Publications

Export 7148 results:
[ Author(Desc)] Title Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
C
Chang Y, Raschid L, Dorr BJ.  1994.  Transforming queries from a relational schema to an object schema: A prototype based on F-logic. Methodologies for Intelligent SystemsMethodologies for Intelligent Systems. 869:154-163.
Chang C, Kurc T, Sussman A, Catalyurek U, Saltz J.  2001.  A hypergraph-based workload partitioning strategy for parallel data aggregation. Proceedings of the Eleventh SIAM Conference on Parallel Processing for Scientific Computing.
Chang S, Van Horn D, Felleisen M.  2010.  Evaluating Call-By-Need on the Control Stack. arXiv:1009.3174 [cs].
Chari S, Rohatgi P, Srinivasan A.  1995.  Randomness-Optimal Unique Element Isolation with Applications to Perfect Matching and Related Problems. SIAM Journal on Computing. 24(5):1036-1036.
Chari S, Rohatgi P, Srinivasan A.  2000.  Improved Algorithms via Approximations of Probability Distributions. Journal of Computer and System Sciences. 61(1):81-107.
Charikar M, Khuller S, Mount D, Narasimhan G.  2001.  Algorithms for facility location problems with outliers. Proceedings of the twelfth annual ACM-SIAM symposium on Discrete algorithms. :642-651.
Charikar M, Khuller S.  2006.  A robust maximum completion time measure for scheduling. Proceedings of the seventeenth annual ACM-SIAM symposium on Discrete algorithm. :324-333.
Charles C, Des Jarlais Don PT, Gerry S.  2007.  HIV risk behaviors among female IDUs in developing and transitional countries. BMC Public Health. 7
Chatterjee S, Bhattacharyya SS.  2010.  Selective excitation of LI2 by chirped laser pulses with all possible interstate radiative couplings. The Journal of Chemical Physics. 133(16):164313-164313-9.
Chaudhuri A, Foster JS.  2010.  Symbolic security analysis of ruby-on-rails web applications. Proceedings of the 17th ACM conference on Computer and communications security. :585-594.
Chazelle B, Kingsford C, Singh M.  2004.  A semidefinite programming approach to side chain positioning with new rounding strategies. INFORMS Journal on Computing. 16(4):380-392.
Chekuri C, Hajiaghayi MT, Kortsarz G, Salavatipour MR.  2010.  Approximation Algorithms for Non-Uniform Buy-at-Bulk Network Design. SIAM Journal on Computing. 39(5):1772-1798.
Chekuri C, Gal A, Im S, Khuller S, Li J, McCutchen R, Moseley B, Raschid L.  2011.  New models and algorithms for throughput maximization in broadcast scheduling. Approximation and Online Algorithms. :71-82.
Chellappa R, Cuntoor NP, Joo SW, V.S. Subrahmanian, Turaga P.  2008.  Computational Vision Approaches for Event Modeling. Understanding Events. 1(9):473-522.
Chellappa R, Veeraraghavan A.  2010.  Comment-Gait-Based Human Recognition by Classification of Cyclostationary Processes on Nonlinear Shape Manifolds. Journal of the American Statistical Association. 102(480):1126-1126.
Chellappa R, Kruger V, Zhou S.  2002.  Probabilistic recognition of human faces from video. Image Processing. 2002. Proceedings. 2002 International Conference on. 1:I-41-I-44vol.1-I-41-I-44vol.1.
Chellappa R, Roy-Chowdhury AK, Kale A.  2007.  Human Identification using Gait and Face. Computer Vision and Pattern Recognition, 2007. CVPR '07. IEEE Conference on. :1-2.
Chellappa R, Du M, Turaga P, Zhou S K.  2011.  Face Tracking and Recognition in Video. Handbook of Face RecognitionHandbook of Face Recognition. :323-351.
Chellappa R.  2010.  Sparsity-Inspired Recognition of Targets in Infrared Images.
Chellappa R, Bicego M, Turaga P.  2009.  Video-Based Face Recognition Algorithms. Handbook of Remote Biometrics. :193-216.
Chellappa R, Zhao W.  2006.  Face Processing: Advanced Modeling and Methods.
Chellappa R, Sankaranarayanan AC, Veeraraghavan A.  2008.  Mixed state models for automatic target recognition and behavior analysis in video sequences. Proceedings of SPIE. 6967(1):69670Q-69670Q-11-69670Q-69670Q-11.
Chellappa R, Sankaranarayanan AC, Veeraraghavan A.  2010.  Statistical Methods and Models for Video-Based Tracking, Modeling, and Recognition.
Chellappa R, Vaswani N, Chowdhury AKR.  2003.  Activity modeling and recognition using shape theory. Behavior Representation in Modeling and Simulation.
Chellappa R, Ni J, Patel VM.  2011.  Remote identification of faces: Problems, prospects, and progress. Pattern Recognition Letters.

Pages