Publications

Export 1858 results:
Author [ Title(Desc)] Type Year
Filters: First Letter Of Last Name is C  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
F
Ramanathan N, Chellappa R.  2006.  Face Verification Across Age Progression. Image Processing, IEEE Transactions on. 15(11):3349-3361.
Ramanathan N, Chellappa R, Roy Chowdhury AK.  2004.  Facial similarity across age, disguise, illumination and pose. Image Processing, 2004. ICIP '04. 2004 International Conference on. 3:1999-2002Vol.3-1999-2002Vol.3.
Chowdhury A RK, Chellappa R.  2003.  A Factorization Approach for Activity Recognition. Computer Vision and Pattern Recognition Workshop, 2003. CVPRW '03. Conference on. 4:41-41.
Chowdhury A RK, Chellappa R.  2003.  A Factorization Approach for Activity Recognition. Computer Vision and Pattern Recognition Workshop, 2003. CVPRW '03. Conference on. 4:41-41.
Li J, Chellappa R.  2005.  A Factorization Method for Structure from Planar Motion. Application of Computer Vision, 2005. WACV/MOTIONS '05 Volume 1. Seventh IEEE Workshops on. 2:154-159.
Cevher V, Sankaranarayanan AC, Chellappa R.  2008.  Factorized variational approximations for acoustic multi source localization. Acoustics, Speech and Signal Processing, 2008. ICASSP 2008. IEEE International Conference on. :2409-2412.
Cevher V, Sankaranarayanan AC, Chellappa R.  2008.  Factorized variational approximations for acoustic multi source localization. Acoustics, Speech and Signal Processing, 2008. ICASSP 2008. IEEE International Conference on. :2409-2412.
Ramachandran M, Veeraraghavan A, Chellappa R.  2007.  Fast Bilinear SfM with Side Information. Computer Vision, 2007. ICCV 2007. IEEE 11th International Conference on. :1-8.
Ramachandran M, Veeraraghavan A, Chellappa R.  2011.  A Fast Bilinear Structure from Motion Algorithm Using a Video Sequence and Inertial Sensors. IEEE Transactions on Pattern Analysis and Machine Intelligence. 33(1):186-193.
Liu M-Y, Tuzel O, Veeraraghavan A, Chellappa R.  2010.  Fast directional chamfer matching. Computer Vision and Pattern Recognition (CVPR), 2010 IEEE Conference on. :1696-1703.
Dyer C, Cordova A, Mont A, Jimmy Lin.  2008.  Fast, easy, and cheap: Construction of statistical machine translation models with MapReduce. Proceedings of the Third Workshop on Statistical Machine Translation. :199-207.
Zhang D, Cleaveland R.  2005.  Fast generic model-checking for data-based systems. Formal Techniques for Networked and Distributed Systems-FORTE 2005. :83-97.
Zhang D, Cleaveland R.  2005.  Fast on-the-fly parametric real-time model checking. Real-Time Systems Symposium, 2005. RTSS 2005. 26th IEEE International. :10–pp-10–pp.
Larson E, Froehlich J, Campbell T, Haggerty C, Atlas L, Fogarty J, Patel SN.  2012.  Fast track article: Disaggregated water sensing from a single, pressure-based sensor: An extended analysis of HydroSense using staged experiments. Pervasive Mob. Comput.. 8(1):82-102.
Liu H, Chellappa R, Rosenfeld A.  2003.  Fast two-frame multiscale dense optical flow estimation using discrete wavelet filters. Journal of the Optical Society of America AJ. Opt. Soc. Am. A. 20(8):1505-1515.
Cole R, Vishkin U.  1989.  Faster optimal parallel prefix sums and list ranking. Information and Computation. 81(3):334-352.
Cukier M, Chandra R, Henke D, Pistole J, Sanders WH.  1999.  Fault injection based on a partial view of the global state of a distributed system. :168-177.
Cukier M, Chandra R, Henke D, Pistole J, Sanders WH.  1999.  Fault injection based on a partial view of the global state of a distributed system. :168-177.
Sharma A, Martin JR, Anand N, Cukier M, Sanders WH.  2004.  Ferret: a host vulnerability checking tool. :389-394.
Cummings MP, Segal MR.  2004.  Few amino acid positions in ıt rpoB are associated with most of the rifampin resistance in ıt Mycobacterium tuberculosis. BMC Bioinformatics. 5:137-137.
Molina J, Chorin X, Cukier M.  2007.  Filesystem activity following a SSH compromise: an empirical study of file sequences. :144-155.
Molina J, Chorin X, Cukier M.  2007.  Filesystem activity following a SSH compromise: an empirical study of file sequences. :144-155.
Chrun D, Cukier M, Sneeringer G.  2008.  Finding Corrupted Computers Using Imperfect Intrusion Prevention System Event Data. Computer Safety, Reliability, and Security. 5219:221-234.
Chrun D, Cukier M, Sneeringer G.  2008.  Finding Corrupted Computers Using Imperfect Intrusion Prevention System Event Data. Computer Safety, Reliability, and Security. 5219:221-234.
Ran Y, Chellappa R, Zheng Q.  2006.  Finding Gait in Space and Time. Pattern Recognition, 2006. ICPR 2006. 18th International Conference on. 4:586-589.

Pages