Publications

Export 1858 results:
Author Title [ Type(Asc)] Year
Filters: First Letter Of Last Name is C  [Clear All Filters]
Book Chapters
Dachman-Soled D, Kalai YTauman.  2012.  Securing Circuits against Constant-Rate Tampering. Advances in Cryptology – CRYPTO 2012. :533-551.
Kumar V, Marathe M, Parthasarathy S, Srinivasan A.  2005.  Scheduling on Unrelated Machines Under Tree-Like Precedence Constraints. Approximation, Randomization and Combinatorial Optimization. Algorithms and TechniquesApproximation, Randomization and Combinatorial Optimization. Algorithms and Techniques. 3624:609-609.
Hicks MW, Weirich S, Crary K.  2001.  Safe and Flexible Dynamic Linking of Native Code. Types in Compilation. 2071:147-176.
Rajagopalan AN, Chellappa R, Koterba N.  2003.  Robust Face Recognition in the Presence of Clutter. Audio- and Video-Based Biometric Person AuthenticationAudio- and Video-Based Biometric Person Authentication. 2688:1062-1062.
Aris A, Shneiderman B, Plaisant C, Shmueli G, Jank W.  2005.  Representing Unevenly-Spaced Time Series Data for Visualization and Interactive Exploration. Human-Computer Interaction - INTERACT 2005Human-Computer Interaction - INTERACT 2005. 3585:835-846.
Agrawala AK, CILINGIROGLU A, Lee S.  1997.  Regulation of Cable Television. The Froehlich/Kent Encyclopedia of Telecommunications: Volume 15-Radio Astronomy to Submarine Cable SystemsThe Froehlich/Kent Encyclopedia of Telecommunications: Volume 15-Radio Astronomy to Submarine Cable Systems. 15:84-84.
Ramanathan N, Chellappa R.  2007.  Recognizing Faces Across Age Progression. Face Biometrics for Personal IdentificationFace Biometrics for Personal Identification. :27-42.
Basili VR, Zelkowitz MV, Sjøberg DIK, Johnson P, Cowling AJ.  2007.  Protocols in the use of empirical software engineering artifacts. Empirical Software EngineeringEmpirical Software Engineering. 12:107-119.
Zhou S, Chellappa R.  2002.  Probabilistic Human Recognition from Video. Computer Vision — ECCV 2002Computer Vision — ECCV 2002. 2352:173-183.
Yue Z, Zhao W, Chellappa R.  2005.  Pose-Encoded Spherical Harmonics for Robust Face Recognition Using a Single Image. Analysis and Modelling of Faces and GesturesAnalysis and Modelling of Faces and Gestures. 3723:229-243.
Dunlavy DM, Conroy JM, Schlesinger JD, Goodman SA, Okurowski M E, O'Leary DP, van Halteren H.  2003.  Performance of a Three-Stage System for Multi-Document Summarization. DUC 03 Conference ProceedingsDUC 03 Conference Proceedings.
Chellappa R, Veeraraghavan A, Aggarwal G.  2005.  Pattern Recognition in Video. Pattern Recognition and Machine IntelligencePattern Recognition and Machine Intelligence. 3776:11-20.
Sahinalp S, Vishkin U.  1994.  On a parallel-algorithms method for string matching problems (overview). Algorithms and ComplexityAlgorithms and Complexity. 778:22-32.
Card SK, Mackinlay JD, Shneiderman B.  1999.  Overview+ detail. Readings in information visualizationReadings in information visualization. :285-286.
Elaine Shi, Chan T, Stefanov E, Li M.  2011.  Oblivious RAM with O((logN)^3) Worst-Case Cost. Advances in Cryptology – ASIACRYPT 2011. 7073:197-214.
Hicks MW, Kakkar P, Moore J, Gunter C, Nettles S.  1999.  Network Programming Using PLAN. Internet Programming LanguagesInternet Programming Languages. 1686:127-143.
Sundaresan A, Chellappa R.  2006.  Multi-camera Tracking of Articulated Human Motion Using Motion and Shape Cues. Computer Vision – ACCV 2006Computer Vision – ACCV 2006. 3852:131-140.
Vaswani N, Agrawal A, Zheng Q, Chellappa R.  2005.  Moving Object Detection and Compression in IR Sequences. Computer Vision Beyond the Visible SpectrumComputer Vision Beyond the Visible Spectrum. :141-165.
Nixon MS, Tan T, Chellappa R.  2006.  Model-Based Approaches. Human Identification Based on GaitHuman Identification Based on Gait. :107-133.
Colwell RR.  2008.  The marine environment and human health: the cholera model. Global Climate Change and Extreme Weather Events: Understanding the Contributions to Infectious Disease EmergenceGlobal Climate Change and Extreme Weather Events: Understanding the Contributions to Infectious Disease Emergence.
Dorr BJ, Olive J, McCary J, Christianson C.  2011.  Machine Translation Evaluation and Optimization. Handbook of Natural Language Processing and Machine TranslationHandbook of Natural Language Processing and Machine Translation. :745-843.
Dorr BJ, Olive J, McCary J, Christianson C.  2011.  Machine Translation Evaluation and Optimization. Handbook of Natural Language Processing and Machine TranslationHandbook of Natural Language Processing and Machine Translation. :745-843.
Cook D, Faber V, Marathe M, Srinivasan A, Sussmann Y.  1998.  Low-bandwidth routing and electrical power networks. Automata, Languages and ProgrammingAutomata, Languages and Programming. 1443:604-615.
Froehlich J, Larson E, Saba E, Campbell T, Atlas L, Fogarty J, Patel S.  2011.  A Longitudinal Study of Pressure Sensing to Infer Real-World Water Usage Events in the Home. Pervasive ComputingPervasive Computing. 6696:50-69.
Froehlich J, Larson E, Saba E, Campbell T, Atlas L, Fogarty J, Patel S.  2011.  A Longitudinal Study of Pressure Sensing to Infer Real-World Water Usage Events in the Home. Pervasive Computing. 6696:50-69.

Pages