Publications
Export 604 results:
Author [ Title] Type Year Filters: First Letter Of Last Name is J [Clear All Filters]
1994. Segmenting independently moving, noisy points. Motion of Non-Rigid and Articulated Objects, 1994., Proceedings of the 1994 IEEE Workshop on. :96-103.
2002. Security Testing using a Susceptibility Matrix. International Symposioum on Software Reliability Engineering. 13
2008. Searching the world’s herbaria: A system for visual identification of plant species. Computer Vision–ECCV 2008. :116-129.
2006. Script-Independent Text Line Segmentation in Freestyle Handwritten Documents. LAMP-TR-136, CS-TR-4836, UMIACS-TR-2006-51, CFAR-TR-1017
2008. Script-Independent Text Line Segmentation in Freestyle Handwritten Documents. IEEETransactions on Pattern Analysis and Machine Intelligence. :1313-1329.
2005. Scheduling on Unrelated Machines Under Tree-Like Precedence Constraints. Approximation, Randomization and Combinatorial Optimization. Algorithms and TechniquesApproximation, Randomization and Combinatorial Optimization. Algorithms and Techniques. 3624:609-609.
1995. Scalable data parallel algorithms for texture synthesis using Gibbs random fields. Image Processing, IEEE Transactions on. 4(10):1456-1460.
1998. Scalable Data Parallel Algorithms for Texture Synthesis and Compression using Gibbs Random Fields. UMIACS-TR-93-80
2015. Satellite Based Assessment of Hydroclimatic Conditions Related to Cholera in Zimbabwe. PLOS ONE. (9Suppl 1):e0137828.
1989. On routing two-terminal nets in the presence of obstacles. Computer-Aided Design of Integrated Circuits and Systems, IEEE Transactions on. 8(5):563-570.
1996. Role of word sense disambiguation in lexical acquisition: predicting semantics from syntactic cues. Proceedings of the 16th conference on Computational linguistics - Volume 1. :322-327.
2008. The role of metacognition in robust AI systems. AAAI-08 Workshop on Metareasoning,(Chicago, IL).
1999. The role of convexity in perceptual completion: beyond good continuation. Vision Research. 39(25):4244-4257.
2009. Robust Wavelet-Based Super-Resolution Reconstruction: Theory and Algorithm. IEEE Transactions on Pattern Analysis and Machine Intelligence. 31(4):649-660.
2006. Robust technologies for automated ingestion and long-term preservation of digital information. Proceedings of the 2006 international conference on Digital government research. :285-286.
2005. Robust routing in malicious environment for ad hoc networks. Information Security Practice and Experience. :36-47.
1996. Robust and efficient detection of salient convex groups. Pattern Analysis and Machine Intelligence, IEEE Transactions on. 18(1):23-37.
2008. Review of Classifier Combination Methods. Studies in Computational Intelligence: Machine Learning in Document Analysis and RecognitionStudies in Computational Intelligence: Machine Learning in Document Analysis and Recognition. :361-386.
2005. Representing Unevenly-Spaced Time Series Data for Visualization and Interactive Exploration (2005). Institute for Systems Research Technical Reports.