Publications

Export 566 results:
Author Title Type [ Year(Asc)]
Filters: First Letter Of Last Name is V  [Clear All Filters]
2009
Chuang W-H, Varna AL, M. Wu.  2009.  Modeling and analysis of ordinal ranking in content fingerprinting. Information Forensics and Security, 2009. WIFS 2009. First IEEE International Workshop on. :116-120.
Sankaranarayanan AC, Patro R, Turaga P, Varshney A, Chellappa R.  2009.  Modeling and visualization of human activities for multicamera networks. EURASIP Journal on Image and Video Processing. 2009
Varna AL, M. Wu.  2009.  Modeling content fingerprints using markov random fields. Information Forensics and Security, 2009. WIFS 2009. First IEEE International Workshop on. :111-115.
Vishkin U.  2009.  Optical interconnect structure in a computer system and method of transporting data between processing elements and memory through the optical interconnect structure. 10/529,310(7505822)
Everett L, Vo A, Hannenhalli S.  2009.  PTM-Switchboard--a database of posttranslational modifications of transcription factors, the mediating enzymes and target genes. Nucleic Acids ResearchNucleic Acids Research. 37(Database):D66-D71-D66-D71.
Veeraraghavan A, Srivastava A, Roy-Chowdhury AK, Chellappa R.  2009.  Rate-Invariant Recognition of Humans and Their Activities. Image Processing, IEEE Transactions on. 18(6):1326-1339.
Lee CH, Kim Y, Varshney A.  2009.  Saliency-guided lighting. IEICE TRANSACTIONS on Information and Systems. 2:369-73.
Barni R, Comba J, Varshney A.  2009.  Salient Clustering for View-dependent Multiresolution Rendering. Computer Graphics and Image Processing (SIBGRAPI), 2009 XXII Brazilian Symposium on. :56-63.
Lu W, Varna AL, Swaminathan A, M. Wu.  2009.  Secure image retrieval through feature protection. Acoustics, Speech and Signal Processing, 2009. ICASSP 2009. IEEE International Conference on. :1533-1536.
Katz J, Vaikuntanathan V.  2009.  Signature schemes with bounded leakage resilience. Advances in Cryptology–ASIACRYPT 2009. :703-720.
Katz J, Vaikuntanathan V.  2009.  Smooth projective hashing and password-based authenticated key exchange from lattices. Advances in Cryptology–ASIACRYPT 2009. :636-652.
Vishkin U.  2009.  Spawn-join instruction set architecture for providing explicit multithreading. 10/236,934(7523293)
Clement T, Plaisant C, Vuillemot R.  2009.  The Story of One: Humanity scholarship with visualization and text analysis. Relation. 10(1.43):8485-8485.
Rai P, Daumé H, Venkatasubramanian S.  2009.  Streamed learning: one-pass SVMs. Proceedings of the 21st international jont conference on Artifical intelligence. :1211-1216.
Goyal A, Daumé H, Venkatasubramanian S.  2009.  Streaming for large scale NLP: Language modeling. Proceedings of Human Language Technologies: The 2009 Annual Conference of the North American Chapter of the Association for Computational Linguistics. :512-520.
Agrawala AK, Varshney A, Almazan CB.  2009.  System and Method for Spatio-Temporal-Context Aware Interaction of Users .... 12/267,921
Wen X, Vishkin U.  2009.  SYSTEM AND METHOD FOR THREAD HANDLING IN MULTITHREADED PARALLEL COMPUTING OF NESTED THREADS. 12/158,004
Feamster N, Hassan U, Sundaresan S, Valancius V, Johari R, Vazirani V.  2009.  Towards an Internet Connectivity Market. GT-CS-09-01
Feamster N, Hassan U, Sundaresan S, Valancius V, Johari R, Vazirani V.  2009.  Towards an Internet Connectivity Market. GT-CS-09-01
Turaga P, Veeraraghavan A, Chellappa R.  2009.  Unsupervised view and rate invariant clustering of video sequences. Computer Vision and Image Understanding. 113(3):353-371.
Hierons RM, Krause P, Lüttgen G, Simons AJH, Vilkomir S, Woodward MR, Zedan H, Bogdanov K, Bowen JP, Cleaveland R et al..  2009.  Using formal specifications to support testing. ACM Computing Surveys. 41:1-76.
Stantchev G, Juba D, Dorland W, Varshney A.  2009.  Using Graphics Processors for High-Performance Computation and Visualization of Plasma Turbulence. Computing in Science Engineering. 11(2):52-59.
Vuillemot R, Clement T, Plaisant C, Kumar A.  2009.  What's being said near "Martha"? Exploring name entities in literary text collections Visual Analytics Science and Technology, 2009. VAST 2009. IEEE Symposium on. :107-114.
2008
Vitaladevuni SN, Kellokumpu V, Davis LS.  2008.  Action recognition using ballistic dynamics. Computer Vision and Pattern Recognition, 2008. CVPR 2008. IEEE Conference on. :1-8.
Tariq M, Zeitoun A, Valancius V, Feamster N, Ammar M.  2008.  Answering what-if deployment and configuration questions with wise. Proceedings of the ACM SIGCOMM 2008 conference on Data communication. :99-110.

Pages