Publications
Export 748 results:
Author Title Type [ Year] Filters: First Letter Of Title is S [Clear All Filters]
2006. A structural approach to latency prediction. Proceedings of the 6th ACM SIGCOMM conference on Internet measurement. :99-104.
2006. Structure of social contact networks and their impact on epidemics. DIMACS Series in Discrete Mathematics and Theoretical Computer Science. 70:181-181.
2006. A study of translation edit rate with targeted human annotation. Proceedings of Association for Machine Translation in the Americas. :223-231.
2006. Studying the Characteristics of a "Good" GUI Test Suite. Software Reliability Engineering, 2006. ISSRE '06. 17th International Symposium on. :159-168.
2006. Subjects Allied to Gait. Human Identification Based on GaitHuman Identification Based on Gait. :5-15.
2006. Summarization-Inspired Temporal-Relation Extraction: Tense-Pair Templates and Treebank-3 Analysis.
2006. On Synchronization of Weighted Essentially Non-Oscillatory Methods. 36th AIAA Fluid Dynamics Conference and Exhibit.
2006. Synthetic‐perturbation techniques for screening shared memory programs. Software: Practice and Experience. 24(8):679-701.
2006. SYSTEM AND METHOD FOR FAST ILLUMINATION-INVARIANT BACKGROUND SUBTRACTION USING TWO VIEWS. PCT/EP2005/056207(WO/2006/056592)
2006. System and method for locating a closest server in response to a client .... 09/726,192(7020698)
2005. Scalable data collection infrastructure for digital government applications. Proceedings of the 2005 national conference on Digital government research. :305-306.
2005. Scheduling on Unrelated Machines Under Tree-Like Precedence Constraints. Approximation, Randomization and Combinatorial Optimization. Algorithms and TechniquesApproximation, Randomization and Combinatorial Optimization. Algorithms and Techniques. 3624:609-609.
2005. Search-based structured prediction as classification. NIPS Workshop on Advances in Structured Learning for Text and Speech Processing, Whistler, Canada.
2005. Secure remote authentication using biometric data. Advances in Cryptology–EUROCRYPT 2005. :147-163.
2005. Secure requirements elicitation through triggered message sequence charts. Distributed Computing and Internet Technology. :273-282.
2005. Security of feature extraction in image hashing. Acoustics, Speech, and Signal Processing, 2005. Proceedings. (ICASSP '05). IEEE International Conference on. 2:ii/1041-ii/1044Vol.2-ii/1041-ii/1044Vol.2.
2005. Seeking the source: software source code as a social and technical artifact. Proceedings of the 2005 international ACM SIGGROUP conference on Supporting group work. :197-206.
2005. Segmentation and appearance model building from an image sequence. Image Processing, 2005. ICIP 2005. IEEE International Conference on. 1:I-321-4-I-321-4.
2005. Serendipitous discovery of Wolbachia genomes in multiple Drosophila species. Genome Biology. 6(3):R23-R23.
2005. Severity and Impact of Computer User Frustration: A Comparison of Student and Workplace Users (2002). Institute for Systems Research Technical Reports.
2005. Shaky ladders, hyperplane-defined functions and genetic algorithms: Systematic controlled observation in dynamic environments. Applications of Evolutionary Computing. :600-609.
2005. "Shape Activity": a continuous-state HMM for moving/deforming shapes with application to abnormal activity detection. Image Processing, IEEE Transactions on. 14(10):1603-1616.