Journal Articles

Pages

Aliaga DG, Allen PK, Archibald JK, Argyros AA, Arkin RC, Baker C, et al. Robotics & Automation Magazine Vol. 11. IEEE Robotics & Automation Magazine. 2004:132.
Perlis D. Robotson Crusoe–or–What Is Common Sense? Logical Formalizations of Commonsense Reasoning — Papers from the AAAI 2011 Spring Symposium. 2011.
Jacobs DW. Robust and efficient detection of salient convex groups. Pattern Analysis and Machine Intelligence, IEEE Transactions on. 1996;18(1):23-37.
Swaminathan A, Mao Y, M. Wu. Robust and secure image hashing. Information Forensics and Security, IEEE Transactions on. 2006;1(2):215-230.
Gou H, Wu M. Robust digital fingerprinting for curves. Proc. of IEEE Int. Conf. on Acoustics, Speech, and Signal Processing (ICASSP'05). 2005;2:529-532.
Biswas S, Aggarwal G, Chellappa R. Robust Estimation of Albedo for Illumination-Invariant Matching and Shape Recovery. Pattern Analysis and Machine Intelligence, IEEE Transactions on. 2009;31(5):884-899.
Dodis Y, Katz J, Reyzin L, Smith A. Robust fuzzy extractors and authenticated key agreement from close secrets. Advances in Cryptology-CRYPTO 2006. 2006:232-250.
Shao J, Zhou SK, Chellappa R. Robust Height Estimation of Moving Objects From Uncalibrated Videos. IEEE Transactions on Image Processing. 2010;19(8):2221-2232.
Schwartz WR, Gopalan R, Chellappa R, Davis LS. Robust human detection under occlusion by integrating face and person detectors. Proceedings of the Third International Conference on Advances in Biometrics. 2009:970-979.
Zheng Y, Doermann D. Robust Point Matching for Nonrigid Shapes By Preserving Local Neighborhood Structures. IEEETransactions on Pattern Analysis and Machine Intelligence. 2006;28(4):643-649.
Yu Z, Seng CY, Jiang T, Wu X, Arbaugh WA. Robust routing in malicious environment for ad hoc networks. Information Security Practice and Experience. 2005:36-47.
Gou H, Swaminathan A, Wu M. Robust scanner identification based on noise features. Proc. SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents IX. 2007;6505:0S-0T - 0S-0T.
Ji H, Fermüller C. Robust Wavelet-Based Super-Resolution Reconstruction: Theory and Algorithm. IEEE Transactions on Pattern Analysis and Machine Intelligence. 2009;31(4):649-660.
Black MJ, Fleet DJ, Yacoob Y. Robustly estimating changes in image appearance. Computer Vision and Image Understanding. 2000;78(1):8-31.
Stauder M, Huq A, Pezzati E, Grim CJ, Ramoino P, Pane L, et al. Role of GbpA protein, an important virulence-related colonization factor, for Vibrio cholerae's survival in the aquatic environment. Environmental Microbiology Reports. 2012;(4):439-445.
Nahar S, Sultana M, Naser NM, Nair GB, Watanabe H, Ohnishi M, et al. Role of Shrimp Chitin in the Ecology of Toxigenic Vibrio cholerae and Cholera Transmission. Frontiers in Microbiology. 2012;2:260.
Bringaud F, Ghedin E, El-Sayed NM, Papadopoulou B. Role of transposable elements in trypanosomatids. Microbes and Infection. 2008;10(6):575-581.
De Magny G, Mozumder PK, Grim CJ, Hasan NA, Naser NM, Alam M, et al. Role of Zooplankton Diversity in Vibrio Cholerae Population Dynamics and in the Incidence of Cholera in the Bangladesh Sundarbans. Applied and Environmental Microbiology. 2011;77(17):6125-6132.
Lin CY, Wu M, Bloom JA, Cox IJ, Miller ML, Lui YM. Rotation, scale, and translation resilient public watermarking for images. PROC SPIE INT SOC OPT ENG. 2000;3971:90-98.
Lin C-, Wu M, Bloom JA, Cox IJ, Miller ML, Lui YM. Rotation, scale, and translation resilient watermarking for images. Image Processing, IEEE Transactions on. 2001;10(5):767-782.
Katz J, Koo CY. Round-efficient secure computation in point-to-point networks. Advances in Cryptology-EUROCRYPT 2007. 2007:311-328.
Katz J, Vaikuntanathan V. Round-optimal password-based authenticated key exchange. Theory of Cryptography. 2011:293-310.
Katz J, Ostrovsky R. Round-optimal secure two-party computation. Advances in Cryptology–CRYPTO 2004. 2004:3-34.
Von Matt U, Stewart G.. Rounding errors in solving block Hessenberg systems. Mathematics of Computation. 1996;65(213):115-135.
Banerjee S, Agarwal S, Kamel K, Kochut A, Kommareddy C, Nadeem T, et al. Rover: scalable location-aware computing. Computer. 2002;35(10):46-53.
Rosenzweig R, Bronner V, Zhang D, Fushman D, Glickman MH. Rpn1 and Rpn2 coordinate ubiquitin processing factors at the proteasome. Journal of Biological ChemistryJ. Biol. Chem.. 2012.
Snover M, Schwartz R, Dorr BJ, Makhoul J. RT-S: Surface rich transcription scoring, methodology, and initial results. Proc. DARPA Rich Transcription Workshop. 2004.
Udrea O, Lumezanu C, Foster JS. Rule-based static analysis of network protocol implementations. Information and Computation. 2008;206(2):130-157.
Edjlali G, Agrawal G, Sussman A, Humphries J, Saltz J. Run-time and compiler support for programming in adaptive parallel environments. Scientific Programming. 1997;6(2):215-227.
Reggia JA, Nau DS. S., Wang. PY, Diagnostic Expert Systems Based on a Set Covering Model. International Journal on Man-Machine studies. 1983;19:437-46O - 437-46O.
Nandi A, Ganjam A, Druschel P, Ng TS, Stoica I, Zhang H, et al. SAAR: A shared control plane for overlay multicast. Proceedings of 4th USENIX Symposium on Networked Systems Design & Implementation. 2007:57-72.
Hicks MW, Morrisett G, Grossman D, Jim T. Safe and flexible memory management in Cyclone. Technical Reports from UMIACS. 2003.
Swamy N, Hicks MW, Morrisett G, Grossman D, Jim T. Safe manual memory management in Cyclone. Science of Computer Programming. 2006;62(2):122-144.
Alexander S, Arbaugh WA, Keromytis AD, Smith JM. Safety and security of programmable network infrastructures. IEEE Communications Magazine. 1998;36(10):84-92.
Patro R, Ip CY, Varshney A, Hagen H. Saliency Guided Summarization of Molecular Dynamics Simulations. Scientific Visualization: Advanced Concepts. 2010;1:321-335.
Ip C, Varshney A. Saliency-Assisted Navigation of Very Large Landscape Images. Visualization and Computer Graphics, IEEE Transactions on. 2011;17(12):1737-1746.
Kim Y, Varshney A. Saliency-guided Enhancement for Volume Visualization. Visualization and Computer Graphics, IEEE Transactions on. 2006;12(5):925-932.

Pages