Publications

Export 1858 results:
Author Title [ Type(Asc)] Year
Filters: First Letter Of Last Name is C  [Clear All Filters]
Book Chapters
Cohn G, Gupta S, Froehlich J, Larson E, Patel S.  2010.  GasSense: Appliance-Level, Single-Point Sensing of Gas Activity in the Home. Pervasive Computing. 6030:265-282.
Nixon MS, Tan T, Chellappa R.  2006.  Gait Databases. Human Identification Based on GaitHuman Identification Based on Gait. :17-34.
Kale A, Cuntoor N, Yegnanarayana B, Rajagopalan AN, Chellappa R.  2003.  Gait Analysis for Human Identification. Audio- and Video-Based Biometric Person AuthenticationAudio- and Video-Based Biometric Person Authentication. 2688:1058-1058.
Kale A, Cuntoor N, Yegnanarayana B, Rajagopalan AN, Chellappa R.  2003.  Gait Analysis for Human Identification. Audio- and Video-Based Biometric Person AuthenticationAudio- and Video-Based Biometric Person Authentication. 2688:1058-1058.
Nixon MS, Tan T, Chellappa R.  2006.  Future Challenges. Human Identification Based on GaitHuman Identification Based on Gait. :151-170.
Agrawal A, Chellappa R.  2005.  Fusing Depth and Video Using Rao-Blackwellized Particle Filter. Pattern Recognition and Machine IntelligencePattern Recognition and Machine Intelligence. 3776:521-526.
Nixon MS, Tan T, Chellappa R.  2006.  Further Gait Developments. Human Identification Based on GaitHuman Identification Based on Gait. :135-149.
Colwell RR.  2002.  Fulfilling the promise of marine biotechnology. Marine biotechnology in the twenty-first century: problems, promise, and productsMarine biotechnology in the twenty-first century: problems, promise, and products. :39-39.
Colwell RR, Faruque SM, Nair GB.  2004.  Free-Living to Freewheeling: The Evolution of Vibrio cholerae from Innocence to Infamy. Infectious Disease and Host-Pathogen EvolutionInfectious Disease and Host-Pathogen Evolution. :198-198.
Card SK, Mackinlay JD, Shneiderman B.  1999.  Focus+ context. Readings in information visualizationReadings in information visualization. :306-309.
Card SK, Mackinlay JD, Shneiderman B.  1999.  Fisheye views. Readings in information visualizationReadings in information visualization. :311-311.
Chrun D, Cukier M, Sneeringer G.  2008.  Finding Corrupted Computers Using Imperfect Intrusion Prevention System Event Data. Computer Safety, Reliability, and Security. 5219:221-234.
Chrun D, Cukier M, Sneeringer G.  2008.  Finding Corrupted Computers Using Imperfect Intrusion Prevention System Event Data. Computer Safety, Reliability, and Security. 5219:221-234.
Chellappa R, Du M, Turaga P, Zhou S K.  2011.  Face Tracking and Recognition in Video. Handbook of Face RecognitionHandbook of Face Recognition. :323-351.
Zhou S K, Chellappa R, Aggarwal G.  2009.  Face Recognition from Video. The Essential Guide to Video Processing (Second Edition)The Essential Guide to Video Processing (Second Edition). :653-688.
Gopalan R, Schwartz WR, Chellappa R, Srivastava A.  2011.  Face Detection. Visual Analysis of HumansVisual Analysis of Humans. :71-90.
Joshi K, Cukier M, Sanders W.  2002.  Experimental Evaluation of the Unavailability Induced by a Group Membership Protocol. Dependable Computing EDCC-4. 2485:644-648.
Barrett C, Cook D, Hicks G, Faber V, Marathe A, Marathe M, Srinivasan A, Sussmann Y, Thornquist H.  2001.  Experimental Analysis of Algorithms for Bilateral-Contract Clearing Mechanisms Arising in Deregulated Power Industry. Algorithm EngineeringAlgorithm Engineering. 2141:172-184.
Myers DS, Bazinet AL, Cummings MP.  2008.  Expanding the reach of Grid computing: combining Globus- and BOINC-based systems. Grids for Bioinformatics and Computational BiologyGrids for Bioinformatics and Computational Biology. :71-85.
Roe A, Weller S, Baixeras J, Brown JW, Cummings MP, Davis DR, Horak M, Kawahara AY, Mitter C, Parr CS et al..  2010.  Evolutionary framework for Lepidoptera model systems. Genetics and Molecular Biology of LepidopteraGenetics and Molecular Biology of Lepidoptera. :1-24.
Laskowski S, Plaisant C.  2005.  Evaluation Methodologies for Visual Analytics. Illuminating the Path: The Research and Development Agenda for Visual AnalyticsIlluminating the Path: The Research and Development Agenda for Visual Analytics. :150-157.
Bhattacharya I, Getoor L.  2006.  Entity Resolution in Graphs. Mining Graph DataMining Graph Data. :311-344.
Canetti R, Dachman-Soled D, Vaikuntanathan V, Wee H.  2012.  Efficient Password Authenticated Key Exchange via Oblivious Transfer. Public Key Cryptography – PKC 2012. :449-466.
Heitzmann A, Palazzi B, Papamanthou C, Tamassia R.  2008.  Effective Visualization of File System Access-Control. Visualization for Computer Security. :18-25.
Nixon MS, Tan T, Chellappa R.  2006.  Early Recognition Approaches. Human Identification Based on GaitHuman Identification Based on Gait. :35-43.

Pages