Publications

Export 197 results:
[ Author(Desc)] Title Type Year
Filters: First Letter Of Title is B  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
J
Jacobs DW, Malik J, Nevatia R.  2000.  Breakout Session Report: Principles and Methods. Perceptual Organization for Artificial Vision Systems. :17-28.
Jacobs DW.  2003.  BAYESIAN AND STATISTICAL APPROACHES TO VISION-Natural Image Statistics and Perceptual Inference-What makes viewpoint-invariant properties perceptually salient? Journal of the Optical Society of America-A-Optics Image Science and Vision. 20(7):1304-1320.
JaJa JF, Ryu K W.  1994.  The block distributed memory model for shared memory multiprocessors. Parallel Processing Symposium, 1994. Proceedings., Eighth International. :752-756.
JaJa JF, Ryu K W.  1996.  The block distributed memory model. Parallel and Distributed Systems, IEEE Transactions on. 7(8):830-840.
Jakupciak JP, Colwell RR.  2009.  Biological agent detection technologies. Molecular Ecology Resources. 9(s1):51-57.
Ji H, Fermüller C.  2010.  Better Flow Estimation from Color Images-Volume 2007, Article ID 53912, 9 pages. EURASIP Journal on Advances in Signal Processing. 2007(23)
Ji H, Fermüller C.  2007.  Better flow estimation from color images. EURASIP Journal on Advances in Signal Processing. 2007(1):133-133.
Ji H, Fermüller C.  2004.  Bias in Shape Estimation. Computer Vision - ECCV 2004Computer Vision - ECCV 2004. 3023:405-416.
Jones R, DeMenthon D, Doermann D.  1999.  Building mosaics from video using MPEG motion vectors. LAMP-TR-035,CAR-TR-918,CS-TR-4034
Jones R, DeMenthon D, Doermann D.  1999.  Building Mosaics from Video Using MPEG Motion Vectors. ACM Conference on Multimedia. :29-32.
K
Kanungo T, Resnik P.  1998.  The Bible, Truth, and Multilingual OCR Evaluation.
Kanungo T, Resnik P, Mao S, Kim DW, Zheng Q.  2005.  The Bible and multilingual optical character recognition. Communications of the ACM. 48(6):124-130.
Katz J.  2004.  Binary tree encryption: Constructions and applications. Information Security and Cryptology-ICISC 2003. :1-11.
Katz J, Yerukhimovich A.  2009.  On black-box constructions of predicate encryption from trapdoor permutations. Advances in Cryptology–ASIACRYPT 2009. :197-213.
Katz J.  2008.  Bridging game theory and cryptography: recent results and future directions. Proceedings of the 5th conference on Theory of cryptography. :251-272.
Khuller S, Kim Y-A, Wan Y-C J.  2005.  Broadcasting on networks of workstations. Proceedings of the seventeenth annual ACM symposium on Parallelism in algorithms and architectures. :279-288.
Khuller S, Moss A, Naor JS.  1999.  The budgeted maximum coverage problem. Information Processing Letters. 70(1):39-45.
Khuller S, Raghavachari B, Young N.  1995.  Balancing minimum spanning trees and shortest-path trees. Algorithmica. 14(4):305-321.
Khuller S, Kim YA, Wan YCJ.  2010.  Broadcasting on networks of workstations. Algorithmica. 57(4):848-868.
Khuller S, Vishkin U.  1994.  Biconnectivity approximations and graph carvings. Journal of the ACM (JACM). 41(2):214-235.
Kim K, Chalidabhongse TH, Harwood D, Davis LS.  2004.  Background modeling and subtraction by codebook construction. Image Processing, 2004. ICIP '04. 2004 International Conference on. 5:3061-3064Vol.5-3061-3064Vol.5.
Kim K, Harwood D, Davis LS.  2005.  Background updating for visual surveillance. Advances in Visual Computing. :337-346.
Klavans JL, Resnik P.  1996.  The Balancing Act: Combining Symbolic and Statistical Approaches to Language.

Pages