Journal Articles
(Publications are listed alphabetically by title)
Pages
Activity representation using 3D shape models. J. Image Video Process.. 2008;2008:5:1-5:16-5:1-5:16.
AD (Attacker Defender) Game. Technical Reports from UMIACS, UMIACS-TR-2001-45. 2002.
Adaptation of noncompetitive and competitive neural networks to focal lesions. Journal of Artificial Neural Networks. 1994;1:51-60.
Adapting network structure for efficient team formation. Proceedings of the AAAI 2004 Fall Symposium on Artificial Multi-agent Learning. 2004.
Adapting Scrum to Managing a Research Group. Technical Reports of the Computer Science Department. 2010.
Adaptive Constraint Reduction for Convex Quadratic Programming. Computational Optimization and Applications. 2010.
Adaptive Constraint Reduction for Training Support Vector Machines. Electronic Transactions on Numerical Analysis. 2008;31:156-177.
Adaptive Detection for Group-Based Multimedia Fingerprinting. Signal Processing Letters, IEEE. 2007;14(12):964-967.
Adaptive Hindi OCRUsing Generalized Hausdorff Image Comparison. ACMTransactions on Asian Language Information Processing. 2004;26(2):198-213.
Adaptive Multimedia System Architecture for Improving QoS inWireless Networks. Advances in Multimedia Information Processing—PCM 2002. 2002:37-47.
Adaptive pull-based policies for wide area data delivery. ACM Transactions on Database Systems (TODS). 2006;31(2):631-671.
Adaptive query processing. Foundations and Trends in Databases. 2007;1(1):1-140.
Adaptive query processing: Technology in evolution. IEEE Data Engineering Bulletin. 2000;23(2):7-18.
Adaptive real-time level-of-detail based rendering for polygonal models. Visualization and Computer Graphics, IEEE Transactions on. 1997;3(2):171-183.
Adaptive Threshold Estimation via Extreme Value Theory. Signal Processing, IEEE Transactions on. 2010;58(2):490-500.
Adaptive Use of Iterative Methods in Predictor-Corrector Interior Point Methods for Linear Programming. Numerical Algorithms. 2000;25:387-406.
Adaptively secure broadcast, revisited. Proceedings of the 30th Annual ACM Symposium on Principles of Distributed Computing. 2011.
Adaptively-secure, non-interactive public-key encryption. Theory of Cryptography. 2005:150-168.
Adding dense, weighted connections to wordnet. Proceedings of the Third International WordNet Conference. 2006:29-36.
ADMS: a testbed for incremental access methods. IEEE Transactions on Knowledge and Data Engineering. 1993;5(5):762-774.
Advanced graphic user interfaces: elastic and tightly coupled windows. ACM Comput. Surv.. 1996;28(4es).
Advanced parallel prefix-sums, list ranking and connectivity. Synthesis of Parallel Algorithms. 1993:215-257.
Advanced Technologies for Touchless Fingerprint Recognition. Handbook of Remote Biometrics. 2009:83-109.
Advanced tracking systems: computational approaches to be introduced to new series. Augmented vision & reality. 2010;1.
Advances in GUI Testing-10 Summary. Advances in Computers. 2003;58:195-196.
Advances in GUI Testing-2 GUI Testing Steps. Advances in Computers. 2003;58:155-156.
Advances in GUI Testing-3 Record/Playback Tools. Advances in Computers. 2003;58:157-158.
Advances in GUI Testing-4 Challenges. Advances in Computers. 2003;58:159-161.
Advances in GUI Testing-5 State Machine Models. Advances in Computers. 2003;58:162-167.
Advances in GUI Testing-6 Behavioral Models. Advances in Computers. 2003;58:168-169.
Advances in GUI Testing-7 Statistical Methods. Advances in Computers. 2003;58:170-171.
Advances in GUI Testing-8 Hierarchical Techniques. Advances in Computers. 2003;58:172-193.
Advances in GUI Testing-9 Discussion. Advances in Computers. 2003;58:194.
Advances in multilingual and multimodal information retrieval. Lecture Notes in Computer Science. 2008;5152.
Advances in schistosome genomics. Trends in Parasitology. 2004;20(4):154-157.
Advances in software engineering resource estimation. Advances in computer programming management. 1980;1:206-225.
Advances in Video-Based Biometrics. Advances in Imaging and Electron Physics. 2011;83:183-203.
Advancing social science research by applying computational linguistics. Proceedings of the American Society for Information Science and Technology. 2008;45(1):1-12.
Advancing User-Centered Evaluation of Visual Analytic Environments Through Contests. Information VisualizationInformation Visualization. 2009;8(3):230-238.
Affinity Makes the Difference: Nonselective Interaction of the UBA Domain of Ubiquilin-1 with Monomeric Ubiquitin and Polyubiquitin Chains. Journal of Molecular Biology. 2008;377(1):162-180.
African trypanosomes have differentially expressed genes encoding homologues of the Leishmania GP63 surface protease. Journal of Biological Chemistry. 1997;272(42):26742.
Age progression in human faces: A survey. Journal of Visual Languages and Computing. 2009;15:3349-3361.
Agent-based and analytical modeling to evaluate the effectiveness of greenbelts. Environmental Modelling & Software. 2004;19(12):1097-1109.
Agent-based modeling in marketing: Guidelines for rigor. International Journal of Research in Marketing. 2011;28(3):181-193.
Agents in Network Management. Technical Reports (CIS). 2000.
Agents vs. direct manipulation: what's best to disentangle the Web? Computer Networks: The International Journal of Computer and Telecommunications Networking. 1999;31(11-16):1765-1767.
Aggregate message authentication codes. Topics in Cryptology–CT-RSA 2008. 2008:155-169.
Aggregate operators in probabilistic databases. J. ACM. 2005;52(1):54-101.
AGORA: Assembly Guided by Optical Restriction Alignment. BMC bioinformatics. 2012;13(1).
AI Theory and Practice: A Discussion on Hard Challenges and Opportunities Ahead. AI Magazine. 2010;31(3):103-114.