Publications
Export 188 results:
[ Author![(Asc)](https://www.umiacs.umd.edu/sites/all/modules/biblio/misc/arrow-asc.png)
Filters: First Letter Of Last Name is W [Clear All Filters]
2013. "I Want to Imagine How That Place Looks": Designing Technologies to Support Connectivity Between Africans Living Abroad and Home. SIGCHI '13. :2755-2764.
2010. Deliberate Interactions: Characterizing Technology Use in Nairobi, Kenya. SIGCHI '10. :2593-2602.
2005. An interactive and team approach to multimedia design curriculum. Signal Processing Magazine, IEEE. 22(6):14-19.
2010. Rapid prototyping for digital signal processing systems using Parameterized Synchronous Dataflow graphs. 2010 21st IEEE International Symposium on Rapid System Prototyping (RSP). :1-7.
2001. Secure Health Information Sharing System: SHARE. Proceedings of the AMIA SymposiumProc AMIA Symp. :1060-1060.
2010. Intensity normalization improves color calling in SOLiD sequencing. Nat MethNat Meth. 7(5):336-337.
2004. Collusion resistant multimedia fingerprinting: A unified framework. Electronic Imaging Symposium: Security, Steganography, and Watermarking of Multimedia Contents VI, San Jose, CA, Proc. of SPIE. 5306:748-759.
2004. Distortion compensated lookup-table embedding: Joint security and robustness enhancement for quantization based data hiding. Electronic Imaging Symposium: Security, Steganography, and Watermarking of Multimedia Contents VI, San Jose, CA, Proc. of SPIE. 5306:610-621.
2009. ApproxRank: Estimating Rank for a Subgraph. IEEE 25th International Conference on Data Engineering, 2009. ICDE '09. :54-65.
2001. Modulation and multiplexing techniques for multimedia data hiding. Proc. of SPIE ITcom’01, SPIE vol. 4518
2010. Online Empirical Evaluation of Tracking Algorithms. IEEE Transactions on Pattern Analysis and Machine Intelligence. 32(8):1443-1458.
2007. Taking Advantage of Collective Operation Semantics for Loosely Coupled Simulations. Parallel and Distributed Processing Symposium, International. :128-128.
2010. Data hiding in compiled program binaries for supplementing computer functionality. 11/445,374(7840789)
1998. An algorithm for wipe detection. Image Processing, 1998. ICIP 98. Proceedings. 1998 International Conference on. 1:893-897vol.1-893-897vol.1.
2005. Handling uneven embedding capacity in binary images: a revisit. Proceedings of SPIE. 5681(1):194-205.
2006. New DNS results of shockwave/turbulent boundary layer interaction. 3rd AIAA Flow Control Conference.
2010. Design and implementation of real-time signal processing applications on heterogeneous multiprocessor arrays. 2010 Conference Record of the Forty Fourth Asilomar Conference on Signals, Systems and Computers (ASILOMAR). :2121-2125.
1999. Digital watermarking using shuffling. Image Processing, 1999. ICIP 99. Proceedings. 1999 International Conference on. 1:291-295vol.1-291-295vol.1.
2011. Predicting author blog channels with high value future posts for monitoring. Proceedings of the Twenty-Fifth Conference on Artificial Intelligence (AAAI).
1998. Watermarking for image authentication. Image Processing, 1998. ICIP 98. Proceedings. 1998 International Conference on. 2:437-441vol.2-437-441vol.2.
2004. Data hiding in binary image for authentication and annotation. Multimedia, IEEE Transactions on. 6(4):528-538.