the 7th USENIX conference on Networked systems design and implementation. :26-26.

Pages