default search action
David Slater
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j13]Rees Hill, David Slater:
Using a Metadata Approach to Extend the Functional Resonance Analysis Method to Model Quantitatively, Emergent Behaviours in Complex Systems. Syst. 12(3): 90 (2024) - [i5]John R. McNulty, Lee Kho, Alexandria L. Case, Charlie Fornaca, Drew Johnston, David Slater, Joshua M. Abzug, Sybil A. Russell:
Synthetic Medical Imaging Generation with Generative Adversarial Networks For Plain Radiographs. CoRR abs/2403.19107 (2024) - 2023
- [c24]Nathalie Baracaldo, Farhan Ahmed, Kevin Eykholt, Yi Zhou, Shriti Priya, Taesung Lee, Swanand Kadhe, Mike Tan, Sridevi Polavaram, Sterling Suggs, Yuyang Gao, David Slater:
Benchmarking the Effect of Poisoning Defenses on the Security and Bias of Deep Learning Models. SP (Workshops) 2023: 45-56 - [c23]Alex Isherwood, Matthew Koehler, David Slater:
Using Evolutionary Model Discovery to Develop Robust Policies. WSC 2023: 130-137 - 2021
- [j12]Lito Kriara, Joerg F. Hipp, Christopher Chatham, David Nobbs, David Slater, Florian Lipsmeier, Michael Lindemann:
Beacon-Based Remote Measurement of Social Behavior in ASD Clinical Trials: A Technical Feasibility Assessment. Sensors 21(14): 4664 (2021)
2010 – 2019
- 2019
- [c22]David Slater, Scott Novotney, Jessica Moore, Sean Morgan, Scott Tenaglia:
Robust keystroke transcription from the acoustic side-channel. ACSAC 2019: 776-787 - [c21]Jessica Moore, Ben Gelman, David Slater:
A Convolutional Neural Network for Language-Agnostic Source Code Summarization. ENASE 2019: 15-26 - [c20]Jacob Dormuth, Ben Gelman, Jessica Moore, David Slater:
Logical Segmentation of Source Code. SEKE 2019: 717-777 - [i4]Jessica Moore, Ben Gelman, David Slater:
A Convolutional Neural Network for Language-Agnostic Source Code Summarization. CoRR abs/1904.00805 (2019) - [i3]Ben Gelman, Bryan Hoyle, Jessica Moore, Joshua Saxe, David Slater:
A Language-Agnostic Model for Semantic Source Code Labeling. CoRR abs/1906.01032 (2019) - [i2]Jacob Dormuth, Ben Gelman, Jessica Moore, David Slater:
Logical Segmentation of Source Code. CoRR abs/1907.08615 (2019) - 2018
- [j11]Stanislaw Adaszewski, David Slater, Lester Melie-García, Bogdan Draganski, Piotr Bogorodzki:
Simultaneous estimation of population receptive field and hemodynamic parameters from single point BOLD responses using Metropolis-Hastings sampling. NeuroImage 172: 175-193 (2018) - [c19]Ben Gelman, Bryan Hoyle, Jessica Moore, Joshua Saxe, David Slater:
A language-agnostic model for semantic source code labeling. MASES@ASE 2018: 36-44 - 2015
- [c18]Konstantin Berlin, David Slater, Joshua Saxe:
Malicious Behavior Detection using Windows Audit Logs. AISec@CCS 2015: 35-44 - [i1]Konstantin Berlin, David Slater, Joshua Saxe:
Malicious Behavior Detection using Windows Audit Logs. CoRR abs/1506.04200 (2015) - 2013
- [j10]Marco Catani, Michel Thiebaut de Schotten, David Slater, Flavio Dell'Acqua:
Connectomic approaches before the connectome. NeuroImage 80: 2-13 (2013)
2000 – 2009
- 2009
- [j9]David Slater, Radha Poovendran, Patrick Tague, Brian J. Matt:
Tradeoffs between jamming resilience and communication efficiency in key establishment. ACM SIGMOBILE Mob. Comput. Commun. Rev. 13(1): 14-25 (2009) - [j8]Patrick Tague, David Slater, Jason Rogers, Radha Poovendran:
Evaluating the Vulnerability of Network Traffic Using Joint Security and Routing Analysis. IEEE Trans. Dependable Secur. Comput. 6(2): 111-123 (2009) - [c17]David Slater, Patrick Tague, Radha Poovendran, Brian J. Matt:
A coding-theoretic approach for efficient message verification over insecure channels. WISEC 2009: 151-160 - 2008
- [c16]Patrick Tague, David Slater, Jason Rogers, Radha Poovendran:
Vulnerability of Network Traffic under Node Capture Attacks Using Circuit Theoretic Analysis. INFOCOM 2008: 161-165 - [c15]Patrick Tague, Sidharth Nabar, James A. Ritcey, David Slater, Radha Poovendran:
