Publications

Export 325 results:
[ Author(Asc)] Title Type Year
Filters: First Letter Of Last Name is A  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
A
Algazi VR, Duda RO, Duraiswami R, Gumerov NA, Tang Z.  2002.  Approximating the head-related transfer function using simple geometric models of the head and torso. The Journal of the Acoustical Society of America. 112:2053-2053.
Alford R, Kuter U, Nau DS.  2009.  Translating HTNs to PDDL: A small amount of domain knowledge can go a long way. :1629-1634.
Alexander DS, Arbaugh WA, Keromytis AD, Muir S, Smith JM.  2000.  Secure quality of service handling: SQoSH. IEEE Communications Magazine. 38(4):106-112.
Alexander DS, Hicks MW, Kakkar P, Keromytis AD, Shaw M, Moore JT, Gunter CA, Jim T, Nettles SM, Smith JM.  1998.  The switchware active network implementation. The ML Workshop, International Conference on Functional Programming (ICFP).
Alexander DS, Arbaugh WA, Keromytis AD, Smith JM.  1998.  A secure active network environment architecture: realization in SwitchWare. IEEE Network. 12(3):37-45.
Alexander DS, Arbaugh WA, Hicks MW, Kakkar P, Keromytis AD, Moore JT, Gunter CA, Nettles SM, Smith JM.  1998.  The SwitchWare active network architecture. IEEE Network. 12(3):29-36.
Alexander S, Arbaugh WA, Keromytis AD, Smith JM.  1998.  Safety and security of programmable network infrastructures. IEEE Communications Magazine. 36(10):84-92.
Alexander DS, Menage PB, Keromytis AD, Arbaugh WA, Anagnostakis KG, Smith JM.  2001.  The price of safety in an active network. Journal of Communications and Networks. 3(1):4-18.
Alex D, Robert R, V.S. Subrahmanian.  2001.  Probabilistic temporal databases. ACM Transaction on Database Systems. 26(1):41-95.
Albrecht M, Gentry C, Halevi S, Katz J.  2009.  Attacking cryptographic schemes based on "perturbation polynomials". Proceedings of the 16th ACM conference on Computer and communications security. :1-10.
Alborzi H, Samet H.  2007.  Execution time analysis of a top-down R-tree construction algorithm. Information Processing Letters. 101(1):6-12.
Alborzi H, Druin A, Montemayor J, Platner M, Porteous J, Sherman L, Boltman A, Taxén G, Best J, Hammer J et al..  2000.  Designing StoryRooms: interactive storytelling spaces for children. Proceedings of the 3rd conference on Designing interactive systems: processes, practices, methods, and techniques. :95-104.
Albanese M, Turaga P, Chellappa R, Pugliese A, Subrahmanian V.  2010.  Semantic Video Content Analysis. Video Search and MiningVideo Search and Mining. 287:147-176.
Albanese M, Pugliese A, V.S. Subrahmanian, Udrea O.  2007.  MAGIC: A Multi-Activity Graph Index for Activity Detection. Information Reuse and Integration, 2007. IRI 2007. IEEE International Conference on. :267-272.
Albanese M, V.S. Subrahmanian.  2007.  T-rex: A domain-independent system for automated cultural information extraction. Proceedings of the First International Conference on Computational Cultural Dynamics (ICCCD 2007).
Albanese M, Chellappa R, Cuntoor N, Moscato V, Picariello A, V.S. Subrahmanian, Udrea O.  2010.  PADS: A Probabilistic Activity Detection Framework for Video Data. Pattern Analysis and Machine Intelligence, IEEE Transactions on. 32(12):2246-2261.
Albanese M, Chellappa R, Moscato V, Picariello A, V.S. Subrahmanian, Turaga P, Udrea O.  2008.  A Constrained Probabilistic Petri Net Framework for Human Activity Detection in Video. Multimedia, IEEE Transactions on. 10(6):982-996.
Albanese M, Fayzullin M, Picariello A, V.S. Subrahmanian.  2006.  The priority curve algorithm for video summarization. Information Systems. 31(7):679-695.
Albanese M, Moscato V, Picariello A, V.S. Subrahmanian, Udrea O.  2007.  Detecting stochastically scheduled activities in video. International Joint Conference on Artificial Intelligence. :1802-1807.
Alameh R, Zazworka N, Hollingsworth J.  2007.  Performance Measurement of Novice HPC Programmers Code. Proceedings of the 3rd International Workshop on Software Engineering for High Performance Computing Applications. :3–-3–.
Alam M, Sultana M, Nair GB, Siddique AK, Hasan NA, Sack RB, Sack DA, Ahmed KU, Sadique A, Watanabe H et al..  2007.  Viable but nonculturable Vibrio cholerae O1 in biofilms in the aquatic environment and their role in cholera transmission. Proceedings of the National Academy of Sciences. 104(45):17801-17801.
Alam M, Chowdhury WB, Bhuiyan NA, Islam A, Hasan NA, Nair BG, Watanabe H, Siddique AK, Huq A, Sack BR et al..  2009.  Serogroup, Virulence, and Genetic Traits of Vibrio Parahaemolyticus in the Estuarine Ecosystem of Bangladesh. Applied and Environmental MicrobiologyAppl. Environ. Microbiol.. 75(19):6268-6274.
Alam M, Sadique A, Bhuiyan NA, Nair GB, Siddique AK, Sack DA, Ahsan S, Huq A, Sack RB, Colwell RR et al..  2006.  Effect of transport at ambient temperature on detection and isolation of Vibrio cholerae from environmental samples. Applied and environmental microbiology. 72(3):2185-2190.
Alam M, Islam A, Bhuiyan NA, Rahim N, Hossain A, Khan GY, Ahmed D, Watanabe H, Izumiya H, Faruque ASG et al..  2011.  Clonal transmission, dual peak, and off-season cholera in Bangladesh. Infection Ecology & Epidemiology. 1(1)
Alam M, Sultana M, Nair BG, Sack BR, Sack DA, Siddique AK, Ali A, Huq A, Colwell RR.  2006.  Toxigenic Vibrio Cholerae in the Aquatic Environment of Mathbaria, Bangladesh. Applied and Environmental MicrobiologyAppl. Environ. Microbiol.. 72(4):2849-2855.

Pages