Publications

Export 7148 results:
[ Author(Desc)] Title Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
S
Sundaresan A, RoyChowdhury A, Chellappa R.  2003.  A hidden Markov model based framework for recognition of humans from gait sequences. Image Processing, 2003. ICIP 2003. Proceedings. 2003 International Conference on. 2:II-93-6vol.3-II-93-6vol.3.
Sundaresan S, Feamster N, Dicioccio L, Teixeira R.  2010.  Which Factors Affect Access Network Performance? GT-CS-10-04
Sundaresan A, Chellappa R.  2008.  Model Driven Segmentation of Articulating Humans in Laplacian Eigenspace. Pattern Analysis and Machine Intelligence, IEEE Transactions on. 30(10):1771-1785.
Sussman A.  2006.  Building complex coupled physical simulations on the grid with InterComm. Engineering with Computers. 22(3):311-323.
Sussman A, Saltz J, Das R, Gupta S, Mavriplis D, Ponnusamy R, Crowley K.  1992.  PARTI primitives for unstructured and block structured problems. Computing Systems in Engineering. 3(1-4):73-86.
Sussman A.  1992.  Model-driven mapping onto distributed memory parallel computers. Proceedings of the 1992 ACM/IEEE conference on Supercomputing. :818-829.
Sutton GG, Reggia JA.  1994.  Effects of normalization constraints on competitive learning. Neural Networks, IEEE Transactions on. 5(3):502-504.
Sutton III GG, Reggia JA, Armentrout SL, D'Autrechy CL.  1994.  Cortical map reorganization as a competitive process. Neural Computation. 6(1):1-13.
Sutton III GG, Reggia JA, Maisog JM.  1990.  Supervised and reinforced competitive learning. Neural Networks, 1990., 1990 IJCNN International Joint Conference on. :563-567.
Sutton III GG, Reggia JA, Maisog JM.  1990.  Competitive learning using competitive activation rules. Neural Networks, 1990., 1990 IJCNN International Joint Conference on. :285-291.
Svec P, Gupta SK.  2012.  Automated synthesis of action selection policies for unmanned vehicles operating in adverse environments. Autonomous Robots. 32(2):149-164.
Svec P, Gupta SK.  2011.  Automated Planning Logic Synthesis for Autonomous Unmanned Vehicles in Competitive Environments with Deceptive Adversaries. New Horizons in Evolutionary Robotics. 341:171-193.
Svec P, Schwartz M, Thakur A, Gupta SK.  2011.  Trajectory planning with look-ahead for Unmanned Sea Surface Vehicles to handle environmental disturbances. :1154-1159.
Swaminathan A, M. Wu, Liu KJR.  2006.  Image Tampering Identification using Blind Deconvolution. Image Processing, 2006 IEEE International Conference on. :2309-2312.
Swaminathan A, Mao Y, Wu M, Kailas K.  2005.  Data hiding in compiled program binaries for enhancing computer system performance. Information Hiding. :357-371.
Swaminathan A, M. Wu, Liu KJR.  2008.  Digital image forensics via intrinsic fingerprints. Information Forensics and Security, IEEE Transactions on. 3(1):101-117.
Swaminathan A, M. Wu, Liu KJR.  2009.  Component forensics. Signal Processing Magazine, IEEE. 26(2):38-48.
Swaminathan A, Mao Y, M. Wu.  2004.  Image hashing resilient to geometric and filtering operations. Multimedia Signal Processing, 2004 IEEE 6th Workshop on. :355-358.
Swaminathan A, M. Wu, Liu KJR.  2008.  A pattern classification framework for theoretical analysis of component forensics. Acoustics, Speech and Signal Processing, 2008. ICASSP 2008. IEEE International Conference on. :1665-1668.
Swaminathan A, Mao Y, M. Wu.  2006.  Robust and secure image hashing. Information Forensics and Security, IEEE Transactions on. 1(2):215-230.
Swaminathan A, He S, Wu M.  2006.  Exploring QIM-based anti-collusion fingerprinting for multimedia. Proceedings of SPIE. 6072:698-709.
Swaminathan A, Mao Y, Su G-M, Gou H, Varna AL, He S, M. Wu, Oard D.  2007.  Confidentiality-preserving rank-ordered search. Proceedings of the 2007 ACM workshop on Storage security and survivability. :7-12.
Swaminathan A, M. Wu, Liu KJR.  2007.  A Component Estimation Framework for Information Forensics. Multimedia Signal Processing, 2007. MMSP 2007. IEEE 9th Workshop on. :397-400.
Swaminathan A, Wu M, Liu KJR.  2007.  Intrinsic fingerprints for image authentication and steganalysis. Proc. SPIE Conf. Security, Steganography, Watermarking of Multimedia Contents.
Swaminathan A, Mao Y, M. Wu.  2005.  Security of feature extraction in image hashing. Acoustics, Speech, and Signal Processing, 2005. Proceedings. (ICASSP '05). IEEE International Conference on. 2:ii/1041-ii/1044Vol.2-ii/1041-ii/1044Vol.2.

Pages