Publications
Export 1858 results:
Author Title [ Type] Year Filters: First Letter Of Last Name is C [Clear All Filters]
2010. GasSense: Appliance-Level, Single-Point Sensing of Gas Activity in the Home. Pervasive Computing. 6030:265-282.
2003. Gait Analysis for Human Identification. Audio- and Video-Based Biometric Person AuthenticationAudio- and Video-Based Biometric Person Authentication. 2688:1058-1058.
2003. Gait Analysis for Human Identification. Audio- and Video-Based Biometric Person AuthenticationAudio- and Video-Based Biometric Person Authentication. 2688:1058-1058.
2006. Future Challenges. Human Identification Based on GaitHuman Identification Based on Gait. :151-170.
2005. Fusing Depth and Video Using Rao-Blackwellized Particle Filter. Pattern Recognition and Machine IntelligencePattern Recognition and Machine Intelligence. 3776:521-526.
2006. Further Gait Developments. Human Identification Based on GaitHuman Identification Based on Gait. :135-149.
2002. Fulfilling the promise of marine biotechnology. Marine biotechnology in the twenty-first century: problems, promise, and productsMarine biotechnology in the twenty-first century: problems, promise, and products. :39-39.
2004. Free-Living to Freewheeling: The Evolution of Vibrio cholerae from Innocence to Infamy. Infectious Disease and Host-Pathogen EvolutionInfectious Disease and Host-Pathogen Evolution. :198-198.
1999. Focus+ context. Readings in information visualizationReadings in information visualization. :306-309.
1999. Fisheye views. Readings in information visualizationReadings in information visualization. :311-311.
2008. Finding Corrupted Computers Using Imperfect Intrusion Prevention System Event Data. Computer Safety, Reliability, and Security. 5219:221-234.
2008. Finding Corrupted Computers Using Imperfect Intrusion Prevention System Event Data. Computer Safety, Reliability, and Security. 5219:221-234.
2011. Face Tracking and Recognition in Video. Handbook of Face RecognitionHandbook of Face Recognition. :323-351.
2009. Face Recognition from Video. The Essential Guide to Video Processing (Second Edition)The Essential Guide to Video Processing (Second Edition). :653-688.
2002. Experimental Evaluation of the Unavailability Induced by a Group Membership Protocol. Dependable Computing EDCC-4. 2485:644-648.
2001. Experimental Analysis of Algorithms for Bilateral-Contract Clearing Mechanisms Arising in Deregulated Power Industry. Algorithm EngineeringAlgorithm Engineering. 2141:172-184.
2008. Expanding the reach of Grid computing: combining Globus- and BOINC-based systems. Grids for Bioinformatics and Computational BiologyGrids for Bioinformatics and Computational Biology. :71-85.
2010. Evolutionary framework for Lepidoptera model systems. Genetics and Molecular Biology of LepidopteraGenetics and Molecular Biology of Lepidoptera. :1-24.
2005. Evaluation Methodologies for Visual Analytics. Illuminating the Path: The Research and Development Agenda for Visual AnalyticsIlluminating the Path: The Research and Development Agenda for Visual Analytics. :150-157.
2012. Efficient Password Authenticated Key Exchange via Oblivious Transfer. Public Key Cryptography – PKC 2012. :449-466.
2008. Effective Visualization of File System Access-Control. Visualization for Computer Security. :18-25.
2006. Early Recognition Approaches. Human Identification Based on GaitHuman Identification Based on Gait. :35-43.