Publications
Export 7151 results:
Author [ Title] Type Year Filters: Believe-me%E2%80%94we-can-do-annotating-persuasive-acts-blog-text is [Clear All Filters]
1999. Detection of slow-motion replay sequences for identifying sports videos. Proceedings of IEEE 1999 Workshop on Multimedia Signal Processing. :135-140.
1994. On the detection of robust curves. CVGIP: Graphical Models and Image Processing. 56(3):189-204.
2013. Detection of Vibrio cholerae in environmental waters including drinking water reservoirs of Azerbaijan. Environmental Microbiology Reports. (1):30-38.
1998. The detection of duplicates in document image databases. Image and Vision Computing. 16(12–13):907-920.
2002. Detection of Cytotoxin-Hemolysin mRNA in Nonculturable Populations of Environmental and Clinical Vibrio Vulnificus Strains in Artificial Seawater. Applied and Environmental MicrobiologyAppl. Environ. Microbiol.. 68(11):5641-5646.
2006. Detection, Isolation, and Identification of Vibrio cholerae from the Environment. Current Protocols in MicrobiologyCurrent Protocols in Microbiology. :6A.5.1-6A.5.38-6A.5.1-6A.5.38.
2012. Detection, Isolation, and Identification of Vibrio cholerae from the Environment. Current Protocols in Microbiology. 26(1)
2015. Detection and characterization of nonspecific, sparsely populated binding modes in the early stages of complexation.. J Comput Chem.
2006. Detection and analysis of hair. Pattern Analysis and Machine Intelligence, IEEE Transactions on. 28(7):1164-1169.
2005. Detection, analysis and matching of hair. Computer Vision, 2005. ICCV 2005. Tenth IEEE International Conference on. 1:741-748Vol.1-741-748Vol.1.
2011. Detecting Structural Irregularity in Electronic Dictionaries Using Language Modeling. Electronic lexicography in the 21st century: new applications for new users (eLEX2011). :227-232.
2007. Detecting stochastically scheduled activities in video. International Joint Conference on Artificial Intelligence. :1802-1807.
2009. Detecting spammers with SNARE: spatio-temporal network-level automatic reputation engine. Proceedings of the 18th conference on USENIX security symposium. :101-118.
2005. Detecting rotational symmetries. Computer Vision, 2005. ICCV 2005. Tenth IEEE International Conference on. 2:954-961Vol.2-954-961Vol.2.
2009. Detecting network neutrality violations with causal inference. Proceedings of the 5th international conference on Emerging networking experiments and technologies. :289-300.
2000. Detecting independent motion: The statistics of temporal continuity. Pattern Analysis and Machine Intelligence, IEEE Transactions on. 22(8):768-773.
2005. Detecting Independent 3D Movement. Handbook of Geometric ComputingHandbook of Geometric Computing. :383-401.
2001. Detecting format string vulnerabilities with type qualifiers. Proceedings of the 10th conference on USENIX Security Symposium-Volume 10. :16-16.
2005. Detecting BGP configuration faults with static analysis. Proceedings of the 2nd conference on Symposium on Networked Systems Design & Implementation - Volume 2. :43-56.