Publications
Export 377 results:
Author Title Type [ Year] Filters: First Letter Of Last Name is Y [Clear All Filters]
2005. Geometric algorithms for computing cutter engagement functions in 2.5D milling operations. Computer-Aided Design. 37(14):1469-1480.
2005. Interpretation of state sequences in HMM for activity representation. Proc. IEEE Conf. Acoustic Speech and Signal Processing. 2:709-712.
2005. Johns Hopkins summer workshop final report on parsing and spoken structural event detection. Johns Hopkins University, Tech. Rep.
2005. Main effects screening. Proceedings of the 27th international conference on Software engineering - ICSE '05. :293-293.
2005. Main effects screening: a distributed continuous quality assurance process for monitoring performance degradation in evolving software systems. Proceedings of the 27th international conference on Software engineering. :293-302.
2005. Model of Object-Based Coding for Surveillance Video. Proceedings in the ICASSP'04 IEEE International Conference on Computer Vision. :693-696.
2005. A picture is worth a thousand keywords: image-based object search on a mobile platform. CHI '05 extended abstracts on Human factors in computing systems. :2025-2028.
2005. Pose-Encoded Spherical Harmonics for Robust Face Recognition Using a Single Image. Analysis and Modelling of Faces and GesturesAnalysis and Modelling of Faces and Gestures. 3723:229-243.
2005. Pose-normalized view synthesis from silhouettes. IEEE Intl. Conf. on Acoustics, Speech, and Signal Processing (ICASSP).
2005. Probabilistic Ontologies and Relational Databases. On the Move to Meaningful Internet Systems 2005: CoopIS, DOA, and ODBASEOn the Move to Meaningful Internet Systems 2005: CoopIS, DOA, and ODBASE. 3760:1-17.
2005. Processing of reverberant speech for time-delay estimation. IEEE Transactions on Speech and Audio Processing. 13(6):1110-1118.
2005. Robust routing in malicious environment for ad hoc networks. Information Security Practice and Experience. :36-47.
2005. ROMER: resilient opportunistic mesh routing for wireless mesh networks. Proc. of IEEE WiMesh. 166
2005. ROMER: resilient opportunistic mesh routing for wireless mesh networks. Proc. of IEEE WiMesh. 166
2005. Speaker Localization Using Excitation Source Information in Speech. Speech and Audio Processing, IEEE Transactions on. 13(5):751-761.
2005. Synthesis of novel views of moving objects in airborne video. Proc. British Machine Vision Conference. :290-299.
2005. Toward resilient security in wireless sensor networks. Proceedings of the 6th ACM international symposium on Mobile ad hoc networking and computing. :34-45.
2005. Toward resilient security in wireless sensor networks. Proceedings of the 6th ACM international symposium on Mobile ad hoc networking and computing. :34-45.
2005. Toward resilient security in wireless sensor networks. Proceedings of the 6th ACM international symposium on Mobile ad hoc networking and computing. :34-45.
2005. Using Non-random Associations for Predicting Latency in WANs. Web Information Systems Engineering – WISE 2005.
2004. Achieving packet-level quality of service through scheduling in multirate WLANs. Vehicular Technology Conference, 2004. VTC2004-Fall. 2004 IEEE 60th. 4:2730-2734Vol.4-2730-2734Vol.4.