Publications

Export 538 results:
[ Author(Desc)] Title Type Year
Filters: First Letter Of Title is A  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
A
Abd-Almageed W, Smith CE.  2004.  Active deformable models using density estimation. International Journal of Image and Graphics. 4(3):343-362.
Abdelkader MF, Roy-Chowdhury AK, Chellappa R, Akdemir U.  2008.  Activity representation using 3D shape models. J. Image Video Process.. 2008:5:1–5:16-5:1–5:16.
Agarwal PK, Guibas LJ, Edelsbrunner H, Erickson J, Isard M, Har-Peled S, Hershberger J, Jensen C, Kavraki L, Koehl P et al..  2002.  Algorithmic issues in modeling motion. ACM Comput. Surv.. 34(4):550-572.
Aggarwal G, Feder T, Kenthapadi K, Khuller S, Panigrahy R, Thomas D, Zhu A.  2006.  Achieving anonymity via clustering. Proceedings of the twenty-fifth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems. :153-162.
Aggarwal G, Panigrahy R, Feder T, Thomas D, Kenthapadi K, Khuller S, Zhu A.  2010.  Achieving anonymity via clustering. ACM Trans. Algorithms. 6(3):49:1–49:19-49:1–49:19.
Agrawal A, Chellappa R, Raskar R.  2005.  An algebraic approach to surface reconstruction from gradient fields. Computer Vision, 2005. ICCV 2005. Tenth IEEE International Conference on. 1:174-181Vol.1-174-181Vol.1.
Agrawala AK, Ricart G.  1980.  An Algorithm for Mutual Exclusion in Computer Networks..
Ahlberg C, Shneiderman B.  1994.  The alphaslider: a compact and rapid selector. Proceedings of the SIGCHI conference on Human factors in computing systems: celebrating interdependence. :365-371.
Albrecht M, Gentry C, Halevi S, Katz J.  2009.  Attacking cryptographic schemes based on "perturbation polynomials". Proceedings of the 16th ACM conference on Computer and communications security. :1-10.
Algazi VR, Duda RO, Duraiswami R, Gumerov NA, Tang Z.  2002.  Approximating the head-related transfer function using simple geometric models of the head and torso. The Journal of the Acoustical Society of America. 112:2053-2053.
Aloimonos Y.  1993.  Active Perception, Vol. I of Advances in Computer Vision series.
Aloimonos Y.  1993.  Active perception..
Aloimonos Y, Weiss I, Bandyopadhyay A.  1988.  Active vision. International Journal of Computer Vision. 1(4):333-356.
Aloimonos Y, Fermüller C.  2000.  Analyzing Action Representations. Algebraic Frames for the Perception-Action CycleAlgebraic Frames for the Perception-Action Cycle. 1888:1-21.
Aloimonos Y, Duric Z.  1992.  Active egomotion estimation: a qualitative approach. Computer Vision—ECCV'92. :497-510.
Aloimonos Y.  1993.  Active vision revisited. Active Perception.
Alva U, Gupta SK, Gupta RK.  2000.  Automated design of sheet metal bending tools.
Alva U, Gupta SK.  1999.  Automated punch shape synthesis for sheet metal bending operations.
Alva U, Gupta SK.  2001.  Automated design of sheet metal punches for bending multiple parts in a single setup. Robotics and Computer-Integrated Manufacturing. 17(1–2):33-47.
Andersen DG, Balakrishnan H, Feamster N, Koponen T, Moon D, Shenker S.  2008.  Accountable internet protocol (aip). SIGCOMM Comput. Commun. Rev.. 38(4):339-350.
Anderson ML, Josyula D, Perlis D, Purang K.  2004.  Active logic for more effective human-computer interaction and other commonsense applications. Proceedings of the Workshop Empirically Successful First-Order Reasoning, International Joint Conference on Automated Reasoning.
Anderson ML, Gomaa W, Grant J, Perlis D.  2008.  Active logic semantics for a single agent in a static world. Artificial Intelligence. 172(8-9):1045-1063.
Andrade H, Kurc T, Sussman A, Saltz J.  2002.  Active Proxy-G: Optimizing the query execution process in the Grid. Proceedings of the 2002 ACM/IEEE conference on Supercomputing. :1-15.
Andrade H, Kurc T, Sussman A, Saltz J.  2007.  Active semantic caching to optimize multidimensional data analysis in parallel and distributed environments. Parallel Computing. 33(7-8):497-520.
Arbaugh WA, Keromytis AD, Farber DJ, Smith JM.  1998.  Automated recovery in a secure bootstrap process. Proceedings of the Symposium on Network and Distributed Systems Security (NDSS’98). :155-167.

Pages