Publications

Export 538 results:
Author Title Type [ Year(Asc)]
Filters: First Letter Of Title is A  [Clear All Filters]
2005
Agrawal A, Chellappa R, Raskar R.  2005.  An algebraic approach to surface reconstruction from gradient fields. Computer Vision, 2005. ICCV 2005. Tenth IEEE International Conference on. 1:174-181Vol.1-174-181Vol.1.
Ray A, Cleaveland R, Skou A.  2005.  An Algebraic Theory Of Boundary Crossing Transitions. Electronic Notes in Theoretical Computer Science. 115:69-88.
Berry MW, Pulatova SA, Stewart G.W.  2005.  Algorithm 844: Computing sparse reduced-rank approximations to sparse matrices. ACM Transactions on Mathematical Software-TOMS. 31(2):252-269.
Sankaranarayanan AC, Chellappa R, Srivastava A.  2005.  Algorithmic and architectural design methodology for particle filters in hardware. Computer Design: VLSI in Computers and Processors, 2005. ICCD 2005. Proceedings. 2005 IEEE International Conference on. :275-280.
Kumar AVS, Marathe MV, Parthasarathy S, Srinivasan A.  2005.  Algorithmic aspects of capacity in wireless networks. Proceedings of the 2005 ACM SIGMETRICS international conference on Measurement and modeling of computer systems. :133-144.
Demaine ED, Hajiaghayi MT, Kawarabayashi K.  2005.  Algorithmic graph minor theory: Decomposition, approximation, and coloring. Foundations of Computer Science, 2005. FOCS 2005. 46th Annual IEEE Symposium on. :637-646.
Peng T, Gupta SK, Lau K.  2005.  Algorithms for constructing 3-D point clouds using multiple digital fringe projection patterns. Computer-Aided Design and Applications. 2:737-746.
Ayan N F, Dorr BJ, Monz C.  2005.  Alignment link projection using transformation-based learning. Proceedings of the conference on Human Language Technology and Empirical Methods in Natural Language Processing. :185-192.
Yoon I-C, Sussman A, Porter A.  2005.  And away we go: understanding the complexity of launching complex HPC applications. Proceedings of the second international workshop on Software engineering for high performance computing system applications. :45-49.
Fermüller C, Ji H.  2005.  On the Anisotropy in the Perception of Stereoscopic Slant. Journal of VisionJ Vis. 5(8):516-516.
Wang ZJ, M. Wu, Zhao HV, Trappe W, Liu KJR.  2005.  Anti-collusion forensics of multimedia fingerprinting using orthogonal modulation. Image Processing, IEEE Transactions on. 14(6):804-821.
Zheng Y, Li H, Doermann D.  2005.  AParallel-Line Detection Algorithm Based on HMMDecoding. IEEE Transactions on Pattern Analysis and Machine Intelligence. 27(5):777-792.
Li J, Zhou SK, Chellappa R.  2005.  Appearance modeling under geometric context. Computer Vision, 2005. ICCV 2005. Tenth IEEE International Conference on. 2:1252-1259Vol.2-1252-1259Vol.2.
Nau DS, Au T-C, Ilghami O, Kuter U, Wu D, Yaman F, Munoz-Avila H, Murdock JW.  2005.  Applications of SHOP and SHOP2. Intelligent Systems, IEEE. 20(2):34-41.
Raykar VC, Duraiswami R.  2005.  Approximate expressions for the mean and the covariance of the maximum likelihood estimator for acoustic source localization. Acoustics, Speech, and Signal Processing, 2005. Proceedings. (ICASSP '05). IEEE International Conference on. 3:iii/73-iii/76Vol.3-iii/73-iii/76Vol.3.
Zhang Y, Manister E, Kraus S, V.S. Subrahmanian.  2005.  Approximation results for probabilistic survivability. Multi-Agent Security and Survivability, 2005 IEEE 2nd Symposium on. :1-10.
Dumitras T, Srivastava D, Narasimhan P.  2005.  Architecting and Implementing Versatile Dependability. Architecting Dependable Systems III. :212-231.
Kianzad V, Saha S, Schlessman J, Aggarwal G, Bhattacharyya SS, Wolf W, Chellappa R.  2005.  An architectural level design methodology for embedded face detection. Proceedings of the 3rd IEEE/ACM/IFIP international conference on Hardware/software codesign and system synthesis. :136-141.
Varshavsky A, Chen MY, de Lara E, Froehlich J, Haehnel D, Hightower J, LaMarca A, Potter F, Sohn T, Tang K et al..  2005.  Are GSM phones THE solution for localization? Mobile Computing Systems and Applications, 2006. WMCSA'06. Proceedings. 7th IEEE Workshop on. :34-42.
Wu M, Taylor EM, Martin, M.P.  2005.  Assessment of STBLI DNS data and comparison against experiments. AIAA paper.
Bullock SS, O’Leary DP, Brennen GK.  2005.  Asymptotically Optimal Quantum Circuits for d-Level Systems. Physical Review LettersPhys. Rev. Lett.. 94(23):230502-230502.
Keogh E, Hochheiser H, Shneiderman B.  2005.  An Augmented Visual Query Mechanism for Finding Patterns in Time Series Data (2002). Institute for Systems Research Technical Reports.
Tamizi M, Weinstein M, Cukier M.  2005.  Automated checking for Windows host vulnerabilities. :10pp.-148-10pp.-148.
Williams CC, Hollingsworth J.  2005.  Automatic Mining of Source Code Repositories to Improve Bug Finding Techniques. IEEE Transactions on Software Engineering. 31(6):466-480.
Memon AM, Nagarajan A, Xie Q.  2005.  Automating regression testing for evolving GUI software. Journal of Software Maintenance and Evolution: Research and Practice. 17(1):27-64.

Pages