Conference Papers

Pages

Chang T-, Tom Yeh, Miller R. Associating the visual representation of user interfaces with their internal structures and metadata. In: Proceedings of the 24th annual ACM symposium on User interface software and technology. New York, NY, USA: ACM; 2011. 2. p. 245-256p. (UIST '11).
Albrecht M, Gentry C, Halevi S, Katz J. Attacking cryptographic schemes based on "perturbation polynomials". In: Proceedings of the 16th ACM conference on Computer and communications security. New York, NY, USA: ACM; 2009. 1. p. 1-10p. (CCS '09).
Zotkin DN, Keleher PJ, Perkovic D. Attacking the bottlenecks of backfilling schedulers. In: Cluster Computing.; 2000.
M. Wu, Liu B. Attacks on digital watermarks. In: Signals, Systems, and Computers, 1999. Conference Record of the Thirty-Third Asilomar Conference on. Vol 2.; 1999. 1. p. 1508-1512p. vol.p. 2-1508p. -1512 vol.2.
Haritaoglu I, Cozzi A, Koons D, Flickner M, Zotkin DN, Yacoob Y. Attentive toys. In: International Conference on Multimedia and Expo. Vol 22.; 2001. 2. p. 25.
Joo S-, Chellappa R. Attribute Grammar-Based Event Recognition and Anomaly Detection. In: Computer Vision and Pattern Recognition Workshop, 2006. CVPRW '06. Conference on.; 2006. 1. p. 107.
Lieberman MD, Sankaranarayanan J, Samet H, Sperling J. Augmenting spatio-textual search with an infectious disease ontology. In: Data Engineering Workshop, 2008. ICDEW 2008. IEEE 24th International Conference on.; 2008. 2. p. 266-269p.
Papamanthou C, Tamassia R, Triandopoulos N. Authenticated Hash Tables. In: CCS '08 Proceedings of the 15th ACM Conference on Computer and Communications Security . ACM; 2008. 4. p. 437-448p. (CCS '08).
Ramachandran AV, Feamster N. Authenticated out-of-band communication over social links. In: Proceedings of the first workshop on Online social networks. New York, NY, USA: ACM; 2008. 6. p. 61-66p. (WOSN '08).
Chow R, Jakobsson M, Masuoka R, Molina J, Niu Y, Elaine Shi, et al. Authentication in the clouds: a framework and its application to mobile users. ACM; 2010. 1. p. 1-6p. (CCSW '10).
Tamizi M, Weinstein M, Cukier M. Automated checking for Windows host vulnerabilities.; 2005. 1. 10 pp. -p. 148-10p. pp. -148.
Chung I-, Hollingsworth J. Automated cluster-based Web service performance tuning. In: 13th IEEE International Symposium on High performance Distributed Computing, 2004. Proceedings. IEEE; 2004. 3. p. 36-44p.
Petroni, Jr. NL, Hicks MW. Automated detection of persistent kernel control-flow attacks. In: Proceedings of the 14th ACM conference on Computer and communications security. New York, NY, USA: ACM; 2007. 1. p. 103-115p. (CCS '07).
Gu R, Piat J, Raulet M, Janneck JW, Bhattacharyya SS. Automated generation of an efficient MPEG-4 Reconfigurable Video Coding decoder implementation. In: 2010 Conference on Design and Architectures for Signal and Image Processing (DASIP).; 2010. 2. p. 265-272p.
Brooks PA, Memon AM. Automated gui testing guided by usage profiles. In: Proceedings of the twenty-second IEEE/ACM international conference on Automated software engineering. New York, NY, USA: ACM; 2007. 3. p. 333-342p. (ASE '07).
Arbaugh WA, Keromytis AD, Farber DJ, Smith JM. Automated recovery in a secure bootstrap process. In: Proceedings of the Symposium on Network and Distributed Systems Security (NDSS’98).; 1998. 1. p. 155-167p.
