Publications
Export 7151 results:
Author Title [ Type] Year Filters: Believe-me%E2%80%94we-can-do-annotating-persuasive-acts-blog-text is [Clear All Filters]
1998. Shape from video: Beyond the epipolar constraint. Proceedings of the DARPA Image Understanding Workshop.
2008. Shape-and-Behavior Encoded Tracking of Bee Dances. Pattern Analysis and Machine Intelligence, IEEE Transactions on. 30(3):463-476.
2010. Shape-based human detection and segmentation via hierarchical part-template matching. Pattern Analysis and Machine Intelligence, IEEE Transactions on. 32(4):604-618.
2006. Shared family calendars: Promoting symmetry and accessibility. ACM Trans. Comput.-Hum. Interact.. 13(3):313-346.
1987. Shared memory algorithms and the medial axis transform. IEEE Workshop on Computer Architecture for PAMI. :44-50.
2010. Sharing-aware horizontal partitioning for exploiting correlations during query processing. Proc. VLDB Endow.. 3(1-2):542-553.
2002. Sheet metal bending: forming part families for generating shared press-brake setups. Journal of manufacturing systems. 21(5):329-349.
1999. Sheet metal bending: generating shared setups. TRANSACTIONS-AMERICAN SOCIETY OF MECHANICAL ENGINEERS JOURNAL OF MANUFACTURING SCIENCE AND ENGINEERING. 121:689-694.
1999. Sheet metal bending operation planning: using virtual node generation to improve search efficiency. Journal of manufacturing systems. 18(2):127-139.
2007. Signal Processing for Biometric Systems [DSP Forum]. Signal Processing Magazine, IEEE. 24(6):146-152.
2007. Signal Processing Magazine E-Newsletter: Inside Out [From the Editor]. Signal Processing Magazine, IEEE. 24(6):2-8.
2010. Signal Processing on Platforms with Multiple Cores: Part 2-Applications and Design [From the Guest Editors]. IEEE Signal Processing Magazine. 27(2):20-21.
2009. Signature Detection and Matching for Document Image Retrieval. IEEETransactions on Pattern Analysis and Machine Intelligence. 31(11):2015-2031.
2009. Signature schemes with bounded leakage resilience. Advances in Cryptology–ASIACRYPT 2009. :703-720.
2009. Signing a linear subspace: Signature schemes for network coding. Public Key Cryptography–PKC 2009. :68-87.
2011. Silhouette-based gesture and action recognition via modeling trajectories on Riemannian shape manifolds. Computer Vision and Image Understanding. 115(3):439-455.
2011. SilverLine: Data and Network Isolation for Cloud Services. 2nd USENIX Workshop on Hot Topics in Cloud Computing.
2004. Similarity measure for nonparametric kernel density based object tracking. Eighteenth Annual Conference on Neural Information Processing Systems, Vancouver.
1999. Simple: A Methodology for Programming High Performance Algorithms on Clusters of Symmetric Multiprocessors (SMPs). Journal of Parallel and Distributed Computing. 58(1):92-108.
2003. A Simple and Optimal Energy Surface Reconstruction Algorithm from Volumetric Data. Technical Reports from UMIACS.