Publications

Export 377 results:
Author Title [ Type(Asc)] Year
Filters: First Letter Of Last Name is Y  [Clear All Filters]
Journal Articles
Shet VD, Prasad VSN, Elgammal A, Yacoob Y, Davis LS.  2004.  Multi-cue exemplar-based nonparametric model for gesture recognition. Indian Conference on Computer Vision, Graphics and Image Processing. :16-18.
Yue Z, Guarino D, Chellappa R.  2009.  Moving Object Verification in Airborne Video Sequences. Circuits and Systems for Video Technology, IEEE Transactions on. 19(1):77-89.
Baida RCP, Santos MRM, Carmo MS, Yoshida N, Ferreira D, Ferreira A T, El Sayed NM, Andersson B, da Silveira J F.  2006.  Molecular Characterization of Serine-, Alanine-, and Proline-Rich Proteins of Trypanosoma cruzi and Their Possible Role in Host Cell Infection. Infect. Immun.. 74(3):1537-1546.
Motesharrei S, Rivas J, Kalnay E, Asrar GR, Busalacchi AJ, Cahalan RF, Cane MA, Colwell RR, Feng K, Franklin RS et al..  2016.  Modeling Sustainability: Population, Inequality, Consumption, and Bidirectional Coupling of the Earth and Human Systems. National Science Review. :nww081.
Yilmaz C, Krishna AS, Memon AM, Porter A, Schmidt DC, Gokhale A, Natarajan B.  2004.  A Model-based Distributed Continuous Quality Assurance Process to Enhance the Quality of Service of Evolving Performance-intensive Software Systems. Proceedings of the 2nd ICSE Workshop on Remote Analysis and Measurement of Software Systems (RAMSS), Edinburgh, Scotland, UK.
Hasan NA, Young BA, Minard-Smith AT, Saeed K, Li H, Heizer EM, McMillan NJ, Isom R, Abdullah AShakur, Bornman DM et al..  2014.  Microbial Community Profiling of Human Saliva Using Shotgun Metagenomic Sequencing. PLoS ONE. (5):e97699.
Youssef A, Shneiderman B.  2002.  Media Conversion from Visual to Audio: Voice Browsers. Technical Reports of the Computer Science Department.
O'Leary DP, Yeremin A.  1994.  The linear algebra of block quasi-newton algorithms. Linear Algebra and its Applications. 212–213:153-168.
Brakerski Z, Katz J, Segev G, Yerukhimovich A.  2011.  Limits on the power of zero-knowledge proofs in cryptographic constructions. Theory of Cryptography. :559-578.
Groce A, Katz J, Yerukhimovich A.  2011.  Limits of computational differential privacy in the client/server setting. Theory of Cryptography. :417-431.
Doppa J, Yu J, Tadepalli P, Getoor L.  2010.  Learning algorithms for link prediction based on chance constraints. Machine Learning and Knowledge Discovery in Databases. :344-360.
Yacoob Y, Davis LS.  2000.  Learned models for estimation of rigid and articulated human motion from stationary or moving camera. International Journal of Computer Vision. 36(1):5-30.
Zhu G, Yu X, Li Y, Doermann D.  2009.  Language Identification for Handwritten Document Images Using AShape Codebook. Pattern Recognition. 42:3184-3191.
Yacoob Y, Davis LS.  1994.  Labeling of Human Face Components from Range Data. CVGIP: Image Understanding. 60(2):168-178.
Dodis Y, Katz J, Xu S, Yung M.  2002.  Key-insulated public key cryptosystems. Advances in Cryptology—Eurocrypt 2002. :65-82.
Harper MP, Dorr BJ, Hale J, Roark B, Shafran I, Lease M, Liu Y, Snover M, Yung L, Krasnyanskaya A.  2005.  Johns Hopkins summer workshop final report on parsing and spoken structural event detection. Johns Hopkins University, Tech. Rep.
Yuan X, Memon AM.  2010.  Iterative execution-feedback model-directed GUI testing. Information and Software Technology. 52(5):559-575.
Dodis Y, Franklin M, Katz J, Miyaji A, Yung M.  2003.  Intrusion-resilient public-key encryption. Topics in Cryptology—CT-RSA 2003. :19-32.
Hunter S, Jones P, Mitchell A, Apweiler R, Attwood TK, Bateman A, Bernard T, Binns D, Bork P, Burge S et al..  2012.  InterPro in 2011: new developments in the family and domain prediction database.. Nucleic Acids Res. 40(Database issue):D306-12.
Hunter S, Jones P, Mitchell A, Apweiler R, Attwood TK, Bateman A, Bernard T, Binns D, Bork P, Burge S et al..  2012.  InterPro in 2011: new developments in the family and domain prediction database.. Nucleic Acids Res. 40(Database issue):D306-12.
Cuntoor NP, Yegnanarayana B, Chellappa R.  2005.  Interpretation of state sequences in HMM for activity representation. Proc. IEEE Conf. Acoustic Speech and Signal Processing. 2:709-712.
Grinter RE, W. Edwards K, Chetty M, Poole ES, Sung J-Y, Yang J, Crabtree A, Tolmie P, Rodden T, Greenhalgh C et al..  2009.  The Ins and Outs of Home Networking: The Case for Useful and Usable Domestic Networking. ACM Trans. Comput.-Hum. Interact.. 16(2):8:1-8:28.
Buonanno E, Katz J, Yung M.  2002.  Incremental unforgeable encryption. Fast Software Encryption. :317-325.
Self-Similarity GRUI, BenAbdelkader C, Cutler RG, Davis LS, Local FRU, Global Features JH, Yuen PC, Lai JH, Li C.  2004.  Improved Multiuser Detectors Employing Genetic Algorithms in a Space-Time Block Coded System, Yinggang Du and Kam Tai Chan. Signal. 2004(5):640-648.
Katz J, Schröder D, Yerukhimovich A.  2011.  Impossibility of blind signatures from one-way permutations. Theory of Cryptography. :615-629.

Pages