Publications

Export 377 results:
Author Title Type [ Year(Asc)]
Filters: First Letter Of Last Name is Y  [Clear All Filters]
2005
Gupta SK, Saini SK, Spranklin BW, Yao Z.  2005.  Geometric algorithms for computing cutter engagement functions in 2.5D milling operations. Computer-Aided Design. 37(14):1469-1480.
Yaman F, Nau DS, V.S. Subrahmanian.  2005.  Going far, logically. 19:615-615.
Cuntoor NP, Yegnanarayana B, Chellappa R.  2005.  Interpretation of state sequences in HMM for activity representation. Proc. IEEE Conf. Acoustic Speech and Signal Processing. 2:709-712.
Harper MP, Dorr BJ, Hale J, Roark B, Shafran I, Lease M, Liu Y, Snover M, Yung L, Krasnyanskaya A.  2005.  Johns Hopkins summer workshop final report on parsing and spoken structural event detection. Johns Hopkins University, Tech. Rep.
Yilmaz C, Krishna AS, Memon AM, Porter A, Schmidt DC, Gokhale A, Natarajan B.  2005.  Main effects screening. Proceedings of the 27th international conference on Software engineering - ICSE '05. :293-293.
Yilmaz C, Krishna AS, Memon AM, Porter A, Schmidt DC, Gokhale A, Natarajan B.  2005.  Main effects screening: a distributed continuous quality assurance process for monitoring performance degradation in evolving software systems. Proceedings of the 27th international conference on Software engineering. :293-302.
Agrawala AK, Youssef M A, Shahamat L.  2005.  Method and system for providing physical security in an area of interest. 10/916,545
Yu Y, Doermann D.  2005.  Model of Object-Based Coding for Surveillance Video. Proceedings in the ICASSP'04 IEEE International Conference on Computer Vision. :693-696.
Yaman F, Nau DS, V.S. Subrahmanian.  2005.  A motion closed world asumption. 19:621-621.
Tom Yeh, Grauman K, Tollmar K, Darrell T.  2005.  A picture is worth a thousand keywords: image-based object search on a mobile platform. CHI '05 extended abstracts on Human factors in computing systems. :2025-2028.
Yue Z, Zhao W, Chellappa R.  2005.  Pose-Encoded Spherical Harmonics for Robust Face Recognition Using a Single Image. Analysis and Modelling of Faces and GesturesAnalysis and Modelling of Faces and Gestures. 3723:229-243.
Yue Z, Chellappa R.  2005.  Pose-normalized view synthesis from silhouettes. IEEE Intl. Conf. on Acoustics, Speech, and Signal Processing (ICASSP).
Udrea O, Yu D, Hung E, Subrahmanian V.  2005.  Probabilistic Ontologies and Relational Databases. On the Move to Meaningful Internet Systems 2005: CoopIS, DOA, and ODBASEOn the Move to Meaningful Internet Systems 2005: CoopIS, DOA, and ODBASE. 3760:1-17.
Yegnanarayana B, Prasanna SRM, Duraiswami R, Zotkin DN.  2005.  Processing of reverberant speech for time-delay estimation. IEEE Transactions on Speech and Audio Processing. 13(6):1110-1118.
Yu Z, Seng CY, Jiang T, Wu X, Arbaugh WA.  2005.  Robust routing in malicious environment for ad hoc networks. Information Security Practice and Experience. :36-47.
Yuan Y, Yang H, Wong SHY, Lu S, Arbaugh WA.  2005.  ROMER: resilient opportunistic mesh routing for wireless mesh networks. Proc. of IEEE WiMesh. 166
Yuan Y, Yang H, Wong SHY, Lu S, Arbaugh WA.  2005.  ROMER: resilient opportunistic mesh routing for wireless mesh networks. Proc. of IEEE WiMesh. 166
Raykar VC, Yegnanarayana B, Prasanna SRM, Duraiswami R.  2005.  Speaker Localization Using Excitation Source Information in Speech. Speech and Audio Processing, IEEE Transactions on. 13(5):751-761.
Harper M, Dorr BJ, Hale J, Roark B, Shafran I, Lease M, Liu Y, Snover M, Yung L, Krasnyanskaya A et al..  2005.  Structural metadata and parsing speech.
Yue Z, Chellappa R.  2005.  Synthesis of novel views of moving objects in airborne video. Proc. British Machine Vision Conference. :290-299.
Yang H, Ye F, Yuan Y, Lu S, Arbaugh WA.  2005.  Toward resilient security in wireless sensor networks. Proceedings of the 6th ACM international symposium on Mobile ad hoc networking and computing. :34-45.
Yang H, Ye F, Yuan Y, Lu S, Arbaugh WA.  2005.  Toward resilient security in wireless sensor networks. Proceedings of the 6th ACM international symposium on Mobile ad hoc networking and computing. :34-45.
Yang H, Ye F, Yuan Y, Lu S, Arbaugh WA.  2005.  Toward resilient security in wireless sensor networks. Proceedings of the 6th ACM international symposium on Mobile ad hoc networking and computing. :34-45.
Raschid L, Ye Q, Zadorozhny V, Gal A, Murthy H.  2005.  Using Non-random Associations for Predicting Latency in WANs. Web Information Systems Engineering – WISE 2005.
2004
Yuan Y, Gu D, Arbaugh WA, Zhang J.  2004.  Achieving packet-level quality of service through scheduling in multirate WLANs. Vehicular Technology Conference, 2004. VTC2004-Fall. 2004 IEEE 60th. 4:2730-2734Vol.4-2730-2734Vol.4.

Pages