Publications
2010. Deliberate Interactions: Characterizing Technology Use in Nairobi, Kenya. SIGCHI '10. :2593-2602.
2011. Recommendations in social media for brand monitoring. Proceedings of the fifth ACM conference on Recommender systems. :345-348.
2007. Signal Processing Magazine E-Newsletter: Inside Out [From the Editor]. Signal Processing Magazine, IEEE. 24(6):2-8.
2003. Data hiding in image and video .II. Designs and applications. Image Processing, IEEE Transactions on. 12(6):696-705.
2005. Dynamic network resource allocation using multimedia content features and .... 09/795,952(6947378)
2004. Collusion-resistant fingerprinting for multimedia. Signal Processing Magazine, IEEE. 21(2):15-27.
2010. Data hiding in compiled program binaries for supplementing computer functionality. 11/445,374(7840789)
2007. Community response grids for older adults: Motivations, usability, and sociability. Proceedings of the 13th Americas Conference on Information Systems.
2004. Flexible Control of Data Transfers between Parallel Programs. Proceedings of the 5th IEEE/ACM International Workshop on Grid Computing. :226-234.
1999. Digital watermarking using shuffling. Image Processing, 1999. ICIP 99. Proceedings. 1999 International Conference on. 1:291-295vol.1-291-295vol.1.
1999. Attacks on digital watermarks. Signals, Systems, and Computers, 1999. Conference Record of the Thirty-Third Asilomar Conference on. 2:1508-1512vol.2-1508-1512vol.2.
2003. Multimedia Data Hiding.
2003. Data hiding in image and video .I. Fundamental issues and solutions. Image Processing, IEEE Transactions on. 12(6):685-695.
2006. Schistosoma mansoni (Platyhelminthes, Trematoda) nuclear receptors: Sixteen new members and a novel subfamily. Gene. 366(2):303-315.
2006. Analysis of Shock Motion in a Compression Ramp Configuration using DNS data. Bulletin of the American Physical Society.
2007. Robust Visual Tracking Using the Time-Reversibility Constraint. Computer Vision, 2007. ICCV 2007. IEEE 11th International Conference on. :1-8.
2002. A recognition algorithm for Chinese characters in diverse fonts. Image Processing. 2002. Proceedings. 2002 International Conference on. 3:981-984vol.3-981-984vol.3.
2003. Joint security robustness enhancement for quantization embedding. Image Processing, 2003. ICIP 2003. Proceedings. 2003 International Conference on. 2:II-483-6vol.3-II-483-6vol.3.
2010. Online Empirical Evaluation of Tracking Algorithms. IEEE Transactions on Pattern Analysis and Machine Intelligence. 32(8):1443-1458.
2008. Community response grid (CRG) for a university campus: Design requirements and implications. Proceedings of the 5th International ISCRAM Conference. :34-43.
2005. Handling uneven embedding capacity in binary images: a revisit. Proceedings of SPIE. 5681(1):194-205.
2003. Automating DAML-S Web Services Composition Using SHOP2. The Semantic Web - ISWC 2003. 2870:195-210.