Publications

Export 7148 results:
[ Author(Asc)] Title Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
C
Chellappa R, Aggarwal G.  2007.  Video Biometrics. Image Analysis and Processing, 2007. ICIAP 2007. 14th International Conference on. :363-370.
Chellappa R, Chowdhury A RK, Srinivasan S.  2007.  Method of three-dimensional object reconstruction from a video sequence using a generic model. 10/644,817(7184071)
Chellappa R, Du M, Turaga P, Zhou S K.  2011.  Face Tracking and Recognition in Video. Handbook of Face RecognitionHandbook of Face Recognition. :323-351.
Chellappa R.  2010.  Sparsity-Inspired Recognition of Targets in Infrared Images.
Chellappa R, Zhao W.  2006.  Face Processing: Advanced Modeling and Methods.
Chellappa R, Aggarwal G.  2008.  Pose and Illumination Issues in Face-and Gait-Based Identification. Advances in Biometrics. :307-322.
Chellappa R, Phillips J, Reynolds D.  2006.  Special Issue on Biometrics: Algorithms and Applications. Proceedings of the IEEE. 94(11):1912-1914.
Chellappa R, Vaswani N, Chowdhury AKR.  2003.  Activity modeling and recognition using shape theory. Behavior Representation in Modeling and Simulation.
Chellappa R, Ni J, Patel VM.  2011.  Remote identification of faces: Problems, prospects, and progress. Pattern Recognition Letters.
Chellappa R.  2010.  Sparsity Motivated Automated Target Recognition.
Chekuri C, Hajiaghayi MT, Kortsarz G, Salavatipour MR.  2010.  Approximation Algorithms for Non-Uniform Buy-at-Bulk Network Design. SIAM Journal on Computing. 39(5):1772-1798.
Chekuri C, Gal A, Im S, Khuller S, Li J, McCutchen R, Moseley B, Raschid L.  2011.  New models and algorithms for throughput maximization in broadcast scheduling. Approximation and Online Algorithms. :71-82.
Chazelle B, Kingsford C, Singh M.  2004.  A semidefinite programming approach to side chain positioning with new rounding strategies. INFORMS Journal on Computing. 16(4):380-392.
Chaudhuri A, Foster JS.  2010.  Symbolic security analysis of ruby-on-rails web applications. Proceedings of the 17th ACM conference on Computer and communications security. :585-594.
Chatterjee S, Bhattacharyya SS.  2010.  Selective excitation of LI2 by chirped laser pulses with all possible interstate radiative couplings. The Journal of Chemical Physics. 133(16):164313-164313-9.
Charles C, Des Jarlais Don PT, Gerry S.  2007.  HIV risk behaviors among female IDUs in developing and transitional countries. BMC Public Health. 7
Charikar M, Khuller S, Mount D, Narasimhan G.  2001.  Algorithms for facility location problems with outliers. Proceedings of the twelfth annual ACM-SIAM symposium on Discrete algorithms. :642-651.
Charikar M, Khuller S.  2006.  A robust maximum completion time measure for scheduling. Proceedings of the seventeenth annual ACM-SIAM symposium on Discrete algorithm. :324-333.
Chari S, Rohatgi P, Srinivasan A.  1995.  Randomness-Optimal Unique Element Isolation with Applications to Perfect Matching and Related Problems. SIAM Journal on Computing. 24(5):1036-1036.
Chari S, Rohatgi P, Srinivasan A.  2000.  Improved Algorithms via Approximations of Probability Distributions. Journal of Computer and System Sciences. 61(1):81-107.
Chang C, Acharya A, Sussman A, Saltz J.  1998.  T2. ACM SIGMOD Record. 27:58-66.
Chang C, Ferreira R, Sussman A, Saltz J.  1999.  Infrastructure for building parallel database systems for multi-dimensional data. IPPS. :582-582.
Chang YH, Raschid L.  2000.  Producing Interoperable Queries for Relational and Object-Oriented Databases. Journal of Intelligent Information Systems. 14(1):51-75.
Chang XC, Paige CC, Stewart G.W.  1997.  Perturbation analysis for the QR decomposition. SIAM Journal on Matrix Analysis and Applications. 18:775-791.
Chang CF, Varshney A, Ge QJ.  2001.  Haptic and aural rendering of a virtual milling process. ASME 2001 Design Engineering Technical Conference and Computers and Information in Engineering Conference, Pittsburgh, PA. :105-113.

Pages