Publications
Export 90 results:
[ Author] Title Type Year Filters: Keyword is Educational institutions [Clear All Filters]
2001. Multimodal 3-D tracking and event detection via the particle filter. IEEE Workshop on Detection and Recognition of Events in Video, 2001. Proceedings. :20-27.
2003. A secure service discovery protocol for MANET. 14th IEEE Proceedings on Personal, Indoor and Mobile Radio Communications, 2003. PIMRC 2003. 1:502-506Vol.1-502-506Vol.1.
2004. High-performance MAC for high-capacity wireless LANs. 13th International Conference on Computer Communications and Networks, 2004. ICCCN 2004. Proceedings. :167-172.
2011. A survey of virtual LAN usage in campus networks. Communications Magazine, IEEE. 49(7):98-103.
2006. Frequency Independent Flexible Spherical Beamforming Via Rbf Fitting. 2006 IEEE International Conference on Acoustics, Speech and Signal Processing, 2006. ICASSP 2006 Proceedings. 5:V-V-V-V.
1999. Estimation of composite object and camera image motion. The Proceedings of the Seventh IEEE International Conference on Computer Vision, 1999. 1:190-197vol.1-190-197vol.1.
1993. Early vision processing using a multi-stage diffusion process. 1993 IEEE Computer Society Conference on Computer Vision and Pattern Recognition, 1993. Proceedings CVPR '93. :41-46.
2006. A Projective Invariant for Textures. 2006 IEEE Computer Society Conference on Computer Vision and Pattern Recognition. 2:1932-1939.
2009. ApproxRank: Estimating Rank for a Subgraph. IEEE 25th International Conference on Data Engineering, 2009. ICDE '09. :54-65.
2009. Finding comparable temporal categorical records: A similarity measure with an interactive visualization. IEEE Symposium on Visual Analytics Science and Technology, 2009. VAST 2009. :27-34.
2011. Simulating Audiences: Automating Analysis of Values, Attitudes, and Sentiment. Privacy, Security, Risk and Trust (PASSAT), 2011 IEEE Third International Conference on and 2011 IEEE Third International Confernece on Social Computing (SocialCom). :734-737.
2006. Managing policy updates in security-typed languages. 19th IEEE Computer Security Foundations Workshop, 2006. :13pp.-216-13pp.-216.
2007. Verified Enforcement of Security Policies for Cross-Domain Information Flows. IEEE Military Communications Conference, 2007. MILCOM 2007. :1-7.
1988. Optimal Computing Of Structure From Motion Using Point Correspondences In Two Frames. Proceedings of Second International Conference on Computer Vision. :449-453.
1998. Pictorial query trees for query specification in image databases. Fourteenth International Conference on Pattern Recognition, 1998. Proceedings. 1:919-921vol.1-919-921vol.1.
2010. Moving vistas: Exploiting motion for describing scenes. 2010 IEEE Conference on Computer Vision and Pattern Recognition (CVPR). :1911-1918.
2000. Supporting creativity with powerful composition tools for artifacts and performances. Proceedings of the 33rd Annual Hawaii International Conference on System Sciences, 2000.
2009. Understanding social computing participation with visual exploration tools. International Symposium on Collaborative Technologies and Systems, 2009. CTS '09. :xi-xii-xi-xii.
2000. Direct annotation: a drag-and-drop strategy for labeling photos. IEEE International Conference on Information Visualization, 2000. Proceedings. :88-95.
2004. Facilitating understanding of information visualizations: emerging principles and examples. Eighth International Conference on Information Visualisation, 2004. IV 2004. Proceedings.
2005. Turning information visualization innovations into commercial products: lessons to guide the next success. IEEE Symposium on Information Visualization, 2005. INFOVIS 2005. :241-244.
2002. P5 : a protocol for scalable anonymous communication. 2002 IEEE Symposium on Security and Privacy, 2002. Proceedings. :58-70.