Publications

Export 1830 results:
Author Title Type [ Year(Asc)]
Filters: First Letter Of Last Name is D  [Clear All Filters]
2013
Du X, Abdalmageed W, Doermann D.  2013.  Large-Scale Signature Matching Using Multi-stage Hashing. Document Analysis and Recognition (ICDAR), 2013 12th International Conference on. :976-980.
Du X, Abdalmageed W, Doermann D.  2013.  Large-Scale Signature Matching Using Multi-stage Hashing. Document Analysis and Recognition (ICDAR), 2013 12th International Conference on. :976-980.
Ye P, Kumar J, Kang L, Doermann D.  2013.  Real-time No-Reference Image Quality Assessment based on Filter Learning. International Conference on Computer Vision and Pattern Recognition (CVPR).
Ye Q, Doermann D.  2013.  Scene Text Detection via Integrated Discrimination of Component Appearance and Consensus.
Chalfoun J, Kociolek M, Dima A, Halter M, Cardone A, Peskin A, Bajcsy P, Brady M.  2013.  Segmenting time-lapse phase contrast images of adjacent NIH 3T3 cells.. Journal of microscopy. 249(1):41-52.
Kumar J, Ye P, Doermann D.  2013.  Structural similarity for document image classification and retrieval. Pattern Recognition Letters.
Dumitras T, Narasimhan P.  2013.  A study of unpredictability in fault-tolerant middleware. Computer Networks. 57(3):682-698.
Kumar J, Doermann D.  2013.  Unsupervised Classification of Structurally Similar Document Images. International Conference on Document Analysis and Recognition.
Bitansky N, Dachman-Soled D, Garg S, Jain A, Kalai YTauman, López-Alt A, Wichs D.  2013.  Why “Fiat-Shamir for Proofs” Lacks a Proof. Theory of Cryptography. :182-201.
2012
Dumitras T, Efstathopoulos P.  2012.  Ask WINE: Are We Safer Today? Evaluating Operating System Security Through Big Data Analysis LEET'12 Proceedings of the 5th USENIX conference on Large-Scale Exploits and Emergent Threats. :11-11.
Roy A, Halder B, Garain U, Doermann D.  2012.  Automatic Authentication of Banknotes. IEEE Transactions on Information Forensics & Security.
Ayres DL, Darling A, Zwickl DJ, Beerli P, Holder MT, Lewis PO, Huelsenbeck JP, Ronquist F, Swofford DL, Cummings MP et al..  2012.  BEAGLE: An Application Programming Interface and High-Performance Computing Library for Statistical Phylogenetics. Systematic BiologySyst Biol. 61(1):170-173.
Bilge L, Dumitras T.  2012.  Before We Knew It: An Empirical Study of Zero-day Attacks in the Real World. CCS '12 Proceedings of the 2012 ACM conference on Computer and Communications Security. :833-844.
Choi SGeol, Dachman-Soled D, Yung M.  2012.  On the Centrality of Off-Line E-Cash to Concrete Partial Information Games. Security and Cryptography for Networks. :264-280.
Choi SGeol, Dachman-Soled D, Yung M.  2012.  On the Centrality of Off-Line E-Cash to Concrete Partial Information Games. Security and Cryptography for Networks. :264-280.
Zhuolin Jiang, Lin Z, Davis LS.  2012.  Class consistent k-means: Application to face and action recognition. Computer Vision and Image Understanding. 116(6):730-741.
V.S. Subrahmanian, Mannes A, Sliva A, Shakarian J, Dickerson JP.  2012.  Computational Analysis of Terrorist Groups: Lashkar-e-Taiba.
Dachman-Soled D, Gennaro R, Krawczyk H, Malkin T.  2012.  Computational Extractors and Pseudorandomness. Theory of Cryptography. :383-403.
Han B, Davis LS.  2012.  Density-Based Multifeature Background Subtraction with Support Vector Machine. Pattern Analysis and Machine Intelligence, IEEE Transactions on. 34(5):1017-1023.
De Floriani L, Čomić L.  2012.  Dimension-independent multi-resolution morse complexes. Computers & Graphics.
Gumerov NA, Duraiswami R.  2012.  Efficient FMM accelerated vortex methods in three dimensions via the Lamb-Helmholtz decomposition. arXiv:1201.5430.
Canetti R, Dachman-Soled D, Vaikuntanathan V, Wee H.  2012.  Efficient Password Authenticated Key Exchange via Oblivious Transfer. Public Key Cryptography – PKC 2012. :449-466.
Schwartz WR, Guo H, Choi J, Davis LS.  2012.  Face Identification Using Large Feature Sets. Image Processing, IEEE Transactions on. 21(4):2245-2255.
Salzberg SL, Phillippy AM, Zimin A, Puiu D, Magoc T, Koren S, Treangen TJ, Schatz MC, Delcher AL, Roberts M et al..  2012.  GAGE: A Critical Evaluation of Genome Assemblies and Assembly Algorithms. Genome Research. 22(3):557-567.
Kelley DR, Liu B, Delcher AL, Pop M, Salzberg SL.  2012.  Gene Prediction with Glimmer for Metagenomic Sequences Augmented by Classification and Clustering. Nucleic Acids ResearchNucl. Acids Res.. 40(1):e9-e9-e9-e9.

Pages