Journal Articles
(Publications are listed alphabetically by title)
Pages
TreeCovery: Coordinated dual treemap visualization for exploring the Recovery Act. Government Information Quarterly. 2011.
Treemaps. Sparks of innovation in human-computer interaction. 1993;284:309.
Treemaps for space-constrained visualization of hierarchies. ACM Transactions on Graphics (TOG) Volume. 1998;11:92-99.
TreePlus: Interactive Exploration of Networks with Enhanced Tree Layouts. Visualization and Computer Graphics, IEEE Transactions on. 2006;12(6):1414-1426.
TREMOR—a tool for retrieving transcriptional modules by incorporating motif covariance. Nucleic Acids Research. 2007;35(21):7360-7371.
Trends in the early careers of life scientists - Preface and executive summary. Mol Biol Cell. 1998;9(11):3007-3015.
Triaging Checklists: a Substitute for a PhD in Static Analysis. Evaluation and Usability of Programming Languages and Tools (PLATEAU) PLATEAU 2009. 2009.
Trie hashing with controlled load. IEEE Transactions on Software Engineering. 1991;17(7):678-691.
Triggered message sequence charts. ACM SIGSOFT Software Engineering Notes. 2002;27:167.
Trusting spam reporters: A reporter-based reputation system for email filtering. ACM Transactions on Information Systems (TOIS). 2008;27(1):3:1-3:27-3:1-3:27.
Truth and meaning (research note). Artificial intelligence. 1989;39(2):245-250.
Trypanosoma cruzi: RNA structure and post-transcriptional control of tubulin gene expression. Experimental Parasitology. 2002;102(3-4):123-133.
Tutorial on statistical relational learning. Inductive Logic Programming. 2005:415.
Tutorial-Graph Analytics — Lessons Learned and Challenges Ahead. IEEE Computer Graphics and Applications. 2011;31(5):18.
Two Alternatively Spliced Isoforms of the Arabidopsis SR45 Protein Have Distinct Roles during Normal Plant Development. Plant PhysiologyPlant Physiol.. 2009;150(3):1450-1458.
Two experimental comparisons of relational and hierarchical database models. International Journal of Man-Machine Studies. 1978;10(6):625-637.
Two implementation models of abstract data types. Computer Languages. 1987;12(1):21-25.
Two methods for solving a 3D acoustic inverse scattering problem. The Journal of the Acoustical Society of America. 2003;113(4):2191.
Two-server password-only authenticated key exchange. Journal of Computer and System Sciences. 2012;78(2):651-669.
Two-server password-only authenticated key exchange. Applied Cryptography and Network Security. 2005:175-206.
Type theory and concurrency. International Journal of Parallel Programming. 1988;17(2):153-206.
Types and intermediate representations. Technical Reports (CIS). 1998:796.
Typicality constants and range defaults: Some pros and cons of a cognitive model of default reasoning. Methodologies for Intelligent Systems. 1991:560-569.
Ubistatins Inhibit Proteasome-Dependent Degradation by Binding the Ubiquitin Chain. Science. 2004;306(5693):117-120.
UFO: a resilient layered routing architecture. ACM SIGCOMM Computer Communication Review. 2008;38(5):59-62.
Ultrafast and memory-efficient alignment of short DNA sequences to the human genome. Genome Biology. 2009;10(3):R25.
Ultrastructure of coccoid viable but non‐culturable Vibrio cholerae. Environmental Microbiology. 2007;9(2):393-402.
Umd/bbn at mse2005. Proceedings of the MSE2005 track of the Association for Computational Linguistics Workshop on Intrinsic and Extrinsic Evaluation Meatures for MT and/or Summarization, Ann Arbor, MI. 2005.
UMD_VDT, an Integration of Detection and Tracking Methods for Multiple Human Tracking. Multimodal Technologies for Perception of Humans. 2008:179-190.
Uncertainty in logic programming: Some recollections. Association for Logic Programming Newsletter. 2007;20(2).
Uncertainty in visual processes predicts geometrical optical illusions. Vision Research. 2004;44(7):727-749.
Uncertainty propagation in model-based recognition. International Journal of Computer Vision. 1998;27(2):127-159.
Understanding actor loyalty to event-based groups in affiliation networks. Social Network Analysis and Mining. 2011;1(2):115-126.
Understanding Clusters in Multidimensional Spaces: Making Meaning by Combining Insights from Coordinated Views of Domain Knowledge (2004). Institute for Systems Research Technical Reports. 2005.
Understanding Computer User Frustration: Measuring and Modeling the Disruption from Poor Designs. Technical Reports from UMIACS. 2003.
Understanding Hierarchical Clustering Results by Interactive Exploration of Dendrograms: A Case Study with Genomic Microarray Data. Technical Reports from UMIACS. 2003.
Understanding human reactivites and relationships: an excerpt from Leonardo's laptop. interactions. 2002;9(5):40-53.
Understanding Interactive Legends: a Comparative Evaluation with Standard Widgets. Computer Graphics Forum. 2010;29(3):1193-1202.
Understanding IT Innovations Through Computational Analysis of Discourse. ICIS 2009 Proceedings. 2009.
Understanding Patterns of User Visits to Web Sites: Interactive Starfield Visualization of WWW Log Data-Short Version. Tech Report HCIL-99-06. 1999.
Understanding the High-Performance-Computing Community: A Software Engineer's Perspective. Software, IEEE. 2008;25(4):29-36.
Understanding the impact of image quality on segmentation accuracy. SPIE Newsroom. 2013.
Understanding the Semantics of the Genetic Algorithm in Dynamic Environments. Applications of Evolutionary Computing. 2007:657-667.
Understanding Transportation Management Systems Performance with a Simulation-Based Learning Environment. Technical Reports of the Computer Science Department. 1998.
Understanding tuberculosis epidemiology using structured statistical models. Artificial Intelligence in Medicine. 2004;30(3):233-256.
Understanding visuo‐motor primitives for motion synthesis and analysis. Computer Animation and Virtual Worlds. 2006;17(3‐4):207-217.
Unexpected abundance of coenzyme F(420)-dependent enzymes in Mycobacterium tuberculosis and other actinobacteria. J Bacteriol. 2010;192(21):5788-98.
Unforgeable encryption and chosen ciphertext secure modes of operation. Fast Software Encryption. 2001:25-36.
Unicity Distance of Robust Image Hashing. Information Forensics and Security, IEEE Transactions on. 2007;2(3):462-467.