Publications
2012. Mobile Data Offloading through Opportunistic Communications and Social Participation. Mobile Computing, IEEE Transactions on. 11(5):821-834.
2012. Modality and Negation in SIMT Use of Modality and Negation in Semantically-Informed Syntactic MT. Computational Linguistics. :1-48.
2012. Modeling Images using Transformed Indian Buffet Processes. International Conference of Machine Learning.
2012. Mr. LDA: A Flexible Large Scale Topic Modeling Package using Variational Inference in MapReduce. Proceedings of ACM International Conference on World Wide Web, 2012.
2012. Networking lessons: From computers to water. 2012 Fourth International Conference on Communication Systems and Networks (COMSNETS). :1-6.
2012. No-Reference Image Quality Assessment using Visual Codebooks. Image Processing, IEEE Transactions on. PP(99):1-1.
2012. Occurrence of protozoans & their limnological relationships in some ponds of Mathbaria, Bangladesh. University Journal of Zoology, Rajshahi University. 29(1):69-71.
2012. An Optimized High-Throughput Strategy for Constructing Inverted Files. Parallel and Distributed Systems, IEEE Transactions on. PP(99):1-1.
2012. Optimizing epidemic protection for socially essential workers. Proceedings of the 2nd ACM SIGHIT International Health Informatics Symposium. :31-40.
2012. Organizing User Search Histories. Knowledge and Data Engineering, IEEE Transactions on. 24(5):912-925.
2012. Polytope approximation and the Mahler volume. Proceedings of the Twenty-Third Annual ACM-SIAM Symposium on Discrete Algorithms. :29-42.
2012. Preparation and probing of coherent vibrational wave packets in the ground electronic state of HD^{+}. Physical Review A. 85(3)
2012. Privacy in Social Networks. Synthesis Lectures on Data Mining and Knowledge Discovery. 3(1):1-85.
2012. Prototyping scalable digital signal processing systems for radio astronomy using dataflow models. Radio Science. 47(3):n/a-n/a.
2012. The Provenance of WINE. Dependable Computing Conference (EDCC), 2012 Ninth European. :126-131.
2012. Quantitative measurement of allele‐specific protein expression in a diploid yeast hybrid by LC‐MS. Molecular Systems Biology. 8(1)
2012. Querying event sequences by exact match or similarity search: Design and empirical evaluation. Interacting with Computers. 24(2):55-68.
2012. Quid Pro Quo-tocols: Strengthening Semi-Honest Protocols with Dual Execution. IEEE Symposium on Security and Privacy.
2012. A Random Forest System Combination Approach for Error Detection in Digital Dictionaries. Innovative hybrid approaches to the processing of textual data, EACL 2012 Workshop. :78-86.
2012. Recognizing Human Actions by Learning and Matching Shape-Motion Prototype Trees. Pattern Analysis and Machine Intelligence, IEEE Transactions on. 34(3):533-547.
2012. Refactoring Network Infrastructure to Improve Manageability: A Case Study of Home Networking. SIGCOMM Comput. Commun. Rev.. 42(3):54-61.
2012. Review of efficient secure two-party protocols: techniques and constructions by Carmit Hazay and Yehuda Lindell. SIGACT News. 43(1):21-23.