Publications
2007. Bitstore: An incentive-compatible solution for blocked downloads in bittorrent. Proc. Joint Workshop on The Economics of Networked Systems and Incentive-Based Computing (NetEcon).
2008. Bittorrent is an auction: analyzing and improving bittorrent's incentives. Proceedings of the ACM SIGCOMM 2008 conference on Data communication. :243-254.
2008. Black-Box Construction of a Non-malleable Encryption Scheme from Any Semantically Secure One. Theory of Cryptography. :427-444.
2009. On black-box constructions of predicate encryption from trapdoor permutations. Advances in Cryptology–ASIACRYPT 2009. :197-213.
2003. Blind Deconvolution Using a Regularized Structured Total Least Norm Approach. SIAM J. on Matrix Analysis and Applications. 24:1018-1037.
1980. The block conjugate gradient algorithm and related methods. Linear Algebra and its Applications. 29:293-322.
1996. The block distributed memory model. Parallel and Distributed Systems, IEEE Transactions on. 7(8):830-840.
1994. The block distributed memory model for shared memory multiprocessors. Parallel Processing Symposium, 1994. Proceedings., Eighth International. :752-756.
2006. Block preconditioners based on approximate commutators. SIAM Journal on Scientific Computing. 27(5):1651-1668.
2002. Block preconditioners for the discrete incompressible Navier–Stokes equations. International Journal for Numerical Methods in Fluids. 40(3‐4):333-344.
2009. Block-diagonal preconditioning for spectral stochastic finite-element systems. IMA Journal of Numerical Analysis. 29(2):350-350.
1996. A Block-GTH Algorithm for Finding the Stationary Vector of a Markov Chain. SIAM Journal on Matrix Applications. 17:470-488.
1988. Block-Preconditioned Conjugate-Gradient-Like Methods for Numerical Reservoir Simulation. SPE Reservoir EngineeringSPERE. 3(1)
2011. Blurring-invariant Riemannian metrics for comparing signals and images. 2011 IEEE International Conference on Computer Vision (ICCV). :1770-1775.
2012. A Blur-robust Descriptor with Applications to Face Recognition. IEEE Transactions on Pattern Analysis and Machine Intelligence. PP(99):1-1.
1997. Book Preview-Designing the User Interface: Strategies for Effective Human-Computer Interaction. Interactions-New York. 4(5):61-61.
2002. Book Preview-Leonardo's Laptop: Human Needs and the New Computing Technologies. Interactions-New York. 9(4):43-43.
2011. Boosting the scalability of botnet detection using adaptive traffic sampling. Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security. :124-134.
2006. Bootstrapping free-space optical networks. Selected Areas in Communications, IEEE Journal on. 24(12):13-22.
2006. A bootstrapping model for directional wireless networks. Communications Letters, IEEE. 10(12):840-842.
2005. Bootstrapping parsers via syntactic projection across parallel texts. Nat. Lang. Eng.. 11(3):311-325.
2003. Bootstrapping security associations for routing in mobile ad-hoc networks. IEEE Global Telecommunications Conference, 2003. GLOBECOM '03. 3:1511-1515vol.3-1511-1515vol.3.