default search action
Search dblp for Publications
export results for "Peyton Mason"
@article{DBLP:journals/jcb/OngSKSSMFVMBPP15, author = {Edison Ong and Anthony Szedlak and Yunyi Kang and Peyton Smith and Nicholas Smith and Madison McBride and Darren Finlay and Kristiina Vuori and James Mason and Edward D. Ball and Carlo Piermarocchi and Giovanni Paternostro}, title = {A Scalable Method for Molecular Network Reconstruction Identifies Properties of Targets and Mutations in Acute Myeloid Leukemia}, journal = {J. Comput. Biol.}, volume = {22}, number = {4}, pages = {266--288}, year = {2015}, url = {https://doi.org/10.1089/cmb.2014.0297}, doi = {10.1089/CMB.2014.0297}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcb/OngSKSSMFVMBPP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/mediated/DavisM08, author = {Boyd Davis and Peyton Mason}, title = {Locating Presence and Positions in Online Focus Group Text with Stance-Shift Analysis}, booktitle = {Handbook of Research on Computer Mediated Communication {(2} Volumes)}, pages = {634--646}, year = {2008}, crossref = {DBLP:reference/mediated/2008}, url = {http://www.igi-global.com/Bookstore/Chapter.aspx?TitleId=19776}, timestamp = {Fri, 09 Jun 2017 11:04:25 +0200}, biburl = {https://dblp.org/rec/reference/mediated/DavisM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/DavisLM05, author = {Boyd Davis and Vivian Lord and Peyton Mason}, title = {More Than a Summary: Stance-Shift Analysis}, booktitle = {Intelligence and Security Informatics, {IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2005, Atlanta, GA, USA, May 19-20, 2005, Proceedings}, pages = {608--609}, year = {2005}, crossref = {DBLP:conf/isi/2005}, url = {https://doi.org/10.1007/11427995\_71}, doi = {10.1007/11427995\_71}, timestamp = {Fri, 18 Oct 2019 12:58:35 +0200}, biburl = {https://dblp.org/rec/conf/isi/DavisLM05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:reference/mediated/2008, editor = {Sigrid Kelsey and Kirk St. Amant}, title = {Handbook of Research on Computer Mediated Communication {(2} Volumes)}, publisher = {{IGI} Global}, year = {2008}, url = {https://doi.org/10.4018/978-1-59904-863-5}, doi = {10.4018/978-1-59904-863-5}, isbn = {9781599048635}, timestamp = {Fri, 04 Oct 2024 16:22:26 +0200}, biburl = {https://dblp.org/rec/reference/mediated/2008.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/isi/2005, editor = {Paul B. Kantor and Gheorghe Muresan and Fred S. Roberts and Daniel Dajun Zeng and Fei{-}Yue Wang and Hsinchun Chen and Ralph C. Merkle}, title = {Intelligence and Security Informatics, {IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2005, Atlanta, GA, USA, May 19-20, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3495}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/b136511}, doi = {10.1007/B136511}, isbn = {3-540-25999-6}, timestamp = {Fri, 04 Oct 2024 16:22:26 +0200}, biburl = {https://dblp.org/rec/conf/isi/2005.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.