Publications

Export 7148 results:
[ Author(Desc)] Title Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
C
Cevher V, Sankaranarayanan A, Duarte M, Reddy D, Baraniuk R, Chellappa R.  2008.  Compressive sensing for background subtraction. Computer Vision–ECCV 2008. :155-168.
Cevher V, Sankaranarayanan AC, McClellan JH, Chellappa R.  2007.  Target Tracking Using a Joint Acoustic Video System. Multimedia, IEEE Transactions on. 9(4):715-727.
Cevher V, Gurbuz AC, McClellan JH, Chellappa R.  2008.  Compressive wireless arrays for bearing estimation. Acoustics, Speech and Signal Processing, 2008. ICASSP 2008. IEEE International Conference on. :2497-2500.
Cevher V, Chellappa R, Gurbuz AC, Shah F, McClellan JH.  2006.  Vehicle Fingerprinting Using Drive-By Sounds.
Cevher V, Sankaranarayanan AC, Chellappa R.  2008.  Factorized variational approximations for acoustic multi source localization. Acoustics, Speech and Signal Processing, 2008. ICASSP 2008. IEEE International Conference on. :2409-2412.
Chafekar D, Kumar AVS, Marathe MV, Parthasarathy S, Srinivasan A.  2007.  Cross-layer latency minimization in wireless networks with SINR constraints. Proceedings of the 8th ACM international symposium on Mobile ad hoc networking and computing. :110-119.
Chafekar D, Anil Kumar V, Marathe M, Parthasarathy S, Srinivasan A.  2011.  Capacity of wireless networks under SINR interference constraints. Wireless Networks. 17(7):1605-1624.
Chafekar D, Levin D, Kumar VSA, Marathe MV, Parthasarathy S, Srinivasan A.  2008.  Capacity of Asynchronous Random-Access Scheduling in Wireless Networks. IEEE INFOCOM 2008. The 27th Conference on Computer Communications. :1148-1156.
Chafekar D, Kumart VSA, Marathe MV, Parthasarathy S, Srinivasan A.  2008.  Approximation Algorithms for Computing Capacity of Wireless Networks with SINR Constraints. IEEE INFOCOM 2008. The 27th Conference on Computer Communications. :1166-1174.
Chai J, Jimmy Lin, Zadrozny W, Ye Y, Budzikowska M, Horvath V, Kambhatla N, Wolf C.  2000.  Comparative Evaluation of a Natural Language Dialog Based System and a Menu-Driven System for Information Access: A Case Study. In Proceedings of the International Conference on Multimedia Information Retrieval (RIAO 2000).
Chai J, Jimmy Lin, Zadrozny W, Ye Y, Stys-Budzikowska M, Horvath V, Kambhatla N, Wolf C.  2001.  The role of a natural language conversational interface in online sales: A case study. International Journal of Speech Technology. 4(3):285-295.
Chaiyanan S, Chaiyanan S, Grim C, Maugel T, Huq A, Colwell RR.  2007.  Ultrastructure of coccoid viable but non‐culturable Vibrio cholerae. Environmental Microbiology. 9(2):393-402.
Chajewska U, Getoor L, Norman J, Shahar Y.  1998.  Utility elicitation as a classification problem. Proceedings of the Fourteenth conference on Uncertainty in artificial intelligence. :79-88.
Chakrabarti C, JaJa JF.  1991.  VLSI architectures for template matching and block matching. Parallel architectures and algorithms for image understanding. :3-27.
Chakrabarti C, JaJa JF.  1988.  Optimal Architectures for Multidimensional Transforms. ISR-TR-1988-39
Chakrabarti C, JaJa JF.  1991.  VLSI architectures for multidimensional transforms. Computers, IEEE Transactions on. 40(9):1053-1057.
Chakrabarti C, JaJa JF.  1990.  Systolic architectures for the computation of the discrete Hartley and the discrete cosine transforms based on prime factor decomposition. Computers, IEEE Transactions on. 39(11):1359-1368.
Chakrabarti C, JaJa JF.  1988.  Optimal Systolic Designs for the Computation of the Discrete Hartley and the Discrete Cosine Transforms.
Chakrabarti A, Rajagopalan AN, Chellappa R.  2007.  Super-Resolution of Face Images Using Kernel PCA-Based Prior. Multimedia, IEEE Transactions on. 9(4):888-892.
Chalfoun J, Cardone A, Dima AA, Allen DP, Halter MW.  2010.  Overlap-based cell tracker. The Journal of Research of the National Institute of Standards and Technology. 115(6)
Chalfoun J, Kociolek M, Dima A, Halter M, Cardone A, Peskin A, Bajcsy P, Brady M.  2013.  Segmenting time-lapse phase contrast images of adjacent NIH 3T3 cells.. Journal of microscopy. 249(1):41-52.
Chalidabhongse TH, Kim K, Harwood D, Davis LS.  2003.  A perturbation method for evaluating background subtraction algorithms. Joint IEEE International Workshop on Visual Surveillance and Performance Evaluation of Tracking and Surveillance (VS-PETS).
Chan HT-H, Elaine Shi, Song D.  2011.  Private and Continual Release of Statistics. ACM Transactions on Information and System Security (TISSEC). 14(3):26:1-26:24.
Chan TF, Elman H.  1989.  Fourier Analysis of Iterative Methods for Elliptic Problems. SIAM Review. 31(1):20-49.
Chandra AK, Stockmeyer LJ, Vishkin U.  1982.  A complexity theory for unbounded fan-in parallelism. 23rd Annual Symposium on Foundations of Computer Science. :1-13.

Pages