Publications

Search
Export 1857 results:
Author Title [ Type(Desc)] Year
Filters: First Letter Of Last Name is C  [Clear All Filters]
Book Chapters
Card SK, Mackinlay JD, Shneiderman B.  1999.  Interactive analysis. Readings in information visualizationReadings in information visualization. :261-262.
Card SK, Mackinlay JD, Shneiderman B.  1999.  Internet and Infosphere. Readings in information visualizationReadings in information visualization. :465-468.
Cuntoor N, Chellappa R.  2006.  Key Frame-Based Activity Representation Using Antieigenvalues. Computer Vision – ACCV 2006Computer Vision – ACCV 2006. 3852:499-508.
Cuntoor N, Chellappa R.  2006.  Key Frame-Based Activity Representation Using Antieigenvalues. Computer Vision – ACCV 2006Computer Vision – ACCV 2006. 3852:499-508.
Chellappa R, Veeraraghavan A, Sankaranarayanan AC.  2009.  Knowledge Extraction from Surveillance Sensors. Wiley Handbook of Science and Technology for Homeland SecurityWiley Handbook of Science and Technology for Homeland Security.
Kolda TG, O'Leary DP.  1999.  Latent Semantic Indexing via a Semi-Discrete Matrix Decomposition. The Mathematics of Information Coding, Extraction and DistributionThe Mathematics of Information Coding, Extraction and Distribution. :73-80.
Bazinet AL, Cummings MP.  2008.  The Lattice Project: a Grid research and production environment combining multiple Grid computing models. Distributed & Grid Computing — Science Made Transparent for Everyone. Principles, Applications and Supporting CommunitiesDistributed & Grid Computing — Science Made Transparent for Everyone. Principles, Applications and Supporting Communities. :2-13.
Conroy JM, Schlesinger JD, Goldstein J, O'Leary DP.  2004.  Left-Brain/Right-Brain Multi-Document Summarization. DUC 04 Conference ProceedingsDUC 04 Conference Proceedings.
Froehlich J, Larson E, Saba E, Campbell T, Atlas L, Fogarty J, Patel S.  2011.  A Longitudinal Study of Pressure Sensing to Infer Real-World Water Usage Events in the Home. Pervasive Computing. 6696:50-69.
Froehlich J, Larson E, Saba E, Campbell T, Atlas L, Fogarty J, Patel S.  2011.  A Longitudinal Study of Pressure Sensing to Infer Real-World Water Usage Events in the Home. Pervasive ComputingPervasive Computing. 6696:50-69.
Cook D, Faber V, Marathe M, Srinivasan A, Sussmann Y.  1998.  Low-bandwidth routing and electrical power networks. Automata, Languages and ProgrammingAutomata, Languages and Programming. 1443:604-615.
Dorr BJ, Olive J, McCary J, Christianson C.  2011.  Machine Translation Evaluation and Optimization. Handbook of Natural Language Processing and Machine TranslationHandbook of Natural Language Processing and Machine Translation. :745-843.
Dorr BJ, Olive J, McCary J, Christianson C.  2011.  Machine Translation Evaluation and Optimization. Handbook of Natural Language Processing and Machine TranslationHandbook of Natural Language Processing and Machine Translation. :745-843.
Colwell RR.  2008.  The marine environment and human health: the cholera model. Global Climate Change and Extreme Weather Events: Understanding the Contributions to Infectious Disease EmergenceGlobal Climate Change and Extreme Weather Events: Understanding the Contributions to Infectious Disease Emergence.
Nixon MS, Tan T, Chellappa R.  2006.  Model-Based Approaches. Human Identification Based on GaitHuman Identification Based on Gait. :107-133.
Vaswani N, Agrawal A, Zheng Q, Chellappa R.  2005.  Moving Object Detection and Compression in IR Sequences. Computer Vision Beyond the Visible SpectrumComputer Vision Beyond the Visible Spectrum. :141-165.
Sundaresan A, Chellappa R.  2006.  Multi-camera Tracking of Articulated Human Motion Using Motion and Shape Cues. Computer Vision – ACCV 2006Computer Vision – ACCV 2006. 3852:131-140.
Hicks MW, Kakkar P, Moore J, Gunter C, Nettles S.  1999.  Network Programming Using PLAN. Internet Programming LanguagesInternet Programming Languages. 1686:127-143.
Elaine Shi, Chan T, Stefanov E, Li M.  2011.  Oblivious RAM with O((logN)^3) Worst-Case Cost. Advances in Cryptology – ASIACRYPT 2011. 7073:197-214.
Card SK, Mackinlay JD, Shneiderman B.  1999.  Overview+ detail. Readings in information visualizationReadings in information visualization. :285-286.
Sahinalp S, Vishkin U.  1994.  On a parallel-algorithms method for string matching problems (overview). Algorithms and ComplexityAlgorithms and Complexity. 778:22-32.
Chellappa R, Veeraraghavan A, Aggarwal G.  2005.  Pattern Recognition in Video. Pattern Recognition and Machine IntelligencePattern Recognition and Machine Intelligence. 3776:11-20.
Dunlavy DM, Conroy JM, Schlesinger JD, Goodman SA, Okurowski M E, O'Leary DP, van Halteren H.  2003.  Performance of a Three-Stage System for Multi-Document Summarization. DUC 03 Conference ProceedingsDUC 03 Conference Proceedings.
Yue Z, Zhao W, Chellappa R.  2005.  Pose-Encoded Spherical Harmonics for Robust Face Recognition Using a Single Image. Analysis and Modelling of Faces and GesturesAnalysis and Modelling of Faces and Gestures. 3723:229-243.
Zhou S, Chellappa R.  2002.  Probabilistic Human Recognition from Video. Computer Vision — ECCV 2002Computer Vision — ECCV 2002. 2352:173-183.

Pages