Publications

Export 7151 results:
Author [ Title(Desc)] Type Year
Filters: Believe-me%E2%80%94we-can-do-annotating-persuasive-acts-blog-text is   [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
S
Ray A, Sengupta B, Cleaveland R.  2005.  Secure requirements elicitation through triggered message sequence charts. Distributed Computing and Internet Technology. :273-282.
Katz J.  2004.  Secure routing in ad hoc networks. Workshop on Security of ad hoc and Sensor Networks: Proceedings of the 2 nd ACM workshop on Security of ad hoc and sensor networks.
Yuan Y, Arbaugh WA.  2003.  A secure service discovery protocol for MANET. 14th IEEE Proceedings on Personal, Indoor and Mobile Radio Communications, 2003. PIMRC 2003. 1:502-506Vol.1-502-506Vol.1.
Katz J, Malka L.  2010.  Secure text processing with applications to private DNA matching. Proceedings of the 17th ACM conference on Computer and communications security. :485-492.
Lu W, Varna A, M. Wu.  2011.  Secure video processing: Problems and challenges. Acoustics, Speech and Signal Processing (ICASSP), 2011 IEEE International Conference on. :5856-5859.
Dachman-Soled D, Kalai YTauman.  2012.  Securing Circuits against Constant-Rate Tampering. Advances in Cryptology – CRYPTO 2012. :533-551.
Ramachandran A, Mundada Y, Tariq MB, Feamster N.  2008.  Securing enterprise networks using traffic tainting. Special Interest Group on Data Communication.
Lu W, Varna AL, Wu M.  2010.  Security analysis for privacy preserving search of multimedia. Image Processing (ICIP). :26-29.
Mao Y, M. Wu.  2004.  Security evaluation for communication-friendly encryption of multimedia. Image Processing, 2004. ICIP '04. 2004 International Conference on. 1:569-572Vol.1-569-572Vol.1.
Arbaugh WA, Davin JR, Farber DJ, Smith JM.  1998.  Security for virtual private intranets. Computer. 31(9):48-55.
Mao Y, M. Wu.  2006.  Security Issues in Cooperative Communications: Tracing Adversarial Relays. Acoustics, Speech and Signal Processing, 2006. ICASSP 2006 Proceedings. 2006 IEEE International Conference on. 4:IV-IV.
Mishra A, Petroni Jr NL, Arbaugh WA, Fraser T.  2004.  Security issues in IEEE 802.11 wireless local area networks: a survey. Wireless Communications and Mobile Computing. 4(8):821-833.
Swaminathan A, Mao Y, M. Wu.  2005.  Security of feature extraction in image hashing. Acoustics, Speech, and Signal Processing, 2005. Proceedings. (ICASSP '05). IEEE International Conference on. 2:ii/1041-ii/1044Vol.2-ii/1041-ii/1044Vol.2.
Jiwnani K, Zelkowitz MV.  2002.  Security Testing using a Susceptibility Matrix. International Symposioum on Software Reliability Engineering. 13
Aloimonos Y, Fermüller C, Rosenfeld A.  1995.  Seeing and understanding: representing the visual world. ACM Comput. Surv.. 27(3):307-309.
Garg R, Varna AL, M. Wu.  2011.  "Seeing" ENF: natural time stamp for digital video via optical sensing and signal processing. Proceedings of the 19th ACM international conference on Multimedia. :23-32.
North C, Shneiderman B, Plaisant C, Kang H, Bederson BB.  2003.  Seeing the World Through Image Libraries. The craft of information visualization: readings and reflectionsThe craft of information visualization: readings and reflections. :47-47.
de Souza C, Froehlich J, Dourish P.  2005.  Seeking the source: software source code as a social and technical artifact. Proceedings of the 2005 international ACM SIGGROUP conference on Supporting group work. :197-206.
Roussopoulos N, Yeh RT.  1985.  SEES—A Software testing Environment Support System. IEEE Transactions on Software Engineering. SE-11(4):355-366.
Zhao L, Davis LS.  2005.  Segmentation and appearance model building from an image sequence. Image Processing, 2005. ICIP 2005. IEEE International Conference on. 1:I-321-4-I-321-4.
Zheng Y, Li H, Doermann D.  2002.  Segmentation and Identification of Handwriting in Noisy Documents. IAPRConference on Document Analysis System. :95-105.
Sundaresan A, Chellappa R.  2006.  Segmentation and Probabilistic Registration of Articulated Body Models. Pattern Recognition, 2006. ICPR 2006. 18th International Conference on. 2:92-96.
Cardone A, Chalfoun J, Peskin A, Bajcsy P, Kociolek M, Bhadriraju K, Brady M.  2015.  Segmentation and sub-cellular feature-based analysis of microscopy images. BioImage Informatics Conference .
Kumar J, Kang L, Doermann D, Abd-Almageed W.  2011.  Segmentation of Handwritten Textlines in Presence of Touching Components. Intl. Conf. on Document Analysis and Recognition (ICDAR 11). :109-113.
Yacoob Y, Davis LS.  2006.  Segmentation of planar objects and their shadows in motion sequences. International journal of computer vision. 67(1):53-69.

Pages