Publications
Export 1830 results:
Author Title Type [ Year] Filters: First Letter Of Last Name is D [Clear All Filters]
2013. Large-Scale Signature Matching Using Multi-stage Hashing. Document Analysis and Recognition (ICDAR), 2013 12th International Conference on. :976-980.
2013. Large-Scale Signature Matching Using Multi-stage Hashing. Document Analysis and Recognition (ICDAR), 2013 12th International Conference on. :976-980.
2013. Real-time No-Reference Image Quality Assessment based on Filter Learning. International Conference on Computer Vision and Pattern Recognition (CVPR).
2013. Segmenting time-lapse phase contrast images of adjacent NIH 3T3 cells.. Journal of microscopy. 249(1):41-52.
2013. Structural similarity for document image classification and retrieval. Pattern Recognition Letters.
2013. Unsupervised Classification of Structurally Similar Document Images. International Conference on Document Analysis and Recognition.
2012. Ask WINE: Are We Safer Today? Evaluating Operating System Security Through Big Data Analysis LEET'12 Proceedings of the 5th USENIX conference on Large-Scale Exploits and Emergent Threats. :11-11.
2012. BEAGLE: An Application Programming Interface and High-Performance Computing Library for Statistical Phylogenetics. Systematic BiologySyst Biol. 61(1):170-173.
2012. Before We Knew It: An Empirical Study of Zero-day Attacks in the Real World. CCS '12 Proceedings of the 2012 ACM conference on Computer and Communications Security. :833-844.
2012. On the Centrality of Off-Line E-Cash to Concrete Partial Information Games. Security and Cryptography for Networks. :264-280.
2012. On the Centrality of Off-Line E-Cash to Concrete Partial Information Games. Security and Cryptography for Networks. :264-280.
2012. Class consistent k-means: Application to face and action recognition. Computer Vision and Image Understanding. 116(6):730-741.
2012. Density-Based Multifeature Background Subtraction with Support Vector Machine. Pattern Analysis and Machine Intelligence, IEEE Transactions on. 34(5):1017-1023.
2012. Efficient FMM accelerated vortex methods in three dimensions via the Lamb-Helmholtz decomposition. arXiv:1201.5430.
2012. Efficient Password Authenticated Key Exchange via Oblivious Transfer. Public Key Cryptography – PKC 2012. :449-466.
2012. Face Identification Using Large Feature Sets. Image Processing, IEEE Transactions on. 21(4):2245-2255.
2012. GAGE: A Critical Evaluation of Genome Assemblies and Assembly Algorithms. Genome Research. 22(3):557-567.
2012. Gene Prediction with Glimmer for Metagenomic Sequences Augmented by Classification and Clustering. Nucleic Acids ResearchNucl. Acids Res.. 40(1):e9-e9-e9-e9.