Publications

Export 1830 results:
Author Title [ Type(Desc)] Year
Filters: First Letter Of Last Name is D  [Clear All Filters]
Conference Papers
Demaine ED, Hajiaghayi MT, Kawarabayashi K.  2005.  Algorithmic graph minor theory: Decomposition, approximation, and coloring. Foundations of Computer Science, 2005. FOCS 2005. 46th Annual IEEE Symposium on. :637-646.
Ayan N F, Dorr BJ, Monz C.  2005.  Alignment link projection using transformation-based learning. Proceedings of the conference on Human Language Technology and Empirical Methods in Natural Language Processing. :185-192.
Zheng Y, Li H, Doermann D.  2003.  AModel-based Line Detection Algorithm in Documents. ICDAR. :44-48.
Smith MA, Shneiderman B, Milic-Frayling N, Mendes Rodrigues E, Barash V, Dunne C, Capone T, Perer A, Gleave E.  2009.  Analyzing (social media) networks with NodeXL. Proceedings of the fourth international conference on Communities and technologies. :255-264.
Li Y, Zheng Y, Doermann D, Jaeger S.  2006.  ANew Algorithm for Detecting Text Line in Handwritten Documents. 10th International Workshop on Frontiers in Handwriting Recognition. :35-40.
Ordóñez P, desJardins M, Lombardi M, Lehmann CU, Fackler J.  2010.  An animated multivariate visualization for physiological and clinical data in the ICU. Proceedings of the 1st ACM International Health Informatics Symposium. :771-779.
Meyers A, Fang AC, Ferro L, Kübler S, Jia-Lin T, Palmer M, Poesio M, Dolbey A, Schuler KK, Loper E et al..  2006.  Annotation compatibility working group report. Proceedings of the Workshop on Frontiers in Linguistically Annotated Corpora 2006. :38-53.
Meyers A, Fang AC, Ferro L, Kübler S, Jia-Lin T, Palmer M, Poesio M, Dolbey A, Schuler KK, Loper E et al..  2006.  Annotation compatibility working group report. Proceedings of the Workshop on Frontiers in Linguistically Annotated Corpora 2006. :38-53.
Seymour J J, Tuzo J, desJardins M.  2011.  Ant Colony Optimization in a Changing Environment. 2011 AAAI Fall Symposium Series.
Don A, Brennan S, Laurel B, Shneiderman B.  1992.  Anthropomorphism: from Eliza to Terminator 2. Proceedings of the SIGCHI conference on Human factors in computing systems. :67-70.
Capellades MB, Doermann D, DeMenthon D, Chellappa R.  2003.  An appearance based approach for human and object tracking. Image Processing, 2003. ICIP 2003. Proceedings. 2003 International Conference on. 2:II-85-8vol.3-II-85-8vol.3.
Capellades MB, Doermann D, DeMenthon D, Chellappa R.  2003.  An appearance based approach for human and object tracking. Image Processing, 2003. ICIP 2003. Proceedings. 2003 International Conference on. 2:II-85-8vol.3-II-85-8vol.3.
Das R, Hwang YS, Uysal M, Saltz J, Sussman A.  1993.  Applying the CHAOS/PARTI library to irregular problems in computational chemistry and computational aerodynamics. Scalable Parallel Libraries Conference, 1993., Proceedings of the. :45-56.
Chu D, Deshpande A, Hellerstein JM, Hong W.  2006.  Approximate Data Collection in Sensor Networks using Probabilistic Models. Proceedings of the 22nd International Conference on Data Engineering, 2006. ICDE '06. :48-48.
Raykar VC, Duraiswami R.  2005.  Approximate expressions for the mean and the covariance of the maximum likelihood estimator for acoustic source localization. Acoustics, Speech, and Signal Processing, 2005. Proceedings. (ICASSP '05). IEEE International Conference on. 3:iii/73-iii/76Vol.3-iii/73-iii/76Vol.3.
Kobla V, Doermann D, Lin K-I.  1996.  Archiving, indexing, and retrieval of video in compressed domain. SPIEConference on Multimedia Storage and Archiving Systems. 2916:78-89.
Drury J, Resnik P, Weinberg A, Gennari S, Aoshima S.  2002.  Argument structure saturation in a constraint based model.
Xingyuan L, Doermann D, Oh W, Gao W.  1999.  ARobust Method for Unknown Forms Analysis. ICDAR. :531-534.
Zhu G, Jaeger S, Doermann D.  2006.  ARobust Stamp Detection Framework on Degraded Documents. International Conference on Document Recognition and Retrieval XIII. :1-9.
Dumitras T, Efstathopoulos P.  2012.  Ask WINE: Are We Safer Today? Evaluating Operating System Security Through Big Data Analysis LEET'12 Proceedings of the 5th USENIX conference on Large-Scale Exploits and Emergent Threats. :11-11.
El-Alfy H, Jacobs DW, Davis LS.  2009.  Assigning cameras to subjects in video surveillance systems. Robotics and Automation, 2009. ICRA '09. IEEE International Conference on. :837-843.
Voll K, Tom Yeh, Dahl V.  2000.  An assumptive logic programming methodology for parsing. Tools with Artificial Intelligence, 2000. ICTAI 2000. Proceedings. 12th IEEE International Conference on. :11-18.
Zotkin DN, Duraiswami R, Davis LS, Haritaoglu I.  2000.  An audio-video front-end for multimedia applications. 2000 IEEE International Conference on Systems, Man, and Cybernetics. 2:786-791vol.2-786-791vol.2.
Zotkin DN, Duraiswami R, Davis LS, Haritaoglu I.  2000.  An audio-video front-end for multimedia applications. 2000 IEEE International Conference on Systems, Man, and Cybernetics. 2:786-791vol.2-786-791vol.2.
Zhu G, Doermann D.  2007.  Automatic Document Logo Detection. The 9th International Conference on Document Analysis and Recognition (ICDAR 2007). :864-868.

Pages