Publications
Export 480 results:
Author Title Type [ Year] Filters: First Letter Of Title is P [Clear All Filters]
2009. Prioritizing Vulnerability Remediation by Determining Attacker-Targeted Vulnerabilities. Security Privacy, IEEE. 7(1):42-48.
2009. Probabilistic fusion-based parameter estimation for visual tracking. Computer Vision and Image Understanding. 113(4):435-445.
2009. Probabilistic graphical models. IEEE transactions on pattern analysis and machine intelligence. 31(10):1775-1789.
2009. Profile-guided static typing for dynamic scripting languages. ACM SIGPLAN Notices. 44(10):283-300.
2009. Promoting energy efficient behaviors in the home through feedback: The role of human-computer interaction. Proc. HCIC Workshop. 9
2009. Promoting energy efficient behaviors in the home through feedback: The role of human-computer interaction. Proc. HCIC Workshop. 9
2009. Promoting social creativity: a component of a national initiative for social participation. Proceedings of the seventh ACM conference on Creativity and cognition. :7-8.
2009. Proofs of storage from homomorphic identification protocols. Advances in Cryptology–ASIACRYPT 2009. :319-333.
2009. Protein quantification across hundreds of experimental conditions. Proceedings of the National Academy of Sciences. 106(37):15544-15548.
2009. PTM-Switchboard--a database of posttranslational modifications of transcription factors, the mediating enzymes and target genes. Nucleic Acids ResearchNucleic Acids Research. 37(Database):D66-D71-D66-D71.
2008. Parallel, stochastic measurement of molecular surface area. Journal of Molecular Graphics and Modelling. 27(1):82-87.
2008. Path projection for user-centered static analysis tools. Proceedings of the 8th ACM SIGPLAN-SIGSOFT workshop on Program analysis for software tools and engineering. :57-63.
2008. A pattern classification framework for theoretical analysis of component forensics. Acoustics, Speech and Signal Processing, 2008. ICASSP 2008. IEEE International Conference on. :1665-1668.
2008. Persuading Visual Attention through Geometry. Visualization and Computer Graphics, IEEE Transactions on. 14(4):772-782.
2008. Photo-based authentication using social networks. Proceedings of the first workshop on Online social networks. :55-60.
2008. Photo-based question answering. Proceedings of the 16th ACM international conference on Multimedia. :389-398.
2008. A pilot study to compare programming effort for two parallel programming models. Journal of Systems and Software. 81(11):1920-1930.
2008. Pose and Illumination Issues in Face-and Gait-Based Identification. Advances in Biometrics. :307-322.
2008. A pose-invariant descriptor for human detection and segmentation. Computer Vision–ECCV 2008. :423-436.