Export 7150 results:
Author Title Type [ Year(Asc)]
Baker K, Bloodgood M, Dorr BJ, Callison-Burch C, Filardo NW, Piatko C, Levin L, Miller S.  2012.  Modality and Negation in SIMT Use of Modality and Negation in Semantically-Informed Syntactic MT. Computational Linguistics. :1-48.
Zhai K, Hu Y, Williamson S, Boyd-Graber J.  2012.  Modeling Images using Transformed Indian Buffet Processes. International Conference of Machine Learning.
Zhai K, Boyd-Graber J, Asadi N, Alkhouja M.  2012.  Mr. LDA: A Flexible Large Scale Topic Modeling Package using Variational Inference in MapReduce. Proceedings of ACM International Conference on World Wide Web, 2012.
Narayanan I, Sarangan V, Vasan A, Srinivasan A, Sivasubramaniam A.  2012.  Networking lessons: From computers to water. 2012 Fourth International Conference on Communication Systems and Networks (COMSNETS). :1-6.
Ye P, Doermann D.  2012.  No-Reference Image Quality Assessment using Visual Codebooks. Image Processing, IEEE Transactions on. PP(99):1-1.
Mozumder PK, Banu MA, Naser MN, Ali MS, Alam M, Sack RB, Colwell RR, Huq A.  2012.  Occurrence of protozoans & their limnological relationships in some ponds of Mathbaria, Bangladesh. University Journal of Zoology, Rajshahi University. 29(1):69-71.
Wei Z, JaJa JF.  2012.  An Optimized High-Throughput Strategy for Constructing Inverted Files. Parallel and Distributed Systems, IEEE Transactions on. PP(99):1-1.
Barrett C, Beckman R, Bisset K, Chen J, DuBois T, Eubank S, Kumar AVS, Lewis B, Marathe MV, Srinivasan A et al..  2012.  Optimizing epidemic protection for socially essential workers. Proceedings of the 2nd ACM SIGHIT International Health Informatics Symposium. :31-40.
Hwang H, Lauw HW, Getoor L, Ntoulas A.  2012.  Organizing User Search Histories. Knowledge and Data Engineering, IEEE Transactions on. 24(5):912-925.
Stefanov E, Elaine Shi.  2012.  Path O-RAM: An Extremely Simple Oblivious RAM Protocol. Arxiv preprint arXiv:1202.5150.
Li I, Medynskiy Y, Froehlich J, Larsen J.  2012.  Personal informatics in practice: improving quality of life through data. :2799-2802.
Arya S, da Fonseca GD, Mount D.  2012.  Polytope approximation and the Mahler volume. Proceedings of the Twenty-Third Annual ACM-SIAM Symposium on Discrete Algorithms. :29-42.
Bhattacharya R, Chatterjee S, Bhattacharyya SS.  2012.  Preparation and probing of coherent vibrational wave packets in the ground electronic state of HD^{+}. Physical Review A. 85(3)
Mittal P, Papamanthou C, Song D.  2012.  Preserving Link Privacy in Social Network Based Systems. arXiv:1208.6189 [cs].
Zheleva E, Terzi E, Getoor L.  2012.  Privacy in Social Networks. Synthesis Lectures on Data Mining and Knowledge Discovery. 3(1):1-85.
Sane N, Ford J, Harris AI, Bhattacharyya SS.  2012.  Prototyping scalable digital signal processing systems for radio astronomy using dataflow models. Radio Science. 47(3):n/a-n/a.
Dumitras T, Efstathopoulos P..  2012.  The Provenance of WINE. Dependable Computing Conference (EDCC), 2012 Ninth European. :126-131.
Khan Z, Bloom JS, Amini S, Singh M, Perlman DH, Caudy AA, Kruglyak L.  2012.  Quantitative measurement of allele‐specific protein expression in a diploid yeast hybrid by LC‐MS. Molecular Systems Biology. 8(1)
Wongsuphasawat K, Plaisant C, Taieb-Maimon M, Shneiderman B.  2012.  Querying event sequences by exact match or similarity search: Design and empirical evaluation. Interacting with Computers. 24(2):55-68.
Huang Y, Katz J, Evans D.  2012.  Quid Pro Quo-tocols: Strengthening Semi-Honest Protocols with Dual Execution. IEEE Symposium on Security and Privacy.
Bloodgood M, Ye P, Rodrigues P, Zajic D, Doermann D.  2012.  A Random Forest System Combination Approach for Error Detection in Digital Dictionaries. Innovative hybrid approaches to the processing of textual data, EACL 2012 Workshop. :78-86.
Zhuolin Jiang, Lin Z, Davis LS.  2012.  Recognizing Human Actions by Learning and Matching Shape-Motion Prototype Trees. Pattern Analysis and Machine Intelligence, IEEE Transactions on. 34(3):533-547.
Chetty M, Feamster N.  2012.  Refactoring Network Infrastructure to Improve Manageability: A Case Study of Home Networking. SIGCOMM Comput. Commun. Rev.. 42(3):54-61.
Katz J.  2012.  Review of efficient secure two-party protocols: techniques and constructions by Carmit Hazay and Yehuda Lindell. SIGACT News. 43(1):21-23.
Konte M, Feamster N.  2012.  Re-wiring Activity of Malicious Networks. Passive and Active MeasurementPassive and Active Measurement. 7192:116-125.