Publications
Export 377 results:
Author Title [ Type] Year Filters: First Letter Of Last Name is Y [Clear All Filters]
2004. Applying Model-based Distributed Continuous Quality Assurance Processes to Enhance Persistent Software Attributes. IEEE Software. 21(6):32-40.
1995. Approximating the minimum equivalent digraph. SIAM Journal on Computing (SICOMP). 24(4):859-872.
2010. Authenticated broadcast with a partially compromised public-key infrastructure. Stabilization, Safety, and Security of Distributed Systems. :144-158.
2005. Bayesian filtering and integral image for visual tracking. Proceedings of the Worshop on Image Analysis for Multimedia Interactive Services (WIAMIS'05).
2009. On black-box constructions of predicate encryption from trapdoor permutations. Advances in Cryptology–ASIACRYPT 2009. :197-213.
2011. Can Deliberately Incomplete Gene Sample Augmentation Improve a Phylogeny Estimate for the Advanced Moths and Butterflies (Hexapoda: Lepidoptera)? Systematic BiologySyst Biol. 60(6):782-796.
2009. Chance-constrained programs for link prediction. Proceedings of Workshop on Analyzing Networks and Learning with Graphs at NIPS Conference.
2006. Characterization of security notions for probabilistic private-key encryption. Journal of Cryptology. 19(1):67-95.
2005. A Comparison of Voice Controlled and Mouse Controlled Web Browsing (2000). Institute for Systems Research Technical Reports.
2007. COMPUTING PERFECT AND STABLE MODELS USING ORDERED MODEL TREES. Computational Intelligence. 11(1):89-112.
2006. Covering arrays for efficient fault characterization in complex configuration spaces. IEEE Transactions on Software Engineering. :20-34.
2011. Co‐designing contextual tutorials for older adults on searching health information on the internet. Proceedings of the American Society for Information Science and Technology. 48(1):1-4.
2005. Critical Factors Influencing the Occurrence of Vibrio Cholerae in the Environment of Bangladesh. Applied and Environmental MicrobiologyAppl. Environ. Microbiol.. 71(8):4645-4654.
2004. Cutter path generation for 2.5D milling by combining multiple different cutter path patterns. International Journal of Production Research. 42(11):2141-2161.
2003. Data hiding in image and video .II. Designs and applications. Image Processing, IEEE Transactions on. 12(6):696-705.
2000. Design and use of linear models for image motion analysis. International Journal of Computer Vision. 36(3):171-193.
2006. Detection and analysis of hair. Pattern Analysis and Machine Intelligence, IEEE Transactions on. 28(7):1164-1169.
2007. Development of in-mold assembly process for realizing mesoscale revolute joints. Transactions of North American Manufacturing Research Institution of SME. 35
1999. Distinguishing systems and distinguishing senses: New evaluation methods for word sense disambiguation. Natural language engineering. 5(2):113-133.
2008. The draft genome of the transgenic tropical fruit tree papaya (Carica papaya Linnaeus). Nature. 452(7190):991-996.