Publications

Export 7148 results:
[ Author(Asc)] Title Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
K
Kembhavi A, Schwartz WR, Davis LS, others.  2008.  Resource allocation for tracking multiple targets using particle filters. The Eighth International Workshop on Visual Surveillance.
Kembhavi A, Siddiquie B, Miezianko R, McCloskey S, Davis LS, Schwartz WR, Harwood D, Gupta A, Farrell R, Luo Y et al..  2009.  Scene it or not? incremental multiple kernel learning for object detection Proceedings of the International Conference on Computer Vision.
Kembhavi A, Farrell R, Luo Y, Jacobs DW, Duraiswami R, Davis LS.  2008.  Tracking Down Under: Following the Satin Bowerbird. Applications of Computer Vision, 2008. WACV 2008. IEEE Workshop on. :1-7.
Kelly W, Pugh W, Rosser E.  1995.  Code generation for multiple mappings. Frontiers of Massively Parallel Computation, 1995. Proceedings. Frontiers '95., Fifth Symposium on the. :332-341.
Kelly W, Pugh W, Rosser E, Shpeisman T.  1996.  Transitive closure of infinite graphs and its applications. Languages and Compilers for Parallel Computing. :126-140.
Kelly W, Pugh W.  1995.  A unifying framework for iteration reordering transformations. Algorithms and Architectures for Parallel Processing, 1995. ICAPP 95. IEEE First ICA/sup 3/PP., IEEE First International Conference on. 1:153-162.
Kelley DR, Liu B, Delcher AL, Pop M, Salzberg SL.  2012.  Gene Prediction with Glimmer for Metagenomic Sequences Augmented by Classification and Clustering. Nucleic Acids ResearchNucl. Acids Res.. 40(1):e9-e9-e9-e9.
Kelley DR, Kingsford C.  2011.  Extracting Between-Pathway Models from E-MAP Interactions Using Expected Graph Compression. Journal of Computational Biology. 18(3):379-390.
Keleher PJ, Hollingsworth J, Perkovic D.  1999.  Exposing Application Alternatives. Distributed Computing Systems, International Conference on. :0384-0384.
Keleher PJ, Spring N, Bhattacharjee B.  2007.  Chit-based access control.
Keleher P, Bhattacharjee B, Silaghi B.  2002.  Are virtualized overlay networks too much of a good thing? Peer-to-Peer Systems. :225-231.
Keil-Slawik R, Plaisant C, Shneiderman B.  1993.  Remote direct manipulation: A case study of a telemedicine workstation. Sparks of innovation in human-computer interactionSparks of innovation in human-computer interaction. :51-51.
Keil M, Mount D, Wismath SK.  2000.  Visibility stabs and depth-first spiralling on line segments in output sensitive time. International Journal of Computational Geometry and Applications. 10(5):535-552.
Keeley MB, Wood MA, Isiegas C, Stein J, Hellman K, Hannenhalli S, Abel T.  2006.  Differential Transcriptional Response to Nonassociative and Associative Components of Classical Fear Conditioning in the Amygdala and Hippocampus. Learning & MemoryLearn. Mem.. 13(2):135-142.
Kee H, Shen C-C, Bhattacharyya SS, Wong I, Rao Y, Kornerup J.  2012.  Mapping Parameterized Cyclo-static Dataflow Graphs onto Configurable Hardware. Journal of Signal Processing Systems. 66(3):285-301.
Kee H, Bhattacharyya SS, Wong I, Rao Y.  2010.  FPGA-based design and implementation of the 3GPP-LTE physical layer using parameterized synchronous dataflow techniques. 2010 IEEE International Conference on Acoustics Speech and Signal Processing (ICASSP). :1510-1513.
Kee H, Bhattacharyya SS, Kornerup J.  2010.  Efficient static buffering to guarantee throughput-optimal FPGA implementation of synchronous dataflow graphs. 2010 International Conference on Embedded Computer Systems (SAMOS). :136-143.
Kedilaya S, Plishker W, Purkovic A, Johnson B, Bhattacharyya SS.  2011.  Model-based precision analysis and optimization for digital signal processors. Proceedings of the European Signal Processing Conference. :506-510.
Keceli F, Tzannes A, Caragea GC, Barua R, Vishkin U.  2011.  Toolchain for Programming, Simulating and Studying the XMT Many-Core Architecture. Parallel and Distributed Processing Workshops and Phd Forum (IPDPSW), 2011 IEEE International Symposium on. :1282-1291.
Kearsley G, Shneiderman B.  1998.  Engagement Theory: A Framework for Technology-Based Teaching and Learning.. Educational TechnologyEducational Technology. 38(5):20-23.
Kawahara AY, Ohshima I, Kawakita A, Regier JC, Mitter C, Cummings MP, Davis DR, Wagner DL, De Prinis J, Lopez-Vaamonde C.  2011.  Increased gene sampling provides stronger support for higher-level groups within gracillariid leaf mining moths and relatives (Lepidoptera: Gracillariidae). BMC Evol Biol. 11:182
Kavetsky R, Gupta SK.  2010.  Developing Autonomy for Unmanned Surface Vehicles by Using Virtual Environments.
Kauniskangas H, Sauvola J, Pietikainen M, Doermann D.  1997.  Content-based Image Retrieval Using Composite Features. Proceedings of the 1997 Scandinavian Conference on Image Analysis. :35-42.
Katz J, Yung M.  2003.  Scalable protocols for authenticated group key exchange. Advances in Cryptology-CRYPTO 2003. :110-125.
Katz J.  2010.  Public-Key Cryptography. Handbook of Information and Communication Security. :21-34.

Pages