Publications
Export 188 results:
[ Author] Title Type Year Filters: First Letter Of Last Name is W [Clear All Filters]
2013. "I Want to Imagine How That Place Looks": Designing Technologies to Support Connectivity Between Africans Living Abroad and Home. SIGCHI '13. :2755-2764.
2010. Deliberate Interactions: Characterizing Technology Use in Nairobi, Kenya. SIGCHI '10. :2593-2602.
2011. Predicting author blog channels with high value future posts for monitoring. Proceedings of the Twenty-Fifth Conference on Artificial Intelligence (AAAI).
2003. Data hiding in image and video .I. Fundamental issues and solutions. Image Processing, IEEE Transactions on. 12(6):685-695.
2003. Joint security and robustness enhancement for quantization based data embedding. Circuits and Systems for Video Technology, IEEE Transactions on. 13(8):831-841.
2007. Signal Processing Magazine E-Newsletter: Inside Out [From the Editor]. Signal Processing Magazine, IEEE. 24(6):2-8.
2004. Collusion-resistant fingerprinting for multimedia. Signal Processing Magazine, IEEE. 21(2):15-27.
2006. Schistosoma mansoni (Platyhelminthes, Trematoda) nuclear receptors: Sixteen new members and a novel subfamily. Gene. 366(2):303-315.
2005. Dynamic network resource allocation using multimedia content features and .... 09/795,952(6947378)
2007. A Signal Processing and Randomization Perspective of Robust and Secure Image Hashing. Statistical Signal Processing, 2007. SSP '07. IEEE/SP 14th Workshop on. :166-170.
2006. Analysis of Shock Motion in a Compression Ramp Configuration using DNS data. Bulletin of the American Physical Society.
2012. Making Recommendations in a Microblog to Improve the Impact of a Focal User. 6th ACM Conference on Recommender Systems (RecSys).
2006. An exploratory study of the W3C mailing list test collection for retrieval of emails with pro/con arguments. Proceedings of the Third Conference on Email and Anti-Spam, Mountain View, CA, July.
2007. In Situ Evaluation of Tracking Algorithms Using Time Reversed Chains. Computer Vision and Pattern Recognition, 2007. CVPR '07. IEEE Conference on. :1-8.
2011. Future link prediction in the blogosphere for recommendation. Proceedings of the International Conference on Weblogs and Social Media (ICWSM).
2000. Data hiding in digital binary image. Multimedia and Expo, 2000. ICME 2000. 2000 IEEE International Conference on. 1:393-396vol.1-393-396vol.1.
2010. Rapid prototyping for digital signal processing systems using Parameterized Synchronous Dataflow graphs. 2010 21st IEEE International Symposium on Rapid System Prototyping (RSP). :1-7.
2001. Secure Health Information Sharing System: SHARE. Proceedings of the AMIA SymposiumProc AMIA Symp. :1060-1060.
2004. Collusion resistant multimedia fingerprinting: A unified framework. Electronic Imaging Symposium: Security, Steganography, and Watermarking of Multimedia Contents VI, San Jose, CA, Proc. of SPIE. 5306:748-759.
2004. Distortion compensated lookup-table embedding: Joint security and robustness enhancement for quantization based data hiding. Electronic Imaging Symposium: Security, Steganography, and Watermarking of Multimedia Contents VI, San Jose, CA, Proc. of SPIE. 5306:610-621.
1999. A rotation, scale and translation resilient public watermark. Acoustics, Speech, and Signal Processing, 1999. Proceedings., 1999 IEEE International Conference on. 4:2065vol.4-2065vol.4.