Publications

Export 7151 results:
Author Title [ Type(Asc)] Year
Conference Papers
Srinivasan BV, Zotkin DN, Duraiswami R.  2011.  A partial least squares framework for speaker recognition. Acoustics, Speech and Signal Processing (ICASSP), 2011 IEEE International Conference on. :5276-5279.
Nirkhe V, Pugh W.  1992.  Partial evaluation of high-level imperative programming languages with applications in hard real-time systems. Proceedings of the 19th ACM SIGPLAN-SIGACT symposium on Principles of programming languages. :269-280.
Sepehri A, Yacoob Y, Davis LS.  2006.  Parametric Hand Tracking for Recognition of Virtual Drawings. Computer Vision Systems, 2006 ICVS '06. IEEE International Conference on. :6-6.
Yacoob Y, Black MJ.  1998.  Parameterized modeling and recognition of activities. Computer Vision, 1998. Sixth International Conference on. :120-127.
Dorr BJ.  1992.  A parameterized approach to integrating aspect with lexical-semantics for machine translation. Proceedings of the 30th annual meeting on Association for Computational Linguistics. :257-264.
Dorr BJ.  1992.  Parameterization of the interlingua in machine translation. Proceedings of the 14th conference on Computational linguistics - Volume 2. :624-630.
Hua KA, Hannenhalli S.  1991.  Parallel transitive closure computations using topological sort. , Proceedings of the First International Conference on Parallel and Distributed Information Systems, 1991. :122-129.
Sekar S, Reggia JA.  1988.  Parallel set covering algorithms. Artificial Intelligence Applications, 1988., Proceedings of the Fourth Conference on. :274-279.
Minker J, Perlis D, Subramanian K.  1986.  A Parallel Self-Modifying Default Reasoning System. AAAI. :923-927.
Hollingsworth J, Miller BP.  1992.  Parallel program performance metrics: a comprison and validation. Proceedings of the 1992 ACM/IEEE conference on Supercomputing. :4-13.
Raschid L, Su SYW.  1986.  A parallel processing strategy for evaluating recursive queries. Proceedings of the 12th International Conference on Very Large Data Bases. :412-419.
Tabatabaee V, Tiwari A, Hollingsworth J.  2005.  Parallel Parameter Tuning for Applications with Performance Variability. Proceedings of the 2005 ACM/IEEE conference on Supercomputing. :57–-57–.
Helman DR, Bader DA, JaJa JF.  1996.  Parallel algorithms for personalized communication and sorting with an experimental study (extended abstract). Proceedings of the eighth annual ACM symposium on Parallel algorithms and architectures. :211-222.
Raman R, Vishkin U.  1995.  Parallel algorithms for database operations and a database operation for parallel algorithms. Parallel Processing Symposium, 1995. Proceedings., 9th International. :173-179.
Etemad K, Doermann D, Chellappa R.  1994.  Page Segmentation Using Decision Integration and Wavelet Packet Basis. ICPR. :345-349.
Abd-Almageed W, Kumar J, Doermann D.  2009.  Page Rule-Line Removal using Linear Subspaces in Monochromatic Handwritten Arabic Documents. Intl. Conf. on Document Analysis and Recognition (ICDAR 09). :768-772.
Liang J, Doermann D, Ma M, Guo JK.  2002.  Page classification through logical labelling. Pattern Recognition, 2002. Proceedings. 16th International Conference on. 3:477-480vol.3-477-480vol.3.
Sherwood R, Bhattacharjee B, Srinivasan A.  2002.  P5 : a protocol for scalable anonymous communication. 2002 IEEE Symposium on Security and Privacy, 2002. Proceedings. :58-70.
Reddy D, Veeraraghavan A, Chellappa R.  2011.  P2C2: Programmable pixel compressive camera for high speed imaging. 2011 IEEE Conference on Computer Vision and Pattern Recognition (CVPR). :329-336.
Suh B, Bederson BB.  2002.  OZONE: A zoomable interface for navigating ontology information. Proceedings of the Working Conference on Advanced Visual Interfaces. :139-143.
Garain U, Paik J, Pal T, Majumder P, Doermann D, Oard D.  2011.  Overview of the FIRE 2011 RISOTTask. FIRE.
Parker A, Nau DS, V.S. Subrahmanian.  2006.  Overconfidence or paranoia? search in imperfect-information games PROCEEDINGS OF THE NATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE. 21:1045-1045.
Brakerski Z, Kalai YT, Katz J, Vaikuntanathan V.  2010.  Overcoming the Hole in the Bucket: Public-Key Cryptography Resilient to Continual Memory Leakage. Foundations of Computer Science (FOCS), 2010 51st Annual IEEE Symposium on. :501-510.
Feamster N.  2010.  Outsourcing home network security. Proceedings of the 2010 ACM SIGCOMM workshop on Home networks. :37-42.
Ghosh S K, Mount D.  1987.  An output sensitive algorithm for computing visibility graphs. Foundations of Computer Science, 1987., 28th Annual Symposium on. :11-19.

Pages