Export 604 results:
Author [ Title(Desc)] Type Year
Filters: First Letter Of Last Name is J  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
JaJa JF, Wang PY.  1994.  Special issue on data parallel algorithms and programming. Journal of Parallel and Distributed Computing. 21(1):1-3.
Jacobs DW, Lindenbaum M, August J, Zucker SW, Ben-Shahar O, Zucker SW, Tuytelaars T, Turina A, Van Gool L, Mahamud S.  2003.  Special section on perceptual organization in computer vision.
Srivastava A, Damon JN, Dryden IL, Jermyn IH, Das S, Vaswani N, Huckemann S, Hotz T, Munk A, Lin Z et al..  2010.  SPECIAL SECTION ON SHAPE ANALYSIS AND ITS APPLICATIONS IN IMAGE UNDERSTANDING. IEEE Transactions on Pattern Analysis and Machine Intelligence. 32(4):0162-8828.
Jategaonkar Jagadeesan L, Porter A, Puchol C, Ramming JC, Votta LG.  1998.  Specification-based Testing of Reactive Software: A Case Study in Technology Transfer. Journal of Systems and Software. 40(3):249-262.
Jagadeesan L J, Porter A, Puchol C, Ramming CJ, Votta LG.  1997.  Specification-based Testing of Reactive Software: Tools and Experiments. Software Engineering, International Conference on. :525-525.
Feamster N, Johari R, Balakrishnan H.  2005.  Stable Policy Routing with Provider Independence. MIT-CSAIL-TR-2005-009
Jog N, Shneiderman B.  1995.  Starfield information visualization with interactive smooth zooming. Proc. IFIP 2.6 Visual Databases Systems. :3-14.
Jogt NK, Shneiderman B.  1995.  Starfield visualization with interactive smooth zooming. Visual database systems, IIIVisual database systems, III. 3:1-1.
Jacobs DW, Getoor L.  2008.  Statistical Relational Learning as an Enabling Technology for Data Acquisition and Data Fusion in Heterogeneous Sensor Networks.
Williams LR, Jacobs DW.  1995.  Stochastic completion fields: a neural model of illusory contour shape and salience. Computer Vision, 1995. Proceedings., Fifth International Conference on. :408-415.
Williams LR, Jacobs DW.  1997.  Stochastic completion fields: A neural model of illusory contour shape and salience. Neural Computation. 9(4):837-858.
JaJa JF.  2004.  Strategies for exploring large scale data. Parallel Architectures, Algorithms and Networks, 2004. Proceedings. 7th International Symposium on. :2-2.
Papamanthou C, Shi E, Tamassia R, Yi K.  2013.  Streaming Authenticated Data Structures. Advances in Cryptology – EUROCRYPT 2013. :353-370.
Kim J, JaJa JF.  2009.  Streaming model based volume ray casting implementation for Cell Broadband Engine. Scientific Programming. 17(1):173-184.
Grimson W, Huttenlocher D, Jacobs DW.  1992.  A study of affine matching with bounded sensor error. Computer Vision—ECCV'92. :291-306.
Grimson WEL, Huttenlocher DP, Jacobs DW.  1994.  A study of affine matching with bounded sensor error. International Journal of Computer Vision. 13(1):7-32.
Ling H, Soatto S, Ramanathan N, Jacobs DW.  2007.  A Study of Face Recognition as People Age. Computer Vision, 2007. ICCV 2007. IEEE 11th International Conference on. :1-8.
Zhuolin Jiang, Zhang G, Davis LS.  2012.  Submodular Dictionary Learning for Sparse Coding. IEEE conference on Computer Vision and Pattern Recognition.
Osadchy M, Jacobs DW, Lindenbaum M.  2007.  Surface Dependent Representations for Illumination Insensitive Image Comparison. Pattern Analysis and Machine Intelligence, IEEE Transactions on. 29(1):98-111.
Dorr BJ, Jordan PW, Benoit JW.  1998.  A Survey of Current Paradigms in Machine Translation.
Dorr BJ, Jordan PW, Benoit JW.  1999.  A Survey of Current Paradigms in Machine Translation. Advances in Computers. Volume 49:1-68.
Bajcsy P, Cardone A, Chalfoun J, Halter M, Juba D, Kociolek M, Majurski M, Peskin A, Simon C, Simon M et al..  2015.  Survey statistics of automated segmentations applied to optical imaging of mammalian cells. BMC bioinformatics. 16:1.
Jiwnani K, Zelkowitz MV.  2004.  Susceptibility matrix: a new aid to software auditing. Security Privacy, IEEE. 2(2):16-21.
Alexander DS, Hicks MW, Kakkar P, Keromytis AD, Shaw M, Moore JT, Gunter CA, Jim T, Nettles SM, Smith JM.  1998.  The switchware active network implementation. The ML Workshop, International Conference on Functional Programming (ICFP).
Snelick R, JaJa JF, Kacker R, Lyon G.  2006.  Synthetic‐perturbation techniques for screening shared memory programs. Software: Practice and Experience. 24(8):679-701.