Publications

Export 927 results:
Author Title [ Type(Desc)] Year
Filters: First Letter Of Last Name is W  [Clear All Filters]
Conference Papers
Liu KJR, O'Leary DP, Stewart G.W, Wu Y-JJ.  1993.  An adaptive ESPRIT based on URV decomposition. Acoustics, Speech, and Signal Processing, 1993. ICASSP-93., 1993 IEEE International Conference on. 4:37-40vol.4-37-40vol.4.
Karagol-Ayan B, Doermann D, Weinberg A.  2006.  Adaptive Transformation-based Learning for Improving Dictionary Tagging. Proceedings of the 11th Conference on European Chapter of the Association for Computational Linguistics. :257-264.
Findlater L, Froehlich J, Fattal K, Wobbrock JO, Dastyar T.  2013.  Age-Related Differences in Performance with Touchscreens Compared to Traditional Mouse Input. CHI 2013 To Appear.
M. Wu, Wolf W, Liu B.  1998.  An algorithm for wipe detection. Image Processing, 1998. ICIP 98. Proceedings. 1998 International Conference on. 1:893-897vol.1-893-897vol.1.
M. Wu, Wolf W, Liu B.  1998.  An algorithm for wipe detection. Image Processing, 1998. ICIP 98. Proceedings. 1998 International Conference on. 1:893-897vol.1-893-897vol.1.
Wang T D, Plaisant C, Quinn AJ, Stanchak R, Murphy S, Shneiderman B.  2008.  Aligning temporal data by sentinel events: discovering patterns in electronic health records. Proceedings of the twenty-sixth annual SIGCHI conference on Human factors in computing systems. :457-466.
Kanungo T, Mount D, Netanyahu NS, Piatko C, Silverman R, Wu AY.  2000.  The analysis of a simple k-means clustering algorithm. Proceedings of the sixteenth annual symposium on Computational geometry. :100-109.
M. Wu, Craver S, Felten EW, Liu B.  2001.  Analysis of attacks on SDMI audio watermarks. Acoustics, Speech, and Signal Processing, 2001. Proceedings. (ICASSP '01). 2001 IEEE International Conference on. 3:1369-1372vol.3-1369-1372vol.3.
Varna AL, He S, Swaminathan A, M. Wu.  2007.  Analysis of Nonlinear Collusion Attacks on Fingerprinting Systems for Compressed Multimedia. Image Processing, 2007. ICIP 2007. IEEE International Conference on. 2:II-133-II-136-II-133-II-136.
Meyers A, Fang AC, Ferro L, Kübler S, Jia-Lin T, Palmer M, Poesio M, Dolbey A, Schuler KK, Loper E et al..  2006.  Annotation compatibility working group report. Proceedings of the Workshop on Frontiers in Linguistically Annotated Corpora 2006. :38-53.
Trappe W, M. Wu, Liu KJR.  2002.  Anti-collusion codes: multi-user and multimedia perspectives. Image Processing. 2002. Proceedings. 2002 International Conference on. 2:II-149-II-152vol.2-II-149-II-152vol.2.
Wang ZJ, M. Wu, Trappe W, Liu KJR.  2003.  Anti-collusion of group-oriented fingerprinting. Multimedia and Expo, 2003. ICME '03. Proceedings. 2003 International Conference on. 2:II-217-20vol.2-II-217-20vol.2.
Wang ZJ, M. Wu, Trappe W, Liu KJR.  2003.  Anti-collusion of group-oriented fingerprinting. Multimedia and Expo, 2003. ICME '03. Proceedings. 2003 International Conference on. 2:II-217-20vol.2-II-217-20vol.2.
Perpich JM, Perry DE, Porter A, Votta LG, Wade MW.  1997.  Anywhere, Anytime Code Inspections: Using the Web to Remove Inspection Bottlenecks in Large-Scale Software Development. Software Engineering, International Conference on. :14-14.
Spring N, Wolski R.  1998.  Application level scheduling of gene sequence comparison on metacomputers. Proceedings of the 12th international conference on Supercomputing. :141-148.
Josyula DP, Fults S, Anderson ML, Wilson S, Perlis D.  2007.  Application of MCL in a dialog agent. Third Language and Technology Conference.
Wu Y, Raschid L.  2009.  ApproxRank: Estimating Rank for a Subgraph. IEEE 25th International Conference on Data Engineering, 2009. ICDE '09. :54-65.
Kianzad V, Saha S, Schlessman J, Aggarwal G, Bhattacharyya SS, Wolf W, Chellappa R.  2005.  An architectural level design methodology for embedded face detection. Proceedings of the 3rd IEEE/ACM/IFIP international conference on Hardware/software codesign and system synthesis. :136-141.
Petroni Jr NL, Fraser T, Walters AA, Arbaugh WA.  2006.  An architecture for specification-based detection of semantic integrity violations in kernel dynamic data. Proceedings of the 15th conference on USENIX Security Symposium. :20-20.

Pages