1. Compositional Dataflow Circuits Edwards, Stephen A.; Townsend, Richard Morse; Barker, Martha Massee; Kim, Martha Allen 2019 Articles Data flow computingComputer networksBuffer storage (Computer science)Computer science
2. Divide and conquer approach to quantum Hamiltonian simulation Hadfield, Stuart Andrew; Papageorgiou, Anargyros 2018 Articles Hamiltonian systemsQuantum computersQuantum theoryComputer science
3. Image set for deep learning: field images of maize annotated with disease symptoms Wiesner-Hanks, Tyr; Stewart, Ethan L.; Kaczmar, Nicholas; DeChant, Chad; Wu, Harvey; Nelson, Rebecca J.; Lipson, Hod; Gore, Michael A. 2018 Articles Computer scienceMachine learningPlant diseasesCornImage processingNeural networks (Computer science)
4. Measuring discursive influence across scholarship Gerow, Aaron; Hu, Yuening; Boyd-Graber, Jordan; Blei, David Meir; Evans, James A. 2018 Articles Learning and scholarshipBibliographical citationsScholarly publishingInfluence (Literary, artistic, etc.)
5. Readmission prediction via deep contextual embedding of clinical concepts Xiao, Cao; Ma, Tengfei; Dieng, Adji Bousso; Blei, David Meir; Wang, Fei 2018 Articles Computer scienceHospital utilization--ForecastingHospital recordsNeural networks (Computer science)
6. Simulated User Bots: Real Time Testing of Insider Threat Detection Systems Stolfo, Salvatore 2018 Articles Computer scienceComputer networksComputer networks--Security measuresComputer securityIntrusion detection systems (Computer security)
7. Accelerated parallel algorithm for gene network reverse engineering He, Jing; Zhou, Zhou; Reed, Michael K.; Califano, Andrea 2017 Articles Parallel programming (Computer science)Gene regulatory networksGene expression--Data processingSystems biology
8. From Functional Programs to Pipelined Dataflow Circuits Townsend, Richard Morse; Kim, Martha Allen; Edwards, Stephen A. 2017 Articles Compilers (Computer programs)Logic designData flow computing
9. Rapid re-identification of human samples using portable DNA sequencing Zaaijer, Sophie; Gordon, Assaf; Speyer, Daniel; Piccone, Robert; Groen, Simon Cornelis; Erlich, Yaniv 2017 Articles CytologyGeneticsGenomicsDNA fingerprintingCell linesComputer science
10. Statistical correction of the Winner’s Curse explains replication variability in quantitative trait genome-wide association studies Palmer, Cameron Douglas; Pe'er, Itshack G. 2017 Articles DNA replicationGenomes--Data processingHuman genetics--VariationGeneticsStatistics
11. Subregional Nowcasts of Seasonal Influenza Using Search Trends Kandula, Sasikiran; Shaman, Jeffrey L. 2017 Articles InfluenzaEpidemiology--Statistical methodsForecasting
12. The time and place of European admixture in Ashkenazi Jewish history Xue, James; Lencz, Todd; Darvasi, Ariel; Pe'er, Itsik; Carmi, Shai 2017 Articles Gene flowGeneticsPopulation geneticsAshkenazimHistorical geography
13. Bias Characterization in Probabilistic Genotype Data and Improved Signal Detection with Multiple Imputation Palmer, Cameron Douglas; Pe’er, Itsik 2016 Articles Multiple imputation (Statistics)Missing observations (Statistics)Genetics--Statistical methodsGeneticsStatistics
14. Cutting Edge: Using mobile sequencers in an academic classroom Zaaijer, Sophie; Erlich, Yaniv; Columbia University Ubiquitous Genomics 2015 class 2016 Articles Nucleotide sequenceScience--Study and teaching--Technological innovationsGenomicsEducational technologyEducation--Curricula
15. Prior Design for Dependent Dirichlet Processes: An Application to Marathon Modeling Pradier, Melanie F.; Ruiz, Francisco Jesus Rodriguez; Perez-Cruz, Fernando 2016 Articles Marathon runningRunning races--Data processingNonparametric statisticsStochastic processesStatisticsInformation science
16. The Impact of Comprehensive Case Management on HIV Client Outcomes Brennan-Ing, Mark; Seidel, Liz; Rodgers, Leslie; Ernst, Jerome; Wirth, Doug; Tietz, Daniel; Moretti, Antonio; Karpiak, Stephen E. 2016 Articles Hospitals--Case management servicesHIV infections--EpidemiologyHIV-positive persons--Care--Government policyEpidemiologyHealth services administrationMedical carePublic health
17. Fox in the Trap: Thwarting Masqueraders via Automated Decoy Document Deployment Voris, Jonathan A.; Jermyn, Jill Louise; Boggs, Nathaniel Gordon; Stolfo, Salvatore 2015 Articles Computer science
18. Keys under doormats: mandating insecurity by requiring government access to all data and communications Abelson, Hal; Anderson, Ross; Bellovin, Steven Michael; Benaloh, Josh; Blaze, Matt; Diffie, Whitfield; Gilmore, John; Green, Matthew; Landau, Susan; Neumann, Peter G.; Rivest, Ronald L.; Schiller, Jeffrey I.; Schneier, Bruce; Specter, Michael A.; Weitzner, Daniel J. 2015 Articles Computer networks--Security measuresComputer securityInternet--Security measuresComputer science
19. Stochastic differential equations for quantum dynamics of spin-boson networks Mandt, Stephan; Sadri, Darius; Houck, Andrew A.; Türeci, Hakan E. 2015 Articles Quantum theoryPhase space (Statistical physics)Quantum opticsStochastic differential equationsComputer science
20. Coherent Somatic Mutation in Autoimmune Disease Ross, Kenneth A. 2014 Articles Mutation (Biology)Antibody diversityAutoimmune diseasesComputer science