Publications

Export 7151 results:
Author Title [ Type(Asc)] Year
Journal Articles
Katz J, Koo CY.  2005.  On constructing universal one-way hash functions from arbitrary one-way functions. Journal of Cryptology.
Lim SN, Davis LS, Mittal A.  2006.  Constructing task visibility intervals for video surveillance. Multimedia systems. 12(3):211-226.
Dorr BJ, Voss CR.  1993.  Constraints on the Space of MT Divergences. AAAI (1993). 43:53-53.
Winternitz LB, Nicholls SO, Tits Aé, O'Leary DP.  2011.  A Constraint-Reduced Variant of Mehrotra's Predictor-Corrector Algorithm. Computational Optimization and Applications.
Pugh W, Wonnacott D.  1998.  Constraint-based array dependence analysis. ACM Transactions on Programming Languages and SystemsACM Trans. Program. Lang. Syst.. 20(3):635-678.
Gupta A, Mittal A, Davis LS.  2008.  Constraint Integration for Efficient Multiview Pose Estimation with Self-Occlusions. Pattern Analysis and Machine Intelligence, IEEE Transactions on. 30(3):493-506.
Albanese M, Chellappa R, Moscato V, Picariello A, V.S. Subrahmanian, Turaga P, Udrea O.  2008.  A Constrained Probabilistic Petri Net Framework for Human Activity Detection in Video. Multimedia, IEEE Transactions on. 10(6):982-996.
Barlow JB, Monahemi MM, O'Leary DP.  1992.  Constrained Matrix Sylvester Equations. SIAM Journal on Matrix Analysis and Applications. 13(1):1-9.
Katz J, Malka L.  2011.  Constant-Round Private Function Evaluation with Linear Complexity. Advances in Cryptology–ASIACRYPT 2011. :556-571.
Basri R, Jacobs DW.  1997.  Constancy and similarity. Computer Vision and Image Understanding. 65(3):447-449.
Perlis D.  1986.  On the consistency of commonsense reasoning. Computational Intelligence. 2(1):180-190.
Perlis D.  1997.  Consciousness as self-function. Journal of Consciousness Studies, 4. 5(6):509-525.
Perlis D.  1995.  Consciousness and complexity: the cognitive quest. Annals of Mathematics and Artificial Intelligence. 14(2):309-321.
Doszkocs TE, Reggia JA, others.  1990.  Connectionist models and information retrieval. Annual review of information science and technology. 25:209-262.
Whitfield KC, Goodall SM, Reggia JA.  1989.  A connectionist model for dynamic control. Telematics and Informatics. 6(3-4):375-390.
Peng Y, Reggia JA.  1989.  A connectionist model for diagnostic problem solving. Systems, Man and Cybernetics, IEEE Transactions on. 19(2):285-298.
Peng Y, Reggia JA, Li T.  1992.  A connectionist approach to vertex covering problems. Int’l J. Neural Systems. 3(1):43-56.
Reggia JA, Peng Y, Tuhrim S.  1993.  A connectionist approach to diagnostic problem solving using causal networks. Information sciences. 70(1-2):27-48.
Xie B, Druin A, Fails J, Massey S, Golub E, Franckel S, Schneider K.  2010.  Connecting generations: developing co-design methods for older adults and children. Behaviour & Information Technology. 99999(1):1-11.
O'Leary DP.  1979.  Conjugate Gradient Algorithms in the Solution of Optimization Problems for Nonlinear Elliptic Partial Differential Equations. Computing. 22:59-77.
Stantchev G, Juba D, Dorland W, Varshney A.  2008.  Confluent Volumetric Visualization of Gyrokinetic Turbulence. Plasma Science, IEEE Transactions on. 36(4):1112-1113.
desJardins M, MacGlashan J, Wagstaff KL.  2010.  Confidence-based feature acquisition to minimize training and test costs. Proceedings of the SIAM Conference on Data Mining. 76(373):514-524.
O'Leary DP, Rust BW.  1986.  Confidence Intervals for Inequality-Constrained Least Squares Problems, with Applications to Ill-Posed Problems. SIAM Journal on Scientific and Statistical Computing. 7:473-489.
Rust BW, O'Leary DP.  1994.  Confidence Intervals for Discrete Approximations to Ill-Posed Problems. The Journal of Computational and Graphical Statistics. 3:67-96.
Consolvo S, Harrison B, Smith I, Chen MY, Everitt K, Froehlich J, Landay JA.  2007.  Conducting In Situ Evaluations for and With Ubiquitous Computing Technologies. International Journal of Human-Computer Interaction. 22(1-2):103-118.

Pages