Publications

Export 160 results:
[ Author(Desc)] Title Type Year
Filters: First Letter Of Last Name is J  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
J
JaJa JF, Ryu KW.  1990.  Load balancing on the hypercube and related networks. Proceedings of 1990 International Conference on Parallel Processing. 1:203-210.
JaJa JF, Shi Q, Varshney A.  2008.  Parallel Algorithms for Volumetric Surface Construction.
JaJa JF, Ryu K W.  1994.  The block distributed memory model for shared memory multiprocessors. Parallel Processing Symposium, 1994. Proceedings., Eighth International. :752-756.
JaJa JF, Kim J, Wang Q.  2004.  Efficient Serial and Parallel Algorithms for Querying Large Scale Multidimensional Time Series Data. UMIACS-TR-2004-50
JaJa JF, Wu SA.  1989.  On routing two-terminal nets in the presence of obstacles. Computer-Aided Design of Integrated Circuits and Systems, IEEE Transactions on. 8(5):563-570.
JaJa JF, Wang PY.  1994.  Special issue on data parallel algorithms and programming. Journal of Parallel and Distributed Computing. 21(1):1-3.
Jajodia S, Kudo M, V.S. Subrahmanian.  2001.  Provisional authorizations. E-commerce Security and Privacy. 2:133-159.
Jajodia S, Samarati P, Sapino M L, V.S. Subrahmanian.  2001.  Flexible support for multiple access control policies. ACM Trans. Database Syst.. 26(2):214-260.
Jakobsson M, Elaine Shi, Golle P, Chow R.  2009.  Implicit authentication for mobile devices. :9-9.
Jakupciak JP, Colwell RR.  2009.  Biological agent detection technologies. Molecular Ecology Resources. 9(s1):51-57.
Jallad K, Katz J, Schneier B.  2002.  Implementation of chosen-ciphertext attacks against PGP and GnuPG. Information Security. :90-101.
James F, Lai J, Suhm B, Balentine B, Makhoul J, Nass C, Shneiderman B.  2002.  Getting real about speech: overdue or overhyped? CHI '02 extended abstracts on Human factors in computing systems. :708-709.
Jategaonkar Jagadeesan L, Porter A, Puchol C, Ramming JC, Votta LG.  1998.  Specification-based Testing of Reactive Software: A Case Study in Technology Transfer. Journal of Systems and Software. 40(3):249-262.
Jeffrey SF.  1996.  CLP (SC): Implementation and efficiency considerations». Proceedings of the Workshop on Set Constraints, held in Conjunction with CP’96, Boston, Massachusetts.
Jensen CS, Mark L, Roussopoulos N, Sells T.  1993.  Using differential technlques to efficiently support transaction time. The VLDB JournalVLDB Journal. 2(1):75-111.
Jensen CS, Mark L, Roussopoulos N.  1991.  Incremental implementation model for relational databases with transaction time. IEEE Transactions on Knowledge and Data Engineering. 3(4):461-473.
Jeong IR, Katz J, Lee DH.  2004.  One-round protocols for two-party authenticated key exchange. Applied Cryptography and Network Security. :220-232.
Ji H, Fermüller C.  2010.  Better Flow Estimation from Color Images-Volume 2007, Article ID 53912, 9 pages. EURASIP Journal on Advances in Signal Processing. 2007(23)
Ji H, Fermüller C.  2009.  Robust Wavelet-Based Super-Resolution Reconstruction: Theory and Algorithm. IEEE Transactions on Pattern Analysis and Machine Intelligence. 31(4):649-660.
Ji H, Fermüller C.  2007.  Better flow estimation from color images. EURASIP Journal on Advances in Signal Processing. 2007(1):133-133.
Ji H, Fermüller C.  2006.  Noise causes slant underestimation in stereo and motion. Vision Research. 46(19):3105-3120.
Ji H.  2006.  A holistic approach to structure from motion.
Ji H, Fermüller C.  2005.  Integration of motion fields through shape. IEEE Computer Society Conference on Computer Vision and Pattern Recognition, 2005. CVPR 2005. 2:663-669vol.2-663-669vol.2.
Ji H, Fermüller C.  2006.  A 3D shape constraint on video. IEEE Transactions on Pattern Analysis and Machine Intelligence. 28(6):1018-1023.
Ji H, Fermüller C.  2004.  Bias in Shape Estimation. Computer Vision - ECCV 2004Computer Vision - ECCV 2004. 3023:405-416.

Pages