Publications

Export 490 results:
[ Author(Desc)] Title Type Year
Filters: First Letter Of Last Name is C  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
C
Chajewska U, Getoor L, Norman J, Shahar Y.  1998.  Utility elicitation as a classification problem. Proceedings of the Fourteenth conference on Uncertainty in artificial intelligence. :79-88.
Chakrabarti C, JaJa JF.  1988.  Optimal Systolic Designs for the Computation of the Discrete Hartley and the Discrete Cosine Transforms.
Chakrabarti C, JaJa JF.  1991.  VLSI architectures for template matching and block matching. Parallel architectures and algorithms for image understanding. :3-27.
Chakrabarti C, JaJa JF.  1991.  VLSI architectures for multidimensional transforms. Computers, IEEE Transactions on. 40(9):1053-1057.
Chakrabarti C, JaJa JF.  1988.  Optimal Architectures for Multidimensional Transforms. ISR-TR-1988-39
Chakrabarti C, JaJa JF.  1990.  Systolic architectures for the computation of the discrete Hartley and the discrete cosine transforms based on prime factor decomposition. Computers, IEEE Transactions on. 39(11):1359-1368.
Chakrabarti A, Rajagopalan AN, Chellappa R.  2007.  Super-Resolution of Face Images Using Kernel PCA-Based Prior. Multimedia, IEEE Transactions on. 9(4):888-892.
Chalfoun J, Cardone A, Dima AA, Allen DP, Halter MW.  2010.  Overlap-based cell tracker. The Journal of Research of the National Institute of Standards and Technology. 115(6)
Chalfoun J, Kociolek M, Dima A, Halter M, Cardone A, Peskin A, Bajcsy P, Brady M.  2013.  Segmenting time-lapse phase contrast images of adjacent NIH 3T3 cells.. Journal of microscopy. 249(1):41-52.
Chalidabhongse TH, Kim K, Harwood D, Davis LS.  2003.  A perturbation method for evaluating background subtraction algorithms. Joint IEEE International Workshop on Visual Surveillance and Performance Evaluation of Tracking and Surveillance (VS-PETS).
Chan TF, Elman H.  1989.  Fourier Analysis of Iterative Methods for Elliptic Problems. SIAM Review. 31(1):20-49.
Chan HT-H, Elaine Shi, Song D.  2011.  Private and Continual Release of Statistics. ACM Transactions on Information and System Security (TISSEC). 14(3):26:1-26:24.
Chandra R, Lefever RM, Joshi KR, Cukier M, Sanders WH.  2004.  A global-state-triggered fault injector for distributed system evaluation. Parallel and Distributed Systems, IEEE Transactions on. 15(7):593-605.
Chandra R, Lefever RM, Cukier M, Sanders WH.  2000.  Loki: a state-driven fault injector for distributed systems. :237-242.
Chandra R, Cukier M, Lefever R, Sanders W, others.  2000.  Dynamic node management and measure estimation in a state-driven fault injector. :248-261.
Chandra AK, Stockmeyer LJ, Vishkin U.  1982.  A complexity theory for unbounded fan-in parallelism. 23rd Annual Symposium on Foundations of Computer Science. :1-13.
Chandrachoodan N, Bhattacharyya SS, Liu KJR.  2002.  High-level synthesis of DSP applications using adaptive negative cycle detection. EURASIP J. Appl. Signal Process.. 2002(1):893-907.
Chandrachoodan N, Bhattacharyya SS, Liu KJR.  2001.  Adaptive negative cycle detection in dynamic graphs. Circuits and Systems, 2001. ISCAS 2001. The 2001 IEEE International Symposium on. 5:163-166.
Chandran S, Mount D.  1992.  A parallel algorithm for enclosed and enclosing triangles. International Journal of Computational Geometry and Applications. 2(2):191-214.
Chandran S, Kim SK, Mount D.  1992.  Parallel computational geometry of rectangles. Algorithmica. 7(1):25-49.
Chandran S, Mount D.  1987.  Shared memory algorithms and the medial axis transform. IEEE Workshop on Computer Architecture for PAMI. :44-50.
Chandrasekaran S, Cooper O, Deshpande A, Franklin MJ, Hellerstein JM, Hong W, Krishnamurthy S, Madden SR, Reiss F, Shah MA.  2003.  TelegraphCQ: continuous dataflow processing. Proceedings of the 2003 ACM SIGMOD international conference on Management of data. :668-668.
Chandrasekharan N, Hannenhalli S.  1992.  Efficient algorithms for computing matching and chromatic polynomials on series-parallel graphs. , Fourth International Conference on Computing and Information, 1992. Proceedings. ICCI '92. :42-45.
Chang S, Van Horn D, Felleisen M.  2010.  Evaluating Call-By-Need on the Control Stack. arXiv:1009.3174 [cs].
Chang XC, Paige CC, Stewart G.W.  1997.  Perturbation analysis for the QR decomposition. SIAM Journal on Matrix Analysis and Applications. 18:775-791.

Pages