Book Chapters
(Publications are listed alphabetically by title)
Pages
Machine Translation: Interlingual Methods. In: Brown E-in-C: K, editor. Encyclopedia of Language & Linguistics (Second Edition)Encyclopedia of Language & Linguistics (Second Edition). Oxford: Elsevier; 2006. 3. p. 383-394p.
Maintenance of Spatial Semijoin Queries on Moving Points. In: Proceedings 2004 VLDB ConferenceProceedings 2004 VLDB Conference. St Louis: Morgan Kaufmann; 2004. 8. p. 828-839p.
Merging Network Measurement with Data Transport. In: Dovrolis C, editor. Passive and Active Network MeasurementPassive and Active Network Measurement. Vol 3431. Springer Berlin / Heidelberg; 2005. 3. p. 368-371p. (Lecture Notes in Computer Science; vol 3431).
Messenger RNA splicing signals in Drosophila genes. In: Atlas of Drosophila Genes. Oxford University Press, New York, NY; 1993. 3. p. 333-358p.
Mobile Visual Aid Tools for Users with Visual Impairments. In: Mobile Multimedia ProcessingMobile Multimedia Processing. LNSC 5960; 2010. 2. p. 21-36p.
Model-Based Approaches. In: Human Identification Based on GaitHuman Identification Based on Gait.; 2006. 1. p. 107-133p.
Modeling Transfer Relationships Between Learning Tasks for Improved Inductive Transfer. In: Daelemans W, Goethals B, Morik K, editors. Machine Learning and Knowledge Discovery in DatabasesMachine Learning and Knowledge Discovery in Databases. Vol 5211. Springer Berlin / Heidelberg; 2008. 3. p. 317-332p. (Lecture Notes in Computer Science; vol 5211).
Modelling Type 1a Supernova Light Curves. In: Pereyra V, Scherer G, editors. Exponential Data Fitting and Its ApplicationsExponential Data Fitting and Its Applications. Bentham Science Publishers Ltd.; 2010. 1. p. 169-186p.
Moving Object Detection and Compression in IR Sequences. In: Bhanu B, Pavlidis I, editors. Computer Vision Beyond the Visible SpectrumComputer Vision Beyond the Visible Spectrum. Springer London; 2005. 1. p. 141-165p. (Advances in Pattern Recognition).
Multi-align: Combining Linguistic and Statistical Techniques to Improve Alignments for Adaptable MT. In: Frederking R, Taylor K, editors. Machine Translation: From Real Users to ResearchMachine Translation: From Real Users to Research. Vol 3265. Springer Berlin / Heidelberg; 2004. 1. p. 17-26p. (Lecture Notes in Computer Science; vol 3265).
Multi-camera Tracking of Articulated Human Motion Using Motion and Shape Cues. In: Narayanan P, Nayar S, Shum H-Y, editors. Computer Vision – ACCV 2006Computer Vision – ACCV 2006. Vol 3852. Springer Berlin / Heidelberg; 2006. 1. p. 131-140p. (Lecture Notes in Computer Science; vol 3852).
Multi-scale Structural Saliency for Signature Detection. In: IEEEConference on Computer Vision and Pattern Recognition (CVPR 2007)IEEEConference on Computer Vision and Pattern Recognition (CVPR 2007). Minneapolis, MN; 2007. 1. p. 1-8p.
Multidimensional data structures for spatial applications. In: Atallah MJ, Blanton M, editors. Algorithms and theory of computation handbookAlgorithms and theory of computation handbook. Chapman & Hall/CRC; 2010. 6. p. 6.
Navigation Patterns and Usability of Zoomable User Interfaces With and Without an Overview. In: The craft of information visualization: readings and reflections. Morgan Kaufmann Publishers Inc.; 2003. 1. p. 120.
Network Programming Using PLAN. In: Bal H, Belkhouche B, Cardelli L, editors. Internet Programming LanguagesInternet Programming Languages. Vol 1686. Springer Berlin / Heidelberg; 1999. 1. p. 127-143p. (Lecture Notes in Computer Science; vol 1686).
New Approaches to Robust, Point-Based Image Registration. In: LeMoigne J, Netanyahu NS, Eastman RD, editors. Image Registration for Remote SensingImage Registration for Remote Sensing. Cambridge University Press; 2010.
New Eyes for Shape and Motion Estimation. In: Lee S-W, Bülthoff H, Poggio T, editors. Biologically Motivated Computer VisionBiologically Motivated Computer Vision. Vol 1811. Springer Berlin / Heidelberg; 2000. 2. p. 23-47p. (Lecture Notes in Computer Science; vol 1811).
