Book Chapters

Pages

Zhou S, Chellappa R. Probabilistic Human Recognition from Video. In: Heyden A, Sparr G, Nielsen M, Johansen P, editors. Computer Vision — ECCV 2002Computer Vision — ECCV 2002. Vol 2352. Springer Berlin / Heidelberg; 2002. 1. p. 173-183p. (Lecture Notes in Computer Science; vol 2352).
Udrea O, Yu D, Hung E, Subrahmanian V. Probabilistic Ontologies and Relational Databases. In: Meersman R, Tari Z, editors. On the Move to Meaningful Internet Systems 2005: CoopIS, DOA, and ODBASEOn the Move to Meaningful Internet Systems 2005: CoopIS, DOA, and ODBASE. Vol 3760. Springer Berlin / Heidelberg; 2005. 1. p. 1-17p. (Lecture Notes in Computer Science; vol 3760).
Getoor L, Friedman N, Koller D, Pfeffer A, Taskar B. Probabilistic Relational Models. In: Introduction to Statistical Relational LearningIntroduction to Statistical Relational Learning.; 2007. 1. p. 129.
Basili VR, Zelkowitz MV, Sjøberg DI, Johnson P, Cowling AJ. Protocols in the use of empirical software engineering artifacts. In: Empirical Software EngineeringEmpirical Software Engineering. Vol 12. Springer; 2007. 1. p. 107-119p.
Hori O, Doermann D. Quantitative Measurement of the Performance of Raster-to-vector Conversion Algorithms. In: Graphics Recognition: Methods and ApplicationsGraphics Recognition: Methods and Applications. Springer; 1996. 5. p. 57-68p.
Srinivasan A. Randomized Algorithms and Probabilistic Analysis in Wireless Networking. In: Hromkovic J, Královic R, Nunkesser M, Widmayer P, editors. Stochastic Algorithms: Foundations and ApplicationsStochastic Algorithms: Foundations and Applications. Vol 4665. Springer Berlin / Heidelberg; 2007. 5. p. 54-57p. (Lecture Notes in Computer Science; vol 4665).
Konte M, Feamster N. Re-wiring Activity of Malicious Networks. In: Taft N, Ricciato F, editors. Passive and Active MeasurementPassive and Active Measurement. Vol 7192. Springer Berlin / Heidelberg; 2012. 1. p. 116-125p. (Lecture Notes in Computer Science; vol 7192).
Ramanathan N, Chellappa R. Recognizing Faces Across Age Progression. In: Hammoud R, Abidi B, Abidi M, editors. Face Biometrics for Personal IdentificationFace Biometrics for Personal Identification. Springer Berlin Heidelberg; 2007. 2. p. 27-42p. (Signals and Communication Technology).
Hansen P, O'Leary DP. Regularization algorithms based on total least squares. In: Recent advances in total least squares techniques and errors-in-variables modeling (Leuven, 1996)Recent advances in total least squares techniques and errors-in-variables modeling (Leuven, 1996). Philadelphia, PA: SIAM; 1997. 1. p. 127-137p.
O'Leary DP. Regularization of Ill-Posed Problems in Image Restoration. In: Lewis JG, editor. Proceedings of the Fifth SIAM Conference on Applied Linear AlgebraProceedings of the Fifth SIAM Conference on Applied Linear Algebra. Philadelphia: SIAM Press; 1994. 1. p. 102-105p.
Everett L, Hansen M, Hannenhalli S. Regulating the Regulators: Modulators of Transcription Factor Activity. In: Ladunga I, editor. Computational Biology of Transcription Factor BindingComputational Biology of Transcription Factor Binding. Vol 674. Humana Press; 2010. 2. p. 297-312p. (Methods in Molecular Biology; vol 674).
Agrawala AK, CILINGIROGLU A, Lee S. Regulation of Cable Television. In: The Froehlich/Kent Encyclopedia of Telecommunications: Volume 15-Radio Astronomy to Submarine Cable SystemsThe Froehlich/Kent Encyclopedia of Telecommunications: Volume 15-Radio Astronomy to Submarine Cable Systems. Vol 15.; 1997. 8. p. 84.
