Publications
Export 160 results:
[ Author] Title Type Year Filters: First Letter Of Last Name is J [Clear All Filters]
2009. Classic triangular mesh subdivision algorithm. Jisuanji Gongcheng/ Computer Engineering. 35(6):7-10.
2011. Learning a discriminative dictionary for sparse coding via label consistent K-SVD. Computer Vision and Pattern Recognition (CVPR), 2011 IEEE Conference on. :1697-1704.
2006. A Time Saving Method for Human Detection in Wide Angle Camera Images. Machine Learning and Cybernetics, 2006 International Conference on. :4029-4034.
2012. Class consistent k-means: Application to face and action recognition. Computer Vision and Image Understanding. 116(6):730-741.
2012. Submodular Dictionary Learning for Sparse Coding. IEEE conference on Computer Vision and Pattern Recognition.
2008. An improved mean shift tracking method based on nonparametric clustering and adaptive bandwidth. Machine Learning and Cybernetics, 2008 International Conference on. 5:2779-2784.
2008. A topic-based Document Correlation Model. Machine Learning and Cybernetics, 2008 International Conference on. 5:2487-2491.
2004. Bias in Shape Estimation. Computer Vision - ECCV 2004Computer Vision - ECCV 2004. 3023:405-416.
2003. Uncertainty in 3D shape estimation. ICCV Workshop on Statistical and Computational Theories of Vision.
2006. Wavelet-Based Super-Resolution Reconstruction: Theory and Algorithm. Computer Vision – ECCV 2006Computer Vision – ECCV 2006. 3954:295-307.
2010. Better Flow Estimation from Color Images-Volume 2007, Article ID 53912, 9 pages. EURASIP Journal on Advances in Signal Processing. 2007(23)
2009. Robust Wavelet-Based Super-Resolution Reconstruction: Theory and Algorithm. IEEE Transactions on Pattern Analysis and Machine Intelligence. 31(4):649-660.
2007. Better flow estimation from color images. EURASIP Journal on Advances in Signal Processing. 2007(1):133-133.
2005. Integration of motion fields through shape. IEEE Computer Society Conference on Computer Vision and Pattern Recognition, 2005. CVPR 2005. 2:663-669vol.2-663-669vol.2.
2006. A 3D shape constraint on video. IEEE Transactions on Pattern Analysis and Machine Intelligence. 28(6):1018-1023.
2004. One-round protocols for two-party authenticated key exchange. Applied Cryptography and Network Security. :220-232.
1993. Using differential technlques to efficiently support transaction time. The VLDB JournalVLDB Journal. 2(1):75-111.
1991. Incremental implementation model for relational databases with transaction time. IEEE Transactions on Knowledge and Data Engineering. 3(4):461-473.
1996. CLP (SC): Implementation and efficiency considerations». Proceedings of the Workshop on Set Constraints, held in Conjunction with CP’96, Boston, Massachusetts.
1998. Specification-based Testing of Reactive Software: A Case Study in Technology Transfer. Journal of Systems and Software. 40(3):249-262.
2002. Getting real about speech: overdue or overhyped? CHI '02 extended abstracts on Human factors in computing systems. :708-709.
2002. Implementation of chosen-ciphertext attacks against PGP and GnuPG. Information Security. :90-101.