Publications

Export 377 results:
Author Title Type [ Year(Desc)]
Filters: First Letter Of Last Name is Y  [Clear All Filters]
1999
Han Z, Lin C-K, Goldsman N, Mayergoyz ID, Yu S, Stettler M.  1999.  Gate leakage current simulation by Boltzmann transport equation and its dependence on the gate oxide thickness. Simulation of Semiconductor Processes and Devices, 1999. SISPAD '99. 1999 International Conference on. :247-250.
Wu M, Yu H, Gelman A.  1999.  Multi-level data hiding for digital image and video. SPIE Photonics East’99.
Yacoob Y, Davis LS.  1999.  Temporal multi-scale models for flow and acceleration. International Journal of Computer Vision. 32(2):147-163.
Yacoob Y, Davis LS.  1999.  Tracking rigid motion using a compact-structure constraint. Computer Vision, 1999. The Proceedings of the Seventh IEEE International Conference on. 1:198-205vol.1-198-205vol.1.
2000
Hicks MW, Nettles S.  2000.  Active Networking Means Evolution (or Enhanced Extensibility Required). Active NetworksActive Networks. 1942:16-32.
Voll K, Tom Yeh, Dahl V.  2000.  An assumptive logic programming methodology for parsing. Tools with Artificial Intelligence, 2000. ICTAI 2000. Proceedings. 12th IEEE International Conference on. :11-18.
Chai J, Jimmy Lin, Zadrozny W, Ye Y, Budzikowska M, Horvath V, Kambhatla N, Wolf C.  2000.  Comparative Evaluation of a Natural Language Dialog Based System and a Menu-Driven System for Information Access: A Case Study. In Proceedings of the International Conference on Multimedia Information Retrieval (RIAO 2000).
Christian K, Kules B, Shneiderman B, Youssef A.  2000.  A comparison of voice controlled and mouse controlled web browsing. Proceedings of the fourth international ACM conference on Assistive technologies. :72-79.
Katz J, Yung M.  2000.  Complete characterization of security notions for probabilistic private-key encryption. Proceedings of the thirty-second annual ACM symposium on Theory of computing. :245-254.
Fleet DJ, Black MJ, Yacoob Y, Jepson AD.  2000.  Design and use of linear models for image motion analysis. International Journal of Computer Vision. 36(3):171-193.
Yoon K, DeMenthon D, Doermann D.  2000.  Event Detection from MPEGVideo in the Compressed Domain. ICPR. :819-822.
Yao Z, Gupta SK, Nau DS.  2000.  Finding the maximal cutter for 2-D milling operations. :10-13.
Yao Z, Gupta SK, Nau DS.  2000.  A Geometric Algorithm for Finding the Largest Milling Cutter. ISR; TR 2000-40
Yao Z, Gupta SK, Nau DS.  2000.  A geometric algorithm for finding the maximal cutter for 2-D milling operations. :26-28.
Yao Z, Gupta SK, Nau DS.  2000.  A Geometric Algorithm for Multi-Part Milling Cutter Selection. ISR; TR 2000-42
Yacoob Y, Davis LS.  2000.  Learned models for estimation of rigid and articulated human motion from stationary or moving camera. International Journal of Computer Vision. 36(1):5-30.
De la Torre F, Yacoob Y, Davis LS.  2000.  A probabilistic framework for rigid and non-rigid appearance based tracking and recognition. Automatic Face and Gesture Recognition, 2000. Proceedings. Fourth IEEE International Conference on. :491-498.
Black MJ, Fleet DJ, Yacoob Y.  2000.  Robustly estimating changes in image appearance. Computer Vision and Image Understanding. 78(1):8-31.
Anagnostakis K, Hicks MW, Ioannidis S, Keromytis A, Smith J.  2000.  Scalable Resource Control in Active Networks. Active NetworksActive Networks. 1942:343-357.
Yao Z, Gupta SK, Nau DS.  2000.  Selecting Flat End Mills for 2-1/2D Milling Operations. ISR; TR 2000-41
M. Wu, Yu H H.  2000.  Video access control via multi-level data hiding. Multimedia and Expo, 2000. ICME 2000. 2000 IEEE International Conference on. 1:381-384vol.1-381-384vol.1.
Yin P, M. Wu, Liu B.  2000.  Video transcoding by reducing spatial resolution. Image Processing, 2000. Proceedings. 2000 International Conference on. 1:972-975vol.1-972-975vol.1.
2001
Haritaoglu I, Cozzi A, Koons D, Flickner M, Zotkin DN, Yacoob Y.  2001.  Attentive toys. International Conference on Multimedia and Expo. 22:25-25.
Katz J, Ostrovsky R, Yung M.  2001.  Efficient password-authenticated key exchange using human-memorable passwords. Advances in Cryptology—EUROCRYPT 2001. :475-494.
Dorai GK, Yacoob Y.  2001.  Facilitating semantic web search with embedded grammar tags. IJCAI Workshop on E-Business and Intelligent Web.

Pages