Publications
Export 90 results:
[ Author] Title Type Year Filters: Keyword is Educational institutions [Clear All Filters]
2001. Multimodal 3-D tracking and event detection via the particle filter. IEEE Workshop on Detection and Recognition of Events in Video, 2001. Proceedings. :20-27.
2003. A secure service discovery protocol for MANET. 14th IEEE Proceedings on Personal, Indoor and Mobile Radio Communications, 2003. PIMRC 2003. 1:502-506Vol.1-502-506Vol.1.
2004. High-performance MAC for high-capacity wireless LANs. 13th International Conference on Computer Communications and Networks, 2004. ICCCN 2004. Proceedings. :167-172.
2011. A survey of virtual LAN usage in campus networks. Communications Magazine, IEEE. 49(7):98-103.
2006. Frequency Independent Flexible Spherical Beamforming Via Rbf Fitting. 2006 IEEE International Conference on Acoustics, Speech and Signal Processing, 2006. ICASSP 2006 Proceedings. 5:V-V-V-V.
1999. Estimation of composite object and camera image motion. The Proceedings of the Seventh IEEE International Conference on Computer Vision, 1999. 1:190-197vol.1-190-197vol.1.
1993. Early vision processing using a multi-stage diffusion process. 1993 IEEE Computer Society Conference on Computer Vision and Pattern Recognition, 1993. Proceedings CVPR '93. :41-46.
2006. A Projective Invariant for Textures. 2006 IEEE Computer Society Conference on Computer Vision and Pattern Recognition. 2:1932-1939.
2009. ApproxRank: Estimating Rank for a Subgraph. IEEE 25th International Conference on Data Engineering, 2009. ICDE '09. :54-65.
2009. Finding comparable temporal categorical records: A similarity measure with an interactive visualization. IEEE Symposium on Visual Analytics Science and Technology, 2009. VAST 2009. :27-34.
2011. Simulating Audiences: Automating Analysis of Values, Attitudes, and Sentiment. Privacy, Security, Risk and Trust (PASSAT), 2011 IEEE Third International Conference on and 2011 IEEE Third International Confernece on Social Computing (SocialCom). :734-737.
2006. Managing policy updates in security-typed languages. 19th IEEE Computer Security Foundations Workshop, 2006. :13pp.-216-13pp.-216.
2007. Verified Enforcement of Security Policies for Cross-Domain Information Flows. IEEE Military Communications Conference, 2007. MILCOM 2007. :1-7.
1988. Optimal Computing Of Structure From Motion Using Point Correspondences In Two Frames. Proceedings of Second International Conference on Computer Vision. :449-453.
1998. Pictorial query trees for query specification in image databases. Fourteenth International Conference on Pattern Recognition, 1998. Proceedings. 1:919-921vol.1-919-921vol.1.
2010. Moving vistas: Exploiting motion for describing scenes. 2010 IEEE Conference on Computer Vision and Pattern Recognition (CVPR). :1911-1918.
2009. Understanding social computing participation with visual exploration tools. International Symposium on Collaborative Technologies and Systems, 2009. CTS '09. :xi-xii-xi-xii.
2000. Direct annotation: a drag-and-drop strategy for labeling photos. IEEE International Conference on Information Visualization, 2000. Proceedings. :88-95.
2004. Facilitating understanding of information visualizations: emerging principles and examples. Eighth International Conference on Information Visualisation, 2004. IV 2004. Proceedings.
2005. Turning information visualization innovations into commercial products: lessons to guide the next success. IEEE Symposium on Information Visualization, 2005. INFOVIS 2005. :241-244.
2000. Supporting creativity with powerful composition tools for artifacts and performances. Proceedings of the 33rd Annual Hawaii International Conference on System Sciences, 2000.
2002. P5 : a protocol for scalable anonymous communication. 2002 IEEE Symposium on Security and Privacy, 2002. Proceedings. :58-70.