Publications

Export 292 results:
[ Author(Desc)] Title Type Year
Filters: First Letter Of Title is F  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
A
Aggarwal G, Chellappa R.  2005.  Face recognition in the presence of multiple illumination sources. Computer Vision, 2005. ICCV 2005. Tenth IEEE International Conference on. 2:1169-1176Vol.2-1169-1176Vol.2.
Agrawal A, Chellappa R.  2005.  Fusing Depth and Video Using Rao-Blackwellized Particle Filter. Pattern Recognition and Machine IntelligencePattern Recognition and Machine Intelligence. 3776:521-526.
Agrawala AK, Rauscher TG.  1976.  Foundations of microprogramming: architecture, software, and applications.
Anwer MB, Feamster N.  2009.  A Fast, Virtualized Data Plane for the NetFPGA. NetFPGA Developers Workshop, Stanford, California. :90-94.
Arya S, Phamdo N, Farvardin N, Mount D.  1993.  Fast search algorithms with applications to split and multi-stage vector quantization of speech lsp parameters. Speech Coding for Telecommunications, 1993. Proceedings., IEEE Workshop on. :65-66.
Atallah M, Vishkin U.  1984.  Finding Euler tours in parallel* 1. Journal of Computer and System Sciences. 29(3):330-337.
B
Baidya B, Gupta SK, Mukherjee T.  1998.  Feature-recognition for MEMS extraction. :13-16.
Balijepalli A, LeBrun TW, Gupta SK.  2006.  A flexible system framework for a nanoassembly cell using optical tweezers.
Balog K, de Vries AP, Serdyukov P, Wen J-R.  2012.  The first international workshop on entity-oriented search (EOS). SIGIR Forum. 45(2):43-50.
Baykal N, Reogia JA, Yalabik N, Erkmen A, Beksac M.S.  1996.  Feature discovery and classification of Doppler umbilical artery blood flow velocity waveforms. Computers in Biology and Medicine. 26(6):451-462.
Bender A, Sherwood R, Spring N.  2008.  Fixing ally's growing pains with velocity modeling. Proceedings of the 8th ACM SIGCOMM conference on Internet measurement. :337-342.
Bender A, Sherwood R, Monner D, Goergen N, Spring N, Bhattacharjee B.  2009.  Fighting Spam with the NeighborhoodWatch DHT. IEEE INFOCOM 2009. :1755-1763.
Berkman O, Vishkin U.  1994.  Finding level-ancestors in trees. Journal of Computer and System Sciences. 48(2):214-230.
Berkman O, Schieber B, Vishkin U.  1996.  A fast parallel algorithm for finding the convex hull of a sorted point set. International Journal of Computational Geometry and Applications. 6:231-242.
Berlin K, O'Leary DP, Fushman D.  2011.  Fast approximations of the rotational diffusion tensor and their application to structural assembly of molecular complexes. Proteins: Structure, Function, and Bioinformatics. 79(7):2268-2281.
Berman P, Hannenhalli S.  1996.  Fast sorting by reversal. Combinatorial Pattern MatchingCombinatorial Pattern Matching. 1075:168-185.
Bhanu B, Govindaraju V.  2011.  Face Tracking and Recognition in a Camera Network. Multibiometrics for Human IdentificationMultibiometrics for Human Identification.
Bierman G, Hicks MW, Sewell P, Stoyle G.  2003.  Formalizing dynamic software updating. Proceedings of the Second International Workshop on Unanticipated Software Evolution (USE).
Black MJ, Fleet DJ, Yacoob Y.  1998.  A framework for modeling appearance change in image sequences. Computer Vision, 1998. Sixth International Conference on. :660-667.
Bonsignore EM, Dunne C, Rotman D, Smith M, Capone T, Hansen DL, Shneiderman B.  2009.  First Steps to Netviz Nirvana: Evaluating Social Network Analysis with NodeXL. International Conference on Computational Science and Engineering, 2009. CSE '09. 4:332-339.
Brauer JR, Mayergoyz ID.  2004.  Finite-element computation of nonlinear magnetic diffusion and its effects when coupled to electrical, mechanical, and hydraulic systems. Magnetics, IEEE Transactions on. 40(2):537-540.
Byrka J, Srinivasan A, Swamy C.  2010.  Fault-Tolerant Facility Location: A Randomized Dependent LP-Rounding Algorithm. Integer Programming and Combinatorial OptimizationInteger Programming and Combinatorial Optimization. 6080:244-257.
C
Canetti R, Halevi S, Katz J.  2007.  A forward-secure public-key encryption scheme. Journal of Cryptology. 20(3):265-294.
Canetti R, Halevi S, Katz J.  2003.  A forward-secure public-key encryption scheme. Advances in Cryptology—Eurocrypt 2003. :646-646.
Card SK, Mackinlay JD, Shneiderman B.  1999.  Focus+ context. Readings in information visualizationReadings in information visualization. :306-309.

Pages