Publications

Export 1435 results:
Author Title [ Type(Desc)] Year
Filters: First Letter Of Last Name is K  [Clear All Filters]
Book Chapters
Priyadarshi A, Gupta SK.  2006.  Finding Mold-Piece Regions Using Computer Graphics Hardware. Geometric Modeling and Processing - GMP 2006. 4077:655-662.
Khuller S, Martinez V, Nau DS, Simari G, Sliva A, Subrahmanian V.  2007.  Finding Most Probable Worlds of Probabilistic Logic Programs. Scalable Uncertainty Management. 4772:45-59.
Kale A, Cuntoor N, Yegnanarayana B, Rajagopalan AN, Chellappa R.  2003.  Gait Analysis for Human Identification. Audio- and Video-Based Biometric Person AuthenticationAudio- and Video-Based Biometric Person Authentication. 2688:1058-1058.
Kale A, Cuntoor N, Yegnanarayana B, Rajagopalan AN, Chellappa R.  2003.  Gait Analysis for Human Identification. Audio- and Video-Based Biometric Person AuthenticationAudio- and Video-Based Biometric Person Authentication. 2688:1058-1058.
Cohn G, Gupta S, Froehlich J, Larson E, Patel S.  2010.  GasSense: Appliance-Level, Single-Point Sensing of Gas Activity in the Home. Pervasive Computing. 6030:265-282.
Fermüller C, Aloimonos Y.  2001.  Geometry of Eye Design: Biology and Technology. Multi-Image Analysis. 2032:22-38.
Fermüller C, Cheong LF, Aloimonos Y.  1997.  The geometry of visual space distortion. Algebraic Frames for the Perception-Action CycleAlgebraic Frames for the Perception-Action Cycle. 1315:249-277.
Koller D, Friedman N, Getoor L, Taskar B.  2007.  Graphical Models in a Nutshell. Introduction to Statistical Relational LearningIntroduction to Statistical Relational Learning. :13-13.
Plishker W, Sane N, Kiemb M, Bhattacharyya SS.  2011.  Heterogeneous Design in Functional DIF. Transactions on High-Performance Embedded Architectures and Compilers IV. :391-408.
Chetty M, Sung J-Y, Grinter RE.  2007.  How Smart Homes Learn: The Evolution of the Networked Home and Household. UbiComp 2007: Ubiquitous Computing. :127-144.
Dorr BJ, He D, Luo J, Oard D, Schwartz R, Wang J, Zajic D.  2004.  iCLEF 2003 at Maryland: Translation Selection and Document Selection. Comparative Evaluation of Multilingual Information Access SystemsComparative Evaluation of Multilingual Information Access Systems. 3237:231-265.
Patel VM, Pillai JK, Chellappa R.  2011.  Image and Video-Based Biometrics. Visual Analysis of HumansVisual Analysis of Humans. :437-454.
King D, Hicks B, Hicks MW, Jaeger T.  2008.  Implicit Flows: Can’t Live with ‘Em, Can’t Live without ‘Em. Information Systems SecurityInformation Systems Security. 5352:56-70.
Kuter U, Sirin E, Nau DS, Parsia B, Hendler J.  2004.  Information Gathering During Planning for Web Service Composition. The Semantic Web – ISWC 2004. 3298:335-349.
Plaisant C.  2005.  Information Visualization and the Challenge of Universal Usability. Exploring GeovisualizationExploring Geovisualization. :53-82.
Krüger V, Zhou S, Chellappa R.  2006.  Integrating Video Information over Time. Example: Face Recognition from Video. Cognitive Vision SystemsCognitive Vision Systems. 3948:127-144.
Bansal N, Korula N, Nagarajan V, Srinivasan A.  2010.  On k-Column Sparse Packing Programs. Integer Programming and Combinatorial OptimizationInteger Programming and Combinatorial Optimization. 6080:369-382.
Kolda TG, O'Leary DP.  1999.  Latent Semantic Indexing via a Semi-Discrete Matrix Decomposition. The Mathematics of Information Coding, Extraction and DistributionThe Mathematics of Information Coding, Extraction and Distribution. :73-80.
Dorr BJ, Katsova M.  1998.  Lexical Selection for Cross-Language Applications: Combining LCS with WordNet. Machine Translation and the Information SoupMachine Translation and the Information Soup. 1529:438-447.
Kumar HP, Plaisant C, Shneiderman B.  1999.  LifeLines: Visualizing Personal Histories. Readings in Information Visualization: Using Vision to ThinkReadings in Information Visualization: Using Vision to Think. :285-285.
Khan Z, Balch T, Dellaert F.  2004.  An MCMC-Based Particle Filter for Tracking Multiple Interacting Targets. Computer Vision - ECCV 2004. :279-290.
Dachman-Soled D.  2014.  On Minimal Assumptions for Sender-Deniable Public Key Encryption. Public-Key Cryptography – PKC 2014. :574-591.
Hicks MW, Kakkar P, Moore J, Gunter C, Nettles S.  1999.  Network Programming Using PLAN. Internet Programming LanguagesInternet Programming Languages. 1686:127-143.
Kamara S, Papamanthou C.  2013.  Parallel and Dynamic Searchable Symmetric Encryption. Financial Cryptography and Data Security. :258-274.
Papamanthou C, Tollis IG.  2007.  Parameterized st-Orientations of Graphs: Algorithms and Experiments. Graph Drawing. :220-233.

Pages