Publications

Export 7148 results:
[ Author(Desc)] Title Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
G
Goodall S, Reggia JA, Chen Y, Ruppin E, Whitney C.  1997.  A computational model of acute focal cortical lesions. Stroke. 28(1):101-101.
Goodrich MT, Nguyen D, Ohrimenko O, Papamanthou C, Tamassia R, Triandopoulos N, Lopes CVideira.  2012.  Verifying Search Results Over Web Collections. arXiv:1204.5446 [cs].
Goodrich MT, Matias Y, Vishkin U.  1993.  Approximate parallel prefix computation and its applications. Parallel Processing Symposium, 1993., Proceedings of Seventh International. :318-325.
Goodrich MT, Papamanthou C, Nguyen D, Tamassia R, Lopes CVideira, Ohrimenko O, Triandopoulos N.  2012.  Efficient Verification of Web-content Searching Through Authenticated Web Crawlers. Proc. VLDB Endow.. 5(10):920-931.
Goodrich MT, Tamassia R, Mount D.  2004.  Data Structures and Algorithms in C++.
Goodrich MT, Matias Y, Vishkin U.  1994.  Optimal parallel approximation for prefix sums and integer sorting. Proceedings of the fifth annual ACM-SIAM symposium on Discrete algorithms. :241-250.
Goodrich MT, Papamanthou C, Tamassia R.  2007.  On the Cost of Persistence and Authentication in Skip Lists. Experimental Algorithms. :94-107.
Goodrich MT, Tamassia R, Mount D.  2003.  Data Structures and Algorithms in C++. :714.
Gopalakrishnan V, Morselli R, Bhattacharjee B, Keleher P, Srinivasan A.  2006.  Ranking search results in P2P systems. Technical Report, CR-TR-4779, Department of Computer Science, University of Maryland.
Gopalakrishnan V, Morselli R, Bhattacharjee B, Keleher P, Srinivasan A.  2007.  Distributed ranked search. High Performance Computing–HiPC 2007. :7-20.
Gopalakrishnan V, Morselli R, Bhattacharjee B, Keleher P, Srinivasan A.  2006.  Ranking search results in peer-to-peer systems. Technical Reports from UMIACS.
Gopalakrishnan V, Bhattacharjee B, Chawathe S, Keleher P.  2004.  Efficient peer-to-peer namespace searches. University of Maryland, College Park, MD, Tech. Rep. CSTR-4568.
Gopalakrishnan V, Silaghi B, Bhattacharjee B, Keleher P.  2004.  Adaptive replication in peer-to-peer systems. Distributed Computing Systems, 2004. Proceedings. 24th International Conference on. :360-369.
Gopalakrishnan V, Morselli R, Bhattacharjee B, Keleher P, Srinivasan A.  2007.  Distributed Ranked Search. High Performance Computing – HiPC 2007High Performance Computing – HiPC 2007. 4873:7-20.
Gopalakrishnan V, Bhattacharjee B, Keleher P.  2006.  Distributing Google. Data Engineering Workshops, 2006. Proceedings. 22nd International Conference on. :33-33.
Gopalakrishnan V, Bhattacharjee B, Ramakrishnan KK, Jana R, Srivastava D.  2009.  CPM: Adaptive Video-on-Demand with Cooperative Peer Assists and Multicast. INFOCOM 2009, IEEE. :91-99.
Gopalan R, Taheri S, Turaga P, Chellappa R.  2012.  A Blur-robust Descriptor with Applications to Face Recognition. IEEE Transactions on Pattern Analysis and Machine Intelligence. PP(99):1-1.
Gopalan R, Li R, Chellappa R.  2011.  Domain adaptation for object recognition: An unsupervised approach. 2011 IEEE International Conference on Computer Vision (ICCV). :999-1006.
Gopalan R, Turaga P, Chellappa R.  2010.  Articulation-Invariant Representation of Non-planar Shapes. Computer Vision – ECCV 2010Computer Vision – ECCV 2010. 6313:286-299.
Gopalan R, Hong T, Shneier M, Chellappa R.  2009.  Video-based Lane Detection using Boosting Principles.
Gopalan R, Hong T, Shneier M, Chellappa R.  2010.  A Learning Approach Towards Detection and Tracking of Lane Markings. IEEE Transactions on Intelligent Transportation Systems. PP(99):1-12.
Gopalan R, Jacobs DW.  2010.  Comparing and combining lighting insensitive approaches for face recognition. Computer Vision and Image Understanding. 114(1):135-145.
Gopalan R, Schwartz WR, Chellappa R, Srivastava A.  2011.  Face Detection. Visual Analysis of HumansVisual Analysis of Humans. :71-90.
Gordon D, Perlis D.  1989.  Explicitly biased generalization. Computational Intelligence. 5(2):67-81.
Gordon DS, Hazay C, Katz J, Lindell Y.  2011.  Complete Fairness in Secure Two-Party Computation. Journal of the ACM. 58(6):24:1–24:37-24:1–24:37.

Pages