Publications

Export 292 results:
[ Author(Asc)] Title Type Year
Filters: First Letter Of Title is F  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
R
Rao Y, Mundur P, Yesha Y.  2006.  Fuzzy svm ensembles for relevance feedback in image retrieval. Image and Video Retrieval. :350-359.
Rand W, Wilensky U.  2007.  Full Spectrum Modeling: From Simplicity to Elaboration and Realism in Urban Pattern Formation. North american association computational social and organization sciences conference (NAACSOS).
Ran Y, Chellappa R, Zheng Q.  2006.  Finding Gait in Space and Time. Pattern Recognition, 2006. ICPR 2006. 18th International Conference on. 4:586-589.
Ramasamy HV, Cukier M, Sanders WH.  2002.  Formal specification and verification of a group membership protocol for an intrusion-tolerant group communication system. :9-18.
Ramasamy HV, Cukier M, Sanders WH.  2003.  Formal verification of an intrusion-tolerant group membership protocol. IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS E SERIES D. 86(12):2612-2622.
Ramanathan N, Chellappa R, Roy Chowdhury AK.  2004.  Facial similarity across age, disguise, illumination and pose. Image Processing, 2004. ICIP '04. 2004 International Conference on. 3:1999-2002Vol.3-1999-2002Vol.3.
Ramanathan N, Chellappa R.  2006.  Face Verification Across Age Progression. Image Processing, IEEE Transactions on. 15(11):3349-3361.
Ramachandran M, Veeraraghavan A, Chellappa R.  2011.  A Fast Bilinear Structure from Motion Algorithm Using a Video Sequence and Inertial Sensors. IEEE Transactions on Pattern Analysis and Machine Intelligence. 33(1):186-193.
Ramachandran M, Veeraraghavan A, Chellappa R.  2007.  Fast Bilinear SfM with Side Information. Computer Vision, 2007. ICCV 2007. IEEE 11th International Conference on. :1-8.
Ramachandran A, Seetharaman S, Feamster N, Vazirani V.  2008.  Fast monitoring of traffic subpopulations. Proceedings of the 8th ACM SIGCOMM conference on Internet measurement. :257-270.
Ramachandran A, Feamster N, Vempala S.  2007.  Filtering spam with behavioral blacklisting. Proceedings of the 14th ACM conference on Computer and communications security. :342-351.
Ramachandran A, Feamster N, Krishnamurthy B, Spatscheck O, Van der Merwe J.  2008.  Fishing for Phishing from the Network Stream. GT-CS-08-08
P
Pugh W.  1999.  Fixing the Java memory model. Proceedings of the ACM 1999 conference on Java Grande. :89-98.
Pugh W, Kelly W.  1995.  Finding Legal Reordering Transformations using Mappings. Languages and compilers for parallel computing: 7th International Workshop, Ithaca, NY, USA, August 8-10, 1994: proceedings. 7:107-107.
Priyadarshi A, Gupta SK.  2006.  Finding Mold-Piece Regions Using Computer Graphics Hardware. Geometric Modeling and Processing - GMP 2006. 4077:655-662.
Pratikakis P, Foster JS, Hicks MW, Neamtiu I.  2008.  Formalizing Soundness of Contextual Effects. Theorem Proving in Higher Order LogicsTheorem Proving in Higher Order Logics. 5170:262-277.
Porter A.  1997.  Fundamental laws and assumptions of software maintenance. Empirical Software Engineering. 2(2):119-131.
Plaisant C, Laboratory H-computer I.  1993.  Facilitating Data Exploration: Dynamic Queries On A Health Statistics Map. Proc. of the Government Statistics Section, Annual Meeting of the American Statistical Assoc. Conf. Proc, pg. :18-23.
Panconesi A, Srinivasan A.  1992.  Fast randomized algorithms for distributed edge coloring. Proceedings of the eleventh annual ACM symposium on Principles of distributed computing. :251-262.
Paluska, Saff, Yeh, Chen.  2003.  Footloose: a case for physical eventual consistency and selective conflict resolution. Mobile Computing Systems and Applications, 2003. Proceedings. Fifth IEEE Workshop on. :170-179.
O
O'Leary DP, Stewart G.W.  1987.  From Determinacy to Systaltic Arrays. Computers, IEEE Transactions on. C-36(11):1355-1359.
O'Leary DP.  1987.  Fine and Medium Grained Parallel Algorithms for Matrix QR Factorization. Algorithms and Applications on Vector and Parallel ComputersAlgorithms and Applications on Vector and Parallel Computers. :347-349.
N
Nixon MS, Tan T, Chellappa R.  2006.  Future Challenges. Human Identification Based on GaitHuman Identification Based on Gait. :151-170.
Nixon MS, Tan T, Chellappa R.  2006.  Further Gait Developments. Human Identification Based on GaitHuman Identification Based on Gait. :135-149.
Nirkhe M, Kraus S, Perlis D.  1991.  Fully deadline-coupled planning: One step at a time. Methodologies for Intelligent Systems. :589-599.

Pages