Export 490 results:
[ Author(Asc)] Title Type Year
Filters: First Letter Of Last Name is C  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
Chung J, Nagy JG, O'Leary DP.  2008.  A Weighted GCV Method for Lanczos Hybrid Regularization. Electronic Transactions on Numerical Analysis. 28:149-167.
Chun J, Rivera ING, Colwell RR.  2002.  Analysis of 16S-23S rRNA intergenic spacer of Vibrio cholerae and Vibrio mimicus for detection of these species. METHODS IN MOLECULAR BIOLOGY. 179:171-178.
Chun J, Grim CJ, Hasan NA, Lee JH, Choi SY, Haley BJ, Taviani E, Jeon YS, Kim DW, Lee JH et al..  2009.  Comparative genomics reveals mechanism for short-term and long-term clonal transitions in pandemic Vibrio cholerae. Proceedings of the National Academy of Sciences. 106(36):15442-15447.
Chuang W-H, Varna AL, M. Wu.  2009.  Modeling and analysis of ordinal ranking in content fingerprinting. Information Forensics and Security, 2009. WIFS 2009. First IEEE International Workshop on. :116-120.
Chuang W-H, Swaminathan A, M. Wu.  2009.  Tampering identification using Empirical Frequency Response. Acoustics, Speech and Signal Processing, 2009. ICASSP 2009. IEEE International Conference on. :1517-1520.
Chuang W-H, Su H, M. Wu.  2011.  Exploring compression effects for improved source camera identification using strongly compressed video. Image Processing (ICIP), 2011 18th IEEE International Conference on. :1953-1956.
Chuang W-H, M. Wu.  2010.  Semi non-intrusive training for cell-phone camera model linkage. Information Forensics and Security (WIFS), 2010 IEEE International Workshop on. :1-6.
Chuang WH, Varna AL, Wu M.  2010.  Performance impact of ordinal ranking on content fingerprinting. IEEE Int. Conf. on Image Processing.
Chu BTB, Reggia JA.  1990.  Diagnostic reasoning at multiple levels of abstraction. AI Systems in Government Conference, 1990. Proceedings., Fifth Annual. :168-175.
Chu D, Deshpande A, Hellerstein JM, Hong W.  2006.  Approximate Data Collection in Sensor Networks using Probabilistic Models. Proceedings of the 22nd International Conference on Data Engineering, 2006. ICDE '06. :48-48.
Chu B-TB, Reggia JA.  1990.  Modeling diagnostic problem-solving at multiple levels of abstraction. Artificial Intelligence Applications, 1990., Sixth Conference on. :55-61vol.1-55-61vol.1.
Chrun D, Cukier M, Sneeringer G.  2008.  Finding Corrupted Computers Using Imperfect Intrusion Prevention System Event Data. Computer Safety, Reliability, and Security. 5219:221-234.
Chrun D, Cukier M, Sneeringer G.  2008.  On the Use of Security Metrics Based on Intrusion Prevention System Event Data: An Empirical Analysis. :49-58.
Christian K, Kules B, Shneiderman B, Youssef A.  2005.  A Comparison of Voice Controlled and Mouse Controlled Web Browsing (2000). Institute for Systems Research Technical Reports.
Christian K, Kules B, Shneiderman B, Youssef A.  2000.  A comparison of voice controlled and mouse controlled web browsing. Proceedings of the fourth international ACM conference on Assistive technologies. :72-79.
Chowdhury AM, Chellappa R, Keaton T.  2002.  Wide baseline image registration using prior information. Multimedia Signal Processing, 2002 IEEE Workshop on. :37-40.
Chowdhury AKR, Kale A, Chellappa R.  2003.  Video synthesis of arbitrary views for approximately planar scenes. Acoustics, Speech, and Signal Processing, 2003. Proceedings. (ICASSP '03). 2003 IEEE International Conference on. 3:III-497-500vol.3-III-497-500vol.3.
Chowdhury S, Svec P, Wang C, Losert W, Gupta SK.  2012.  Gripper synthesis for indirect manipulation of cells using Holographic Optical Tweezers. :2749-2754.
Chowdhury AR, Chellappa R.  2003.  Statistical bias and the accuracy of 3d reconstruction from video. in International Journal of Computer Vision.
Chowdhury A RK, Chellappa R.  2003.  A Factorization Approach for Activity Recognition. Computer Vision and Pattern Recognition Workshop, 2003. CVPRW '03. Conference on. 4:41-41.
Chowdhury AR, Chellappa R, Krishnamurthy S, Vo T.  2002.  3D face reconstruction from video using a generic model. Multimedia and Expo, 2002. ICME '02. Proceedings. 2002 IEEE International Conference on. 1:449-452vol.1-449-452vol.1.
Chowdhury A RK, Chellappa R.  2003.  Stochastic Approximation and Rate-Distortion Analysis for Robust Structure and Motion Estimation. International Journal of Computer Vision. 55(1):27-53.
Chow R, Golle P, Jakobsson M, Elaine Shi, Staddon J, Masuoka R, Molina J.  2009.  Controlling data in the cloud: outsourcing computation without outsourcing control. :85-90.
Chow R, Jakobsson M, Masuoka R, Molina J, Niu Y, Elaine Shi, Song Z.  2010.  Authentication in the clouds: a framework and its application to mobile users. :1-6.