Publications

Export 604 results:
Author [ Title(Desc)] Type Year
Filters: First Letter Of Last Name is J  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
I
Vegas S, Juristo N, Basili VR.  2003.  Identifying Relevant Information for Testing Technique Selection: An Instantiated Characterization Schema.
Jaeger S, Ma H, Doermann D.  2005.  Identifying Script on Word-Level with Informational Confidence. 8th Int. Conf. on Document Analysis and Recognition. :416-420.
Basri R, Jacobs DW.  2011.  Illumination modeling for face recognition. Handbook of face recognition. :169-195.
Mei X, Ling H, Jacobs DW.  2011.  Illumination Recovery From Image With Cast Shadows Via Sparse Representation. Image Processing, IEEE Transactions on. 20(8):2366-2377.
Zhou SK, Chellappa R, Jacobs DW.  2004.  Illumination, Reflectance, and Reflection-Characterization of Human Faces under Illumination Variations Using Rank, Integrability, and Symmetry Constraints. Lecture Notes in Computer Science. 3021:588-601.
Fermüller C, Ji H, Kitaoka A.  2010.  Illusory motion due to causal time filtering. Vision research. 50(3):315-329.
Fermüller C, Ji H.  2007.  Illusory Motion Due to Causal Time Filtering. Journal of Vision. 7(9):977-977.
Le Moigne J, Cole-Rhodes A, Eastman R, Jain P, Joshua A, Memarsadeghi N, Mount D, Netanyahu N, Morisette J, Uko-Ozoro E.  2006.  Image Registration and Fusion Studies for the Integration of Multiple Remote Sensing Data. Acoustics, Speech and Signal Processing, 2006. ICASSP 2006 Proceedings. 2006 IEEE International Conference on. 5:V-V.
Le Moigne J, Cole-Rhodes A, Eastman R, Jain P, Joshua A, Memarsadeghi N, Mount D, Netanyahu N, Morisette J, Uko-Ozoro E.  2006.  Image Registration and Fusion Studies for the Integration of Multiple Remote Sensing Data. Acoustics, Speech and Signal Processing, 2006. ICASSP 2006 Proceedings. 2006 IEEE International Conference on. 5:V-V.
Jallad K, Katz J, Schneier B.  2002.  Implementation of chosen-ciphertext attacks against PGP and GnuPG. Information Security. :90-101.
Smorul M, Song S, JaJa JF.  2009.  An Implementation of the Audit Control Environment (ACE) to Support the Long Term Integrity of Digital Archives. Proceedings of DigCCurr2009 Digital Curation: Practice, Promise and Prospects. :164-164.
Jung J H, O'Leary DP.  2008.  Implementing an Interior Point Method for Linear Programs on a CPU-GPU System. Electronic Transactions on Numerical Analysis. 28:174-189.
Feamster N, Johari R, Balakrishnan H.  2005.  Implications of autonomy for the expressiveness of policy routing. Proceedings of the 2005 conference on Applications, technologies, architectures, and protocols for computer communications. :25-36.
Feamster N, Johari R, Balakrishnan H.  2007.  Implications of Autonomy for the Expressiveness of Policy Routing. Networking, IEEE/ACM Transactions on. 15(6):1266-1279.
Jakobsson M, Elaine Shi, Golle P, Chow R.  2009.  Implicit authentication for mobile devices. :9-9.
Elaine Shi, Niu Y, Jakobsson M, Chow R.  2011.  Implicit Authentication through Learning User Behavior. Information Security. 6531:99-113.
King D, Hicks B, Hicks MW, Jaeger T.  2008.  Implicit Flows: Can’t Live with ‘Em, Can’t Live without ‘Em. Information Systems SecurityInformation Systems Security. 5352:56-70.
Halperin E, Srinivasan A.  2002.  Improved Approximation Algorithms for the Partial Vertex Cover Problem. Approximation Algorithms for Combinatorial OptimizationApproximation Algorithms for Combinatorial Optimization. 2462:161-174.
Zhuolin Jiang, Li S-F, Jia X-P, Zhu H-L.  2008.  An improved mean shift tracking method based on nonparametric clustering and adaptive bandwidth. Machine Learning and Cybernetics, 2008 International Conference on. 5:2779-2784.
Zhuolin Jiang, Li S-F, Jia X-P, Zhu H-L.  2008.  An improved mean shift tracking method based on nonparametric clustering and adaptive bandwidth. Machine Learning and Cybernetics, 2008 International Conference on. 5:2779-2784.
Haas BJ, Delcher AL, Mount SM, Wortman JR, Jr R SK, Hannick LI, Maiti R, Ronning CM, Rusch DB, Town CD et al..  2003.  Improving the Arabidopsis genome annotation using maximal transcript alignment assemblies. Nucleic Acids ResearchNucl. Acids Res.. 31(19):5654-5666.
Chen HF, Belhumeur PN, Jacobs DW.  2000.  In search of illumination invariants. Computer Vision and Pattern Recognition, 2000. Proceedings. IEEE Conference on. 1:254-261vol.1-254-261vol.1.
Nutanong S, Jacox EH, Samet H.  2011.  An incremental Hausdorff distance calculation algorithm. Proceedings of the VLDB Endowment. 4(8):506-517.
Jensen CS, Mark L, Roussopoulos N.  1991.  Incremental implementation model for relational databases with transaction time. IEEE Transactions on Knowledge and Data Engineering. 3(4):461-473.
JaJa JF, Prasanna Kumar VK.  1984.  Information Transfer in Distributed Computing with Applications to VLSI. Journal of the ACM (JACM). 31(1):150-162.

Pages