Publications
Export 160 results:
[ Author] Title Type Year Filters: First Letter Of Last Name is J [Clear All Filters]
2012. Recognizing Human Actions by Learning and Matching Shape-Motion Prototype Trees. Pattern Analysis and Machine Intelligence, IEEE Transactions on. 34(3):533-547.
2009. Classic triangular mesh subdivision algorithm. Jisuanji Gongcheng/ Computer Engineering. 35(6):7-10.
2011. Learning a discriminative dictionary for sparse coding via label consistent K-SVD. Computer Vision and Pattern Recognition (CVPR), 2011 IEEE Conference on. :1697-1704.
2006. A Time Saving Method for Human Detection in Wide Angle Camera Images. Machine Learning and Cybernetics, 2006 International Conference on. :4029-4034.
2012. Class consistent k-means: Application to face and action recognition. Computer Vision and Image Understanding. 116(6):730-741.
2012. Submodular Dictionary Learning for Sparse Coding. IEEE conference on Computer Vision and Pattern Recognition.
2008. A topic-based Document Correlation Model. Machine Learning and Cybernetics, 2008 International Conference on. 5:2487-2491.
2005. Integration of motion fields through shape. IEEE Computer Society Conference on Computer Vision and Pattern Recognition, 2005. CVPR 2005. 2:663-669vol.2-663-669vol.2.
2006. A 3D shape constraint on video. IEEE Transactions on Pattern Analysis and Machine Intelligence. 28(6):1018-1023.
2004. Bias in Shape Estimation. Computer Vision - ECCV 2004Computer Vision - ECCV 2004. 3023:405-416.
2003. Uncertainty in 3D shape estimation. ICCV Workshop on Statistical and Computational Theories of Vision.
2006. Wavelet-Based Super-Resolution Reconstruction: Theory and Algorithm. Computer Vision – ECCV 2006Computer Vision – ECCV 2006. 3954:295-307.
2010. Better Flow Estimation from Color Images-Volume 2007, Article ID 53912, 9 pages. EURASIP Journal on Advances in Signal Processing. 2007(23)
2009. Robust Wavelet-Based Super-Resolution Reconstruction: Theory and Algorithm. IEEE Transactions on Pattern Analysis and Machine Intelligence. 31(4):649-660.
2007. Better flow estimation from color images. EURASIP Journal on Advances in Signal Processing. 2007(1):133-133.
2004. One-round protocols for two-party authenticated key exchange. Applied Cryptography and Network Security. :220-232.
1993. Using differential technlques to efficiently support transaction time. The VLDB JournalVLDB Journal. 2(1):75-111.
1991. Incremental implementation model for relational databases with transaction time. IEEE Transactions on Knowledge and Data Engineering. 3(4):461-473.
1996. CLP (SC): Implementation and efficiency considerations». Proceedings of the Workshop on Set Constraints, held in Conjunction with CP’96, Boston, Massachusetts.
1998. Specification-based Testing of Reactive Software: A Case Study in Technology Transfer. Journal of Systems and Software. 40(3):249-262.
2002. Getting real about speech: overdue or overhyped? CHI '02 extended abstracts on Human factors in computing systems. :708-709.
2002. Implementation of chosen-ciphertext attacks against PGP and GnuPG. Information Security. :90-101.