Export 160 results:
[ Author(Asc)] Title Type Year
Filters: First Letter Of Last Name is J  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
Joo S-W, Chellappa R.  2006.  Recognition of Multi-Object Events Using Attribute Grammars. Image Processing, 2006 IEEE International Conference on. :2897-2900.
Joo S-W, Chellappa R.  2007.  A Multiple-Hypothesis Approach for Multiobject Visual Tracking. Image Processing, IEEE Transactions on. 16(11):2849-2854.
Jong F D, Oard D, Heeren W, Ordelman R.  2008.  Access to recorded interviews. Journal on Computing and Cultural Heritage. 1:1-27.
Jong F D, Oard D, Ordelman R, Raaijmakers S.  2007.  Searching spontaneous conversational speech. ACM SIGIR Forum. 41:104-104.
Jones R, DeMenthon D, Doermann D.  1999.  Building Mosaics from Video Using MPEG Motion Vectors. ACM Conference on Multimedia. :29-32.
Jones T, Shneiderman B.  1990.  Examining usability for a training-oriented hypertext: Can hyper-activity be good? Electronic Publishing. 3(4):207-225.
Jones R, DeMenthon D, Doermann D.  1999.  Building mosaics from video using MPEG motion vectors. LAMP-TR-035,CAR-TR-918,CS-TR-4034
J. Johnson I, Labich N, Might M, Van Horn D.  2013.  Optimizing Abstract Abstract Machines. arXiv:1211.3722 [cs].
Johnson B, Shneiderman B.  1993.  Treemaps. Sparks of innovation in human-computer interaction. 284:309-309.
Johnson B, Shneiderman B.  1991.  Tree-maps: a space-filling approach to the visualization of hierarchical information structures. , IEEE Conference on Visualization, 1991. Visualization '91, Proceedings. :284-291.
Johnson CN, Bowers JC, Griffitt KJ, Molina V, Clostio RW, Pei S, Laws E, Paranjpye RN, Strom MS, Chen A et al..  2012.  Ecology of Vibrio parahaemolyticus and Vibrio vulnificus in the Coastal and Estuarine Waters of Louisiana, Maryland, Mississippi, and Washington (United States). Applied and Environmental Microbiology. (20):7249-7257.
Johnson B, Shneiderman B, Baker MJ, Eick SG.  1999.  TennisViewer: A Browser for Competition Trees. Readings in information visualization: using vision to think. :149-149.
Jogt NK, Shneiderman B.  1995.  Starfield visualization with interactive smooth zooming. Visual database systems, IIIVisual database systems, III. 3:1-1.
Jog N, Shneiderman B.  1994.  User Controlled Smooth Zooming for Information Visualization. Institute for Systems Research Technical Reports.
Jog N, Shneiderman B.  1995.  Starfield information visualization with interactive smooth zooming. Proc. IFIP 2.6 Visual Databases Systems. :3-14.
Jog N, Shneiderman B.  1998.  Interactive Smooth Zoomming in a Starfield Information Visualization. Technical Reports of the Computer Science Department.
Jiwnani K, Zelkowitz MV.  2004.  Susceptibility matrix: a new aid to software auditing. Security Privacy, IEEE. 2(2):16-21.
Jiwnani K, Zelkowitz MV.  2002.  Security Testing using a Susceptibility Matrix. International Symposioum on Software Reliability Engineering. 13
Jiwnani K, Zelkowitz MV.  2002.  Maintaining software with a security perspective. Software Maintenance, 2002. Proceedings. International Conference on. :194-203.
Jim T, Swamy N, Hicks MW.  2007.  Defeating script injection attacks with browser-enforced embedded policies. Proceedings of the 16th international conference on World Wide Web. :601-610.
Jim T, Morrisett G, Grossman D, Hicks MW, Cheney J, Wang Y.  2002.  Cyclone: A safe dialect of C. USENIX Annual Technical Conference. :275-288.
Zhuolin Jiang, Lin Z, Davis LS.  2012.  Class consistent k-means: Application to face and action recognition. Computer Vision and Image Understanding. 116(6):730-741.
Zhuolin Jiang, Zhang G, Davis LS.  2012.  Submodular Dictionary Learning for Sparse Coding. IEEE conference on Computer Vision and Pattern Recognition.
Zhuolin Jiang, Li S-F, Jia X-P, Zhu H-L.  2008.  An improved mean shift tracking method based on nonparametric clustering and adaptive bandwidth. Machine Learning and Cybernetics, 2008 International Conference on. 5:2779-2784.
Zhuolin Jiang, Li SF, Gao DF.  2008.  Design and implementation of blackboard-based system for human detection. Jisuanji Gongcheng/ Computer Engineering. 34(2)