Journal Articles

Pages

Choi JH, Tang H, Kim S, Pop M. Computational Approaches for Genome Assembly Validation. Biological Data Mining. 2010:163.
Leparc GG, Mitra RD, Vardhanabhuti S, Wang J, Hannenhalli S, Smit S, et al. COMPUTATIONAL BIOLOGY. Nucleic acids research. 2007;35(9-12):3163.
Martinez V, Simari GI, Sliva A, V.S. Subrahmanian. Computational cultural dynamics. IEEE intelligent systems. 2008;23(4):51-57.
Nau DS, Wilkenfeld J. Computational Cultural Dynamics. Intelligent Systems, IEEE. 2008;23(4):18-19.
Papamanthou C, Paparrizos K, Samaras N. Computational experience with exterior point algorithms for the transportation problem. Applied Mathematics and Computation. 2004;158(2):459-475.
Ramanathan N, Chellappa R, Biswas S. Computational methods for modeling facial aging: A survey. Journal of Visual Languages & Computing. 2009;20(3):131-144.
Ruppin E, Horn D, Levy N, Reggia JA. Computational studies of synaptic alterations in Alzheimer’s disease. Neural modeling of brain and cognitive disorders. 1996:63-87.
Aloimonos Y. Computational video. The Visual Computer. 2003;19(6):355-359.
Chellappa R, Cuntoor NP, Joo SW, V.S. Subrahmanian, Turaga P. Computational Vision Approaches for Event Modeling. Understanding Events. 2008;1(9):473-522.
Mount D, Netanyahu NS. Computationally Efficient Algorithms for High-Dimensional Robust Estimators. CVGIP: Graphical Models and Image Processing. 1994;56(4):289-303.
Lavi J, Agrawala AK, Buhr R, Jackson K, Jackson M, Lang B. Computer based systems engineering workshop. Software Engineering Education. 1991:149-163.
Reggia JA, Tabb DR, Price TR, Banko M, Hebel R. Computer-aided assessment of transient ischemic attacks. A clinical evaluation. Archives of neurology. 1984;41(12):1248.
Lee C, Varshney A. Computing and displaying intermolecular negative volume for docking. Scientific visualization: the visual extraction of knowledge from data. 2006;I:49-64.
De Floriani L, Panozzo D, Hui A. Computing and visualizing a graph-based decomposition for non-manifold shapes. Graph-Based Representations in Pattern Recognition. 2009:62-71.
Cleaveland R, Steffen B. Computing behavioural relations, logically. Automata, Languages and Programming. 1991:127-138.
Vitali M, De Floriani L, Magillo P. Computing morse decompositions for triangulated terrains: an analysis and an experimental evaluation. Image Analysis and Processing–ICIAP 2011. 2011:565-574.
Khuller S, Martinez M, Nau DS, Sliva A, Simari G, Subrahmanian V. Computing most probable worlds of action probabilistic logic programs: scalable estimation for 10^30,000 worlds. Annals of Mathematics and Artificial Intelligence. 2007;51(2):295-331.
Fernández1 J, Minker J, Yahya A. COMPUTING PERFECT AND STABLE MODELS USING ORDERED MODEL TREES. Computational Intelligence. 2007;11(1):89-112.
Minker J, Perlis D. Computing protected circumscription. The Journal of Logic Programming. 1985;2(4):235-249.
Varshney A, Brooks, F.P. J., Wright WV. Computing smooth molecular surfaces. Computer Graphics and Applications, IEEE. 1994;14(5):19-25.
Sidhu T, Klavans J, Jimmy Lin. Concept disambiguation for improved subject access using multiple knowledge sources. Proceedings of the Workshop on Language Technology for Cultural Heritage Data (LaTeCH 2007). 2007:25.
Dorr BJ, Voss C, Peterson E, Kiker M. Concept-based lexical selection. Proceedings of the AAAI-94 Fall Symposium on Knowledge Representation for Natural Language Processing in Implemented Systems. 1994.
Roussopoulos N, Karagiannis D. Conceptual modeling: past, present and the continuum of the future. Conceptual Modeling: Foundations and Applications. 2009:139-152.
Castro-Nallar E, Hasan NA, Cebula TA, Colwell RR, Robison RA, W. Johnson E, et al. Concordance and discordance of sequence survey methods for molecular epidemiology. PeerJ. 2015;(8105394):e761.
Hazay C, Katz J, Koo CY, Lindell Y. Concurrently-secure blind signatures without random oracles or setup assumptions. Theory of Cryptography. 2007:323-341.
Consolvo S, Harrison B, Smith I, Chen MY, Everitt K, Froehlich J, et al. Conducting In Situ Evaluations for and With Ubiquitous Computing Technologies. International Journal of Human-Computer Interaction. 2007;22(1-2):103-118.
Rust BW, O'Leary DP. Confidence Intervals for Discrete Approximations to Ill-Posed Problems. The Journal of Computational and Graphical Statistics. 1994;3:67-96.
desJardins M, MacGlashan J, Wagstaff KL. Confidence-based feature acquisition to minimize training and test costs. Proceedings of the SIAM Conference on Data Mining. 2010;76(373):514-524.
Stantchev G, Juba D, Dorland W, Varshney A. Confluent Volumetric Visualization of Gyrokinetic Turbulence. Plasma Science, IEEE Transactions on. 2008;36(4):1112-1113.
Xie B, Druin A, Fails J, Massey S, Golub E, Franckel S, et al. Connecting generations: developing co-design methods for older adults and children. Behaviour & Information Technology. 2010;99999(1):1-11.

Pages