Publications

Export 7148 results:
[ Author(Asc)] Title Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
L
Li H, Doermann D.  2000.  Superresolution-based enhancement of text in digital video. Pattern Recognition, 2000. Proceedings. 15th International Conference on. 1:847-850vol.1-847-850vol.1.
Li R, Chellappa R.  2010.  Recognizing offensive strategies from football videos. Image Processing (ICIP), 2010 17th IEEE International Conference on. :4585-4588.
Li R-C, Stewart G.W.  2000.  A new relative perturbation theorem for singular subspaces. Linear Algebra and its Applications. 313(1–3):41-51.
Li H, Doermann D.  1999.  Text enhancement in digital video using multiple frame integration. Proceedings of the seventh ACM international conference on Multimedia (Part 1). :19-22.
Li J, Deshpande A, Khuller S.  2010.  On Computing Compression Trees for Data Collection in Wireless Sensor Networks. 2010 Proceedings IEEE INFOCOM. :1-9.
Li Z, Duraiswami R, Davis LS.  2004.  Recording and reproducing high order surround auditory scenes for mixed and augmented reality. Mixed and Augmented Reality, 2004. ISMAR 2004. Third IEEE and ACM International Symposium on. :240-249.
Li R, Chellappa R.  2009.  Recognizing coordinated multi-object activities using a dynamic event ensemble model. Acoustics, Speech and Signal Processing, 2009. ICASSP 2009. IEEE International Conference on. :3541-3544.
Li H, Doermann D.  2000.  AVideo Text Detection System Based on Automated Training. ICPR. 2:223-226.
Lewinski MK, Yamashita M, Emerman M, Ciuffi A, Marshall H, Crawford G, Collins F, Shinn P, Leipzig J, Hannenhalli S et al..  2006.  Retroviral DNA Integration: Viral and Cellular Determinants of Target-Site Selection. PLoS PathogPLoS Pathog. 2(6):e60-e60.
Lewinski MK, Bisgrove D, Shinn P, Chen H, Hoffmann C, Hannenhalli S, Verdin E, Berry CC, Ecker JR, Bushman FD.  2005.  Genome-Wide Analysis of Chromosomal Features Repressing Human Immunodeficiency Virus Transcription. Journal of VirologyJ. Virol.. 79(11):6610-6619.
Levy S, Hannenhalli S.  2002.  Identification of transcription factor binding sites in the human genome sequence. Mammalian Genome. 13(9):510-514.
Levy S, Hannenhalli S, Workman C.  2001.  Enrichment of Regulatory Signals in Conserved Non-Coding Genomic Sequence. BioinformaticsBioinformatics. 17(10):871-877.
Levow G-A, Oard D, Resnik P.  2001.  Rapidly retargetable interactive translingual retrieval. Proceedings of the first international conference on Human language technology research. :1-5.
Levow G-A, Oard D, Resnik P.  2005.  Dictionary-based techniques for cross-language information retrieval. Information Processing & Management. 41(3):523-547.
Levow GA, Oard D, Resnik P.  2005.  Dictionary-based cross-language retrieval. Information Processing and Management. 41:523-547.
Levow GA, Dorr BJ, Lin D.  2000.  Construction of Chinese-English Semantic Hierarchy for Information Retrieval.
Levitan S, Reggia JA.  2000.  A computational model of lateralization and asymmetries in cortical maps. Neural computation. 12(9):2037-2062.
Levitan S, Stoica I, Reggia JA.  1999.  A model of lateralization and asymmetries in cortical maps. Neural Networks, 1999. IJCNN'99. International Joint Conference on. 1:121-124.
Levitan S, Reggia JA.  1999.  Interhemispheric effects on map organization following simulated cortical lesions. Artificial intelligence in medicine. 17(1):59-85.
Levin D, Spring N, Bhattacharjee B.  2009.  Systems-compatible incentives. Game Theory for Networks, 2009. GameNets '09. International Conference on. :100-106.
Levin D, Baden R, Lumezanu C, Spring N, Bhattacharjee B.  2008.  Motivating participation in internet routing overlays. Proceedings of the 3rd international workshop on Economics of networked systems. :91-96.
Levin D, Sherwood R, Bhattacharjee B.  2006.  Fair file swarming with FOX. Proc. 5th IPTPS.
Levin D, LaCurts K, Spring N, Bhattacharjee B.  2008.  Bittorrent is an auction: analyzing and improving bittorrent's incentives. Proceedings of the ACM SIGCOMM 2008 conference on Data communication. :243-254.
Levin D, Bender A, Lumezanu C, Spring N, Bhattacharjee B.  2007.  Boycotting and extorting nodes in an internetwork. NetE-con+ IBC.
Levi S-T, Agrawala AK.  1994.  Fault tolerant system design. :440.

Pages