Publications

Export 33 results:
Author [ Title(Desc)] Type Year
Filters: Keyword is probability  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
A
Vaswani N, RoyChowdhury A, Chellappa R.  2003.  Activity recognition using the dynamics of the configuration of interacting objects. Computer Vision and Pattern Recognition, 2003. Proceedings. 2003 IEEE Computer Society Conference on. 2:II-633-40vol.2-II-633-40vol.2.
C
Chafekar D, Levin D, Kumar VSA, Marathe MV, Parthasarathy S, Srinivasan A.  2008.  Capacity of Asynchronous Random-Access Scheduling in Wireless Networks. IEEE INFOCOM 2008. The 27th Conference on Computer Communications. :1148-1156.
Srinivasan A, Zuckerman D.  1994.  Computing with very weak random sources. , 35th Annual Symposium on Foundations of Computer Science, 1994 Proceedings. :264-275.
D
McCune JM, Elaine Shi, Perrig A, Reiter MK.  2005.  Detection of denial-of-message attacks on sensor network broadcasts. :64-78.
Mardziel P, Magill S, Hicks MW, Srivatsa M.  2011.  Dynamic Enforcement of Knowledge-Based Security Policies. Computer Security Foundations Symposium (CSF), 2011 IEEE 24th. :114-128.
E
Molina J, Cukier M.  2009.  Evaluating Files to Audit for Detecting Intrusions in FileSystem Data. :163-170.
Deshpande A, Guestrin C, Hong W, Madden S.  2005.  Exploiting Correlated Attributes in Acquisitional Query Processing. 21st International Conference on Data Engineering, 2005. ICDE 2005. Proceedings. :143-154.
G
Li B, Chellappa R.  2002.  A generic approach to simultaneous tracking and verification in video. Image Processing, IEEE Transactions on. 11(5):530-544.
H
Yuan Y, Gu D, Arbaugh WA, Zhang J.  2004.  High-performance MAC for high-capacity wireless LANs. 13th International Conference on Computer Communications and Networks, 2004. ICCCN 2004. Proceedings. :167-172.
I
Radhakrishnan J, Srinivasan A.  1998.  Improved bounds and algorithms for hypergraph two-coloring. 39th Annual Symposium on Foundations of Computer Science, 1998. Proceedings. :684-693.
Nau DS.  2005.  Inferencing in Support of Active Templates.
K
Han B, Zhu Y, Comaniciu D, Davis LS.  2005.  Kernel-based Bayesian filtering for object tracking. Computer Vision and Pattern Recognition, 2005. CVPR 2005. IEEE Computer Society Conference on. 1:227-234vol.1-227-234vol.1.
M
Green R, Pearl L, Dorr BJ.  2001.  Mapping WorldNet Senses to a Lexical Database of Verbs.
Sundaresan A, Chellappa R.  2008.  Model Driven Segmentation of Articulating Humans in Laplacian Eigenspace. Pattern Analysis and Machine Intelligence, IEEE Transactions on. 30(10):1771-1785.
Shroff N, Turaga P, Chellappa R.  2010.  Moving vistas: Exploiting motion for describing scenes. 2010 IEEE Conference on Computer Vision and Pattern Recognition (CVPR). :1911-1918.
N
Arya S, Malamatos T, Mount D.  2000.  Nearly optimal expected-case planar point location. Foundations of Computer Science, 2000. Proceedings. 41st Annual Symposium on. :208-218.
Haeupler B, Saha B, Srinivasan A.  2010.  New Constructive Aspects of the Lovasz Local Lemma. 2010 51st Annual IEEE Symposium on Foundations of Computer Science (FOCS). :397-406.
Abd-Almageed W, El-Osery A, Smith CE.  2003.  Non-parametric expectation maximization: a learning automata approach. IEEE International Conference on Systems, Man and Cybernetics, 2003. 3:2996-3001vol.3-2996-3001vol.3.
O
Li Y, Long PM, Srinivasan A.  2001.  The one-inclusion graph algorithm is near-optimal for the prediction model of learning. IEEE Transactions on Information Theory. 47(3):1257-1261.
Kanagal B, Deshpande A.  2008.  Online Filtering, Smoothing and Probabilistic Modeling of Streaming data. IEEE 24th International Conference on Data Engineering, 2008. ICDE 2008. :1160-1169.
P
Krishnamurthy S, Sanders WH, Cukier M.  2002.  Performance evaluation of a probabilistic replica selection algorithm. :119-127.
DuBois T, Golbeck J, Srinivasan A.  2011.  Predicting Trust and Distrust in Social Networks. Privacy, Security, Risk and Trust (PASSAT), 2011 IEEE Third International Conference on and 2011 IEEE Third International Confernece on Social Computing (SocialCom). :418-424.
Eiter T, Lu JJ, Lukasiewicz T, V.S. Subrahmanian.  2001.  Probabilistic object bases. ACM Trans. Database Syst.. 26(3):264-312.
Duggal HS, Cukier M, Sanders WH.  1997.  Probabilistic verification of a synchronous round-based consensus protocol. :165-174.
Kang H-J, Doermann D.  2004.  Product approximation by minimizing the upper bound of Bayes error rate for Bayesian combination of classifiers. Pattern Recognition, 2004. ICPR 2004. Proceedings of the 17th International Conference on. 1:252-255Vol.1-252-255Vol.1.

Pages