Publications

Export 7151 results:
Author Title [ Type(Asc)] Year
Book Chapters
Zhou S, Chellappa R.  2002.  Probabilistic Human Recognition from Video. Computer Vision — ECCV 2002Computer Vision — ECCV 2002. 2352:173-183.
Hombsek K, Bederson BB, Plaisant C.  2003.  Preserving Context with Zoomable User Interfaces. The craft of information visualization: readings and reflectionsThe craft of information visualization: readings and reflections. :83-83.
Wang L, Deshpande A.  2008.  Predictive Modeling-Based Data Collection in Wireless Sensor Networks. Wireless Sensor NetworksWireless Sensor Networks. 4913:34-51.
Shen E, Elaine Shi, Waters B.  2009.  Predicate Privacy in Encryption Systems. Theory of Cryptography. 5444:457-473.
Monahemi M, Barlow J, O'Leary DP.  1992.  On the Precise Loop Transfer Recovery and Transmission Zeroes. First IEEE Conference on Control ApplicationsFirst IEEE Conference on Control Applications.
Deshpande A.  2009.  PrDB: Managing Large-Scale Correlated Probabilistic Databases (Abstract). Scalable Uncertainty ManagementScalable Uncertainty Management. 5785:1-1.
Vishkin U.  2004.  PRAM-On-Chip: A Quest for Not-So-Obvious Non-obviousness. Mathematical Foundations of Computer Science 2004Mathematical Foundations of Computer Science 2004. 3153:104-105.
Yue Z, Zhao W, Chellappa R.  2005.  Pose-Encoded Spherical Harmonics for Robust Face Recognition Using a Single Image. Analysis and Modelling of Faces and GesturesAnalysis and Modelling of Faces and Gestures. 3723:229-243.
Hannenhalli S.  1995.  Polynomial-time algorithm for computing translocation distance between genomes. Combinatorial Pattern MatchingCombinatorial Pattern Matching. 937:162-176.
Neumann J, Fermüller C, Aloimonos Y.  2002.  Polydioptric Cameras: New Eyes for Structure from Motion. Pattern RecognitionPattern Recognition. 2449:618-625.
Dix J, Kuter U, Nau DS.  2003.  Planning in Answer Set Programming Using Ordered Task Decomposition. KI 2003: Advances in Artificial Intelligence. 2821:490-504.
Au T-C, Kuter U, Nau DS.  2009.  Planning for Interactions among Autonomous Agents. Programming Multi-Agent Systems. 5442:1-23.
Yaman F, Adali S, Nau DS, Sapino M, Subrahmanian V.  2004.  Plan Databases: Model and Algebra. Foundations of Information and Knowledge Systems. 2942:302-319.
Dunlavy DM, Conroy JM, Schlesinger JD, Goodman SA, Okurowski M E, O'Leary DP, van Halteren H.  2003.  Performance of a Three-Stage System for Multi-Document Summarization. DUC 03 Conference ProceedingsDUC 03 Conference Proceedings.
Jacobs DW.  2001.  Perceptual organization as generic object recognition. From Fragments to Objects Segmentation and Grouping in VisionFrom Fragments to Objects Segmentation and Grouping in Vision. Volume 130:295-329.
Jacobs DW.  2003.  Perceptual Completion and Memory. Perceptual organization in vision: behavioral and neural perspectivesPerceptual organization in vision: behavioral and neural perspectives. :403-403.
Marchionini G, Plaisant C, Komlodi A.  2003.  The people in digital libraries: Multifaceted approaches to assessing needs and impact. Digital library use: Social practice in design and evaluationDigital library use: Social practice in design and evaluation. :119-160.
Chellappa R, Veeraraghavan A, Aggarwal G.  2005.  Pattern Recognition in Video. Pattern Recognition and Machine IntelligencePattern Recognition and Machine Intelligence. 3776:11-20.
Reggia JA, D'Autrechy CL.  1990.  Parsimonious covering theory in cognitive diagnosis and adaptive instruction. Diagnostic Monitoring of Skill and Knowledge AcquisitionDiagnostic Monitoring of Skill and Knowledge Acquisition. :510-510.
Papamanthou C, Tollis IG.  2007.  Parameterized st-Orientations of Graphs: Algorithms and Experiments. Graph Drawing. :220-233.
Sahinalp S, Vishkin U.  1994.  On a parallel-algorithms method for string matching problems (overview). Algorithms and ComplexityAlgorithms and Complexity. 778:22-32.
Kamara S, Papamanthou C.  2013.  Parallel and Dynamic Searchable Symmetric Encryption. Financial Cryptography and Data Security. :258-274.
Card SK, Mackinlay JD, Shneiderman B.  1999.  Overview+ detail. Readings in information visualizationReadings in information visualization. :285-286.
Papamanthou C, Tamassia R, Triandopoulos N.  2011.  Optimal Verification of Operations on Dynamic Sets. Advances in Cryptology – CRYPTO 2011. :91-110.
Dachman-Soled D, Lee HK, Malkin T, Servedio RA, Wan A, Wee H.  2008.  Optimal Cryptographic Hardness of Learning Monotone Functions. Automata, Languages and Programming. :36-47.

Pages