Publications
Export 490 results:
[ Author] Title Type Year Filters: First Letter Of Last Name is C [Clear All Filters]
2004. Automated cluster-based Web service performance tuning. 13th IEEE International Symposium on High performance Distributed Computing, 2004. Proceedings. :36-44.
2009. Comparative genomics reveals mechanism for short-term and long-term clonal transitions in pandemic Vibrio cholerae. Proceedings of the National Academy of Sciences. 106(36):15442-15447.
2002. Analysis of 16S-23S rRNA intergenic spacer of Vibrio cholerae and Vibrio mimicus for detection of these species. METHODS IN MOLECULAR BIOLOGY. 179:171-178.
2009. Tampering identification using Empirical Frequency Response. Acoustics, Speech and Signal Processing, 2009. ICASSP 2009. IEEE International Conference on. :1517-1520.
2011. Exploring compression effects for improved source camera identification using strongly compressed video. Image Processing (ICIP), 2011 18th IEEE International Conference on. :1953-1956.
2010. Semi non-intrusive training for cell-phone camera model linkage. Information Forensics and Security (WIFS), 2010 IEEE International Workshop on. :1-6.
2010. Performance impact of ordinal ranking on content fingerprinting. IEEE Int. Conf. on Image Processing.
2009. Modeling and analysis of ordinal ranking in content fingerprinting. Information Forensics and Security, 2009. WIFS 2009. First IEEE International Workshop on. :116-120.
2006. Approximate Data Collection in Sensor Networks using Probabilistic Models. Proceedings of the 22nd International Conference on Data Engineering, 2006. ICDE '06. :48-48.
1990. Modeling diagnostic problem-solving at multiple levels of abstraction. Artificial Intelligence Applications, 1990., Sixth Conference on. :55-61vol.1-55-61vol.1.
1990. Diagnostic reasoning at multiple levels of abstraction. AI Systems in Government Conference, 1990. Proceedings., Fifth Annual. :168-175.
2008. On the Use of Security Metrics Based on Intrusion Prevention System Event Data: An Empirical Analysis. :49-58.
2008. Finding Corrupted Computers Using Imperfect Intrusion Prevention System Event Data. Computer Safety, Reliability, and Security. 5219:221-234.
2005. A Comparison of Voice Controlled and Mouse Controlled Web Browsing (2000). Institute for Systems Research Technical Reports.
2000. A comparison of voice controlled and mouse controlled web browsing. Proceedings of the fourth international ACM conference on Assistive technologies. :72-79.
2002. Wide baseline image registration using prior information. Multimedia Signal Processing, 2002 IEEE Workshop on. :37-40.
2003. Video synthesis of arbitrary views for approximately planar scenes. Acoustics, Speech, and Signal Processing, 2003. Proceedings. (ICASSP '03). 2003 IEEE International Conference on. 3:III-497-500vol.3-III-497-500vol.3.
2012. Gripper synthesis for indirect manipulation of cells using Holographic Optical Tweezers. :2749-2754.
2003. Statistical bias and the accuracy of 3d reconstruction from video. in International Journal of Computer Vision.
2003. A Factorization Approach for Activity Recognition. Computer Vision and Pattern Recognition Workshop, 2003. CVPRW '03. Conference on. 4:41-41.
2002. 3D face reconstruction from video using a generic model. Multimedia and Expo, 2002. ICME '02. Proceedings. 2002 IEEE International Conference on. 1:449-452vol.1-449-452vol.1.
2003. Stochastic Approximation and Rate-Distortion Analysis for Robust Structure and Motion Estimation. International Journal of Computer Vision. 55(1):27-53.
2003. VIDEO SYNTHESIS OF ARBITRARY VIEWS FOR APPROXIMATELY PLANAR SCENES. IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS SPEECH AND SIGNAL PROCESSING. 3