Publications

Export 1202 results:
Author Title [ Type(Asc)] Year
Filters: First Letter Of Last Name is L  [Clear All Filters]
Books
Boyer KL, Sarkar S, Feldman J, Granlund G, Horaud R, Hutchinson S, Jacobs DW, Kak A, Lowe D, Malik J.  1999.  Perceptual Organization in Computer Vision.
M. Wu, Liu B.  2003.  Multimedia Data Hiding.
Luebke D, Watson B, Cohen JD, Reddy M, Varshney A.  2002.  Level of Detail for 3D Graphics.
Katz J, Lindell Y.  2008.  Introduction to Modern Cryptography.
LeMoigne J, Netanyahu NS, Eastman RD.  2011.  Image Registration for Remote Sensing. :515.
Plaisant C, Morrison S, Skokowski C, Reesch J, Shneiderman B, of at Laboratory U M C P. H/C I, Channel F.  1995.  Human-Computer Interaction Laboratory 1995 Video Reports.
Zheng Y, Doermann D, Li H.  2008.  Handwritten Document Image Processing.
Liao HS, Osada M, Shneiderman B.  1992.  A formative evaluation of three interfaces for browsing directories using dynamic queries.
Levi S-T, Agrawala AK.  1994.  Fault tolerant system design. :440.
Dorr BJ, Lee J, Voss C, Suh S.  1995.  Development of interlingual lexical conceptual structures with syntactic markers for machine translation.
L\üttgen G, Von Der Beeck M, Cleaveland R.  2000.  A compositional approach to statecharts semantics. 25
Duderstadt J, Arms W, Messina P, Ellisman M, Atkins D, Fox E, Shneiderman B, Nissenbaum H, Lederberg J.  2001.  Becoming a Scholar in the Digital Age.
Mayergoyz ID, Lawson W.  1996.  Basic Electric Circuit Theory: A One-Semester Text.
Gupta AK, Fadel GM, Lewicki DG, Shabana AA, Royston TJ, Gupta SK, Hayes C, Herrmann JW, Dym CL, Schmidt LC.  2003.  19th Biennial Conference on Mechanical Vibration and Noise.
Book Chapters
Bitansky N, Dachman-Soled D, Garg S, Jain A, Kalai YTauman, López-Alt A, Wichs D.  2013.  Why “Fiat-Shamir for Proofs” Lacks a Proof. Theory of Cryptography. :182-201.
Agrawal A, Raskar R, Chellappa R.  2006.  What Is the Range of Surface Reconstructions from a Gradient Field? Computer Vision – ECCV 2006Computer Vision – ECCV 2006. 3951:578-591.
Ji H, Fermüller C.  2006.  Wavelet-Based Super-Resolution Reconstruction: Theory and Algorithm. Computer Vision – ECCV 2006Computer Vision – ECCV 2006. 3954:295-307.
Hansen D, Shneiderman B, Smith M.  2010.  Visualizing Threaded Conversation Networks: Mining Message Boards and Email Lists for Actionable Insights. Active Media TechnologyActive Media Technology. 6335:47-62.
Lee B, Parr C, Plaisant C, Bederson BB.  2006.  Visualizing Graphs as Trees: Plant a Seed and Watch it Grow. Graph DrawingGraph Drawing. 3843:516-518.
Bolle R, Aloimonos Y, Fermüller C.  1996.  Video representations. Recent Developments in Computer Vision. 1035:33-41.
Guo F, Chellappa R.  2006.  Video Mensuration Using a Stationary Camera. Computer Vision – ECCV 2006Computer Vision – ECCV 2006. 3953:164-176.
Lumezanu C, Baden R, Spring N, Bhattacharjee B.  2009.  Triangle Inequality and Routing Policy Violations in the Internet. Passive and Active Network MeasurementPassive and Active Network Measurement. 5448:45-54.
Hannenhalli S, Pevzner P.  1995.  Towards a computational theory of genome rearrangements. Computer Science TodayComputer Science Today. 1000:184-202.
Dix J, Munoz-Avila H, Nau DS, Zhang L.  2002.  Theoretical and Empirical Aspects of a Planner in a Multi-agent Environment. Logics in Artificial Intelligence. 2424:173-185.
Shneiderman B.  2010.  Technology-Mediated Social Participation: Deep Science and Extreme Technology. Active Media TechnologyActive Media Technology. 6335:1-4.

Pages