Publications

Export 7148 results:
[ Author(Asc)] Title Type Year
Filters: Believe-me%E2%80%94we-can-do-annotating-persuasive-acts-blog-text is   [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
C
Chuang W-H, Swaminathan A, M. Wu.  2009.  Tampering identification using Empirical Frequency Response. Acoustics, Speech and Signal Processing, 2009. ICASSP 2009. IEEE International Conference on. :1517-1520.
Chuang W-H, Su H, M. Wu.  2011.  Exploring compression effects for improved source camera identification using strongly compressed video. Image Processing (ICIP), 2011 18th IEEE International Conference on. :1953-1956.
Chuang WH, Varna AL, Wu M.  2010.  Performance impact of ordinal ranking on content fingerprinting. IEEE Int. Conf. on Image Processing.
Chuang W-H, M. Wu.  2010.  Semi non-intrusive training for cell-phone camera model linkage. Information Forensics and Security (WIFS), 2010 IEEE International Workshop on. :1-6.
Chu B-TB, Reggia JA.  1990.  Modeling diagnostic problem-solving at multiple levels of abstraction. Artificial Intelligence Applications, 1990., Sixth Conference on. :55-61vol.1-55-61vol.1.
Chu D, Deshpande A, Hellerstein JM, Hong W.  2006.  Approximate Data Collection in Sensor Networks using Probabilistic Models. Proceedings of the 22nd International Conference on Data Engineering, 2006. ICDE '06. :48-48.
Chu BTB, Reggia JA.  1990.  Diagnostic reasoning at multiple levels of abstraction. AI Systems in Government Conference, 1990. Proceedings., Fifth Annual. :168-175.
Chrun D, Cukier M, Sneeringer G.  2008.  On the Use of Security Metrics Based on Intrusion Prevention System Event Data: An Empirical Analysis. :49-58.
Chrun D, Cukier M, Sneeringer G.  2008.  Finding Corrupted Computers Using Imperfect Intrusion Prevention System Event Data. Computer Safety, Reliability, and Security. 5219:221-234.
Christian K, Kules B, Shneiderman B, Youssef A.  2000.  A comparison of voice controlled and mouse controlled web browsing. Proceedings of the fourth international ACM conference on Assistive technologies. :72-79.
Christian K, Kules B, Shneiderman B, Youssef A.  2005.  A Comparison of Voice Controlled and Mouse Controlled Web Browsing (2000). Institute for Systems Research Technical Reports.
Chowdhury A RK, Chellappa R.  2003.  A Factorization Approach for Activity Recognition. Computer Vision and Pattern Recognition Workshop, 2003. CVPRW '03. Conference on. 4:41-41.
Chowdhury S, Svec P, Wang C, Losert W, Gupta SK.  2012.  Gripper synthesis for indirect manipulation of cells using Holographic Optical Tweezers. :2749-2754.
Chowdhury AR, Chellappa R, Krishnamurthy S, Vo T.  2002.  3D face reconstruction from video using a generic model. Multimedia and Expo, 2002. ICME '02. Proceedings. 2002 IEEE International Conference on. 1:449-452vol.1-449-452vol.1.
Chowdhury AKR, Kale A, Chellappa R.  2003.  Video synthesis of arbitrary views for approximately planar scenes. Acoustics, Speech, and Signal Processing, 2003. Proceedings. (ICASSP '03). 2003 IEEE International Conference on. 3:III-497-500vol.3-III-497-500vol.3.
Chowdhury AR, Chellappa R.  2003.  Statistical bias and the accuracy of 3d reconstruction from video. in International Journal of Computer Vision.
Chowdhury A RK, Chellappa R.  2003.  Stochastic Approximation and Rate-Distortion Analysis for Robust Structure and Motion Estimation. International Journal of Computer Vision. 55(1):27-53.
Chowdhury AM, Chellappa R, Keaton T.  2002.  Wide baseline image registration using prior information. Multimedia Signal Processing, 2002 IEEE Workshop on. :37-40.
Chowdhury AR, Kale A, Chellappa R.  2003.  VIDEO SYNTHESIS OF ARBITRARY VIEWS FOR APPROXIMATELY PLANAR SCENES. IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS SPEECH AND SIGNAL PROCESSING. 3
Chow R, Jakobsson M, Masuoka R, Molina J, Niu Y, Elaine Shi, Song Z.  2010.  Authentication in the clouds: a framework and its application to mobile users. :1-6.
Chow R, Golle P, Jakobsson M, Elaine Shi, Staddon J, Masuoka R, Molina J.  2009.  Controlling data in the cloud: outsourcing computation without outsourcing control. :85-90.
Chou HH, Reggia JA.  1998.  Problem solving during artificial selection of self-replicating loops* 1. Physica D: Nonlinear Phenomena. 115(3-4):293-312.
Chou HH, Reggia JA, Navarro-Gonzalez R, Wu J.  1994.  An extended cellular space method for simulating autocatalytic oligonucleotides. Computers & chemistry. 18(1):33-43.
Choopun N, Louis V, Huq A, Colwell RR.  2002.  Simple Procedure for Rapid Identification of Vibrio Cholerae from the Aquatic Environment. Applied and Environmental MicrobiologyAppl. Environ. Microbiol.. 68(2):995-998.
Chong W, O'Donovan-Anderson M, Okamoto Y, Perlis D.  2003.  Seven days in the life of a robotic agent. Innovative Concepts for Agent-Based Systems. :243-256.

Pages