Publications

Export 359 results:
[ Author(Desc)] Title Type Year
Filters: First Letter Of Last Name is R  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
R
Raasi S, Varadan R, Fushman D, Pickart CM.  2005.  Diverse polyubiquitin interaction properties of ubiquitin-associated domains. Nature Structural & Molecular Biology. 12(8):708-714.
Raboin E, Nau DS, Kuter U, Gupta SK, Svec P.  2010.  Strategy generation in multi-agent imperfect-information pursuit games. :947-954.
Radhakrishnan J, Srinivasan A.  1998.  Improved bounds and algorithms for hypergraph two-coloring. 39th Annual Symposium on Foundations of Computer Science, 1998. Proceedings. :684-693.
Radio MJ, Reggia JA, Berndt RS.  2001.  Learning word pronunciations using a recurrent neural network. Neural Networks, 2001. Proceedings. IJCNN'01. International Joint Conference on. 1:11-15.
Rahaman M.Habibur, Islam T, Colwell RR, Alam M.  2015.  Molecular tools in understanding the evolution of Vibrio cholerae. Frontiers in Microbiology. (e0120311154e00398-13822020380817190)
Rai P, Daumé H.  2009.  Multi-label prediction via sparse infinite CCA. Advances in Neural Information Processing Systems. 22:1518-1526.
Rai P, Daumé H, Venkatasubramanian S.  2009.  Streamed learning: one-pass SVMs. Proceedings of the 21st international jont conference on Artifical intelligence. :1211-1216.
Rai P, Daumé H.  2009.  The infinite hierarchical factor regression model. Arxiv preprint arXiv:0908.0570.
Rajagopalan AN, Chellappa R, Koterba NT.  2005.  Background learning for robust face recognition with PCA in the presence of clutter. Image Processing, IEEE Transactions on. 14(6):832-843.
Rajagopalan AN, Chellappa R, Koterba N.  2003.  Robust Face Recognition in the Presence of Clutter. Audio- and Video-Based Biometric Person AuthenticationAudio- and Video-Based Biometric Person Authentication. 2688:1062-1062.
Rajagopalan S, Pinilla JM, Losleben P, Tian Q, Gupta SK.  1998.  Integrated design and rapid manufacturing over the Internet.
Ralston A, Shneiderman B.  2003.  Errors. Encyclopedia of Computer ScienceEncyclopedia of Computer Science. :677-680.
Ramachandran M, Veeraraghavan A, Chellappa R.  2007.  Fast Bilinear SfM with Side Information. Computer Vision, 2007. ICCV 2007. IEEE 11th International Conference on. :1-8.
Ramachandran A, Feamster N.  2006.  Understanding the network-level behavior of spammers. Proceedings of the 2006 conference on Applications, technologies, architectures, and protocols for computer communications. :291-302.
Ramachandran M, Zhou SK, Jhalani D, Chellappa R.  2005.  A method for converting a smiling face to a neutral face with applications to face recognition. Acoustics, Speech, and Signal Processing, 2005. Proceedings. (ICASSP '05). IEEE International Conference on. 2:ii/977-ii/980Vol.2-ii/977-ii/980Vol.2.
Ramachandran A, Hao S, Khandelwal H, Feamster N, Vempala S.  2008.  A Dynamic Reputation Service for Spotting Spammers. GT-CS-08-09
Ramachandran M, Chellappa R.  2006.  Stabilization and Mosaicing of Airborne Videos. Image Processing, 2006 IEEE International Conference on. :345-348.
Ramachandran A, Bhandankar K, Tariq MB, Feamster N.  2008.  Packets with provenance. GT-CS-08-02
Ramachandran M, Veeraraghavan A, Chellappa R.  2008.  Video stabilization and mosaicing. The Essential Guide to Video Processing,. :109-138.
Ramachandran A, Dasgupta A, Feamster N, Weinberger K.  2011.  Spam or ham?: characterizing and detecting fraudulent "not spam" reports in web mail systems Proceedings of the 8th Annual Collaboration, Electronic messaging, Anti-Abuse and Spam Conference. :210-219.
Ramachandran V, Vishkin U.  1988.  Efficient parallel triconnectivity in logarithmic time. VLSI Algorithms and Architectures. :33-42.
Ramachandran A, Feamster N, Krishnamurthy B, Spatscheck O, Van der Merwe J.  2008.  Fishing for Phishing from the Network Stream. GT-CS-08-08
Ramachandran M, Veeraraghavan A, Chellappa R.  2011.  A Fast Bilinear Structure from Motion Algorithm Using a Video Sequence and Inertial Sensors. IEEE Transactions on Pattern Analysis and Machine Intelligence. 33(1):186-193.
Ramachandran A, Sarma AD, Feamster N.  2007.  Bitstore: An incentive-compatible solution for blocked downloads in bittorrent. Proc. Joint Workshop on The Economics of Networked Systems and Incentive-Based Computing (NetEcon).
Ramachandran A, Feamster N, Vempala S.  2007.  Filtering spam with behavioral blacklisting. Proceedings of the 14th ACM conference on Computer and communications security. :342-351.

Pages