Conference Papers
(Publications are listed alphabetically by title)
Pages
Computer-supported cooperative work (panel): is this REALLY a new field of research?. In: Proceedings of the SIGCHI/GI conference on Human factors in computing systems and graphics interface. New York, NY, USA: ACM; 1987. 2. p. 227-228p. (CHI '87).
Computing 3-D head orientation from a monocular image sequence. In: Automatic Face and Gesture Recognition, 1996., Proceedings of the Second International Conference on.; 1996. 2. p. 242-247p.
Computing diagnostic tests for incorrect processes. In: Proc. IFIP WG6. 1 12th Intl. Symp. on Protocol Specification, Testing, and Verification.; 1992. 2. p. 263-278p.
Computing nearest neighbors for moving points and applications to clustering. In: Proceedings of the tenth annual ACM-SIAM symposium on Discrete algorithms. Philadelphia, PA, USA: Society for Industrial and Applied Mathematics; 1999. 9. p. 931-932p. (SODA '99).
Computing the Tree of Life: Leveraging the Power of Desktop and Service Grids. In: Parallel and Distributed Processing Workshops and Phd Forum (IPDPSW), 2011 IEEE International Symposium on.; 2011. 1. p. 1896-1902p.
Computing with very weak random sources. In: , 35th Annual Symposium on Foundations of Computer Science, 1994 Proceedings. IEEE; 1994. 2. p. 264-275p.
Computing word-pair antonymy. In: Proceedings of the Conference on Empirical Methods in Natural Language Processing. Stroudsburg, PA, USA: Association for Computational Linguistics; 2008. 9. p. 982-991p. (EMNLP '08).
Concurrent transition and shot detection in football videos using Fuzzy Logic. In: Image Processing (ICIP), 2009 16th IEEE International Conference on.; 2009. 4. p. 4341-4344p.
Condensing image databases when retrieval is based on non-metric distances. In: Computer Vision, 1998. Sixth International Conference on.; 1998. 5. p. 596-601p.
Confidentiality-preserving rank-ordered search. In: Proceedings of the 2007 ACM workshop on Storage security and survivability. New York, NY, USA: ACM; 2007. 7. p. 7-12p. (StorageSS '07).
Configuration and representation of large-scale dataflow graphs using the dataflow interchange format. In: Proceedings of the IEEE Workshop on Signal Processing Systems, Banff, Canada.; 2006. 1. p. 10-15p.
Configuration Reasoning and Ontology For Web. In: IEEE International Conference on Services Computing, 2007. SCC 2007.; 2007. 3. p. 387-394p.
Connections between the lines: augmenting social networks with text. In: Proceedings of the 15th ACM SIGKDD international conference on Knowledge discovery and data mining. New York, NY, USA: ACM; 2009. 1. p. 169-178p. (KDD '09).
Consensus answers for queries over probabilistic databases. In: Proceedings of the twenty-eighth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems. New York, NY, USA: ACM; 2009. 2. p. 259-268p. (PODS '09).
Constant-time navigation in four-dimensional nested simplicial meshes. In: Shape Modeling Applications, 2004. Proceedings.; 2004. 2. p. 221-230p.
Constrained spectral clustering under a local proximity structure assumption. In: In Proceedings of the 18th International Conference of the Florida Artificial Intelligence Research Society (FLAIRS-05).; 2005.
Constraint Integration for Multiview Pose Estimation of Humans with Self-Occlusions. In: 3D Data Processing, Visualization, and Transmission, Third International Symposium on.; 2006. 9. p. 900-907p.
Constructing folksonomies by integrating structured metadata. In: Proceedings of the 19th international conference on World wide web. New York, NY, USA: ACM; 2010. 1. p. 1165-1166p. (WWW '10).
Constructing Folksonomies by Integrating Structured Metadata with Relational Clustering. In: Workshops at the Twenty-Fourth AAAI Conference on Artificial Intelligence.; 2010.
Constructing task visibility intervals for a surveillance system. In: Proceedings of the third ACM international workshop on Video surveillance & sensor networks. New York, NY, USA: ACM; 2005. 1. p. 141-148p. (VSSN '05).
Construction of an efficient overlay multicast infrastructure for real-time applications. In: INFOCOM 2003. Twenty-Second Annual Joint Conference of the IEEE Computer and Communications. IEEE Societies. Vol 2.; 2003. 1. p. 1521-1531p. vol.p. 2-1521p. - 1531 vol.2.
Contemporary domestic infrastructures and technology design. In: SIGCHI EA '09. ACM; 2009. 3. p. 3109-3112p. (CHI EA '09).
Content Features for Logical Document Labeling. In: Proc. SPIE Conference on Document Recognition and Retrieval X.; 2003. 1. p. 189-196p.
Content-based Image Retrieval Using Composite Features. In: Proceedings of the 1997 Scandinavian Conference on Image Analysis.; 1997. 3. p. 35-42p.
