Export 359 results:
[ Author(Desc)] Title Type Year
Filters: First Letter Of Last Name is R  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
Raasi S, Varadan R, Fushman D, Pickart CM.  2005.  Diverse polyubiquitin interaction properties of ubiquitin-associated domains. Nature Structural & Molecular Biology. 12(8):708-714.
Raboin E, Nau DS, Kuter U, Gupta SK, Svec P.  2010.  Strategy generation in multi-agent imperfect-information pursuit games. :947-954.
Radhakrishnan J, Srinivasan A.  1998.  Improved bounds and algorithms for hypergraph two-coloring. 39th Annual Symposium on Foundations of Computer Science, 1998. Proceedings. :684-693.
Radio MJ, Reggia JA, Berndt RS.  2001.  Learning word pronunciations using a recurrent neural network. Neural Networks, 2001. Proceedings. IJCNN'01. International Joint Conference on. 1:11-15.
Rahaman M.Habibur, Islam T, Colwell RR, Alam M.  2015.  Molecular tools in understanding the evolution of Vibrio cholerae. Frontiers in Microbiology. (e0120311154e00398-13822020380817190)
Rai P, Daumé H.  2009.  Multi-label prediction via sparse infinite CCA. Advances in Neural Information Processing Systems. 22:1518-1526.
Rai P, Daumé H, Venkatasubramanian S.  2009.  Streamed learning: one-pass SVMs. Proceedings of the 21st international jont conference on Artifical intelligence. :1211-1216.
Rai P, Daumé H.  2009.  The infinite hierarchical factor regression model. Arxiv preprint arXiv:0908.0570.
Rajagopalan AN, Chellappa R, Koterba NT.  2005.  Background learning for robust face recognition with PCA in the presence of clutter. Image Processing, IEEE Transactions on. 14(6):832-843.
Rajagopalan S, Pinilla JM, Losleben P, Tian Q, Gupta SK.  1998.  Integrated design and rapid manufacturing over the Internet.
Rajagopalan AN, Chellappa R, Koterba N.  2003.  Robust Face Recognition in the Presence of Clutter. Audio- and Video-Based Biometric Person AuthenticationAudio- and Video-Based Biometric Person Authentication. 2688:1062-1062.
Ralston A, Shneiderman B.  2003.  Errors. Encyclopedia of Computer ScienceEncyclopedia of Computer Science. :677-680.
Ramachandran A, Seetharaman S, Feamster N, Vazirani V.  2007.  Building a Better Mousetrap. GIT-CSS-07-01
Ramachandran A, Feamster N.  2006.  Understanding the network-level behavior of spammers. Proceedings of the 2006 conference on Applications, technologies, architectures, and protocols for computer communications. :291-302.
Ramachandran M, Veeraraghavan A, Chellappa R.  2007.  Fast Bilinear SfM with Side Information. Computer Vision, 2007. ICCV 2007. IEEE 11th International Conference on. :1-8.
Ramachandran A, Hao S, Khandelwal H, Feamster N, Vempala S.  2008.  A Dynamic Reputation Service for Spotting Spammers. GT-CS-08-09
Ramachandran M, Zhou SK, Jhalani D, Chellappa R.  2005.  A method for converting a smiling face to a neutral face with applications to face recognition. Acoustics, Speech, and Signal Processing, 2005. Proceedings. (ICASSP '05). IEEE International Conference on. 2:ii/977-ii/980Vol.2-ii/977-ii/980Vol.2.
Ramachandran A, Bhandankar K, Tariq MB, Feamster N.  2008.  Packets with provenance. GT-CS-08-02
Ramachandran M, Chellappa R.  2006.  Stabilization and Mosaicing of Airborne Videos. Image Processing, 2006 IEEE International Conference on. :345-348.
Ramachandran A, Dasgupta A, Feamster N, Weinberger K.  2011.  Spam or ham?: characterizing and detecting fraudulent "not spam" reports in web mail systems Proceedings of the 8th Annual Collaboration, Electronic messaging, Anti-Abuse and Spam Conference. :210-219.
Ramachandran V, Vishkin U.  1988.  Efficient parallel triconnectivity in logarithmic time. VLSI Algorithms and Architectures. :33-42.
Ramachandran M, Veeraraghavan A, Chellappa R.  2008.  Video stabilization and mosaicing. The Essential Guide to Video Processing,. :109-138.
Ramachandran A, Feamster N, Krishnamurthy B, Spatscheck O, Van der Merwe J.  2008.  Fishing for Phishing from the Network Stream. GT-CS-08-08
Ramachandran A, Sarma AD, Feamster N.  2007.  Bitstore: An incentive-compatible solution for blocked downloads in bittorrent. Proc. Joint Workshop on The Economics of Networked Systems and Incentive-Based Computing (NetEcon).
Ramachandran A, Feamster N, Vempala S.  2007.  Filtering spam with behavioral blacklisting. Proceedings of the 14th ACM conference on Computer and communications security. :342-351.