default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 65 matches
- 2024
- Ryan Adamson, Paul Bryant, Dave Montoya, Jeff Neel, Erik Palmer, Ray Powell, Ryan Prout, Peter Upton:
Creating Continuous Integration Infrastructure for Software Development on U.S. Department of Energy High-Performance Computing Systems. Comput. Sci. Eng. 26(1): 31-39 (2024) - 2022
- Peng Xu, Mostofa Patwary, Shrimai Prabhumoye, Virginia Adams, Ryan Prenger, Wei Ping, Nayeon Lee, Mohammad Shoeybi, Bryan Catanzaro:
Evaluating Parameter Efficient Learning for Generation. EMNLP 2022: 4824-4833 - Joel C. Adams, Bryce D. Allen, Bryan C. Fowler, Mark C. Wissink, Joshua J. Wright:
The Sounds of Sorting Algorithms: Sonification as a Pedagogical Tool. SIGCSE (1) 2022: 189-195 - Peng Xu, Mostofa Patwary, Shrimai Prabhumoye, Virginia Adams, Ryan J. Prenger, Wei Ping, Nayeon Lee, Mohammad Shoeybi, Bryan Catanzaro:
Evaluating Parameter Efficient Learning for Generation. CoRR abs/2210.13673 (2022) - 2021
- Cody H. Fleming, Carl R. Elks, Georgios Bakirtzis, Stephen C. Adams, Bryan T. Carter, Peter A. Beling, Barry M. Horowitz:
Cyberphysical Security Through Resiliency: A Systems-Centric Approach. Computer 54(6): 36-45 (2021) - Peter J. Adams, Brannon Batson, Alistair Bell, Jhanvi Bhatt, J. Adam Butts, Timothy Correia, Bruce Edwards, Peter Feldmann, Christopher H. Fenton, Anthony Forte, Joseph Gagliardo, Gennette Gill, Maria Gorlatova, Brian Greskamp, J. P. Grossman, Jeremy Hunt, Bryan L. Jackson, Mollie M. Kirk, Jeffrey Kuskin, Roy J. Mader, Richard McGowen, Adam McLaughlin, Mark A. Moraes, Mohamed Nasr, Lawrence J. Nociolo, Lief O'Donnell, Andrew Parker, Jon L. Peticolas, Terry Quan, T. Carl Schwink, Keun Sup Shim, Naseer Siddique, Jochen Spengler, Michael Theobald, Brian Towles, William Vick, Stanley C. Wang, Michael E. Wazlowski, Madeleine J. Weingarten, John M. Williams, David E. Shaw:
The ΛNTON 3 ASIC: a Fire-Breathing Monster for Molecular Dynamics Simulations. HCS 2021: 1-22 - David E. Shaw, Peter J. Adams, Asaph Azaria, Joseph A. Bank, Brannon Batson, Alistair Bell, Michael Bergdorf, Jhanvi Bhatt, J. Adam Butts, Timothy Correia, Robert M. Dirks, Ron O. Dror, Michael P. Eastwood, Bruce Edwards, Amos Even, Peter Feldmann, Michael Fenn, Christopher H. Fenton, Anthony Forte, Joseph Gagliardo, Gennette Gill, Maria Gorlatova, Brian Greskamp, J. P. Grossman, Justin Gullingsrud, Anissa Harper, William Hasenplaugh, Mark Heily, Benjamin Colin Heshmat, Jeremy Hunt, Douglas J. Ierardi, Lev Iserovich, Bryan L. Jackson, Nick P. Johnson, Mollie M. Kirk, John L. Klepeis, Jeffrey S. Kuskin, Kenneth M. Mackenzie, Roy J. Mader, Richard McGowen, Adam McLaughlin, Mark A. Moraes, Mohamed H. Nasr, Lawrence J. Nociolo, Lief O'Donnell, Andrew Parker, Jon L. Peticolas, Goran Pocina, Cristian Predescu, Terry Quan, John K. Salmon, Carl Schwink, Keun Sup Shim, Naseer Siddique, Jochen Spengler, Tamas Szalay, Raymond Tabladillo, Reinhard Tartler, Andrew G. Taube, Michael Theobald, Brian Towles, William Vick, Stanley C. Wang, Michael Wazlowski, Madeleine J. Weingarten, John M. Williams, Kevin A. Yuh:
Anton 3: twenty microseconds of molecular dynamics simulation before lunch. SC 2021: 1 - 2020
- Cody H. Fleming, Carl R. Elks, Georgios Bakirtzis, Stephen C. Adams, Bryan T. Carter, Peter A. Beling, Barry M. Horowitz:
