Publications

Export 7151 results:
Author Title Type [ Year(Desc)]
2004
Daumé H, Marcu D.  2004.  Np bracketing by maximum entropy tagging and SVM reranking. Proceedings of EMNLP. 4
Cesarano C, Dorr BJ, Picariello A, Reforgiato D, Sagoff A, V.S. Subrahmanian.  2004.  Oasys: An opinion analysis system. AAAI Spring symposium on Computational Approaches to Analyzing Weblogs.
Han B, Davis LS.  2004.  Object tracking by adaptive feature extraction. Image Processing, 2004. ICIP '04. 2004 International Conference on. 3:1501-1504Vol.3-1501-1504Vol.3.
Samet H.  2004.  Object-based and image-based object representations. ACM Comput. Surv.. 36(2):159-217.
Gil AI, Louis VR, Rivera ING, Lipp E, Huq A, Lanata CF, Taylor DN, Russek‐Cohen E, Choopun N, Sack BR et al..  2004.  Occurrence and distribution of Vibrio cholerae in the coastal environment of Peru. Environmental Microbiology. 6(7):699-706.
Jeong IR, Katz J, Lee DH.  2004.  One-round protocols for two-party authenticated key exchange. Applied Cryptography and Network Security. :220-232.
Yang C, Duraiswami R, Elgammal A, Davis LS.  2004.  On-Line Kernel-Based Tracking in Joint Feature-Spatial Spaces. IEEE, 0-7695-2158-2164.
Boyd-Graber J.  2004.  Only in Europe?: The Economic and Military Foundations of European World Empires Typescript. Princeton University.
Vishkin U.  2004.  OPTICAL INTERCONNECT STRUCTURE IN A COMPUTER SYSTEM. (WO/2004/083904)
Leone N, Scarcello F, V.S. Subrahmanian.  2004.  Optimal models of disjunctive logic programs: semantics, complexity, and computation. Knowledge and Data Engineering, IEEE Transactions on. 16(4):487-503.
Islam MS, Tasmin R, s l a m Khan SI, Bakht HBM, a y a t Mahmood ZH, i a u r Rahman MZ, m i n Bhuiyan NA, Nishibuchi M, a l a k r i s h Nair GB, r a d l e y Sack RB et al..  2004.  Pandemic strains of O3:K6 Vibrio parahaemolyticus in the aquatic environment of Bangladesh. Canadian Journal of Microbiology. 50(10):827-834.
Smorul M, JaJa JF, Wang Y, McCall F.  2004.  PAWN: Producer-Archive Workflow Network in support of digital preservation. UMIACS-TR-2004:2006-2006.
He S, Wu M.  2004.  Performance study of ECC-based collusion-resistant multimedia fingerprinting. Proceedings of the 38th CISS. :827-832.
Daumé H, Marcu D.  2004.  A phrase-based hmm approach to document/abstract alignment. Proceedings of EMNLP. :119-126.
Yaman F, Adali S, Nau DS, Sapino M, Subrahmanian V.  2004.  Plan Databases: Model and Algebra. Foundations of Information and Knowledge Systems. 2942:302-319.
Khella A, Bederson BB.  2004.  Pocket PhotoMesa: a Zoomable image browser for PDAs. Proceedings of the 3rd international conference on Mobile and ubiquitous multimedia. :19-24.
Espeland EM, Lipp EK, Huq A, Colwell RR.  2004.  Polylysogeny and prophage induction by secondary infection in Vibrio cholerae. Environmental Microbiology. 6(7):760-763.
Pickart CM, Fushman D.  2004.  Polyubiquitin chains: polymeric protein signals. Current Opinion in Chemical Biology. 8(6):610-616.
Yue Z, Chellappa R.  2004.  Pose-normailzed view synthesis of a symmetric object using a single image. Proceedings of the 6th Asian Conference on Computer Vision (ACCV'04). :915-920.
Feamster N.  2004.  Practical verification techniques for wide-area routing. SIGCOMM Comput. Commun. Rev.. 34(1):87-92.
Vishkin U.  2004.  PRAM-On-Chip: A Quest for Not-So-Obvious Non-obviousness. Mathematical Foundations of Computer Science 2004Mathematical Foundations of Computer Science 2004. 3153:104-105.
Hourcade JP, Bederson BB, Druin A.  2004.  Preschool children's use of mouse buttons. CHI'04 extended abstracts on Human factors in computing systems. :1411-1412.
Yilmaz C, Memon AM, Porter A, Krishna AS, Schmidt DC, Gokhale A, Natarajan B.  2004.  Preserving distributed systems critical properties: a model-driven approach. Software, IEEE. 21(6):32-40.
Fayzullin M, V.S. Subrahmanian, Albanese M, Picariello A.  2004.  The priority curve algorithm for video summarization. Proceedings of the 2nd ACM international workshop on Multimedia databases. :28-35.
Mishra A, Shin M H, Petroni NL, Clancy TC, Arbaugh WA.  2004.  Proactive key distribution using neighbor graphs. IEEE Wireless Communications. 11(1):26-36.

Pages