Publications

Export 7151 results:
Author Title Type [ Year(Asc)]
2005
Zheng Y, Li H, Doermann D.  2005.  AParallel-Line Detection Algorithm Based on HMMDecoding. IEEE Transactions on Pattern Analysis and Machine Intelligence. 27(5):777-792.
Li J, Zhou SK, Chellappa R.  2005.  Appearance modeling under geometric context. Computer Vision, 2005. ICCV 2005. Tenth IEEE International Conference on. 2:1252-1259Vol.2-1252-1259Vol.2.
Nau DS, Au T-C, Ilghami O, Kuter U, Wu D, Yaman F, Munoz-Avila H, Murdock JW.  2005.  Applications of SHOP and SHOP2. Intelligent Systems, IEEE. 20(2):34-41.
Raykar VC, Duraiswami R.  2005.  Approximate expressions for the mean and the covariance of the maximum likelihood estimator for acoustic source localization. Acoustics, Speech, and Signal Processing, 2005. Proceedings. (ICASSP '05). IEEE International Conference on. 3:iii/73-iii/76Vol.3-iii/73-iii/76Vol.3.
Zhang Y, Manister E, Kraus S, V.S. Subrahmanian.  2005.  Approximation results for probabilistic survivability. Multi-Agent Security and Survivability, 2005 IEEE 2nd Symposium on. :1-10.
Dumitras T, Srivastava D, Narasimhan P.  2005.  Architecting and Implementing Versatile Dependability. Architecting Dependable Systems III. :212-231.
Kianzad V, Saha S, Schlessman J, Aggarwal G, Bhattacharyya SS, Wolf W, Chellappa R.  2005.  An architectural level design methodology for embedded face detection. Proceedings of the 3rd IEEE/ACM/IFIP international conference on Hardware/software codesign and system synthesis. :136-141.
Varshavsky A, Chen MY, de Lara E, Froehlich J, Haehnel D, Hightower J, LaMarca A, Potter F, Sohn T, Tang K et al..  2005.  Are GSM phones THE solution for localization? Mobile Computing Systems and Applications, 2006. WMCSA'06. Proceedings. 7th IEEE Workshop on. :34-42.
Wu M, Taylor EM, Martin, M.P.  2005.  Assessment of STBLI DNS data and comparison against experiments. AIAA paper.
Bullock SS, O’Leary DP, Brennen GK.  2005.  Asymptotically Optimal Quantum Circuits for d-Level Systems. Physical Review LettersPhys. Rev. Lett.. 94(23):230502-230502.
Keogh E, Hochheiser H, Shneiderman B.  2005.  An Augmented Visual Query Mechanism for Finding Patterns in Time Series Data (2002). Institute for Systems Research Technical Reports.
Tamizi M, Weinstein M, Cukier M.  2005.  Automated checking for Windows host vulnerabilities. :10pp.-148-10pp.-148.
Williams CC, Hollingsworth J.  2005.  Automatic Mining of Source Code Repositories to Improve Bug Finding Techniques. IEEE Transactions on Software Engineering. 31(6):466-480.
Memon AM, Nagarajan A, Xie Q.  2005.  Automating regression testing for evolving GUI software. Journal of Software Maintenance and Evolution: Research and Practice. 17(1):27-64.
Broadwater J, Meth R, Chellappa R.  2005.  Average relative radiance transform for subpixel detection. Geoscience and Remote Sensing Symposium, 2005. IGARSS '05. Proceedings. 2005 IEEE International. 5:3565-3568.
Rajagopalan AN, Chellappa R, Koterba NT.  2005.  Background learning for robust face recognition with PCA in the presence of clutter. Image Processing, IEEE Transactions on. 14(6):832-843.
Kim K, Harwood D, Davis LS.  2005.  Background updating for visual surveillance. Advances in Visual Computing. :337-346.
Qian G, Chellappa R, Zheng Q.  2005.  Bayesian algorithms for simultaneous structure from motion estimation of multiple independently moving objects. Image Processing, IEEE Transactions on. 14(1):94-109.
Han B, Yang C, Duraiswami R, Davis LS.  2005.  Bayesian filtering and integral image for visual tracking. Proceedings of the Worshop on Image Analysis for Multimedia Interactive Services (WIAMIS'05).
desJardins M, Rathod P, Getoor L.  2005.  Bayesian network learning with abstraction hierarchies and context-specific independence. Machine Learning: ECML 2005. :485-496.
Daumé H, Marcu D.  2005.  Bayesian summarization at DUC and a suggestion for extrinsic evaluation. Document understanding conference.
[Anonymous].  2005.  Beyond one still image: Face recognition from multiple still images or a video sequence. Face ProcessingFace Processing. :547-575.
Kanungo T, Resnik P, Mao S, Kim DW, Zheng Q.  2005.  The Bible and multilingual optical character recognition. Communications of the ACM. 48(6):124-130.
Kustanowitz J, Shneiderman B.  2005.  Bi-Level Hierarchical Layouts for Photo Libraries: Algorithms for Design Optimization with Quantum Content. Institute for Systems Research Technical Reports.
Elaine Shi, Perrig A, Van Doorn L.  2005.  BIND: a fine-grained attestation service for secure distributed systems. :154-168.

Pages