Publications

Export 7151 results:
Author Title Type [ Year(Asc)]
Filters: Block-preconditioners-discrete-incompressible-navier%E2%80%93stokes-equations is   [Clear All Filters]
2008
Srinivasan A.  2008.  A note on the distribution of the number of prime factors of the integers. Information Processing Letters. 109(2):133-135.
Sankaranarayanan AC, Veeraraghavan A, Chellappa R.  2008.  Object Detection, Tracking and Recognition for Multiple Smart Cameras. Proceedings of the IEEE. 96(10):1606-1624.
Grim CJ, Taviani E, Alam M, Huq A, Sack BR, Colwell RR.  2008.  Occurrence and Expression of Luminescence in Vibrio Cholerae. Applied and Environmental MicrobiologyAppl. Environ. Microbiol.. 74(3):708-715.
Karlson AK, Bederson BB.  2008.  One-handed touchscreen input for legacy applications. Proceeding of the twenty-sixth annual SIGCHI conference on Human factors in computing systems. :1399-1408.
Kanagal B, Deshpande A.  2008.  Online Filtering, Smoothing and Probabilistic Modeling of Streaming data. IEEE 24th International Conference on Data Engineering, 2008. ICDE 2008. :1160-1169.
Akdemir U, Turaga P, Chellappa R.  2008.  An ontology based approach for activity recognition from video. Proceedings of the 16th ACM international conference on Multimedia. :709-712.
Dachman-Soled D, Lee HK, Malkin T, Servedio RA, Wan A, Wee H.  2008.  Optimal Cryptographic Hardness of Learning Monotone Functions. Automata, Languages and Programming. :36-47.
Khuller S, Mestre J.  2008.  An Optimal Incremental Algorithm for Minimizing Lateness with Rejection. Algorithms-ESA 2008. :601-610.
Sankaranarayanan AC, Chellappa R.  2008.  Optimal Multi-View Fusion of Object Locations. Motion and video Computing, 2008. WMVC 2008. IEEE Workshop on. :1-8.
Ramachandran A, Bhandankar K, Tariq MB, Feamster N.  2008.  Packets with provenance. GT-CS-08-02
JaJa JF, Shi Q, Varshney A.  2008.  Parallel Algorithms for Volumetric Surface Construction.
Juba D, Varshney A.  2008.  Parallel, stochastic measurement of molecular surface area. Journal of Molecular Graphics and Modelling. 27(1):82-87.
Khoo Y P, Foster JS, Hicks MW, Sazawal V.  2008.  Path projection for user-centered static analysis tools. Proceedings of the 8th ACM SIGPLAN-SIGSOFT workshop on Program analysis for software tools and engineering. :57-63.
Motiwala M, Elmore M, Feamster N, Vempala S.  2008.  Path splicing. SIGCOMM Comput. Commun. Rev.. 38(4):27-38.
Swaminathan A, M. Wu, Liu KJR.  2008.  A pattern classification framework for theoretical analysis of component forensics. Acoustics, Speech and Signal Processing, 2008. ICASSP 2008. IEEE International Conference on. :1665-1668.
Kim Y, Varshney A.  2008.  Persuading Visual Attention through Geometry. Visualization and Computer Graphics, IEEE Transactions on. 14(4):772-782.
Yardi S, Feamster N, Bruckman A.  2008.  Photo-based authentication using social networks. Proceedings of the first workshop on Online social networks. :55-60.
Tom Yeh, Lee JJ, Darrell T.  2008.  Photo-based question answering. Proceedings of the 16th ACM international conference on Multimedia. :389-398.
Hochstein L, Basili VR, Vishkin U, Gilbert J.  2008.  A pilot study to compare programming effort for two parallel programming models. Journal of Systems and Software. 81(11):1920-1930.
Last M, Luta G, Orso A, Porter A, Young S.  2008.  Pooled ANOVA. Computational Statistics & Data Analysis. 52(12):5215-5228.
Chellappa R, Aggarwal G.  2008.  Pose and Illumination Issues in Face-and Gait-Based Identification. Advances in Biometrics. :307-322.
Lin Z, Davis LS.  2008.  A pose-invariant descriptor for human detection and segmentation. Computer Vision–ECCV 2008. :423-436.
Eaton C, Memon AM.  2008.  Position Paper: Improving Browsing Environment Compliance Evaluations for Websites. Relation. 10(1.14):6113-6113.
Huang Y, Feamster N, Teixeira R.  2008.  Practical issues with using network tomography for fault diagnosis. SIGCOMM Comput. Commun. Rev.. 38(5):53-58.
Katz J, Sahai A, Waters B.  2008.  Predicate encryption supporting disjunctions, polynomial equations, and inner products. Proceedings of the theory and applications of cryptographic techniques 27th annual international conference on Advances in cryptology. :146-162.

Pages