Publications

Export 7148 results:
[ Author(Asc)] Title Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
L
Li Y, Bitsakos K, Fermüller C, Aloimonos Y.  2009.  Real-time shape retrieval for robotics using skip Tri-Grams. IEEE/RSJ International Conference on Intelligent Robots and Systems, 2009. IROS 2009. :4731-4738.
Li Y, Long PM, Srinivasan A.  2001.  Improved Bounds on the Sample Complexity of Learning. Journal of Computer and System Sciences. 62(3):516-527.
Li Y, Fermüller C, Aloimonos Y, Ji H.  2010.  Learning shift-invariant sparse representation of actions. 2010 IEEE Conference on Computer Vision and Pattern Recognition (CVPR). :2630-2637.
Li H, Doermann D.  2000.  AVideo Text Detection System Based on Automated Training. ICPR. 2:223-226.
Li J, Deshpande A, Khuller S.  2010.  On Computing Compression Trees for Data Collection in Wireless Sensor Networks. 2010 Proceedings IEEE INFOCOM. :1-9.
Li Z, Duraiswami R.  2006.  Headphone-Based Reproduction of 3D Auditory Scenes Captured by Spherical/Hemispherical Microphone Arrays. Acoustics, Speech and Signal Processing, 2006. ICASSP 2006 Proceedings. 2006 IEEE International Conference on. 5:V-V.
Li Z, Duraiswami R, Grassi E, Davis LS.  2004.  A spherical microphone array system for traffic scene analysis. Intelligent Transportation Systems, 2004. Proceedings. The 7th International IEEE Conference on. :338-342.
Li ST, Ge QJ, Varshney A.  2001.  Web-based interactive design of freeform motions. Proceedings of the ASME 2001 Design Engineering Technical Conferences and Computers and Information in Engineering Conference.
Lewinski MK, Bisgrove D, Shinn P, Chen H, Hoffmann C, Hannenhalli S, Verdin E, Berry CC, Ecker JR, Bushman FD.  2005.  Genome-Wide Analysis of Chromosomal Features Repressing Human Immunodeficiency Virus Transcription. Journal of VirologyJ. Virol.. 79(11):6610-6619.
Lewinski MK, Yamashita M, Emerman M, Ciuffi A, Marshall H, Crawford G, Collins F, Shinn P, Leipzig J, Hannenhalli S et al..  2006.  Retroviral DNA Integration: Viral and Cellular Determinants of Target-Site Selection. PLoS PathogPLoS Pathog. 2(6):e60-e60.
Levy S, Hannenhalli S, Workman C.  2001.  Enrichment of Regulatory Signals in Conserved Non-Coding Genomic Sequence. BioinformaticsBioinformatics. 17(10):871-877.
Levy S, Hannenhalli S.  2002.  Identification of transcription factor binding sites in the human genome sequence. Mammalian Genome. 13(9):510-514.
Levow G-A, Oard D, Resnik P.  2001.  Rapidly retargetable interactive translingual retrieval. Proceedings of the first international conference on Human language technology research. :1-5.
Levow GA, Dorr BJ, Lin D.  2000.  Construction of Chinese-English Semantic Hierarchy for Information Retrieval.
Levow G-A, Oard D, Resnik P.  2005.  Dictionary-based techniques for cross-language information retrieval. Information Processing & Management. 41(3):523-547.
Levow GA, Oard D, Resnik P.  2005.  Dictionary-based cross-language retrieval. Information Processing and Management. 41:523-547.
Levitan S, Reggia JA.  2000.  A computational model of lateralization and asymmetries in cortical maps. Neural computation. 12(9):2037-2062.
Levitan S, Stoica I, Reggia JA.  1999.  A model of lateralization and asymmetries in cortical maps. Neural Networks, 1999. IJCNN'99. International Joint Conference on. 1:121-124.
Levitan S, Reggia JA.  1999.  Interhemispheric effects on map organization following simulated cortical lesions. Artificial intelligence in medicine. 17(1):59-85.
Levin D, Spring N, Bhattacharjee B.  2009.  Systems-compatible incentives. Game Theory for Networks, 2009. GameNets '09. International Conference on. :100-106.
Levin D, Baden R, Lumezanu C, Spring N, Bhattacharjee B.  2008.  Motivating participation in internet routing overlays. Proceedings of the 3rd international workshop on Economics of networked systems. :91-96.
Levin D, Sherwood R, Bhattacharjee B.  2006.  Fair file swarming with FOX. Proc. 5th IPTPS.
Levin D, LaCurts K, Spring N, Bhattacharjee B.  2008.  Bittorrent is an auction: analyzing and improving bittorrent's incentives. Proceedings of the ACM SIGCOMM 2008 conference on Data communication. :243-254.
Levin D, Bender A, Lumezanu C, Spring N, Bhattacharjee B.  2007.  Boycotting and extorting nodes in an internetwork. NetE-con+ IBC.
Levi S-T, Agrawala AK.  1994.  Fault tolerant system design. :440.

Pages