Publications

Export 7151 results:
Author [ Title(Asc)] Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
S
Yacoob Y, Davis LS.  2009.  Segmentation using appearance of mesostructure roughness. International journal of computer vision. 83(3):248-273.
Yacoob Y, Davis LS.  2006.  Segmentation of planar objects and their shadows in motion sequences. International journal of computer vision. 67(1):53-69.
Kumar J, Kang L, Doermann D, Abd-Almageed W.  2011.  Segmentation of Handwritten Textlines in Presence of Touching Components. Intl. Conf. on Document Analysis and Recognition (ICDAR 11). :109-113.
Cardone A, Chalfoun J, Peskin A, Bajcsy P, Kociolek M, Bhadriraju K, Brady M.  2015.  Segmentation and sub-cellular feature-based analysis of microscopy images. BioImage Informatics Conference .
Sundaresan A, Chellappa R.  2006.  Segmentation and Probabilistic Registration of Articulated Body Models. Pattern Recognition, 2006. ICPR 2006. 18th International Conference on. 2:92-96.
Zheng Y, Li H, Doermann D.  2002.  Segmentation and Identification of Handwriting in Noisy Documents. IAPRConference on Document Analysis System. :95-105.
Zhao L, Davis LS.  2005.  Segmentation and appearance model building from an image sequence. Image Processing, 2005. ICIP 2005. IEEE International Conference on. 1:I-321-4-I-321-4.
Roussopoulos N, Yeh RT.  1985.  SEES—A Software testing Environment Support System. IEEE Transactions on Software Engineering. SE-11(4):355-366.
de Souza C, Froehlich J, Dourish P.  2005.  Seeking the source: software source code as a social and technical artifact. Proceedings of the 2005 international ACM SIGGROUP conference on Supporting group work. :197-206.
North C, Shneiderman B, Plaisant C, Kang H, Bederson BB.  2003.  Seeing the World Through Image Libraries. The craft of information visualization: readings and reflectionsThe craft of information visualization: readings and reflections. :47-47.
Garg R, Varna AL, M. Wu.  2011.  "Seeing" ENF: natural time stamp for digital video via optical sensing and signal processing. Proceedings of the 19th ACM international conference on Multimedia. :23-32.
Aloimonos Y, Fermüller C, Rosenfeld A.  1995.  Seeing and understanding: representing the visual world. ACM Comput. Surv.. 27(3):307-309.
Jiwnani K, Zelkowitz MV.  2002.  Security Testing using a Susceptibility Matrix. International Symposioum on Software Reliability Engineering. 13
Swaminathan A, Mao Y, M. Wu.  2005.  Security of feature extraction in image hashing. Acoustics, Speech, and Signal Processing, 2005. Proceedings. (ICASSP '05). IEEE International Conference on. 2:ii/1041-ii/1044Vol.2-ii/1041-ii/1044Vol.2.
Mishra A, Petroni Jr NL, Arbaugh WA, Fraser T.  2004.  Security issues in IEEE 802.11 wireless local area networks: a survey. Wireless Communications and Mobile Computing. 4(8):821-833.
Mao Y, M. Wu.  2006.  Security Issues in Cooperative Communications: Tracing Adversarial Relays. Acoustics, Speech and Signal Processing, 2006. ICASSP 2006 Proceedings. 2006 IEEE International Conference on. 4:IV-IV.
Arbaugh WA, Davin JR, Farber DJ, Smith JM.  1998.  Security for virtual private intranets. Computer. 31(9):48-55.
Mao Y, M. Wu.  2004.  Security evaluation for communication-friendly encryption of multimedia. Image Processing, 2004. ICIP '04. 2004 International Conference on. 1:569-572Vol.1-569-572Vol.1.
Lu W, Varna AL, Wu M.  2010.  Security analysis for privacy preserving search of multimedia. Image Processing (ICIP). :26-29.
Ramachandran A, Mundada Y, Tariq MB, Feamster N.  2008.  Securing enterprise networks using traffic tainting. Special Interest Group on Data Communication.
Dachman-Soled D, Kalai YTauman.  2012.  Securing Circuits against Constant-Rate Tampering. Advances in Cryptology – CRYPTO 2012. :533-551.
Lu W, Varna A, M. Wu.  2011.  Secure video processing: Problems and challenges. Acoustics, Speech and Signal Processing (ICASSP), 2011 IEEE International Conference on. :5856-5859.
Katz J, Malka L.  2010.  Secure text processing with applications to private DNA matching. Proceedings of the 17th ACM conference on Computer and communications security. :485-492.
Yuan Y, Arbaugh WA.  2003.  A secure service discovery protocol for MANET. 14th IEEE Proceedings on Personal, Indoor and Mobile Radio Communications, 2003. PIMRC 2003. 1:502-506Vol.1-502-506Vol.1.
Katz J.  2004.  Secure routing in ad hoc networks. Workshop on Security of ad hoc and Sensor Networks: Proceedings of the 2 nd ACM workshop on Security of ad hoc and sensor networks.

Pages