Cyber-Physical Security Through Resiliency: A Systems-centric Approach. CoRR abs/2011.14469 (2020) - 2019
- Johan van den Hoogen, Stefan Geisen, Devin Routh, Howard Ferris, Walter Traunspurger, David A. Wardle, Ron G. M. de Goede, Byron J. Adams, Wasim Ahmad, Walter S. Andriuzzi, Richard D. Bardgett, Michael Bonkowski, Raquel Campos-Herrera, Juvenil E. Cares, Tancredi Caruso, Larissa de Brito Caixeta, Xiaoyun Chen, Sofia R. Costa, Rachel Creamer, José Mauro da Cunha Castro, Marie Dam, Djibril Djigal, Miguel Escuer, Bryan S. Griffiths, Carmen Gutiérrez, Karin Hohberg, Daria Kalinkina, Paul Kardol, Alan Kergunteuil, Gerard Korthals, Valentyna Krashevska, Alexey A. Kudrin, Qi Li, Wenju Liang, Matthew Magilton, Mariette Marais, José Antonio Rodríguez Martín, Elizaveta Matveeva, El Hassan Mayad, Christian Mulder, Peter Mullin, Roy Neilson, T. A. Duong Nguyen, Uffe N. Nielsen, Hiroaki Okada, Juan Emilio Palomares Rius, Kaiwen Pan, Vlada Peneva, Loïc Pellissier, Julio Carlos Pereira da Silva, Camille Pitteloud, Thomas O. Powers, Kirsten Powers, Casper W. Quist, Sergio Rasmann, Sara Sánchez Moreno, Stefan Scheu, Heikki Setälä, Anna Sushchuk, Alexei V. Tiunov, Jean Trap, Wim H. van der Putten, Mette Vestergård, Cecile Villenave, Lieven Waeyenberge, Diana H. Wall, Rutger Wilschut, Daniel G. Wright, Jiue-in Yang, Thomas Ward Crowther:
Soil nematode abundance and functional group composition at a global scale. Nat. 572(7768): 194-198 (2019) - Bryan T. Carter, Stephen C. Adams, Georgios Bakirtzis, Tim Sherburne, Peter A. Beling, Barry M. Horowitz, Cody H. Fleming:
A Preliminary Design-Phase Security Methodology for Cyber-Physical Systems. Syst. 7(2): 21 (2019) - Bryan J. Hudgens, Cameron Hartner, Brian Adams, Eva D. Regnier:
Investing in Cyber Defense: A Value-Focused Analysis of Investment Decisions for Microgrids. HICSS 2019: 1-8 - 2018
- Stephen C. Adams, Bryan T. Carter, Cody H. Fleming, Peter A. Beling:
Selecting System Specific Cybersecurity Attack Patterns Using Topic Modeling. TrustCom/BigDataSE 2018: 490-497 - 2016
- Victor Hazlewood, Kathy Benninger, Gregory D. Peterson, Jason Charcalla, Benny Sparks, Jesse Hanley, Andrew K. Adams, Bryan Learn, Robert Budden, Derek Simmel, Joseph Lappa, Jared Yanovich:
Developing Applications with Networking Capabilities via End-to-End SDN (DANCES). XSEDE 2016: 29:1-29:7 - 2013
- Aniesha Alford, Joshua Adams, Joseph Shelton, Gerry V. Dozier, Kelvin S. Bryant, John C. Kelly:
Genetic and evolutionary biometrics: Exploring value preference space for hybrid feature weighting and selection. Int. J. Intell. Comput. Cybern. 6(1): 4-20 (2013) - 2012
- Joseph Shelton, Joshua Adams, Aniesha Alford, Melissa A. Venable, Sabra Neal, Gerry V. Dozier, Kelvin S. Bryant:
Mitigating replay attacks using Darwinian-based Feature Extraction. CISDA 2012: 1-7 - Aniesha Alford, Joshua Adams, Joseph Shelton, Kelvin S. Bryant, John C. Kelly, Gerry V. Dozier:
Analyzing the cross-generalization ability of a hybrid genetic & evolutionary application for multibiometric feature weighting and selection. GECCO (Companion) 2012: 1521-1522 - Joseph Shelton, Kelvin S. Bryant, Sheldon Abrams, Lasanio Small, Joshua Adams, Derrick Leflore, Aniesha Alford, Karl Ricanek, Gerry V. Dozier:
Genetic & Evolutionary Biometric Security: Disposable Feature Extractors for Mitigating Biometric Replay Attacks. CSER 2012: 351-360 - 2011
