Publications

Export 7151 results:
Author Title [ Type(Desc)] Year
Journal Articles
Last M, Luta G, Orso A, Porter A, Young S.  2008.  Pooled ANOVA. Computational Statistics & Data Analysis. 52(12):5215-5228.
Park S, O'Leary DP.  2010.  Portfolio Selection Using Tikhonov Filtering to Estimate the Covariance Matrix. SIAM Journal on Financial Mathematics. 1:932-961.
Chellappa R, Aggarwal G.  2008.  Pose and Illumination Issues in Face-and Gait-Based Identification. Advances in Biometrics. :307-322.
Yue Z, Zhao W, Chellappa R.  2007.  Pose-Encoded Spherical Harmonics for Face Recognition and Synthesis Using a Single Image. EURASIP Journal on Advances in Signal Processing. 2008(1):748483-748483.
Lin Z, Davis LS.  2008.  A pose-invariant descriptor for human detection and segmentation. Computer Vision–ECCV 2008. :423-436.
Yue Z, Chellappa R.  2004.  Pose-normailzed view synthesis of a symmetric object using a single image. Proceedings of the 6th Asian Conference on Computer Vision (ACCV'04). :915-920.
Yue Z, Chellappa R.  2005.  Pose-normalized view synthesis from silhouettes. IEEE Intl. Conf. on Acoustics, Speech, and Signal Processing (ICASSP).
Vardhanabhuti S, Wang J, Hannenhalli S.  2007.  Position and distance specificity are important determinants of cis-regulatory motifs in addition to evolutionary conservation. Nucleic Acids Research. 35(10):3203-3213.
Eaton C, Memon AM.  2008.  Position Paper: Improving Browsing Environment Compliance Evaluations for Websites. Relation. 10(1.14):6113-6113.
Hannenhalli S, Feldman W, Lewis HF, Skiena SS, Pevzner PA.  1996.  Positional sequencing by hybridization. Computer applications in the biosciences : CABIOS. 12(1):19-24.
Lin Z, Davis LS, Doermann D, DeMenthon D.  2007.  Poster Session 5: Matching and Registration-Simultaneous Appearance Modeling and Segmentation for Matching People Under Occlusion. Lecture Notes in Computer Science. 4844:404-413.
Bhattacharjee B, Calvert K, Griffioen J, Spring N, Sterbenz JPG.  2006.  Postmodern internetwork architecture. ITTC-FY2006-TR-45030-01, Information and Telecommunication Center, The University of Kansas.
Navlakha S, Kingsford C.  2010.  The power of protein interaction networks for associating genes with diseases. Bioinformatics. 26(8):1057-1057.
Hajiaghayi MT, Immorlica N, Mirrokni VS.  2007.  Power optimization in fault-tolerant topology control algorithms for wireless multi-hop networks. IEEE/ACM Transactions on Networking (TON). 15(6):1345-1358.
Stewart G.W.  2003.  On the powers of a matrix with perturbations. Numerische Mathematik. 96(2):363-376.
Khan Z, Bloom JS, Kruglyak L, Singh M.  2009.  A practical algorithm for finding maximal exact matches in large sequence datasets using sparse suffix arrays. Bioinformatics. 25(13):1609-1616.
Bhat G, Cleaveland R, L\üttgen G.  1999.  A practical approach to implementing real-time semantics. Annals of Software Engineering. 7(1):127-155.
Mount D, Netanyahu NS, Romanik K, Silverman R, Wu AY.  2007.  A practical approximation algorithm for the LMS line estimator. Computational Statistics & Data Analysis. 51(5):2461-2486.
Neamtiu I, Hicks MW, Stoyle G, Oriol M.  2006.  Practical dynamic software updating for C. SIGPLAN Not.. 41(6):72-83.
Huang Y, Feamster N, Teixeira R.  2008.  Practical issues with using network tomography for fault diagnosis. SIGCOMM Comput. Commun. Rev.. 38(5):53-58.
Bader DA, Helman DR, JaJa JF.  1996.  Practical parallel algorithms for personalized communication and integer sorting. Journal of Experimental Algorithmics (JEA). 1
Feamster N.  2004.  Practical verification techniques for wide-area routing. SIGCOMM Comput. Commun. Rev.. 34(1):87-92.
Sen P, Deshpande A, Getoor L.  2009.  PrDB: managing and exploiting rich correlations in probabilistic databases. The VLDB Journal. 18(5):1065-1090.
Elman H, Schultz MH.  1986.  Preconditioning by Fast Direct Methods for Nonself-Adjoint Nonseparable Elliptic Equations. SIAM Journal on Numerical Analysis. 23(1):44-57.
Elman H.  1999.  Preconditioning for the steady-state Navier-Stokes equations with low viscosity. SIAM Journal on Scientific Computing. 20(4):1299-1316.

Pages