Publications
Export 326 results:
[ Author] Title Type Year Filters: First Letter Of Last Name is P [Clear All Filters]
2000. A storytelling robot for pediatric rehabilitation. Proceedings of the fourth international ACM conference on Assistive technologies. :50-55.
1998. Visualizing medical records with LifeLines. CHI 98 conference summary on Human factors in computing systems. :28-29.
2006. Shared family calendars: Promoting symmetry and accessibility. ACM Trans. Comput.-Hum. Interact.. 13(3):313-346.
1993. Exploring remote images: a telepathology workstation. Proceedings of the INTERACT '93 and CHI '93 conference on Human factors in computing systems. :518–-518–.
2003. The World's Information in Digital Libraries. The craft of information visualization: readings and reflectionsThe craft of information visualization: readings and reflections. :149-149.
1995. Organization overviews and role management: inspiration for future desktop environments. Proceedings of the Fourth Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises, 1995. :14-22.
1991. An overview of Hyperties, its user interface and data model. Hypermedia/Hypertext And Object-Oriented Databases. Chapman & Hall. :17-31.
2009. Sparsity inspired selection and recognition of iris images. Biometrics: Theory, Applications, and Systems, 2009. BTAS '09. IEEE 3rd International Conference on. :1-6.
2010. Sectored Random Projections for Cancelable Iris Biometrics. 2010 IEEE International Conference on Acoustics Speech and Signal Processing (ICASSP). :1838-1841.
2010. Secure and robust iris recognition using random projections and sparse representations. Pattern Analysis and Machine Intelligence, IEEE Transactions on. (99):1-1.
2004. Polyubiquitin chains: polymeric protein signals. Current Opinion in Chemical Biology. 8(6):610-616.
2006. What are the grand challenges for data mining? - KDD-2006 panel report ACM SIGKDD Explorations Newsletter. 8(2):70-77.
2006. Is there a grand challenge or X-prize for data mining? Proceedings of the 12th ACM SIGKDD international conference on Knowledge discovery and data mining. :954-956.
2010. Loop transformations for interface-based hierarchies IN SDF graphs. 2010 21st IEEE International Conference on Application-specific Systems Architectures and Processors (ASAP). :341-344.
1998. Probabilistic resource failure in real-time process algebra. CONCUR'98 Concurrency Theory. :465-472.
2017. Beyond cost-effectiveness: Using systems analysis for infectious disease preparedness. Vaccine. 35:A46-A49.
2016. Strategic Planning in Population Health and Public Health Practice: A Call to Action for Higher Education. The Milbank Quarterly. 94906033(143S2):109-125.
2009. Triaging Checklists: a Substitute for a PhD in Static Analysis. Evaluation and Usability of Programming Languages and Tools (PLATEAU) PLATEAU 2009.
1999. Impact of Cl− and Na+ ions on simulated structure and dynamics of βARK1 PH domain. Proteins: Structure, Function, and Bioinformatics. 35(2):206-217.
2006. An architecture for specification-based detection of semantic integrity violations in kernel dynamic data. Proceedings of the 15th conference on USENIX Security Symposium. :20-20.
2003. The dangers of mitigating security design flaws: a wireless case study. IEEE Security & Privacy. 1(1):28-36.
2004. Copilot - a coprocessor-based kernel runtime integrity monitor. Proceedings of the 13th conference on USENIX Security Symposium - Volume 13. :13-13.
2007. Automated detection of persistent kernel control-flow attacks. Proceedings of the 14th ACM conference on Computer and communications security. :103-115.