Publications
Export 366 results:
Author Title [ Type] Year Filters: First Letter Of Last Name is E [Clear All Filters]
1994. Document page decomposition by integration of distributed soft decisions. International Conference on Neural Networks. :4022-4027.
1995. Data parallel programming in an adaptive environment. Parallel Processing Symposium, 1995. Proceedings., 9th International. :827-832.
2009. Cross-document coreference resolution: A key technology for learning by reading. AAAI Spring Symposium on Learning by Reading and Learning to Read.
2009. Cross-document coreference resolution: A key technology for learning by reading. AAAI Spring Symposium on Learning by Reading and Learning to Read.
1997. Controlled simplification of genus for polygonal models. Visualization '97., Proceedings. :403-410.
2009. Concurrent transition and shot detection in football videos using Fuzzy Logic. Image Processing (ICIP), 2009 16th IEEE International Conference on. :4341-4344.
2009. Computer Help at Home: Methods and Motivations for Informal Technical Support. SIGCHI '09. :739-748.
2009. Compressed sensing for Synthetic Aperture Radar imaging. 2009 16th IEEE International Conference on Image Processing (ICIP). :2141-2144.
2011. Component-based restoration of speckled images. 2011 18th IEEE International Conference on Image Processing (ICIP). :2797-2800.
2010. Challenges in personalized authority flow based ranking of social media. Proceedings of the 19th ACM international conference on Information and knowledge management. :1409-1412.
2003. The Challenge of Missing and Uncertain Data. Proceedings of the 14th IEEE Visualization 2003 (VIS'03). :100–-100–.
2010. cdec: A decoder, alignment, and learning framework for finite-state and context-free translation models. Proceedings of the ACL 2010 System Demonstrations. :7-12.
2003. Bootstrapping security associations for routing in mobile ad-hoc networks. IEEE Global Telecommunications Conference, 2003. GLOBECOM '03. 3:1511-1515vol.3-1511-1515vol.3.
2009. Assigning cameras to subjects in video surveillance systems. Robotics and Automation, 2009. ICRA '09. IEEE International Conference on. :837-843.
2012. Ask WINE: Are We Safer Today? Evaluating Operating System Security Through Big Data Analysis LEET'12 Proceedings of the 5th USENIX conference on Large-Scale Exploits and Emergent Threats. :11-11.
2009. Arabic Cross-Document Coreference Resolution. Proceedings of the ACL-IJCNLP 2009 Conference Short Papers$}$. :357-360.
1999. Agents vs. direct manipulation: what's best to disentangle the Web? Proceedings of the eighth international conference on World Wide Web.
2000. Visualization 2000.