Publications

Export 7148 results:
[ Author(Desc)] Title Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
C
Chang S, Van Horn D, Felleisen M.  2010.  Evaluating Call-By-Need on the Control Stack. arXiv:1009.3174 [cs].
Chang XC, Paige CC, Stewart G.W.  1997.  Perturbation analysis for the QR decomposition. SIAM Journal on Matrix Analysis and Applications. 18:775-791.
Chang AE, Steinberg SM, Culnane M, Lampert MH, Reggia JA, Simpson CG, Hicks JE, White DE, Yang JJ, Glatstein E.  1989.  Functional and psychosocial effects of multimodality limb-sparing therapy in patients with soft tissue sarcomas. Journal of Clinical Oncology. 7(9):1217-1217.
Chari S, Rohatgi P, Srinivasan A.  2000.  Improved Algorithms via Approximations of Probability Distributions. Journal of Computer and System Sciences. 61(1):81-107.
Chari S, Rohatgi P, Srinivasan A.  1995.  Randomness-Optimal Unique Element Isolation with Applications to Perfect Matching and Related Problems. SIAM Journal on Computing. 24(5):1036-1036.
Charikar M, Khuller S, Mount D, Narasimhan G.  2001.  Algorithms for facility location problems with outliers. Proceedings of the twelfth annual ACM-SIAM symposium on Discrete algorithms. :642-651.
Charikar M, Khuller S.  2006.  A robust maximum completion time measure for scheduling. Proceedings of the seventeenth annual ACM-SIAM symposium on Discrete algorithm. :324-333.
Charles C, Des Jarlais Don PT, Gerry S.  2007.  HIV risk behaviors among female IDUs in developing and transitional countries. BMC Public Health. 7
Chatterjee S, Bhattacharyya SS.  2010.  Selective excitation of LI2 by chirped laser pulses with all possible interstate radiative couplings. The Journal of Chemical Physics. 133(16):164313-164313-9.
Chaudhuri A, Foster JS.  2010.  Symbolic security analysis of ruby-on-rails web applications. Proceedings of the 17th ACM conference on Computer and communications security. :585-594.
Chazelle B, Kingsford C, Singh M.  2004.  A semidefinite programming approach to side chain positioning with new rounding strategies. INFORMS Journal on Computing. 16(4):380-392.
Chekuri C, Hajiaghayi MT, Kortsarz G, Salavatipour MR.  2010.  Approximation Algorithms for Non-Uniform Buy-at-Bulk Network Design. SIAM Journal on Computing. 39(5):1772-1798.
Chekuri C, Gal A, Im S, Khuller S, Li J, McCutchen R, Moseley B, Raschid L.  2011.  New models and algorithms for throughput maximization in broadcast scheduling. Approximation and Online Algorithms. :71-82.
Chellappa R, Roy-Chowdhury AK, Kale A.  2007.  Human Identification using Gait and Face. Computer Vision and Pattern Recognition, 2007. CVPR '07. IEEE Conference on. :1-2.
Chellappa R, Kruger V, Zhou S.  2002.  Probabilistic recognition of human faces from video. Image Processing. 2002. Proceedings. 2002 International Conference on. 1:I-41-I-44vol.1-I-41-I-44vol.1.
Chellappa R, Zhao W.  2006.  Face Processing: Advanced Modeling and Methods.
Chellappa R, Bicego M, Turaga P.  2009.  Video-Based Face Recognition Algorithms. Handbook of Remote Biometrics. :193-216.
Chellappa R, Turaga P.  2011.  Advances in Video-Based Biometrics. Advances in Imaging and Electron Physics. 83:183-203.
Chellappa R, Sankaranarayanan AC, Veeraraghavan A.  2008.  Mixed state models for automatic target recognition and behavior analysis in video sequences. Proceedings of SPIE. 6967(1):69670Q-69670Q-11-69670Q-69670Q-11.
Chellappa R, Vaswani N, Chowdhury AKR.  2003.  Activity modeling and recognition using shape theory. Behavior Representation in Modeling and Simulation.
Chellappa R, Sankaranarayanan AC, Veeraraghavan A.  2010.  Statistical Methods and Models for Video-Based Tracking, Modeling, and Recognition.
Chellappa R, Chowdhury A RK.  2006.  Computer Vision, Statistics in. Encyclopedia of Statistical SciencesEncyclopedia of Statistical Sciences.
Chellappa R, Veeraraghavan A, Sankaranarayanan AC.  2009.  Knowledge Extraction from Surveillance Sensors. Wiley Handbook of Science and Technology for Homeland SecurityWiley Handbook of Science and Technology for Homeland Security.
Chellappa R, Du M, Turaga P, Zhou S K.  2011.  Face Tracking and Recognition in Video. Handbook of Face RecognitionHandbook of Face Recognition. :323-351.
Chellappa R.  2010.  Sparsity-Inspired Recognition of Targets in Infrared Images.

Pages