Publications

Search
Export 160 results:
[ Author(Desc)] Title Type Year
Filters: First Letter Of Last Name is J  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
J
JaJa JF, Ryu K W, Vishkin U.  1996.  Sorting strings and constructing digital search trees in parallel. Theoretical Computer Science. 154(2):225-245.
JaJa JF, Owens RM.  1985.  VLSI Architectures Based on the Small N Algorithms. ISR-TR-1985-8
JaJa JF, Prasanna Kumar VK.  1984.  Information Transfer in Distributed Computing with Applications to VLSI. Journal of the ACM (JACM). 31(1):150-162.
JaJa JF, Chang S-C.  1991.  Parallel Algorithms for Channel Routing in the Knock-Knee Model. SIAM Journal on Computing. 20(2):228-245.
JaJa JF, Kim J, Wang Q.  2004.  Temporal range exploration of large scale multidimensional time series data. Proceedings of SSDBM. :95-106.
JaJa JF, Ryu KW.  1994.  An efficient parallel algorithm for the single function coarsest partition problem. Theoretical computer science. 129(2):293-307.
Jajodia S, Kudo M, V.S. Subrahmanian.  2001.  Provisional authorizations. E-commerce Security and Privacy. 2:133-159.
Jajodia S, Samarati P, Sapino M L, V.S. Subrahmanian.  2001.  Flexible support for multiple access control policies. ACM Trans. Database Syst.. 26(2):214-260.
Jakobsson M, Elaine Shi, Golle P, Chow R.  2009.  Implicit authentication for mobile devices. :9-9.
Jakupciak JP, Colwell RR.  2009.  Biological agent detection technologies. Molecular Ecology Resources. 9(s1):51-57.
Jallad K, Katz J, Schneier B.  2002.  Implementation of chosen-ciphertext attacks against PGP and GnuPG. Information Security. :90-101.
James F, Lai J, Suhm B, Balentine B, Makhoul J, Nass C, Shneiderman B.  2002.  Getting real about speech: overdue or overhyped? CHI '02 extended abstracts on Human factors in computing systems. :708-709.
Jategaonkar Jagadeesan L, Porter A, Puchol C, Ramming JC, Votta LG.  1998.  Specification-based Testing of Reactive Software: A Case Study in Technology Transfer. Journal of Systems and Software. 40(3):249-262.
Jeffrey SF.  1996.  CLP (SC): Implementation and efficiency considerations». Proceedings of the Workshop on Set Constraints, held in Conjunction with CP’96, Boston, Massachusetts.
Jensen CS, Mark L, Roussopoulos N, Sells T.  1993.  Using differential technlques to efficiently support transaction time. The VLDB JournalVLDB Journal. 2(1):75-111.
Jensen CS, Mark L, Roussopoulos N.  1991.  Incremental implementation model for relational databases with transaction time. IEEE Transactions on Knowledge and Data Engineering. 3(4):461-473.
Jeong IR, Katz J, Lee DH.  2004.  One-round protocols for two-party authenticated key exchange. Applied Cryptography and Network Security. :220-232.
Ji H, Fermüller C.  2005.  Integration of motion fields through shape. IEEE Computer Society Conference on Computer Vision and Pattern Recognition, 2005. CVPR 2005. 2:663-669vol.2-663-669vol.2.
Ji H, Fermüller C.  2006.  A 3D shape constraint on video. IEEE Transactions on Pattern Analysis and Machine Intelligence. 28(6):1018-1023.
Ji H, Fermüller C.  2004.  Bias in Shape Estimation. Computer Vision - ECCV 2004Computer Vision - ECCV 2004. 3023:405-416.
Ji H, Fermüller C.  2003.  Uncertainty in 3D shape estimation. ICCV Workshop on Statistical and Computational Theories of Vision.
Ji H, Fermüller C.  2006.  Wavelet-Based Super-Resolution Reconstruction: Theory and Algorithm. Computer Vision – ECCV 2006Computer Vision – ECCV 2006. 3954:295-307.
Ji H, Fermüller C.  2010.  Better Flow Estimation from Color Images-Volume 2007, Article ID 53912, 9 pages. EURASIP Journal on Advances in Signal Processing. 2007(23)
Ji H, Fermüller C.  2009.  Robust Wavelet-Based Super-Resolution Reconstruction: Theory and Algorithm. IEEE Transactions on Pattern Analysis and Machine Intelligence. 31(4):649-660.
Ji H, Fermüller C.  2007.  Better flow estimation from color images. EURASIP Journal on Advances in Signal Processing. 2007(1):133-133.

Pages