Publications

Export 7151 results:
Author Title [ Type(Asc)] Year
Conference Papers
Sundaresan A, Chellappa R.  2006.  Segmentation and Probabilistic Registration of Articulated Body Models. Pattern Recognition, 2006. ICPR 2006. 18th International Conference on. 2:92-96.
Zheng Y, Li H, Doermann D.  2002.  Segmentation and Identification of Handwriting in Noisy Documents. IAPRConference on Document Analysis System. :95-105.
Zhao L, Davis LS.  2005.  Segmentation and appearance model building from an image sequence. Image Processing, 2005. ICIP 2005. IEEE International Conference on. 1:I-321-4-I-321-4.
de Souza C, Froehlich J, Dourish P.  2005.  Seeking the source: software source code as a social and technical artifact. Proceedings of the 2005 international ACM SIGGROUP conference on Supporting group work. :197-206.
Garg R, Varna AL, M. Wu.  2011.  "Seeing" ENF: natural time stamp for digital video via optical sensing and signal processing. Proceedings of the 19th ACM international conference on Multimedia. :23-32.
Swaminathan A, Mao Y, M. Wu.  2005.  Security of feature extraction in image hashing. Acoustics, Speech, and Signal Processing, 2005. Proceedings. (ICASSP '05). IEEE International Conference on. 2:ii/1041-ii/1044Vol.2-ii/1041-ii/1044Vol.2.
Mao Y, M. Wu.  2006.  Security Issues in Cooperative Communications: Tracing Adversarial Relays. Acoustics, Speech and Signal Processing, 2006. ICASSP 2006 Proceedings. 2006 IEEE International Conference on. 4:IV-IV.
Mao Y, M. Wu.  2004.  Security evaluation for communication-friendly encryption of multimedia. Image Processing, 2004. ICIP '04. 2004 International Conference on. 1:569-572Vol.1-569-572Vol.1.
Lu W, Varna A, M. Wu.  2011.  Secure video processing: Problems and challenges. Acoustics, Speech and Signal Processing (ICASSP), 2011 IEEE International Conference on. :5856-5859.
Katz J, Malka L.  2010.  Secure text processing with applications to private DNA matching. Proceedings of the 17th ACM conference on Computer and communications security. :485-492.
Yuan Y, Arbaugh WA.  2003.  A secure service discovery protocol for MANET. 14th IEEE Proceedings on Personal, Indoor and Mobile Radio Communications, 2003. PIMRC 2003. 1:502-506Vol.1-502-506Vol.1.
Hicks MW, Keromytis AD, Smith JM.  2002.  A secure PLAN (extended version). DARPA Active NEtworks Conference and Exposition, 2002. Proceedings. :224-237.
Lu W, Varna AL, Swaminathan A, M. Wu.  2009.  Secure image retrieval through feature protection. Acoustics, Speech and Signal Processing, 2009. ICASSP 2009. IEEE International Conference on. :1533-1536.
Arbaugh WA, Farber DJ, Smith JM.  1997.  A secure and reliable bootstrap architecture. , 1997 IEEE Symposium on Security and Privacy, 1997. Proceedings. :65-71.
Pillai JK, Patel VM, Chellappa R, Ratha NK.  2010.  Sectored Random Projections for Cancelable Iris Biometrics. 2010 IEEE International Conference on Acoustics Speech and Signal Processing (ICASSP). :1838-1841.
Dumitras T, Neamtiu I, Tilevich E.  2009.  Second ACM Workshop on Hot Topics in Software Upgrades (HotSWUp 2009). :705-706.
Song Z, Roussopoulos N.  2003.  SEB-tree: An approach to index continuously moving objects. Mobile Data Management. :340-344.
Tom Yeh, Tollmar K, Darrell T.  2004.  Searching the web with mobile images for location recognition. Computer Vision and Pattern Recognition, 2004. CVPR 2004. Proceedings of the 2004 IEEE Computer Society Conference on. 2:76-81.
Oard D, Leuski A.  2003.  Searching recorded speech based on the temporal extent of topic labels. AAAI Spring Symposium on Intelligent Multimedia Knowledge Management.
Tom Yeh, Katz B.  2009.  Searching documentation using text, OCR, and image. Proceedings of the 32nd international ACM SIGIR conference on Research and development in information retrieval. :776-777.
Daumé H, Langford J, Marcu D.  2005.  Search-based structured prediction as classification. NIPS Workshop on Advances in Structured Learning for Text and Speech Processing, Whistler, Canada.
Song S, JaJa JF.  2009.  Search and Access Strategies for Web Archives. Proceedings of IS&T Archiving 2009.
Lu W, M. Wu.  2011.  Seam carving estimation using forensic hash. Proceedings of the thirteenth ACM multimedia workshop on Multimedia and security. :9-14.
Spring N, Wetherall D, Anderson T.  2003.  Scriptroute: A public Internet measurement facility. Proceedings of the 4th conference on USENIX Symposium on Internet Technologies and Systems-Volume 4. :17-17.
Sarcia S A, Basili VR, Cantone G.  2009.  Scope error detection and handling concerning software estimation models. Proceedings of the 2009 3rd International Symposium on Empirical Software Engineering and Measurement. :123-132.

Pages