Publications
Export 1669 results:
Author Title [ Type] Year Filters: First Letter Of Last Name is B [Clear All Filters]
2003. New eyes for robotics. 2003 IEEE/RSJ International Conference on Intelligent Robots and Systems, 2003. (IROS 2003). Proceedings. 1:1018-1023vol.1-1018-1023vol.1.
2008. A Non-generative Approach for Face Recognition Across Aging. Biometrics: Theory, Applications and Systems, 2008. BTAS 2008. 2nd IEEE International Conference on. :1-6.
2002. A non-intrusive Kalman filter-based tracker for pursuit eye movement. American Control Conference, 2002. Proceedings of the 2002. 2:1443-1447vol.2-1443-1447vol.2.
2010. Obtaining valid safety data for software safety measurement and process improvement. Proceedings of the 2010 ACM-IEEE International Symposium on Empirical Software Engineering and Measurement. :46:1–46:4-46:1–46:4.
2011. Odd Leaf Out: Improving Visual Recognition with Games. Privacy, security, risk and trust (passat), 2011 ieee third international conference on and 2011 ieee third international conference on social computing (socialcom). :87-94.
2008. One-handed touchscreen input for legacy applications. Proceeding of the twenty-sixth annual SIGCHI conference on Human factors in computing systems. :1399-1408.
2013. Online Latent Dirichlet Allocation with Infinite Vocabulary. International Conference on Machine Learning. 2013_icml_infvoc.pdf (985.1 KB)
1978. Operation of the Software Engineering Laboratory. Proceedings of the Second US Army/IEEE Software Life Cycle Management Workshop. New York: Computer Societies Press.
2006. Optimization of signal processing software for control system implementation. Computer Aided Control System Design, 2006 IEEE International Conference on Control Applications, 2006 IEEE International Symposium on Intelligent Control, 2006 IEEE. :1562-1567.
1998. Optimization of wrappers and mediators for web accessible data sources (websources). Workshop Web Inf. Data Management (WIDM), Washington DC.
2012. Optimizing epidemic protection for socially essential workers. Proceedings of the 2nd ACM SIGHIT International Health Informatics Symposium. :31-40.
2012. Optimizing epidemic protection for socially essential workers. Proceedings of the 2nd ACM SIGHIT International Health Informatics Symposium. :31-40.
2012. Optimizing epidemic protection for socially essential workers. Proceedings of the 2nd ACM SIGHIT International Health Informatics Symposium. :31-40.
2010. Overcoming the Hole in the Bucket: Public-Key Cryptography Resilient to Continual Memory Leakage. Foundations of Computer Science (FOCS), 2010 51st Annual IEEE Symposium on. :501-510.
2002. OZONE: A zoomable interface for navigating ontology information. Proceedings of the Working Conference on Advanced Visual Interfaces. :139-143.
2002. P5 : a protocol for scalable anonymous communication. 2002 IEEE Symposium on Security and Privacy, 2002. Proceedings. :58-70.
1996. Parallel algorithms for personalized communication and sorting with an experimental study (extended abstract). Proceedings of the eighth annual ACM symposium on Parallel algorithms and architectures. :211-222.
1998. Parameterized modeling and recognition of activities. Computer Vision, 1998. Sixth International Conference on. :120-127.
2006. Partially overlapped channels not considered harmful. Proceedings of the joint international conference on Measurement and modeling of computer systems. :63-74.
2006. Participatory design with proxies: developing a desktop-PDA system to support people with aphasia. Proceedings of the SIGCHI conference on Human Factors in computing systems. :151-160.
2006. Participatory, embodied, multi-agent simulation. Proceedings of the fifth international joint conference on Autonomous agents and multiagent systems. :1457-1458.
1999. Performance impact of proxies in data intensive client-server applications. Proceedings of the 13th international conference on Supercomputing. :383-390.
2001. Performance optimization for data intensive grid applications. Active Middleware Services, 2001. Third Annual International Workshop on. :97-105.
2009. Persona: an online social network with user-defined privacy. Proceedings of the ACM SIGCOMM 2009 conference on Data communication. :135-146.