Publications

Export 748 results:
Author [ Title(Asc)] Type Year
Filters: First Letter Of Title is S  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
S
Dorr BJ, Gaasterland T.  1995.  Selecting Tense, Aspect, and Connecting Words In Language Generation. In Proceedings of IJCAI-95. :1299-1305.
Gong J, Oard D.  2009.  Selecting hierarchical clustering cut points for web person-name disambiguation. Proceedings of the 32nd international ACM SIGIR conference on Research and development in information retrieval. :778-779.
Yao Z, Gupta SK, Nau DS.  2000.  Selecting Flat End Mills for 2-1/2D Milling Operations. ISR; TR 2000-41
Zelkowitz MV.  1980.  Selected reprints in software: selected reprints from Computer.
Zelkowitz MV.  1987.  Selected reprints in software.
Chalfoun J, Kociolek M, Dima A, Halter M, Cardone A, Peskin A, Bajcsy P, Brady M.  2013.  Segmenting time-lapse phase contrast images of adjacent NIH 3T3 cells.. Journal of microscopy. 249(1):41-52.
Davis LS.  2006.  Segmenting people in small groups. Proceedings of the 4th ACM international workshop on Video surveillance and sensor networks. :1-2.
Jacobs DW, Chennubhotla C.  1994.  Segmenting independently moving, noisy points. Motion of Non-Rigid and Articulated Objects, 1994., Proceedings of the 1994 IEEE Workshop on. :96-103.
Yacoob Y, Davis LS.  2007.  Segmentation using Meta-texture Saliency. Computer Vision, 2007. ICCV 2007. IEEE 11th International Conference on. :1-8.
Yacoob Y, Davis LS.  2009.  Segmentation using appearance of mesostructure roughness. International journal of computer vision. 83(3):248-273.
Yacoob Y, Davis LS.  2006.  Segmentation of planar objects and their shadows in motion sequences. International journal of computer vision. 67(1):53-69.
Kumar J, Kang L, Doermann D, Abd-Almageed W.  2011.  Segmentation of Handwritten Textlines in Presence of Touching Components. Intl. Conf. on Document Analysis and Recognition (ICDAR 11). :109-113.
Cardone A, Chalfoun J, Peskin A, Bajcsy P, Kociolek M, Bhadriraju K, Brady M.  2015.  Segmentation and sub-cellular feature-based analysis of microscopy images. BioImage Informatics Conference .
Sundaresan A, Chellappa R.  2006.  Segmentation and Probabilistic Registration of Articulated Body Models. Pattern Recognition, 2006. ICPR 2006. 18th International Conference on. 2:92-96.
Zheng Y, Li H, Doermann D.  2002.  Segmentation and Identification of Handwriting in Noisy Documents. IAPRConference on Document Analysis System. :95-105.
Zhao L, Davis LS.  2005.  Segmentation and appearance model building from an image sequence. Image Processing, 2005. ICIP 2005. IEEE International Conference on. 1:I-321-4-I-321-4.
Roussopoulos N, Yeh RT.  1985.  SEES—A Software testing Environment Support System. IEEE Transactions on Software Engineering. SE-11(4):355-366.
de Souza C, Froehlich J, Dourish P.  2005.  Seeking the source: software source code as a social and technical artifact. Proceedings of the 2005 international ACM SIGGROUP conference on Supporting group work. :197-206.
North C, Shneiderman B, Plaisant C, Kang H, Bederson BB.  2003.  Seeing the World Through Image Libraries. The craft of information visualization: readings and reflectionsThe craft of information visualization: readings and reflections. :47-47.
Garg R, Varna AL, M. Wu.  2011.  "Seeing" ENF: natural time stamp for digital video via optical sensing and signal processing. Proceedings of the 19th ACM international conference on Multimedia. :23-32.
Aloimonos Y, Fermüller C, Rosenfeld A.  1995.  Seeing and understanding: representing the visual world. ACM Comput. Surv.. 27(3):307-309.
Jiwnani K, Zelkowitz MV.  2002.  Security Testing using a Susceptibility Matrix. International Symposioum on Software Reliability Engineering. 13
Swaminathan A, Mao Y, M. Wu.  2005.  Security of feature extraction in image hashing. Acoustics, Speech, and Signal Processing, 2005. Proceedings. (ICASSP '05). IEEE International Conference on. 2:ii/1041-ii/1044Vol.2-ii/1041-ii/1044Vol.2.
Mishra A, Petroni Jr NL, Arbaugh WA, Fraser T.  2004.  Security issues in IEEE 802.11 wireless local area networks: a survey. Wireless Communications and Mobile Computing. 4(8):821-833.
Mao Y, M. Wu.  2006.  Security Issues in Cooperative Communications: Tracing Adversarial Relays. Acoustics, Speech and Signal Processing, 2006. ICASSP 2006 Proceedings. 2006 IEEE International Conference on. 4:IV-IV.

Pages