Publications
2011. Windowed Spectral Regularization of Inverse Problems. SIAM Journal on Scientific Computing. 33(6)
2004. Window-based, discontinuity preserving stereo. Computer Vision and Pattern Recognition, 2004. CVPR 2004. Proceedings of the 2004 IEEE Computer Society Conference on. 1:I-66-I-73Vol.1-I-66-I-73Vol.1.
1987. Window control strategies for on-line text traversal. Department of Computer Science and Human Computer Interaction Laboratory, University of Maryland, College Park, MD (correspondence with B. Schneiderman).
1991. Window control strategies for hypertext traversal: An empirical study. Proc. 29th Annual ACM DC Technical Symposium.
2006. Will pyramids built of nuggets topple over? Proceedings of the main conference on Human Language Technology Conference of the North American Chapter of the Association of Computational Linguistics. :383-390.
2006. Widgets, Planets, and Demons: the Case for the Integration of Human, Embedded, and Virtual Agents via Mediation. Proceedings of Swarmfest.
2011. Wide-baseline stereo for face recognition with large pose variation. Computer Vision and Pattern Recognition (CVPR), 2011 IEEE Conference on. :537-544.
2009. Wideband fast multipole accelerated boundary element methods for the three-dimensional Helmholtz equation.. The Journal of the Acoustical Society of America. 125(4):2566-2566.
2011. Wide-area routing dynamics of malicious networks. Proceedings of the ACM SIGCOMM 2011 conference. :432-433.
2010. Wide-area route control for distributed services. Proceedings of the 2010 USENIX conference on USENIX annual technical conference. :2-2.
2004. Wide baseline image registration with application to 3-D face modeling. Multimedia, IEEE Transactions on. 6(3):423-434.
2002. Wide baseline image registration using prior information. Multimedia Signal Processing, 2002 IEEE Workshop on. :37-40.
2005. Why Not Make Interfaces Better than 3D Reality? (2004) Institute for Systems Research Technical Reports.
2003. Why not make interfaces better than 3D reality? IEEE Computer Graphics and Applications. 23(6):12-15.
2009. Why Do Upgrades Fail and What Can We Do About It?: Toward Dependable, Online Upgrades in Enterprise System Middleware'09 Proceedings of the 10th ACM/IFIP/USENIX International Conference on Middleware. :18:1-18:20.
2008. Why Do Hubs in the Yeast Protein Interaction Network Tend To Be Essential: Reexamining the Connection between the Network Topology and Essentiality. PLoS Comput BiolPLoS Comput Biol. 4(8):e1000140-e1000140.
2010. Why Did the Person Cross the Road (There)? Scene Understanding Using Probabilistic Logic Models and Common Sense Reasoning Computer Vision – ECCV 2010. 6312:693-706.
1995. Why Broyden's Nonsymmetric Method Terminates on Linear Equations. SIAM Journal on Optimization. 5:231-235.
2010. Who's Hogging the Bandwidth: The Consequences of Revealing the Invisible in the Home. SIGCHI '10. :659-668.
2004. Whole-genome shotgun assembly and comparison of human genome assemblies. Proceedings of the National Academy of Sciences of the United States of America. 101(7):1916-1916.