Publications
1995. How to succeed in graduate school: a guide for students and advisors: part II of II. Crossroads. 1(3):1-6.
1993. Workshop summary: AAAI-92 Workshop on Constraining Learning with Prior Knowledge. ACM SIGART Bulletin. 4(3):11-13.
2006. Heuristic search and information visualization methods for school redistricting. Proceedings of the 18th conference on Innovative applications of artificial intelligence - Volume 2. :1774-1781.
1994. Knowledge acquisition techniques for a military planning system. Tools with Artificial Intelligence, 1994. Proceedings., Sixth International Conference on. :454-460.
2011. EAAI-10: The First Symposium on Educational Advances in Artificial Intelligence. AI Magazine. 32(1):91-91.
2005. Bayesian network learning with abstraction hierarchies and context-specific independence. Machine Learning: ECML 2005. :485-496.
1994. How to succeed in graduate school: a guide for students and advisors: part I of II. Crossroads. 1(2):3-9.
2008. LEARNING STRUCTURED BAYESIAN NETWORKS: COMBINING ABSTRACTION HIERARCHIES AND TREE‐STRUCTURED CONDITIONAL PROBABILITY TABLES. Computational Intelligence. 24(1):1-22.
1994. Evaluation of learning biases using probabilistic domain knowledge. Proceedings of the workshop on Computational learning theory and natural learning systems (vol. 2) : intersections between theory and experiment: intersections between theory and experiment. :97-112.
1995. How to succeed in graduate school: A guide for students and advisors. International Amateur-Professional Photoelectric Photometry Communications. 58:15-15.
2010. Confidence-based feature acquisition to minimize training and test costs. Proceedings of the SIAM Conference on Data Mining. 76(373):514-524.
2011. Gene Coexpression Network Topology of Cardiac Development, Hypertrophy, and FailureClinical Perspective. Circulation: Cardiovascular GeneticsCirc Cardiovasc Genet. 4(1):26-35.
2001. A feature-based approach to automated design of multi-piece sacrificial molds. Journal of Computing and Information Science in Engineering. 1:225-225.
2003. Algorithms for computing global accessibility cones. Journal of Computing and Information Science in Engineering. 3:200-200.
2009. Complete Genome Sequence of Aggregatibacter (Haemophilus) Aphrophilus NJ8700. Journal of BacteriologyJ. Bacteriol.. 191(14):4693-4694.
2001. Efficient and Non-interactive Non-malleable Commitment. Advances in Cryptology — EUROCRYPT 2001Advances in Cryptology — EUROCRYPT 2001. 2045:40-59.
1980. An experiment using memorization/reconstruction as a measure of programmer ability. International Journal of Man-Machine Studies. 13(3):339-354.
2002. An unsupervised method for word sense tagging using parallel corpora. Proceedings of the 40th Annual Meeting on Association for Computational Linguistics. :255-262.
2010. A graph-theoretic approach to protect static and moving targets from adversaries. Proceedings of the 9th International Conference on Autonomous Agents and Multiagent Systems: volume 1 - Volume 1. :299-306.
2007. Effects of cyclization on conformational dynamics and binding properties of Lys48-linked di-ubiquitin. Protein Science. 16(3):369-378.
2002. Analysis of stage-specific gene expression in the bloodstream and the procyclic form of Trypanosoma brucei using a genomic DNA-microarray. Molecular and Biochemical Parasitology. 123(2):115-123.