Journal Articles

Pages

Liang J, Doermann D, Li H. Camera-Based Analysis of Text and Documents: ASurvey. International Journal on Document Analysis and Recognition. 2005;7(2+3):83-104.
Ramachandran A, Dagon D, Feamster N. Can DNS-based blacklists keep up with bots. Conference on email and anti-spam. 2006.
Chafekar D, Anil Kumar V, Marathe M, Parthasarathy S, Srinivasan A. Capacity of wireless networks under SINR interference constraints. Wireless Networks. 2011;17(7):1605-1624.
Sliva A, V.S. Subrahmanian, Martinez V, Simari G. CAPE: Automatically Predicting Changes in Group Behavior. Mathematical Methods in Counterterrorism. 2009:253-269.
Duraiswami R, Zotkin DN, O'donovan A. Capture and rendering of spatial sound over headphones. The Journal of the Acoustical Society of America. 2006;120(5):3094.
Kang H, Bederson BB, Suh B. Capture, annotate, browse, find, share: novel interfaces for personal photo management. International Journal of Human-] Computer Interaction. 2007;23(3):315-337.
V.S. Subrahmanian, Albanese M, Martinez M?, Nau DS, Reforgiato D, Simari GI, et al. CARA: A Cultural-Reasoning Architecture. IEEE Intelligent Systems. 2007;22(2):12-16.
Hutchinson H, Plaisant C, Druin A. Case study: a message board as a technology probe for family communication and coordination. Proceedings of the 2002 Conference on Human Factors in Computing Systems. 2002.
Habash N, Dorr BJ. CATVAR: A database of categorial variations for English. Proceedings of the MT Summit. 2003:471-474.
El-Sayed NM, Alarcon CM, Beck JC, Sheffield VC, Donelson JE. cDNA expressed sequence tags of Trypanosoma brucei rhodesiense provide new insights into the biology of the parasite. Molecular and Biochemical Parasitology. 1995;73(1-2):75-90.
Hajiaghayi MT, Mirrokni SV, Saberi A, Bahl P, Jain K, Qiu L. Cell breathing in wireless LANs: Algorithms and evaluation. IEEE Transactions on Mobile Computing. 2007;6(2):164-178.
Halter M, Sisan DR, Chalfoun J, Stottrup BL, Cardone A, Dima AA, et al. Cell cycle dependent TN-C promoter activity determined by live cell imaging. Cytometry A. 2011;79(3):192-202.
Reggia JA, Chou HH, Lohn JD. Cellular automata models of self-replicating systems. Advances in Computers. 1998;47:141-183.
Khuller S, Rosenfeld A, Wu A. Centers of sets of pixels. Discrete Applied Mathematics. 2000;103(1–3):297-306.
Habash N, Dorr BJ, Monz C. Challenges in building an Arabic-English GHMT system with SMT components. Proceedings of the 11th Annual Conference of the European Association for Machine Translation (EAMT-2006). 2006:56-65.
Doppa JR, Yu J, Tadepalli P, Getoor L. Chance-constrained programs for link prediction. Proceedings of Workshop on Analyzing Networks and Learning with Graphs at NIPS Conference. 2009.
Ananthanarayanan A, Gupta SK, Bruck HA. Characterization and control of pin diameter during in-mold assembly of mesoscale revolute joints. North American Manufacturing Research Institute. 2009;37.
Talledo M, Rivera IN, Lipp EK, Neale A, Karaolis D, Huq A, et al. Characterization of a Vibrio cholerae phage isolated from the coastal water of Peru. Environmental Microbiology. 2003;5(5):350-354.
Hammel M, Sfyroera G, Pyrpassopoulos S, Ricklin D, Ramyar KX, Pop M, et al. Characterization of Ehp, a Secreted Complement Inhibitory Protein from Staphylococcus aureus. Journal of Biological Chemistry. 2007;282(41):30051-30061.
Leddy MB, Hasan NA, Subramanian P, Heberling C, Cotruvo J, Colwell RR. Characterization of Microbial Signatures From Advanced Treated Wastewater Biofilms. Journal - American Water Works Association. 2017;109:E503-E512.
Chen AJ, Hasan NA, Haley BJ, Taviani E, Tarnowski M, Brohawn K, et al. Characterization of Pathogenic Vibrio parahaemolyticus from the Chesapeake Bay, Maryland. Frontiers in Microbiology. 2017.
Stamps BW, Leddy MB, Plumlee MH, Hasan NA, Colwell RR, Spear JR. Characterization of the Microbiome at the World’s Largest Potable Water Reuse Facility. Frontiers in Microbiology. 2018.
Ceccarelli D, Garriss G, Choi SY, Hasan NA, Stepanauskas R, Pop M, et al. Characterization of Two Cryptic Plasmids Isolated in Haiti from Clinical Vibrio cholerae Non-O1/Non-O139. Frontiers in Microbiology. 2017.
Furr M, Foster JS. Checking type safety of foreign function calls. ACM Transactions on Programming Languages and Systems (TOPLAS). 2008;30(4):18.
Burnett S, Feamster N, Vempala S. Chipping away at censorship firewalls with user-generated content. Proc. 19th USENIX Security Symposium, Washington, DC. 2010.
Sanhueza D, Chevillon C, Colwell RR, Babonneau J, Marion E, Marsollier L, et al. Chitin promotes Mycobacterium ulcerans growth. FEMS Microbiology Ecology. 2016;928565871(6):fiw067.
Boneh D, Canetti R, Halevi S, Katz J. Chosen-ciphertext security from identity-based encryption. SIAM Journal on Computing. 2007;36(5):1301-1328.
Canetti R, Halevi S, Katz J. Chosen-ciphertext security from identity-based encryption. Advances in Cryptology-Eurocrypt 2004. 2004:207-222.
Dodis Y, Katz J. Chosen-ciphertext security of multiple encryption. Theory of Cryptography. 2005:188-209.
Mount D, Netanyahu NS, Silverman R, Wu AY. Chromatic nearest neighbor searching: A query sensitive approach. Computational Geometry. 2000;17(3–4):97-119.
Moore JT, Hicks MW, Nettles S. Chunks in PLAN: Language support for programs as packets. PROCEEDINGS OF THE ANNUAL ALLERTON CONFERENCE ON COMMUNICATION CONTROL AND COMPUTING. 1999;37:PROCEEDINGS OF THE ANNUAL ALLERTON CONFERENCE ON COMMUNICATION CONTROL AND COMPUTING - PROCEEDINGS OF THE ANNUAL ALLERTON CONFER.
Perlis D. Circumscribing with sets. Artificial Intelligence. 1987;31(2):201-211.

Pages