Publications
Found 284 results
[ Author] Title Type Year Filters: First Letter Of Last Name is S [Clear All Filters]
.
2009.
Results on convergence in hybrid systems via detectability and an invariance principle. PROCEEDINGS OF THE AMERICAN CONTROL CONFERENCE. :551-556.
.
2005. Legitimacy of the stochastic Michaelis-Menten approximation. IET SYSTEMS BIOLOGY. 5:58-69.
.
2011. Linear noise approximation is valid over limited times for any chemical system that is sufficiently large. IET SYSTEMS BIOLOGY. 6:102-115.
.
2012. Generalized Simultaneous Registration and Segmentation. IEEE Conference on Computer Vision and Pattern Recognition. :1363-1370.
.
2010. Robust Dynamical Model for Simultaneous Registration and Segmentation in a Variational Framework: A Bayesian Approach. IEEE International Conference on Computer Vision. :709-716.
.
2009. Probabilistic Occlusion Boundary Detection on Spatio-Temporal Lattices. IEEE International Conference on Computer Vision. :560-567.
.
2009. Matrix Embedding With Pseudorandom Coefficient Selection and Error Correction for Robust and Secure Steganography. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY. 5:225-239.
.
2010. Obtaining Higher Rates for Steganographic Schemes While Maintaining the Same Detectability. Lecture Notes in Computer Science. 6387:178-+.
.
2010. YASS: Yet another steganographic scheme that resists blind steganalysis. Lecture Notes in Computer Science. 4567:16-+.
.
2007. Steganographic capacity estimation for the statistical restoration framework. Proceedings of SPIE. 6819
.
2008. .
2009. Estimating steganographic capacity for odd-even based embedding and its use in individual compensation. IEEE International Conference on Image Processing ICIP. :409-412.
.
2007. Image Dependent Log-likelihood Ratio Allocation for Repeat Accumulate Code based Decoding in Data Hiding Channels. Proceedings of SPIE. 7541
.
2010. Adaptive MPEG-2 video data hiding scheme. Proceedings of SPIE. 6505
.
2007. Further study on YASS: Steganography based on randomized embedding to resist blind steganalysis. Proceedings of SPIE. 6819
.
2008. PRECISE LOCALIZATION OF KEY-POINTS TO IDENTIFY LOCAL REGIONS FOR ROBUST DATA HIDING. IEEE International Conference on Image Processing ICIP. :3681-3684.
.
2010. .
2009. Video fingerprinting: Features for duplicate and similar video detection and query-based video retrieval - art. no. 68200E. PROCEEDINGS OF THE SOCIETY OF PHOTO-OPTICAL INSTRUMENTATION ENGINEERS (SPIE). 6820:E8200-E8200.
.
2008. OPTIMAL KINEMATIC DESIGN OF 6R MANIPULATORS. INTERNATIONAL JOURNAL OF ROBOTICS RESEARCH. 7:43-61.
.
1988. Probabilistic pursuit-evasion games: A one-step Nash approach. IEEE CONFERENCE ON DECISION AND CONTROL - PROCEEDINGS. :2272-2277.
.
2000. .
2014. Nonlinear Model Predictive Control for Rough-Terrain Robot Hopping. IEEE International Conference on Intelligent Robots and Systems. :1859-1864.
.
2012. Optimization of Correlated Source Coding for Event-Based Monitoring in Sensor Networks. IEEE Data Compression Conference. :73-82.
.
2008. PROBABILISTIC APPROACH TO ROBUST PROCESS-CONTROL. INDUSTRIAL & ENGINEERING CHEMISTRY RESEARCH. 31:1694-1704.
.
1992.