Publications
Export 7148 results:
[ Author] Title Type Year Filters: Believe-me%E2%80%94we-can-do-annotating-persuasive-acts-blog-text is [Clear All Filters]
2008. MINT: a Market for INternet Transit. Proceedings of the 2008 ACM CoNEXT Conference. :70:1–70:6-70:1–70:6.
2011. How Many Tiers? Pricing in the Internet Transit Market SIGCOMM-Computer Communication Review. 41(4):194-194.
2007. Multiplexing BGP sessions with BGP-Mux. Proceedings of the 2007 ACM CoNEXT conference. :44:1–44:2-44:1–44:2.
2007. Relating Complexity and Precision in Control Flow Analysis. ICFP '07 Proceedings of the 12th ACM SIGPLAN International Conference on Functional Programming. :85-96.
2008. Deciding kCFA is Complete for EXPTIME. ICFP '08 Proceedings of the 13th ACM SIGPLAN International Conference on Functional Programming. :275-282.
2011. Abstracting Abstract Machines: A Systematic Approach to Higher-Order Program Analysis. arXiv:1105.1743 [cs].
1998. User Interface Reengineering: A Diagnostic Approach. Technical Reports of the Computer Science Department.
2002. Structural Properties of Polyubiquitin Chains in Solution. Journal of Molecular Biology. 324(4):637-647.
2005. Structural Determinants for Selective Recognition of a Lys48-Linked Polyubiquitin Chain by a UBA Domain. Molecular Cell. 18(6):687-698.
2004. Solution Conformation of Lys63-linked Di-ubiquitin Chain Provides Clues to Functional Diversity of Polyubiquitin Signaling. Journal of Biological ChemistryJ. Biol. Chem.. 279(8):7055-7063.
2005. Using NMR Spectroscopy to Monitor Ubiquitin Chain Conformation and Interactions with Ubiquitin‐Binding Domains. Ubiquitin and Protein Degradation, Part B. Volume 399:177-192.
2009. Flexible and efficient querying and ranking on hyperlinked data sources. Proceedings of the 12th International Conference on Extending Database Technology: Advances in Database Technology. :553-564.
2007. Position and distance specificity are important determinants of cis-regulatory motifs in addition to evolutionary conservation. Nucleic Acids Research. 35(10):3203-3213.
2004. Java-through-c compilation: An enabling technology for java in embedded systems. Proceedings of the conference on Design, automation and test in Europe-Volume 3. :30161-30161.
1992. Modeling of a Grasp for Handwriting. Proceedings of the Twenty-Third Annual Modeling and Simulation Conference. :2133-2140.
2007. Analysis of Nonlinear Collusion Attacks on Fingerprinting Systems for Compressed Multimedia. Image Processing, 2007. ICIP 2007. IEEE International Conference on. 2:II-133-II-136-II-133-II-136.
2009. Modeling content fingerprints using markov random fields. Information Forensics and Security, 2009. WIFS 2009. First IEEE International Workshop on. :111-115.
2008. A decision theoretic framework for analyzing binary hash-based content identification systems. Proceedings of the 8th ACM workshop on Digital rights management. :67-76.
2007. Collusion-Resistant Fingerprinting for Compressed Multimedia Signals. Acoustics, Speech and Signal Processing, 2007. ICASSP 2007. IEEE International Conference on. 2:II-165-II-168-II-165-II-168.
2011. Modeling and Analysis of Correlated Binary Fingerprints for Content Identification. Information Forensics and Security, IEEE Transactions on. 6(3):1146-1159.
2009. Modeling and analysis of content identification. Multimedia and Expo, 2009. ICME 2009. IEEE International Conference on. :1528-1531.