Journal Articles
(Publications are listed alphabetically by title)
Pages
A framework for theoretical analysis of content fingerprinting. Proc. of SPIE Media Forensics and Security. 2010.
A front-end generator for verification tools. Tools and Algorithms for the Construction and Analysis of Systems. 1995:153-173.
A functional correctness model of program verification. Computer. 1990;23(11):30-39.
A GENEALOGICAL APPROACH TO QUANTIFYING LINEAGE DIVERGENCE. Evolution. 2008;62(9):2411-2422.
A general framework for efficient geographic routing in wireless networks. Computer Networks. 2010;54(5):844-861.
A general method for sensor planning in multi-sensor systems: Extension to random occlusion. International Journal of Computer Vision. 2008;76(1):31-52.
A general-purpose simulation environment for developing connectionist models. Simulation. 1988;51(1):5.
A Generalization of Brooks' Theorem. Computer Science Technical Reports. 1992.
A generalized approach to real-time schedulability analysis. IEEE Real-Time Systems Newsletter. 1993;9(1-2):98-103.
A generalized conjugate gradient algorithm for solving a class of quadratic programming problems. Linear Algebra and its Applications. 1980;34:371-399.
A generic approach to simultaneous tracking and verification in video. Image Processing, IEEE Transactions on. 2002;11(5):530-544.
A generic construction for intrusion-resilient public-key encryption. Topics in Cryptology–CT-RSA 2004. 2004:1997.
A global-state-triggered fault injector for distributed system evaluation. Parallel and Distributed Systems, IEEE Transactions on. 2004;15(7):593-605.
A grander goal: A thousand-fold increase in human capabilities. Educom review. 1997;32(6):4-10.
A graph theoretic model of data structures. SIGIR Forum. 1972;7(4):36-44.
A graphical filter/flow representation of Boolean queries: A prototype implementation and evaluation. Journal of the American Society for Information Science. 1993;44(6):327-339.
A graphical query interface based on aggregation/generalization hierarchies. Information Systems. 1993;18(4):215-232.
A group signature scheme from lattice assumptions. Advances in Cryptology-ASIACRYPT 2010. 2010:395-412.
A Hierarchical Algorithm for Fast Debye Summation with Applications to Small Angle Scattering. Technical Reports from UMIACS. 2011.
A hierarchy of cameras for 3D photography. Computer Vision and Image Understanding. 2004;96(3):274-293.
A Hybrid Chebyshev Krylov Subspace Algorithm for Solving Nonsymmetric Systems of Linear Equations. SIAM Journal on Scientific and Statistical ComputingSIAM J. Sci. and Stat. Comput.. 1986;7(3):840.
A joint signal processing and cryptographic approach to multimedia encryption. Image Processing, IEEE Transactions on. 2006;15(7):2061-2075.
A Knowledge Integration Framework for Information Visualization (2004). Institute for Systems Research Technical Reports. 2005.
A Krylov multisplitting algorithm for solving linear systems of equations. Linear Algebra and its Applications. 1993;194:9-29.
A Language for Human Action. Computer. 2007;40(5):42-51.
A Language Identification Application Built on the Java Client/Server Platform. From Research to Commercial Applications: Making NLP Work in Practice. 1997:43-47.
A latent dirichlet allocation model for entity resolution. 6th SIAM Conference on Data Mining (SDM), Bethesda, USA. 2006.
A Learning Approach Towards Detection and Tracking of Lane Markings. IEEE Transactions on Intelligent Transportation Systems. 2010;PP(99):1-12.
A Linear Iterative Approach for Hierarchical Shortest Path Finding. Technical Reports from UMIACS, UMIACS-TR-2002-97. 2002.
A linear-time model-checking algorithm for the alternation-free modal mu-calculus. Formal methods in system design. 1993;2(2):121-147.
A logic for characterizing multiple bounded agents. Autonomous Agents and Multi-Agent Systems. 2000;3(4):351-387.
A logic-based approach to data integration. Theory Pract. Log. Program.. 2002;2(3):323-368.
A logic-based model of intention formation and action for multi-agent subcontracting. Artificial Intelligence. 2005;163(2):163-201.
A Low-Overhead Asynchronous Interconnection Network for GALS Chip Multiprocessors. Computer-Aided Design of Integrated Circuits and Systems, IEEE Transactions on. 2011;30(4):494-507.
A Low-overhead Scheduling Methodology for Fine-grained Acceleration of Signal Processing Systems. Journal of Signal Processing Systems. 2010;60(3):333-343.
A mammalian promoter model links cis elements to genetic networks. Biochemical and Biophysical Research Communications. 2006;347(1):166-177.
A management tool for evaluation of software design. Software Engineering, IEEE Transactions on. 1991;17(9):961-971.
A max {m, n} algorithm for determining the graph H from its line graph G. Information Processing Letters. 1973;2(4):108-112.
A Metagenomic Approach to Evaluating Surface Water Quality in Haiti. International Journal of Environmental Research and Public Health. 2018;1542(10):2211.
A method for the detection of meaningful and reproducible group signatures from gene expression profiles. Journal of Bioinformatics and Computational Biology. 2011;9(3):431-451.
A methodology for extrinsic evaluation of text summarization: Does ROUGE correlate. Proceedings of the ACL Workshop on Intrinsic and Extrinsic Evaluation Measures for Machine Translation and/or Summarization. 2005:1-8.
A methodology for query reformulation in CIS using semantic knowledge. International Journal of Cooperative Information Systems. 1996;5(4):431-468.
A miniature pan-tilt actuator: the spherical pointing motor. IEEE Transactions on Robotics and Automation. 1994;10(3):298-308.
A miniaturized space-variant active vision system: Cortex-I. Machine Vision and applications. 1995;8(2):101-109.
A modality lexicon and its use in automatic tagging. Proceedings of the Seventh conference on International Language Resources and Evaluation (LREC’10). 2010:1402-1407.
A model for computer frustration: the role of instrumental and dispositional factors on incident, session, and post-session frustration and mood. Computers in Human Behavior. 2006;22(6):941-961.
A model for magnetic aftereffect in the presence of time varying demagnetizing fields. Magnetics, IEEE Transactions on. 2000;36(5):3182-3184.
A model for optimizing indexed file structures. International Journal of Parallel Programming. 1974;3(1):91-101.
A model of BGP routing for network engineering. SIGMETRICS Perform. Eval. Rev.. 2004;32(1):331-342.
A model programming environment. Advances in Human-Computer Interaction. 1985;1:105-132.