Publications
Export 7148 results:
[ Author] Title Type Year Filters: Robotson-crusoe%E2%80%93or%E2%80%93what-common-sense is [Clear All Filters]
2003. A hidden Markov model based framework for recognition of humans from gait sequences. Image Processing, 2003. ICIP 2003. Proceedings. 2003 International Conference on. 2:II-93-6vol.3-II-93-6vol.3.
2011. ON THE ESTIMATION OF 3D HUMAN BODY MODELS AND POSE FROM MULTIPLE CAMERAS. EMERGING TOPICS IN COMPUTER VISION AND ITS APPLICATIONS. :3-25.
2011. Broadband internet performance: A view from the gateway. SIGCOMM-Computer Communication Review. 41(4):134-134.
1992. PARTI primitives for unstructured and block structured problems. Computing Systems in Engineering. 3(1-4):73-86.
2006. Building complex coupled physical simulations on the grid with InterComm. Engineering with Computers. 22(3):311-323.
1992. Model-driven mapping onto distributed memory parallel computers. Proceedings of the 1992 ACM/IEEE conference on Supercomputing. :818-829.
1994. Effects of normalization constraints on competitive learning. Neural Networks, IEEE Transactions on. 5(3):502-504.
1990. Supervised and reinforced competitive learning. Neural Networks, 1990., 1990 IJCNN International Joint Conference on. :563-567.
1990. Competitive learning using competitive activation rules. Neural Networks, 1990., 1990 IJCNN International Joint Conference on. :285-291.
2011. Trajectory planning with look-ahead for Unmanned Sea Surface Vehicles to handle environmental disturbances. :1154-1159.
2012. Automated synthesis of action selection policies for unmanned vehicles operating in adverse environments. Autonomous Robots. 32(2):149-164.
2011. Automated Planning Logic Synthesis for Autonomous Unmanned Vehicles in Competitive Environments with Deceptive Adversaries. New Horizons in Evolutionary Robotics. 341:171-193.
2006. Component Forensics of Digital Cameras: A Non-Intrusive Approach. Information Sciences and Systems, 2006 40th Annual Conference on. :1194-1199.
2006. Image Tampering Identification using Blind Deconvolution. Image Processing, 2006 IEEE International Conference on. :2309-2312.
2005. Data hiding in compiled program binaries for enhancing computer system performance. Information Hiding. :357-371.
2008. Digital image forensics via intrinsic fingerprints. Information Forensics and Security, IEEE Transactions on. 3(1):101-117.
2004. Image hashing resilient to geometric and filtering operations. Multimedia Signal Processing, 2004 IEEE 6th Workshop on. :355-358.
2006. Robust and secure image hashing. Information Forensics and Security, IEEE Transactions on. 1(2):215-230.
2008. A pattern classification framework for theoretical analysis of component forensics. Acoustics, Speech and Signal Processing, 2008. ICASSP 2008. IEEE International Conference on. :1665-1668.
2006. Exploring QIM-based anti-collusion fingerprinting for multimedia. Proceedings of SPIE. 6072:698-709.
2007. A Component Estimation Framework for Information Forensics. Multimedia Signal Processing, 2007. MMSP 2007. IEEE 9th Workshop on. :397-400.
2007. Intrinsic fingerprints for image authentication and steganalysis. Proc. SPIE Conf. Security, Steganography, Watermarking of Multimedia Contents.
2007. Confidentiality-preserving rank-ordered search. Proceedings of the 2007 ACM workshop on Storage security and survivability. :7-12.