Publications

Export 7148 results:
[ Author(Desc)] Title Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
W
Wu M, Taylor EM, Martin, M.P.  2005.  Assessment of STBLI DNS data and comparison against experiments. AIAA paper.
M. Wu, Yu H, Liu B.  2003.  Data hiding in image and video .II. Designs and applications. Image Processing, IEEE Transactions on. 12(6):696-705.
M. Wu, Wolf W, Liu B.  1998.  An algorithm for wipe detection. Image Processing, 1998. ICIP 98. Proceedings. 1998 International Conference on. 1:893-897vol.1-893-897vol.1.
Wu H, Sankaranarayanan AC, Chellappa R.  2010.  Online Empirical Evaluation of Tracking Algorithms. IEEE Transactions on Pattern Analysis and Machine Intelligence. 32(8):1443-1458.
Wu S, Rand W, Raschid L.  2011.  Recommendations in social media for brand monitoring. Proceedings of the fifth ACM conference on Recommender systems. :345-348.
M. Wu, Joyce RA, Vetro A, Wong H-S, Guan L, Kung S-Y.  2005.  Dynamic network resource allocation using multimedia content features and .... 09/795,952(6947378)
M. Wu, Trappe W, Wang ZJ, Liu KJR.  2004.  Collusion-resistant fingerprinting for multimedia. Signal Processing Magazine, IEEE. 21(2):15-27.
Wu Y, Oard D, Soboroff I.  2006.  An exploratory study of the W3C mailing list test collection for retrieval of emails with pro/con arguments. Proceedings of the Third Conference on Email and Anti-Spam, Mountain View, CA, July.
M. Wu, Swaminathan A, Mao Y.  2010.  Data hiding in compiled program binaries for supplementing computer functionality. 11/445,374(7840789)
Wu M.  2010.  Picturing signal processing [From the Editor]. Signal Processing Magazine, IEEE. 27(1):2-3.
M. Wu, Liu B.  1999.  Digital watermarking using shuffling. Image Processing, 1999. ICIP 99. Proceedings. 1999 International Conference on. 1:291-295vol.1-291-295vol.1.
Wu M, Martin, M.P.  2006.  New DNS results of shockwave/turbulent boundary layer interaction. 3rd AIAA Flow Control Conference.
Wu J S-C, Sussman A.  2004.  Flexible Control of Data Transfers between Parallel Programs. Proceedings of the 5th IEEE/ACM International Workshop on Grid Computing. :226-234.
M. Wu, Liu B.  2003.  Multimedia Data Hiding.
Wu W, Niles EG, El-Sayed NM, Berriman M, LoVerde PT.  2006.  Schistosoma mansoni (Platyhelminthes, Trematoda) nuclear receptors: Sixteen new members and a novel subfamily. Gene. 366(2):303-315.
M. Wu, Liu B.  2003.  Data hiding in image and video .I. Fundamental issues and solutions. Image Processing, IEEE Transactions on. 12(6):685-695.
M. Wu, Liu B.  2001.  Watermarking scheme for image authentication. (6285775)
Wu M.  2003.  Joint security robustness enhancement for quantization embedding. Image Processing, 2003. ICIP 2003. Proceedings. 2003 International Conference on. 2:II-483-6vol.3-II-483-6vol.3.
Wu H, Sankaranarayanan AC, Chellappa R.  2007.  In Situ Evaluation of Tracking Algorithms Using Time Reversed Chains. Computer Vision and Pattern Recognition, 2007. CVPR '07. IEEE Conference on. :1-8.
M. Wu, Liu B.  1999.  Attacks on digital watermarks. Signals, Systems, and Computers, 1999. Conference Record of the Thirty-Third Asilomar Conference on. 2:1508-1512vol.2-1508-1512vol.2.
Wu X, M. Wu.  2002.  A recognition algorithm for Chinese characters in diverse fonts. Image Processing. 2002. Proceedings. 2002 International Conference on. 3:981-984vol.3-981-984vol.3.
M. Wu, Fridrich J, Goljan M, Gou H.  2005.  Handling uneven embedding capacity in binary images: a revisit. Proceedings of SPIE. 5681(1):194-205.
Wyche SP, Smyth TN, Chetty M, Aoki PM, Grinter RE.  2010.  Deliberate Interactions: Characterizing Technology Use in Nairobi, Kenya. SIGCHI '10. :2593-2602.
Wyche SP, Chetty M.  2013.  "I Want to Imagine How That Place Looks": Designing Technologies to Support Connectivity Between Africans Living Abroad and Home. SIGCHI '13. :2755-2764.
X
Xia JC, Varshney A.  1996.  Dynamic view-dependent simplification for polygonal models. Visualization '96. Proceedings.. :327-334.

Pages