Journal Articles
(Publications are listed alphabetically by title)
Pages
Camera-Based Analysis of Text and Documents: ASurvey. International Journal on Document Analysis and Recognition. 2005;7(2+3):83-104.
Can Deliberately Incomplete Gene Sample Augmentation Improve a Phylogeny Estimate for the Advanced Moths and Butterflies (Hexapoda: Lepidoptera)? Systematic BiologySyst Biol. 2011;60(6):782-796.
Can DNS-based blacklists keep up with bots. Conference on email and anti-spam. 2006.
Can parallel algorithms enhance serial implementation? Communications of the ACM. 1996;39(9):88-91.
Capacitance Matrix Methods for the Helmholtz Equation on General Three Dimensional Regions. Mathematics of Computation. 1979;33:849-879.
Capacity of wireless networks under SINR interference constraints. Wireless Networks. 2011;17(7):1605-1624.
CAPE: Automatically Predicting Changes in Group Behavior. Mathematical Methods in Counterterrorism. 2009:253-269.
Capture and recreation of higher order 3d sound fields via reciprocity. International Conference on Audio Display. 2004.
Capture and rendering of spatial sound over headphones. The Journal of the Acoustical Society of America. 2006;120(5):3094.
Capture, annotate, browse, find, share: novel interfaces for personal photo management. International Journal of Human-] Computer Interaction. 2007;23(3):315-337.
CARA: A Cultural-Reasoning Architecture. IEEE Intelligent Systems. 2007;22(2):12-16.
Case study of gate-level logic simulation on an extremely fine-grained chip multiprocessor. Journal of Embedded Computing. 2006;2(2):181-190.
Case study: a message board as a technology probe for family communication and coordination. Proceedings of the 2002 Conference on Human Factors in Computing Systems. 2002.
Categorized Graphical Overviews for Web Search Results: An Exploratory Study using U.S. Government Agencies as a Meaningful and Stable Structure (2004). Institute for Systems Research Technical Reports. 2005.
Catergorized Overviews for Web Search Results: Two Exploratory Studies in the US Government Domain. Technical Reports from UMIACS. 2005.
CATVAR: A database of categorial variations for English. Proceedings of the MT Summit. 2003:471-474.
cDNA expressed sequence tags of Trypanosoma brucei rhodesiense provide new insights into the biology of the parasite. Molecular and Biochemical Parasitology. 1995;73(1-2):75-90.
Cell breathing in wireless LANs: Algorithms and evaluation. IEEE Transactions on Mobile Computing. 2007;6(2):164-178.
Cell cycle dependent TN-C promoter activity determined by live cell imaging. Cytometry A. 2011;79(3):192-202.
Cellular automata models of self-replicating systems. Advances in Computers. 1998;47:141-183.
Centers of sets of pixels. Discrete Applied Mathematics. 2000;103(1–3):297-306.
Challenges in building an Arabic-English GHMT system with SMT components. Proceedings of the 11th Annual Conference of the European Association for Machine Translation (EAMT-2006). 2006:56-65.
Chance-constrained programs for link prediction. Proceedings of Workshop on Analyzing Networks and Learning with Graphs at NIPS Conference. 2009.
Characterization and control of pin diameter during in-mold assembly of mesoscale revolute joints. North American Manufacturing Research Institute. 2009;37.
Characterization of a Vibrio cholerae phage isolated from the coastal water of Peru. Environmental Microbiology. 2003;5(5):350-354.
Characterization of Ehp, a Secreted Complement Inhibitory Protein from Staphylococcus aureus. Journal of Biological Chemistry. 2007;282(41):30051-30061.
Characterization of enhancer-of-white-apricot in Drosophila melanogaster. GeneticsGenetics. 1990;126(4):1061-1069.
Characterization of human faces under illumination variations using rank, integrability, and symmetry constraints. Computer Vision-ECCV 2004. 2004:588-601.
Characterization of Microbial Signatures From Advanced Treated Wastewater Biofilms. Journal - American Water Works Association. 2017;109:E503-E512.
Characterization of Pathogenic Vibrio parahaemolyticus from the Chesapeake Bay, Maryland. Frontiers in Microbiology. 2017.
Characterization of Pseudoalteromonas citrea and P. nigrifaciens Isolated from Different Ecological Habitats Based on REP-PCR Genomic Fingerprints. Systematic and Applied Microbiology. 2002;25(2):275-283.
Characterization of security notions for probabilistic private-key encryption. Journal of Cryptology. 2006;19(1):67-95.
Characterization of the Microbiome at the World’s Largest Potable Water Reuse Facility. Frontiers in Microbiology. 2018.
Characterization of the turbulence structure in supersonic boundary layers using DNS data. AIAA Paper. 2006;3539.
Characterization of Two Cryptic Plasmids Isolated in Haiti from Clinical Vibrio cholerae Non-O1/Non-O139. Frontiers in Microbiology. 2017.
Characterizing scattering coefficients numerically via the fast multipole accelerated boundary element method. The Journal of the Acoustical Society of America. 2010;127(3):1751.
Checking type safety of foreign function calls. ACM Transactions on Programming Languages and Systems (TOPLAS). 2008;30(4):18.
Children as codesigners of new technologies: Valuing the imagination to transform what is possible. New Directions for Youth Development. 2010;2010(128):35-43.
Chipping away at censorship firewalls with user-generated content. Proc. 19th USENIX Security Symposium, Washington, DC. 2010.
Chitin promotes Mycobacterium ulcerans growth. FEMS Microbiology Ecology. 2016;928565871(6):fiw067.
Cholera: the killer from the deep. The Biochemist. 2005.
Chosen-ciphertext security from identity-based encryption. SIAM Journal on Computing. 2007;36(5):1301-1328.
Chosen-ciphertext security from identity-based encryption. Advances in Cryptology-Eurocrypt 2004. 2004:207-222.
Chosen-ciphertext security of multiple encryption. Theory of Cryptography. 2005:188-209.
Chromatic Induction and Perspective Distortion. Journal of VisionJ Vis. 2005;5(8):1026.
Chromatic nearest neighbor searching: A query sensitive approach. Computational Geometry. 2000;17(3–4):97-119.
Chromosome Identification Using Hidden Markov Models: Comparison with Neural Networks, Singular Value Decomposition, Principal Components Analysis, and Fisher Discriminant Analysis. Laboratory Investigation. 2000;80(11):1629-1641.
Chunks in PLAN: Language support for programs as packets. PROCEEDINGS OF THE ANNUAL ALLERTON CONFERENCE ON COMMUNICATION CONTROL AND COMPUTING. 1999;37:PROCEEDINGS OF THE ANNUAL ALLERTON CONFERENCE ON COMMUNICATION CONTROL AND COMPUTING - PROCEEDINGS OF THE ANNUAL ALLERTON CONFER.
Circumscribing with sets. Artificial Intelligence. 1987;31(2):201-211.