Publications
2010. System and method for analysis of an opinion expressed in documents with regard to a particular topic. 11/808,278
2006. Synthetic‐perturbation techniques for screening shared memory programs. Software: Practice and Experience. 24(8):679-701.
2011. Synthesis-based recognition of low resolution faces. 2011 International Joint Conference on Biometrics (IJCB). :1-6.
2008. Synthesis of Silhouettes and Visual Hull Reconstruction for Articulated Humans. Multimedia, IEEE Transactions on. 10(8):1565-1577.
2005. Synthesis of novel views of moving objects in airborne video. Proc. British Machine Vision Conference. :290-299.
1999. Synthesis of embedded software from synchronous dataflow specifications. The Journal of VLSI Signal Processing. 21(2):151-166.
1979. Syntactic/semantic interactions in programmer behavior: A model and experimental results. International Journal of Parallel Programming. 8(3):219-238.
2007. Syntactic sentence compression in the biomedical domain: facilitating access to related articles. Information Retrieval. 10(4):393-414.
1994. A syntactic approach to scale-space-based corner description. IEEE Transactions on Pattern Analysis and Machine Intelligence. 16(7):748-751.
2006. On Synchronization of Weighted Essentially Non-Oscillatory Methods. 36th AIAA Fluid Dynamics Conference and Exhibit.
2017. SYN-004 (ribaxamase), an oral beta-lactamase, mitigates antibiotic-mediated dysbiosis in a porcine gut microbiome model. Journal of Applied Microbiology. (1Suppl 11):66-79.
1994. Symmetry breaking for suffix tree construction. Proceedings of the twenty-sixth annual ACM symposium on Theory of computing. :300-309.
1995. Symmetries of natural and artificial neural networks. Symmetry: Culture and Science. 6:446-449.
2007. Symmetric Objects are Hardly Ambiguous. Computer Vision and Pattern Recognition, 2007. CVPR '07. IEEE Conference on. :1-7.
2009. Symbolic-to-statistical hybridization: extending generation-heavy machine translation. Machine Translation. 23(1):23-63.
2010. Symbolic security analysis of ruby-on-rails web applications. Proceedings of the 17th ACM conference on Computer and communications security. :585-594.
1997. Symbolic model checking of infinite state systems using Presburger arithmetic. Computer Aided Verification. :400-411.