Throughput optimization for multipath unicast routing under probabilistic jamming. PIMRC 2008: 1-5 - [c14]Patrick Tague, David Slater, Radha Poovendran, Guevara Noubir:
Linear programming models for jamming attacks on network traffic flows. WiOpt 2008: 207-216 - 2001
- [j7]Pei-hsiu Suen, Glenn Healey, David Slater:
The impact of viewing geometry on material discriminability in hyperspectral images. IEEE Trans. Geosci. Remote. Sens. 39(7): 1352-1359 (2001) - [c13]David Slater, Glenn Healey:
Physics-based Model Acquisition and Identification in Airborne Spectral Images. ICCV 2001: 257-262 - [c12]Pei-hsiu Suen, Glenn Healey, David Slater:
The Impact of Viewing Geometry on Vision Through the Atmosphere. ICCV 2001: 454-459
1990 – 1999
- 1999
- [j6]Glenn Healey, David Slater:
Models and methods for automated material identification in hyperspectral imagery acquired under unknown illumination and atmospheric conditions. IEEE Trans. Geosci. Remote. Sens. 37(6): 2706-2717 (1999) - [c11]Glenn Healey, David Slater:
Invariant Recognition in Hyperspectral Images. CVPR 1999: 1438-1043 - [c10]David Slater, Glenn Healey:
Material Classification for 3D Objects in Aerial Hyperspectral Images. CVPR 1999: 2268-2273 - 1998
- [c9]David Slater, Glenn Healey:
What is the Spectral Dimensionality of Illumination Functions in Outdoor Scenes? CVPR 1998: 105-110 - [c8]David Slater, Glenn Healey, Phillip Chen-Yu Sheu, Carl Cotman, Joseph H. Su, Andrea J. Wasserman, William Rodman Shankle:
A novel use of color computer vision methods for the quantification of neurons in 3-D brain tissue samples. SMC 1998: 4411-4416 - 1997
- [j5]David Slater, Glenn Healey:
The Illumination-Invariant Matching of Deterministic Local Structure in Color Images. IEEE Trans. Pattern Anal. Mach. Intell. 19(10): 1146-1151 (1997) - [j4]Glenn Healey, David Slater:
Computing illumination-invariant descriptors of spatially filtered color image regions. IEEE Trans. Image Process. 6(7): 1002-1013 (1997) - [c7]David Slater, Glenn Healey:
Object recognition using invariant profiles. CVPR 1997: 827-832 - 1996
- [j3]David Slater, Glenn Healey:
The Illumination-Invariant Recognition of 3D Objects Using Local Color Invariants. IEEE Trans. Pattern Anal. Mach. Intell. 18(2): 206-210 (1996) - [j2]Soren B. Hansen, David Slater, Carlos A. Rodriguez, Francis G. Spinale, William P. Santamore:
Examination of epimysial leads used to stimulate the latissimus dorsi muscle. IEEE Trans. Biomed. Eng. 43(6): 653-657 (1996) - [c6]David Slater, Glenn Healey:
Using a spectral reflectance model for the illumination-invariant recognition of local image structure. CVPR 1996: 770-775 - [c5]David Slater, Glenn Healey, Phillip C.-Y. Sheu, Carl Cotman, Joseph H. Su, Andrea J. Wasserman, William Rodman Shankle:
A machine vision system for the automated classification and counting of neurons in 3-D brain tissue samples. WACV 1996: 224-229 - 1995
- [c4]David Slater, Glenn Healey:
Combining Color and Geometric Information for the Illumination Invariant Recognition of 3D Objects. ICCV 1995: 563-568 - [c3]David Slater, Glenn Healey:
Illumination-Invariant Recognition of Local Color Distributions using Linear Models for Spectral Reflectance. CIC 1995: 34-36 - 1994
- [c2]Glenn Healey, David Slater:
Using illumination invariant descriptors for recognition. CVPR 1994: 355-360 - 1993
- [c1]Glenn Healey, David Slater, Ted Lin, Ben Drda, A. Donald Goedeke:
A system for real-time fire detection. CVPR 1993: 605-606 - 1990
- [j1]Martin Neil, Robert J. Cole, David Slater:
Measures for maintenance management: A case study. J. Softw. Maintenance Res. Pract. 2(4): 223-240 (1990)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-20 21:58 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint