Export 365 results:
[ Author(Asc)] Title Type Year
Filters: First Letter Of Last Name is L  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
L\üttgen G, Von Der Beeck M, Cleaveland R.  2000.  A compositional approach to statecharts semantics. 25
Lymberopoulos D, Ogale AS, Savvides A, Aloimonos Y.  2006.  A sensory grammar for inferring behaviors in sensor networks. Proceedings of the 5th international conference on Information processing in sensor networks. :251-259.
Lychev R, Feamster N.  2009.  Designing Enforceable Network Contracts. GT-CS-09-02
Luo M, DeMenthon D, Yu X, Doermann D.  2006.  SOFTCBIR: Object Searching in Videos Combining Keypoint Matching and Graduated Assignment. LAMP-TR-132,CAR-TR-1013,CS-TR-4804,UMIACS-TR-2006-25
Luo W, Wu M, Huang J.  2008.  Mpeg recompression detection based on block artifacts. Proc. of SPIE Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents. 6819
Luo M, DeMenthon D, Doermann D.  2004.  Shot boundary detection based on Image correlation features in video. TREC-VID: Text Retrieval and Evaluation Conference.
Luo Y, Duraiswami R.  2008.  Canny edge detection on NVIDIA CUDA. Computer Vision and Pattern Recognition Workshops, 2008. CVPRW '08. IEEE Computer Society Conference on. :1-8.
Martineau J, Mokashi R, Chapman D, Grasso M, Brady M, Yesha Y, Yesha Y, Cardone A, Dima A.  2012.  Sub-cellular feature detection and automated extraction of collocalized actin and myosin regions. the 2nd ACM SIGHIT symposiumProceedings of the 2nd ACM SIGHIT symposium on International health informatics - IHI '12. :399.
Luo Y, Duraiswami R.  2011.  EFFICIENT PARALLEL NON-NEGATIVE LEAST SQUARES ON MULTI-CORE ARCHITECTURES. SIAM Journal on Scientific Computing. 33(5):2848-2863.
Lumezanu C, Levin D, Han B, Spring N, Bhattacharjee B.  2010.  Don't love thy nearest neighbor. Proceedings of the 9th international conference on Peer-to-peer systems. :5-5.
Lumezanu C, Feamster N, Klein H.  2012.  #bias: Measuring the Tweeting Behavior of Propagandists. Sixth International AAAI Conference on Weblogs and Social Media.
Lumezanu C, Baden R, Spring N, Bhattacharjee B.  2009.  Triangle Inequality and Routing Policy Violations in the Internet. Passive and Active Network MeasurementPassive and Active Network Measurement. 5448:45-54.
Lumezanu C, Baden R, Spring N, Bhattacharjee B.  2009.  Triangle inequality variations in the internet. Proceedings of the 9th ACM SIGCOMM conference on Internet measurement conference. :177-183.
Lumezanu C, Spring N, Bhattacharjee B.  2006.  Decentralized message ordering for publish/subscribe systems. Proceedings of the ACM/IFIP/USENIX 2006 International Conference on Middleware. :162-179.
Lumezanu C, Spring N.  2008.  Measurement Manipulation and Space Selection in Network Coordinates. Distributed Computing Systems, International Conference on. :361-368.
Lumezanu C, Levin D, Spring N.  2007.  PeerWise discovery and negotiation of faster paths. Proc. Workshop on Hot Topics in Networks (HotNets).
Lumezanu C, Guo K, Spring N, Bhattacharjee B.  2010.  The effect of packet loss on redundancy elimination in cellular wireless networks. Proceedings of the 10th annual conference on Internet measurement. :294-300.
Lumezanu C, Baden R, Levin D, Spring N, Bhattacharjee B.  2009.  Symbiotic relationships in internet routing overlays. Proceedings of the 6th USENIX symposium on Networked systems design and implementation. :467-480.
Luebke D, Watson B, Cohen JD, Reddy M, Varshney A.  2002.  Level of Detail for 3D Graphics.
Lücke C, Fushman D, Ludwig C, Hamilton JA, Sacchettini JC, Rüterjans H.  1999.  A comparative study of the backbone dynamics of two closely related lipid binding proteins: Bovine heart fatty acid binding protein and porcine ileal lipid binding protein. Molecular and Cellular Biochemistry. 192(1):109-121.
Lu W, Wu M.  2010.  Multimedia forensic hash based on visual words. IEEE Computer Society International Conference on Image Processing. :989-992.
Lu W, Varna AL, Swaminathan A, M. Wu.  2009.  Secure image retrieval through feature protection. Acoustics, Speech and Signal Processing, 2009. ICASSP 2009. IEEE International Conference on. :1533-1536.
Lu W, M. Wu.  2011.  Seam carving estimation using forensic hash. Proceedings of the thirteenth ACM multimedia workshop on Multimedia and security. :9-14.
Lu W, Varna AL, Wu M.  2010.  Forensic hash for multimedia information. SPIE Media Forensics and Security. :7541–0Y-7541–0Y.
Lu W, Swaminathan A, Varna AL, Wu M.  2009.  Enabling search over encrypted multimedia databases. SPIE/IS&T Media Forensics and Security. :7254-18.