Publications
Export 490 results:
[ Author] Title Type Year Filters: First Letter Of Last Name is C [Clear All Filters]
2005. Image Sequence Stabilization, Mosaicking, and Superresolution. Handbook of Image and Video Processing (Second Edition)Handbook of Image and Video Processing (Second Edition). :309-VII-309-VII.
2003. Activity modeling and recognition using shape theory. Behavior Representation in Modeling and Simulation.
2006. Computer Vision, Statistics in. Encyclopedia of Statistical SciencesEncyclopedia of Statistical Sciences.
2009. Knowledge Extraction from Surveillance Sensors. Wiley Handbook of Science and Technology for Homeland SecurityWiley Handbook of Science and Technology for Homeland Security.
2002. Probabilistic recognition of human faces from video. Image Processing. 2002. Proceedings. 2002 International Conference on. 1:I-41-I-44vol.1-I-41-I-44vol.1.
2007. Video Biometrics. Image Analysis and Processing, 2007. ICIAP 2007. 14th International Conference on. :363-370.
2011. Remote identification of faces: Problems, prospects, and progress. Pattern Recognition Letters.
2007. Method of three-dimensional object reconstruction from a video sequence using a generic model. 10/644,817(7184071)
2005. Pattern Recognition in Video. Pattern Recognition and Machine IntelligencePattern Recognition and Machine Intelligence. 3776:11-20.
2008. Mixed state models for automatic target recognition and behavior analysis in video sequences. Proceedings of SPIE. 6967(1):69670Q-69670Q-11-69670Q-69670Q-11.
2011. Face Tracking and Recognition in Video. Handbook of Face RecognitionHandbook of Face Recognition. :323-351.
2010. Approximation Algorithms for Non-Uniform Buy-at-Bulk Network Design. SIAM Journal on Computing. 39(5):1772-1798.
2011. New models and algorithms for throughput maximization in broadcast scheduling. Approximation and Online Algorithms. :71-82.
2004. A semidefinite programming approach to side chain positioning with new rounding strategies. INFORMS Journal on Computing. 16(4):380-392.
2010. Symbolic security analysis of ruby-on-rails web applications. Proceedings of the 17th ACM conference on Computer and communications security. :585-594.
2010. Selective excitation of LI2 by chirped laser pulses with all possible interstate radiative couplings. The Journal of Chemical Physics. 133(16):164313-164313-9.
2007. HIV risk behaviors among female IDUs in developing and transitional countries. BMC Public Health. 7
2001. Algorithms for facility location problems with outliers. Proceedings of the twelfth annual ACM-SIAM symposium on Discrete algorithms. :642-651.
2006. A robust maximum completion time measure for scheduling. Proceedings of the seventeenth annual ACM-SIAM symposium on Discrete algorithm. :324-333.
2000. Improved Algorithms via Approximations of Probability Distributions. Journal of Computer and System Sciences. 61(1):81-107.
1995. Randomness-Optimal Unique Element Isolation with Applications to Perfect Matching and Related Problems. SIAM Journal on Computing. 24(5):1036-1036.
1994. Transforming queries from a relational schema to an object schema: A prototype based on F-logic. Methodologies for Intelligent SystemsMethodologies for Intelligent Systems. 869:154-163.