Publications

Export 7148 results:
[ Author(Asc)] Title Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
C
Chellappa R.  2010.  Sparsity Motivated Automated Target Recognition.
Chellappa R, Ni J, Patel VM.  2011.  Remote identification of faces: Problems, prospects, and progress. Pattern Recognition Letters.
Chellappa R, Sankaranarayanan AC, Veeraraghavan A.  2010.  Statistical Methods and Models for Video-Based Tracking, Modeling, and Recognition.
Chellappa R, Turaga P.  2011.  Recent advances in age and height estimation from still images and video. 2011 IEEE International Conference on Automatic Face & Gesture Recognition and Workshops (FG 2011). :91-96.
Chellappa R, Veeraraghavan A, Sankaranarayanan AC.  2009.  Knowledge Extraction from Surveillance Sensors. Wiley Handbook of Science and Technology for Homeland SecurityWiley Handbook of Science and Technology for Homeland Security.
Chellappa R.  2011.  The evolution of stochastic grammars for representation and recognition of activities in videos. 2011 IEEE International Conference on Computer Vision Workshops (ICCV Workshops). :688-688.
Chellappa R, Heinzelman W, Konrad J, Schonfeld D, Wolf M.  2010.  Special Section on Distributed Camera Networks: Sensing, Processing, Communication, and Implementation. Image Processing, IEEE Transactions on. 19(10):2513-2515.
Chellappa R, Sinha P, Phillips PJ.  2010.  Face Recognition by Computers and Humans. Computer. 43(2):46-55.
Chellappa R, Zhao W.  2006.  Face Processing: Advanced Modeling and Methods.
Chellappa R, Cavallaro A, Wu Y, Shan C, Fu Y, Pulli K.  2011.  Special Issue on Video Analysis on Resource-Limited Systems. IEEE Transactions on Circuits and Systems for Video Technology. 21(10):1349-1352.
Chekuri C, Hajiaghayi MT, Kortsarz G, Salavatipour MR.  2010.  Approximation Algorithms for Non-Uniform Buy-at-Bulk Network Design. SIAM Journal on Computing. 39(5):1772-1798.
Chekuri C, Gal A, Im S, Khuller S, Li J, McCutchen R, Moseley B, Raschid L.  2011.  New models and algorithms for throughput maximization in broadcast scheduling. Approximation and Online Algorithms. :71-82.
Chazelle B, Kingsford C, Singh M.  2004.  A semidefinite programming approach to side chain positioning with new rounding strategies. INFORMS Journal on Computing. 16(4):380-392.
Chaudhuri A, Foster JS.  2010.  Symbolic security analysis of ruby-on-rails web applications. Proceedings of the 17th ACM conference on Computer and communications security. :585-594.
Chatterjee S, Bhattacharyya SS.  2010.  Selective excitation of LI2 by chirped laser pulses with all possible interstate radiative couplings. The Journal of Chemical Physics. 133(16):164313-164313-9.
Charles C, Des Jarlais Don PT, Gerry S.  2007.  HIV risk behaviors among female IDUs in developing and transitional countries. BMC Public Health. 7
Charikar M, Khuller S, Mount D, Narasimhan G.  2001.  Algorithms for facility location problems with outliers. Proceedings of the twelfth annual ACM-SIAM symposium on Discrete algorithms. :642-651.
Charikar M, Khuller S.  2006.  A robust maximum completion time measure for scheduling. Proceedings of the seventeenth annual ACM-SIAM symposium on Discrete algorithm. :324-333.
Chari S, Rohatgi P, Srinivasan A.  1995.  Randomness-Optimal Unique Element Isolation with Applications to Perfect Matching and Related Problems. SIAM Journal on Computing. 24(5):1036-1036.
Chari S, Rohatgi P, Srinivasan A.  2000.  Improved Algorithms via Approximations of Probability Distributions. Journal of Computer and System Sciences. 61(1):81-107.
Chang T-H, Tom Yeh, Miller R.  2011.  Associating the visual representation of user interfaces with their internal structures and metadata. Proceedings of the 24th annual ACM symposium on User interface software and technology. :245-256.
Chang C, Acharya A, Sussman A, Saltz J.  1998.  T2. ACM SIGMOD Record. 27:58-66.
Chang C, Ferreira R, Sussman A, Saltz J.  1999.  Infrastructure for building parallel database systems for multi-dimensional data. IPPS. :582-582.
Chang J, Boyd-Graber J, Gerrish S, Wang C, Blei DM.  2009.  Reading tea leaves: How humans interpret topic models. Proceedings of the 23rd Annual Conference on Neural Information Processing Systems. 31
Chang S, Van Horn D, Felleisen M.  2010.  Evaluating Call-By-Need on the Control Stack. arXiv:1009.3174 [cs].

Pages