Sims S, Cleaveland R, Butts K, Ranville S. Automated Validation of Software Models. In: Automated Software Engineering, International Conference on. Los Alamitos, CA, USA: IEEE Computer Society; 2001. 9. p. 91.
Shneiderman B, Thomas G. Automatic database system conversion: schema revision, data translation, and source-to-source program transformation. In: Proceedings of the June 7-10, 1982, national computer conference. New York, NY, USA: ACM; 1982. 5. p. 579-587p. (AFIPS '82).
Zhu G, Doermann D. Automatic Document Logo Detection. In: The 9th International Conference on Document Analysis and Recognition (ICDAR 2007). Curitiba, Brazil; 2007. 8. p. 864-868p.
Li H, Doermann D. Automatic Identification of Text In Digital Video Key Frames. In: Proceedings of International Conference on Pattern Recognition.; 1998. 1. p. 129-132p.
O'Donovan AE, Duraiswami R, Zotkin DN. Automatic matched filter recovery via the audio camera. In: Acoustics Speech and Signal Processing (ICASSP), 2010 IEEE International Conference on.; 2010. 2. p. 2826-2829p.
Raykar VC, Duraiswami R. Automatic position calibration of multiple microphones. In: Acoustics, Speech, and Signal Processing, 2004. Proceedings. (ICASSP '04). IEEE International Conference on. Vol 4.; 2004. i. iv-p. 69-p. iv-72 vol.p. 4-p. iv-p. 69-p. iv-72 vol.4.
Zelkowitz MV. Automatic program analysis and evaluation. In: Proceedings of the 2nd international conference on Software engineering. Los Alamitos, CA, USA: IEEE Computer Society Press; 1976. 1. p. 158-163p. (ICSE '76).
Tabatabaee V, Hollingsworth J. Automatic software interference detection in parallel applications. In: Proceedings of the 2007 ACM/IEEE conference on Supercomputing. Reno, Nevada: ACM; 2007. 1. 14:p. 1-14p. :p. 12-14p. :p. 1-14p. :12. (SC '07).
Patel VM, Nasrabadi NM, Chellappa R. Automatic target recognition based on simultaneous sparse representation. In: Image Processing (ICIP), 2010 17th IEEE International Conference on.; 2010. 1. p. 1377-1380p.
Li H, Doermann D. Automatic Text Tracking In Digital Videos. In: Proceedings of IEEE 1998 Workshop on Multimedia Signal Processing.; 1998. 2. p. 21-26p.
Suh B, Ling H, Bederson BB, Jacobs DW. Automatic thumbnail cropping and its effectiveness. In: Proceedings of the 16th annual ACM symposium on User interface software and technology. New York, NY, USA: ACM; 2003. 9. p. 95-104p. (UIST '03).
Suh B, Ling H, Bederson BB, Jacobs DW. Automatic thumbnail cropping and its effectiveness. In: Proceedings of the 16th annual ACM symposium on User interface software and technology.; 2003. 9. p. 95-104p.
Oard D, Demner-Fushman D, Hajic J, Ramabhadran B, Gustman S, Byrne WJ, et al. Automatic transcription of Czech language oral history in the MALACH project: resources and initial experiments. In: Proceedings of the The 5th International Conference on Text, Speech and Dialogue.; 2002. 5. p. 57-64p.
Rao Y, Mundur P, Yesha Y. Automatic video summarization for wireless and mobile environments. In: 2004 IEEE International Conference on Communications. Vol 3. IEEE; 2004. 1. p. 1532-1536p. Vol.p. 3-1532p. - 1536 Vol.3.
Balch T, Khan Z, Veloso M. Automatically Tracking and Analyzing the Behavior of Live Insect Colonies. In: AGENTS '01 Proceedings of the Fifth International Conference on Autonomous Agents . ACM; 2001. 5. p. 521-528p. (AGENTS '01).
Broadwater J, Meth R, Chellappa R. Average relative radiance transform for subpixel detection. In: Geoscience and Remote Sensing Symposium, 2005. IGARSS '05. Proceedings. 2005 IEEE International. Vol 5.; 2005. 3. p. 3565-3568p.
