Publications

Export 7151 results:
Author Title [ Type(Asc)] Year
Conference Papers
Charikar M, Khuller S.  2006.  A robust maximum completion time measure for scheduling. Proceedings of the seventeenth annual ACM-SIAM symposium on Discrete algorithm. :324-333.
Le Moigne J, Netanyahu NS, Masek JG, Mount D, Goward SN.  2001.  Robust matching of wavelet features for sub-pixel registration of Landsat data. Geoscience and Remote Sensing Symposium, 2001. IGARSS '01. IEEE 2001 International. 2:706-708vol.2-706-708vol.2.
Agrawala AK, Chellappa R.  2004.  Robust ego-motion estimation and 3D model refinement using depth based parallax model. Image Processing, 2004. ICIP '04. 2004 International Conference on. 4:2483-2486Vol.4-2483-2486Vol.4.
Ogale AS, Aloimonos Y.  2005.  Robust Contrast Invariant Stereo Correspondence. Proceedings of the 2005 IEEE International Conference on Robotics and Automation, 2005. ICRA 2005. :819-824.
Qian G, Chellappa R, Zheng Q.  2004.  Robust Bayesian cameras motion estimation using random sampling. Image Processing, 2004. ICIP '04. 2004 International Conference on. 2:1361-1364Vol.2-1361-1364Vol.2.
Li Z, Duraiswami R.  2005.  A robust and self-reconfigurable design of spherical microphone array for multi-resolution beamforming. Acoustics, Speech, and Signal Processing, 2005. Proceedings. (ICASSP '05). IEEE International Conference on. 4:iv/1137-iv/1140Vol.4-iv/1137-iv/1140Vol.4.
Zhou S, Chellappa R.  2002.  A robust algorithm for probabilistic human recognition from video. Pattern Recognition, 2002. Proceedings. 16th International Conference on. 1:226-229vol.1-226-229vol.1.
DuBois T, Golbeck J, Srinivasan A.  2009.  Rigorous Probabilistic Trust-Inference with Applications to Clustering. IEEE/WIC/ACM International Joint Conferences on Web Intelligence and Intelligent Agent Technologies, 2009. WI-IAT '09. 1:655-658.
Hennacy K, Swamy N, Perlis D.  2003.  RGL study in a hybrid real-time system. Proceedings of the IASTED NCI.
Katz B, Jimmy Lin.  2000.  REXTOR: a system for generating relations from natural language. Proceedings of the ACL-2000 workshop on Recent advances in natural language processing and information retrieval: held in conjunction with the 38th Annual Meeting of the Association for Computational Linguistics - Volume 11. :67-77.
Gerdes JW, Gupta SK, Wilkerson SA.  2010.  A Review of Bird-Inspired Flapping Wing Miniature Air Vehicle Designs. 2:57-67.
Ramachandran A, Feamster N, Dagon D.  2006.  Revealing botnet membership using DNSBL counter-intelligence. Proc. 2nd USENIX Steps to Reducing Unwanted Traffic on the Internet. :49-54.
Doermann D.  1997.  The Retrieval of Document Images: ABrief Survey. ICDAR. :945-949.
Agrawal M, Doermann D.  2008.  Re-Targetable OCR with Intelligent Character Segmentation. DAS '08: Proceedings of the 2008 The Eighth IAPRInternational Workshop on Document Analysis Systems. :183-190.
Caragea GC, Tzannes A, Keceli F, Barua R, Vishkin U.  2010.  Resource-Aware Compiler Prefetching for Many-Cores. Parallel and Distributed Computing (ISPDC), 2010 Ninth International Symposium on. :133-140.
Zelkowitz MV.  1979.  Resource estimation for medium-scale software projects. Twelfth Conference on the Interface of Statistics and Computer Science, by IEEE Computer Society. :267-272.
Kim J-S, Nam B, Keleher P, Marsh M, Bhattacharjee B, Sussman A.  2006.  Resource Discovery Techniques in Distributed Desktop Grid Environments. Proceedings of the 7th IEEE/ACM International Conference on Grid Computing. :9-16.
Nayak A K, Reimers A, Feamster N, Clark R.  2009.  Resonance: dynamic access control for enterprise networks. Proceedings of the 1st ACM workshop on Research on enterprise networking. :11-18.
Elsayed T, Oard D, Namata G.  2008.  Resolving personal names in email using context expansion. Association for Computational Linguistics (ACL).
Might M, Smaragdakis Y, Van Horn D.  2010.  Resolving and Exploiting the k-CFA Paradox: Illuminating Functional vs. Object-oriented Program Analysis. PLDI '10 Proceedings of the 2010 ACM SIGPLAN Conference on Programming Language Design and Implementation. :305-315.
Wang ZJ, M. Wu, Zhao H, Liu KJR, Trappe W.  2003.  Resistance of orthogonal Gaussian fingerprints to collusion attacks. Multimedia and Expo, 2003. ICME '03. Proceedings. 2003 International Conference on. 1:I-617-20vol.1-I-617-20vol.1.
Roark B, Liu Y, Harper M, Stewart R, Lease M, Snover M, Shafran I, Dorr BJ, Hale J, Krasnyanskaya A et al..  2006.  Reranking for Sentence Boundary Detection in Conversational Speech. 2006 IEEE International Conference on Acoustics, Speech and Signal Processing, 2006. ICASSP 2006 Proceedings. 1:I-I-I-I.
Sen P, Deshpande A, Getoor L.  2007.  Representing Tuple and Attribute Uncertainty in Probabilistic Databases. Seventh IEEE International Conference on Data Mining Workshops, 2007. ICDM Workshops 2007. :507-512.
Sen P, Deshpande A.  2007.  Representing and Querying Correlated Tuples in Probabilistic Databases. Data Engineering, 2007. ICDE 2007. IEEE 23rd International Conference on. :596-605.
Fermüller C, Aloimonos Y.  1995.  Representations for active vision. Proceedings of the 14th international joint conference on Artificial intelligence - Volume 1. :20-26.

Pages