Publications

Export 359 results:
[ Author(Desc)] Title Type Year
Filters: First Letter Of Last Name is R  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
R
Ramachandran M, Zhou SK, Jhalani D, Chellappa R.  2005.  A method for converting a smiling face to a neutral face with applications to face recognition. Acoustics, Speech, and Signal Processing, 2005. Proceedings. (ICASSP '05). IEEE International Conference on. 2:ii/977-ii/980Vol.2-ii/977-ii/980Vol.2.
Ramachandran A, Feamster N, Dagon D.  2006.  Revealing botnet membership using DNSBL counter-intelligence. Proc. 2nd USENIX Steps to Reducing Unwanted Traffic on the Internet. :49-54.
Ramachandran AV, Feamster N.  2008.  Authenticated out-of-band communication over social links. Proceedings of the first workshop on Online social networks. :61-66.
Ramachandran M, Chellappa R.  2006.  Stabilization and Mosaicing of Airborne Videos. Image Processing, 2006 IEEE International Conference on. :345-348.
Ramachandran A, Seetharaman S, Feamster N, Vazirani V.  2007.  Building a Better Mousetrap. GIT-CSS-07-01
Ramachandran M, Veeraraghavan A, Chellappa R.  2008.  Video stabilization and mosaicing. The Essential Guide to Video Processing,. :109-138.
Ramachandran A, Feamster N.  2006.  Understanding the network-level behavior of spammers. Proceedings of the 2006 conference on Applications, technologies, architectures, and protocols for computer communications. :291-302.
Ramadan S, Abd-Almageed W, Smith CE.  2002.  Eye tracking using active deformable models. Proc. of the IIIrd Indian Conference on Computer Vision, Graphics and Image Processing.
Ramadan S, Davis LS.  2011.  Action recognition using Partial Least Squares and Support Vector Machines. Image Processing (ICIP), 2011 18th IEEE International Conference on. :533-536.
Ramage A, Elman H.  2007.  Some observations on multigrid convergence for convection–diffusion equations. Computing and Visualization in Science. 10(1):43-56.
Raman R, Vishkin U.  1994.  Optimal randomized parallel algorithms for computing the row maxima of a totally monotone matrix. Proceedings of the fifth annual ACM-SIAM symposium on Discrete algorithms. :613-621.
Raman R, Vishkin U.  1995.  Parallel algorithms for database operations and a database operation for parallel algorithms. Parallel Processing Symposium, 1995. Proceedings., 9th International. :173-179.
Raman V, Deshpande A, Hellerstein JM.  2003.  Using state modules for adaptive query processing. 19th International Conference on Data Engineering, 2003. Proceedings. :353-364.
Ramanathan N, Chellappa R.  2006.  Face Verification Across Age Progression. Image Processing, IEEE Transactions on. 15(11):3349-3361.
Ramanathan N, Chellappa R.  2008.  Modeling shape and textural variations in aging faces. Automatic Face Gesture Recognition, 2008. FG '08. 8th IEEE International Conference on. :1-8.
Ramanathan N, Chellappa R, Biswas S.  2009.  Computational methods for modeling facial aging: A survey. Journal of Visual Languages & Computing. 20(3):131-144.
Ramanathan N, Chellappa R, Roy Chowdhury AK.  2004.  Facial similarity across age, disguise, illumination and pose. Image Processing, 2004. ICIP '04. 2004 International Conference on. 3:1999-2002Vol.3-1999-2002Vol.3.
Ramanathan N, Chellappa R.  2007.  Recognizing Faces Across Age Progression. Face Biometrics for Personal IdentificationFace Biometrics for Personal Identification. :27-42.
Ramanathan N, Chellappa R.  2009.  Learning Facial Aging Models: A Face Recognition Perspective. Biometrics: theory, methods, and applications. 9:271-271.
Ramanathan N, Chellappa R.  2006.  Modeling Age Progression in Young Faces. Computer Vision and Pattern Recognition, 2006 IEEE Computer Society Conference on. 1:387-394.
Ramanathan N, Chellappa R.  2009.  How would you look as you age ? Image Processing (ICIP), 2009 16th IEEE International Conference on. :53-56.
Ramanathan N, Chellappa R, Biswas S.  2009.  Age progression in human faces: A survey. Journal of Visual Languages and Computing. 15:3349-3361.
Ramasamy HV, Cukier M, Sanders WH.  2002.  Formal specification and verification of a group membership protocol for an intrusion-tolerant group communication system. :9-18.
Ramasamy HV, Pandey P, Lyons J, Cukier M, Sanders WH.  2002.  Quantifying the cost of providing intrusion tolerance in group communication systems. :229-238.
Ramasamy HGV, Pandey P, Cukier M, Sanders WH.  2008.  Experiences with building an intrusion-tolerant group communication system. Software: Practice and Experience. 38(6):639-666.

Pages