Publications

Export 359 results:
[ Author(Desc)] Title Type Year
Filters: First Letter Of Last Name is R  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
R
Raasi S, Varadan R, Fushman D, Pickart CM.  2005.  Diverse polyubiquitin interaction properties of ubiquitin-associated domains. Nature Structural & Molecular Biology. 12(8):708-714.
Raboin E, Nau DS, Kuter U, Gupta SK, Svec P.  2010.  Strategy generation in multi-agent imperfect-information pursuit games. :947-954.
Radhakrishnan J, Srinivasan A.  1998.  Improved bounds and algorithms for hypergraph two-coloring. 39th Annual Symposium on Foundations of Computer Science, 1998. Proceedings. :684-693.
Radio MJ, Reggia JA, Berndt RS.  2001.  Learning word pronunciations using a recurrent neural network. Neural Networks, 2001. Proceedings. IJCNN'01. International Joint Conference on. 1:11-15.
Rahaman M.Habibur, Islam T, Colwell RR, Alam M.  2015.  Molecular tools in understanding the evolution of Vibrio cholerae. Frontiers in Microbiology. (e0120311154e00398-13822020380817190)
Rai P, Daumé H.  2009.  The infinite hierarchical factor regression model. Arxiv preprint arXiv:0908.0570.
Rai P, Daumé H.  2009.  Multi-label prediction via sparse infinite CCA. Advances in Neural Information Processing Systems. 22:1518-1526.
Rai P, Daumé H, Venkatasubramanian S.  2009.  Streamed learning: one-pass SVMs. Proceedings of the 21st international jont conference on Artifical intelligence. :1211-1216.
Rajagopalan AN, Chellappa R, Koterba NT.  2005.  Background learning for robust face recognition with PCA in the presence of clutter. Image Processing, IEEE Transactions on. 14(6):832-843.
Rajagopalan S, Pinilla JM, Losleben P, Tian Q, Gupta SK.  1998.  Integrated design and rapid manufacturing over the Internet.
Rajagopalan AN, Chellappa R, Koterba N.  2003.  Robust Face Recognition in the Presence of Clutter. Audio- and Video-Based Biometric Person AuthenticationAudio- and Video-Based Biometric Person Authentication. 2688:1062-1062.
Ralston A, Shneiderman B.  2003.  Errors. Encyclopedia of Computer ScienceEncyclopedia of Computer Science. :677-680.
Ramachandran A, Feamster N, Dagon D.  2006.  Revealing botnet membership using DNSBL counter-intelligence. Proc. 2nd USENIX Steps to Reducing Unwanted Traffic on the Internet. :49-54.
Ramachandran AV, Feamster N.  2008.  Authenticated out-of-band communication over social links. Proceedings of the first workshop on Online social networks. :61-66.
Ramachandran A, Seetharaman S, Feamster N, Vazirani V.  2007.  Building a Better Mousetrap. GIT-CSS-07-01
Ramachandran A, Feamster N.  2006.  Understanding the network-level behavior of spammers. Proceedings of the 2006 conference on Applications, technologies, architectures, and protocols for computer communications. :291-302.
Ramachandran A, Hao S, Khandelwal H, Feamster N, Vempala S.  2008.  A Dynamic Reputation Service for Spotting Spammers. GT-CS-08-09
Ramachandran M, Veeraraghavan A, Chellappa R.  2007.  Fast Bilinear SfM with Side Information. Computer Vision, 2007. ICCV 2007. IEEE 11th International Conference on. :1-8.
Ramachandran M, Zhou SK, Jhalani D, Chellappa R.  2005.  A method for converting a smiling face to a neutral face with applications to face recognition. Acoustics, Speech, and Signal Processing, 2005. Proceedings. (ICASSP '05). IEEE International Conference on. 2:ii/977-ii/980Vol.2-ii/977-ii/980Vol.2.
Ramachandran A, Bhandankar K, Tariq MB, Feamster N.  2008.  Packets with provenance. GT-CS-08-02
Ramachandran A, Dasgupta A, Feamster N, Weinberger K.  2011.  Spam or ham?: characterizing and detecting fraudulent "not spam" reports in web mail systems Proceedings of the 8th Annual Collaboration, Electronic messaging, Anti-Abuse and Spam Conference. :210-219.
Ramachandran M, Chellappa R.  2006.  Stabilization and Mosaicing of Airborne Videos. Image Processing, 2006 IEEE International Conference on. :345-348.
Ramachandran V, Vishkin U.  1988.  Efficient parallel triconnectivity in logarithmic time. VLSI Algorithms and Architectures. :33-42.
Ramachandran A, Feamster N, Krishnamurthy B, Spatscheck O, Van der Merwe J.  2008.  Fishing for Phishing from the Network Stream. GT-CS-08-08
Ramachandran M, Veeraraghavan A, Chellappa R.  2008.  Video stabilization and mosaicing. The Essential Guide to Video Processing,. :109-138.

Pages