Book Chapters
(Publications are listed alphabetically by title)
Pages
Probabilistic Human Recognition from Video. In: Heyden A, Sparr G, Nielsen M, Johansen P, editors. Computer Vision — ECCV 2002Computer Vision — ECCV 2002. Vol 2352. Springer Berlin / Heidelberg; 2002. 1. p. 173-183p. (Lecture Notes in Computer Science; vol 2352).
Probabilistic Ontologies and Relational Databases. In: Meersman R, Tari Z, editors. On the Move to Meaningful Internet Systems 2005: CoopIS, DOA, and ODBASEOn the Move to Meaningful Internet Systems 2005: CoopIS, DOA, and ODBASE. Vol 3760. Springer Berlin / Heidelberg; 2005. 1. p. 1-17p. (Lecture Notes in Computer Science; vol 3760).
Probabilistic Relational Models. In: Introduction to Statistical Relational LearningIntroduction to Statistical Relational Learning.; 2007. 1. p. 129.
Protocols in the use of empirical software engineering artifacts. In: Empirical Software EngineeringEmpirical Software Engineering. Vol 12. Springer; 2007. 1. p. 107-119p.
Quantitative Measurement of the Performance of Raster-to-vector Conversion Algorithms. In: Graphics Recognition: Methods and ApplicationsGraphics Recognition: Methods and Applications. Springer; 1996. 5. p. 57-68p.
Randomized Algorithms and Probabilistic Analysis in Wireless Networking. In: Hromkovic J, Královic R, Nunkesser M, Widmayer P, editors. Stochastic Algorithms: Foundations and ApplicationsStochastic Algorithms: Foundations and Applications. Vol 4665. Springer Berlin / Heidelberg; 2007. 5. p. 54-57p. (Lecture Notes in Computer Science; vol 4665).
Re-wiring Activity of Malicious Networks. In: Taft N, Ricciato F, editors. Passive and Active MeasurementPassive and Active Measurement. Vol 7192. Springer Berlin / Heidelberg; 2012. 1. p. 116-125p. (Lecture Notes in Computer Science; vol 7192).
Recognizing Faces Across Age Progression. In: Hammoud R, Abidi B, Abidi M, editors. Face Biometrics for Personal IdentificationFace Biometrics for Personal Identification. Springer Berlin Heidelberg; 2007. 2. p. 27-42p. (Signals and Communication Technology).
Regularization algorithms based on total least squares. In: Recent advances in total least squares techniques and errors-in-variables modeling (Leuven, 1996)Recent advances in total least squares techniques and errors-in-variables modeling (Leuven, 1996). Philadelphia, PA: SIAM; 1997. 1. p. 127-137p.
Regularization of Ill-Posed Problems in Image Restoration. In: Lewis JG, editor. Proceedings of the Fifth SIAM Conference on Applied Linear AlgebraProceedings of the Fifth SIAM Conference on Applied Linear Algebra. Philadelphia: SIAM Press; 1994. 1. p. 102-105p.
Regulating the Regulators: Modulators of Transcription Factor Activity. In: Ladunga I, editor. Computational Biology of Transcription Factor BindingComputational Biology of Transcription Factor Binding. Vol 674. Humana Press; 2010. 2. p. 297-312p. (Methods in Molecular Biology; vol 674).
Regulation of Cable Television. In: The Froehlich/Kent Encyclopedia of Telecommunications: Volume 15-Radio Astronomy to Submarine Cable SystemsThe Froehlich/Kent Encyclopedia of Telecommunications: Volume 15-Radio Astronomy to Submarine Cable Systems. Vol 15.; 1997. 8. p. 84.
Remote direct manipulation: A case study of a telemedicine workstation. In: Sparks of innovation in human-computer interactionSparks of innovation in human-computer interaction. Intellect Books; 1993. 5. p. 51.
Representing Unevenly-Spaced Time Series Data for Visualization and Interactive Exploration. In: Costabile M, Paternò F, editors. Human-Computer Interaction - INTERACT 2005Human-Computer Interaction - INTERACT 2005. Vol 3585. Springer Berlin / Heidelberg; 2005. 8. p. 835-846p. (Lecture Notes in Computer Science; vol 3585).
Resource-aware meta-computing. In: Zelkowits MV, editor. Emphasizing Distributed SystemsEmphasizing Distributed Systems. Vol Volume 53. Elsevier; 2000. 1. p. 109-169p.
