Publications
Export 3364 results:
Author Title Type [ Year] Filters: First Letter Of Last Name is S [Clear All Filters]
2008. Community response grid (CRG) for a university campus: Design requirements and implications. Proceedings of the 5th International ISCRAM Conference. :34-43.
2008. Complexity and Accessibility: Sorting in space: multidimensional, spatial, and metric data structures for CG applications. International Conference on Computer Graphics and Interactive Techniques.
2008. Compressed sensing for multi-view tracking and 3-D voxel reconstruction. Image Processing, 2008. ICIP 2008. 15th IEEE International Conference on. :221-224.
2008. Computational Analysis of Constraints on Noncoding Regions, Coding Regions and Gene Expression in Relation to Plasmodium Phenotypic Diversity. PLoS ONEPLoS ONE. 3(9):e3122-e3122.
2008. Confluent Volumetric Visualization of Gyrokinetic Turbulence. Plasma Science, IEEE Transactions on. 36(4):1112-1113.
2008. A Constrained Probabilistic Petri Net Framework for Human Activity Detection in Video. Multimedia, IEEE Transactions on. 10(6):982-996.
2008. Content-based assembly search: A step towards assembly reuse. Computer-Aided Design. 40(2):244-261.
2008. CONVEX: Similarity-Based Algorithms for Forecasting Group Behavior. Intelligent Systems, IEEE. 23(4):51-57.
2008. CONVEX: Similarity-Based Algorithms for Forecasting Group Behavior. Intelligent Systems, IEEE. 23(4):51-57.
2008. CONVEX: Similarity-Based Algorithms for Forecasting Group Behavior. Intelligent Systems, IEEE. 23(4):51-57.
2008. Copernican challenges face those who suggest that collaboration, not computation are the driving energy for socio-technical systems that characterize Web 2.0.. Science. 319:1349-1350.
2008. CrossNet: a framework for crossover with network-based chromosomal representations. Proceedings of the 10th annual conference on Genetic and evolutionary computation. :1057-1064.
2008. Data Sonification for Users with Visual Impairment: A Case Study with Georeferenced Data. ACM Trans. Comput.-Hum. Interact.. 15(1):4:1–4:28-4:1–4:28.
2008. A decision theoretic framework for analyzing binary hash-based content identification systems. Proceedings of the 8th ACM workshop on Digital rights management. :67-76.
2008. Delegating Capabilities in Predicate Encryption Systems. Automata, Languages and Programming. 5126:560-578.
2008. Designing community-based emergency communication system: A preliminary study. Proceedings of the American Society for Information Science and Technology. 45(1):1-3.
2008. Digital image forensics via intrinsic fingerprints. Information Forensics and Security, IEEE Transactions on. 3(1):101-117.