Publications
Export 7151 results:
Author Title [ Type] Year Filters: Unreliable-convergence-criterion-arnoldi%E2%80%99s-method is [Clear All Filters]
1993. A graphical filter/flow representation of Boolean queries: A prototype implementation and evaluation. Journal of the American Society for Information Science. 44(6):327-339.
1993. A graphical query interface based on aggregation/generalization hierarchies. Information Systems. 18(4):215-232.
2007. Grid Services Base Library: A high-level, procedural application programming interface for writing Globus-based Grid services. Future Generation Comp Syst. 23(3):517-522.
1987. GROPER: A Grouping Based Object Recognition System for Two-Dimensional Objects. IEEE Workshop on Computer Vision. :164-169.
2008. Group proximity measure for recommending groups in online social networks. networks. 1(6):5-5.
2010. A group signature scheme from lattice assumptions. Advances in Cryptology-ASIACRYPT 2010. :395-412.
2005. Group-based joint coding and embedding technique for multimedia fingerprinting. Proc. SPIE. 5681:96-105.
2004. Group-oriented fingerprinting for multimedia forensics. EURASIP J. Appl. Signal Process.. 2004:2153-2173.
2007. Guest Editorial: Special Issue on Human Detection and Recognition. Information Forensics and Security, IEEE Transactions on. 2(3):489-490.
2004. Guest editors' foreword: special issue: 35th annual ACM symposium on theory of computing. Journal of Computer and System Sciences. 69(3):305-305.
2001. Guest Editor's Introduction: Special Issue on Visualization 2000. IEEE Transactions on Visualization and Computer Graphics. 7(3):193-194.
2008. Guest Editors' Introduction to the Special Section on Algorithms in Bioinformatics. IEEE/ACM Transactions on Computational Biology and Bioinformatics. 5(4):482-483.
2003. Guest editors' Introduction to the special section on energy minimization methods in computer vision and pattern recognition. Pattern Analysis and Machine Intelligence, IEEE Transactions on. 25(11):1361-1363.
2011. GUI Interaction Testing: Incorporating Event Context. Software Engineering, IEEE Transactions on. 37(4):559-574.
2003. GUI ripping: Reverse engineering of graphical user interfaces for testing. Proceedings of the 10th working conference on reverse engineering (WCRE’03). 1095(1350/03):17-00.
2008. Handling expected polynomial-time strategies in simulation-based security proofs. Journal of Cryptology. 21(3):303-349.
2005. Handling uneven embedding capacity in binary images: a revisit. Proceedings of SPIE. 5681(1):194-205.