Publications

Search
Export 620 results:
Author Title [ Type(Desc)] Year
Filters: First Letter Of Last Name is T  [Clear All Filters]
Book Chapters
Nixon MS, Tan T, Chellappa R.  2006.  Further Gait Developments. Human Identification Based on GaitHuman Identification Based on Gait. :135-149.
Nixon MS, Tan T, Chellappa R.  2006.  Future Challenges. Human Identification Based on GaitHuman Identification Based on Gait. :151-170.
Nixon MS, Tan T, Chellappa R.  2006.  Gait Databases. Human Identification Based on GaitHuman Identification Based on Gait. :17-34.
Tamassia R, Palazzi B, Papamanthou C.  2009.  Graph Drawing for Security Visualization. Graph Drawing. :2-13.
Tamassia R, Palazzi B, Papamanthou C.  2009.  Graph Drawing for Security Visualization. Graph Drawing. :2-13.
Koller D, Friedman N, Getoor L, Taskar B.  2007.  Graphical Models in a Nutshell. Introduction to Statistical Relational LearningIntroduction to Statistical Relational Learning. :13-13.
Elaine Shi, Niu Y, Jakobsson M, Chow R.  2011.  Implicit Authentication through Learning User Behavior. Information Security. 6531:99-113.
Reeder F, Dorr BJ, Farwell D, Habash N, Helmreich S, Hovy E, Levin L, Mitamura T, Miller K, Rambow O et al..  2004.  Interlingual Annotation for MT Development. Machine Translation: From Real Users to ResearchMachine Translation: From Real Users to Research. 3265:236-245.
Basili VR, Turner AJ.  2005.  Iterative enhancement: a practical technique for software development. Foundations of Empirical Software Engineering: The Legacy of Victor R. BasiliFoundations of Empirical Software Engineering: The Legacy of Victor R. Basili. 1:28-28.
Nixon MS, Tan T, Chellappa R.  2006.  Model-Based Approaches. Human Identification Based on GaitHuman Identification Based on Gait. :107-133.
Ayan N, Dorr BJ, Habash N.  2004.  Multi-align: Combining Linguistic and Statistical Techniques to Improve Alignments for Adaptable MT. Machine Translation: From Real Users to ResearchMachine Translation: From Real Users to Research. 3265:17-26.
Papamanthou C, Tamassia R, Triandopoulos N.  2010.  Optimal Authenticated Data Structures with Multilinear Forms. Pairing-Based Cryptography - Pairing 2010. :246-264.
Papamanthou C, Tamassia R, Triandopoulos N.  2010.  Optimal Authenticated Data Structures with Multilinear Forms. Pairing-Based Cryptography - Pairing 2010. :246-264.
Papamanthou C, Tamassia R, Triandopoulos N.  2011.  Optimal Verification of Operations on Dynamic Sets. Advances in Cryptology – CRYPTO 2011. :91-110.
Papamanthou C, Tamassia R, Triandopoulos N.  2011.  Optimal Verification of Operations on Dynamic Sets. Advances in Cryptology – CRYPTO 2011. :91-110.
Papamanthou C, Tollis IG.  2007.  Parameterized st-Orientations of Graphs: Algorithms and Experiments. Graph Drawing. :220-233.
Yaman F, Adali S, Nau DS, Sapino M, Subrahmanian V.  2004.  Plan Databases: Model and Algebra. Foundations of Information and Knowledge Systems. 2942:302-319.
Yue Z, Zhao W, Chellappa R.  2005.  Pose-Encoded Spherical Harmonics for Robust Face Recognition Using a Single Image. Analysis and Modelling of Faces and GesturesAnalysis and Modelling of Faces and Gestures. 3723:229-243.
Udrea O, Yu D, Hung E, Subrahmanian V.  2005.  Probabilistic Ontologies and Relational Databases. On the Move to Meaningful Internet Systems 2005: CoopIS, DOA, and ODBASEOn the Move to Meaningful Internet Systems 2005: CoopIS, DOA, and ODBASE. 3760:1-17.
Getoor L, Friedman N, Koller D, Pfeffer A, Taskar B.  2007.  Probabilistic Relational Models. Introduction to Statistical Relational LearningIntroduction to Statistical Relational Learning. :129-129.
Tulyakov S, Jaeger S, Govindaraju V, Doermann D.  2008.  Review of Classifier Combination Methods. Studies in Computational Intelligence: Machine Learning in Document Analysis and RecognitionStudies in Computational Intelligence: Machine Learning in Document Analysis and Recognition. :361-386.
Konte M, Feamster N.  2012.  Re-wiring Activity of Malicious Networks. Passive and Active MeasurementPassive and Active Measurement. 7192:116-125.
Kumar V, Marathe M, Parthasarathy S, Srinivasan A.  2005.  Scheduling on Unrelated Machines Under Tree-Like Precedence Constraints. Approximation, Randomization and Combinatorial Optimization. Algorithms and TechniquesApproximation, Randomization and Combinatorial Optimization. Algorithms and Techniques. 3624:609-609.
Dachman-Soled D, Malkin T, Raykova M, Yung M.  2011.  Secure Efficient Multiparty Computing of Multivariate Polynomials and Applications. Applied Cryptography and Network Security. :130-146.
Albanese M, Turaga P, Chellappa R, Pugliese A, Subrahmanian V.  2010.  Semantic Video Content Analysis. Video Search and MiningVideo Search and Mining. 287:147-176.

Pages