Publications

Export 7148 results:
[ Author(Asc)] Title Type Year
Filters: Block-preconditioners-discrete-incompressible-navier%E2%80%93stokes-equations is   [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
C
Chuang W-H, Varna AL, M. Wu.  2009.  Modeling and analysis of ordinal ranking in content fingerprinting. Information Forensics and Security, 2009. WIFS 2009. First IEEE International Workshop on. :116-120.
Chuang W-H, Swaminathan A, M. Wu.  2009.  Tampering identification using Empirical Frequency Response. Acoustics, Speech and Signal Processing, 2009. ICASSP 2009. IEEE International Conference on. :1517-1520.
Chuang W-H, Su H, M. Wu.  2011.  Exploring compression effects for improved source camera identification using strongly compressed video. Image Processing (ICIP), 2011 18th IEEE International Conference on. :1953-1956.
Chuang WH, Varna AL, Wu M.  2010.  Performance impact of ordinal ranking on content fingerprinting. IEEE Int. Conf. on Image Processing.
Chu D, Deshpande A, Hellerstein JM, Hong W.  2006.  Approximate Data Collection in Sensor Networks using Probabilistic Models. Proceedings of the 22nd International Conference on Data Engineering, 2006. ICDE '06. :48-48.
Chu BTB, Reggia JA.  1990.  Diagnostic reasoning at multiple levels of abstraction. AI Systems in Government Conference, 1990. Proceedings., Fifth Annual. :168-175.
Chu B-TB, Reggia JA.  1990.  Modeling diagnostic problem-solving at multiple levels of abstraction. Artificial Intelligence Applications, 1990., Sixth Conference on. :55-61vol.1-55-61vol.1.
Chrun D, Cukier M, Sneeringer G.  2008.  Finding Corrupted Computers Using Imperfect Intrusion Prevention System Event Data. Computer Safety, Reliability, and Security. 5219:221-234.
Chrun D, Cukier M, Sneeringer G.  2008.  On the Use of Security Metrics Based on Intrusion Prevention System Event Data: An Empirical Analysis. :49-58.
Christian K, Kules B, Shneiderman B, Youssef A.  2005.  A Comparison of Voice Controlled and Mouse Controlled Web Browsing (2000). Institute for Systems Research Technical Reports.
Christian K, Kules B, Shneiderman B, Youssef A.  2000.  A comparison of voice controlled and mouse controlled web browsing. Proceedings of the fourth international ACM conference on Assistive technologies. :72-79.
Chowdhury A RK, Chellappa R.  2003.  A Factorization Approach for Activity Recognition. Computer Vision and Pattern Recognition Workshop, 2003. CVPRW '03. Conference on. 4:41-41.
Chowdhury AKR, Kale A, Chellappa R.  2003.  Video synthesis of arbitrary views for approximately planar scenes. Acoustics, Speech, and Signal Processing, 2003. Proceedings. (ICASSP '03). 2003 IEEE International Conference on. 3:III-497-500vol.3-III-497-500vol.3.
Chowdhury AR, Chellappa R.  2003.  Statistical bias and the accuracy of 3d reconstruction from video. in International Journal of Computer Vision.
Chowdhury S, Svec P, Wang C, Losert W, Gupta SK.  2012.  Gripper synthesis for indirect manipulation of cells using Holographic Optical Tweezers. :2749-2754.
Chowdhury A RK, Chellappa R.  2003.  Stochastic Approximation and Rate-Distortion Analysis for Robust Structure and Motion Estimation. International Journal of Computer Vision. 55(1):27-53.
Chowdhury AM, Chellappa R, Keaton T.  2002.  Wide baseline image registration using prior information. Multimedia Signal Processing, 2002 IEEE Workshop on. :37-40.
Chowdhury AR, Kale A, Chellappa R.  2003.  VIDEO SYNTHESIS OF ARBITRARY VIEWS FOR APPROXIMATELY PLANAR SCENES. IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS SPEECH AND SIGNAL PROCESSING. 3
Chowdhury AR, Chellappa R, Krishnamurthy S, Vo T.  2002.  3D face reconstruction from video using a generic model. Multimedia and Expo, 2002. ICME '02. Proceedings. 2002 IEEE International Conference on. 1:449-452vol.1-449-452vol.1.
Chow R, Jakobsson M, Masuoka R, Molina J, Niu Y, Elaine Shi, Song Z.  2010.  Authentication in the clouds: a framework and its application to mobile users. :1-6.
Chow R, Golle P, Jakobsson M, Elaine Shi, Staddon J, Masuoka R, Molina J.  2009.  Controlling data in the cloud: outsourcing computation without outsourcing control. :85-90.
Chou HH, Reggia JA.  1998.  Problem solving during artificial selection of self-replicating loops* 1. Physica D: Nonlinear Phenomena. 115(3-4):293-312.
Chou HH, Reggia JA, Navarro-Gonzalez R, Wu J.  1994.  An extended cellular space method for simulating autocatalytic oligonucleotides. Computers & chemistry. 18(1):33-43.
Choopun N, Louis V, Huq A, Colwell RR.  2002.  Simple Procedure for Rapid Identification of Vibrio Cholerae from the Aquatic Environment. Applied and Environmental MicrobiologyAppl. Environ. Microbiol.. 68(2):995-998.
Chong W, O'Donovan-Anderson M, Okamoto Y, Perlis D.  2003.  Seven days in the life of a robotic agent. Innovative Concepts for Agent-Based Systems. :243-256.

Pages