Publications

Found 70 results
[ Author(Asc)] Title Type Year
Filters: First Letter Of Last Name is J  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
J
Jiang, H., Yu S. X., & Martin D. R. (2011).  Linear Scale and Rotation Invariant Matching. IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE. 33(7), 1339-1355.
Jiang, T., & Karp R. M. (1998).  Mapping Clones with a Given Ordering or Interleaving. 21,
Jiang, X., Taneja J., Ortiz J., Tavakoli A., Dutta P., Jeong J., et al. (2007).  An Architecture for Energy Management in Wireless Sensor Networks. 31-36.
Jiang, X., Taneja J., Ortiz J., Tavakoli A., Dutta P., Jeong J., et al. (2007).  An Architecture for Energy Management in Wireless Sensor Networks. 4(3), 31-36.
Jia, Y., Abbott J., Austerweil J., Griffiths T., & Darrell T. (2013).  Visual Concept Learning: Combining Machine Vision and Bayesian Generalization on Concept Hierarchies.
Jia, Y., & Darrell T. (2011).  Heavy-Tailed Distances for Gradient Based Image Descriptors.
Jia, Y., Salzmann M., & Darrell T. (2010).  Factorized Latent Spaces with Structured Sparsity. 982-990.
Jia, Y., Salzmann M., & Darrell T. (2011).  Learning Cross-Modality Similarity for Multinomal Data. 2407-2414.
Jia, Y., & Han M. (2013).  Category Independent Object-Level Saliency Detection.
Jia, Y., Vinyals O., & Darrell T. (2013).  On Compact Codes for Spatially Pooled Features.
Jia, Y., Shelhamer E., Donahue J., Karayev S., Long J., Girshick R., et al. (2014).  Caffe: Convolutional Architecture for Fast Feature Embedding. 675-678.
Jia, Y., Huang C., & Darrell T. (2012).  Beyond Spatial Pyramids: Receptive Field Learning for Pooled Image Features. 3370-3377.
Jia, Y., & Darrell T. (2013).  Latent Task Adaptation with Large-Scale Hierarchies.
Ji, G., & Bilmes J. A. (2006).  Backoff Model Training Using Partially Observed Data: Application to Dialog Act Tagging. Proceedings of the Human Language Technology Conference of the North American Chapter of the Association for Computational Linguistics (HLT-NAACL 2006). 280-287.
Ji, G., & Bilmes J. A. (2005).  Dialog Act Tagging Using Graphical Models. Proceedings of IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2005). 1, 33-36.
Ji, G., & Bilmes J. A. (2004).  Multi-Speaker Language Modeling. Proceedings of the Human Language Technology Conference at the North American Chapter of the Association for Computational Linguistics. 133-136.
[Anonymous] (2010).  Proceedings of the 13th International Symposium on Recent Advances in Intrusion Detection (RAID 2010), Ottawa, Canada. (Jha, S., Sommer R., & Kreibich C., Ed.).
Jeub, L. G. S., Mahoney M. W., Mucha P. J., & Porter M. A. (2015).  A Local Perspective on Community Structure in Multilayer Networks.
Jeub, L. G. S., Balachandran P., Porter M. A., Mucha P. J., & Mahoney M. W. (2014).  Think Locally, Act Locally: The Detection of Small, Medium-Sized, and Large Communities in Large Networks.
Jegelka, S., Bach F., & Sra S. (2013).  Reflection methods for User-Friendly Submodular Optimization.
Jegelka, S., Kapoor A., & Horvitz E. (2013).  An Interactive Approach to Solving Correspondence Problems. International Journal of Computer Vision.
Javed, M., & Paxson V. (2013).  Detecting Stealthy, Distributed SSH Brute-Forcing.
Javed, M., Herley C., Peinado M., & Paxson V. (2015).  Measurement and Analysis of Traffic Exchange Services. Proceedings of ICM Internet Measurement Conference.
Jantz, K., Friedland G., Knipping L., & Rojas R. (2007).  A Low-Cost Mobile Pointing and Drawing Device. 121-122.
Jansen, T., & Sudholt D. (2010).  Analysis of an Asymmetric Mutation Operator. Evolutionary Computation. 18(1), 1-26.

Pages