Publications

Export 7151 results:
Author [ Title(Asc)] Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
H
Mark R, Yaser Y, Larry D.  1994.  Human Emotion Recognition From Motion Using A Radial Basis Function Network Architecture. University Of Maryland.
Schwartz W R, Kembhavi A, Harwood D, Davis LS.  2009.  Human detection using partial least squares analysis. Computer Vision, 2009 IEEE 12th International Conference on. :24-31.
Abd-Almageed W, Davis LS.  2008.  Human detection using iterative feature selection and logistic principal component analysis. Robotics and Automation, 2008. ICRA 2008. IEEE International Conference on. :1691-1697.
Mittal A, Zhao L, Davis LS.  2003.  Human body pose estimation using silhouette shape analysis. Proceedings. IEEE Conference on Advanced Video and Signal Based Surveillance, 2003.. :263-270.
Shneiderman B.  1981.  Human Aspects of Computing Editor Control Flow and Data Structure Documentation: Two Experiments. Human factors in software development. :365-365.
Yu Y, Harwood D, Yoon K, Davis LS.  2007.  Human appearance modeling for matching across video sequences. Machine Vision and Applications. 18(3):139-149.
Ghanem NM, Davis LS.  2007.  Human Appearance Change Detection. Image Analysis and Processing, 2007. ICIAP 2007. 14th International Conference on. :536-541.
Morariu VI, Prasad VSN, Davis LS.  2007.  Human activity understanding using visibility context. IEEE/RSJ IROS Workshop: From sensors to human spatial concepts (FS2HSC).
Guerra-Filho G, Aloimonos Y.  2006.  Human activity language: Grounding concepts with a linguistic framework. Semantic Multimedia. :86-100.
Parameswaran V, Chellappa R.  2005.  Human action-recognition using mutual invariants. Computer Vision and Image Understanding. 98(2):294-324.
Dix J, Kuter U, Nau DS.  2002.  HTN Planning in Answer Set Programming. UMIACS-TR-2002-18
Sirin E, Parsia B, Wu D, Hendler J, Nau DS.  2004.  HTN planning for Web Service composition using SHOP2. Web Semantics: Science, Services and Agents on the World Wide Web. 1(4):377-396.
Zotkin DN, Hwang J, Duraiswami R, Davis LS.  2003.  HRTF personalization using anthropometric measurements. Applications of Signal Processing to Audio and Acoustics, 2003 IEEE Workshop on.. :157-160.
Farber A, Druin A, Chipman G, Julian D, Somashekhar S.  2002.  How young can our design partners be. Proceedings of the Participatory Design Conference. :272-277.
Ramanathan N, Chellappa R.  2009.  How would you look as you age ? Image Processing (ICIP), 2009 16th IEEE International Conference on. :53-56.
desJardins M.  1995.  How to succeed in graduate school: a guide for students and advisors: part II of II. Crossroads. 1(3):1-6.
desJardins M.  2008.  How to succeed in graduate school: a guide for students and advisors. Crossroads. 14(4):5-9.
desJardins M.  1994.  How to succeed in graduate school: a guide for students and advisors: part I of II. Crossroads. 1(2):3-9.
desJardins M.  1995.  How to succeed in graduate school: A guide for students and advisors. International Amateur-Professional Photoelectric Photometry Communications. 58:15-15.
Nirkhe M, Kraus S, Miller M, Perlis D.  1997.  How to (plan to) meet a deadline between now and then. Journal of Logic and Computation. 7(1):109-109.
Feamster N, Gao L, Rexford J.  2007.  How to lease the internet in your spare time. SIGCOMM Comput. Commun. Rev.. 37(1):61-64.
Kamara S, Katz J.  2008.  How to encrypt with a malicious random number generator. Fast Software Encryption. :303-315.
Chetty M, Sung J-Y, Grinter RE.  2007.  How Smart Homes Learn: The Evolution of the Networked Home and Household. UbiComp 2007: Ubiquitous Computing. :127-144.
Condon E, Cummins E, Afoulki Z, Cukier M.  2011.  How secure are networked office devices? :465-472.
Huang L, Aloimonos Y.  1994.  How normal flow constrains relative depth for an active observer. Image and vision computing. 12(7):435-445.

Pages