Export 160 results:
[ Author(Desc)] Title Type Year
Filters: First Letter Of Last Name is J  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
Ji H, Fermüller C.  2004.  Bias in Shape Estimation. Computer Vision - ECCV 2004Computer Vision - ECCV 2004. 3023:405-416.
Ji H, Fermüller C.  2003.  Uncertainty in 3D shape estimation. ICCV Workshop on Statistical and Computational Theories of Vision.
Jia X-P, Peng H, Zheng Q-L, Zhuolin Jiang, Li Z.  2008.  A topic-based Document Correlation Model. Machine Learning and Cybernetics, 2008 International Conference on. 5:2487-2491.
Jia Z, Stewart G.W.  1999.  An analysis of the Rayleigh-Ritz method for approximating eigenspaces.
Zhuolin Jiang, Lin Z, Davis LS.  2010.  A tree-based approach to integrated action localization, recognition and segmentation. ECCV Workshops.
Zhuolin Jiang, Lin Z, Davis LS.  2012.  Recognizing Human Actions by Learning and Matching Shape-Motion Prototype Trees. Pattern Analysis and Machine Intelligence, IEEE Transactions on. 34(3):533-547.
Zhuolin Jiang, Li SF, Jia XP, Zhu HL.  2009.  Classic triangular mesh subdivision algorithm. Jisuanji Gongcheng/ Computer Engineering. 35(6):7-10.
Zhuolin Jiang, Lin Z, Davis LS.  2011.  Learning a discriminative dictionary for sparse coding via label consistent K-SVD. Computer Vision and Pattern Recognition (CVPR), 2011 IEEE Conference on. :1697-1704.
Zhuolin Jiang, Li S-F, Gao D-F.  2006.  A Time Saving Method for Human Detection in Wide Angle Camera Images. Machine Learning and Cybernetics, 2006 International Conference on. :4029-4034.
Zhuolin Jiang, Lin Z, Davis LS.  2012.  Class consistent k-means: Application to face and action recognition. Computer Vision and Image Understanding. 116(6):730-741.
Zhuolin Jiang, Zhang G, Davis LS.  2012.  Submodular Dictionary Learning for Sparse Coding. IEEE conference on Computer Vision and Pattern Recognition.
Zhuolin Jiang, Li S-F, Jia X-P, Zhu H-L.  2008.  An improved mean shift tracking method based on nonparametric clustering and adaptive bandwidth. Machine Learning and Cybernetics, 2008 International Conference on. 5:2779-2784.
Zhuolin Jiang, Li SF, Gao DF.  2008.  Design and implementation of blackboard-based system for human detection. Jisuanji Gongcheng/ Computer Engineering. 34(2)
Zhuolin Jiang, Li S-F, Gao D-F.  2007.  An adaptive mean shift tracking method using multiscale images. Wavelet Analysis and Pattern Recognition, 2007. ICWAPR '07. International Conference on. 3:1060-1066.
Jim T, Swamy N, Hicks MW.  2007.  Defeating script injection attacks with browser-enforced embedded policies. Proceedings of the 16th international conference on World Wide Web. :601-610.
Jim T, Morrisett G, Grossman D, Hicks MW, Cheney J, Wang Y.  2002.  Cyclone: A safe dialect of C. USENIX Annual Technical Conference. :275-288.
Jiwnani K, Zelkowitz MV.  2004.  Susceptibility matrix: a new aid to software auditing. Security Privacy, IEEE. 2(2):16-21.
Jiwnani K, Zelkowitz MV.  2002.  Security Testing using a Susceptibility Matrix. International Symposioum on Software Reliability Engineering. 13
Jiwnani K, Zelkowitz MV.  2002.  Maintaining software with a security perspective. Software Maintenance, 2002. Proceedings. International Conference on. :194-203.
Jog N, Shneiderman B.  1994.  User Controlled Smooth Zooming for Information Visualization. Institute for Systems Research Technical Reports.
Jog N, Shneiderman B.  1995.  Starfield information visualization with interactive smooth zooming. Proc. IFIP 2.6 Visual Databases Systems. :3-14.
Jog N, Shneiderman B.  1998.  Interactive Smooth Zoomming in a Starfield Information Visualization. Technical Reports of the Computer Science Department.
Jogt NK, Shneiderman B.  1995.  Starfield visualization with interactive smooth zooming. Visual database systems, IIIVisual database systems, III. 3:1-1.
J. Johnson I, Labich N, Might M, Van Horn D.  2013.  Optimizing Abstract Abstract Machines. arXiv:1211.3722 [cs].
Johnson B, Shneiderman B.  1993.  Treemaps. Sparks of innovation in human-computer interaction. 284:309-309.