Publications

Export 377 results:
Author [ Title(Asc)] Type Year
Filters: First Letter Of Last Name is Y  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
S
Tom Yeh, Katz B.  2009.  Searching documentation using text, OCR, and image. Proceedings of the 32nd international ACM SIGIR conference on Research and development in information retrieval. :776-777.
Yi L, Zheng Y, Doermann D, Jaeger S.  2008.  Script-Independent Text Line Segmentation in Freestyle Handwritten Documents. IEEETransactions on Pattern Analysis and Machine Intelligence. :1313-1329.
Ye Q, Doermann D.  2013.  Scene Text Detection via Integrated Discrimination of Component Appearance and Consensus.
Anagnostakis K, Hicks MW, Ioannidis S, Keromytis A, Smith J.  2000.  Scalable Resource Control in Active Networks. Active NetworksActive Networks. 1942:343-357.
Katz J, Yung M.  2003.  Scalable protocols for authenticated group key exchange. Advances in Cryptology-CRYPTO 2003. :110-125.
Katz J, Yung M.  2007.  Scalable protocols for authenticated group key exchange. Journal of Cryptology. 20(1):85-113.
Li JH, Bhattacharjee B, Yu M, Levy R.  2008.  A scalable key management and clustering scheme for wireless ad hoc and sensor networks. Future Generation Computer Systems. 24(8):860-869.
Li JH, Levy R, Yu M, Bhattacharjee B.  2006.  A scalable key management and clustering scheme for ad hoc networks. Proceedings of the 1st international conference on Scalable information systems.
Tom Yeh, Lee JJ, Darrell T.  2008.  Scalable classifiers for Internet vision tasks. Computer Vision and Pattern Recognition Workshops, 2008. CVPRW'08. IEEE Computer Society Conference on. :1-8.
R
Banerjee S, Agarwal S, Kamel K, Kochut A, Kommareddy C, Nadeem T, Thakkar P, Trinh B, Youssef A, Youssef M et al..  2002.  Rover: scalable location-aware computing. Computer. 35(10):46-53.
Banerjee S, Agarwal S, Kamel K, Kochut A, Kommareddy C, Nadeem T, Thakkar P, Trinh B, Youssef A, Youssef M et al..  2002.  Rover: scalable location-aware computing. Computer. 35(10):46-53.
Yuan Y, Yang H, Wong SHY, Lu S, Arbaugh WA.  2005.  ROMER: resilient opportunistic mesh routing for wireless mesh networks. Proc. of IEEE WiMesh. 166
Yuan Y, Yang H, Wong SHY, Lu S, Arbaugh WA.  2005.  ROMER: resilient opportunistic mesh routing for wireless mesh networks. Proc. of IEEE WiMesh. 166
Nahar S, Sultana M, Naser NM, Nair GB, Watanabe H, Ohnishi M, Yamamoto S, Endtz H, Cravioto A, Sack BR et al..  2012.  Role of Shrimp Chitin in the Ecology of Toxigenic Vibrio cholerae and Cholera Transmission. Frontiers in Microbiology. 2:260
Chai J, Jimmy Lin, Zadrozny W, Ye Y, Stys-Budzikowska M, Horvath V, Kambhatla N, Wolf C.  2001.  The role of a natural language conversational interface in online sales: A case study. International Journal of Speech Technology. 4(3):285-295.
Black MJ, Fleet DJ, Yacoob Y.  2000.  Robustly estimating changes in image appearance. Computer Vision and Image Understanding. 78(1):8-31.
Yue Z, Zhou SK, Chellappa R.  2004.  Robust two-camera tracking using homography. Acoustics, Speech, and Signal Processing, 2004. Proceedings. (ICASSP '04). IEEE International Conference on. 3:iii-1-4vol.3-iii-1-4vol.3.
Yu Z, Seng CY, Jiang T, Wu X, Arbaugh WA.  2005.  Robust routing in malicious environment for ad hoc networks. Information Security Practice and Experience. :36-47.
Yin P, Wu M, Liu B.  2002.  A robust error resilient approach for MPEG video transmission over internet. Visual Communication and Image Processing, SPIE. 4671:103-111.
Li Y, Yu X, Ho J, Fushman D, Allewell NM, Tuchman M, Shi D.  2010.  Reversible Post-Translational Carboxylation Modulates the Enzymatic Activity of N-Acetyl-l-ornithine Transcarbamylase. Biochemistry. 49(32):6887-6895.
Lewinski MK, Yamashita M, Emerman M, Ciuffi A, Marshall H, Crawford G, Collins F, Shinn P, Leipzig J, Hannenhalli S et al..  2006.  Retroviral DNA Integration: Viral and Cellular Determinants of Target-Site Selection. PLoS PathogPLoS Pathog. 2(6):e60-e60.
Gannon J, Basili VR, Zelkowitz MV, Yeh R.  1985.  Research in Programming Languages and Software Engineering..
Roark B, Liu Y, Harper M, Stewart R, Lease M, Snover M, Shafran I, Dorr BJ, Hale J, Krasnyanskaya A et al..  2006.  Reranking for Sentence Boundary Detection in Conversational Speech. 2006 IEEE International Conference on Acoustics, Speech and Signal Processing, 2006. ICASSP 2006 Proceedings. 1:I-I-I-I.
Balazinska M, Deshpande A, Labrinidis A, Luo Q, Madden S, Yang J.  2007.  Report on the Fourth International Workshop on Data Management for Sensor Networks (DMSN 2007). SIGMOD Rec.. 36(4):53-55.
Yilmaz C, Porter A, Krishna AS, Memon AM, Schmidt DC, Gokhale AS, Natarajan B.  2007.  Reliable Effects Screening: A Distributed Continuous Quality Assurance Process for Monitoring Performance Degradation in Evolving Software Systems. Software Engineering, IEEE Transactions on. 33(2):124-141.

Pages