Export 480 results:
Author Title Type [ Year(Asc)]
Filters: First Letter Of Title is P  [Clear All Filters]
Choi SY, Rashed SM, Hasan NA, Alam M, Islam T, Sadique A, Johura F-T, Eppinger M, Ravel J, Huq A et al..  2016.  Phylogenetic Diversity of Vibrio cholerae Associated with Endemic Cholera in Mexico from 1991 to 2008. mBio. 7(2)
Colwell RR, Unnikrishnan A, Jutla A, Huq A, Akanda A.  2015.  Predictive Time Series Analysis Linking Bengal Cholera with Terrestrial Water Storage Measured from Gravity Recovery and Climate Experiment Sensors. The American Journal of Tropical Medicine and Hygiene. 93(6):1179-1186.
Azarian T, Ali A, Johnson JA, Mohr D, Prosperi M, Veras NM, Jubair M, Strickland SL, Rashid MH, Alam MT et al..  2014.  Phylodynamic Analysis of Clinical and Environmental Vibrio cholerae Isolates from Haiti Reveals Diversification Driven by Positive Selection. mBio. (6)
Kamara S, Papamanthou C.  2013.  Parallel and Dynamic Searchable Symmetric Encryption. Financial Cryptography and Data Security. :258-274.
Juba D, Cardone A, Ip C Y, Simon Jr CG, K Tison C, Kumar G, Brady M, Varshney A.  2013.  Parallel geometric classification of stem cells by their three-dimensional morphology. Computational Science & Discovery. 6(1):015007.
Li I, Froehlich J, Larsen JE, Grevet C, Ramirez E.  2013.  Personal informatics in the wild: hacking habits for health & happiness. CHI '13 Extended Abstracts on Human Factors in Computing Systems. :3179-3182.
Shi E, Stefanov E, Papamanthou C.  2013.  Practical Dynamic Proofs of Retrievability. CCS '13 Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security . :325-336.
Khan Z, Ford MJ, Cusanovich DA, Mitrano A, Pritchard JK, Gilad Y.  2013.  Primate Transcript and Protein Expression Levels Evolve Under Compensatory Selection Pressures. Science. 342(6162):1100-1104.
Stefanov E, Elaine Shi.  2012.  Path O-RAM: An Extremely Simple Oblivious RAM Protocol. Arxiv preprint arXiv:1202.5150.
Li I, Medynskiy Y, Froehlich J, Larsen J.  2012.  Personal informatics in practice: improving quality of life through data. :2799-2802.
Arya S, da Fonseca GD, Mount D.  2012.  Polytope approximation and the Mahler volume. Proceedings of the Twenty-Third Annual ACM-SIAM Symposium on Discrete Algorithms. :29-42.
Bhattacharya R, Chatterjee S, Bhattacharyya SS.  2012.  Preparation and probing of coherent vibrational wave packets in the ground electronic state of HD^{+}. Physical Review A. 85(3)
Mittal P, Papamanthou C, Song D.  2012.  Preserving Link Privacy in Social Network Based Systems. arXiv:1208.6189 [cs].
Zheleva E, Terzi E, Getoor L.  2012.  Privacy in Social Networks. Synthesis Lectures on Data Mining and Knowledge Discovery. 3(1):1-85.
Sane N, Ford J, Harris AI, Bhattacharyya SS.  2012.  Prototyping scalable digital signal processing systems for radio astronomy using dataflow models. Radio Science. 47(3):n/a-n/a.
Dumitras T, Efstathopoulos P..  2012.  The Provenance of WINE. Dependable Computing Conference (EDCC), 2012 Ninth European. :126-131.
Reddy D, Veeraraghavan A, Chellappa R.  2011.  P2C2: Programmable pixel compressive camera for high speed imaging. 2011 IEEE Conference on Computer Vision and Pattern Recognition (CVPR). :329-336.
Srinivasan BV, Zotkin DN, Duraiswami R.  2011.  Partial least squares based speaker recognition system. Snowbird Learning Workshop.
Srinivasan BV, Zotkin DN, Duraiswami R.  2011.  A partial least squares framework for speaker recognition. Acoustics, Speech and Signal Processing (ICASSP), 2011 IEEE International Conference on. :5276-5279.
Darrell TJ, Tom Yeh, Tollmar K.  2011.  Photo-based mobile deixis system and related techniques. 10/762,941(7872669)
Chen X, Jain A, Gupta A, Davis LS.  2011.  Piecing together the segmentation jigsaw using context. Computer Vision and Pattern Recognition (CVPR), 2011 IEEE Conference on. :2001-2008.
desJardins M, Ciavolino A, Deloatch R, Feasley E.  2011.  Playing to Program: Towards an Intelligent Programming Tutor for RUR-PLE. Second AAAI Symposium on Educational Advances in Artificial Intelligence.
Mundada Y, Ramachandran A, Tariq MB, Feamster N.  2011.  Practical Data-Leak Prevention for Legacy Applications in Enterprise Networks. GT-CS-11-01
Wu S, Elsayed T, Rand W, Raschid L.  2011.  Predicting author blog channels with high value future posts for monitoring. Proceedings of the Twenty-Fifth Conference on Artificial Intelligence (AAAI).
DuBois T, Golbeck J, Srinivasan A.  2011.  Predicting Trust and Distrust in Social Networks. Privacy, Security, Risk and Trust (PASSAT), 2011 IEEE Third International Conference on and 2011 IEEE Third International Confernece on Social Computing (SocialCom). :418-424.