Publications

Search
Export 1857 results:
Author Title [ Type(Desc)] Year
Filters: First Letter Of Last Name is C  [Clear All Filters]
Book Chapters
Basili VR, Zelkowitz MV, Sjøberg DIK, Johnson P, Cowling AJ.  2007.  Protocols in the use of empirical software engineering artifacts. Empirical Software EngineeringEmpirical Software Engineering. 12:107-119.
Ramanathan N, Chellappa R.  2007.  Recognizing Faces Across Age Progression. Face Biometrics for Personal IdentificationFace Biometrics for Personal Identification. :27-42.
Agrawala AK, CILINGIROGLU A, Lee S.  1997.  Regulation of Cable Television. The Froehlich/Kent Encyclopedia of Telecommunications: Volume 15-Radio Astronomy to Submarine Cable SystemsThe Froehlich/Kent Encyclopedia of Telecommunications: Volume 15-Radio Astronomy to Submarine Cable Systems. 15:84-84.
Aris A, Shneiderman B, Plaisant C, Shmueli G, Jank W.  2005.  Representing Unevenly-Spaced Time Series Data for Visualization and Interactive Exploration. Human-Computer Interaction - INTERACT 2005Human-Computer Interaction - INTERACT 2005. 3585:835-846.
Rajagopalan AN, Chellappa R, Koterba N.  2003.  Robust Face Recognition in the Presence of Clutter. Audio- and Video-Based Biometric Person AuthenticationAudio- and Video-Based Biometric Person Authentication. 2688:1062-1062.
Hicks MW, Weirich S, Crary K.  2001.  Safe and Flexible Dynamic Linking of Native Code. Types in Compilation. 2071:147-176.
Kumar V, Marathe M, Parthasarathy S, Srinivasan A.  2005.  Scheduling on Unrelated Machines Under Tree-Like Precedence Constraints. Approximation, Randomization and Combinatorial Optimization. Algorithms and TechniquesApproximation, Randomization and Combinatorial Optimization. Algorithms and Techniques. 3624:609-609.
Dachman-Soled D, Kalai YTauman.  2012.  Securing Circuits against Constant-Rate Tampering. Advances in Cryptology – CRYPTO 2012. :533-551.
Albanese M, Turaga P, Chellappa R, Pugliese A, Subrahmanian V.  2010.  Semantic Video Content Analysis. Video Search and MiningVideo Search and Mining. 287:147-176.
Zajic D, Dorr BJ, Lin J, O'Leary DP, Conroy JM, Schlesinger JD.  2006.  Sentence Trimming and Selection: Mixing and Matching. DUC 06 Conference Proceedings.
Nixon MS, Tan T, Chellappa R.  2006.  Silhouette-Based Approaches. Human Identification Based on GaitHuman Identification Based on Gait. :45-105.
Choi SGeol, Dachman-Soled D, Malkin T, Wee H.  2009.  Simple, Black-Box Constructions of Adaptively Secure Protocols. Theory of Cryptography. :387-402.
Bessiere K, Ceaparu I, Lazar J, Robinson J, Shneiderman B.  2004.  Social and psychological influences on computer user frustration. Media access: Social and psychological dimensions of new technology useMedia access: Social and psychological dimensions of new technology use. :91-103.
Kaâniche M, Kanoun K, Cukier M, Martini M.  1994.  Software reliability analysis of three successive generations of a Switching System. Dependable Computing — EDCC-1. 852:471-490.
Cheong LF, Fermüller C, Aloimonos Y.  1996.  Spatiotemporal representations for visual navigation. Computer Vision — ECCV '96Computer Vision — ECCV '96. 1064:671-684.
Cheong LF, Fermüller C, Aloimonos Y.  1996.  Spatiotemporal representations for visual navigation. Computer Vision — ECCV '96Computer Vision — ECCV '96. 1064:671-684.
Sharma P, Khurana U, Shneiderman B, Scharrenbroich M, Locke J.  2011.  Speeding Up Network Layout and Centrality Measures for Social Computing Goals. Social Computing, Behavioral-Cultural Modeling and PredictionSocial Computing, Behavioral-Cultural Modeling and Prediction. 6589:244-251.
Turaga P, Veeraraghavan A, Srivastava A, Chellappa R.  2010.  Statistical Analysis on Manifolds and Its Applications to Video Analysis. Video Search and MiningVideo Search and Mining. 287:115-144.
Powell D, Cukier M, Arlat J.  1996.  On stratified sampling for high coverage estimations. Dependable Computing — EDCC-2. 1150:35-54.
Nixon MS, Tan T, Chellappa R.  2006.  Subjects Allied to Gait. Human Identification Based on GaitHuman Identification Based on Gait. :5-15.
Colwell RR.  2004.  A Tangled Bank: Reflections on the Tree of Life and Human Health. Assembling the Tree of LifeAssembling the Tree of Life. :18-18.
Ahn J-wook, Taieb-Maimon M, Sopan A, Plaisant C, Shneiderman B.  2011.  Temporal Visualization of Social Network Dynamics: Prototypes for Nation of Neighbors. Social Computing, Behavioral-Cultural Modeling and PredictionSocial Computing, Behavioral-Cultural Modeling and Prediction. 6589:309-316.
Card SK, Mackinlay JD, Shneiderman B.  1999.  Text in 1D. Readings in information visualizationReadings in information visualization. :411-412.
Card SK, Mackinlay JD, Shneiderman B.  1999.  Text in 2D. Readings in information visualizationReadings in information visualization. :431-431.
Card SK, Mackinlay JD, Shneiderman B.  1999.  Text in 3D. Readings in information visualizationReadings in information visualization. :440-441.

Pages