Publications
Export 969 results:
Author [ Title![(Asc)](https://www.umiacs.umd.edu/sites/all/modules/biblio/misc/arrow-asc.png)
Filters: First Letter Of Last Name is A [Clear All Filters]
1992. Behavioral Visual Motion Analysis,". Proceedings, DARPA Image Understanding Workshop. :521-541.
2013. Bear-with-me: an embodied prototype to explore tangible two-way exchanges of emotional language. CHI'13 Extended Abstracts on Human Factors in Computing Systems.
2012. BEAGLE: An Application Programming Interface and High-Performance Computing Library for Statistical Phylogenetics. Systematic BiologySyst Biol. 61(1):170-173.
2011. Bacillus Anthracis Comparative Genome Analysis in Support of the Amerithrax Investigation. Proceedings of the National Academy of SciencesPNAS. 108(12):5027-5032.
2011. AVSS 2011 demo session: A large-scale benchmark dataset for event recognition in surveillance video. Advanced Video and Signal-Based Surveillance (AVSS), 2011 8th IEEE International Conference on. :527-528.
1995. Automatic generation of multiresolution for polygonal models. First Workshop on Simulation and Interaction in Virtual Environments.
1998. Automated recovery in a secure bootstrap process. Proceedings of the Symposium on Network and Distributed Systems Security (NDSS’98). :155-167.
2001. Automated design of sheet metal punches for bending multiple parts in a single setup. Robotics and Computer-Integrated Manufacturing. 17(1–2):33-47.
2002. An Augmented Visual Query Mechanism for Finding Patterns in Time Series Data. Flexible Query Answering SystemsFlexible Query Answering Systems. 2522:240-250.
2009. Attacking cryptographic schemes based on "perturbation polynomials". Proceedings of the 16th ACM conference on Computer and communications security. :1-10.
2017. Assessment of Risk of Cholera in Haiti following Hurricane Matthew. The American Journal of Tropical Medicine and Hygiene. 97(3):896-903.
2017. Assessment of Risk of Cholera in Haiti following Hurricane Matthew. The American Journal of Tropical Medicine and Hygiene. 97(3):896-903.
2006. An architecture for specification-based detection of semantic integrity violations in kernel dynamic data. Proceedings of the 15th conference on USENIX Security Symposium. :20-20.
2006. An architecture for adaptive intrusion-tolerant applications. Software: Practice and Experience. 36(11-12):1331-1354.
2006. An architecture for adaptive intrusion-tolerant applications. Software: Practice and Experience. 36(11-12):1331-1354.
2009. An architectural level design methodology for smart camera applications. International Journal of Embedded Systems. 4(1):83-97.
2005. An architectural level design methodology for embedded face detection. Proceedings of the 3rd IEEE/ACM/IFIP international conference on Hardware/software codesign and system synthesis. :136-141.