Publications
Export 166 results:
Author Title [ Type] Year Filters: First Letter Of Title is O [Clear All Filters]
2002. OCR error correction using a noisy channel model. Proceedings of the second international conference on Human Language Technology Research. :257-262.
2010. Obtaining valid safety data for software safety measurement and process improvement. Proceedings of the 2010 ACM-IEEE International Symposium on Empirical Software Engineering and Measurement. :46:1–46:4-46:1–46:4.
2006. Oblivious network design. Proceedings of the seventeenth annual ACM-SIAM symposium on Discrete algorithm. :970-979.
2007. Objects in Action: An Approach for Combining Action Understanding and Object Perception. Computer Vision and Pattern Recognition, 2007. CVPR '07. IEEE Conference on. :1-8.
2004. Object tracking by adaptive feature extraction. Image Processing, 2004. ICIP '04. 2004 International Conference on. 3:1501-1504Vol.3-1501-1504Vol.3.
2007. Object Tracking at Multiple Levels of Spatial Resolutions. Image Analysis and Processing, 2007. ICIAP 2007. 14th International Conference on. :149-154.
2009. Object detection via boosted deformable features. Image Processing (ICIP), 2009 16th IEEE International Conference on. :1445-1448.
2010. Object Dependent Manifold Priors for Image Deconvolution. Digital Image Processing and Analysis. :DMC2-DMC2.
2004. Oasys: An opinion analysis system. AAAI Spring symposium on Computational Approaches to Analyzing Weblogs.
1999. Overview+ detail. Readings in information visualizationReadings in information visualization. :285-286.
2011. Optimal Verification of Operations on Dynamic Sets. Advances in Cryptology – CRYPTO 2011. :91-110.
2008. Optimal Cryptographic Hardness of Learning Monotone Functions. Automata, Languages and Programming. :36-47.
2010. Optimal Authenticated Data Structures with Multilinear Forms. Pairing-Based Cryptography - Pairing 2010. :246-264.
2011. Oblivious RAM with O((logN)^3) Worst-Case Cost. Advances in Cryptology – ASIACRYPT 2011. 7073:197-214.