Keil-Slawik R, Plaisant C, Shneiderman B. Remote direct manipulation: A case study of a telemedicine workstation. In: Sparks of innovation in human-computer interactionSparks of innovation in human-computer interaction. Intellect Books; 1993. 5. p. 51.
Aris A, Shneiderman B, Plaisant C, Shmueli G, Jank W. Representing Unevenly-Spaced Time Series Data for Visualization and Interactive Exploration. In: Costabile M, Paternò F, editors. Human-Computer Interaction - INTERACT 2005Human-Computer Interaction - INTERACT 2005. Vol 3585. Springer Berlin / Heidelberg; 2005. 8. p. 835-846p. (Lecture Notes in Computer Science; vol 3585).
Hollingsworth J, Keleher PJ, Ryu KD. Resource-aware meta-computing. In: Zelkowits MV, editor. Emphasizing Distributed SystemsEmphasizing Distributed Systems. Vol Volume 53. Elsevier; 2000. 1. p. 109-169p.
Tulyakov S, Jaeger S, Govindaraju V, Doermann D. Review of Classifier Combination Methods. In: Simone Marinai H F, editor. Studies in Computational Intelligence: Machine Learning in Document Analysis and RecognitionStudies in Computational Intelligence: Machine Learning in Document Analysis and Recognition. Springer; 2008. 3. p. 361-386p.
Rajagopalan AN, Chellappa R, Koterba N. Robust Face Recognition in the Presence of Clutter. In: Kittler J, Nixon M, editors. Audio- and Video-Based Biometric Person AuthenticationAudio- and Video-Based Biometric Person Authentication. Vol 2688. Springer Berlin / Heidelberg; 2003. 1. p. 1062. (Lecture Notes in Computer Science; vol 2688).
Hicks MW, Weirich S, Crary K. Safe and Flexible Dynamic Linking of Native Code. In: Harper R, editor. Types in Compilation. Vol 2071. Springer Berlin / Heidelberg; 2001. 1. p. 147-176p. (Lecture Notes in Computer Science; vol 2071).
Anagnostakis K, Hicks MW, Ioannidis S, Keromytis A, Smith J. Scalable Resource Control in Active Networks. In: Yasuda H, editor. Active NetworksActive Networks. Vol 1942. Springer Berlin / Heidelberg; 2000. 3. p. 343-357p. (Lecture Notes in Computer Science; vol 1942).
Plaisant C, Shneiderman B, Battagtia J. Scheduling home control devices: a case study of the transition from the research project to a product. In: Sparks of innovation in human-computer interactionSparks of innovation in human-computer interaction. Intellect Books; 1993. 2. p. 205.
Kumar V, Marathe M, Parthasarathy S, Srinivasan A. Scheduling on Unrelated Machines Under Tree-Like Precedence Constraints. In: Chekuri C, Jansen K, Rolim J, Trevisan L, editors. Approximation, Randomization and Combinatorial Optimization. Algorithms and TechniquesApproximation, Randomization and Combinatorial Optimization. Algorithms and Techniques. Vol 3624. Springer Berlin / Heidelberg; 2005. 6. p. 609. (Lecture Notes in Computer Science; vol 3624).
Dachman-Soled D, Malkin T, Raykova M, Yung M. Secure Efficient Multiparty Computing of Multivariate Polynomials and Applications. In: Lopez J, Tsudik G, editors. Applied Cryptography and Network Security. Springer Berlin Heidelberg; 2011. 1. p. 130-146p. (Lecture Notes in Computer Science).
Dachman-Soled D, Kalai YT. Securing Circuits against Constant-Rate Tampering. In: Safavi-Naini R, Canetti R, editors. Advances in Cryptology – CRYPTO 2012. Springer Berlin Heidelberg; 2012. 5. p. 533-551p. (Lecture Notes in Computer Science).
