Publications

Export 7151 results:
Author [ Title(Asc)] Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
A
Keogh E, Hochheiser H, Shneiderman B.  2005.  An Augmented Visual Query Mechanism for Finding Patterns in Time Series Data (2002). Institute for Systems Research Technical Reports.
Keogh E, Hochheiser H, Shneiderman B.  2002.  An Augmented Visual Query Mechanism for Finding Patterns in Time Series Data. Flexible Query Answering SystemsFlexible Query Answering Systems. 2522:240-250.
Mesgarani N, Shamma S, Grant KW, Duraiswami R.  2003.  Augmented intelligibility in simultaneous multi-talker environments. Proc. International Conference on Auditory Display (ICAD’03). :71-74.
Zotkin DN, Duraiswami R, Davis LS, Haritaoglu I.  2000.  An audio-video front-end for multimedia applications. 2000 IEEE International Conference on Systems, Man, and Cybernetics. 2:786-791vol.2-786-791vol.2.
Zotkin DN, Shamma SA, Ru P, Duraiswami R, Davis LS.  2003.  AUDIO-P2. 1: PITCH AND TIMBRE MANIPULATIONS USING CORTICAL REPRESENTATION OF SOUND. IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS SPEECH AND SIGNAL PROCESSING. 5
O'donovan A, Duraiswami R, Zotkin DN, Gumerov NA.  2010.  Audio visual scene analysis using spherical arrays and cameras.. The Journal of the Acoustical Society of America. 127(3):1979-1979.
Duraiswami R, O'donovan A, Neumann J, Gumerov NA.  2008.  Audio Camera Using Microphone Arrays for Real Time Capture of Audio Images .... 12/127,451
Joo S-W, Chellappa R.  2006.  Attribute Grammar-Based Event Recognition and Anomaly Detection. Computer Vision and Pattern Recognition Workshop, 2006. CVPRW '06. Conference on. :107-107.
Haritaoglu I, Cozzi A, Koons D, Flickner M, Zotkin DN, Yacoob Y.  2001.  Attentive toys. International Conference on Multimedia and Expo. 22:25-25.
M. Wu, Liu B.  1999.  Attacks on digital watermarks. Signals, Systems, and Computers, 1999. Conference Record of the Thirty-Third Asilomar Conference on. 2:1508-1512vol.2-1508-1512vol.2.
Zotkin DN, Keleher PJ, Perkovic D.  2000.  Attacking the bottlenecks of backfilling schedulers. Cluster Computing.
Albrecht M, Gentry C, Halevi S, Katz J.  2009.  Attacking cryptographic schemes based on "perturbation polynomials". Proceedings of the 16th ACM conference on Computer and communications security. :1-10.
Hovemeyer D, Pugh W, Spacco J.  2006.  Atomic instructions in java. ECOOP 2002—Object-Oriented Programming. :5-16.
Maroni G, Mount SM, Cavener DR, Cavener BA, Sharp PM, Lloyd AT, Schaeffer SW.  1994.  An Atlas of Drosophila Genes: Sequences and Molecular Features. Journal of Heredity. 85(6):495-496.
Triandopoulos N, Goodrich MT, Papamanthou C, Tamassia R.  2008.  Athos: Efficient Authentication of Outsourced File Systems: Information Security. Lecture Notes in Computer Science. :80-96.
Mount SM.  1996.  AT-AC Introns—An ATtACk on Dogma. ScienceScience. 271(5256):1690-1692.
Bullock SS, O’Leary DP, Brennen GK.  2005.  Asymptotically Optimal Quantum Circuits for d-Level Systems. Physical Review LettersPhys. Rev. Lett.. 94(23):230502-230502.
Voll K, Tom Yeh, Dahl V.  2000.  An assumptive logic programming methodology for parsing. Tools with Artificial Intelligence, 2000. ICTAI 2000. Proceedings. 12th IEEE International Conference on. :11-18.
Rawlings TK, Ruiz GM, Colwell RR.  2007.  Association of Vibrio Cholerae O1 El Tor and O139 Bengal with the Copepods Acartia Tonsa and Eurytemora Affinis. Applied and Environmental MicrobiologyAppl. Environ. Microbiol.. 73(24):7926-7933.
Chang T-H, Tom Yeh, Miller R.  2011.  Associating the visual representation of user interfaces with their internal structures and metadata. Proceedings of the 24th annual ACM symposium on User interface software and technology. :245-256.
O'Leary DP, Stewart G.W.  1986.  Assignment and scheduling in parallel matrix factorization. Linear Algebra and its Applications. 77:275-299.
El-Alfy H, Jacobs DW, Davis LS.  2009.  Assigning cameras to subjects in video surveillance systems. Robotics and Automation, 2009. ICRA '09. IEEE International Conference on. :837-843.
Webber W, Oard D, Scholer F, Hedin B.  2010.  Assessor error in stratified evaluation. Proceedings of the 19th ACM international conference on Information and knowledge management. :539-548.
Grube NE, Taylor EM, Martin, M.P.  2007.  Assessment of WENO methods with shock-confining filtering for LES of compressible turbulence. AIAA Paper 2007. 4198
Sinha K, Candler GV, Martin, M.P.  2001.  Assessment of the k-epsilon turbulence model for compressible flows using direct simulation data. 39th AIAA Aerospace Sciences Meeting and Exhibit.

Pages