Publications
Export 7148 results:
[ Author] Title Type Year Filters: Unreliable-convergence-criterion-arnoldi%E2%80%99s-method is [Clear All Filters]
2006. Image Similarity and Asymmetry to Improve Computer-Aided Detection of Breast Cancer. Digital Mammography. :221-228.
2010. A Web Database for Computer-Aided Detection and Diagnosis of Medical Images. Digital Mammography. :265-272.
2007. A web collaboration system for content-based image retrieval of medical images. Proceedings of SPIE–Medical Imaging. 6516
2011. Towards view-invariant expression analysis using analytic shape manifolds. 2011 IEEE International Conference on Automatic Face & Gesture Recognition and Workshops (FG 2011). :306-313.
1989. A data flow implementation of a competition-based connectionist model* 1. Journal of Parallel and Distributed Computing. 6(3):704-714.
1995. A large-scale neural model linking local neuronal dynamics to positron emission tomography (PET) regional cerebral blood ffow (rCBF) data. Soc Neurosci Abstr. 21:1988-1988.
2007. Robust Routing with Unknown Traffic Matrices. INFOCOM 2007. 26th IEEE International Conference on Computer Communications. IEEE. :2436-2440.
2007. Automatic software interference detection in parallel applications. Proceedings of the 2007 ACM/IEEE conference on Supercomputing. :14:1–14:12-14:1–14:12.
2005. Parallel Parameter Tuning for Applications with Performance Variability. Proceedings of the 2005 ACM/IEEE conference on Supercomputing. :57–-57–.
2005. Differentiated traffic engineering for QoS provisioning. INFOCOM 2005. 24th Annual Joint Conference of the IEEE Computer and Communications Societies. Proceedings IEEE. 4:2349-2359vol.4-2349-2359vol.4.
1983. The effect of scope delimiters on program comprehension. Software: Practice and Experience. 13(9):817-824.
2008. Verified enforcement of automaton-based information release policies. Proceedings of the 2008 Workshop on Programming Languages and Analysis for Security. ACM Press.
2011. Lightweight monadic programming in ML. Proceedings of the 16th ACM SIGPLAN international conference on Functional programming. :15-27.
2006. Managing policy updates in security-typed languages. 19th IEEE Computer Security Foundations Workshop, 2006. :13pp.-216-13pp.-216.
2008. Fable: A Language for Enforcing User-defined Security Policies. IEEE Symposium on Security and Privacy, 2008. SP 2008. :369-383.
2009. A theory of typed coercions and its applications. Proceedings of the 14th ACM SIGPLAN international conference on Functional programming. :329-340.
2007. Verified Enforcement of Security Policies for Cross-Domain Information Flows. IEEE Military Communications Conference, 2007. MILCOM 2007. :1-7.
2006. Robust and secure image hashing. Information Forensics and Security, IEEE Transactions on. 1(2):215-230.
2008. A pattern classification framework for theoretical analysis of component forensics. Acoustics, Speech and Signal Processing, 2008. ICASSP 2008. IEEE International Conference on. :1665-1668.
2006. Exploring QIM-based anti-collusion fingerprinting for multimedia. Proceedings of SPIE. 6072:698-709.
2007. A Component Estimation Framework for Information Forensics. Multimedia Signal Processing, 2007. MMSP 2007. IEEE 9th Workshop on. :397-400.
2007. Intrinsic fingerprints for image authentication and steganalysis. Proc. SPIE Conf. Security, Steganography, Watermarking of Multimedia Contents.
2005. Security of feature extraction in image hashing. Acoustics, Speech, and Signal Processing, 2005. Proceedings. (ICASSP '05). IEEE International Conference on. 2:ii/1041-ii/1044Vol.2-ii/1041-ii/1044Vol.2.