Publications

Export 166 results:
Author Title [ Type(Asc)] Year
Filters: First Letter Of Title is O  [Clear All Filters]
Conference Papers
Kolak O, Resnik P.  2002.  OCR error correction using a noisy channel model. Proceedings of the second international conference on Human Language Technology Research. :257-262.
Basili VR, Zelkowitz MV, Layman L, Dangle K, Diep M.  2010.  Obtaining valid safety data for software safety measurement and process improvement. Proceedings of the 2010 ACM-IEEE International Symposium on Empirical Software Engineering and Measurement. :46:1–46:4-46:1–46:4.
Gupta A, Hajiaghayi MT, R\äcke H.  2006.  Oblivious network design. Proceedings of the seventeenth annual ACM-SIAM symposium on Discrete algorithm. :970-979.
Gupta A, Davis LS.  2007.  Objects in Action: An Approach for Combining Action Understanding and Object Perception. Computer Vision and Pattern Recognition, 2007. CVPR '07. IEEE Conference on. :1-8.
Han B, Davis LS.  2004.  Object tracking by adaptive feature extraction. Image Processing, 2004. ICIP '04. 2004 International Conference on. 3:1501-1504Vol.3-1501-1504Vol.3.
Tran SD, Davis LS.  2007.  Object Tracking at Multiple Levels of Spatial Resolutions. Image Analysis and Processing, 2007. ICIAP 2007. 14th International Conference on. :149-154.
Hussein M, Porikli F, Davis LS.  2009.  Object detection via boosted deformable features. Image Processing (ICIP), 2009 16th IEEE International Conference on. :1445-1448.
Yu X, Li Y, Fermüller C, Doermann D.  2007.  Object Detection Using Shape Codebook. British Machine Vision Conference (BMVC'07).
Ni J, Turaga P, M.Patel V, Chellappa R.  2010.  Object Dependent Manifold Priors for Image Deconvolution. Digital Image Processing and Analysis. :DMC2-DMC2.
Cesarano C, Dorr BJ, Picariello A, Reforgiato D, Sagoff A, V.S. Subrahmanian.  2004.  Oasys: An opinion analysis system. AAAI Spring symposium on Computational Approaches to Analyzing Weblogs.
Book Chapters
Card SK, Mackinlay JD, Shneiderman B.  1999.  Overview+ detail. Readings in information visualizationReadings in information visualization. :285-286.
Papamanthou C, Tamassia R, Triandopoulos N.  2011.  Optimal Verification of Operations on Dynamic Sets. Advances in Cryptology – CRYPTO 2011. :91-110.
Dachman-Soled D, Lee HK, Malkin T, Servedio RA, Wan A, Wee H.  2008.  Optimal Cryptographic Hardness of Learning Monotone Functions. Automata, Languages and Programming. :36-47.
Papamanthou C, Tamassia R, Triandopoulos N.  2010.  Optimal Authenticated Data Structures with Multilinear Forms. Pairing-Based Cryptography - Pairing 2010. :246-264.
Elaine Shi, Chan T, Stefanov E, Li M.  2011.  Oblivious RAM with O((logN)^3) Worst-Case Cost. Advances in Cryptology – ASIACRYPT 2011. 7073:197-214.

Pages