Publications

Export 7151 results:
Author Title Type [ Year(Desc)]
2000
Zotkin DN, Duraiswami R, Davis LS, Haritaoglu I.  2000.  An audio-video front-end for multimedia applications. 2000 IEEE International Conference on Systems, Man, and Cybernetics. 2:786-791vol.2-786-791vol.2.
Alva U, Gupta SK, Gupta RK.  2000.  Automated design of sheet metal bending tools.
Memon AM, Pollack ME, Soffa M L.  2000.  Automated test oracles for GUIs. SIGSOFT Softw. Eng. Notes. 25(6):30-39.
Rodriguez-Martinez M, Roussopoulos N.  2000.  Automatic deployment of application-specific metadata and code in MOCHA. Advances in Database Technology—EDBT 2000. :69-85.
Li H, Doermann D, Kia O.  2000.  Automatic Text Detection and Tracking in Digital Video. IEEE Transactions on Image Processing - Special Issue on Image and Video Processing for Digital Libraries. 9(1):147-156.
Li H, Doermann D.  2000.  AVideo Text Detection System Based on Automated Training. ICPR. 2:223-226.
Jacobs DW, Malik J, Nevatia R.  2000.  Breakout Session Report: Principles and Methods. Perceptual Organization for Artificial Vision Systems. :17-28.
Dorr BJ, Levow G-A, Lin D.  2000.  Building a Chinese-English Mapping Between Verb Concepts for Multilingual Applications. Envisioning Machine Translation in the Information FutureEnvisioning Machine Translation in the Information Future. 1934:345-363.
Khuller S, Sussmann YJ.  2000.  The capacitated k-center problem. SIAM Journal on Discrete Mathematics. 13:403-403.
Pollock DD, Eisen JA, Doggett NA, Cummings MP.  2000.  A Case for Evolutionary Genomics and the Comprehensive Examination of Sequence Biodiversity. Molecular Biology and EvolutionMol Biol Evol. 17(12):1776-1788.
Khuller S, Rosenfeld A, Wu A.  2000.  Centers of sets of pixels. Discrete Applied Mathematics. 103(1–3):297-306.
Dorr BJ, Levow G-A, Lin D, Thomas S.  2000.  Chinese-English Semantic Resource Construction.
Katz J, Schneier B.  2000.  A chosen ciphertext attack against several e-mail encryption protocols. Ninth USENIX Security Symposium.
Mount D, Netanyahu NS, Silverman R, Wu AY.  2000.  Chromatic nearest neighbor searching: A query sensitive approach. Computational Geometry. 17(3–4):97-119.
Conroy JM, Kolda TG, O'Leary DP, O'Leary TJ.  2000.  Chromosome Identification Using Hidden Markov Models: Comparison with Neural Networks, Singular Value Decomposition, Principal Components Analysis, and Fisher Discriminant Analysis. Laboratory Investigation. 80(11):1629-1641.
Jacobs DW, Weinshall D, Gdalyahu Y.  2000.  Class representation and image retrieval with non-metric distances. IEEE Transactions on Pattern Analysis and Machine Intelligence (TPAMI). 22(583-600):1-1.
Jacobs DW, Weinshall D, Gdalyahu Y.  2000.  Classification with nonmetric distances: image retrieval and class representation. Pattern Analysis and Machine Intelligence, IEEE Transactions on. 22(6):583-600.
Cook D, Hicks G, Faber V, Marathe MV, Srinivasan A, Sussmann YJ, Thornquist H.  2000.  Combinatorial Problems Arising in Deregulated Electrical Power Industry: Survey and Future Directions. NONCONVEX OPTIMIZATION AND ITS APPLICATIONS. 42:138-162.
Cormode G, Paterson M, Sahinalp S C, Vishkin U.  2000.  Communication complexity of document exchange. Proceedings of the eleventh annual ACM-SIAM symposium on Discrete algorithms. :197-206.
Chai J, Jimmy Lin, Zadrozny W, Ye Y, Budzikowska M, Horvath V, Kambhatla N, Wolf C.  2000.  Comparative Evaluation of a Natural Language Dialog Based System and a Menu-Driven System for Information Access: A Case Study. In Proceedings of the International Conference on Multimedia Information Retrieval (RIAO 2000).
Christian K, Kules B, Shneiderman B, Youssef A.  2000.  A comparison of voice controlled and mouse controlled web browsing. Proceedings of the fourth international ACM conference on Assistive technologies. :72-79.
Katz J, Yung M.  2000.  Complete characterization of security notions for probabilistic private-key encryption. Proceedings of the thirty-second annual ACM symposium on Theory of computing. :245-254.
L\üttgen G, Von Der Beeck M, Cleaveland R.  2000.  A compositional approach to statecharts semantics. 25
Levitan S, Reggia JA.  2000.  A computational model of lateralization and asymmetries in cortical maps. Neural computation. 12(9):2037-2062.
Levow GA, Dorr BJ, Lin D.  2000.  Construction of Chinese-English Semantic Hierarchy for Information Retrieval.

Pages