North C, Shneiderman B, Plaisant C, Kang H, Bederson BB. Seeing the World Through Image Libraries. In: The craft of information visualization: readings and reflectionsThe craft of information visualization: readings and reflections. Morgan Kaufmann Publishers Inc.; 2003. 4. p. 47.
De Floriani L, Lee M. Selective refinement on nested tetrahedral meshes. In: Geometric Modeling for Scientific VisualizationGeometric Modeling for Scientific Visualization. Birkhäuser; 2004. 3. p. 329-344p.
Albanese M, Turaga P, Chellappa R, Pugliese A, Subrahmanian V. Semantic Video Content Analysis. In: Schonfeld D, Shan C, Tao D, Wang L, editors. Video Search and MiningVideo Search and Mining. Vol 287. Springer Berlin / Heidelberg; 2010. 1. p. 147-176p. (Studies in Computational Intelligence; vol 287).
Zajic D, Dorr BJ, Lin J, O'Leary DP, Conroy JM, Schlesinger JD. Sentence Trimming and Selection: Mixing and Matching. In: DUC 06 Conference Proceedings. U.S. National Inst. of Standards and Technology; 2006.
Nagarajan N, Pop M. Sequencing and Genome Assembly Using Next-Generation Technologies. In: Fenyö D, editor. Computational BiologyComputational Biology. Vol 673. Humana Press; 2010. 1. p. 1-17p. (Methods in Molecular Biology; vol 673).
Ling H, Jacobs DW. Shape Matching for Foliage Database Retrieval. In: Semantic Mining Technologies for Multimedia DatabasesSemantic Mining Technologies for Multimedia Databases.; 2009. 1. p. 100.
Pop M. Shotgun Sequence Assembly. In: Advances in ComputersAdvances in Computers. Vol Volume 60. Elsevier; 2004. 1. p. 193-248p.
Papamanthou C, Shi E, Tamassia R. Signatures of Correct Computation. In: Sahai A, editor. Theory of Cryptography. Springer Berlin Heidelberg; 2013. 2. p. 222-242p. (Lecture Notes in Computer Science).
Bethencourt J, Elaine Shi, Song D. Signatures of Reputation. In: Sion R, editor. Financial Cryptography and Data Security. Vol 6052. Springer Berlin / Heidelberg; 2010. 4. p. 400-407p. (Lecture Notes in Computer Science; vol 6052).
Nixon MS, Tan T, Chellappa R. Silhouette-Based Approaches. In: Human Identification Based on GaitHuman Identification Based on Gait.; 2006. 4. p. 45-105p.
Choi SG, Dachman-Soled D, Malkin T, Wee H. Simple, Black-Box Constructions of Adaptively Secure Protocols. In: Reingold O, editor. Theory of Cryptography. Springer Berlin Heidelberg; 2009. 3. p. 387-402p. (Lecture Notes in Computer Science).
Brodský T, Fermüller C, Aloimonos Y. Simultaneous estimation of viewing geometry and structure. In: Burkhardt H, Neumann B, editors. Computer Vision — ECCV'98Computer Vision — ECCV'98. Vol 1406. Springer Berlin / Heidelberg; 1998. 3. p. 342-358p. (Lecture Notes in Computer Science; vol 1406).
Bessiere K, Ceaparu I, Lazar J, Robinson J, Shneiderman B. Social and psychological influences on computer user frustration. In: Media access: Social and psychological dimensions of new technology useMedia access: Social and psychological dimensions of new technology use.; 2004. 9. p. 91-103p.
Boehm B, Basili VR. Software defect reduction top 10 list. In: Foundations of empirical software engineering: the legacy of Victor R. Basili.; 2005. 4. p. 426.
Kaâniche M, Kanoun K, Cukier M, Martini M. Software reliability analysis of three successive generations of a Switching System. In: Echtle K, Hammer D, Powell D, editors. Dependable Computing — EDCC-1. Vol 852. Springer Berlin / Heidelberg; 1994. 4. p. 471-490p. (Lecture Notes in Computer Science; vol 852).
