Publications
Export 7151 results:
Author Title [ Type] Year Filters: Block-preconditioners-discrete-incompressible-navier%E2%80%93stokes-equations is [Clear All Filters]
2002. Probabilistic Human Recognition from Video. Computer Vision — ECCV 2002Computer Vision — ECCV 2002. 2352:173-183.
2005. Probabilistic Ontologies and Relational Databases. On the Move to Meaningful Internet Systems 2005: CoopIS, DOA, and ODBASEOn the Move to Meaningful Internet Systems 2005: CoopIS, DOA, and ODBASE. 3760:1-17.
2007. Probabilistic Relational Models. Introduction to Statistical Relational LearningIntroduction to Statistical Relational Learning. :129-129.
2005. A process and role-based taxonomy of techniques to make testable COTS components. Testing Commercial-Off-The-Shelf Components And SystemsTesting Commercial-Off-The-Shelf Components And Systems. :109-140.
2007. Protocols in the use of empirical software engineering artifacts. Empirical Software EngineeringEmpirical Software Engineering. 12:107-119.
1996. Quantitative Measurement of the Performance of Raster-to-vector Conversion Algorithms. Graphics Recognition: Methods and ApplicationsGraphics Recognition: Methods and Applications. :57-68.
2007. Randomized Algorithms and Probabilistic Analysis in Wireless Networking. Stochastic Algorithms: Foundations and ApplicationsStochastic Algorithms: Foundations and Applications. 4665:54-57.
2008. The Randomized Coloring Procedure with Symmetry-Breaking. Automata, Languages and ProgrammingAutomata, Languages and Programming. 5125:306-319.
2007. Recognizing Faces Across Age Progression. Face Biometrics for Personal IdentificationFace Biometrics for Personal Identification. :27-42.
1997. Regularization algorithms based on total least squares. Recent advances in total least squares techniques and errors-in-variables modeling (Leuven, 1996)Recent advances in total least squares techniques and errors-in-variables modeling (Leuven, 1996). :127-137.
1994. Regularization of Ill-Posed Problems in Image Restoration. Proceedings of the Fifth SIAM Conference on Applied Linear AlgebraProceedings of the Fifth SIAM Conference on Applied Linear Algebra. :102-105.
2010. Regulating the Regulators: Modulators of Transcription Factor Activity. Computational Biology of Transcription Factor BindingComputational Biology of Transcription Factor Binding. 674:297-312.
1997. Regulation of Cable Television. The Froehlich/Kent Encyclopedia of Telecommunications: Volume 15-Radio Astronomy to Submarine Cable SystemsThe Froehlich/Kent Encyclopedia of Telecommunications: Volume 15-Radio Astronomy to Submarine Cable Systems. 15:84-84.
1993. Remote direct manipulation: A case study of a telemedicine workstation. Sparks of innovation in human-computer interactionSparks of innovation in human-computer interaction. :51-51.
2005. Representing Unevenly-Spaced Time Series Data for Visualization and Interactive Exploration. Human-Computer Interaction - INTERACT 2005Human-Computer Interaction - INTERACT 2005. 3585:835-846.
2000. Resource-aware meta-computing. Emphasizing Distributed SystemsEmphasizing Distributed Systems. Volume 53:109-169.
2008. Review of Classifier Combination Methods. Studies in Computational Intelligence: Machine Learning in Document Analysis and RecognitionStudies in Computational Intelligence: Machine Learning in Document Analysis and Recognition. :361-386.
2012. Re-wiring Activity of Malicious Networks. Passive and Active MeasurementPassive and Active Measurement. 7192:116-125.
2003. Robust Face Recognition in the Presence of Clutter. Audio- and Video-Based Biometric Person AuthenticationAudio- and Video-Based Biometric Person Authentication. 2688:1062-1062.
1993. Scheduling home control devices: a case study of the transition from the research project to a product. Sparks of innovation in human-computer interactionSparks of innovation in human-computer interaction. :205-205.
2005. Scheduling on Unrelated Machines Under Tree-Like Precedence Constraints. Approximation, Randomization and Combinatorial Optimization. Algorithms and TechniquesApproximation, Randomization and Combinatorial Optimization. Algorithms and Techniques. 3624:609-609.
2011. Secure Efficient Multiparty Computing of Multivariate Polynomials and Applications. Applied Cryptography and Network Security. :130-146.
2012. Securing Circuits against Constant-Rate Tampering. Advances in Cryptology – CRYPTO 2012. :533-551.