Export 366 results:
[ Author(Asc)] Title Type Year
Filters: First Letter Of Last Name is L  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
L\üttgen G, Von Der Beeck M, Cleaveland R.  2000.  A compositional approach to statecharts semantics. 25
Lymberopoulos D, Ogale AS, Savvides A, Aloimonos Y.  2006.  A sensory grammar for inferring behaviors in sensor networks. Proceedings of the 5th international conference on Information processing in sensor networks. :251-259.
Lychev R, Feamster N.  2009.  Designing Enforceable Network Contracts. GT-CS-09-02
Luo W, Wu M, Huang J.  2008.  Mpeg recompression detection based on block artifacts. Proc. of SPIE Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents. 6819
Martineau J, Mokashi R, Chapman D, Grasso M, Brady M, Yesha Y, Yesha Y, Cardone A, Dima A.  2012.  Sub-cellular feature detection and automated extraction of collocalized actin and myosin regions. the 2nd ACM SIGHIT symposiumProceedings of the 2nd ACM SIGHIT symposium on International health informatics - IHI '12. :399.
Luo Y, Duraiswami R.  2008.  Canny edge detection on NVIDIA CUDA. Computer Vision and Pattern Recognition Workshops, 2008. CVPRW '08. IEEE Computer Society Conference on. :1-8.
Luo M, DeMenthon D, Yu X, Doermann D.  2006.  SOFTCBIR: Object Searching in Videos Combining Keypoint Matching and Graduated Assignment. LAMP-TR-132,CAR-TR-1013,CS-TR-4804,UMIACS-TR-2006-25
Luo Y, Duraiswami R.  2011.  EFFICIENT PARALLEL NON-NEGATIVE LEAST SQUARES ON MULTI-CORE ARCHITECTURES. SIAM Journal on Scientific Computing. 33(5):2848-2863.
Luo M, DeMenthon D, Doermann D.  2004.  Shot boundary detection based on Image correlation features in video. TREC-VID: Text Retrieval and Evaluation Conference.
Lumezanu C, Baden R, Spring N, Bhattacharjee B.  2009.  Triangle inequality variations in the internet. Proceedings of the 9th ACM SIGCOMM conference on Internet measurement conference. :177-183.
Lumezanu C, Spring N, Bhattacharjee B.  2006.  Decentralized message ordering for publish/subscribe systems. Proceedings of the ACM/IFIP/USENIX 2006 International Conference on Middleware. :162-179.
Lumezanu C, Spring N.  2008.  Measurement Manipulation and Space Selection in Network Coordinates. Distributed Computing Systems, International Conference on. :361-368.
Lumezanu C, Guo K, Spring N, Bhattacharjee B.  2010.  The effect of packet loss on redundancy elimination in cellular wireless networks. Proceedings of the 10th annual conference on Internet measurement. :294-300.
Lumezanu C, Baden R, Levin D, Spring N, Bhattacharjee B.  2009.  Symbiotic relationships in internet routing overlays. Proceedings of the 6th USENIX symposium on Networked systems design and implementation. :467-480.
Lumezanu C, Levin D, Spring N.  2007.  PeerWise discovery and negotiation of faster paths. Proc. Workshop on Hot Topics in Networks (HotNets).
Lumezanu C, Levin D, Han B, Spring N, Bhattacharjee B.  2010.  Don't love thy nearest neighbor. Proceedings of the 9th international conference on Peer-to-peer systems. :5-5.
Lumezanu C, Baden R, Spring N, Bhattacharjee B.  2009.  Triangle Inequality and Routing Policy Violations in the Internet. Passive and Active Network MeasurementPassive and Active Network Measurement. 5448:45-54.
Lumezanu C, Feamster N, Klein H.  2012.  #bias: Measuring the Tweeting Behavior of Propagandists. Sixth International AAAI Conference on Weblogs and Social Media.
Luebke D, Watson B, Cohen JD, Reddy M, Varshney A.  2002.  Level of Detail for 3D Graphics.
Lücke C, Fushman D, Ludwig C, Hamilton JA, Sacchettini JC, Rüterjans H.  1999.  A comparative study of the backbone dynamics of two closely related lipid binding proteins: Bovine heart fatty acid binding protein and porcine ileal lipid binding protein. Molecular and Cellular Biochemistry. 192(1):109-121.
Lu W, Varna AL, Swaminathan A, M. Wu.  2009.  Secure image retrieval through feature protection. Acoustics, Speech and Signal Processing, 2009. ICASSP 2009. IEEE International Conference on. :1533-1536.
Lu W, M. Wu.  2011.  Seam carving estimation using forensic hash. Proceedings of the thirteenth ACM multimedia workshop on Multimedia and security. :9-14.
Lu W, Varna AL, Wu M.  2010.  Forensic hash for multimedia information. SPIE Media Forensics and Security. :7541–0Y-7541–0Y.
Lu Y, Bulka B, desJardins M, Freeland SJ.  2007.  Amino acid quantitative structure property relationship database: a web-based platform for quantitative investigations of amino acids. Protein Engineering Design and SelectionProtein Engineering, Design and Selection. 20(7):347-351.
Lu W, Swaminathan A, Varna AL, Wu M.  2009.  Enabling search over encrypted multimedia databases. SPIE/IS&T Media Forensics and Security. :7254-18.