Publications

Export 71 results:
Author Title [ Type(Desc)] Year
Filters: Keyword is data  [Clear All Filters]
Conference Papers
Grinstein G, Konecni S, Scholtz J, Whiting M, Plaisant C.  2010.  VAST 2010 Challenge: Arms dealings and pandemics. Visual Analytics Science and Technology (VAST), 2010 IEEE Symposium on. :263-264.
M. Wu, Yu H H.  2000.  Video access control via multi-level data hiding. Multimedia and Expo, 2000. ICME 2000. 2000 IEEE International Conference on. 1:381-384vol.1-381-384vol.1.
Journal Articles
Trappe W, M. Wu, Wang ZJ, Liu KJR.  2003.  Anti-collusion fingerprinting for multimedia. Signal Processing, IEEE Transactions on. 51(4):1069-1087.
M. Wu, Liu B.  2004.  Data hiding in binary image for authentication and annotation. Multimedia, IEEE Transactions on. 6(4):528-538.
Gou H, M. Wu.  2005.  Data hiding in curves with application to fingerprinting maps. Signal Processing, IEEE Transactions on. 53(10):3988-4005.
M. Wu, Liu B.  2003.  Data hiding in image and video .I. Fundamental issues and solutions. Image Processing, IEEE Transactions on. 12(6):685-695.
M. Wu, Yu H, Liu B.  2003.  Data hiding in image and video .II. Designs and applications. Image Processing, IEEE Transactions on. 12(6):696-705.
Cetintemel U, Keleher PJ, Bhattacharjee B, Franklin MJ.  2003.  Deno: a decentralized, peer-to-peer object-replication system for weakly connected environments. Computers, IEEE Transactions on. 52(7):943-959.
Minker J.  2007.  Developing a Computer Science Department at the University of Maryland. Annals of the History of Computing, IEEE. 29(4):64-75.
Schwartz WR, Guo H, Choi J, Davis LS.  2012.  Face Identification Using Large Feature Sets. Image Processing, IEEE Transactions on. 21(4):2245-2255.
Wu M.  2003.  Joint security and robustness enhancement for quantization based data embedding. Circuits and Systems for Video Technology, IEEE Transactions on. 13(8):831-841.
Sankaranarayanan AC, Veeraraghavan A, Chellappa R.  2008.  Object Detection, Tracking and Recognition for Multiple Smart Cameras. Proceedings of the IEEE. 96(10):1606-1624.
Hjaltason GR, Samet H.  2003.  Properties of embedding methods for similarity searching in metric spaces. Pattern Analysis and Machine Intelligence, IEEE Transactions on. 25(5):530-549.
Zotkin DN, Duraiswami R, Davis LS.  2004.  Rendering localized spatial audio in a virtual auditory space. Multimedia, IEEE Transactions on. 6(4):553-564.
Banerjee S, Agarwal S, Kamel K, Kochut A, Kommareddy C, Nadeem T, Thakkar P, Trinh B, Youssef A, Youssef M et al..  2002.  Rover: scalable location-aware computing. Computer. 35(10):46-53.
Bader DA, JaJa JF, Chellappa R.  1995.  Scalable data parallel algorithms for texture synthesis using Gibbs random fields. Image Processing, IEEE Transactions on. 4(10):1456-1460.
Patro R, Ip C Y, Bista S, Varshney A.  2011.  Social Snapshot: A System for Temporally Coupled Social Photography. Computer Graphics and Applications, IEEE. 31(1):74-84.
Cevher V, Sankaranarayanan AC, McClellan JH, Chellappa R.  2007.  Target Tracking Using a Joint Acoustic Video System. Multimedia, IEEE Transactions on. 9(4):715-727.
Biazzo V, Giugno R, Lukasiewicz T, V.S. Subrahmanian.  2003.  Temporal probabilistic object bases. Knowledge and Data Engineering, IEEE Transactions on. 15(4):921-939.
Seaman CB, Mendonca MG, Basili VR, Kim YM.  2003.  User interface evaluation and empirically-based evolution of a prototype experience management tool. Software Engineering, IEEE Transactions on. 29(9):838-850.
Kolagotla RK, Yu S-S, JaJa JF.  1993.  VLSI implementation of a tree searched vector quantizer. Signal Processing, IEEE Transactions on. 41(2):901-905.

Pages