Publications
Export 927 results:
Author Title Type [ Year] Filters: First Letter Of Last Name is W [Clear All Filters]
2001. Reading between the lines: Lessons from the SDMI challenge. Proceedings of the 10th USENIX Security Symposium. :13-17.
2001. The role of a natural language conversational interface in online sales: A case study. International Journal of Speech Technology. 4(3):285-295.
2001. Rotation, scale, and translation resilient public watermarking for images using a log-polar fourier transform. (6282300)
2001. Rotation, scale, and translation resilient watermarking for images. Image Processing, IEEE Transactions on. 10(5):767-782.
2001. Secure Health Information Sharing System: SHARE. Proceedings of the AMIA SymposiumProc AMIA Symp. :1060-1060.
2001. Vision Geometry X. Society of Photo-Optical Instrumentation Engineers (SPIE) Conference Series. 4476
2001. What can we reasonably expect from watermarks? Applications of Signal Processing to Audio and Acoustics, 2001 IEEE Workshop on the. :223-226.
2000. Adaptive Use of Iterative Methods in Predictor-Corrector Interior Point Methods for Linear Programming. Numerical Algorithms. 25:387-406.
2000. The analysis of a simple k-means clustering algorithm. Proceedings of the sixteenth annual symposium on Computational geometry. :100-109.
2000. Building a Chinese-English Mapping Between Verb Concepts for Multilingual Applications. Envisioning Machine Translation in the Information FutureEnvisioning Machine Translation in the Information Future. 1934:345-363.
2000. Chromatic nearest neighbor searching: A query sensitive approach. Computational Geometry. 17(3–4):97-119.
2000. Class representation and image retrieval with non-metric distances. IEEE Transactions on Pattern Analysis and Machine Intelligence (TPAMI). 22(583-600):1-1.
2000. Classification with nonmetric distances: image retrieval and class representation. Pattern Analysis and Machine Intelligence, IEEE Transactions on. 22(6):583-600.
2000. Comparative Evaluation of a Natural Language Dialog Based System and a Menu-Driven System for Information Access: A Case Study. In Proceedings of the International Conference on Multimedia Information Retrieval (RIAO 2000).
2000. Data hiding in digital binary image. Multimedia and Expo, 2000. ICME 2000. 2000 IEEE International Conference on. 1:393-396vol.1-393-396vol.1.
2000. A first step towards automated detection of buffer overrun vulnerabilities. The 2000 Network and Distributed Systems Security Conference. San Diego, CA. 14
2000. A Neural Network Approach for Predicting Network Resource Requirements in Video Transmission Systems. Proc. IEEE Pacific RIM Conference on Multimedia, Sydney, Australia.
2000. A Neural Network Approach for Predicting Network Resource Requirements in Video Transmission Systems. Proc. IEEE Pacific RIM Conference on Multimedia, Sydney, Australia.
2000. A protocol-independent technique for eliminating redundant network traffic. ACM SIGCOMM Computer Communication Review. 30(4):87-95.
2000. Quantile approximation for robust statistical estimation and k-enclosing problems. International Journal of Computational Geometry and Applications. 10(6):593-608.
2000. Review of "Architectures and mechanisms for language processing" by Matthew W. Crocker, Martin Pickering, and Charles Clifton. Cambridge University Press 2000.. Computational Linguistics. 26(4):648-651.