Publications

Export 748 results:
Author [ Title(Asc)] Type Year
Filters: First Letter Of Title is S  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
S
Arya S, Malamatos T, Mount D.  2001.  A simple entropy-based algorithm for planar point location. Proceedings of the twelfth annual ACM-SIAM symposium on Discrete algorithms. :262-268.
Choi SGeol, Dachman-Soled D, Malkin T, Wee H.  2009.  Simple, Black-Box Constructions of Adaptively Secure Protocols. Theory of Cryptography. :387-402.
Zo Y-G, Colwell RR.  2008.  A simple binomial test for estimating sequencing errors in public repository 16S rRNA sequences. Journal of Microbiological Methods. 72(2):166-179.
Liu K, Duraiswami R, Davis LS.  2003.  A Simple and Optimal Energy Surface Reconstruction Algorithm from Volumetric Data. Technical Reports from UMIACS.
Bader DA, JaJa JF.  1999.  Simple: A Methodology for Programming High Performance Algorithms on Clusters of Symmetric Multiprocessors (SMPs). Journal of Parallel and Distributed Computing. 58(1):92-108.
Buono P, Plaisant C, Simeone A, Aris A, Shneiderman B, Shmueli G, Jank W.  2007.  Similarity-Based Forecasting with Simultaneous Previews: A River Plot Interface for Time Series Forecasting. Information Visualization, 2007. IV '07. 11th International Conference. :191-196.
Yang C, Duraiswami R, Davis LS.  2004.  Similarity measure for nonparametric kernel density based object tracking. Eighteenth Annual Conference on Neural Information Processing Systems, Vancouver.
Borah M, Bajwa RS, Hannenhalli S, Irwin MJ.  1994.  A SIMD solution to the sequence comparison problem on the MGAP. International Conference on Application Specific Array Processors, 1994. Proceedings. :336-345.
Mundada Y, Ramachandran A, Feamster N.  2011.  SilverLine: Data and Network Isolation for Cloud Services. 2nd USENIX Workshop on Hot Topics in Cloud Computing.
Abdelkader MF, Abd-Almageed W, Srivastava A, Chellappa R.  2011.  Silhouette-based gesture and action recognition via modeling trajectories on Riemannian shape manifolds. Computer Vision and Image Understanding. 115(3):439-455.
Nixon MS, Tan T, Chellappa R.  2006.  Silhouette-Based Approaches. Human Identification Based on GaitHuman Identification Based on Gait. :45-105.
Colwell RR.  2008.  Silent Sputnik. BioScience. 58(1):3-3.
Tom Yeh, Chang T-H, Miller RC.  2009.  Sikuli: using GUI screenshots for search and automation. Proceedings of the 22nd annual ACM symposium on User interface software and technology. :183-192.
Boneh D, Freeman D, Katz J, Waters B.  2009.  Signing a linear subspace: Signature schemes for network coding. Public Key Cryptography–PKC 2009. :68-87.
Bethencourt J, Elaine Shi, Song D.  2010.  Signatures of Reputation. Financial Cryptography and Data Security. 6052:400-407.
Papamanthou C, Shi E, Tamassia R.  2013.  Signatures of Correct Computation. Theory of Cryptography. :222-242.
Zhu G, Zheng Y, Doermann D.  2008.  Signature-based Document Image Retrieval. The 10th European Conference on Computer Vision (ECCV 2008). :752-765.
Katz J, Vaikuntanathan V.  2009.  Signature schemes with bounded leakage resilience. Advances in Cryptology–ASIACRYPT 2009. :703-720.
Zhu G, Zheng Y, Doermann D, Jaeger S.  2009.  Signature Detection and Matching for Document Image Retrieval. IEEETransactions on Pattern Analysis and Machine Intelligence. 31(11):2015-2031.
Chen Y, Chakrabarti C, Bhattacharyya SS, Bougard B.  2010.  Signal Processing on Platforms with Multiple Cores: Part 2-Applications and Design [From the Guest Editors]. IEEE Signal Processing Magazine. 27(2):20-21.
Wu M.  2007.  Signal Processing Magazine E-Newsletter: Inside Out [From the Editor]. Signal Processing Magazine, IEEE. 24(6):2-8.
Jain AK, Chellappa R, Draper SC, Memon N, Phillips PJ, Vetro A.  2007.  Signal Processing for Biometric Systems [DSP Forum]. Signal Processing Magazine, IEEE. 24(6):146-152.
Zotkin DN, Duraiswami R.  2010.  Signal Processing for Audio HCI. Handbook of Signal Processing Systems. :243-265.
M. Wu, Mao Y, Swaminathan A.  2007.  A Signal Processing and Randomization Perspective of Robust and Secure Image Hashing. Statistical Signal Processing, 2007. SSP '07. IEEE/SP 14th Workshop on. :166-170.
DeRose L, Ekanadham K, Hollingsworth J, Sbaraglia S.  2002.  SIGMA: A Simulator Infrastructure to Guide Memory Analysis. SC Conference. :1-1.

Pages