Publications
Export 1858 results:
Author Title [ Type] Year Filters: First Letter Of Last Name is C [Clear All Filters]
2012. Securing Circuits against Constant-Rate Tampering. Advances in Cryptology – CRYPTO 2012. :533-551.
2005. Scheduling on Unrelated Machines Under Tree-Like Precedence Constraints. Approximation, Randomization and Combinatorial Optimization. Algorithms and TechniquesApproximation, Randomization and Combinatorial Optimization. Algorithms and Techniques. 3624:609-609.
2003. Robust Face Recognition in the Presence of Clutter. Audio- and Video-Based Biometric Person AuthenticationAudio- and Video-Based Biometric Person Authentication. 2688:1062-1062.
2005. Representing Unevenly-Spaced Time Series Data for Visualization and Interactive Exploration. Human-Computer Interaction - INTERACT 2005Human-Computer Interaction - INTERACT 2005. 3585:835-846.
1997. Regulation of Cable Television. The Froehlich/Kent Encyclopedia of Telecommunications: Volume 15-Radio Astronomy to Submarine Cable SystemsThe Froehlich/Kent Encyclopedia of Telecommunications: Volume 15-Radio Astronomy to Submarine Cable Systems. 15:84-84.
2007. Recognizing Faces Across Age Progression. Face Biometrics for Personal IdentificationFace Biometrics for Personal Identification. :27-42.
2007. Protocols in the use of empirical software engineering artifacts. Empirical Software EngineeringEmpirical Software Engineering. 12:107-119.
2002. Probabilistic Human Recognition from Video. Computer Vision — ECCV 2002Computer Vision — ECCV 2002. 2352:173-183.
2005. Pose-Encoded Spherical Harmonics for Robust Face Recognition Using a Single Image. Analysis and Modelling of Faces and GesturesAnalysis and Modelling of Faces and Gestures. 3723:229-243.
2003. Performance of a Three-Stage System for Multi-Document Summarization. DUC 03 Conference ProceedingsDUC 03 Conference Proceedings.
2005. Pattern Recognition in Video. Pattern Recognition and Machine IntelligencePattern Recognition and Machine Intelligence. 3776:11-20.
1994. On a parallel-algorithms method for string matching problems (overview). Algorithms and ComplexityAlgorithms and Complexity. 778:22-32.
1999. Overview+ detail. Readings in information visualizationReadings in information visualization. :285-286.
2011. Oblivious RAM with O((logN)^3) Worst-Case Cost. Advances in Cryptology – ASIACRYPT 2011. 7073:197-214.
1999. Network Programming Using PLAN. Internet Programming LanguagesInternet Programming Languages. 1686:127-143.
2006. Multi-camera Tracking of Articulated Human Motion Using Motion and Shape Cues. Computer Vision – ACCV 2006Computer Vision – ACCV 2006. 3852:131-140.
2005. Moving Object Detection and Compression in IR Sequences. Computer Vision Beyond the Visible SpectrumComputer Vision Beyond the Visible Spectrum. :141-165.
2006. Model-Based Approaches. Human Identification Based on GaitHuman Identification Based on Gait. :107-133.
2008. The marine environment and human health: the cholera model. Global Climate Change and Extreme Weather Events: Understanding the Contributions to Infectious Disease EmergenceGlobal Climate Change and Extreme Weather Events: Understanding the Contributions to Infectious Disease Emergence.
2011. Machine Translation Evaluation and Optimization. Handbook of Natural Language Processing and Machine TranslationHandbook of Natural Language Processing and Machine Translation. :745-843.
2011. Machine Translation Evaluation and Optimization. Handbook of Natural Language Processing and Machine TranslationHandbook of Natural Language Processing and Machine Translation. :745-843.
1998. Low-bandwidth routing and electrical power networks. Automata, Languages and ProgrammingAutomata, Languages and Programming. 1443:604-615.
2011. A Longitudinal Study of Pressure Sensing to Infer Real-World Water Usage Events in the Home. Pervasive ComputingPervasive Computing. 6696:50-69.
2011. A Longitudinal Study of Pressure Sensing to Infer Real-World Water Usage Events in the Home. Pervasive Computing. 6696:50-69.