Publications

Export 377 results:
Author [ Title(Desc)] Type Year
Filters: First Letter Of Last Name is Y  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
A
Rao Y, Mundur P, Yesha Y.  2004.  Automatic video summarization for wireless and mobile environments. 2004 IEEE International Conference on Communications. 3:1532-1536Vol.3-1532-1536Vol.3.
Oh S, Hoogs A, Perera A, Cuntoor N, Chen C-C, Lee J T, Mukherjee S, Aggarwal JK, Lee H, Davis LS et al..  2011.  AVSS 2011 demo session: A large-scale benchmark dataset for event recognition in surveillance video. Advanced Video and Signal-Based Surveillance (AVSS), 2011 8th IEEE International Conference on. :527-528.
B
Khuller S, Raghavachari B, Young N.  1995.  Balancing minimum spanning trees and shortest-path trees. Algorithmica. 14(4):305-321.
Han B, Yang C, Duraiswami R, Davis LS.  2005.  Bayesian filtering and integral image for visual tracking. Proceedings of the Worshop on Image Analysis for Multimedia Interactive Services (WIAMIS'05).
Yahav I, Raschid L, Andrade H.  2007.  Bid based scheduler with backfilling for a multiprocessor system. Proceedings of the ninth international conference on Electronic commerce. :459-468.
Bitsakos K, Yi H, Yi L, Fermüller C.  2008.  Bilateral symmetry of object silhouettes under perspective projection. 19th International Conference on Pattern Recognition, 2008. ICPR 2008. :1-4.
Bitsakos K, Yi H, Yi L, Fermüller C.  2008.  Bilateral symmetry of object silhouettes under perspective projection. 19th International Conference on Pattern Recognition, 2008. ICPR 2008. :1-4.
Hu Y, Boyd-Graber J, III HDaume, Z Ying I.  2013.  Binary to Bushy: Bayesian Hierarchical Clustering with the Beta Coalescent. :1079-1087.
Katz J, Yerukhimovich A.  2009.  On black-box constructions of predicate encryption from trapdoor permutations. Advances in Cryptology–ASIACRYPT 2009. :197-213.
C
Cho S, Zwick A, Regier JC, Mitter C, Cummings MP, Yao J, Du Z, Zhao H, Kawahara AY, Weller S et al..  2011.  Can Deliberately Incomplete Gene Sample Augmentation Improve a Phylogeny Estimate for the Advanced Moths and Butterflies (Hexapoda: Lepidoptera)? Systematic BiologySyst Biol. 60(6):782-796.
Tom Yeh, White B, San Pedro J, Katz B, Davis LS.  2011.  A case for query by image and text content: searching computer help using screenshots and keywords. Proceedings of the 20th international conference on World wide web. :775-784.
Tom Yeh, White B, San Pedro J, Katz B, Davis LS.  2011.  A case for query by image and text content: searching computer help using screenshots and keywords. Proceedings of the 20th international conference on World wide web. :775-784.
Choi SGeol, Dachman-Soled D, Yung M.  2012.  On the Centrality of Off-Line E-Cash to Concrete Partial Information Games. Security and Cryptography for Networks. :264-280.
Doppa JR, Yu J, Tadepalli P, Getoor L.  2009.  Chance-constrained programs for link prediction. Proceedings of Workshop on Analyzing Networks and Learning with Graphs at NIPS Conference.
Katz J, Yung M.  2006.  Characterization of security notions for probabilistic private-key encryption. Journal of Cryptology. 19(1):67-95.
Xie B, Tom Yeh, Walsh G, Watkins I, Huang M.  2012.  Co-designing an e-health tutorial for older adults. Proceedings of the 2012 iConference. :240-247.
Bitsakos K, Yi L, Fermüller C.  2007.  Combining motion from texture and lines for visual navigation. IEEE/RSJ International Conference on Intelligent Robots and Systems, 2007. IROS 2007. :232-239.
Ye P, EDU UMD, Doermann D.  Submitted.  Combining preference and absolute judgements in a crowd-sourced setting. ics.uci.edu.
Shen CC, Kupershtok R, Yang B, Vanin FM, Shao X, Sheth D, Goldsman N, Balzano Q, Bhattacharyya SS.  2007.  Compact, low power wireless sensor network system for line crossing recognition. Circuits and Systems, 2007. ISCAS 2007. IEEE International Symposium on. :2506-2509.
Chai J, Jimmy Lin, Zadrozny W, Ye Y, Budzikowska M, Horvath V, Kambhatla N, Wolf C.  2000.  Comparative Evaluation of a Natural Language Dialog Based System and a Menu-Driven System for Information Access: A Case Study. In Proceedings of the International Conference on Multimedia Information Retrieval (RIAO 2000).
Christian K, Kules B, Shneiderman B, Youssef A.  2000.  A comparison of voice controlled and mouse controlled web browsing. Proceedings of the fourth international ACM conference on Assistive technologies. :72-79.
Christian K, Kules B, Shneiderman B, Youssef A.  2005.  A Comparison of Voice Controlled and Mouse Controlled Web Browsing (2000). Institute for Systems Research Technical Reports.
Katz J, Yung M.  2000.  Complete characterization of security notions for probabilistic private-key encryption. Proceedings of the thirty-second annual ACM symposium on Theory of computing. :245-254.
Horprasert T, Yacoob Y, Davis LS.  1996.  Computing 3-D head orientation from a monocular image sequence. Automatic Face and Gesture Recognition, 1996., Proceedings of the Second International Conference on. :242-247.
Fernández1 J A, Minker J, Yahya A.  2007.  COMPUTING PERFECT AND STABLE MODELS USING ORDERED MODEL TREES. Computational Intelligence. 11(1):89-112.

Pages