Publications

Export 7151 results:
Author Title [ Type(Desc)] Year
Journal Articles
Schwartz WR, Gopalan R, Chellappa R, Davis LS.  2009.  Robust human detection under occlusion by integrating face and person detectors. Proceedings of the Third International Conference on Advances in Biometrics. :970-979.
Zheng Y, Doermann D.  2006.  Robust Point Matching for Nonrigid Shapes By Preserving Local Neighborhood Structures. IEEETransactions on Pattern Analysis and Machine Intelligence. 28(4):643-649.
O'Leary DP.  1990.  Robust Regression Computation Using Iteratively Reweighted Least Squares. SIAM Journal of Matrix Analysis and Applications. 11:466-480.
Yu Z, Seng CY, Jiang T, Wu X, Arbaugh WA.  2005.  Robust routing in malicious environment for ad hoc networks. Information Security Practice and Experience. :36-47.
Gou H, Swaminathan A, Wu M.  2007.  Robust scanner identification based on noise features. Proc. SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents IX. 6505:0S–0T-0S–0T.
Ji H, Fermüller C.  2009.  Robust Wavelet-Based Super-Resolution Reconstruction: Theory and Algorithm. IEEE Transactions on Pattern Analysis and Machine Intelligence. 31(4):649-660.
Black MJ, Fleet DJ, Yacoob Y.  2000.  Robustly estimating changes in image appearance. Computer Vision and Image Understanding. 78(1):8-31.
Zelkowitz MV, Cardenas S.  1991.  The role for executable specifications in system maintenance. Information Sciences. 57–58:347-359.
Chai J, Jimmy Lin, Zadrozny W, Ye Y, Stys-Budzikowska M, Horvath V, Kambhatla N, Wolf C.  2001.  The role of a natural language conversational interface in online sales: A case study. International Journal of Speech Technology. 4(3):285-295.
Allison D.  1999.  The Role of Children in the Design of New Technology. Saatavilla www-muodossa: ftp://ftp. cs. umd. edu/pub/hcil/Reports-Abstracts-Bibliography/99-23html/99-23. pdf (Luettu 17.1. 2007).
Liu Z, Jacobs DW, Basri R.  1999.  The role of convexity in perceptual completion: beyond good continuation. Vision Research. 39(25):4244-4257.
Fermüller C, Aloimonos Y.  1993.  The role of fixation in visual motion analysis. International Journal of Computer Vision. 11(2):165-186.
Stauder M, Huq A, Pezzati E, Grim CJ, Ramoino P, Pane L, Colwell RR, Pruzzo C, Vezzulli L.  2012.  Role of GbpA protein, an important virulence-related colonization factor, for Vibrio cholerae's survival in the aquatic environment. Environmental Microbiology Reports. (4):439-445.
Nahar S, Sultana M, Naser NM, Nair GB, Watanabe H, Ohnishi M, Yamamoto S, Endtz H, Cravioto A, Sack BR et al..  2012.  Role of Shrimp Chitin in the Ecology of Toxigenic Vibrio cholerae and Cholera Transmission. Frontiers in Microbiology. 2:260
Reggia JA.  1983.  The Role of Spatial Knowledge in Expert Systems. Representation and Processing of Spatial Knowledge, TR-1275. Dept. of Comp. sci „Univ. of Maryland, May. :3-8.
Bringaud F, Ghedin E, El-Sayed NM, Papadopoulou B.  2008.  Role of transposable elements in trypanosomatids. Microbes and Infection. 10(6):575-581.
Zelkowitz MV.  1993.  Role of verification in the software specification process. Advances in computers. 36:43-109.
De Magny G C, Mozumder PK, Grim CJ, Hasan NA, Naser NM, Alam M, Sack BR, Huq A, Colwell RR.  2011.  Role of Zooplankton Diversity in Vibrio Cholerae Population Dynamics and in the Incidence of Cholera in the Bangladesh Sundarbans. Applied and Environmental Microbiology. 77(17):6125-6132.
Yuan Y, Yang H, Wong SHY, Lu S, Arbaugh WA.  2005.  ROMER: resilient opportunistic mesh routing for wireless mesh networks. Proc. of IEEE WiMesh. 166
Anderson ML, Perlis D.  2005.  The roots of self-awareness. Phenomenology and the Cognitive Sciences. 4(3):297-333.
Lin CY, Wu M, Bloom JA, Cox IJ, Miller ML, Lui YM.  2000.  Rotation, scale, and translation resilient public watermarking for images. PROC SPIE INT SOC OPT ENG. 3971:90-98.
Lin C-Y, Wu M, Bloom JA, Cox IJ, Miller ML, Lui YM.  2001.  Rotation, scale, and translation resilient watermarking for images. Image Processing, IEEE Transactions on. 10(5):767-782.
Katz J, Koo CY.  2007.  Round-efficient secure computation in point-to-point networks. Advances in Cryptology-EUROCRYPT 2007. :311-328.
Von Matt U, Stewart G.W.  1996.  Rounding errors in solving block Hessenberg systems. Mathematics of Computation. 65(213):115-135.
Katz J, Vaikuntanathan V.  2011.  Round-optimal password-based authenticated key exchange. Theory of Cryptography. :293-310.

Pages