Publications
Export 377 results:
Author Title Type [ Year] Filters: First Letter Of Last Name is Y [Clear All Filters]
2005. A picture is worth a thousand keywords: image-based object search on a mobile platform. CHI '05 extended abstracts on Human factors in computing systems. :2025-2028.
2005. Pose-Encoded Spherical Harmonics for Robust Face Recognition Using a Single Image. Analysis and Modelling of Faces and GesturesAnalysis and Modelling of Faces and Gestures. 3723:229-243.
2005. Pose-normalized view synthesis from silhouettes. IEEE Intl. Conf. on Acoustics, Speech, and Signal Processing (ICASSP).
2005. Probabilistic Ontologies and Relational Databases. On the Move to Meaningful Internet Systems 2005: CoopIS, DOA, and ODBASEOn the Move to Meaningful Internet Systems 2005: CoopIS, DOA, and ODBASE. 3760:1-17.
2005. Processing of reverberant speech for time-delay estimation. IEEE Transactions on Speech and Audio Processing. 13(6):1110-1118.
2005. Robust routing in malicious environment for ad hoc networks. Information Security Practice and Experience. :36-47.
2005. ROMER: resilient opportunistic mesh routing for wireless mesh networks. Proc. of IEEE WiMesh. 166
2005. ROMER: resilient opportunistic mesh routing for wireless mesh networks. Proc. of IEEE WiMesh. 166
2005. Speaker Localization Using Excitation Source Information in Speech. Speech and Audio Processing, IEEE Transactions on. 13(5):751-761.
2005. Synthesis of novel views of moving objects in airborne video. Proc. British Machine Vision Conference. :290-299.
2005. Toward resilient security in wireless sensor networks. Proceedings of the 6th ACM international symposium on Mobile ad hoc networking and computing. :34-45.
2005. Toward resilient security in wireless sensor networks. Proceedings of the 6th ACM international symposium on Mobile ad hoc networking and computing. :34-45.
2005. Toward resilient security in wireless sensor networks. Proceedings of the 6th ACM international symposium on Mobile ad hoc networking and computing. :34-45.
2005. Using Non-random Associations for Predicting Latency in WANs. Web Information Systems Engineering – WISE 2005.
2006. Appearance-based person recognition using color/path-length profile. Journal of Visual Communication and Image Representation. 17(3):605-622.
2006. Characterization of security notions for probabilistic private-key encryption. Journal of Cryptology. 19(1):67-95.
2006. Covering arrays for efficient fault characterization in complex configuration spaces. IEEE Transactions on Software Engineering. :20-34.
2006. Detection and analysis of hair. Pattern Analysis and Machine Intelligence, IEEE Transactions on. 28(7):1164-1169.
2006. Development of a Large-Scale Integrated Neurocognitive Architecture - Part 2: Design and Architecture. UMIACS-TR-2006-43
2006. Existential Label Flow Inference Via CFL Reachability. Static AnalysisStatic Analysis. 4134:88-106.
2006. Exploring erotics in Emily Dickinson's correspondence with text mining and visual interfaces. Proceedings of the 6th ACM/IEEE-CS joint conference on Digital libraries. :141-150.