Publications

Export 577 results:
Author Title [ Type(Desc)] Year
Filters: First Letter Of Last Name is Z  [Clear All Filters]
Conference Papers
Zhou S, Chellappa R, Moghaddam B.  2003.  Adaptive visual tracking and recognition using particle filters. Multimedia and Expo, 2003. ICME '03. Proceedings. 2003 International Conference on. 2:II-349-52vol.2-II-349-52vol.2.
Zheng Y, Li H, Doermann D.  2003.  AModel-based Line Detection Algorithm in Documents. ICDAR. :44-48.
Basili VR, Zelkowitz MV.  1978.  Analyzing medium-scale software development. Proceedings of the 3rd international conference on Software engineering. :116-123.
Li Y, Zheng Y, Doermann D, Jaeger S.  2006.  ANew Algorithm for Detecting Text Line in Handwritten Documents. 10th International Workshop on Frontiers in Handwriting Recognition. :35-40.
Meyers A, Fang AC, Ferro L, Kübler S, Jia-Lin T, Palmer M, Poesio M, Dolbey A, Schuler KK, Loper E et al..  2006.  Annotation compatibility working group report. Proceedings of the Workshop on Frontiers in Linguistically Annotated Corpora 2006. :38-53.
Tariq M, Zeitoun A, Valancius V, Feamster N, Ammar M.  2008.  Answering what-if deployment and configuration questions with wise. Proceedings of the ACM SIGCOMM 2008 conference on Data communication. :99-110.
Li J, Zhou SK, Chellappa R.  2005.  Appearance modeling under geometric context. Computer Vision, 2005. ICCV 2005. Tenth IEEE International Conference on. 2:1252-1259Vol.2-1252-1259Vol.2.
Shao J, Zhou SK, Chellappa R.  2004.  Appearance-based tracking and recognition using the 3D trilinear tensor. Acoustics, Speech, and Signal Processing, 2004. Proceedings. (ICASSP '04). IEEE International Conference on. 3:iii-613-16vol.3-iii-613-16vol.3.
Plishker W, Zaki GF, Bhattacharyya SS, Clancy C, Kuykendall J.  2011.  Applying graphics processor acceleration in a software defined radio prototyping environment. 2011 22nd IEEE International Symposium on Rapid System Prototyping (RSP). :67-73.
Zhang Y, Manister E, Kraus S, V.S. Subrahmanian.  2005.  Approximation results for probabilistic survivability. Multi-Agent Security and Survivability, 2005 IEEE 2nd Symposium on. :1-10.
Zazworka N, Stapel K, Knauss E, Shull F, Basili VR, Schneider K.  2010.  Are developers complying with the process: an XP study. Proceedings of the 2010 ACM-IEEE International Symposium on Empirical Software Engineering and Measurement. :14:1–14:10-14:1–14:10.
Zhu G, Jaeger S, Doermann D.  2006.  ARobust Stamp Detection Framework on Degraded Documents. International Conference on Document Recognition and Retrieval XIII. :1-9.
Zotkin DN, Keleher PJ, Perkovic D.  2000.  Attacking the bottlenecks of backfilling schedulers. Cluster Computing.
Haritaoglu I, Cozzi A, Koons D, Flickner M, Zotkin DN, Yacoob Y.  2001.  Attentive toys. International Conference on Multimedia and Expo. 22:25-25.
Zotkin DN, Duraiswami R, Davis LS, Haritaoglu I.  2000.  An audio-video front-end for multimedia applications. 2000 IEEE International Conference on Systems, Man, and Cybernetics. 2:786-791vol.2-786-791vol.2.
Zhu G, Doermann D.  2007.  Automatic Document Logo Detection. The 9th International Conference on Document Analysis and Recognition (ICDAR 2007). :864-868.
O'Donovan AE, Duraiswami R, Zotkin DN.  2010.  Automatic matched filter recovery via the audio camera. Acoustics Speech and Signal Processing (ICASSP), 2010 IEEE International Conference on. :2826-2829.
Zelkowitz MV.  1976.  Automatic program analysis and evaluation. Proceedings of the 2nd international conference on Software engineering. :158-163.
Zagoria R, Reggia JA, Price T, Banko M.  1981.  Bayesian classification in medicine: The transferability question. Proceedings of the Fifth Annual Symposium on Computer Applications in Medical Care. :250-252.
Chellappa R, Zhou S, Li B.  2002.  Bayesian methods for face recognition from video. Acoustics, Speech, and Signal Processing (ICASSP), 2002 IEEE International Conference on. 4:IV-4068-IV-4071-IV-4068-IV-4071.
Qian G, Chellappa R, Zheng Q.  2002.  Bayesian structure from motion using inertial information. Image Processing. 2002. Proceedings. 2002 International Conference on. 3:III-425-III-428vol.3-III-425-III-428vol.3.
Farrell R, Oza O, Zhang N, Morariu VI, Darrell T, Davis LS.  2011.  Birdlets: Subordinate categorization using volumetric primitives and pose-normalized appearance. Computer Vision (ICCV), 2011 IEEE International Conference on. :161-168.
Zhang Z, Klassen E, Srivastava A, Turaga P, Chellappa R.  2011.  Blurring-invariant Riemannian metrics for comparing signals and images. 2011 IEEE International Conference on Computer Vision (ICCV). :1770-1775.
Zhang J, Luo X, Perdisci R, Gu G, Lee W, Feamster N.  2011.  Boosting the scalability of botnet detection using adaptive traffic sampling. Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security. :124-134.
Layman L, Basili VR, Zelkowitz MV, Fisher KL.  2011.  A case study of measuring process risk for early insights into software safety. Software Engineering (ICSE), 2011 33rd International Conference on. :623-632.

Pages