Publications

Export 969 results:
Author Title [ Type(Desc)] Year
Filters: First Letter Of Last Name is A  [Clear All Filters]
Conference Papers
Neumann J, Fermüller C, Aloimonos Y.  2002.  Eyes form eyes: New cameras for structure from motion. Proceedings Workshop on Omnidirectional Vision (OMNIVIS).
Neumann J, Fermüller C, Aloimonos Y.  2002.  Eyes from eyes: new cameras for structure from motion. Third Workshop on Omnidirectional Vision, 2002. Proceedings. :19-26.
Aggarwal G, Chellappa R.  2005.  Face recognition in the presence of multiple illumination sources. Computer Vision, 2005. ICCV 2005. Tenth IEEE International Conference on. 2:1169-1176Vol.2-1169-1176Vol.2.
Arya S, Phamdo N, Farvardin N, Mount D.  1993.  Fast search algorithms with applications to split and multi-stage vector quantization of speech lsp parameters. Speech Coding for Telecommunications, 1993. Proceedings., IEEE Workshop on. :65-66.
Sharma A, Martin JR, Anand N, Cukier M, Sanders WH.  2004.  Ferret: a host vulnerability checking tool. :389-394.
Wee SJ, Apostolopoulos JG, Feamster N.  1999.  Field-to-frame transcoding with spatial and temporal downsampling. Image Processing, 1999. ICIP 99. Proceedings. 1999 International Conference on. 4:271-275vol.4-271-275vol.4.
Wagner D, Foster JS, Brewer EA, Aiken A.  2000.  A first step towards automated detection of buffer overrun vulnerabilities. The 2000 Network and Distributed Systems Security Conference. San Diego, CA. 14
Edu CU, Purang K, Purushothaman D, Traum D, Andersen C, Perlis D.  1999.  Fkpurang, darsana, traum, cfa, perlisg@ cs. umd. edu. In Proceedings of the IJCAI’99 Workshop on Practical Reasoning and Rationality.
Consolvo S, Klasnja P, McDonald DW, Avrahami D, Froehlich J, LeGrand L, Libby R, Mosher K, Landay JA.  2008.  Flowers or a robot army?: encouraging awareness & activity with personal, mobile displays Proceedings of the 10th international conference on Ubiquitous computing. :54-63.
V.S. Subrahmanian, Amgoud L.  2007.  A general framework for reasoning about inconsistency. Proceedings of the International Joint Conference on Artificial Intelligence. :599-604.
Asgari S, Hochstein L, Basili VR, Zelkowitz MV, Hollingsworth J, Carver J, Shull F.  2005.  Generating testable hypotheses from tacit knowledge for high productivity computing. Proceedings of the second international workshop on Software engineering for high performance computing system applications. :17-21.
Fermüller C, Aloimonos Y.  1995.  Global rigidity constraints in image displacement fields. Proceedings of Fifth International Conference on Computer Vision, 1995. :245-250.
Fermüller C, Aloimonos Y.  1995.  Global rigidity constraints in image displacement fields. , Fifth International Conference on Computer Vision, 1995. Proceedings. :245-250.
Ayan N F, Dorr BJ.  2006.  Going beyond AER: an extensive analysis of word alignments and their impact on MT. Proceedings of the 21st International Conference on Computational Linguistics and the 44th annual meeting of the Association for Computational Linguistics. :9-16.
Kientz JA, Arriaga RI, Chetty M, Hayes GR, Richardson J, Patel SN, Abowd GD.  2007.  Grow and Know: Understanding Record-keeping Needs for Tracking the Development of Young Children. SIGCHI '07. :1351-1360.
Kientz JA, Arriaga RI, Chetty M, Hayes GR, Richardson J, Patel SN, Abowd GD.  2007.  Grow and Know: Understanding Record-keeping Needs for Tracking the Development of Young Children. SIGCHI '07. :1351-1360.
Kumar J, Abd-Almageed W, Kang L, Doermann D.  2010.  Handwritten Arabic text line segmentation using affinity propagation. Proceedings of the 9th IAPR International Workshop on Document Analysis Systems. :135-142.
Thomas J, Dearden A, Dray S, Light A, Best M, Arkin N, Maunder A, Kam M, Chetty M, Sambasivan N et al..  2008.  Hci for community and international development. SIGCHI EA '08. :3909-3912.
Abd-Almageed W, Smith C.  2002.  Hidden Markov models for silhouette classification. Automation Congress, 2002 Proceedings of the 5th Biannual World. 13:395-402.
Yuan Y, Gu D, Arbaugh WA, Zhang J.  2004.  High-performance MAC for high-capacity wireless LANs. 13th International Conference on Computer Communications and Networks, 2004. ICCCN 2004. Proceedings. :167-172.
Andersen D, Balakrishnan H, Feamster N, Koponen T, Moon D, Shenker S.  2007.  Holding the Internet Accountable. Proc. 6th ACM Workshop on Hot Topics in Networks (Hotnets-VI).
Anderson ML, Schmill M, Oates T, Perlis D, Josyula D, Wright D, Human SWTDN, Metacognition L, Fults S, Josyula DP.  2007.  Hood College, Master of Business Administration, 2005 Hood College, Master of Science (Computer Science), 2001 Hood College, Bachelor of Science (Computer Science), 1998 Frederick Community College, Associate in Arts (Business Administration), 1993. Proceedings of the Workshop on Metareasoning in Agent-Based Systems.
Condon E, Cummins E, Afoulki Z, Cukier M.  2011.  How secure are networked office devices? :465-472.
Abd-Almageed W, Davis LS.  2008.  Human detection using iterative feature selection and logistic principal component analysis. Robotics and Automation, 2008. ICRA 2008. IEEE International Conference on. :1691-1697.
Abd-Almageed W, Burns BJ, Davis LS.  2005.  Identifying and segmenting human-motion for mobile robot navigation using alignment errors. 12th International Conference on Advanced Robotics, 2005. ICAR '05. Proceedings. :398-403.

Pages