Publications
Export 359 results:
[ Author] Title Type Year Filters: First Letter Of Last Name is R [Clear All Filters]
2002. Eye tracking using active deformable models. Proc. of the IIIrd Indian Conference on Computer Vision, Graphics and Image Processing.
2011. Action recognition using Partial Least Squares and Support Vector Machines. Image Processing (ICIP), 2011 18th IEEE International Conference on. :533-536.
2011. Spam or ham?: characterizing and detecting fraudulent "not spam" reports in web mail systems Proceedings of the 8th Annual Collaboration, Electronic messaging, Anti-Abuse and Spam Conference. :210-219.
1988. Efficient parallel triconnectivity in logarithmic time. VLSI Algorithms and Architectures. :33-42.
2007. Bitstore: An incentive-compatible solution for blocked downloads in bittorrent. Proc. Joint Workshop on The Economics of Networked Systems and Incentive-Based Computing (NetEcon).
2007. Filtering spam with behavioral blacklisting. Proceedings of the 14th ACM conference on Computer and communications security. :342-351.
2007. Fast Bilinear SfM with Side Information. Computer Vision, 2007. ICCV 2007. IEEE 11th International Conference on. :1-8.
2005. A method for converting a smiling face to a neutral face with applications to face recognition. Acoustics, Speech, and Signal Processing, 2005. Proceedings. (ICASSP '05). IEEE International Conference on. 2:ii/977-ii/980Vol.2-ii/977-ii/980Vol.2.
2008. Fast monitoring of traffic subpopulations. Proceedings of the 8th ACM SIGCOMM conference on Internet measurement. :257-270.
2006. Stabilization and Mosaicing of Airborne Videos. Image Processing, 2006 IEEE International Conference on. :345-348.
2008. Securing enterprise networks using traffic tainting. Special Interest Group on Data Communication.
2006. Revealing botnet membership using DNSBL counter-intelligence. Proc. 2nd USENIX Steps to Reducing Unwanted Traffic on the Internet. :49-54.
2008. Authenticated out-of-band communication over social links. Proceedings of the first workshop on Online social networks. :61-66.
2011. A Fast Bilinear Structure from Motion Algorithm Using a Video Sequence and Inertial Sensors. IEEE Transactions on Pattern Analysis and Machine Intelligence. 33(1):186-193.
2006. Understanding the network-level behavior of spammers. Proceedings of the 2006 conference on Applications, technologies, architectures, and protocols for computer communications. :291-302.
2005. Background learning for robust face recognition with PCA in the presence of clutter. Image Processing, IEEE Transactions on. 14(6):832-843.