Publications

Export 383 results:
[ Author(Desc)] Title Type Year
Filters: First Letter Of Last Name is H  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
H
He S, M. Wu.  2005.  Building efficient and effective multimedia fingerprints via joint coding and embedding. Proceedings of the 7th workshop on Multimedia and security. :127-136.
He T, Hong L, Kaufman A, Varshney A, Wang S.  1995.  Voxel based object simplification. Proceedings of the 6th conference on Visualization '95. :296–-296–.
He S, Wu M.  2005.  Group-based joint coding and embedding technique for multimedia fingerprinting. Proc. SPIE. 5681:96-105.
He D, Wang J, Luo J, Oard D.  2004.  iCLEF 2004 at Maryland: Summarization design for interactive cross-language question answering. Proceeding of Cross Language Evaluation Forum (CLEF2004).
He S, M. Wu.  2007.  Adaptive Detection for Group-Based Multimedia Fingerprinting. Signal Processing Letters, IEEE. 14(12):964-967.
He S, M. Wu.  2010.  Method for fingerprinting multimedia content. 11/326,313(7814564)
He S, M. Wu.  2007.  Collusion-Resistant Video Fingerprinting for Large User Group. Information Forensics and Security, IEEE Transactions on. 2(4):697-709.
Heckbert P, Rossignac J, Hoppe H, Schroeder W, Soucy M, Varshney A.  1997.  Multiresolution surface modeling. SIGGRAPH 1997 Course Notes.
Hedin B, Oard D.  2009.  Replication and automation of expert judgments: Information engineering in legal e-discovery. IEEE International Conference on Systems, Man and Cybernetics, 2009. SMC 2009. :102-107.
Heer J, Shneiderman B.  2012.  Interactive Dynamics for Visual Analysis. Queue - Micoprocessors. 10(2):30:30–30:55-30:30–30:55.
Heitzmann A, Palazzi B, Papamanthou C, Tamassia R.  2008.  Efficient Integrity Checking of Untrusted Network Storage. StorageSS '08 Proceedings of the 4th ACM International Workshop on Storage Security and Survivability . :43-54.
Heitzmann A, Palazzi B, Papamanthou C, Tamassia R.  2008.  Effective Visualization of File System Access-Control. Visualization for Computer Security. :18-25.
Hekler EB, Klasnja P, Froehlich J, Buman MP.  2013.  Mind the Theoretical Gap: Interpreting, Using, and Developing Behavioral Theory in HCI Research. CHI 2013 To Appear.
Heller J, Shneiderman B.  1972.  A graph theoretic model of data structures. SIGIR Forum. 7(4):36-44.
Hellerstein JM, Franklin MJ, Chandrasekaran S, Deshpande A, Hildrum K, Madden S, Raman V, Shah MA.  2000.  Adaptive query processing: Technology in evolution. IEEE Data Engineering Bulletin. 23(2):7-18.
Helman D, JaJa JF.  1999.  Designing practical efficient algorithms for symmetric multiprocessors. Algorithm Engineering and Experimentation. :663-663.
Helman DR, JaJa JF.  1999.  Prefix computations on symmetric multiprocessors. Parallel and Distributed Processing, 1999. 13th International and 10th Symposium on Parallel and Distributed Processing, 1999. 1999 IPPS/SPDP. Proceedings. :7-13.
Helman DR, Bader DA, JaJa JF.  1998.  A Randomized Parallel Sorting Algorithm with an Experimental Study. Journal of Parallel and Distributed Computing. 52(1):1-23.
Helman DR, Bader DA, JaJa JF.  1996.  Parallel algorithms for personalized communication and sorting with an experimental study (extended abstract). Proceedings of the eighth annual ACM symposium on Parallel algorithms and architectures. :211-222.
Helman DR, Bader DA, JaJa JF.  1998.  A Parallel Sorting Algorithm With an Experimental Study. UMIACS-TR-95-102
Helman D, JaJa JF.  1995.  Efficient image processing algorithms on the scan line array processor. Pattern Analysis and Machine Intelligence, IEEE Transactions on. 17(1):47-56.
Helman DR, JaJa JF, Bader DA.  1998.  A new deterministic parallel sorting algorithm with an experimental evaluation. Journal of Experimental Algorithmics (JEA). 3
Hemaraj Y, Sen M, Shekhar R, Bhattacharyya SS.  2006.  Model-based mapping of image registration applications onto configurable hardware. Signals, Systems and Computers, 2006. ACSSC'06. Fortieth Asilomar Conference on. :1453-1457.
Hendler J, Nau DS, Parsia B, Sirin E, Wu D.  2006.  Automatic web services composition using Shop2.
Hennacy K, Swamy N, Perlis D.  2003.  RGL study in a hybrid real-time system. Proceedings of the IASTED NCI.

Pages