O'Leary DP. Some Themes in Gene H.Golub's Work on Iterative Methods. In: Golub GH, Greenbaum A, Luskin M, editors. Recent Advances in Iterative MethodsRecent Advances in Iterative Methods. Vol 60. New York: Springer-Verlag IMA Volumes in Mathematics and Its Applications; 1994. 1. p. 1-11p.
Cheong LF, Fermüller C, Aloimonos Y. Spatiotemporal representations for visual navigation. In: Buxton B, Cipolla R, editors. Computer Vision — ECCV '96Computer Vision — ECCV '96. Vol 1064. Springer Berlin / Heidelberg; 1996. 6. p. 671-684p. (Lecture Notes in Computer Science; vol 1064).
Sharma P, Khurana U, Shneiderman B, Scharrenbroich M, Locke J. Speeding Up Network Layout and Centrality Measures for Social Computing Goals. In: Salerno J, Yang S, Nau DS, Chai S-K, editors. Social Computing, Behavioral-Cultural Modeling and PredictionSocial Computing, Behavioral-Cultural Modeling and Prediction. Vol 6589. Springer Berlin / Heidelberg; 2011. 2. p. 244-251p. (Lecture Notes in Computer Science; vol 6589).
Jogt NK, Shneiderman B. Starfield visualization with interactive smooth zooming. In: Visual database systems, IIIVisual database systems, III. Vol 3.; 1995. 1. p. 1.
Turaga P, Veeraraghavan A, Srivastava A, Chellappa R. Statistical Analysis on Manifolds and Its Applications to Video Analysis. In: Schonfeld D, Shan C, Tao D, Wang L, editors. Video Search and MiningVideo Search and Mining. Vol 287. Springer Berlin / Heidelberg; 2010. 1. p. 115-144p. (Studies in Computational Intelligence; vol 287).
Fermüller C, Aloimonos Y. Statistics Explains Geometrical Optical Illusions. In: Davis LS, editor. Foundations of Image UnderstandingFoundations of Image Understanding. Vol 628. Springer US; 2001. 4. p. 409-445p. (The Kluwer International Series in Engineering and Computer Science; vol 628).
Papamanthou C, Shi E, Tamassia R, Yi K. Streaming Authenticated Data Structures. In: Johansson T, Nguyen PQ, editors. Advances in Cryptology – EUROCRYPT 2013. Springer Berlin Heidelberg; 2013. 3. p. 353-370p. (Lecture Notes in Computer Science).
Nixon MS, Tan T, Chellappa R. Subjects Allied to Gait. In: Human Identification Based on GaitHuman Identification Based on Gait.; 2006. 5. p. 5-15p.
Oriol M, Hicks MW. Tagged Sets: A Secure and Transparent Coordination Medium. In: Jacquet J-M, Picco G, editors. Coordination Models and LanguagesCoordination Models and Languages. Vol 3454. Springer Berlin / Heidelberg; 2005. 1. p. 193-205p. (Lecture Notes in Computer Science; vol 3454).
Shneiderman B. Technology-Mediated Social Participation: Deep Science and Extreme Technology. In: An A, Lingras P, Petty S, Huang R, editors. Active Media TechnologyActive Media Technology. Vol 6335. Springer Berlin / Heidelberg; 2010. 1. p. 1-4p. (Lecture Notes in Computer Science; vol 6335).
Ahn J-, Taieb-Maimon M, Sopan A, Plaisant C, Shneiderman B. Temporal Visualization of Social Network Dynamics: Prototypes for Nation of Neighbors. In: Salerno J, Yang S, Nau DS, Chai S-K, editors. Social Computing, Behavioral-Cultural Modeling and PredictionSocial Computing, Behavioral-Cultural Modeling and Prediction. Vol 6589. Springer Berlin / Heidelberg; 2011. 3. p. 309-316p. (Lecture Notes in Computer Science; vol 6589).
Memon AM. TESTING EVENT-DRIVEN SOFTWARE–THE NEXT QA CHALLENGE?. In: Software Engineering and DevelopmentSoftware Engineering and Development. Nova Science Publishers, Inc.; 2009. 1. p. 187.

Pages