Publications
Export 467 results:
Author Title [ Type] Year Filters: First Letter Of Title is M [Clear All Filters]
2006. Model based verification and validation of distributed control architectures. Proceedings of Convergence Convergence International Congress and Exposition on Transportation Electronics, Detroit, USA.
1991. Model group indexing for recognition. Computer Vision and Pattern Recognition, 1991. Proceedings CVPR '91., IEEE Computer Society Conference on. :4-9.
1999. A model of lateralization and asymmetries in cortical maps. Neural Networks, 1999. IJCNN'99. International Joint Conference on. 1:121-124.
2005. Model of Object-Based Coding for Surveillance Video. Proceedings in the ICASSP'04 IEEE International Conference on Computer Vision. :693-696.
2006. Model-based mapping of image registration applications onto configurable hardware. Signals, Systems and Computers, 2006. ACSSC'06. Fortieth Asilomar Conference on. :1453-1457.
2006. Model-based OpenMP implementation of a 3D facial pose tracking system. 2006 International Conference on Parallel Processing Workshops, 2006. ICPP 2006 Workshops. :8pp.-73-8pp.-73.
2011. A Model-Based Schedule Representation for Heterogeneous Mapping of Dataflow Graphs. 2011 IEEE International Symposium on Parallel and Distributed Processing Workshops and Phd Forum (IPDPSW). :70-81.
2006. Model-based testing of community-driven open-source GUI applications. Software Maintenance, 2006. ICSM'06. 22nd IEEE International Conference on. :145-154.
2004. Model-driven data acquisition in sensor networks. Proceedings of the Thirtieth international conference on Very large data bases - Volume 30. :588-599.
1992. Model-driven mapping onto distributed memory parallel computers. Proceedings of the 1992 ACM/IEEE conference on Supercomputing. :818-829.
2006. Modeling Age Progression in Young Faces. Computer Vision and Pattern Recognition, 2006 IEEE Computer Society Conference on. 1:387-394.
2009. Modeling and analysis of content identification. Multimedia and Expo, 2009. ICME 2009. IEEE International Conference on. :1528-1531.
2009. Modeling and analysis of ordinal ranking in content fingerprinting. Information Forensics and Security, 2009. WIFS 2009. First IEEE International Workshop on. :116-120.
2010. Modeling and generalization of discrete Morse terrain decompositions. Proc. 20th Int. Conf. on Pattern Recognition, ICPR. 10:999-1002.
2011. Modeling and optimization of dynamic signal processing in resource-aware sensor networks. 2011 8th IEEE International Conference on Advanced Video and Signal-Based Surveillance (AVSS). :449-454.
1994. Modeling brain adaptation to focal damage.. Proceedings of the Annual Symposium on Computer Application in Medical Care. :860-860.
2009. Modeling content fingerprints using markov random fields. Information Forensics and Security, 2009. WIFS 2009. First IEEE International Workshop on. :111-115.
1990. Modeling diagnostic problem-solving at multiple levels of abstraction. Artificial Intelligence Applications, 1990., Sixth Conference on. :55-61vol.1-55-61vol.1.
2011. Modeling diverse standpoints in text classification: learning to be human by modeling human values. Proceedings of the 2011 iConference. :672-673.
1996. Modeling, Evaluation, and Testing of Paradyn Instrumentation System. Proceedings of the 1996 ACM/IEEE Conference on Supercomputing, 1996. :18-18.
2006. Modeling identity in archival collections of email: A preliminary study. Proceedings of the 2006 Conference on Email and Anti-Spam (CEAS 06). :95-103.
2005. Modeling image processing systems with homogeneous parameterized dataflow graphs. Acoustics, Speech, and Signal Processing, 2005. Proceedings. (ICASSP '05). IEEE International Conference on. 5:v/133-v/136Vol.5-v/133-v/136Vol.5.
2012. Modeling Images using Transformed Indian Buffet Processes. International Conference of Machine Learning.
2001. Modeling information content using observable behavior. PROCEEDINGS OF THE ANNUAL MEETING-AMERICAN SOCIETY FOR INFORMATION SCIENCE. 38:481-488.
2005. Modeling insider attacks on group key-exchange protocols. Proceedings of the 12th ACM conference on Computer and communications security. :180-189.