Review of Classifier Combination Methods. In: Simone Marinai H F, editor. Studies in Computational Intelligence: Machine Learning in Document Analysis and RecognitionStudies in Computational Intelligence: Machine Learning in Document Analysis and Recognition. Springer; 2008. 3. p. 361-386p.
Robust Face Recognition in the Presence of Clutter. In: Kittler J, Nixon M, editors. Audio- and Video-Based Biometric Person AuthenticationAudio- and Video-Based Biometric Person Authentication. Vol 2688. Springer Berlin / Heidelberg; 2003. 1. p. 1062. (Lecture Notes in Computer Science; vol 2688).
Safe and Flexible Dynamic Linking of Native Code. In: Harper R, editor. Types in Compilation. Vol 2071. Springer Berlin / Heidelberg; 2001. 1. p. 147-176p. (Lecture Notes in Computer Science; vol 2071).
Scalable Resource Control in Active Networks. In: Yasuda H, editor. Active NetworksActive Networks. Vol 1942. Springer Berlin / Heidelberg; 2000. 3. p. 343-357p. (Lecture Notes in Computer Science; vol 1942).
Scheduling home control devices: a case study of the transition from the research project to a product. In: Sparks of innovation in human-computer interactionSparks of innovation in human-computer interaction. Intellect Books; 1993. 2. p. 205.
Scheduling on Unrelated Machines Under Tree-Like Precedence Constraints. In: Chekuri C, Jansen K, Rolim J, Trevisan L, editors. Approximation, Randomization and Combinatorial Optimization. Algorithms and TechniquesApproximation, Randomization and Combinatorial Optimization. Algorithms and Techniques. Vol 3624. Springer Berlin / Heidelberg; 2005. 6. p. 609. (Lecture Notes in Computer Science; vol 3624).
Secure Efficient Multiparty Computing of Multivariate Polynomials and Applications. In: Lopez J, Tsudik G, editors. Applied Cryptography and Network Security. Springer Berlin Heidelberg; 2011. 1. p. 130-146p. (Lecture Notes in Computer Science).
Securing Circuits against Constant-Rate Tampering. In: Safavi-Naini R, Canetti R, editors. Advances in Cryptology – CRYPTO 2012. Springer Berlin Heidelberg; 2012. 5. p. 533-551p. (Lecture Notes in Computer Science).
Seeing the World Through Image Libraries. In: The craft of information visualization: readings and reflectionsThe craft of information visualization: readings and reflections. Morgan Kaufmann Publishers Inc.; 2003. 4. p. 47.
Selective refinement on nested tetrahedral meshes. In: Geometric Modeling for Scientific VisualizationGeometric Modeling for Scientific Visualization. Birkhäuser; 2004. 3. p. 329-344p.
Semantic Video Content Analysis. In: Schonfeld D, Shan C, Tao D, Wang L, editors. Video Search and MiningVideo Search and Mining. Vol 287. Springer Berlin / Heidelberg; 2010. 1. p. 147-176p. (Studies in Computational Intelligence; vol 287).
Sentence Trimming and Selection: Mixing and Matching. In: DUC 06 Conference Proceedings. U.S. National Inst. of Standards and Technology; 2006.
Sequencing and Genome Assembly Using Next-Generation Technologies. In: Fenyö D, editor. Computational BiologyComputational Biology. Vol 673. Humana Press; 2010. 1. p. 1-17p. (Methods in Molecular Biology; vol 673).
Shape Matching for Foliage Database Retrieval. In: Semantic Mining Technologies for Multimedia DatabasesSemantic Mining Technologies for Multimedia Databases.; 2009. 1. p. 100.
Shotgun Sequence Assembly. In: Advances in ComputersAdvances in Computers. Vol Volume 60. Elsevier; 2004. 1. p. 193-248p.
Signatures of Correct Computation. In: Sahai A, editor. Theory of Cryptography. Springer Berlin Heidelberg; 2013. 2. p. 222-242p. (Lecture Notes in Computer Science).
Signatures of Reputation. In: Sion R, editor. Financial Cryptography and Data Security. Vol 6052. Springer Berlin / Heidelberg; 2010. 4. p. 400-407p. (Lecture Notes in Computer Science; vol 6052).
Silhouette-Based Approaches. In: Human Identification Based on GaitHuman Identification Based on Gait.; 2006. 4. p. 45-105p.
Simple, Black-Box Constructions of Adaptively Secure Protocols. In: Reingold O, editor. Theory of Cryptography. Springer Berlin Heidelberg; 2009. 3. p. 387-402p. (Lecture Notes in Computer Science).