Oh S, Hoogs A, Perera A, Cuntoor N, Chen C-, Lee J, et al. AVSS 2011 demo session: A large-scale benchmark dataset for event recognition in surveillance video. In: Advanced Video and Signal-Based Surveillance (AVSS), 2011 8th IEEE International Conference on.; 2011. 5. p. 527-528p.
Lee S, Levin D, Gopalakrishnan V, Bhattacharjee B. Backbone construction in selfish wireless networks. In: Proceedings of the 2007 ACM SIGMETRICS international conference on Measurement and modeling of computer systems. New York, NY, USA: ACM; 2007. 1. p. 121-132p. (SIGMETRICS '07).
Kim K, Chalidabhongse TH, Harwood D, Davis LS. Background modeling and subtraction by codebook construction. In: Image Processing, 2004. ICIP '04. 2004 International Conference on. Vol 5.; 2004. 3. p. 3061-3064p. Vol. p. 5-3061p. - 3064 Vol. 5.
Labrinidis A, Roussopoulos N. Balancing performance and data freshness in web database servers. In: Proceedings of the 29th international conference on Very large data bases-Volume 29.; 2003. 3. p. 393-404p.
Froehlich J, Wobbrock JO, Kane SK. Barrier pointing: using physical edges to assist target acquisition on mobile device touch screens. In: Proceedings of the 9th international ACM SIGACCESS conference on Computers and accessibility, October.; 2007. 1. p. 15-17p.
Zagoria R, Reggia JA, Price T, Banko M. Bayesian classification in medicine: The transferability question. In: Proceedings of the Fifth Annual Symposium on Computer Applications in Medical Care.; 1981. 2. p. 250-252p.
Chellappa R, Zhou S, Li B. Bayesian methods for face recognition from video. In: Acoustics, Speech, and Signal Processing (ICASSP), 2002 IEEE International Conference on. Vol 4.; 2002. I. IV-4068 -IV-p. 4071-p. IV-4068 -IV-4071.
Daumé H. Bayesian multitask learning with latent hierarchies. In: Proceedings of the Twenty-Fifth Conference on Uncertainty in Artificial Intelligence.; 2009. 1. p. 135-142p.
Daumé H, Marcu D. Bayesian query-focused summarization. In: Proceedings of the 21st International Conference on Computational Linguistics and the 44th annual meeting of the Association for Computational Linguistics. Stroudsburg, PA, USA: Association for Computational Linguistics; 2006. 3. p. 305-312p. (ACL-44).
Qian G, Chellappa R, Zheng Q. Bayesian structure from motion using inertial information. In: Image Processing. 2002. Proceedings. 2002 International Conference on. Vol 3.; 2002. I. III-p. 425-p. III-428 vol.p. 3-p. III-p. 425-p. III-428 vol.3.
Gupta P, Doermann D, DeMenthon D. Beam Search for Feature Selection in Automatic SVMDefect Classification. In: International Conference on Pattern Recognition.; 2002. 2. p. 212-215p.
Bilge L, Dumitras T. Before We Knew It: An Empirical Study of Zero-day Attacks in the Real World. In: CCS '12 Proceedings of the 2012 ACM conference on Computer and Communications Security. ACM; 2012. 8. p. 833-844p. (CCS '12).
Perdisci R, Lee W, Feamster N. Behavioral clustering of HTTP-based malware and signature generation using malicious network traces. In: Proceedings of the 7th USENIX conference on Networked systems design and implementation. Berkeley, CA, USA: USENIX Association; 2010. 2. p. 26. (NSDI'10).
Anand P, King J, Boyd-Graber J, Wagner E, Martell C, Oard D, et al. Believe Me—We Can Do This! Annotating Persuasive Acts in Blog Text. In: Workshops at the Twenty-Fifth AAAI Conference on Artificial Intelligence.; 2011.

Pages