Publications
Export 367 results:
[ Author] Title Type Year Filters: First Letter Of Last Name is L [Clear All Filters]
1990. Drosophila melanogaster genes for U1 snRNA variants and their expression during development. Nucleic Acids ResearchNucl. Acids Res.. 18(23):6971-6979.
1998. Semantics for Disjunctive and Normal Disjunctive Logic Programs. Handbook of logic in artificial intelligence and logic programming. 5:325-325.
2003. Goal-Driven Reconfiguration of Polymorphous Architectures. Domain-specific processors: systems, architectures, modeling, and simulation. 20:151-151.
1995. Discovery of self-replicating structures using a genetic algorithm. Evolutionary Computation, 1995., IEEE International Conference on. 2:678-683.
1997. Automatic discovery of self-replicating structures in cellular automata. Evolutionary Computation, IEEE Transactions on. 1(3):165-178.
2005. Improved HMM alignment models for languages with scarce resources. Proceedings of the ACL Workshop on Building and Using Parallel Texts. :83-86.
2011. Suppression subtractive hybridization PCR isolation of cDNAs from a Caribbean soft coral. Electronic Journal of Biotechnology. 14(1):8-9.
2000. Textual data mining to support science and technology management. Journal of Intelligent Information Systems. 15(2):99-119.
2005. Temperature-Driven Campylobacter Seasonality in England and Wales. Applied and Environmental MicrobiologyAppl. Environ. Microbiol.. 71(1):85-92.
2003. Predictability of Vibrio Cholerae in Chesapeake Bay. Applied and Environmental MicrobiologyAppl. Environ. Microbiol.. 69(5):2773-2785.
2009. Enabling search over encrypted multimedia databases. SPIE/IS&T Media Forensics and Security. :7254-18.
2010. Security analysis for privacy preserving search of multimedia. Image Processing (ICIP). :26-29.
2011. Secure video processing: Problems and challenges. Acoustics, Speech and Signal Processing (ICASSP), 2011 IEEE International Conference on. :5856-5859.
2010. Multimedia forensic hash based on visual words. IEEE Computer Society International Conference on Image Processing. :989-992.
2009. Secure image retrieval through feature protection. Acoustics, Speech and Signal Processing, 2009. ICASSP 2009. IEEE International Conference on. :1533-1536.
2007. Amino acid quantitative structure property relationship database: a web-based platform for quantitative investigations of amino acids. Protein Engineering Design and SelectionProtein Engineering, Design and Selection. 20(7):347-351.
2011. Seam carving estimation using forensic hash. Proceedings of the thirteenth ACM multimedia workshop on Multimedia and security. :9-14.
2010. Forensic hash for multimedia information. SPIE Media Forensics and Security. :7541–0Y-7541–0Y.
1999. A comparative study of the backbone dynamics of two closely related lipid binding proteins: Bovine heart fatty acid binding protein and porcine ileal lipid binding protein. Molecular and Cellular Biochemistry. 192(1):109-121.
2009. Triangle Inequality and Routing Policy Violations in the Internet. Passive and Active Network MeasurementPassive and Active Network Measurement. 5448:45-54.