Content-based image retrieval using Fourier descriptors on a logo database. In: Pattern Recognition, 2002. Proceedings. 16th International Conference on. Vol 3.; 2002. 5. p. 521-524p. vol.p. 3-521p. - 524 vol.3.
Content-based search techniques for searching CAD databases. In: CAD Conference.; 2006.
Context and observation driven latent variable model for human pose estimation. In: Computer Vision and Pattern Recognition, 2008. CVPR 2008. IEEE Conference on.; 2008. 1. p. 1-8p.
Context-Aware and Content-Based Dynamic Voronoi Page Segmentation. In: The Nineth IAPRInternational Workshop on Document Analysis Systems.; 2010. 7. p. 73-80p.
Context-based message expansion for disentanglement of interleaved text conversations. In: Proceedings of Human Language Technologies: The 2009 Annual Conference of the North American Chapter of the Association for Computational Linguistics.; 2009. 2. p. 200-208p.
Contextual effects for version-consistent dynamic software updating and safe concurrent programming. In: Proceedings of the 35th annual ACM SIGPLAN-SIGACT symposium on Principles of programming languages. New York, NY, USA: ACM; 2008. 3. p. 37-49p. (POPL '08).
Continuous k-nearest neighbor queries for continuously moving points with updates. In: Proceedings of the 29th international conference on Very large data bases-Volume 29.; 2003. 5. p. 512-523p.
Contour migration: solving object ambiguity with shape-space visual guidance. In: IEEE/RSJ International Conference on Intelligent Robots and Systems, 2002. Vol 1. IEEE; 2002. 3. p. 330-335p. vol.p. 1-330p. - 335 vol.1.
Contour, orientation and motion. In: Proceedings: Image Understanding Workshop (Miami Beach, FL, December 9–10, 1985).; 1985. 1. p. 129-136p.
Contour-based 3D Face Modeling from a Monocular Video. In: Proceedings of the British Machine Vision Conference. British Machine Vision Association; 2004. 3. 39.p. 1-39p. .p. 10-39p. .p. 1-39p. .10.
Control and design of the spherical pointing motor. In: , 1993 IEEE International Conference on Robotics and Automation, 1993. Proceedings. IEEE; 1993. 6. p. 630-636p. vol.p. 2-630p. -636 vol.2.
Controlled search over compact state representations, in nondeterministic planning domains and beyond. Vol 21.; 2006. 1. p. 1638.
Controlled simplification of genus for polygonal models. In: Visualization '97., Proceedings.; 1997. 4. p. 403-410p.
Controlling communication in distributed planning using irrelevance reasoning. In: Proceedings of the fifteenth national/tenth conference on Artificial intelligence/Innovative applications of artificial intelligence. Menlo Park, CA, USA: American Association for Artificial Intelligence; 1998. 8. p. 868-874p. (AAAI '98/IAAI '98).
Controlling data in the cloud: outsourcing computation without outsourcing control. ACM; 2009. 8. p. 85-90p. (CCSW '09).
Converting high probability into nearly-constant time—with applications to parallel hashing. In: Proceedings of the twenty-third annual ACM symposium on Theory of computing.; 1991. 3. p. 307-316p.
Cooperative inquiry: developing new technologies for children with children. In: Proceedings of the SIGCHI conference on Human factors in computing systems: the CHI is the limit.; 1999. 5. p. 592-599p.
Cooperative peer groups in NICE. In: INFOCOM 2003. Twenty-Second Annual Joint Conference of the IEEE Computer and Communications. IEEE Societies. Vol 2.; 2003. 1. p. 1272-1282p. vol.p. 2-1272p. - 1282 vol.2.
Coordinated sensor deployment for improving secure communications and sensing coverage. In: Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks. New York, NY, USA: ACM; 2005. 1. p. 117-128p. (SASN '05).
Copilot - a coprocessor-based kernel runtime integrity monitor. In: Proceedings of the 13th conference on USENIX Security Symposium - Volume 13. San Diego, CA: USENIX Association; 2004. 1. p. 13. (SSYM'04).
Core semantics of multithreaded Java. In: Proceedings of the 2001 joint ACM-ISCOPE conference on Java Grande - JGI '01. Palo Alto, California, United States; 2001. 2. p. 29-38p.
Correcting Errors in Digital Lexicographic Resources Using a Dictionary Manipulation Language. In: Electronic lexicography in the 21st century: new applications for new users (eLEX2011).; 2011. 2. p. 297-301p.
Correctness properties for Internet routing. In: Allerton Conference on Communication, Control, and Computing.; 2005.
Cortical inhibition as explained by the competitive distribution hypothesis. In: Network models for control and processing.; 2000. 3. p. 31-62p.
COSI: Cloud Oriented Subgraph Identification in Massive Social Networks. In: Advances in Social Networks Analysis and Mining (ASONAM), 2010 International Conference on.; 2010. 2. p. 248-255p.