Publications

Export 927 results:
Author Title [ Type(Desc)] Year
Filters: First Letter Of Last Name is W  [Clear All Filters]
Conference Papers
Lu W, M. Wu.  2011.  Seam carving estimation using forensic hash. Proceedings of the thirteenth ACM multimedia workshop on Multimedia and security. :9-14.
Lu W, Varna AL, Swaminathan A, M. Wu.  2009.  Secure image retrieval through feature protection. Acoustics, Speech and Signal Processing, 2009. ICASSP 2009. IEEE International Conference on. :1533-1536.
Lu W, Varna A, M. Wu.  2011.  Secure video processing: Problems and challenges. Acoustics, Speech and Signal Processing (ICASSP), 2011 IEEE International Conference on. :5856-5859.
Mao Y, M. Wu.  2004.  Security evaluation for communication-friendly encryption of multimedia. Image Processing, 2004. ICIP '04. 2004 International Conference on. 1:569-572Vol.1-569-572Vol.1.
Mao Y, M. Wu.  2006.  Security Issues in Cooperative Communications: Tracing Adversarial Relays. Acoustics, Speech and Signal Processing, 2006. ICASSP 2006 Proceedings. 2006 IEEE International Conference on. 4:IV-IV.
Swaminathan A, Mao Y, M. Wu.  2005.  Security of feature extraction in image hashing. Acoustics, Speech, and Signal Processing, 2005. Proceedings. (ICASSP '05). IEEE International Conference on. 2:ii/1041-ii/1044Vol.2-ii/1041-ii/1044Vol.2.
Garg R, Varna AL, M. Wu.  2011.  "Seeing" ENF: natural time stamp for digital video via optical sensing and signal processing. Proceedings of the 19th ACM international conference on Multimedia. :23-32.
Chuang W-H, M. Wu.  2010.  Semi non-intrusive training for cell-phone camera model linkage. Information Forensics and Security (WIFS), 2010 IEEE International Workshop on. :1-6.
M. Wu, Mao Y, Swaminathan A.  2007.  A Signal Processing and Randomization Perspective of Robust and Secure Image Hashing. Statistical Signal Processing, 2007. SSP '07. IEEE/SP 14th Workshop on. :166-170.
Cohen J, Varshney A, Manocha D, Turk G, Weber H, Agarwal P, Brooks F, Wright W.  1996.  Simplification envelopes. Proceedings of the 23rd annual conference on Computer graphics and interactive techniques. :119-128.
Cohen J, Varshney A, Manocha D, Turk G, Weber H, Agarwal P, Brooks F, Wright W.  1996.  Simplification envelopes. Proceedings of the 23rd annual conference on Computer graphics and interactive techniques. :119-128.
Desimone R, Wilkins DE, Bienkowski M, desJardins M.  1993.  SOCAP: lessons learned in automating military operations planning. Proceedings of the 6th international conference on Industrial and engineering applications of artificial intelligence and expert systems. :384-393.
Ramachandran A, Dasgupta A, Feamster N, Weinberger K.  2011.  Spam or ham?: characterizing and detecting fraudulent "not spam" reports in web mail systems Proceedings of the 8th Annual Collaboration, Electronic messaging, Anti-Abuse and Spam Conference. :210-219.
Weiss K, De Floriani L.  2008.  Sparse terrain pyramids. Proceedings of the 16th ACM SIGSPATIAL international conference on Advances in geographic information systems. :15:1–15:10-15:1–15:10.
Ottino-Loffler J, Rand W, Wilensky U.  2007.  A spatial model of the red queen effect. Proceedings of the 9th annual conference on Genetic and evolutionary computation. :490-491.
Knudtzon K, Druin A, Kaplan N, Summers K, Chisik Y, Kulkarni R, Moulthrop S, Weeks H, Bederson BB.  2003.  Starting an intergenerational technology design team: a case study. Proceedings of the 2003 conference on Interaction design and children. :51-58.
Williams LR, Jacobs DW.  1995.  Stochastic completion fields: a neural model of illusory contour shape and salience. Computer Vision, 1995. Proceedings., Fifth International Conference on. :408-415.
Eubank S, Kumar AVS, Marathe MV, Srinivasan A, Wang N.  2004.  Structural and algorithmic aspects of massive social networks. Proceedings of the fifteenth annual ACM-SIAM symposium on Discrete algorithms. :718-727.
Somasundaran S, Namata G, Wiebe J, Getoor L.  2009.  Supervised and unsupervised methods in employing discourse relations for improving opinion polarity classification. Proceedings of the 2009 Conference on Empirical Methods in Natural Language Processing: Volume 1 - Volume 1. :170-179.
Berwick RC, Weinberg A.  1983.  Syntactic constraints and efficient parsability. :119-122.
Weissman A, Ananthanarayanan A, Gupta SK, Sriram RD.  2010.  A Systematic Methodology for Accurate Design-Stage Estimation of Energy Consumption for Injection Molded Parts.
Wu J S-C, Sussman A.  2007.  Taking Advantage of Collective Operation Semantics for Loosely Coupled Simulations. Parallel and Distributed Processing Symposium, International. :128-128.
Chuang W-H, Swaminathan A, M. Wu.  2009.  Tampering identification using Empirical Frequency Response. Acoustics, Speech and Signal Processing, 2009. ICASSP 2009. IEEE International Conference on. :1517-1520.
Hutchinson H, Mackay W, Westerlund B, Bederson BB, Druin A, Plaisant C, Beaudouin-Lafon M, Conversy S, Evans H, Hansen H et al..  2003.  Technology probes: inspiring design for and with families. Proceedings of the SIGCHI conference on Human factors in computing systems. :17-24.
Olsen M, Traum D, Van Ess-Dykema C, Weinberg A, Dolan R.  2000.  Telicity as a cue to temporal and discourse structure in Chinese-English machine translation. :34-41.

Pages