- Khary Popplewell, Aniesha Alford, Gerry V. Dozier, Kelvin S. Bryant, John C. Kelly, Joshua Adams, Tamirat Abegaz, Kamilah Purrington, Joseph Shelton:
A comparison of genetic feature selection and weighting techniques for multi-biometric recognition. ACM Southeast Regional Conference 2011: 205-208 - Joseph Shelton, Gerry V. Dozier, Kelvin S. Bryant, Joshua Adams, Khary Popplewell, Tamirat Abegaz, Kamilah Purrington, Damon L. Woodard, Karl Ricanek:
Genetic based LBP feature extraction and selection for facial recognition. ACM Southeast Regional Conference 2011: 197-200 - Tamirat Abegaz, Gerry V. Dozier, Kelvin S. Bryant, Joshua Adams, Joseph Shelton, Karl Ricanek, Damon L. Woodard:
SSGA & EDA based feature selection and weighting for face recognition. IEEE Congress on Evolutionary Computation 2011: 1375-1381 - Aniesha Alford, Khary Popplewell, Gerry V. Dozier, Kelvin S. Bryant, John C. Kelly, Joshua Adams, Tamirat Abegaz, Joseph Shelton, Karl Ricanek, Damon L. Woodard:
A comparison of GEC-based feature selection and weighting for multimodal biometric recognition. IEEE Congress on Evolutionary Computation 2011: 2725-2728 - Tamirat Abegaz, Gerry V. Dozier, Kelvin S. Bryant, Joshua Adams, Khary Popplewell, Joseph Shelton, Karl Ricanek, Damon L. Woodard:
Hybrid GAs for Eigen-based facial recognition. CIBIM 2011: 127-130 - Gerry V. Dozier, Kamilah Purrington, Khary Popplewell, Joseph Shelton, Tamirat Abegaz, Kelvin S. Bryant, Joshua Adams, Damon L. Woodard, Philip E. Miller:
GEFeS: Genetic & evolutionary feature selection for periocular biometric recognition. CIBIM 2011: 152-156 - Tamirat Abegaz, Gerry V. Dozier, Kelvin S. Bryant, Joshua Adams, Brandon Baker, Joseph Shelton, Karl Ricanek, Damon L. Woodard:
Genetic-Based Selection and Weighting for LBP, oLBP, and Eigenface Feature Extraction. MAICS 2011: 221-224 - Aniesha Alford, Khary Popplewell, Gerry V. Dozier, Kelvin S. Bryant, John C. Kelly, Joshua Adams, Tamirat Abegaz, Joseph Shelton:
GEFeWS: A Hybrid Genetic-Based Feature Weighting and Selection Algorithm for Multi-Biometric Recognition. MAICS 2011: 86-90 - Joseph Shelton, Gerry V. Dozier, Kelvin S. Bryant, Lasanio Small, Joshua Adams, Khary Popplewell, Tamirat Abegaz, Damon L. Woodard, Karl Ricanek:
Comparison of Genetic-based Feature Extraction Methods for Facial Recognition. MAICS 2011: 216-220 - Mary Vardigan, Bryan Beecher, Nathan Adams, Nancy Y. McGovern, Peggy Overcashier:
Shared Digital Technologies for Data Curation, Preservation, and Access: A Proof of Concept. IASSIST Conference 2011 - 2010
- Leon Reznik, Michael J. Adams, Bryan Woodard:
Intelligent Intrusion Detection Based on Genetically Tuned Artificial Neural Networks. J. Adv. Comput. Intell. Intell. Informatics 14(6): 708-713 (2010) - Tran Trung Tran, Christina Kulis, Steven M. Long, Darryn E. Bryant, Peter Adams, Mark L. Smythe:
Defining scaffold geometries for interacting with proteins: geometrical classification of secondary structure linking regions. J. Comput. Aided Mol. Des. 24(11): 917-934 (2010) - Joshua Adams, Damon L. Woodard, Gerry V. Dozier, Philip E. Miller, George Glenn, Kelvin S. Bryant:
GEFE: genetic & evolutionary feature extraction for periocular-based biometric recognition. ACM Southeast Regional Conference 2010: 44
skipping 35 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-10-10 06:46 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint