Publications

Export 7151 results:
Author [ Title(Asc)] Type Year
Filters: Believe-me%E2%80%94we-can-do-annotating-persuasive-acts-blog-text is   [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
D
Aloimonos Y, Chou PB, of of Science U R. D. C.  1985.  Detection of Surface Orientation and Motion from Texture: The Case of Planes.
Kobla V, DeMenthon D, Doermann D.  1999.  Detection of slow-motion replay sequences for identifying sports videos. Proceedings of IEEE 1999 Workshop on Multimedia Signal Processing. :135-140.
Cole R, Vishkin U.  1994.  On the detection of robust curves. CVGIP: Graphical Models and Image Processing. 56(3):189-204.
Rashid A, Haley BJ, Rajabov M, Ahmadova S, Gurbanov S, Colwell RR, Huq A.  2013.  Detection of Vibrio cholerae in environmental waters including drinking water reservoirs of Azerbaijan. Environmental Microbiology Reports. (1):30-38.
Doermann D, Li H, Kia O.  1997.  The Detection of Duplicates in Document Image Databases. ICDAR. :314-318.
Doermann D, Li H, Kia O.  1998.  The detection of duplicates in document image databases. Image and Vision Computing. 16(12–13):907-920.
McCune JM, Elaine Shi, Perrig A, Reiter MK.  2005.  Detection of denial-of-message attacks on sensor network broadcasts. :64-78.
Fischer-Le Saux M, Hervio-Heath D, Loaec S, Colwell RR, Pommepuy M.  2002.  Detection of Cytotoxin-Hemolysin mRNA in Nonculturable Populations of Environmental and Clinical Vibrio Vulnificus Strains in Artificial Seawater. Applied and Environmental MicrobiologyAppl. Environ. Microbiol.. 68(11):5641-5646.
Huq A, Grim C, Colwell RR, Nair BG.  2006.  Detection, Isolation, and Identification of Vibrio cholerae from the Environment. Current Protocols in MicrobiologyCurrent Protocols in Microbiology. :6A.5.1-6A.5.38-6A.5.1-6A.5.38.
Huq A, Haley BJ, Taviani E, Chen A, Hasan NA, Colwell RR.  2012.  Detection, Isolation, and Identification of Vibrio cholerae from the Environment. Current Protocols in Microbiology. 26(1)
Cardone A, Bornstein A, Pant HC, Brady M, Sriram R, Hassan SA.  2015.  Detection and characterization of nonspecific, sparsely populated binding modes in the early stages of complexation.. J Comput Chem.
Yacoob Y, Davis LS.  2006.  Detection and analysis of hair. Pattern Analysis and Machine Intelligence, IEEE Transactions on. 28(7):1164-1169.
Yacoob Y, Davis LS.  2005.  Detection, analysis and matching of hair. Computer Vision, 2005. ICCV 2005. Tenth IEEE International Conference on. 1:741-748Vol.1-741-748Vol.1.
Li Y, Zheng Y, Doermann D.  2006.  Detecting Text Line in Handwritten Documents. ICPR'06. :1030-1033.
Rodrigues P, Zajic D, Bloodgood M, Ye P, Doermann D.  2011.  Detecting Structural Irregularity in Electronic Dictionaries Using Language Modeling. Electronic lexicography in the 21st century: new applications for new users (eLEX2011). :227-232.
Albanese M, Moscato V, Picariello A, V.S. Subrahmanian, Udrea O.  2007.  Detecting stochastically scheduled activities in video. International Joint Conference on Artificial Intelligence. :1802-1807.
Hao S, Syed N A, Feamster N, Gray AG, Krasser S.  2009.  Detecting spammers with SNARE: spatio-temporal network-level automatic reputation engine. Proceedings of the 18th conference on USENIX security symposium. :101-118.
Shiv Naga Prasad V, Davis LS.  2005.  Detecting rotational symmetries. Computer Vision, 2005. ICCV 2005. Tenth IEEE International Conference on. 2:954-961Vol.2-954-961Vol.2.
Bin Tariq M, Motiwala M, Feamster N, Ammar M.  2009.  Detecting network neutrality violations with causal inference. Proceedings of the 5th international conference on Emerging networking experiments and technologies. :289-300.
Pless R, Brodsky T, Aloimonos Y.  2000.  Detecting independent motion: The statistics of temporal continuity. Pattern Analysis and Machine Intelligence, IEEE Transactions on. 22(8):768-773.
Corrochano E B, Ogale AS, Fermüller C, Aloimonos Y.  2005.  Detecting Independent 3D Movement. Handbook of Geometric ComputingHandbook of Geometric Computing. :383-401.
Ran Y, Zheng Q, Chellappa R.  2009.  Detecting humans carrying objects. SPIE Newsroom.
Shankar U, Talwar K, Foster JS, Wagner D.  2001.  Detecting format string vulnerabilities with type qualifiers. Proceedings of the 10th conference on USENIX Security Symposium-Volume 10. :16-16.
Ramachandran A, Feamster N, Dagon D.  2008.  Detecting botnet membership with dnsbl counterintelligence. Botnet Detection. :131-142.
Feamster N, Balakrishnan H.  2005.  Detecting BGP configuration faults with static analysis. Proceedings of the 2nd conference on Symposium on Networked Systems Design & Implementation - Volume 2. :43-56.

Pages