Publications
2011. A case for query by image and text content: searching computer help using screenshots and keywords. Proceedings of the 20th international conference on World wide web. :775-784.
2011. A case for query by image and text content: searching computer help using screenshots and keywords. Proceedings of the 20th international conference on World wide web. :775-784.
2011. A Case Study in Optimization of Gait and Physical Parameters for a Snake-Inspired Robot Based on a Rectilinear Gait. Journal of mechanisms and robotics. 3(1)
2011. A case study of measuring process risk for early insights into software safety. Software Engineering (ICSE), 2011 33rd International Conference on. :623-632.
2011. Cell cycle dependent TN-C promoter activity determined by live cell imaging.. Cytometry. Part A : the journal of the International Society for Analytical Cytology. 79(3):192-202.
2011. CHI 2011 sustainability community invited panel: challenges ahead. 2011 annual conference extended abstracts on Human factors in computing systems. :73-76.
2011. Clonal transmission, dual peak, and off-season cholera in Bangladesh. Infection Ecology & Epidemiology. 1(1)
2011. Cloud software upgrades: Challenges and opportunities. 2011 International Workshop on the Maintenance and Evolution of Service-Oriented and Cloud-Based Systems (MESOCA) . :1-10.
2011. Collective graph identification. Proceedings of the 17th ACM SIGKDD international conference on Knowledge discovery and data mining. :87-95.
2011. Communicating with caps: managing usage caps in home networks. ACM SIGCOMM Computer Communication Review. 41(4):470-471.
2011. Communicating with Caps: Managing Usage Caps in Home Networks. SIGCOMM Comput. Commun. Rev.. 41(4):470-471.
2011. Comparing Social Tags to Microblogs. Privacy, security, risk and trust (passat), 2011 IEEE third international conference on and 2011 IEEE third international conference on social computing (socialcom). :1380-1383.
2011. Comparing values and sentiment using Mechanical Turk. Proceedings of the 2011 iConference. :783-784.
2011. Complete Fairness in Secure Two-Party Computation. Journal of the ACM. 58(6):24:1–24:37-24:1–24:37.
2011. Component-based restoration of speckled images. 2011 18th IEEE International Conference on Image Processing (ICIP). :2797-2800.
2011. A computational framework for authoring and searching product design specifications. Advanced Engineering Informatics. 25(3):516-534.
2011. A computational statistics approach for estimating the spatial range of morphogen gradients. Development. 138(22):4867-4874.
2011. Computing morse decompositions for triangulated terrains: an analysis and an experimental evaluation. Image Analysis and Processing–ICIAP 2011. :565-574.
2011. Computing the Tree of Life: Leveraging the Power of Desktop and Service Grids. Parallel and Distributed Processing Workshops and Phd Forum (IPDPSW), 2011 IEEE International Symposium on. :1896-1902.
2011. Constant-Round Private Function Evaluation with Linear Complexity. Advances in Cryptology–ASIACRYPT 2011. :556-571.
2011. A Constraint-Reduced Variant of Mehrotra's Predictor-Corrector Algorithm. Computational Optimization and Applications.
2011. Constructing Inverted Files on a Cluster of Multicore Processors Near Peak I/O Throughput. UMIACS-TR-2011-03