Author of the publication

IBM-Northwestern@TRECVID 2014: Surveillance Event Detection.

, , , , , , and . TRECVID, National Institute of Standards and Technology (NIST), (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Priority Based Probe Algorithm for Distributed Deadlock Detection and Resolution., , , and . ICDCS, page 162-169. IEEE Computer Society, (1987)A reconfigurable and hierarchical parallel processing architecture: performance results for stereo vision., , , and . ICPR (2), page 389-393. IEEE, (1990)Batching and Dynamic Allocation Techniques for Increasing the Stream Capacity of an On-Demand Media Server., , and . Parallel Comput., 23 (12): 1727-1742 (1997)Design and Analysis of an Optical Communications Processor., , and . J. Parallel Distributed Comput., 17 (3): 222-229 (1993)Implementation and Evaluation of Hough Transform Algorithms on a Shared-Memory Multiprocessor., and . J. Parallel Distributed Comput., 12 (2): 178-188 (1991)Microarchitectures for Managing Chip Revenues under Process Variations., , , , and . IEEE Comput. Archit. Lett., 7 (1): 5-8 (2008)Microarchitectures for Managing Chip Revenues under Process Variations., , , , and . IEEE Comput. Archit. Lett., 6 (2): 29-32 (2007)Run-time data decomposition for parallel implementation of image processing and computer vision tasks., and . Concurr. Pract. Exp., 4 (4): 313-334 (1992)Compilation of out-of-core data parallel programs for distributed memory machines., , and . SIGARCH Comput. Archit. News, 22 (4): 23-28 (1994)A Comprehensive Approach to Image Spam Detection: From Server to Client Solution., , and . IEEE Trans. Inf. Forensics Secur., 5 (4): 826-836 (2010)