Export 161 results:
Author Title Type [ Year(Asc)]
Filters: First Letter Of Title is O  [Clear All Filters]
Zhai K, Boyd-Graber J.  2013.  Online Latent Dirichlet Allocation with Infinite Vocabulary. International Conference on Machine Learning. PDF icon 2013_icml_infvoc.pdf (985.1 KB)
J. Johnson I, Labich N, Might M, Van Horn D.  2013.  Optimizing Abstract Abstract Machines. arXiv:1211.3722 [cs].
Mozumder PK, Banu MA, Naser MN, Ali MS, Alam M, Sack RB, Colwell RR, Huq A.  2012.  Occurrence of protozoans & their limnological relationships in some ponds of Mathbaria, Bangladesh. University Journal of Zoology, Rajshahi University. 29(1):69-71.
Wei Z, JaJa JF.  2012.  An Optimized High-Throughput Strategy for Constructing Inverted Files. Parallel and Distributed Systems, IEEE Transactions on. PP(99):1-1.
Barrett C, Beckman R, Bisset K, Chen J, DuBois T, Eubank S, Kumar AVS, Lewis B, Marathe MV, Srinivasan A et al..  2012.  Optimizing epidemic protection for socially essential workers. Proceedings of the 2nd ACM SIGHIT International Health Informatics Symposium. :31-40.
Hwang H, Lauw HW, Getoor L, Ntoulas A.  2012.  Organizing User Search Histories. Knowledge and Data Engineering, IEEE Transactions on. 24(5):912-925.
Kim K, Davis LS.  2011.  Object Detection and Tracking for Intelligent Video Surveillance. Multimedia Analysis, Processing and Communications. :265-288.
Elaine Shi, Chan T, Stefanov E, Li M.  2011.  Oblivious RAM with O((logN)^3) Worst-Case Cost. Advances in Cryptology – ASIACRYPT 2011. 7073:197-214.
Hansen DL, Jacobs DW, Lewis D, Biswas A, Preece J, Rotman D, Stevens E.  2011.  Odd Leaf Out: Improving Visual Recognition with Games. Privacy, security, risk and trust (passat), 2011 ieee third international conference on and 2011 ieee third international conference on social computing (socialcom). :87-94.
Jain R, Doermann D.  2011.  Offline Writer Identification using K-Adjacent Segments. International Conference on Document Analysis and Recognition. :769-773.
Papamanthou C, Tamassia R, Triandopoulos N.  2011.  Optimal Verification of Operations on Dynamic Sets. Advances in Cryptology – CRYPTO 2011. :91-110.
Garain U, Paik J, Pal T, Majumder P, Doermann D, Oard D.  2011.  Overview of the FIRE 2011 RISOTTask. FIRE.
Bhattacharyya SS, Eker J, Janneck JW, Lucarz C, Mattavelli M, Raulet M.  2011.  Overview of the MPEG Reconfigurable Video Coding Framework. Journal of Signal Processing Systems. 63(2):251-263.
Tsaparas P, Papadimitriou P, Fuxman AD, Getoor L, Agrawal R.  2010.  Object Classification Using Taxonomies. 12/414,065
Ni J, Turaga P, M.Patel V, Chellappa R.  2010.  Object Dependent Manifold Priors for Image Deconvolution. Digital Image Processing and Analysis. :DMC2-DMC2.
Basili VR, Zelkowitz MV, Layman L, Dangle K, Diep M.  2010.  Obtaining valid safety data for software safety measurement and process improvement. Proceedings of the 2010 ACM-IEEE International Symposium on Empirical Software Engineering and Measurement. :46:1–46:4-46:1–46:4.
Grim CJ, Choi J, Chun J, Jeon Y-S, Taviani E, Hasan NA, Haley B, Huq A, Colwell RR.  2010.  Occurrence of the Vibrio cholerae seventh pandemic VSP-I island and a new variant. OMICS: A Journal of Integrative Biology. 14(1):1-7.
Niu Y, Elaine Shi, Chow R, Golle P, Jakobsson M.  2010.  One experience collecting sensitive mobile data.
Wu H, Sankaranarayanan AC, Chellappa R.  2010.  Online Empirical Evaluation of Tracking Algorithms. IEEE Transactions on Pattern Analysis and Machine Intelligence. 32(8):1443-1458.
Adelfio MD, Lieberman MD, Samet H, Firozvi KA.  2010.  Ontuition: intuitive data exploration via ontology navigation. Proceedings of the 18th SIGSPATIAL International Conference on Advances in Geographic Information Systems. :540-541.
Papamanthou C, Tamassia R, Triandopoulos N.  2010.  Optimal Authenticated Data Structures with Multilinear Forms. Pairing-Based Cryptography - Pairing 2010. :246-264.
Wei Z, JaJa JF.  2010.  Optimization of linked list prefix computations on multithreaded GPUs using CUDA. Parallel Distributed Processing (IPDPS), 2010 IEEE International Symposium on. :1-8.
Feamster N.  2010.  Outsourcing home network security. Proceedings of the 2010 ACM SIGCOMM workshop on Home networks. :37-42.
Brakerski Z, Kalai YT, Katz J, Vaikuntanathan V.  2010.  Overcoming the Hole in the Bucket: Public-Key Cryptography Resilient to Continual Memory Leakage. Foundations of Computer Science (FOCS), 2010 51st Annual IEEE Symposium on. :501-510.
Chalfoun J, Cardone A, Dima AA, Allen DP, Halter MW.  2010.  Overlap-based cell tracker. The Journal of Research of the National Institute of Standards and Technology. 115(6)