Oblivious RAM with O((logN)^3) Worst-Case Cost. In: Lee D, Wang X, editors. Advances in Cryptology – ASIACRYPT 2011. Vol 7073. Springer Berlin / Heidelberg; 2011. 1. p. 197-214p. (Lecture Notes in Computer Science; vol 7073).
On a parallel-algorithms method for string matching problems (overview). In: Bonuccelli M, Crescenzi P, Petreschi R, editors. Algorithms and ComplexityAlgorithms and Complexity. Vol 778. Springer Berlin / Heidelberg; 1994. 2. p. 22-32p. (Lecture Notes in Computer Science; vol 778).
On k-Column Sparse Packing Programs. In: Eisenbrand F, Shepherd F, editors. Integer Programming and Combinatorial OptimizationInteger Programming and Combinatorial Optimization. Vol 6080. Springer Berlin / Heidelberg; 2010. 3. p. 369-382p. (Lecture Notes in Computer Science; vol 6080).
On Minimal Assumptions for Sender-Deniable Public Key Encryption. In: Krawczyk H, editor. Public-Key Cryptography – PKC 2014. Springer Berlin Heidelberg; 2014. 5. p. 574-591p. (Lecture Notes in Computer Science).
On stratified sampling for high coverage estimations. In: Hlawiczka A, Silva J, Simoncini L, editors. Dependable Computing — EDCC-2. Vol 1150. Springer Berlin / Heidelberg; 1996. 3. p. 35-54p. (Lecture Notes in Computer Science; vol 1150).
On the Black-Box Complexity of Optimally-Fair Coin Tossing. In: Ishai Y, editor. Theory of Cryptography. Springer Berlin Heidelberg; 2011. 4. p. 450-467p. (Lecture Notes in Computer Science).
On the Centrality of Off-Line E-Cash to Concrete Partial Information Games. In: Visconti I, De Prisco R, editors. Security and Cryptography for Networks. Springer Berlin Heidelberg; 2012. 2. p. 264-280p. (Lecture Notes in Computer Science).
On the Complexity of Plan Adaptation by Derivational Analogy in a Universal Classical Planning Framework. In: Craw S, Preece A, editors. Advances in Case-Based Reasoning. Vol 2416. Springer Berlin / Heidelberg; 2002. 1. p. 199-206p. (Lecture Notes in Computer Science; vol 2416).
On the Cost of Persistence and Authentication in Skip Lists. In: Demetrescu C, editor. Experimental Algorithms. Springer Berlin Heidelberg; 2007. 9. p. 94-107p. (Lecture Notes in Computer Science).
On the Covering Steiner Problem. In: Pandya P, Radhakrishnan J, editors. FST TCS 2003: Foundations of Software Technology and Theoretical Computer ScienceFST TCS 2003: Foundations of Software Technology and Theoretical Computer Science. Vol 2914. Springer Berlin / Heidelberg; 2003. 2. p. 244-251p. (Lecture Notes in Computer Science; vol 2914).
On the Precise Loop Transfer Recovery and Transmission Zeroes. In: First IEEE Conference on Control ApplicationsFirst IEEE Conference on Control Applications. Dayton, Ohio; 1992.
Optimal Authenticated Data Structures with Multilinear Forms. In: Joye M, Miyaji A, Otsuka A, editors. Pairing-Based Cryptography - Pairing 2010. Springer Berlin Heidelberg; 2010. 2. p. 246-264p. (Lecture Notes in Computer Science).
Optimal Cryptographic Hardness of Learning Monotone Functions. In: Aceto L, Damgård I, Goldberg LAnn, Halldórsson MM, Ingólfsdóttir A, Walukiewicz I, editors. Automata, Languages and Programming. Springer Berlin Heidelberg; 2008. 3. p. 36-47p. (Lecture Notes in Computer Science).
Optimal Verification of Operations on Dynamic Sets. In: Rogaway P, editor. Advances in Cryptology – CRYPTO 2011. Springer Berlin Heidelberg; 2011. 9. p. 91-110p. (Lecture Notes in Computer Science).
Overview+ detail. In: Readings in information visualizationReadings in information visualization.; 1999. 2. p. 285-286p.
Parallel and Dynamic Searchable Symmetric Encryption. In: Sadeghi A-R, editor. Financial Cryptography and Data Security. Springer Berlin Heidelberg; 2013. 2. p. 258-274p. (Lecture Notes in Computer Science).
Parameterized st-Orientations of Graphs: Algorithms and Experiments. In: Kaufmann M, Wagner D, editors. Graph Drawing. Springer Berlin Heidelberg; 2007. 2. p. 220-233p. (Lecture Notes in Computer Science).