Simultaneous estimation of viewing geometry and structure. In: Burkhardt H, Neumann B, editors. Computer Vision — ECCV'98Computer Vision — ECCV'98. Vol 1406. Springer Berlin / Heidelberg; 1998. 3. p. 342-358p. (Lecture Notes in Computer Science; vol 1406).
Social and psychological influences on computer user frustration. In: Media access: Social and psychological dimensions of new technology useMedia access: Social and psychological dimensions of new technology use.; 2004. 9. p. 91-103p.
Software defect reduction top 10 list. In: Foundations of empirical software engineering: the legacy of Victor R. Basili.; 2005. 4. p. 426.
Software reliability analysis of three successive generations of a Switching System. In: Echtle K, Hammer D, Powell D, editors. Dependable Computing — EDCC-1. Vol 852. Springer Berlin / Heidelberg; 1994. 4. p. 471-490p. (Lecture Notes in Computer Science; vol 852).
Some Themes in Gene H.Golub's Work on Iterative Methods. In: Golub GH, Greenbaum A, Luskin M, editors. Recent Advances in Iterative MethodsRecent Advances in Iterative Methods. Vol 60. New York: Springer-Verlag IMA Volumes in Mathematics and Its Applications; 1994. 1. p. 1-11p.
Spatiotemporal representations for visual navigation. In: Buxton B, Cipolla R, editors. Computer Vision — ECCV '96Computer Vision — ECCV '96. Vol 1064. Springer Berlin / Heidelberg; 1996. 6. p. 671-684p. (Lecture Notes in Computer Science; vol 1064).
Speeding Up Network Layout and Centrality Measures for Social Computing Goals. In: Salerno J, Yang S, Nau DS, Chai S-K, editors. Social Computing, Behavioral-Cultural Modeling and PredictionSocial Computing, Behavioral-Cultural Modeling and Prediction. Vol 6589. Springer Berlin / Heidelberg; 2011. 2. p. 244-251p. (Lecture Notes in Computer Science; vol 6589).
Starfield visualization with interactive smooth zooming. In: Visual database systems, IIIVisual database systems, III. Vol 3.; 1995. 1. p. 1.
Statistical Analysis on Manifolds and Its Applications to Video Analysis. In: Schonfeld D, Shan C, Tao D, Wang L, editors. Video Search and MiningVideo Search and Mining. Vol 287. Springer Berlin / Heidelberg; 2010. 1. p. 115-144p. (Studies in Computational Intelligence; vol 287).
Statistics Explains Geometrical Optical Illusions. In: Davis LS, editor. Foundations of Image UnderstandingFoundations of Image Understanding. Vol 628. Springer US; 2001. 4. p. 409-445p. (The Kluwer International Series in Engineering and Computer Science; vol 628).
Streaming Authenticated Data Structures. In: Johansson T, Nguyen PQ, editors. Advances in Cryptology – EUROCRYPT 2013. Springer Berlin Heidelberg; 2013. 3. p. 353-370p. (Lecture Notes in Computer Science).
Subjects Allied to Gait. In: Human Identification Based on GaitHuman Identification Based on Gait.; 2006. 5. p. 5-15p.
Tagged Sets: A Secure and Transparent Coordination Medium. In: Jacquet J-M, Picco G, editors. Coordination Models and LanguagesCoordination Models and Languages. Vol 3454. Springer Berlin / Heidelberg; 2005. 1. p. 193-205p. (Lecture Notes in Computer Science; vol 3454).
Technology-Mediated Social Participation: Deep Science and Extreme Technology. In: An A, Lingras P, Petty S, Huang R, editors. Active Media TechnologyActive Media Technology. Vol 6335. Springer Berlin / Heidelberg; 2010. 1. p. 1-4p. (Lecture Notes in Computer Science; vol 6335).
Temporal Visualization of Social Network Dynamics: Prototypes for Nation of Neighbors. In: Salerno J, Yang S, Nau DS, Chai S-K, editors. Social Computing, Behavioral-Cultural Modeling and PredictionSocial Computing, Behavioral-Cultural Modeling and Prediction. Vol 6589. Springer Berlin / Heidelberg; 2011. 3. p. 309-316p. (Lecture Notes in Computer Science; vol 6589).
TESTING EVENT-DRIVEN SOFTWARE–THE NEXT QA CHALLENGE?. In: Software Engineering and DevelopmentSoftware Engineering and Development. Nova Science Publishers, Inc.; 2009. 1. p. 187.