Publications

Export 7148 results:
[ Author(Desc)] Title Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
R
Ramachandran A, Hao S, Khandelwal H, Feamster N, Vempala S.  2008.  A Dynamic Reputation Service for Spotting Spammers. GT-CS-08-09
Ramachandran M, Veeraraghavan A, Chellappa R.  2008.  Video stabilization and mosaicing. The Essential Guide to Video Processing,. :109-138.
Ramachandran A, Bhandankar K, Tariq MB, Feamster N.  2008.  Packets with provenance. GT-CS-08-02
Ramachandran A, Sarma AD, Feamster N.  2007.  Bitstore: An incentive-compatible solution for blocked downloads in bittorrent. Proc. Joint Workshop on The Economics of Networked Systems and Incentive-Based Computing (NetEcon).
Ramachandran A, Seetharaman S, Feamster N, Vazirani V.  2007.  Building a Better Mousetrap. GIT-CSS-07-01
Ramachandran A, Feamster N, Krishnamurthy B, Spatscheck O, Van der Merwe J.  2008.  Fishing for Phishing from the Network Stream. GT-CS-08-08
Ramachandran M, Zhou SK, Jhalani D, Chellappa R.  2005.  A method for converting a smiling face to a neutral face with applications to face recognition. Acoustics, Speech, and Signal Processing, 2005. Proceedings. (ICASSP '05). IEEE International Conference on. 2:ii/977-ii/980Vol.2-ii/977-ii/980Vol.2.
Ramachandran A, Seetharaman S, Feamster N, Vazirani V.  2008.  Fast monitoring of traffic subpopulations. Proceedings of the 8th ACM SIGCOMM conference on Internet measurement. :257-270.
Ramachandran A, Feamster N, Dagon D.  2008.  Detecting botnet membership with dnsbl counterintelligence. Botnet Detection. :131-142.
Ramachandran A, Feamster N, Dagon D.  2006.  Revealing botnet membership using DNSBL counter-intelligence. Proc. 2nd USENIX Steps to Reducing Unwanted Traffic on the Internet. :49-54.
Ramachandran A, Dasgupta A, Feamster N, Weinberger K.  2011.  Spam or ham?: characterizing and detecting fraudulent "not spam" reports in web mail systems Proceedings of the 8th Annual Collaboration, Electronic messaging, Anti-Abuse and Spam Conference. :210-219.
Ramachandran AV, Feamster N.  2008.  Authenticated out-of-band communication over social links. Proceedings of the first workshop on Online social networks. :61-66.
Ramachandran A, Dagon D, Feamster N.  2006.  Can DNS-based blacklists keep up with bots. Conference on email and anti-spam.
Ramachandran A, Feamster N, Vempala S.  2007.  Filtering spam with behavioral blacklisting. Proceedings of the 14th ACM conference on Computer and communications security. :342-351.
Ramachandran V, Vishkin U.  1988.  Efficient parallel triconnectivity in logarithmic time. VLSI Algorithms and Architectures. :33-42.
Ramadan S, Davis LS.  2011.  Action recognition using Partial Least Squares and Support Vector Machines. Image Processing (ICIP), 2011 18th IEEE International Conference on. :533-536.
Ramadan S, Abd-Almageed W, Smith CE.  2002.  Eye tracking using active deformable models. Proc. of the IIIrd Indian Conference on Computer Vision, Graphics and Image Processing.
Ramage A, Elman H.  2007.  Some observations on multigrid convergence for convection–diffusion equations. Computing and Visualization in Science. 10(1):43-56.
Raman R, Vishkin U.  1995.  Parallel algorithms for database operations and a database operation for parallel algorithms. Parallel Processing Symposium, 1995. Proceedings., 9th International. :173-179.
Raman R, Vishkin U.  1994.  Optimal randomized parallel algorithms for computing the row maxima of a totally monotone matrix. Proceedings of the fifth annual ACM-SIAM symposium on Discrete algorithms. :613-621.
Raman V, Deshpande A, Hellerstein JM.  2003.  Using state modules for adaptive query processing. 19th International Conference on Data Engineering, 2003. Proceedings. :353-364.
Ramanathan N, Chellappa R.  2006.  Modeling Age Progression in Young Faces. Computer Vision and Pattern Recognition, 2006 IEEE Computer Society Conference on. 1:387-394.
Ramanathan N, Chellappa R, Biswas S.  2009.  Age progression in human faces: A survey. Journal of Visual Languages and Computing. 15:3349-3361.
Ramanathan N, Chellappa R, Biswas S.  2009.  Computational methods for modeling facial aging: A survey. Journal of Visual Languages & Computing. 20(3):131-144.
Ramanathan N, Chellappa R.  2006.  Face Verification Across Age Progression. Image Processing, IEEE Transactions on. 15(11):3349-3361.

Pages