Parsimonious covering theory in cognitive diagnosis and adaptive instruction. In: Diagnostic Monitoring of Skill and Knowledge AcquisitionDiagnostic Monitoring of Skill and Knowledge Acquisition. Psychology Press; 1990. 5. p. 510.
Pattern Recognition in Video. In: Pal S, Bandyopadhyay S, Biswas S, editors. Pattern Recognition and Machine IntelligencePattern Recognition and Machine Intelligence. Vol 3776. Springer Berlin / Heidelberg; 2005. 1. p. 11-20p. (Lecture Notes in Computer Science; vol 3776).
Perceptual Completion and Memory. In: Perceptual organization in vision: behavioral and neural perspectivesPerceptual organization in vision: behavioral and neural perspectives.; 2003. 4. p. 403.
Perceptual organization as generic object recognition. In: and Kellman T S PFJ, editor. From Fragments to Objects Segmentation and Grouping in VisionFrom Fragments to Objects Segmentation and Grouping in Vision. Vol Volume 130. North-Holland; 2001. 2. p. 295-329p.
Performance of a Three-Stage System for Multi-Document Summarization. In: DUC 03 Conference ProceedingsDUC 03 Conference Proceedings. U.S. National Inst. of Standards and Technology; 2003.
Plan Databases: Model and Algebra. In: Seipel D, Turull-Torres J, editors. Foundations of Information and Knowledge Systems. Vol 2942. Springer Berlin / Heidelberg; 2004. 3. p. 302-319p. (Lecture Notes in Computer Science; vol 2942).
Planning for Interactions among Autonomous Agents. In: Hindriks K, Pokahr A, Sardina S, editors. Programming Multi-Agent Systems. Vol 5442. Springer Berlin / Heidelberg; 2009. 1. p. 1-23p. (Lecture Notes in Computer Science; vol 5442).
Planning in Answer Set Programming Using Ordered Task Decomposition. In: Günter A, Kruse R, Neumann B, editors. KI 2003: Advances in Artificial Intelligence. Vol 2821. Springer Berlin / Heidelberg; 2003. 4. p. 490-504p. (Lecture Notes in Computer Science; vol 2821).
Polydioptric Cameras: New Eyes for Structure from Motion. In: Van Gool L, editor. Pattern RecognitionPattern Recognition. Vol 2449. Springer Berlin / Heidelberg; 2002. 6. p. 618-625p. (Lecture Notes in Computer Science; vol 2449).
Polynomial-time algorithm for computing translocation distance between genomes. In: Galil Z, Ukkonen E, editors. Combinatorial Pattern MatchingCombinatorial Pattern Matching. Vol 937. Springer Berlin / Heidelberg; 1995. 1. p. 162-176p. (Lecture Notes in Computer Science; vol 937).
Pose-Encoded Spherical Harmonics for Robust Face Recognition Using a Single Image. In: Zhao W, Gong S, Tang X, editors. Analysis and Modelling of Faces and GesturesAnalysis and Modelling of Faces and Gestures. Vol 3723. Springer Berlin / Heidelberg; 2005. 2. p. 229-243p. (Lecture Notes in Computer Science; vol 3723).
PRAM-On-Chip: A Quest for Not-So-Obvious Non-obviousness. In: Fiala J, Koubek V, Kratochvíl J, editors. Mathematical Foundations of Computer Science 2004Mathematical Foundations of Computer Science 2004. Vol 3153. Springer Berlin / Heidelberg; 2004. 1. p. 104-105p. (Lecture Notes in Computer Science; vol 3153).
PrDB: Managing Large-Scale Correlated Probabilistic Databases (Abstract). In: Godo L, Pugliese A, editors. Scalable Uncertainty ManagementScalable Uncertainty Management. Vol 5785. Springer Berlin / Heidelberg; 2009. 1. p. 1. (Lecture Notes in Computer Science; vol 5785).
Predicate Privacy in Encryption Systems. In: Reingold O, editor. Theory of Cryptography. Vol 5444. Springer Berlin / Heidelberg; 2009. 4. p. 457-473p. (Lecture Notes in Computer Science; vol 5444).
Predictive Modeling-Based Data Collection in Wireless Sensor Networks. In: Verdone R, editor. Wireless Sensor NetworksWireless Sensor Networks. Vol 4913. Springer Berlin / Heidelberg; 2008. 3. p. 34-51p. (Lecture Notes in Computer Science; vol 4913).
Preserving Context with Zoomable User Interfaces. In: The craft of information visualization: readings and reflectionsThe craft of information visualization: readings and reflections. Morgan Kaufmann Publishers Inc.; 2003. 8. p. 83.