Publications

Export 896 results:
[ Author(Asc)] Title Type Year
Filters: First Letter Of Last Name is S  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
S
Shen CC, Kupershtok R, Yang B, Vanin FM, Shao X, Sheth D, Goldsman N, Balzano Q, Bhattacharyya SS.  2007.  Compact, low power wireless sensor network system for line crossing recognition. Circuits and Systems, 2007. ISCAS 2007. IEEE International Symposium on. :2506-2509.
Shen C-C, Plishker W, Bhattacharyya SS.  2011.  Dataflow-based Design and Implementation of Image Processing Applications. Technical Reports from UMIACS.
Shekhar C, Chellappa R.  2003.  Airborne Video Registration for Activity Monitoring. Video RegistrationVideo Registration. 5:130-143.
Shekhar S, Patel VM, Chellappa R.  2011.  Synthesis-based recognition of low resolution faces. 2011 International Joint Conference on Biometrics (IJCB). :1-6.
Sheffler T, Schreiber R, Pugh W, Gilbert J, Chatterjee S.  1996.  Efficient distribution analysis via graph contraction. Languages and Compilers for Parallel Computing. :377-391.
Sharma A, Jacobs DW.  2011.  Bypassing synthesis: PLS for face recognition with pose, low-resolution and sketch. Computer Vision and Pattern Recognition (CVPR), 2011 IEEE Conference on. :593-600.
Sharma P, Khurana U, Shneiderman B, Scharrenbroich M, Locke J.  2011.  Speeding Up Network Layout and Centrality Measures for Social Computing Goals. Social Computing, Behavioral-Cultural Modeling and PredictionSocial Computing, Behavioral-Cultural Modeling and Prediction. 6589:244-251.
Sharma R, Aloimonos Y.  1992.  Coordinated motion planning: the warehouseman's problem with constraints on free space. Systems, Man and Cybernetics, IEEE Transactions on. 22(1):130-141.
Sharma A, Martin JR, Anand N, Cukier M, Sanders WH.  2004.  Ferret: a host vulnerability checking tool. :389-394.
Sharma R, Mount D, Aloimonos Y.  1993.  Probabilistic analysis of some navigation strategies in a dynamic environment. Systems, Man and Cybernetics, IEEE Transactions on. 23(5):1465-1474.
Sharma R, Aloimonos Y.  1996.  Early detection of independent motion from active control of normal image flow patterns. Systems, Man, and Cybernetics, Part B: Cybernetics, IEEE Transactions on. 26(1):42-52.
Sharara H, Singh L, Getoor L, Mann J.  2011.  Understanding actor loyalty to event-based groups in affiliation networks. Social Network Analysis and Mining. 1(2):115-126.
Sharara H, Rand W, Getoor L.  2011.  Differential adaptive diffusion: Understanding diversity and learning whom to trust in viral marketing. Fifth International AAAI Conference on Weblogs and Social Media.
Sharara H, Sopan A, Namata G, Getoor L, Singh L.  2011.  G-PARE: A visual analytic tool for comparative analysis of uncertain graphs. Visual Analytics Science and Technology (VAST), 2011 IEEE Conference on. :61-70.
Sharara H, Getoor L, Norton M.  2011.  Active Surveying: A Probabilistic Approach for Identifying Key Opinion Leaders. Twenty-Second International Joint Conference on Artificial Intelligence.
Sharara H, Singh L, Getoor L, Mann J.  2009.  The Dynamics of Actor Loyalty to Groups in Affiliation Networks. Social Network Analysis and Mining, 2009. ASONAM '09. International Conference on Advances in. :101-106.
Sharaf MA, Sismanis Y, Labrinidis A, Chrysanthis P, Roussopoulos N.  2003.  Efficient dissemination of aggregate data over the wireless web. International Workshop on the Web and Databases (WebDB). :93-98.
Shao-fa JZL, Hong-li JXZ.  2009.  Target Tracking Based on Nonparametric Clustering and Multi-Scale Images. JSCUT (Natural Science Edition). 37(1):34-41.
Shao J, Zhou SK, Chellappa R.  2004.  Appearance-based tracking and recognition using the 3D trilinear tensor. Acoustics, Speech, and Signal Processing, 2004. Proceedings. (ICASSP '04). IEEE International Conference on. 3:iii-613-16vol.3-iii-613-16vol.3.
Shao J, Chellappa R, Porikli F.  2006.  Shape-Regulated Particle Filtering for Tracking Non-Rigid Objects. Image Processing, 2006 IEEE International Conference on. :2813-2816.
Shao J, Zhou SK, Chellappa R.  2004.  Simultaneous background and foreground modeling for tracking in surveillance video. Image Processing, 2004. ICIP '04. 2004 International Conference on. 2:1053-1056Vol.2-1053-1056Vol.2.
Shao J, Zhou SK, Chellappa R.  2010.  Robust Height Estimation of Moving Objects From Uncalibrated Videos. IEEE Transactions on Image Processing. 19(8):2221-2232.
Shao J, Porikli F, Chellappa R.  2007.  Estimation of contour motion and deformation for nonrigid object tracking. Journal of the Optical Society of America AJ. Opt. Soc. Am. A. 24(8):2109-2121.
Shao J, Zhou SK, Chellappa R.  2005.  Tracking Algorithm Using Background-Foreground Motion Models and Multiple Cues. ICASSP apos. :233-236.
Shankar U, Talwar K, Foster JS, Wagner D.  2001.  Detecting format string vulnerabilities with type qualifiers. Proceedings of the 10th conference on USENIX Security Symposium-Volume 10. :16-16.

Pages