Publications

Export 1669 results:
Author Title [ Type(Desc)] Year
Filters: First Letter Of Last Name is B  [Clear All Filters]
Book Chapters
Hicks MW, Kakkar P, Moore J, Gunter C, Nettles S.  1999.  Network Programming Using PLAN. Internet Programming LanguagesInternet Programming Languages. 1686:127-143.
Hicks MW, Kakkar P, Moore J, Gunter C, Nettles S.  1999.  Network Programming Using PLAN. Internet Programming LanguagesInternet Programming Languages. 1686:127-143.
Baker P, Pless R, Fermüller C, Aloimonos Y.  2000.  New Eyes for Shape and Motion Estimation. Biologically Motivated Computer VisionBiologically Motivated Computer Vision. 1811:23-47.
Baker P, Pless R, Fermüller C, Aloimonos Y.  2000.  New Eyes for Shape and Motion Estimation. Biologically Motivated Computer VisionBiologically Motivated Computer Vision. 1811:23-47.
Sahinalp S, Vishkin U.  1994.  On a parallel-algorithms method for string matching problems (overview). Algorithms and ComplexityAlgorithms and Complexity. 778:22-32.
Chellappa R, Veeraraghavan A, Aggarwal G.  2005.  Pattern Recognition in Video. Pattern Recognition and Machine IntelligencePattern Recognition and Machine Intelligence. 3776:11-20.
Chellappa R, Veeraraghavan A, Aggarwal G.  2005.  Pattern Recognition in Video. Pattern Recognition and Machine IntelligencePattern Recognition and Machine Intelligence. 3776:11-20.
Monahemi M, Barlow J, O'Leary DP.  1992.  On the Precise Loop Transfer Recovery and Transmission Zeroes. First IEEE Conference on Control ApplicationsFirst IEEE Conference on Control Applications.
Hombsek K, Bederson BB, Plaisant C.  2003.  Preserving Context with Zoomable User Interfaces. The craft of information visualization: readings and reflectionsThe craft of information visualization: readings and reflections. :83-83.
Basili VR, Zelkowitz MV, Sjøberg DIK, Johnson P, Cowling AJ.  2007.  Protocols in the use of empirical software engineering artifacts. Empirical Software EngineeringEmpirical Software Engineering. 12:107-119.
Plaisant C, Shneiderman B, Battagtia J.  1993.  Scheduling home control devices: a case study of the transition from the research project to a product. Sparks of innovation in human-computer interactionSparks of innovation in human-computer interaction. :205-205.
North C, Shneiderman B, Plaisant C, Kang H, Bederson BB.  2003.  Seeing the World Through Image Libraries. The craft of information visualization: readings and reflectionsThe craft of information visualization: readings and reflections. :47-47.
Bethencourt J, Elaine Shi, Song D.  2010.  Signatures of Reputation. Financial Cryptography and Data Security. 6052:400-407.
Brodský T, Fermüller C, Aloimonos Y.  1998.  Simultaneous estimation of viewing geometry and structure. Computer Vision — ECCV'98Computer Vision — ECCV'98. 1406:342-358.
Brodský T, Fermüller C, Aloimonos Y.  1998.  Simultaneous estimation of viewing geometry and structure. Computer Vision — ECCV'98Computer Vision — ECCV'98. 1406:342-358.
Bessiere K, Ceaparu I, Lazar J, Robinson J, Shneiderman B.  2004.  Social and psychological influences on computer user frustration. Media access: Social and psychological dimensions of new technology useMedia access: Social and psychological dimensions of new technology use. :91-103.
Boehm B, Basili VR.  2005.  Software defect reduction top 10 list. Foundations of empirical software engineering: the legacy of Victor R. Basili. :426-426.
Boehm B, Basili VR.  2005.  Software defect reduction top 10 list. Foundations of empirical software engineering: the legacy of Victor R. Basili. :426-426.
Cheong LF, Fermüller C, Aloimonos Y.  1996.  Spatiotemporal representations for visual navigation. Computer Vision — ECCV '96Computer Vision — ECCV '96. 1064:671-684.
Banerjee A, Gupta SK.  2006.  A Step Towards Automated Design of Side Actions in Injection Molding of Complex Parts. Geometric Modeling and Processing - GMP 2006. 4077:500-513.
Dorr BJ, Jordan PW, Benoit JW.  1999.  A Survey of Current Paradigms in Machine Translation. Advances in Computers. Volume 49:1-68.
Feamster N, Balazinska M, Wang W, Balakrishnan H, Karger D.  2003.  Thwarting Web Censorship with Untrusted Messenger Discovery. Privacy Enhancing TechnologiesPrivacy Enhancing Technologies. 2760:125-140.
Feamster N, Balazinska M, Wang W, Balakrishnan H, Karger D.  2003.  Thwarting Web Censorship with Untrusted Messenger Discovery. Privacy Enhancing TechnologiesPrivacy Enhancing Technologies. 2760:125-140.
Bolle R, Aloimonos Y, Fermüller C.  1997.  Toward motion picture grammars. Computer Vision — ACCV'98Computer Vision — ACCV'98. 1352:283-290.
Nguyen H V, Banerjee A, Burlina P, Broadwater J, Chellappa R.  2011.  Tracking and Identification via Object Reflectance Using a Hyperspectral Video Camera. Machine Vision Beyond Visible SpectrumMachine Vision Beyond Visible Spectrum. 1:201-219.

Pages