Publications
Export 116 results:
Author Title Type [ Year] Filters: First Letter Of Last Name is I [Clear All Filters]
2005. Learning preconditions for planning from plan traces and HTN structure. Computational Intelligence. 21(4):388-413.
2005. Probabilistic temporal logics via the modal mu-calculus. Theoretical Computer Science. 342(2-3):316-350.
2006. Differential Transcriptional Response to Nonassociative and Associative Components of Classical Fear Conditioning in the Amygdala and Hippocampus. Learning & MemoryLearn. Mem.. 13(2):135-142.
2006. A feature generation algorithm for sequences with application to splice-site prediction. Knowledge Discovery in Databases: PKDD 2006. :553-560.
2006. How Multirobot Systems Research will Accelerate our Understanding of Social Animal Behavior. Proceedings of the IEEE. 94(7):1445-1463.
2006. An Interaction-Dependent Model for Transcription Factor Binding. Systems Biology and Regulatory GenomicsSystems Biology and Regulatory Genomics. 4023:225-234.
2006. Maintenance of K-nn and spatial join queries on continuously moving points. ACM Trans. Database Syst.. 31(2):485-536.
2006. System and method for locating a closest server in response to a client .... 09/726,192(7020698)
2007. Adaptive query processing: why, how, when, what next? Proceedings of the 33rd international conference on Very large data bases. :1426-1427.
2007. Fast and scalable approximation methods for finding minimum cost flows with .... 10/053,079(7280526)
2007. Power optimization in fault-tolerant topology control algorithms for wireless multi-hop networks. IEEE/ACM Transactions on Networking (TON). 15(6):1345-1358.
2007. Retrieving matching CAD models by using partial 3D point clouds. Computer-Aided Design & Applications. 4(5):629-638.
2007. Time and Space Efficient Algorithms for Two-Party Authenticated Data Structures. Information and Communications Security. :1-15.
2008. An AGM-based belief revision mechanism for probabilistic spatio-temporal logics. Proceedings of the 23rd national conference on Artificial intelligence. :511-516.
2008. Delegating Capabilities in Predicate Encryption Systems. Automata, Languages and Programming. 5126:560-578.
2008. Optimal Cryptographic Hardness of Learning Monotone Functions. Automata, Languages and Programming. :36-47.
2008. The Randomized Coloring Procedure with Symmetry-Breaking. Automata, Languages and ProgrammingAutomata, Languages and Programming. 5125:306-319.
2009. Automatic classification of human values: Applying computational thinking to information ethics. Proceedings of the American Society for Information Science and Technology. 46(1):1-4.
2009. Flexible and efficient querying and ranking on hyperlinked data sources. Proceedings of the 12th International Conference on Extending Database Technology: Advances in Database Technology. :553-564.
2009. Model-based quality assessment and base-calling for second-generation sequencing data. Johns Hopkins University, Dept. of Biostatistics Working Papers. :184-184.
2009. Off-Line Loop Investigation for Handwriting Analysis. IEEETransactions on Pattern Analysis and Machine Intelligence. 31(2):193-209.