Publications

Export 7148 results:
[ Author(Asc)] Title Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
T
Tahmoush D, Samet H.  2007.  A web collaboration system for content-based image retrieval of medical images. Proceedings of SPIE–Medical Imaging. 6516
Tahmoush D, Samet H.  2010.  A Web Database for Computer-Aided Detection and Diagnosis of Medical Images. Digital Mammography. :265-272.
Tahmoush D, Samet H.  2007.  A new database for medical images and information. Proceedings of SPIE-Medical Imaging.
Taheri S, Turaga P, Chellappa R.  2011.  Towards view-invariant expression analysis using analytic shape manifolds. 2011 IEEE International Conference on Automatic Face & Gesture Recognition and Workshops (FG 2011). :306-313.
Tagamets MA, Reggia JA.  1989.  A data flow implementation of a competition-based connectionist model* 1. Journal of Parallel and Distributed Computing. 6(3):704-714.
Tagamets MA, Horwitz B, Reggia JA.  1995.  A large-scale neural model linking local neuronal dynamics to positron emission tomography (PET) regional cerebral blood ffow (rCBF) data. Soc Neurosci Abstr. 21:1988-1988.
Tabatabaee V, Bhattacharjee B, La RJ, Shayman MA.  2005.  Differentiated traffic engineering for QoS provisioning. INFOCOM 2005. 24th Annual Joint Conference of the IEEE Computer and Communications Societies. Proceedings IEEE. 4:2349-2359vol.4-2349-2359vol.4.
Tabatabaee V, Hollingsworth J.  2007.  Automatic software interference detection in parallel applications. Proceedings of the 2007 ACM/IEEE conference on Supercomputing. :14:1–14:12-14:1–14:12.
Tabatabaee V, Kashyap A, Bhattacharjee B, La RJ, Shayman MA.  2007.  Robust Routing with Unknown Traffic Matrices. INFOCOM 2007. 26th IEEE International Conference on Computer Communications. IEEE. :2436-2440.
Tabatabaee V, Tiwari A, Hollingsworth J.  2005.  Parallel Parameter Tuning for Applications with Performance Variability. Proceedings of the 2005 ACM/IEEE conference on Supercomputing. :57–-57–.
S
Sykes F, Tillman RT, Shneiderman B.  1983.  The effect of scope delimiters on program comprehension. Software: Practice and Experience. 13(9):817-824.
Swamy N, Corcoran BJ, Hicks MW.  2008.  Fable: A Language for Enforcing User-defined Security Policies. IEEE Symposium on Security and Privacy, 2008. SP 2008. :369-383.
Swamy N, Hicks MW.  2008.  Verified enforcement of automaton-based information release policies. Proceedings of the 2008 Workshop on Programming Languages and Analysis for Security. ACM Press.
Swamy N, Hicks MW, Bierman GM.  2009.  A theory of typed coercions and its applications. Proceedings of the 14th ACM SIGPLAN international conference on Functional programming. :329-340.
Swamy N, Hicks MW, Morrisett G, Grossman D, Jim T.  2006.  Safe manual memory management in Cyclone. Science of Computer Programming. 62(2):122-144.
Swamy N, Hicks MW.  2009.  Verified enforcement of stateful information release policies. SIGPLAN Not.. 43(12):21-31.
Swamy N, Guts N, Leijen D, Hicks MW.  2011.  Lightweight monadic programming in ML. Proceedings of the 16th ACM SIGPLAN international conference on Functional programming. :15-27.
Swamy N, Hicks MW, Tse S, Zdancewic S.  2006.  Managing policy updates in security-typed languages. 19th IEEE Computer Security Foundations Workshop, 2006. :13pp.-216-13pp.-216.
Swamy N, Hicks MW, Tsang S.  2007.  Verified Enforcement of Security Policies for Cross-Domain Information Flows. IEEE Military Communications Conference, 2007. MILCOM 2007. :1-7.
Swaminathan A, Wu M, Liu KJR.  2007.  Intrinsic fingerprints for image authentication and steganalysis. Proc. SPIE Conf. Security, Steganography, Watermarking of Multimedia Contents.
Swaminathan A, M. Wu, Liu KJR.  2007.  A Component Estimation Framework for Information Forensics. Multimedia Signal Processing, 2007. MMSP 2007. IEEE 9th Workshop on. :397-400.
Swaminathan A, Mao Y, M. Wu.  2005.  Security of feature extraction in image hashing. Acoustics, Speech, and Signal Processing, 2005. Proceedings. (ICASSP '05). IEEE International Conference on. 2:ii/1041-ii/1044Vol.2-ii/1041-ii/1044Vol.2.
Swaminathan A, M. Wu, Liu KJR.  2007.  Nonintrusive component forensics of visual sensors using output images. Information Forensics and Security, IEEE Transactions on. 2(1):91-106.
Swaminathan A, Mao Y, Su G-M, Gou H, Varna AL, He S, M. Wu, Oard D.  2010.  System and Method for Confidentiality-Preserving Rank-Ordered Search. 12/608,724
Swaminathan A, M. Wu, Liu KJR.  2006.  Non-Intrusive Forensic Analysis of Visual Sensors Using Output Images. Acoustics, Speech and Signal Processing, 2006. ICASSP 2006 Proceedings. 2006 IEEE International Conference on. 5:V-V.

Pages