Publications
Export 7151 results:
Author Title [ Type] Year Filters: Efficient-cryptographic-protocols-preventing-%E2%80%9Cman-middle%E2%80%9D-attacks is [Clear All Filters]
2005. Preliminary Study of the SGS Time Scales for Compressible Boundary Layers using DNS Data. 43rd AIAA Aerospace Sciences Meeting and Exhibit.
2005. Preliminary Study of the Turbulence Structure in Supersonic Boundary Layers using DNS Data. 35th AIAA Fluid Dynamics Conference.
2004. Preschool children's use of mouse buttons. CHI'04 extended abstracts on Human factors in computing systems. :1411-1412.
1993. Presentations and this and that: logic in action. Proceedings of the 15th Annual Conference of the Cognitive Science Society, Boulder, Colorado. 251
2008. Preserving the privacy of sensitive relationships in graph data. Proceedings of the 1st ACM SIGKDD international conference on Privacy, security, and trust in KDD. :153-171.
1994. Principles of computer vision. Handbook of pattern recognition and image processing (vol. 2). :1-15.
2009. Prioritizing component compatibility tests via user preferences. Software Maintenance, 2009. ICSM 2009. IEEE International Conference on. :29-38.
2004. The priority curve algorithm for video summarization. Proceedings of the 2nd ACM international workshop on Multimedia databases. :28-35.
2006. The prize-collecting generalized Steiner tree problem via a new approach of primal-dual schema. Proceedings of the seventeenth annual ACM-SIAM symposium on Discrete algorithm. :631-640.
2011. A probabilistic approach for learning folksonomies from structured data. Proceedings of the fourth ACM international conference on Web search and data mining. :555-564.
2000. A probabilistic framework for rigid and non-rigid appearance based tracking and recognition. Automatic Face and Gesture Recognition, 2000. Proceedings. Fourth IEEE International Conference on. :491-498.
2007. Probabilistic Fusion Tracking Using Mixture Kernel-Based Bayesian Filtering. Computer Vision, 2007. ICCV 2007. IEEE 11th International Conference on. :1-8.
2007. Probabilistic go theories.
2007. Probabilistic graphical models and their role in databases. Proceedings of the 33rd international conference on Very large data bases. :1435-1436.
2004. Probabilistic identity characterization for face recognition. Computer Vision and Pattern Recognition, 2004. CVPR 2004. Proceedings of the 2004 IEEE Computer Society Conference on. 2:II-805-II-812Vol.2-II-805-II-812Vol.2.
2006. A probabilistic notion of correspondence and the epipolar constraint. Proceedings of the Third International Symposium on 3D Data Processing, Visualization, and Transmission (3DPVT'06). :41-48.
2002. Probabilistic recognition of human faces from video. Image Processing. 2002. Proceedings. 2002 International Conference on. 1:I-41-I-44vol.1-I-41-I-44vol.1.
2003. Probabilistic structured query methods. Proceedings of the 26th annual international ACM SIGIR conference on Research and development in informaion retrieval. :338-344.
2003. Probabilistic tracking in joint feature-spatial spaces. Computer Vision and Pattern Recognition, 2003. Proceedings. 2003 IEEE Computer Society Conference on. 1:I-781-I-788vol.1-I-781-I-788vol.1.
1992. Probabilistic tree-adjoining grammar as a framework for statistical natural language processing. Proceedings of the 14th conference on Computational linguistics-Volume 2. :418-424.