Publications
2011. Constant-Round Private Function Evaluation with Linear Complexity. Advances in Cryptology–ASIACRYPT 2011. :556-571.
2004. Constant-time navigation in four-dimensional nested simplicial meshes. Shape Modeling Applications, 2004. Proceedings. :221-230.
1992. Constrained Matrix Sylvester Equations. SIAM Journal on Matrix Analysis and Applications. 13(1):1-9.
2008. A Constrained Probabilistic Petri Net Framework for Human Activity Detection in Video. Multimedia, IEEE Transactions on. 10(6):982-996.
2005. Constrained spectral clustering under a local proximity structure assumption. In Proceedings of the 18th International Conference of the Florida Artificial Intelligence Research Society (FLAIRS-05).
2008. Constraint Integration for Efficient Multiview Pose Estimation with Self-Occlusions. Pattern Analysis and Machine Intelligence, IEEE Transactions on. 30(3):493-506.
2006. Constraint Integration for Multiview Pose Estimation of Humans with Self-Occlusions. 3D Data Processing, Visualization, and Transmission, Third International Symposium on. :900-907.
1998. Constraint-based array dependence analysis. ACM Transactions on Programming Languages and SystemsACM Trans. Program. Lang. Syst.. 20(3):635-678.
2011. A Constraint-Reduced Variant of Mehrotra's Predictor-Corrector Algorithm. Computational Optimization and Applications.
2002. Constraints on the Generation of Tense, Aspect, and Connecting Words from Temporal Expressions.
2010. Constructing folksonomies by integrating structured metadata. Proceedings of the 19th international conference on World wide web. :1165-1166.
2010. Constructing Folksonomies by Integrating Structured Metadata with Relational Clustering. Workshops at the Twenty-Fourth AAAI Conference on Artificial Intelligence.
2011. Constructing Inverted Files on a Cluster of Multicore Processors Near Peak I/O Throughput. UMIACS-TR-2011-03
2005. Constructing task visibility intervals for a surveillance system. Proceedings of the third ACM international workshop on Video surveillance & sensor networks. :141-148.
2006. Constructing task visibility intervals for video surveillance. Multimedia systems. 12(3):211-226.
2005. On constructing universal one-way hash functions from arbitrary one-way functions. Journal of Cryptology.
2002. Construction of a Chinese–English Verb Lexicon for Machine Translation and Embedded Multilingual Applications. Machine Translation. 17(2):99-137.
2003. Construction of an efficient overlay multicast infrastructure for real-time applications. INFOCOM 2003. Twenty-Second Annual Joint Conference of the IEEE Computer and Communications. IEEE Societies. 2:1521-1531vol.2-1521-1531vol.2.
2003. Content Features for Logical Document Labeling. Proc. SPIE Conference on Document Recognition and Retrieval X. :189-196.