Publications

Export 188 results:
[ Author(Asc)] Title Type Year
Filters: First Letter Of Last Name is W  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
W
Wyche SP, Chetty M.  2013.  "I Want to Imagine How That Place Looks": Designing Technologies to Support Connectivity Between Africans Living Abroad and Home. SIGCHI '13. :2755-2764.
Wyche SP, Smyth TN, Chetty M, Aoki PM, Grinter RE.  2010.  Deliberate Interactions: Characterizing Technology Use in Nairobi, Kenya. SIGCHI '10. :2593-2602.
Wu H-H, Kee H, Sane N, Plishker W, Bhattacharyya SS.  2010.  Rapid prototyping for digital signal processing systems using Parameterized Synchronous Dataflow graphs. 2010 21st IEEE International Symposium on Rapid System Prototyping (RSP). :1-7.
Wu H, Sankaranarayanan AC, Chellappa R.  2010.  Online Empirical Evaluation of Tracking Algorithms. IEEE Transactions on Pattern Analysis and Machine Intelligence. 32(8):1443-1458.
M. Wu, Yu H H.  2003.  Human visual model for data hiding. : 09/691,544(6611608)
M. Wu, Mui L, Mohtashemi M, Szolovits P.  2001.  Secure Health Information Sharing System: SHARE. Proceedings of the AMIA SymposiumProc AMIA Symp. :1060-1060.
Wu J S-C, Sussman A.  2007.  Taking Advantage of Collective Operation Semantics for Loosely Coupled Simulations. Parallel and Distributed Processing Symposium, International. :128-128.
Wu M, Trappe W, Wang ZJ, Liu KJR.  2004.  Collusion resistant multimedia fingerprinting: A unified framework. Electronic Imaging Symposium: Security, Steganography, and Watermarking of Multimedia Contents VI, San Jose, CA, Proc. of SPIE. 5306:748-759.
M. Wu, Wolf W, Liu B.  1998.  An algorithm for wipe detection. Image Processing, 1998. ICIP 98. Proceedings. 1998 International Conference on. 1:893-897vol.1-893-897vol.1.
Wu M, Martin, M.P.  2006.  New DNS results of shockwave/turbulent boundary layer interaction. 3rd AIAA Flow Control Conference.
Wu M.  2004.  Distortion compensated lookup-table embedding: Joint security and robustness enhancement for quantization based data hiding. Electronic Imaging Symposium: Security, Steganography, and Watermarking of Multimedia Contents VI, San Jose, CA, Proc. of SPIE. 5306:610-621.
Wu M, Liu B.  2001.  Modulation and multiplexing techniques for multimedia data hiding. Proc. of SPIE ITcom’01, SPIE vol. 4518
M. Wu, Liu B.  2001.  Watermarking scheme for image authentication. (6285775)
Wu D, Nau DS.  2002.  M-Translog-2: A Planning Domain Designed for AIPS-2002. UMIACS-TR-2002-82
M. Wu, Swaminathan A, Mao Y.  2010.  Data hiding in compiled program binaries for supplementing computer functionality. 11/445,374(7840789)
Wu S, Elsayed T, Rand W, Raschid L.  2011.  Predicting author blog channels with high value future posts for monitoring. Proceedings of the Twenty-Fifth Conference on Artificial Intelligence (AAAI).
Wu H-H, Shen C-C, Bhattacharyya SS, Compton K, Schulte M, Wolf M, Zhang T.  2010.  Design and implementation of real-time signal processing applications on heterogeneous multiprocessor arrays. 2010 Conference Record of the Forty Fourth Asilomar Conference on Signals, Systems and Computers (ASILOMAR). :2121-2125.
M. Wu, Fridrich J, Goljan M, Gou H.  2005.  Handling uneven embedding capacity in binary images: a revisit. Proceedings of SPIE. 5681(1):194-205.
M. Wu, Mao Y, Swaminathan A.  2007.  A Signal Processing and Randomization Perspective of Robust and Secure Image Hashing. Statistical Signal Processing, 2007. SSP '07. IEEE/SP 14th Workshop on. :166-170.
Wu M, Martin, M.P.  2006.  Analysis of Shock Motion in a Compression Ramp Configuration using DNS data. Bulletin of the American Physical Society.
M. Wu, Liu B.  1999.  Digital watermarking using shuffling. Image Processing, 1999. ICIP 99. Proceedings. 1999 International Conference on. 1:291-295vol.1-291-295vol.1.
Wu W, Niles EG, El-Sayed NM, Berriman M, LoVerde PT.  2006.  Schistosoma mansoni (Platyhelminthes, Trematoda) nuclear receptors: Sixteen new members and a novel subfamily. Gene. 366(2):303-315.
Wu Y, Oard D, Soboroff I.  2006.  An exploratory study of the W3C mailing list test collection for retrieval of emails with pro/con arguments. Proceedings of the Third Conference on Email and Anti-Spam, Mountain View, CA, July.
Wu H, Sankaranarayanan AC, Chellappa R.  2007.  In Situ Evaluation of Tracking Algorithms Using Time Reversed Chains. Computer Vision and Pattern Recognition, 2007. CVPR '07. IEEE Conference on. :1-8.
M. Wu, Gou H.  2010.  Method for concealing data in curves of an image. : 11/221,727(7817817)

Pages