Publications
Export 7151 results:
Author Title Type [ Year] Filters: Block-preconditioners-discrete-incompressible-navier%E2%80%93stokes-equations is [Clear All Filters]
2009. Selecting hierarchical clustering cut points for web person-name disambiguation. Proceedings of the 32nd international ACM SIGIR conference on Research and development in information retrieval. :778-779.
2009. Semantically informed machine translation (SIMT). SCALE summer workshop final report, Human Language Technology Center Of Excellence.
2009. Semantic-based segmentation and annotation of 3d models. Image Analysis and Processing–ICIAP 2009. :103-112.
2009. On the Semidefinite B-Arnoldi Method. SIAM Journal on Matrix Analysis and Applications. 31(3):1458-1468.
2009. Semi-supervised or semi-unsupervised? Proceedings of the NAACL HLT Workshop on Semisupervised Learning for Natural Language Processing. :84-85.
2009. Sensing and predicting the pulse of the city through shared bicycling. International Joint Conference on Artificial Intelligence. :1420-1426.
2009. Sensing opportunities for personalized feedback technology to reduce consumption. Proc. CHI Workshop on Defining the Role of HCI in the Challenge of Sustainability.
2009. Sensory grammars for sensor networks. Journal of Ambient Intelligence and Smart Environments. 1(1):15-21.
2009. Serogroup, Virulence, and Genetic Traits of Vibrio Parahaemolyticus in the Estuarine Ecosystem of Bangladesh. Applied and Environmental MicrobiologyAppl. Environ. Microbiol.. 75(19):6268-6274.
2009. A set of tools for Representing, Decomposing and Visualizing non manifold Cellular Complexes. DISI-TR-09-06
2009. Set-Based Boosting for Instance-Level Transfer. Data Mining Workshops, 2009. ICDMW '09. IEEE International Conference on. :422-428.
2009. Shape Matching for Foliage Database Retrieval. Semantic Mining Technologies for Multimedia DatabasesSemantic Mining Technologies for Multimedia Databases. :100-100.
2009. Signature Detection and Matching for Document Image Retrieval. IEEETransactions on Pattern Analysis and Machine Intelligence. 31(11):2015-2031.
2009. Signature schemes with bounded leakage resilience. Advances in Cryptology–ASIACRYPT 2009. :703-720.
2009. Signing a linear subspace: Signature schemes for network coding. Public Key Cryptography–PKC 2009. :68-87.
2009. Sikuli: using GUI screenshots for search and automation. Proceedings of the 22nd annual ACM symposium on User interface software and technology. :183-192.
2009. Simple, Black-Box Constructions of Adaptively Secure Protocols. Theory of Cryptography. :387-402.
2009. Smooth projective hashing and password-based authenticated key exchange from lattices. Advances in Cryptology–ASIACRYPT 2009. :636-652.
2009. Space-time tradeoffs for approximate nearest neighbor searching. Journal of the ACM (JACM). 57(1):1:1–1:54-1:1–1:54.
2009. Sparse representation of cast shadows via ℓ1-regularized least squares. Computer Vision, 2009 IEEE 12th International Conference on. :583-590.
2009. Sparsity inspired selection and recognition of iris images. Biometrics: Theory, Applications, and Systems, 2009. BTAS '09. IEEE 3rd International Conference on. :1-6.
2009. Spatio-textual spreadsheets: geotagging via spatial coherence. Proceedings of the 17th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems. :524-527.