Publications

Export 7151 results:
Author Title Type [ Year(Desc)]
2008
Kembhavi A, Schwartz WR, Davis LS, others.  2008.  Resource allocation for tracking multiple targets using particle filters. The Eighth International Workshop on Visual Surveillance.
Agrawal M, Doermann D.  2008.  Re-Targetable OCR with Intelligent Character Segmentation. DAS '08: Proceedings of the 2008 The Eighth IAPRInternational Workshop on Document Analysis Systems. :183-190.
Tulyakov S, Jaeger S, Govindaraju V, Doermann D.  2008.  Review of Classifier Combination Methods. Studies in Computational Intelligence: Machine Learning in Document Analysis and RecognitionStudies in Computational Intelligence: Machine Learning in Document Analysis and Recognition. :361-386.
Cockburn A, Karlson A, Bederson BB.  2008.  A review of overview+ detail, zooming, and focus+ context interfaces. ACM Computing Surveys (CSUR). 41(1):1-31.
Schmill MD, Oates T, Anderson M, Fults S, Josyula D, Perlis D, Wilson S.  2008.  The role of metacognition in robust AI systems. AAAI-08 Workshop on Metareasoning,(Chicago, IL).
Bringaud F, Ghedin E, El-Sayed NM, Papadopoulou B.  2008.  Role of transposable elements in trypanosomatids. Microbes and Infection. 10(6):575-581.
Froehlich J, Krumm J.  2008.  Route prediction from trip observations. SAE SP. 2193
Udrea O, Lumezanu C, Foster JS.  2008.  Rule-based static analysis of network protocol implementations. Information and Computation. 206(2):130-157.
Roitman H, Gal A, Raschid L.  2008.  Satisfying Complex Data Needs using Pull-Based Online Monitoring of Volatile Data Sources. Data Engineering, International Conference on. :1465-1467.
Nagarajan N, Read TD, Pop M.  2008.  Scaffolding and Validation of Bacterial Genome Assemblies Using Optical Restriction Maps. Bioinformatics. 24(10):1229-1235.
Zadorozhny V, Raschid L, Gal A.  2008.  SCALABLE CATALOG INFRASTRUCTURE FOR MANAGING ACCESS COSTS AND SOURCE SELECTION IN WIDE AREA NETWORKS. International Journal of Cooperative Information Systems. 17(1):77-109.
Tom Yeh, Lee JJ, Darrell T.  2008.  Scalable classifiers for Internet vision tasks. Computer Vision and Pattern Recognition Workshops, 2008. CVPRW'08. IEEE Computer Society Conference on. :1-8.
Li JH, Bhattacharjee B, Yu M, Levy R.  2008.  A scalable key management and clustering scheme for wireless ad hoc and sensor networks. Future Generation Computer Systems. 24(8):860-869.
Jimmy Lin.  2008.  Scalable language processing algorithms for the masses: a case study in computing word co-occurrence matrices with MapReduce. Proceedings of the Conference on Empirical Methods in Natural Language Processing. :419-428.
Samet H, Sankaranarayanan J, Alborzi H.  2008.  Scalable network distance browsing in spatial databases. Proceedings of the 2008 ACM SIGMOD international conference on Management of data. :43-54.
Mitra K, Chellappa R.  2008.  A Scalable Projective Bundle Adjustment Algorithm using the L infinity Norm. Computer Vision, Graphics Image Processing, 2008. ICVGIP '08. Sixth Indian Conference on. :79-86.
Pugliese A, Udrea O, V.S. Subrahmanian.  2008.  Scaling RDF with Time. Proceedings of the 17th international conference on World Wide Web. :605-614.
Yi L, Zheng Y, Doermann D, Jaeger S.  2008.  Script-Independent Text Line Segmentation in Freestyle Handwritten Documents. IEEETransactions on Pattern Analysis and Machine Intelligence. :1313-1329.
Plaisant C, Lam S, Shneiderman B, Smith MS, Roseman D, Marchand G, Gillam M, Feied C, Handler J, Rappaport H.  2008.  Searching Electronic Health Records for Temporal Patterns in Patient Histories: A Case Study with Microsoft Amalga. AMIA Annual Symposium ProceedingsAMIA Annu Symp Proc. 2008:601-605.
Belhumeur P, Chen D, Feiner S, Jacobs DW, Kress W, Ling H, Lopez I, Ramamoorthi R, Sheorey S, White S.  2008.  Searching the world’s herbaria: A system for visual identification of plant species. Computer Vision–ECCV 2008. :116-129.
Stine CO, Alam M, Tang L, Nair BG, Siddique KA, Faruque SM, Huq A, Colwell RR, Sack BR, Morris GJ.  2008.  Seasonal Cholera from Multiple Small Outbreaks, Rural Bangladesh. Emerging Infectious DiseasesEmerg Infect Dis. 14(5):831-833.
Ramachandran A, Mundada Y, Tariq MB, Feamster N.  2008.  Securing enterprise networks using traffic tainting. Special Interest Group on Data Communication.
Anderson ML, Fults S, Josyula DP, Oates T, Perlis D, Wilson S, Wright D.  2008.  A self-help guide for autonomous systems. AI Magazine. 29(2):67-67.
Cerqueira GC, Bartholomeu DC, DaRocha WD, Hou L, Freitas-Silva DM, Machado C R, El-Sayed NM, Teixeira SMR.  2008.  Sequence diversity and evolution of multigene families in Trypanosoma cruzi. Molecular and Biochemical Parasitology. 157(1):65-72.
Han B, Comaniciu D, Zhu Y, Davis LS.  2008.  Sequential Kernel Density Approximation and Its Application to Real-Time Visual Tracking. Pattern Analysis and Machine Intelligence, IEEE Transactions on. 30(7):1186-1197.

Pages