Publications

Export 7151 results:
Author Title Type [ Year(Asc)]
Filters: Filter is   [Clear All Filters]
2010
Li R, Chellappa R.  2010.  Aligning Spatio-Temporal Signals on a Special Manifold. Computer Vision – ECCV 2010Computer Vision – ECCV 2010. 6315:547-560.
White JR, Navlakha S, Nagarajan N, Ghodsi M-R, Kingsford C, Pop M.  2010.  Alignment and clustering of phylogenetic markers - implications for microbial diversity studies. BMC Bioinformatics. 11(1):152-152.
Hansen D, Shneiderman B, Smith MA.  2010.  Analyzing Social Media Networks with NodeXL.
Hansen D, Shneiderman B, Smith MA.  2010.  Analyzing Social Media Networks with NodeXL: Insights from a Connected World. :302.
Ordóñez P, desJardins M, Lombardi M, Lehmann CU, Fackler J.  2010.  An animated multivariate visualization for physiological and clinical data in the ICU. Proceedings of the 1st ACM International Health Informatics Symposium. :771-779.
Udrea O, Recupero D R, V.S. Subrahmanian.  2010.  Annotated RDF. ACM Trans. Comput. Logic. 11(2):10:1–10:41-10:1–10:41.
Ran Y, Zheng Q, Chellappa R, Strat TM.  2010.  Applications of a Simple Characterization of Human Gait in Surveillance. Systems, Man, and Cybernetics, Part B: Cybernetics, IEEE Transactions on. 40(4):1009-1020.
Papamanthou C, Tollis IG.  2010.  Applications of Parameterized st-Orientations. Journal of Graph Algorithms and Applications. 14(2):337-365.
da Fonseca GD, Mount D.  2010.  Approximate range searching: The absolute model. Computational Geometry. 43(4):434-444.
Friedler SA, Mount D.  2010.  Approximation algorithm for the kinetic robust K-center problem. Computational Geometry. 43(6–7):572-586.
Chekuri C, Hajiaghayi MT, Kortsarz G, Salavatipour MR.  2010.  Approximation Algorithms for Non-Uniform Buy-at-Bulk Network Design. SIAM Journal on Computing. 39(5):1772-1798.
Zazworka N, Stapel K, Knauss E, Shull F, Basili VR, Schneider K.  2010.  Are developers complying with the process: an XP study. Proceedings of the 2010 ACM-IEEE International Symposium on Empirical Software Engineering and Measurement. :14:1–14:10-14:1–14:10.
Gopalan R, Turaga P, Chellappa R.  2010.  Articulation-Invariant Representation of Non-planar Shapes. Computer Vision – ECCV 2010Computer Vision – ECCV 2010. 6313:286-299.
Kingsford C, Schatz MC, Pop M.  2010.  Assembly complexity of prokaryotic genomes using short reads. BMC Bioinformatics. 11(1):21-21.
Webber W, Oard D, Scholer F, Hedin B.  2010.  Assessor error in stratified evaluation. Proceedings of the 19th ACM international conference on Information and knowledge management. :539-548.
O'donovan A, Duraiswami R, Zotkin DN, Gumerov NA.  2010.  Audio visual scene analysis using spherical arrays and cameras.. The Journal of the Acoustical Society of America. 127(3):1979-1979.
Gordon S, Katz J, Kumaresan R, Yerukhimovich A.  2010.  Authenticated broadcast with a partially compromised public-key infrastructure. Stabilization, Safety, and Security of Distributed Systems. :144-158.
Chow R, Jakobsson M, Masuoka R, Molina J, Niu Y, Elaine Shi, Song Z.  2010.  Authentication in the clouds: a framework and its application to mobile users. :1-6.
Gu R, Piat J, Raulet M, Janneck JW, Bhattacharyya SS.  2010.  Automated generation of an efficient MPEG-4 Reconfigurable Video Coding decoder implementation. 2010 Conference on Design and Architectures for Signal and Image Processing (DASIP). :265-272.
O'Donovan AE, Duraiswami R, Zotkin DN.  2010.  Automatic matched filter recovery via the audio camera. Acoustics Speech and Signal Processing (ICASSP), 2010 IEEE International Conference on. :2826-2829.
Patel VM, Nasrabadi NM, Chellappa R.  2010.  Automatic target recognition based on simultaneous sparse representation. Image Processing (ICIP), 2010 17th IEEE International Conference on. :1377-1380.
Sundaresan S, Lumezanu C, Feamster N, François P.  2010.  Autonomous Traffic Engineering using Self-Configuring Link Weights. GT-CS-10-16
Sundaresan S, Lumezanu C, Feamster N, Francois P.  2010.  Autonomous traffic engineering with self-configuring topologies. SIGCOMM Comput. Commun. Rev.. 41(4):–-–.
Perdisci R, Lee W, Feamster N.  2010.  Behavioral clustering of HTTP-based malware and signature generation using malicious network traces. Proceedings of the 7th USENIX conference on Networked systems design and implementation. :26-26.
Ji H, Fermüller C.  2010.  Better Flow Estimation from Color Images-Volume 2007, Article ID 53912, 9 pages. EURASIP Journal on Advances in Signal Processing. 2007(23)

Pages