Publications
2008. Beyond nouns: Exploiting prepositions and comparative adjectives for learning visual classifiers. Computer Vision–ECCV 2008. :16-29.
2008. Bilateral symmetry of object silhouettes under perspective projection. 19th International Conference on Pattern Recognition, 2008. ICPR 2008. :1-4.
2008. Biofilms in water, its role and impact in human disease transmission. Current Opinion in Biotechnology. 19(3):244-247.
2008. Bittorrent is an auction: analyzing and improving bittorrent's incentives. Proceedings of the ACM SIGCOMM 2008 conference on Data communication. :243-254.
2008. Black-Box Construction of a Non-malleable Encryption Scheme from Any Semantically Secure One. Theory of Cryptography. :427-444.
2008. Bridging game theory and cryptography: recent results and future directions. Proceedings of the 5th conference on Theory of cryptography. :251-272.
2008. Budgeted Allocations in the Full-Information Setting. Approximation, Randomization and Combinatorial Optimization. Algorithms and TechniquesApproximation, Randomization and Combinatorial Optimization. Algorithms and Techniques. 5171:247-253.
2008. Call-Stack Coverage for GUI Test Suite Reduction. Software Engineering, IEEE Transactions on. 34(1):99-115.
2008. Camera Phone Based Tools for People with Visual Impairments. The First International Workshop on Mobile Multimedia Processing.
2008. Can great research be taught?: independent research with cross-disciplinary thinking and broader impact Proceedings of the 39th SIGCSE technical symposium on Computer science education. :471-475.
2008. Cancellation of critical points in 2D and 3D Morse and Morse-Smale complexes. Discrete Geometry for Computer Imagery. :117-128.
2008. Canny edge detection on NVIDIA CUDA. Computer Vision and Pattern Recognition Workshops, 2008. CVPRW '08. IEEE Computer Society Conference on. :1-8.
2008. Capacity of Asynchronous Random-Access Scheduling in Wireless Networks. IEEE INFOCOM 2008. The 27th Conference on Computer Communications. :1148-1156.
2008. Capturing Approximated Data Delivery Tradeoffs. Data Engineering, 2008. ICDE 2008. IEEE 24th International Conference on. :1471-1473.
2008. Checking type safety of foreign function calls. ACM Transactions on Programming Languages and Systems (TOPLAS). 30(4):18-18.
2008. CiCUTS: Combining System Execution Modeling Tools with Continuous Integration Environments. Engineering of Computer-Based Systems, IEEE International Conference on the. :66-75.
2008. Combining Classifiers with Informational Confidence. Studies in Computational Intelligence: Machine Learning in Document Analysis and RecognitionStudies in Computational Intelligence: Machine Learning in Document Analysis and Recognition. :163-192.
2008. Combining open-source with research to re-engineer a hands-on introductory NLP course. Proceedings of the Third Workshop on Issues in Teaching Computational Linguistics. :71-79.
2008. Combining Speech Retrieval Results with Generalized Additive Models. ACL'08: Proceedings of the 2008 Conference of the Association for Computational Linguistics.
2008. Community response grid (CRG) for a university campus: Design requirements and implications. Proceedings of the 5th International ISCRAM Conference. :34-43.