Publications

Export 7151 results:
Author [ Title(Desc)] Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
H
Balch T, Dellaert F., Feldman A., Guillory A., Isbell C.L., Khan Z, Pratt S.C., Stein A.N., Wilde H..  2006.  How Multirobot Systems Research will Accelerate our Understanding of Social Animal Behavior. Proceedings of the IEEE. 94(7):1445-1463.
Huang L, Aloimonos Y.  1994.  How normal flow constrains relative depth for an active observer. Image and vision computing. 12(7):435-445.
Condon E, Cummins E, Afoulki Z, Cukier M.  2011.  How secure are networked office devices? :465-472.
Chetty M, Sung J-Y, Grinter RE.  2007.  How Smart Homes Learn: The Evolution of the Networked Home and Household. UbiComp 2007: Ubiquitous Computing. :127-144.
Kamara S, Katz J.  2008.  How to encrypt with a malicious random number generator. Fast Software Encryption. :303-315.
Feamster N, Gao L, Rexford J.  2007.  How to lease the internet in your spare time. SIGCOMM Comput. Commun. Rev.. 37(1):61-64.
Nirkhe M, Kraus S, Miller M, Perlis D.  1997.  How to (plan to) meet a deadline between now and then. Journal of Logic and Computation. 7(1):109-109.
desJardins M.  1995.  How to succeed in graduate school: A guide for students and advisors. International Amateur-Professional Photoelectric Photometry Communications. 58:15-15.
desJardins M.  1995.  How to succeed in graduate school: a guide for students and advisors: part II of II. Crossroads. 1(3):1-6.
desJardins M.  2008.  How to succeed in graduate school: a guide for students and advisors. Crossroads. 14(4):5-9.
desJardins M.  1994.  How to succeed in graduate school: a guide for students and advisors: part I of II. Crossroads. 1(2):3-9.
Ramanathan N, Chellappa R.  2009.  How would you look as you age ? Image Processing (ICIP), 2009 16th IEEE International Conference on. :53-56.
Farber A, Druin A, Chipman G, Julian D, Somashekhar S.  2002.  How young can our design partners be. Proceedings of the Participatory Design Conference. :272-277.
Zotkin DN, Hwang J, Duraiswami R, Davis LS.  2003.  HRTF personalization using anthropometric measurements. Applications of Signal Processing to Audio and Acoustics, 2003 IEEE Workshop on.. :157-160.
Sirin E, Parsia B, Wu D, Hendler J, Nau DS.  2004.  HTN planning for Web Service composition using SHOP2. Web Semantics: Science, Services and Agents on the World Wide Web. 1(4):377-396.
Dix J, Kuter U, Nau DS.  2002.  HTN Planning in Answer Set Programming. UMIACS-TR-2002-18
Parameswaran V, Chellappa R.  2005.  Human action-recognition using mutual invariants. Computer Vision and Image Understanding. 98(2):294-324.
Guerra-Filho G, Aloimonos Y.  2006.  Human activity language: Grounding concepts with a linguistic framework. Semantic Multimedia. :86-100.
Morariu VI, Prasad VSN, Davis LS.  2007.  Human activity understanding using visibility context. IEEE/RSJ IROS Workshop: From sensors to human spatial concepts (FS2HSC).
Ghanem NM, Davis LS.  2007.  Human Appearance Change Detection. Image Analysis and Processing, 2007. ICIAP 2007. 14th International Conference on. :536-541.
Yu Y, Harwood D, Yoon K, Davis LS.  2007.  Human appearance modeling for matching across video sequences. Machine Vision and Applications. 18(3):139-149.
Shneiderman B.  1981.  Human Aspects of Computing Editor Control Flow and Data Structure Documentation: Two Experiments. Human factors in software development. :365-365.
Mittal A, Zhao L, Davis LS.  2003.  Human body pose estimation using silhouette shape analysis. Proceedings. IEEE Conference on Advanced Video and Signal Based Surveillance, 2003.. :263-270.
Abd-Almageed W, Davis LS.  2008.  Human detection using iterative feature selection and logistic principal component analysis. Robotics and Automation, 2008. ICRA 2008. IEEE International Conference on. :1691-1697.
Schwartz W R, Kembhavi A, Harwood D, Davis LS.  2009.  Human detection using partial least squares analysis. Computer Vision, 2009 IEEE 12th International Conference on. :24-31.

Pages