Submitted. Testing Run-time Evolving Systems. DROPS-IDN/2106.
2014. Can Optimally-Fair Coin Tossing Be Based on One-Way Functions? Theory of Cryptography. :217-239.
2014. On Minimal Assumptions for Sender-Deniable Public Key Encryption. Public-Key Cryptography – PKC 2014. :574-591.
2014. Stable isotope labeling of phosphoproteins for large-scale phosphorylation rate determination. Molecular & Cellular Proteomics.
2013. Adaptive and Concurrent Secure Computation from New Adaptive, Non-malleable Commitments. Advances in Cryptology - ASIACRYPT 2013. :316-336.
2013. Age-Related Differences in Performance with Touchscreens Compared to Traditional Mouse Input. CHI 2013 To Appear.
2013. Combining Crowdsourcing and Google Street View to Identify Street-level Accessibility Problems. CHI 2013 To Appear.
2013. Dirichlet Mixtures, the Dirichlet Process, and the Structure of Protein Space. Journal of Computational Biology. 20
2013. Distinct Rap1 Activity States Control the Extent of Epithelial Invagination via α-Catenin. Developmental Cell. 25(3):299-309.
2013. Document Image Quality Assessment: A Brief Survey. International Conference on Document Analysis and Recognition (ICDAR).
2013. From Principles to Practice with Class in the First Year. arXiv:1306.4713 [cs].
2013. "I Want to Imagine How That Place Looks": Designing Technologies to Support Connectivity Between Africans Living Abroad and Home. SIGCHI '13. :2755-2764.
2013. Mind the Theoretical Gap: Interpreting, Using, and Developing Behavioral Theory in HCI Research. CHI 2013 To Appear.
2013. Online Latent Dirichlet Allocation with Infinite Vocabulary. International Conference on Machine Learning.
2013. Optimizing Abstract Abstract Machines. arXiv:1211.3722 [cs].
2013. Parallel and Dynamic Searchable Symmetric Encryption. Financial Cryptography and Data Security. :258-274.
2013. Parallel geometric classification of stem cells by their three-dimensional morphology. Computational Science & Discovery. 6(1):015007.
2013. Practical Dynamic Proofs of Retrievability. CCS '13 Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security . :325-336.
2013. Primate Transcript and Protein Expression Levels Evolve Under Compensatory Selection Pressures. Science. 342(6162):1100-1104.
2013. Real-time No-Reference Image Quality Assessment based on Filter Learning. International Conference on Computer Vision and Pattern Recognition (CVPR).
2013. Segmenting time-lapse phase contrast images of adjacent NIH 3T3 cells.. Journal of microscopy. 249(1):41-52.
2013. Signatures of Correct Computation. Theory of Cryptography. :222-242.
2013. Specific and Non-Specific Protein Association in Solution: Computation of Solvent Effects and Prediction of First-Encounter Modes for Efficient Configurational Bias Monte Carlo Simulations. The Journal of Physical Chemistry B. 117(41):12360-12374.
2013. Streaming Authenticated Data Structures. Advances in Cryptology – EUROCRYPT 2013. :353-370.