Publications

Export 927 results:
Author Title [ Type(Desc)] Year
Filters: First Letter Of Last Name is W  [Clear All Filters]
Conference Papers
Chuang W-H, Su H, M. Wu.  2011.  Exploring compression effects for improved source camera identification using strongly compressed video. Image Processing (ICIP), 2011 18th IEEE International Conference on. :1953-1956.
Jimmy Lin, Wu P, Demner-Fushman D, Abels E.  2006.  Exploring the limits of single-iteration clarification dialogs. Proceedings of the 29th annual international ACM SIGIR conference on Research and development in information retrieval. :469-476.
Tsui C-jung, Wang P, Fleischmann KR, Oard D, Sayeed AB.  2010.  Exploring the Relationships among ICTs: A Scalable Computational Approach Using KL Divergence and Hierarchical Clustering. Hawaii International Conference on System Sciences. :1-10.
Sayeed AB, Nguyen HC, Meyer TJ, Weinberg A.  2010.  Expresses-an-opinion-about: using corpus statistics in an information extraction approach to opinion mining. :1095-1103.
Taylor M, Yin C-E, M. Wu, Qu G.  2008.  Extended abstract: A hardware-assisted data hiding based approach in building high performance secure execution systems. Hardware-Oriented Security and Trust, 2008. HOST 2008. IEEE International Workshop on. :93-96.
Wei Z, JaJa JF.  2011.  A Fast Algorithm for Constructing Inverted Files on Heterogeneous Platforms. Parallel Distributed Processing Symposium (IPDPS), 2011 IEEE International. :1124-1134.
Wee SJ, Apostolopoulos JG, Feamster N.  1999.  Field-to-frame transcoding with spatial and temporal downsampling. Image Processing, 1999. ICIP 99. Proceedings. 1999 International Conference on. 4:271-275vol.4-271-275vol.4.
Wongsuphasawat K, Shneiderman B.  2009.  Finding comparable temporal categorical records: A similarity measure with an interactive visualization. IEEE Symposium on Visual Analytics Science and Technology, 2009. VAST 2009. :27-34.
Wagner D, Foster JS, Brewer EA, Aiken A.  2000.  A first step towards automated detection of buffer overrun vulnerabilities. The 2000 Network and Distributed Systems Security Conference. San Diego, CA. 14
Wu J S-C, Sussman A.  2004.  Flexible Control of Data Transfers between Parallel Programs. Proceedings of the 5th IEEE/ACM International Workshop on Grid Computing. :226-234.
Condon A, Deshpande A, Hellerstein L, Wu N.  2006.  Flow algorithms for two pipelined filter ordering problems. Proceedings of the twenty-fifth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems. :193-202.
Weissman A, Gupta SK, Fiorentini X, Sudarsan R, Sriram R.  2009.  Formal Representation of Product Design Specifications for Validating Product Design. :1411-1422.
Kee H, Bhattacharyya SS, Wong I, Rao Y.  2010.  FPGA-based design and implementation of the 3GPP-LTE physical layer using parameterized synchronous dataflow techniques. 2010 IEEE International Conference on Acoustics Speech and Signal Processing (ICASSP). :1510-1513.
Wen X, Vishkin U.  2008.  Fpga-based prototype of a pram-on-chip processor. Proceedings of the 5th conference on Computing frontiers. :55-66.
Rand W, Blikstein P, Wilensky U.  2008.  GoGoBot: group collaboration, multi-agent modeling, and robots. Proceedings of the 7th international joint conference on Autonomous agents and multiagent systems: demo papers. :1715-1716.
Yalçın MA, Weiss K, De Floriani L.  2011.  GPU algorithms for diamond-based multiresolution terrain processing. Eurographics Symposium on Parallel Graphics and Visualization. :10-11.
Garg R, Varna AL, M. Wu.  2010.  Gradient descent approach for secure localization in resource constrained wireless sensor networks. Acoustics Speech and Signal Processing (ICASSP), 2010 IEEE International Conference on. :1854-1857.
Chowdhury S, Svec P, Wang C, Losert W, Gupta SK.  2012.  Gripper synthesis for indirect manipulation of cells using Holographic Optical Tweezers. :2749-2754.
Anderson ML, Schmill M, Oates T, Perlis D, Josyula D, Wright D, Human SWTDN, Metacognition L, Fults S, Josyula DP.  2007.  Hood College, Master of Business Administration, 2005 Hood College, Master of Science (Computer Science), 2001 Hood College, Bachelor of Science (Computer Science), 1998 Frederick Community College, Associate in Arts (Business Administration), 1993. Proceedings of the Workshop on Metareasoning in Agent-Based Systems.
Wyche SP, Chetty M.  2013.  "I Want to Imagine How That Place Looks": Designing Technologies to Support Connectivity Between Africans Living Abroad and Home. SIGCHI '13. :2755-2764.
Wang J, Oard D.  2002.  iCLEF 2001 at Maryland: comparing term-for-term gloss and MT. Evaluation of Cross-Language Information Retrieval Systems. :167-235.
He D, Wang J, Luo J, Oard D.  2004.  iCLEF 2004 at Maryland: Summarization design for interactive cross-language question answering. Proceeding of Cross Language Evaluation Forum (CLEF2004).
Patel VM, Wu T, Biswas S, Phillips PJ, Chellappa R.  2011.  Illumination robust dictionary-based face recognition. 2011 18th IEEE International Conference on Image Processing (ICIP). :777-780.
McKay C, Swaminathan A, Gou H, M. Wu.  2008.  Image acquisition forensics: Forensic analysis to identify imaging source. Acoustics, Speech and Signal Processing, 2008. ICASSP 2008. IEEE International Conference on. :1657-1660.
Swaminathan A, Mao Y, M. Wu.  2004.  Image hashing resilient to geometric and filtering operations. Multimedia Signal Processing, 2004 IEEE 6th Workshop on. :355-358.

Pages