Publications
Export 377 results:
Author [ Title] Type Year Filters: First Letter Of Last Name is Y [Clear All Filters]
2004. Automatic video summarization for wireless and mobile environments. 2004 IEEE International Conference on Communications. 3:1532-1536Vol.3-1532-1536Vol.3.
2011. AVSS 2011 demo session: A large-scale benchmark dataset for event recognition in surveillance video. Advanced Video and Signal-Based Surveillance (AVSS), 2011 8th IEEE International Conference on. :527-528.
2005. Bayesian filtering and integral image for visual tracking. Proceedings of the Worshop on Image Analysis for Multimedia Interactive Services (WIAMIS'05).
2007. Bid based scheduler with backfilling for a multiprocessor system. Proceedings of the ninth international conference on Electronic commerce. :459-468.
2008. Bilateral symmetry of object silhouettes under perspective projection. 19th International Conference on Pattern Recognition, 2008. ICPR 2008. :1-4.
2008. Bilateral symmetry of object silhouettes under perspective projection. 19th International Conference on Pattern Recognition, 2008. ICPR 2008. :1-4.
2009. On black-box constructions of predicate encryption from trapdoor permutations. Advances in Cryptology–ASIACRYPT 2009. :197-213.
2011. Can Deliberately Incomplete Gene Sample Augmentation Improve a Phylogeny Estimate for the Advanced Moths and Butterflies (Hexapoda: Lepidoptera)? Systematic BiologySyst Biol. 60(6):782-796.
2011. A case for query by image and text content: searching computer help using screenshots and keywords. Proceedings of the 20th international conference on World wide web. :775-784.
2011. A case for query by image and text content: searching computer help using screenshots and keywords. Proceedings of the 20th international conference on World wide web. :775-784.
2012. On the Centrality of Off-Line E-Cash to Concrete Partial Information Games. Security and Cryptography for Networks. :264-280.
2009. Chance-constrained programs for link prediction. Proceedings of Workshop on Analyzing Networks and Learning with Graphs at NIPS Conference.
2006. Characterization of security notions for probabilistic private-key encryption. Journal of Cryptology. 19(1):67-95.
2012. Co-designing an e-health tutorial for older adults. Proceedings of the 2012 iConference. :240-247.
2007. Combining motion from texture and lines for visual navigation. IEEE/RSJ International Conference on Intelligent Robots and Systems, 2007. IROS 2007. :232-239.
2007. Compact, low power wireless sensor network system for line crossing recognition. Circuits and Systems, 2007. ISCAS 2007. IEEE International Symposium on. :2506-2509.
2000. Comparative Evaluation of a Natural Language Dialog Based System and a Menu-Driven System for Information Access: A Case Study. In Proceedings of the International Conference on Multimedia Information Retrieval (RIAO 2000).
2000. A comparison of voice controlled and mouse controlled web browsing. Proceedings of the fourth international ACM conference on Assistive technologies. :72-79.
2005. A Comparison of Voice Controlled and Mouse Controlled Web Browsing (2000). Institute for Systems Research Technical Reports.
2000. Complete characterization of security notions for probabilistic private-key encryption. Proceedings of the thirty-second annual ACM symposium on Theory of computing. :245-254.
1996. Computing 3-D head orientation from a monocular image sequence. Automatic Face and Gesture Recognition, 1996., Proceedings of the Second International Conference on. :242-247.
2007. COMPUTING PERFECT AND STABLE MODELS USING ORDERED MODEL TREES. Computational Intelligence. 11(1):89-112.