Publications

Export 7148 results:
[ Author(Desc)] Title Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
Q
Qian G, Chellappa R.  2004.  Bayesian self-calibration of a moving camera. Computer Vision and Image Understanding. 95(3):287-316.
Qian G, Chellappa R, Zheng Q.  2002.  A Bayesian Approach to Simultaneous Motion Estimation of Multiple Independently Moving Objects. INTERNATIONAL CONFERENCE ON PATTERN RECOGNITION. 16:309-314.
Qian G, Chellappa R, Zheng Q.  2002.  Bayesian structure from motion using inertial information. Image Processing. 2002. Proceedings. 2002 International Conference on. 3:III-425-III-428vol.3-III-425-III-428vol.3.
Qian G, Chellappa R, Zheng Q.  2004.  Robust Bayesian cameras motion estimation using random sampling. Image Processing, 2004. ICIP '04. 2004 International Conference on. 2:1361-1364Vol.2-1361-1364Vol.2.
Qian G, Chellappa R, Zheng Q.  2005.  Bayesian algorithms for simultaneous structure from motion estimation of multiple independently moving objects. Image Processing, IEEE Transactions on. 14(1):94-109.
Qiu Q, Zhuolin Jiang, Chellappa R.  2011.  Sparse dictionary-based representation and recognition of action attributes. 2011 IEEE International Conference on Computer Vision (ICCV). :707-714.
Quercini G, Samet H, Sankaranarayanan J, Lieberman MD.  2010.  Determining the spatial reader scopes of news sources using local lexicons. Proceedings of the 18th SIGSPATIAL International Conference on Advances in Geographic Information Systems. :43-52.
Quinn AJ, Hu C, Arisaka T, Rose A, Bederson BB.  2008.  Readability of scanned books in digital libraries. Proceeding of the twenty-sixth annual SIGCHI conference on Human factors in computing systems. :705-714.
R
Raasi S, Varadan R, Fushman D, Pickart CM.  2005.  Diverse polyubiquitin interaction properties of ubiquitin-associated domains. Nature Structural & Molecular Biology. 12(8):708-714.
Raboin E, Nau DS, Kuter U, Gupta SK, Svec P.  2010.  Strategy generation in multi-agent imperfect-information pursuit games. :947-954.
Radhakrishnan J, Srinivasan A.  1998.  Improved bounds and algorithms for hypergraph two-coloring. 39th Annual Symposium on Foundations of Computer Science, 1998. Proceedings. :684-693.
Radio MJ, Reggia JA, Berndt RS.  2001.  Learning word pronunciations using a recurrent neural network. Neural Networks, 2001. Proceedings. IJCNN'01. International Joint Conference on. 1:11-15.
Rahaman M.Habibur, Islam T, Colwell RR, Alam M.  2015.  Molecular tools in understanding the evolution of Vibrio cholerae. Frontiers in Microbiology. (e0120311154e00398-13822020380817190)
Rai P, Daumé H.  2009.  The infinite hierarchical factor regression model. Arxiv preprint arXiv:0908.0570.
Rai P, Daumé H.  2009.  Multi-label prediction via sparse infinite CCA. Advances in Neural Information Processing Systems. 22:1518-1526.
Rai P, Daumé H, Venkatasubramanian S.  2009.  Streamed learning: one-pass SVMs. Proceedings of the 21st international jont conference on Artifical intelligence. :1211-1216.
Rajagopalan AN, Chellappa R, Koterba NT.  2005.  Background learning for robust face recognition with PCA in the presence of clutter. Image Processing, IEEE Transactions on. 14(6):832-843.
Rajagopalan S, Pinilla JM, Losleben P, Tian Q, Gupta SK.  1998.  Integrated design and rapid manufacturing over the Internet.
Rajagopalan AN, Chellappa R, Koterba N.  2003.  Robust Face Recognition in the Presence of Clutter. Audio- and Video-Based Biometric Person AuthenticationAudio- and Video-Based Biometric Person Authentication. 2688:1062-1062.
Ralston A, Shneiderman B.  2003.  Errors. Encyclopedia of Computer ScienceEncyclopedia of Computer Science. :677-680.
Ramachandran AV, Feamster N.  2008.  Authenticated out-of-band communication over social links. Proceedings of the first workshop on Online social networks. :61-66.
Ramachandran A, Dagon D, Feamster N.  2006.  Can DNS-based blacklists keep up with bots. Conference on email and anti-spam.
Ramachandran A, Feamster N, Vempala S.  2007.  Filtering spam with behavioral blacklisting. Proceedings of the 14th ACM conference on Computer and communications security. :342-351.
Ramachandran V, Vishkin U.  1988.  Efficient parallel triconnectivity in logarithmic time. VLSI Algorithms and Architectures. :33-42.
Ramachandran A, Mundada Y, Tariq MB, Feamster N.  2008.  Securing enterprise networks using traffic tainting. Special Interest Group on Data Communication.

Pages