Publications
Export 538 results:
[ Author] Title Type Year Filters: First Letter Of Title is A [Clear All Filters]
2004. Active deformable models using density estimation. International Journal of Image and Graphics. 4(3):343-362.
2008. Activity representation using 3D shape models. J. Image Video Process.. 2008:5:1–5:16-5:1–5:16.
2006. Achieving anonymity via clustering. Proceedings of the twenty-fifth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems. :153-162.
2005. An algebraic approach to surface reconstruction from gradient fields. Computer Vision, 2005. ICCV 2005. Tenth IEEE International Conference on. 1:174-181Vol.1-174-181Vol.1.
1994. The alphaslider: a compact and rapid selector. Proceedings of the SIGCHI conference on Human factors in computing systems: celebrating interdependence. :365-371.
2009. Attacking cryptographic schemes based on "perturbation polynomials". Proceedings of the 16th ACM conference on Computer and communications security. :1-10.
2002. Approximating the head-related transfer function using simple geometric models of the head and torso. The Journal of the Acoustical Society of America. 112:2053-2053.
1993. Active perception..
2000. Analyzing Action Representations. Algebraic Frames for the Perception-Action CycleAlgebraic Frames for the Perception-Action Cycle. 1888:1-21.
2001. Automated design of sheet metal punches for bending multiple parts in a single setup. Robotics and Computer-Integrated Manufacturing. 17(1–2):33-47.
2004. Active logic for more effective human-computer interaction and other commonsense applications. Proceedings of the Workshop Empirically Successful First-Order Reasoning, International Joint Conference on Automated Reasoning.
2008. Active logic semantics for a single agent in a static world. Artificial Intelligence. 172(8-9):1045-1063.
2002. Active Proxy-G: Optimizing the query execution process in the Grid. Proceedings of the 2002 ACM/IEEE conference on Supercomputing. :1-15.
2007. Active semantic caching to optimize multidimensional data analysis in parallel and distributed environments. Parallel Computing. 33(7-8):497-520.
1998. Automated recovery in a secure bootstrap process. Proceedings of the Symposium on Network and Distributed Systems Security (NDSS’98). :155-167.