Publications

Export 7151 results:
Author Title Type [ Year(Desc)]
2008
Albanese M, Chellappa R, Moscato V, Picariello A, V.S. Subrahmanian, Turaga P, Udrea O.  2008.  A Constrained Probabilistic Petri Net Framework for Human Activity Detection in Video. Multimedia, IEEE Transactions on. 10(6):982-996.
Gupta A, Mittal A, Davis LS.  2008.  Constraint Integration for Efficient Multiview Pose Estimation with Self-Occlusions. Pattern Analysis and Machine Intelligence, IEEE Transactions on. 30(3):493-506.
Deshmukh AS, Banerjee A G, Gupta SK, Sriram RD.  2008.  Content-based assembly search: A step towards assembly reuse. Computer-Aided Design. 40(2):244-261.
Gupta A, Chen T, Chen F, Kimber D, Davis LS.  2008.  Context and observation driven latent variable model for human pose estimation. Computer Vision and Pattern Recognition, 2008. CVPR 2008. IEEE Conference on. :1-8.
Neamtiu I, Hicks MW, Foster JS, Pratikakis P.  2008.  Contextual effects for version-consistent dynamic software updating and safe concurrent programming. Proceedings of the 35th annual ACM SIGPLAN-SIGACT symposium on Principles of programming languages. :37-49.
Leon J-C, De Floriani L.  2008.  Contribution to a Taxonomy of Non-Manifold Models Based on Topological Properties. ASME Conference Proceedings. 2008(43277):187-197.
Xue F, Elman H.  2008.  Convergence analysis of iterative solvers in inexact Rayleigh quotient iteration. CONVERGENCE. 31(3):877-899.
Martinez V, Simari GI, Sliva A, V.S. Subrahmanian.  2008.  CONVEX: Similarity-Based Algorithms for Forecasting Group Behavior. Intelligent Systems, IEEE. 23(4):51-57.
Shneiderman B.  2008.  Copernican challenges face those who suggest that collaboration, not computation are the driving energy for socio-technical systems that characterize Web 2.0.. Science. 319:1349-1350.
Gupta A, Srinivasan A, Tardos É.  2008.  Cost-Sharing Mechanisms for Network Design. Algorithmica. 50(1):98-119.
Zo Y-G, Chokesajjawatee N, Arakawa E, Watanabe H, Huq A, Colwell RR.  2008.  Covariability of Vibrio Cholerae Microdiversity and Environmental Parameters. Applied and Environmental MicrobiologyAppl. Environ. Microbiol.. 74(9):2915-2920.
Zeman D, Resnik P.  2008.  Cross-language parser adaptation between related languages. NLP for Less Privileged Languages. :35-35.
Stonedahl F, Rand W, Wilensky U.  2008.  CrossNet: a framework for crossover with network-based chromosomal representations. Proceedings of the 10th annual conference on Genetic and evolutionary computation. :1057-1064.
Basili VR, Dangle K, Esker L, Marotta F, Rus I, Brosgol BM, Jamin S, Arthur JD, Ravichandar R, Wisnosky DE.  2008.  CrossTalk: The Journal of Defense Software Engineering. Volume 21, Number 10, October 2008.
Daumé H.  2008.  Cross-task knowledge-constrained self training. Proceedings of the Conference on Empirical Methods in Natural Language Processing. :680-688.
Zhao H, Plaisant C, Shneiderman B, Lazar J.  2008.  Data Sonification for Users with Visual Impairment: A Case Study with Georeferenced Data. ACM Trans. Comput.-Hum. Interact.. 15(1):4:1–4:28-4:1–4:28.
Farrell R, Davis LS.  2008.  Decentralized discovery of camera network topology. Distributed Smart Cameras, 2008. ICDSC 2008. Second ACM/IEEE International Conference on. :1-10.
Van Horn D, Mairson HG.  2008.  Deciding kCFA is Complete for EXPTIME. ICFP '08 Proceedings of the 13th ACM SIGPLAN International Conference on Functional Programming. :275-282.
Varna AL, Swaminathan A, M. Wu.  2008.  A decision theoretic framework for analyzing binary hash-based content identification systems. Proceedings of the 8th ACM workshop on Digital rights management. :67-76.
Elaine Shi, Waters B.  2008.  Delegating Capabilities in Predicate Encryption Systems. Automata, Languages and Programming. 5126:560-578.
Berthier R, Cukier M.  2008.  The Deployment of a Darknet on an Organization-Wide Network: An Empirical Analysis. :59-68.
Zhuolin Jiang, Li SF, Gao DF.  2008.  Design and implementation of blackboard-based system for human detection. Jisuanji Gongcheng/ Computer Engineering. 34(2)
Fei Wu P, Qu Y, Fleischmann K, Golbeck J, Jaeger P, Preece J, Shneiderman B.  2008.  Designing community-based emergency communication system: A preliminary study. Proceedings of the American Society for Information Science and Technology. 45(1):1-3.
Ramachandran A, Feamster N, Dagon D.  2008.  Detecting botnet membership with dnsbl counterintelligence. Botnet Detection. :131-142.
Chokesajjawatee N, Zo Y-G, Colwell RR.  2008.  Determination of Clonality and Relatedness of Vibrio Cholerae Isolates by Genomic Fingerprinting, Using Long-Range Repetitive Element Sequence-Based PCR. Applied and Environmental MicrobiologyAppl. Environ. Microbiol.. 74(17):5392-5401.

Pages