Publications

Export 7151 results:
Author Title Type [ Year(Desc)]
2007
He S, M. Wu.  2007.  Collusion-Resistant Dynamic Fingerprinting for Multimedia. Acoustics, Speech and Signal Processing, 2007. ICASSP 2007. IEEE International Conference on. 2:II-289-II-292-II-289-II-292.
Varna AL, He S, Swaminathan A, M. Wu, Lu H, Lu Z.  2007.  Collusion-Resistant Fingerprinting for Compressed Multimedia Signals. Acoustics, Speech and Signal Processing, 2007. ICASSP 2007. IEEE International Conference on. 2:II-165-II-168-II-165-II-168.
He S, M. Wu.  2007.  Collusion-Resistant Video Fingerprinting for Large User Group. Information Forensics and Security, IEEE Transactions on. 2(4):697-709.
Bilgic M, Namata GM, Getoor L.  2007.  Combining Collective Classification and Link Prediction. Data Mining Workshops, 2007. ICDM Workshops 2007. Seventh IEEE International Conference on. :381-386.
Bitsakos K, Yi L, Fermüller C.  2007.  Combining motion from texture and lines for visual navigation. IEEE/RSJ International Conference on Intelligent Robots and Systems, 2007. IROS 2007. :232-239.
Rosti AVI, Ayan NF, Xiang B, Matsoukas S, Schwartz R, Dorr BJ.  2007.  Combining outputs from multiple machine translation systems. Human Language Technologies 2007: The Conference of the North American Chapter of the Association for Computational Linguistics; Proceedings of the Main Conference. :228-235.
Corcoran BJ, Swamy N, Hicks MW.  2007.  Combining provenance and security policies in a web-based document management system. On-line Proceedings of the Workshop on Principles of Provenance (PrOPr).
Udrea O, Getoor L.  2007.  Combining statistical and logical inference for ontology alignment. Workshop on Semantic Web for Collaborative Knowledge Acquisition at the International Joint Conference on Artificial Intelligence.
Getoor L.  2007.  Combining Tuple and Attribute Uncertainty in Probabilistic Databases. The first international VLDB workshop on Management of Uncertain Data. :1-1.
Jaeger PT, Shneiderman B, Fleischmann KR, Preece J, Qu Y, Fei Wu P.  2007.  Community response grids: E-government, social networks, and effective emergency management. Telecommunications Policy. 31(10–11):592-604.
Wu PF, Preece J, Shneiderman B, Jaeger PT, Qu Y.  2007.  Community response grids for older adults: Motivations, usability, and sociability. Proceedings of the 13th Americas Conference on Information Systems.
Jaeger PT, Fleischmann KR, Preece J, Shneiderman B, Fei Wu P, Qu Y.  2007.  Community Response Grids: Using Information Technology to Help Communities Respond to Bioterror Emergencies. Biosecurity and Bioterrorism: Biodefense Strategy, Practice, and Science. 5(4):335-346.
Shen CC, Kupershtok R, Yang B, Vanin FM, Shao X, Sheth D, Goldsman N, Balzano Q, Bhattacharyya SS.  2007.  Compact, low power wireless sensor network system for line crossing recognition. Circuits and Systems, 2007. ISCAS 2007. IEEE International Symposium on. :2506-2509.
Cukier M, Panjwani S.  2007.  A Comparison between Internal and External Malicious Traffic. :109-114.
Swaminathan A, M. Wu, Liu KJR.  2007.  A Component Estimation Framework for Information Forensics. Multimedia Signal Processing, 2007. MMSP 2007. IEEE 9th Workshop on. :397-400.
Kim J, JaJa JF.  2007.  Component-based Data Layout for Efficient Slicing of Very Large Multidimensional Volumetric Data. Scientific and Statistical Database Management, 2007. SSBDM '07. 19th International Conference on. :8-8.
Leparc GG, Mitra RD, Vardhanabhuti S, Wang J, Hannenhalli S, Smit S, Widmann J, Knight R, Wu S, Zhang Y et al..  2007.  COMPUTATIONAL BIOLOGY. Nucleic acids research. 35(9-12):3163-3163.
Pertea M, Mount SM, Salzberg SL.  2007.  A computational survey of candidate exonic splicing enhancer motifs in the model plant Arabidopsis thaliana. BMC Bioinformatics. 8(1):159-159.
Khuller S, Martinez M, Nau DS, Sliva A, Simari G, Subrahmanian V.  2007.  Computing most probable worlds of action probabilistic logic programs: scalable estimation for 10^30,000 worlds. Annals of Mathematics and Artificial Intelligence. 51(2):295-331.
Fernández1 J A, Minker J, Yahya A.  2007.  COMPUTING PERFECT AND STABLE MODELS USING ORDERED MODEL TREES. Computational Intelligence. 11(1):89-112.
Sidhu T, Klavans J, Jimmy Lin.  2007.  Concept disambiguation for improved subject access using multiple knowledge sources. Proceedings of the Workshop on Language Technology for Cultural Heritage Data (LaTeCH 2007). :25-25.
Hazay C, Katz J, Koo CY, Lindell Y.  2007.  Concurrently-secure blind signatures without random oracles or setup assumptions. Theory of Cryptography. :323-341.
Kuter U, Nau DS, Reisner E, Goldman R.  2007.  Conditionalization: Adapting forward-chaining planners to partially observable environments.
Consolvo S, Harrison B, Smith I, Chen MY, Everitt K, Froehlich J, Landay JA.  2007.  Conducting In Situ Evaluations for and With Ubiquitous Computing Technologies. International Journal of Human-Computer Interaction. 22(1-2):103-118.
Swaminathan A, Mao Y, Su G-M, Gou H, Varna AL, He S, M. Wu, Oard D.  2007.  Confidentiality-preserving rank-ordered search. Proceedings of the 2007 ACM workshop on Storage security and survivability. :7-12.

Pages