Export 188 results:
[ Author(Asc)] Title Type Year
Filters: First Letter Of Last Name is W  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
Wyche SP, Chetty M.  2013.  "I Want to Imagine How That Place Looks": Designing Technologies to Support Connectivity Between Africans Living Abroad and Home. SIGCHI '13. :2755-2764.
Wyche SP, Smyth TN, Chetty M, Aoki PM, Grinter RE.  2010.  Deliberate Interactions: Characterizing Technology Use in Nairobi, Kenya. SIGCHI '10. :2593-2602.
M. Wu, Trappe W, Wang ZJ, Liu KJR.  2004.  Collusion-resistant fingerprinting for multimedia. Signal Processing Magazine, IEEE. 21(2):15-27.
M. Wu, Wolf W, Liu B.  1998.  An algorithm for wipe detection. Image Processing, 1998. ICIP 98. Proceedings. 1998 International Conference on. 1:893-897vol.1-893-897vol.1.
Wu M, Martin, M.P.  2006.  New DNS results of shockwave/turbulent boundary layer interaction. 3rd AIAA Flow Control Conference.
Wu S, Gong L, Rand W, Raschid L.  2012.  Making Recommendations in a Microblog to Improve the Impact of a Focal User. 6th ACM Conference on Recommender Systems (RecSys).
M. Wu, Joyce RA, Vetro A, Wong H-S, Guan L, Kung S-Y.  2005.  Dynamic network resource allocation using multimedia content features and .... 09/795,952(6947378)
Wu M, Yu H, Gelman A.  1999.  Multi-level data hiding for digital image and video. SPIE Photonics East’99.
Wu S, Elsayed T, Rand W, Raschid L.  2011.  Predicting author blog channels with high value future posts for monitoring. Proceedings of the Twenty-Fifth Conference on Artificial Intelligence (AAAI).
M. Wu, Tang E, Lin B.  2000.  Data hiding in digital binary image. Multimedia and Expo, 2000. ICME 2000. 2000 IEEE International Conference on. 1:393-396vol.1-393-396vol.1.
Wu H-H, Kee H, Sane N, Plishker W, Bhattacharyya SS.  2010.  Rapid prototyping for digital signal processing systems using Parameterized Synchronous Dataflow graphs. 2010 21st IEEE International Symposium on Rapid System Prototyping (RSP). :1-7.
M. Wu, Yu H H.  2003.  Human visual model for data hiding. : 09/691,544(6611608)
M. Wu, Mui L, Mohtashemi M, Szolovits P.  2001.  Secure Health Information Sharing System: SHARE. Proceedings of the AMIA SymposiumProc AMIA Symp. :1060-1060.
Wu W, Niles EG, El-Sayed NM, Berriman M, LoVerde PT.  2006.  Schistosoma mansoni (Platyhelminthes, Trematoda) nuclear receptors: Sixteen new members and a novel subfamily. Gene. 366(2):303-315.
Wu M, Trappe W, Wang ZJ, Liu KJR.  2004.  Collusion resistant multimedia fingerprinting: A unified framework. Electronic Imaging Symposium: Security, Steganography, and Watermarking of Multimedia Contents VI, San Jose, CA, Proc. of SPIE. 5306:748-759.
M. Wu, Mao Y, Swaminathan A.  2007.  A Signal Processing and Randomization Perspective of Robust and Secure Image Hashing. Statistical Signal Processing, 2007. SSP '07. IEEE/SP 14th Workshop on. :166-170.
Wu M, Martin, M.P.  2006.  Analysis of Shock Motion in a Compression Ramp Configuration using DNS data. Bulletin of the American Physical Society.
Wu M.  2004.  Distortion compensated lookup-table embedding: Joint security and robustness enhancement for quantization based data hiding. Electronic Imaging Symposium: Security, Steganography, and Watermarking of Multimedia Contents VI, San Jose, CA, Proc. of SPIE. 5306:610-621.
Wu Y, Oard D, Soboroff I.  2006.  An exploratory study of the W3C mailing list test collection for retrieval of emails with pro/con arguments. Proceedings of the Third Conference on Email and Anti-Spam, Mountain View, CA, July.
Wu H, Sankaranarayanan AC, Chellappa R.  2007.  In Situ Evaluation of Tracking Algorithms Using Time Reversed Chains. Computer Vision and Pattern Recognition, 2007. CVPR '07. IEEE Conference on. :1-8.
Wu M, Liu B.  2001.  Modulation and multiplexing techniques for multimedia data hiding. Proc. of SPIE ITcom’01, SPIE vol. 4518
Wu S, Raschid L, Rand W.  2011.  Future link prediction in the blogosphere for recommendation. Proceedings of the International Conference on Weblogs and Social Media (ICWSM).
Wu SA, JaJa JF.  1991.  Optimal algorithms for adjacent side routing. Algorithmica. 6(1):565-578.
M. Wu, Liu B.  2001.  Watermarking scheme for image authentication. (6285775)
Wu D, Nau DS.  2002.  M-Translog-2: A Planning Domain Designed for AIPS-2002. UMIACS-TR-2002-82