Publications

Export 160 results:
[ Author(Asc)] Title Type Year
Filters: First Letter Of Last Name is J  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
J
Joo S-W, Chellappa R.  2006.  Attribute Grammar-Based Event Recognition and Anomaly Detection. Computer Vision and Pattern Recognition Workshop, 2006. CVPRW '06. Conference on. :107-107.
Joo S-W, Chellappa R.  2006.  Recognition of Multi-Object Events Using Attribute Grammars. Image Processing, 2006 IEEE International Conference on. :2897-2900.
Jong F D, Oard D, Ordelman R, Raaijmakers S.  2007.  Searching spontaneous conversational speech. ACM SIGIR Forum. 41:104-104.
Jong F D, Oard D, Heeren W, Ordelman R.  2008.  Access to recorded interviews. Journal on Computing and Cultural Heritage. 1:1-27.
Jones R, DeMenthon D, Doermann D.  1999.  Building Mosaics from Video Using MPEG Motion Vectors. ACM Conference on Multimedia. :29-32.
Jones T, Shneiderman B.  1990.  Examining usability for a training-oriented hypertext: Can hyper-activity be good? Electronic Publishing. 3(4):207-225.
Jones R, DeMenthon D, Doermann D.  1999.  Building mosaics from video using MPEG motion vectors. LAMP-TR-035,CAR-TR-918,CS-TR-4034
Johnson CN, Bowers JC, Griffitt KJ, Molina V, Clostio RW, Pei S, Laws E, Paranjpye RN, Strom MS, Chen A et al..  2012.  Ecology of Vibrio parahaemolyticus and Vibrio vulnificus in the Coastal and Estuarine Waters of Louisiana, Maryland, Mississippi, and Washington (United States). Applied and Environmental Microbiology. (20):7249-7257.
Johnson B, Shneiderman B, Baker MJ, Eick SG.  1999.  TennisViewer: A Browser for Competition Trees. Readings in information visualization: using vision to think. :149-149.
J. Johnson I, Labich N, Might M, Van Horn D.  2013.  Optimizing Abstract Abstract Machines. arXiv:1211.3722 [cs].
Johnson B, Shneiderman B.  1993.  Treemaps. Sparks of innovation in human-computer interaction. 284:309-309.
Johnson B, Shneiderman B.  1991.  Tree-maps: a space-filling approach to the visualization of hierarchical information structures. , IEEE Conference on Visualization, 1991. Visualization '91, Proceedings. :284-291.
Jogt NK, Shneiderman B.  1995.  Starfield visualization with interactive smooth zooming. Visual database systems, IIIVisual database systems, III. 3:1-1.
Jog N, Shneiderman B.  1994.  User Controlled Smooth Zooming for Information Visualization. Institute for Systems Research Technical Reports.
Jog N, Shneiderman B.  1995.  Starfield information visualization with interactive smooth zooming. Proc. IFIP 2.6 Visual Databases Systems. :3-14.
Jog N, Shneiderman B.  1998.  Interactive Smooth Zoomming in a Starfield Information Visualization. Technical Reports of the Computer Science Department.
Jiwnani K, Zelkowitz MV.  2004.  Susceptibility matrix: a new aid to software auditing. Security Privacy, IEEE. 2(2):16-21.
Jiwnani K, Zelkowitz MV.  2002.  Security Testing using a Susceptibility Matrix. International Symposioum on Software Reliability Engineering. 13
Jiwnani K, Zelkowitz MV.  2002.  Maintaining software with a security perspective. Software Maintenance, 2002. Proceedings. International Conference on. :194-203.
Jim T, Swamy N, Hicks MW.  2007.  Defeating script injection attacks with browser-enforced embedded policies. Proceedings of the 16th international conference on World Wide Web. :601-610.
Jim T, Morrisett G, Grossman D, Hicks MW, Cheney J, Wang Y.  2002.  Cyclone: A safe dialect of C. USENIX Annual Technical Conference. :275-288.
Zhuolin Jiang, Li SF, Jia XP, Zhu HL.  2009.  Classic triangular mesh subdivision algorithm. Jisuanji Gongcheng/ Computer Engineering. 35(6):7-10.
Zhuolin Jiang, Lin Z, Davis LS.  2011.  Learning a discriminative dictionary for sparse coding via label consistent K-SVD. Computer Vision and Pattern Recognition (CVPR), 2011 IEEE Conference on. :1697-1704.
Zhuolin Jiang, Li S-F, Gao D-F.  2006.  A Time Saving Method for Human Detection in Wide Angle Camera Images. Machine Learning and Cybernetics, 2006 International Conference on. :4029-4034.
Zhuolin Jiang, Lin Z, Davis LS.  2012.  Class consistent k-means: Application to face and action recognition. Computer Vision and Image Understanding. 116(6):730-741.

Pages