Publications
Export 1858 results:
Author Title [ Type] Year Filters: First Letter Of Last Name is C [Clear All Filters]
2006. Computer Vision, Statistics in. Encyclopedia of Statistical SciencesEncyclopedia of Statistical Sciences.
2006. Computer Vision, Statistics in. Encyclopedia of Statistical SciencesEncyclopedia of Statistical Sciences.
2005. Detecting Independent 3D Movement. Handbook of Geometric ComputingHandbook of Geometric Computing. :383-401.
2006. Detection, Isolation, and Identification of Vibrio cholerae from the Environment. Current Protocols in MicrobiologyCurrent Protocols in Microbiology. :6A.5.1-6A.5.38-6A.5.1-6A.5.38.
1996. Directions of motion fields are hardly ever ambiguous. Computer Vision — ECCV '96Computer Vision — ECCV '96. 1065:119-128.
2011. Distributed Sensing and Processing for Multi-Camera Networks. Distributed Video Sensor NetworksDistributed Video Sensor Networks. :85-101.
2007. Distribution-Free Testing Lower Bounds for Basic Boolean Functions. Approximation, Randomization, and Combinatorial Optimization. Algorithms and Techniques. :494-508.
1999. Dynamic queries. Readings in information visualizationReadings in information visualization. :235-235.
2006. Early Recognition Approaches. Human Identification Based on GaitHuman Identification Based on Gait. :35-43.
2008. Effective Visualization of File System Access-Control. Visualization for Computer Security. :18-25.
2012. Efficient Password Authenticated Key Exchange via Oblivious Transfer. Public Key Cryptography – PKC 2012. :449-466.
2005. Evaluation Methodologies for Visual Analytics. Illuminating the Path: The Research and Development Agenda for Visual AnalyticsIlluminating the Path: The Research and Development Agenda for Visual Analytics. :150-157.
2010. Evolutionary framework for Lepidoptera model systems. Genetics and Molecular Biology of LepidopteraGenetics and Molecular Biology of Lepidoptera. :1-24.
2008. Expanding the reach of Grid computing: combining Globus- and BOINC-based systems. Grids for Bioinformatics and Computational BiologyGrids for Bioinformatics and Computational Biology. :71-85.
2001. Experimental Analysis of Algorithms for Bilateral-Contract Clearing Mechanisms Arising in Deregulated Power Industry. Algorithm EngineeringAlgorithm Engineering. 2141:172-184.
2002. Experimental Evaluation of the Unavailability Induced by a Group Membership Protocol. Dependable Computing EDCC-4. 2485:644-648.
2009. Face Recognition from Video. The Essential Guide to Video Processing (Second Edition)The Essential Guide to Video Processing (Second Edition). :653-688.
2011. Face Tracking and Recognition in Video. Handbook of Face RecognitionHandbook of Face Recognition. :323-351.
2008. Finding Corrupted Computers Using Imperfect Intrusion Prevention System Event Data. Computer Safety, Reliability, and Security. 5219:221-234.
2008. Finding Corrupted Computers Using Imperfect Intrusion Prevention System Event Data. Computer Safety, Reliability, and Security. 5219:221-234.
1999. Fisheye views. Readings in information visualizationReadings in information visualization. :311-311.
1999. Focus+ context. Readings in information visualizationReadings in information visualization. :306-309.
2004. Free-Living to Freewheeling: The Evolution of Vibrio cholerae from Innocence to Infamy. Infectious Disease and Host-Pathogen EvolutionInfectious Disease and Host-Pathogen Evolution. :198-198.