Publications

Export 7148 results:
[ Author(Asc)] Title Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
J
Zhuolin Jiang, Zhang G, Davis LS.  2012.  Submodular Dictionary Learning for Sparse Coding. IEEE conference on Computer Vision and Pattern Recognition.
Zhuolin Jiang, Lin Z, Davis LS.  2010.  A tree-based approach to integrated action localization, recognition and segmentation. ECCV Workshops.
Zhuolin Jiang, Li S-F, Gao D-F.  2007.  An adaptive mean shift tracking method using multiscale images. Wavelet Analysis and Pattern Recognition, 2007. ICWAPR '07. International Conference on. 3:1060-1066.
Zhuolin Jiang, Lin Z, Davis LS.  2012.  Recognizing Human Actions by Learning and Matching Shape-Motion Prototype Trees. Pattern Analysis and Machine Intelligence, IEEE Transactions on. 34(3):533-547.
Jia X-P, Peng H, Zheng Q-L, Zhuolin Jiang, Li Z.  2008.  A topic-based Document Correlation Model. Machine Learning and Cybernetics, 2008 International Conference on. 5:2487-2491.
Jia Z, Stewart G.W.  1999.  An analysis of the Rayleigh-Ritz method for approximating eigenspaces.
Ji H, Fermüller C.  2005.  Integration of motion fields through shape. IEEE Computer Society Conference on Computer Vision and Pattern Recognition, 2005. CVPR 2005. 2:663-669vol.2-663-669vol.2.
Ji H, Fermüller C.  2010.  Better Flow Estimation from Color Images-Volume 2007, Article ID 53912, 9 pages. EURASIP Journal on Advances in Signal Processing. 2007(23)
Ji H, Fermüller C.  2006.  Wavelet-Based Super-Resolution Reconstruction: Theory and Algorithm. Computer Vision – ECCV 2006Computer Vision – ECCV 2006. 3954:295-307.
Ji H, Fermüller C.  2006.  A 3D shape constraint on video. IEEE Transactions on Pattern Analysis and Machine Intelligence. 28(6):1018-1023.
Ji H, Fermüller C.  2007.  Better flow estimation from color images. EURASIP Journal on Advances in Signal Processing. 2007(1):133-133.
Ji H, Fermüller C.  2006.  Noise causes slant underestimation in stereo and motion. Vision Research. 46(19):3105-3120.
Ji H.  2006.  A holistic approach to structure from motion.
Ji H, Fermüller C.  2004.  Bias in Shape Estimation. Computer Vision - ECCV 2004Computer Vision - ECCV 2004. 3023:405-416.
Ji H, Fermüller C.  2009.  Robust Wavelet-Based Super-Resolution Reconstruction: Theory and Algorithm. IEEE Transactions on Pattern Analysis and Machine Intelligence. 31(4):649-660.
Ji H, Fermüller C.  2003.  Uncertainty in 3D shape estimation. ICCV Workshop on Statistical and Computational Theories of Vision.
Jeong IR, Katz J, Lee DH.  2004.  One-round protocols for two-party authenticated key exchange. Applied Cryptography and Network Security. :220-232.
Jensen CS, Mark L, Roussopoulos N.  1991.  Incremental implementation model for relational databases with transaction time. IEEE Transactions on Knowledge and Data Engineering. 3(4):461-473.
Jensen CS, Mark L, Roussopoulos N, Sells T.  1993.  Using differential technlques to efficiently support transaction time. The VLDB JournalVLDB Journal. 2(1):75-111.
Jeffrey SF.  1996.  CLP (SC): Implementation and efficiency considerations». Proceedings of the Workshop on Set Constraints, held in Conjunction with CP’96, Boston, Massachusetts.
Jategaonkar Jagadeesan L, Porter A, Puchol C, Ramming JC, Votta LG.  1998.  Specification-based Testing of Reactive Software: A Case Study in Technology Transfer. Journal of Systems and Software. 40(3):249-262.
James F, Lai J, Suhm B, Balentine B, Makhoul J, Nass C, Shneiderman B.  2002.  Getting real about speech: overdue or overhyped? CHI '02 extended abstracts on Human factors in computing systems. :708-709.
Jallad K, Katz J, Schneier B.  2002.  Implementation of chosen-ciphertext attacks against PGP and GnuPG. Information Security. :90-101.
Jakupciak JP, Colwell RR.  2009.  Biological agent detection technologies. Molecular Ecology Resources. 9(s1):51-57.
Jakobsson M, Elaine Shi, Golle P, Chow R.  2009.  Implicit authentication for mobile devices. :9-9.

Pages