Publications

Export 604 results:
Author [ Title(Asc)] Type Year
Filters: First Letter Of Last Name is J  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
S
Jacobs DW, Chennubhotla C.  1994.  Segmenting independently moving, noisy points. Motion of Non-Rigid and Articulated Objects, 1994., Proceedings of the 1994 IEEE Workshop on. :96-103.
Jiwnani K, Zelkowitz MV.  2002.  Security Testing using a Susceptibility Matrix. International Symposioum on Software Reliability Engineering. 13
Belhumeur P, Chen D, Feiner S, Jacobs DW, Kress W, Ling H, Lopez I, Ramamoorthi R, Sheorey S, White S.  2008.  Searching the world’s herbaria: A system for visual identification of plant species. Computer Vision–ECCV 2008. :116-129.
Jong F D, Oard D, Ordelman R, Raaijmakers S.  2007.  Searching spontaneous conversational speech. ACM SIGIR Forum. 41:104-104.
Funkhouser T, Min P, Kazhdan M, Chen J, Halderman A, Dobkin D, Jacobs DW.  2003.  A search engine for 3D models. ACM Trans. Graph.. 22(1):83-105.
Song S, JaJa JF.  2009.  Search and Access Strategies for Web Archives. Proceedings of IS&T Archiving 2009.
Li Y, Zheng Y, Doermann D, Jaeger S.  2006.  Script-Independent Text Line Segmentation in Freestyle Handwritten Documents. LAMP-TR-136, CS-TR-4836, UMIACS-TR-2006-51, CFAR-TR-1017
Yi L, Zheng Y, Doermann D, Jaeger S.  2008.  Script-Independent Text Line Segmentation in Freestyle Handwritten Documents. IEEETransactions on Pattern Analysis and Machine Intelligence. :1313-1329.
Kumar V, Marathe M, Parthasarathy S, Srinivasan A.  2005.  Scheduling on Unrelated Machines Under Tree-Like Precedence Constraints. Approximation, Randomization and Combinatorial Optimization. Algorithms and TechniquesApproximation, Randomization and Combinatorial Optimization. Algorithms and Techniques. 3624:609-609.
Bader DA, JaJa JF, Chellappa R.  1995.  Scalable data parallel algorithms for texture synthesis using Gibbs random fields. Image Processing, IEEE Transactions on. 4(10):1456-1460.
Bader DA, JaJa JF, Chellappa R.  1998.  Scalable Data Parallel Algorithms for Texture Synthesis and Compression using Gibbs Random Fields. UMIACS-TR-93-80
Akanda A, Aziz S, Jutla A, Huq A, Alam M, Ahsan G, Colwell RR.  2018.  Satellites and Cell Phones Form a Cholera Early-Warning System. Eos. 99
Jutla A, Aldaach H, Billian H, Akanda A, Huq A, Colwell RR.  2015.  Satellite Based Assessment of Hydroclimatic Conditions Related to Cholera in Zimbabwe. PLOS ONE. (9Suppl 1):e0137828.
Swamy N, Hicks MW, Morrisett G, Grossman D, Jim T.  2006.  Safe manual memory management in Cyclone. Science of Computer Programming. 62(2):122-144.
Hicks MW, Morrisett G, Grossman D, Jim T.  2003.  Safe and flexible memory management in Cyclone. Technical Reports from UMIACS.
R
JaJa JF, Wu SA.  1989.  On routing two-terminal nets in the presence of obstacles. Computer-Aided Design of Integrated Circuits and Systems, IEEE Transactions on. 8(5):563-570.
Dorr BJ, Jones D.  1996.  Role of word sense disambiguation in lexical acquisition: predicting semantics from syntactic cues. Proceedings of the 16th conference on Computational linguistics - Volume 1. :322-327.
Schmill MD, Oates T, Anderson M, Fults S, Josyula D, Perlis D, Wilson S.  2008.  The role of metacognition in robust AI systems. AAAI-08 Workshop on Metareasoning,(Chicago, IL).
Liu Z, Jacobs DW, Basri R.  1999.  The role of convexity in perceptual completion: beyond good continuation. Vision Research. 39(25):4244-4257.
Ji H, Fermüller C.  2009.  Robust Wavelet-Based Super-Resolution Reconstruction: Theory and Algorithm. IEEE Transactions on Pattern Analysis and Machine Intelligence. 31(4):649-660.
JaJa JF.  2006.  Robust technologies for automated ingestion and long-term preservation of digital information. Proceedings of the 2006 international conference on Digital government research. :285-286.
Yu Z, Seng CY, Jiang T, Wu X, Arbaugh WA.  2005.  Robust routing in malicious environment for ad hoc networks. Information Security Practice and Experience. :36-47.
Jacobs DW.  1996.  Robust and efficient detection of salient convex groups. Pattern Analysis and Machine Intelligence, IEEE Transactions on. 18(1):23-37.
Tulyakov S, Jaeger S, Govindaraju V, Doermann D.  2008.  Review of Classifier Combination Methods. Studies in Computational Intelligence: Machine Learning in Document Analysis and RecognitionStudies in Computational Intelligence: Machine Learning in Document Analysis and Recognition. :361-386.
Aris A, Shneiderman B, Plaisant C, Shmueli G, Jank W.  2005.  Representing Unevenly-Spaced Time Series Data for Visualization and Interactive Exploration. Human-Computer Interaction - INTERACT 2005Human-Computer Interaction - INTERACT 2005. 3585:835-846.

Pages