Journal Articles

Pages

Shi Q, JaJa JF. Isosurface Extraction and Spatial Filtering using Persistent Octree (POT). Visualization and Computer Graphics, IEEE Transactions on. 2006;12(5):1283-1290.
Yuan X, Memon AM. Iterative execution-feedback model-directed GUI testing. Information and Software Technology. 2010;52(5):559-575.
Elman H. Iterative methods for large, sparse, nonsymmetric systems of linear equations. Dissertation Abstracts International Part B: Science and Engineering[DISS. ABST. INT. PT. B- SCI. & ENG.],. 1982;43(5):1982.
Elman H. Iterative methods for linear systems. Large-Scale Matrix Problems and the Numerical Solution of Partial Differential Equations. 1994;3:69-177.
Elman H, Silvester DJ, Wathen AJ. Iterative methods for problems in computational fluid dynamics. Iterative Methods in Scientific Computing. 1997:271-327.
Kilmer M, Stewart G.. Iterative regularization and MINRES. SIAM Journal on Matrix Analysis and Applications. 2000;21(2):613-628.
Jacox EH, Samet H. Iterative spatial join. ACM Trans. Database Syst.. 2003;28(3):230-256.
Maneewongvatana S, Mount D. It’s okay to be skinny, if your friends are fat. Center for Geometric Computing 4th Annual Workshop on Computational Geometry. 1999.
Santos TT, Morimoto CH, Chellappa R. Jmin-image based color-texture segmentation using watershed and hierarchical clustering. Proceedings of the 8th International Symposium on Mathematical Morphology. 2007;2:35-36.
Harper MP, Dorr BJ, Hale J, Roark B, Shafran I, Lease M, et al. Johns Hopkins summer workshop final report on parsing and spoken structural event detection. Johns Hopkins University, Tech. Rep. 2005.
Bambha NK, Bhattacharyya SS. Joint application mapping/interconnect synthesis techniques for embedded chip-scale multiprocessors. Parallel and Distributed Systems, IEEE Transactions on. 2005;16(2):99-112.
Trappe W, Wu M, Liu KJ. Joint coding and embedding for collusion-resistant fingerprinting. Proceedings of the European Signal Processing Conference, EUSIPCO. 2002.
He S, M. Wu. Joint coding and embedding techniques for MultimediaFingerprinting. Information Forensics and Security, IEEE Transactions on. 2006;1(2):231-247.
Murthy PK, Bhattacharyya SS, Lee EA. Joint minimization of code and data for synchronous dataflow programs. Formal Methods in System Design. 1997;11(1):41-70.
Wu M. Joint security and robustness enhancement for quantization based data embedding. Circuits and Systems for Video Technology, IEEE Transactions on. 2003;13(8):831-841.
Su G-, Han Z, M. Wu, Liu KJ. Joint Uplink and Downlink Optimization for Real-Time Multiuser Video Streaming Over WLANs. Selected Topics in Signal Processing, IEEE Journal of. 2007;1(2):280-294.
Samet H. K-nearest neighbor finding using MaxNearestDist. IEEE transactions on pattern analysis and machine intelligence. 2007:243-252.
Song Z, Roussopoulos N. K-nearest neighbor search for moving query point. Advances in Spatial and Temporal Databases. 2001:79-96.
Srinivasan B, Duraiswami R. Kernelized Renyi distance for subset selection and similarity scoring. Technical Reports of the Computer Science Department. 2011.
Dodis Y, Katz J, Xu S, Yung M. Key-insulated public key cryptosystems. Advances in Cryptology—Eurocrypt 2002. 2002:65-82.
Morselli R, Bhattacharjee B, Katz J, Marsh MA. KeyChains: A Decentralized Public-Key Infrastructure. Technical Reports from UMIACS, UMIACS-TR-2006-12. 2006.
Taxén G, Druin A, Fast C, Kjellin M. KidStory: A technology design partnership with children. Behaviour & Information Technology. 2001;20(2):119-125.
Reggia JA, Perricone B. KMS reference manual. Dep. Comput. Sci., Univ. Maryland, College Park, Tech. Rep. TR-1136. 1982.
Eaton E, desJardins M. Knowledge transfer with a multiresolution ensemble of classifiers. ICML Workshop on Structural Knowledge Transfer for Machine Learning. 2006.
Zhang Z, JaJa JF, Bader DA, Kalluri SN, Song H, El Saleous N, et al. Kronos: A software system for the processing and retrieval of large-scale AVHRR data sets. PE & RS- Photogrammetric Engineering and Remote Sensing. 2000;66(9):1073-1082.
Basri R, Jacobs DW. Lambertian reflectance and linear subspaces. Pattern Analysis and Machine Intelligence, IEEE Transactions on. 2003;25(2):218-233.
Khuller S, Raghavachari B, Rosenfeld A. Landmarks in graphs. Discrete Applied Mathematics. 1996;70(3):217-229.
Mitra K, Sheorey S, Chellappa R. Large-scale matrix factorization with missing data under additional constraints. Advances in Neural Information Processing Systems. 2010;23:1642-1650.
Dorr BJ. LCS-based Korean Parsing and Translation. Ms. Institute for Advanced Computer Studies and Department of Computer Science, University of Maryland. 1997.
Parton D, Huffman K, Pridgen P, Norman K, Shneiderman B. Learning a menu selection tree: training methods compared. Behaviour & Information Technology. 1985;4(2):81-91.
Miner D, desJardins M. Learning Abstract Properties of Swarm Systems. Proceedings of the 8th International Conference on Autonomous Agents and Multiagent Systems. 2008.
Grundstrom EL, Reggia JA. Learning Activation Rules Rather Than Connection Weights. International journal of neural systems. 1996;7(2):129-148.

Pages