Publications
Export 1435 results:
Author Title [ Type] Year Filters: First Letter Of Last Name is K [Clear All Filters]
2005. An architectural level design methodology for embedded face detection. Proceedings of the 3rd IEEE/ACM/IFIP international conference on Hardware/software codesign and system synthesis. :136-141.
1996. Archiving, indexing, and retrieval of video in compressed domain. SPIEConference on Multimedia Storage and Archiving Systems. 2916:78-89.
2010. Are developers complying with the process: an XP study. Proceedings of the 2010 ACM-IEEE International Symposium on Empirical Software Engineering and Measurement. :14:1–14:10-14:1–14:10.
1989. Assessing others' knowledge and ignorance. Proceedings of the 4th International Symposium on Methodologies for Intelligent Systems.
2009. Attacking cryptographic schemes based on "perturbation polynomials". Proceedings of the 16th ACM conference on Computer and communications security. :1-10.
1998. Automated recovery in a secure bootstrap process. Proceedings of the Symposium on Network and Distributed Systems Security (NDSS’98). :155-167.
2001. Automatically Tracking and Analyzing the Behavior of Live Insect Colonies. AGENTS '01 Proceedings of the Fifth International Conference on Autonomous Agents . :521-528.
2004. Background modeling and subtraction by codebook construction. Image Processing, 2004. ICIP '04. 2004 International Conference on. 5:3061-3064Vol.5-3061-3064Vol.5.
2007. Barrier pointing: using physical edges to assist target acquisition on mobile device touch screens. Proceedings of the 9th international ACM SIGACCESS conference on Computers and accessibility, October. :15-17.
2011. Believe Me—We Can Do This! Annotating Persuasive Acts in Blog Text. Workshops at the Twenty-Fifth AAAI Conference on Artificial Intelligence.
2012. #bias: Measuring the Tweeting Behavior of Propagandists. Sixth International AAAI Conference on Weblogs and Social Media.
2011. Blurring-invariant Riemannian metrics for comparing signals and images. 2011 IEEE International Conference on Computer Vision (ICCV). :1770-1775.
2008. Bridging game theory and cryptography: recent results and future directions. Proceedings of the 5th conference on Theory of cryptography. :251-272.
1997. Bringing treasures to the surface: iterative design for the Library of Congress National Digital Library Program. Proceedings of the SIGCHI conference on Human factors in computing systems. :518-525.
1998. Bringing treasures to the surface: previews and overviews in a prototype for the Library of Congress National Digital Library. CHI 98 conference summary on Human factors in computing systems. :187-188.
2005. Broadcasting on networks of workstations. Proceedings of the seventeenth annual ACM symposium on Parallelism in algorithms and architectures. :279-288.
2005. Broadcasting on networks of workstations. Proceedings of the seventeenth annual ACM symposium on Parallelism in algorithms and architectures. :279-288.
2010. Buffer management for multi-application image processing on multi-core platforms: Analysis and case study. 2010 IEEE International Conference on Acoustics Speech and Signal Processing (ICASSP). :1662-1665.
2004. Building an information retrieval test collection for spontaneous conversational speech. Proceedings of the 27th annual international ACM SIGIR conference on Research and development in information retrieval. :41-48.
2002. On cache replacement policies for servicing mixed data intensive query workloads. Proceedings of the 2nd Workshop on Caching, Coherence, and Consistency, held in conjunction with the 16th ACM International Conference on Supercomputing.
2006. CAM04-6: Single-Path Routing of Time-varying Traffic. Global Telecommunications Conference, 2006. GLOBECOM '06. IEEE. :1-6.