Publications

Found 284 results
[ Author(Desc)] Title Type Year
Filters: First Letter Of Last Name is S  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
S
Sandeep P., Madhow U, Singh J.  2009.  Signal Processing for MultiGigabit Communication. :198-202.
Sanfelice RG, Teel AR, Goebel R.  2005.  Results on convergence in hybrid systems via detectability and an invariance principle. PROCEEDINGS OF THE AMERICAN CONTROL CONFERENCE. :551-556.
Sanft K.R, Gillespie D.T, Petzold L.R.  2011.  Legitimacy of the stochastic Michaelis-Menten approximation. IET SYSTEMS BIOLOGY. 5:58-69.
Sanft K.R, Gillespie D.T, Wallace E.WJ, Petzold L.R.  2012.  Linear noise approximation is valid over limited times for any chemical system that is sufficiently large. IET SYSTEMS BIOLOGY. 6:102-115.
Sargin E, Ghosh P, Manjunath B.S.  2010.  Generalized Simultaneous Registration and Segmentation. IEEE Conference on Computer Vision and Pattern Recognition. :1363-1370.
Sargin MEmre, Ghosh P, Manjunath B.S.  2009.  Robust Dynamical Model for Simultaneous Registration and Segmentation in a Variational Framework: A Bayesian Approach. IEEE International Conference on Computer Vision. :709-716.
Sargin M.E, Bertelli L., Rose K., Manjunath B.S.  2009.  Probabilistic Occlusion Boundary Detection on Spatio-Temporal Lattices. IEEE International Conference on Computer Vision. :560-567.
Sarkar A, Madhow U, Manjunath B.S.  2010.  Matrix Embedding With Pseudorandom Coefficient Selection and Error Correction for Robust and Secure Steganography. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY. 5:225-239.
Sarkar A, Solanki K, Manjunath B.S.  2010.  Obtaining Higher Rates for Steganographic Schemes While Maintaining the Same Detectability. Lecture Notes in Computer Science. 6387:178-+.
Sarkar A, Solanki K, Manjunath B.S.  2007.  YASS: Yet another steganographic scheme that resists blind steganalysis. Lecture Notes in Computer Science. 4567:16-+.
Sarkar A, Sullivan K, Manjunath B.S.  2008.  Steganographic capacity estimation for the statistical restoration framework. Proceedings of SPIE. 6819
Sarkar A., Manjunath B.S.  2009.  DOUBLE EMBEDDING IN THE QUANTIZATION INDEX MODULATION FRAMEWORK. :3653-3656.
Sarkar A., Manjunath B.S.  2007.  Estimating steganographic capacity for odd-even based embedding and its use in individual compensation. IEEE International Conference on Image Processing ICIP. :409-412.
Sarkar A, Manjunath B.S.  2010.  Image Dependent Log-likelihood Ratio Allocation for Repeat Accumulate Code based Decoding in Data Hiding Channels. Proceedings of SPIE. 7541
Sarkar A, Manjunath B.S, Madhow U, Chandrasekaran S.  2007.  Adaptive MPEG-2 video data hiding scheme. Proceedings of SPIE. 6505
Sarkar A, Solanki K, Manjunath B.S.  2008.  Further study on YASS: Steganography based on randomized embedding to resist blind steganalysis. Proceedings of SPIE. 6819
Sarkar A., Nataraj L., Manjunath B.S.  2010.  PRECISE LOCALIZATION OF KEY-POINTS TO IDENTIFY LOCAL REGIONS FOR ROBUST DATA HIDING. IEEE International Conference on Image Processing ICIP. :3681-3684.
Sarkar A., Nataraj L., Manjunath B.S.  2009.  ADDING GAUSSIAN NOISE TO "DENOISE" JPEG FOR DETECTING IMAGE RESIZING. :1493-1496.
Sarkar A, Ghosh P, Manjunath B.S, Moxley E.  2008.  Video fingerprinting: Features for duplicate and similar video detection and query-based video retrieval - art. no. 68200E. PROCEEDINGS OF THE SOCIETY OF PHOTO-OPTICAL INSTRUMENTATION ENGINEERS (SPIE). 6820:E8200-E8200.
Sastry S, PADEN B.  1988.  OPTIMAL KINEMATIC DESIGN OF 6R MANIPULATORS. INTERNATIONAL JOURNAL OF ROBOTICS RESEARCH. 7:43-61.
Sastry S, Prandini M, Hespanha JP.  2000.  Probabilistic pursuit-evasion games: A one-step Nash approach. IEEE CONFERENCE ON DECISION AND CONTROL - PROCEEDINGS. :2272-2277.
Satzinger B, Byl M, Byl K.  2014.  ALGORITHMIC OPTIMIZATION OF INVERSE KINEMATICS TABLES FOR HIGH DEGREE-OF-FREEDOM LIMBS.
Satzinger B, Byl K, Rutschmann M, Byl M.  2012.  Nonlinear Model Predictive Control for Rough-Terrain Robot Hopping. IEEE International Conference on Intelligent Robots and Systems. :1859-1864.
Saxena A, Rose K, Madhow U, Singh J.  2008.  Optimization of Correlated Source Coding for Event-Based Monitoring in Sensor Networks. IEEE Data Compression Conference. :73-82.
SCHAPER CD, MELLICHAMP DA, SEBORG DE.  1992.  PROBABILISTIC APPROACH TO ROBUST PROCESS-CONTROL. INDUSTRIAL & ENGINEERING CHEMISTRY RESEARCH. 31:1694-1704.

Pages