Publications

Export 7151 results:
Author Title Type [ Year(Asc)]
2009
Tistarelli M, Li SZ, Chellappa R.  2009.  Advanced Technologies for Touchless Fingerprint Recognition. Handbook of Remote Biometrics. :83-109.
Eaton C, Memon AM.  2009.  Advances in Web Testing. Computer Performance IssuesComputer Performance Issues. Volume 75:281-306.
Costello L, Grinstein G, Plaisant C, Scholtz J.  2009.  Advancing User-Centered Evaluation of Visual Analytic Environments Through Contests. Information VisualizationInformation Visualization. 8(3):230-238.
Ramanathan N, Chellappa R, Biswas S.  2009.  Age progression in human faces: A survey. Journal of Visual Languages and Computing. 15:3349-3361.
Gal A, Martinez MV, Simari GI, V.S. Subrahmanian.  2009.  Aggregate Query Answering under Uncertain Schema Mappings. Data Engineering, 2009. ICDE '09. IEEE 25th International Conference on. :940-951.
Vishkin U.  2009.  Algorithmic approach to designing an easy-to-program system: Can it lead to a HW-enhanced programmer's workflow add-on? Computer Design, 2009. ICCD 2009. IEEE International Conference on. :60-63.
Condon A, Deshpande A, Hellerstein L, Wu N.  2009.  Algorithms for distributional and adversarial pipelined filter ordering problems. ACM Trans. Algorithms. 5(2):24:1–24:34-24:1–24:34.
Peng T, Balijepalli A, Gupta SK, LeBrun TW.  2009.  Algorithms for extraction of nanowire lengths and positions from optical section microscopy image sequence. Journal of Computing and Information Science in Engineering. 9:041007-041007.
Priyadarshi AK, Gupta SK.  2009.  Algorithms for generating multi-stage molding plans for articulated assemblies. Robotics and Computer-Integrated Manufacturing. 25(1):91-106.
Han B, Ji L, Lee S, Bhattacharjee B, Miller RR.  2009.  All Bits Are Not Equal - A Study of IEEE 802.11 Communication Bit Errors. INFOCOM 2009, IEEE. :1602-1610.
Mohapatra SS, Mantri CK, Mohapatra H, Colwell RR, Singh DV.  2009.  Analysis of clonally related environmental Vibrio cholerae O1 El Tor isolated before 1992 from Varanasi, India reveals origin of SXT‐ICEs belonging to O139 and O1 serogroups. Environmental Microbiology Reports. 2(1):50-57.
Serpico C, d'Aquino M, Bertotti G, Mayergoyz ID.  2009.  Analytical Description of Quasi-Random Magnetization Relaxation to Equilibrium. Magnetics, IEEE Transactions on. 45(11):5224-5227.
Smith MA, Shneiderman B, Milic-Frayling N, Mendes Rodrigues E, Barash V, Dunne C, Capone T, Perer A, Gleave E.  2009.  Analyzing (social media) networks with NodeXL. Proceedings of the fourth international conference on Communities and technologies. :255-264.
Berthier R, Arjona J, Cukier M.  2009.  Analyzing the process of installing rogue software. :560-565.
Li J, Zhou SK, Chellappa R.  2009.  Appearance Modeling Using a Geometric Transform. Image Processing, IEEE Transactions on. 18(4):889-902.
Hussein ME, Abd-Almageed W.  2009.  Approximate kernel matrix computation on GPUs forlarge scale learning applications. Proceedings of the 23rd international conference on Supercomputing. :511-512.
Wu Y, Raschid L.  2009.  ApproxRank: Estimating Rank for a Subgraph. IEEE 25th International Conference on Data Engineering, 2009. ICDE '09. :54-65.
Sayeed A, Elsayed T, Garera N, Alexander D, Xu T, Oard D, Yarowsky D, Piatko C.  2009.  Arabic Cross-Document Coreference Resolution. Proceedings of the ACL-IJCNLP 2009 Conference Short Papers$}$. :357-360.
Saha S, Kianzad V, Schlessman J, Aggarwal G, Bhattacharyya SS, Chellappa R, Wolf W.  2009.  An architectural level design methodology for smart camera applications. International Journal of Embedded Systems. 4(1):83-97.
Liu B, Pop M.  2009.  ARDB-Antibiotic Resistance Genes Database. Nucleic Acids Research. 37(Database):D443-D447-D443-D447.
Nau DS.  2009.  Artificial Intelligence and Automation. Springer Handbook of Automation. :249-268.
Wong EW, Tse TH, Glass RL, Basili VR, Chen TY.  2009.  An assessment of systems and software engineering scholars and institutions (2002–2006). Journal of Systems and Software. 82(8):1370-1373.
El-Alfy H, Jacobs DW, Davis LS.  2009.  Assigning cameras to subjects in video surveillance systems. Robotics and Automation, 2009. ICRA '09. IEEE International Conference on. :837-843.
Albrecht M, Gentry C, Halevi S, Katz J.  2009.  Attacking cryptographic schemes based on "perturbation polynomials". Proceedings of the 16th ACM conference on Computer and communications security. :1-10.
Fleischmann KR, Oard D, Cheng AS, Wang P, Ishita E.  2009.  Automatic classification of human values: Applying computational thinking to information ethics. Proceedings of the American Society for Information Science and Technology. 46(1):1-4.

Pages