Publications

Export 7148 results:
[ Author(Asc)] Title Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
W
M. Wu, Liu B.  2001.  Watermarking scheme for image authentication. (6285775)
Wu X, M. Wu.  2002.  A recognition algorithm for Chinese characters in diverse fonts. Image Processing. 2002. Proceedings. 2002 International Conference on. 3:981-984vol.3-981-984vol.3.
Wu M.  2003.  Joint security robustness enhancement for quantization embedding. Image Processing, 2003. ICIP 2003. Proceedings. 2003 International Conference on. 2:II-483-6vol.3-II-483-6vol.3.
Wu M, Taylor EM, Martin, M.P.  2005.  Assessment of STBLI DNS data and comparison against experiments. AIAA paper.
Wu H, Chellappa R, Sankaranarayanan AC, Zhou SK.  2007.  Robust Visual Tracking Using the Time-Reversibility Constraint. Computer Vision, 2007. ICCV 2007. IEEE 11th International Conference on. :1-8.
M. Wu, Fridrich J, Goljan M, Gou H.  2005.  Handling uneven embedding capacity in binary images: a revisit. Proceedings of SPIE. 5681(1):194-205.
Wu PF, Preece J, Shneiderman B, Jaeger PT, Qu Y.  2007.  Community response grids for older adults: Motivations, usability, and sociability. Proceedings of the 13th Americas Conference on Information Systems.
M. Wu, Mao Y, Swaminathan A.  2007.  A Signal Processing and Randomization Perspective of Robust and Secure Image Hashing. Statistical Signal Processing, 2007. SSP '07. IEEE/SP 14th Workshop on. :166-170.
Wu D, Parsia B, Sirin E, Hendler J, Nau DS.  2003.  Automating DAML-S Web Services Composition Using SHOP2. The Semantic Web - ISWC 2003. 2870:195-210.
Wu S, Gong L, Rand W, Raschid L.  2012.  Making Recommendations in a Microblog to Improve the Impact of a Focal User. 6th ACM Conference on Recommender Systems (RecSys).
Wu M, Martin, M.P.  2006.  New DNS results of shockwave/turbulent boundary layer interaction. 3rd AIAA Flow Control Conference.
Wu M, Yu H, Gelman A.  1999.  Multi-level data hiding for digital image and video. SPIE Photonics East’99.
M. Wu, Tang E, Lin B.  2000.  Data hiding in digital binary image. Multimedia and Expo, 2000. ICME 2000. 2000 IEEE International Conference on. 1:393-396vol.1-393-396vol.1.
M. Wu, Liu B.  1998.  Watermarking for image authentication. Image Processing, 1998. ICIP 98. Proceedings. 1998 International Conference on. 2:437-441vol.2-437-441vol.2.
Wu W, Niles EG, El-Sayed NM, Berriman M, LoVerde PT.  2006.  Schistosoma mansoni (Platyhelminthes, Trematoda) nuclear receptors: Sixteen new members and a novel subfamily. Gene. 366(2):303-315.
Wu Y, Oard D, Soboroff I.  2006.  An exploratory study of the W3C mailing list test collection for retrieval of emails with pro/con arguments. Proceedings of the Third Conference on Email and Anti-Spam, Mountain View, CA, July.
Wu M.  2003.  Joint security and robustness enhancement for quantization based data embedding. Circuits and Systems for Video Technology, IEEE Transactions on. 13(8):831-841.
Wu H, Sankaranarayanan AC, Chellappa R.  2007.  In Situ Evaluation of Tracking Algorithms Using Time Reversed Chains. Computer Vision and Pattern Recognition, 2007. CVPR '07. IEEE Conference on. :1-8.
M. Wu, Craver S, Felten EW, Liu B.  2001.  Analysis of attacks on SDMI audio watermarks. Acoustics, Speech, and Signal Processing, 2001. Proceedings. (ICASSP '01). 2001 IEEE International Conference on. 3:1369-1372vol.3-1369-1372vol.3.
Wu J S-C, Sussman A.  2007.  Taking Advantage of Collective Operation Semantics for Loosely Coupled Simulations. Parallel and Distributed Processing Symposium, International. :128-128.
M. Wu, Liu B.  2004.  Data hiding in binary image for authentication and annotation. Multimedia, IEEE Transactions on. 6(4):528-538.
Wu H, Irizarry RA, Corrada Bravo H.  2010.  Intensity normalization improves color calling in SOLiD sequencing. Nat MethNat Meth. 7(5):336-337.
Wu PF, Qu Y, Preece J, Fleischmann K, Golbeck J, Jaeger P, Shneiderman B.  2008.  Community response grid (CRG) for a university campus: Design requirements and implications. Proceedings of the 5th International ISCRAM Conference. :34-43.
M. Wu, Joyce RA, Wong H-S, Guan L, Kung S-Y.  2001.  Dynamic resource allocation via video content and short-term traffic statistics. Multimedia, IEEE Transactions on. 3(2):186-199.
M. Wu, Gou H.  2010.  Method for concealing data in curves of an image. : 11/221,727(7817817)

Pages