Publications

Search
Export 1857 results:
Author Title [ Type(Desc)] Year
Filters: First Letter Of Last Name is C  [Clear All Filters]
Book Chapters
Chellappa R, Chowdhury A RK.  2006.  Computer Vision, Statistics in. Encyclopedia of Statistical SciencesEncyclopedia of Statistical Sciences.
Chellappa R, Chowdhury A RK.  2006.  Computer Vision, Statistics in. Encyclopedia of Statistical SciencesEncyclopedia of Statistical Sciences.
Corrochano E B, Ogale AS, Fermüller C, Aloimonos Y.  2005.  Detecting Independent 3D Movement. Handbook of Geometric ComputingHandbook of Geometric Computing. :383-401.
Huq A, Grim C, Colwell RR, Nair BG.  2006.  Detection, Isolation, and Identification of Vibrio cholerae from the Environment. Current Protocols in MicrobiologyCurrent Protocols in Microbiology. :6A.5.1-6A.5.38-6A.5.1-6A.5.38.
Brodsky T, Fermüller C, Aloimonos Y.  1996.  Directions of motion fields are hardly ever ambiguous. Computer Vision — ECCV '96Computer Vision — ECCV '96. 1065:119-128.
Sankaranarayanan AC, Chellappa R, Baraniuk RG.  2011.  Distributed Sensing and Processing for Multi-Camera Networks. Distributed Video Sensor NetworksDistributed Video Sensor Networks. :85-101.
Dachman-Soled D, Servedio RA.  2007.  Distribution-Free Testing Lower Bounds for Basic Boolean Functions. Approximation, Randomization, and Combinatorial Optimization. Algorithms and Techniques. :494-508.
Card SK, Mackinlay JD, Shneiderman B.  1999.  Dynamic queries. Readings in information visualizationReadings in information visualization. :235-235.
Nixon MS, Tan T, Chellappa R.  2006.  Early Recognition Approaches. Human Identification Based on GaitHuman Identification Based on Gait. :35-43.
Heitzmann A, Palazzi B, Papamanthou C, Tamassia R.  2008.  Effective Visualization of File System Access-Control. Visualization for Computer Security. :18-25.
Canetti R, Dachman-Soled D, Vaikuntanathan V, Wee H.  2012.  Efficient Password Authenticated Key Exchange via Oblivious Transfer. Public Key Cryptography – PKC 2012. :449-466.
Bhattacharya I, Getoor L.  2006.  Entity Resolution in Graphs. Mining Graph DataMining Graph Data. :311-344.
Laskowski S, Plaisant C.  2005.  Evaluation Methodologies for Visual Analytics. Illuminating the Path: The Research and Development Agenda for Visual AnalyticsIlluminating the Path: The Research and Development Agenda for Visual Analytics. :150-157.
Roe A, Weller S, Baixeras J, Brown JW, Cummings MP, Davis DR, Horak M, Kawahara AY, Mitter C, Parr CS et al..  2010.  Evolutionary framework for Lepidoptera model systems. Genetics and Molecular Biology of LepidopteraGenetics and Molecular Biology of Lepidoptera. :1-24.
Myers DS, Bazinet AL, Cummings MP.  2008.  Expanding the reach of Grid computing: combining Globus- and BOINC-based systems. Grids for Bioinformatics and Computational BiologyGrids for Bioinformatics and Computational Biology. :71-85.
Barrett C, Cook D, Hicks G, Faber V, Marathe A, Marathe M, Srinivasan A, Sussmann Y, Thornquist H.  2001.  Experimental Analysis of Algorithms for Bilateral-Contract Clearing Mechanisms Arising in Deregulated Power Industry. Algorithm EngineeringAlgorithm Engineering. 2141:172-184.
Joshi K, Cukier M, Sanders W.  2002.  Experimental Evaluation of the Unavailability Induced by a Group Membership Protocol. Dependable Computing EDCC-4. 2485:644-648.
Gopalan R, Schwartz WR, Chellappa R, Srivastava A.  2011.  Face Detection. Visual Analysis of HumansVisual Analysis of Humans. :71-90.
Zhou S K, Chellappa R, Aggarwal G.  2009.  Face Recognition from Video. The Essential Guide to Video Processing (Second Edition)The Essential Guide to Video Processing (Second Edition). :653-688.
Chellappa R, Du M, Turaga P, Zhou S K.  2011.  Face Tracking and Recognition in Video. Handbook of Face RecognitionHandbook of Face Recognition. :323-351.
Chrun D, Cukier M, Sneeringer G.  2008.  Finding Corrupted Computers Using Imperfect Intrusion Prevention System Event Data. Computer Safety, Reliability, and Security. 5219:221-234.
Chrun D, Cukier M, Sneeringer G.  2008.  Finding Corrupted Computers Using Imperfect Intrusion Prevention System Event Data. Computer Safety, Reliability, and Security. 5219:221-234.
Card SK, Mackinlay JD, Shneiderman B.  1999.  Fisheye views. Readings in information visualizationReadings in information visualization. :311-311.
Card SK, Mackinlay JD, Shneiderman B.  1999.  Focus+ context. Readings in information visualizationReadings in information visualization. :306-309.
Colwell RR, Faruque SM, Nair GB.  2004.  Free-Living to Freewheeling: The Evolution of Vibrio cholerae from Innocence to Infamy. Infectious Disease and Host-Pathogen EvolutionInfectious Disease and Host-Pathogen Evolution. :198-198.

Pages