Publications

Export 7148 results:
[ Author(Desc)] Title Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
C
Chang S, Van Horn D, Felleisen M.  2010.  Evaluating Call-By-Need on the Control Stack. arXiv:1009.3174 [cs].
Chang XC, Paige CC, Stewart G.W.  1997.  Perturbation analysis for the QR decomposition. SIAM Journal on Matrix Analysis and Applications. 18:775-791.
Chang CF, Varshney A, Ge QJ.  2001.  Haptic and aural rendering of a virtual milling process. ASME 2001 Design Engineering Technical Conference and Computers and Information in Engineering Conference, Pittsburgh, PA. :105-113.
Chari S, Rohatgi P, Srinivasan A.  2000.  Improved Algorithms via Approximations of Probability Distributions. Journal of Computer and System Sciences. 61(1):81-107.
Chari S, Rohatgi P, Srinivasan A.  1995.  Randomness-Optimal Unique Element Isolation with Applications to Perfect Matching and Related Problems. SIAM Journal on Computing. 24(5):1036-1036.
Charikar M, Khuller S, Mount D, Narasimhan G.  2001.  Algorithms for facility location problems with outliers. Proceedings of the twelfth annual ACM-SIAM symposium on Discrete algorithms. :642-651.
Charikar M, Khuller S.  2006.  A robust maximum completion time measure for scheduling. Proceedings of the seventeenth annual ACM-SIAM symposium on Discrete algorithm. :324-333.
Charles C, Des Jarlais Don PT, Gerry S.  2007.  HIV risk behaviors among female IDUs in developing and transitional countries. BMC Public Health. 7
Chatterjee S, Bhattacharyya SS.  2010.  Selective excitation of LI2 by chirped laser pulses with all possible interstate radiative couplings. The Journal of Chemical Physics. 133(16):164313-164313-9.
Chaudhuri A, Foster JS.  2010.  Symbolic security analysis of ruby-on-rails web applications. Proceedings of the 17th ACM conference on Computer and communications security. :585-594.
Chazelle B, Kingsford C, Singh M.  2004.  A semidefinite programming approach to side chain positioning with new rounding strategies. INFORMS Journal on Computing. 16(4):380-392.
Chekuri C, Hajiaghayi MT, Kortsarz G, Salavatipour MR.  2010.  Approximation Algorithms for Non-Uniform Buy-at-Bulk Network Design. SIAM Journal on Computing. 39(5):1772-1798.
Chekuri C, Gal A, Im S, Khuller S, Li J, McCutchen R, Moseley B, Raschid L.  2011.  New models and algorithms for throughput maximization in broadcast scheduling. Approximation and Online Algorithms. :71-82.
Chellappa R, Turaga P.  2011.  Advances in Video-Based Biometrics. Advances in Imaging and Electron Physics. 83:183-203.
Chellappa R, Sinha P, Phillips PJ.  2010.  Face Recognition by Computers and Humans. Computer. 43(2):46-55.
Chellappa R, Aggarwal G.  2007.  Video Biometrics. Image Analysis and Processing, 2007. ICIAP 2007. 14th International Conference on. :363-370.
Chellappa R, Du M, Turaga P, Zhou S K.  2011.  Face Tracking and Recognition in Video. Handbook of Face RecognitionHandbook of Face Recognition. :323-351.
Chellappa R.  2010.  Sparsity-Inspired Recognition of Targets in Infrared Images.
Chellappa R, Chowdhury A RK, Srinivasan S.  2007.  Method of three-dimensional object reconstruction from a video sequence using a generic model. 10/644,817(7184071)
Chellappa R, Zhao W.  2006.  Face Processing: Advanced Modeling and Methods.
Chellappa R, Aggarwal G.  2008.  Pose and Illumination Issues in Face-and Gait-Based Identification. Advances in Biometrics. :307-322.
Chellappa R, Ni J, Patel VM.  2011.  Remote identification of faces: Problems, prospects, and progress. Pattern Recognition Letters.
Chellappa R, Vaswani N, Chowdhury AKR.  2003.  Activity modeling and recognition using shape theory. Behavior Representation in Modeling and Simulation.
Chellappa R.  2010.  Sparsity Motivated Automated Target Recognition.
Chellappa R, Phillips J, Reynolds D.  2006.  Special Issue on Biometrics: Algorithms and Applications. Proceedings of the IEEE. 94(11):1912-1914.

Pages