Publications
Export 7148 results:
[ Author] Title Type Year Filters: New-year%E2%80%99s-resolutions-software-quality is [Clear All Filters]
2011. How Many Tiers? Pricing in the Internet Transit Market SIGCOMM-Computer Communication Review. 41(4):194-194.
2007. Multiplexing BGP sessions with BGP-Mux. Proceedings of the 2007 ACM CoNEXT conference. :44:1–44:2-44:1–44:2.
2008. Deciding kCFA is Complete for EXPTIME. ICFP '08 Proceedings of the 13th ACM SIGPLAN International Conference on Functional Programming. :275-282.
2011. Abstracting Abstract Machines: A Systematic Approach to Higher-Order Program Analysis. arXiv:1105.1743 [cs].
2007. Relating Complexity and Precision in Control Flow Analysis. ICFP '07 Proceedings of the 12th ACM SIGPLAN International Conference on Functional Programming. :85-96.
1998. User Interface Reengineering: A Diagnostic Approach. Technical Reports of the Computer Science Department.
2002. Structural Properties of Polyubiquitin Chains in Solution. Journal of Molecular Biology. 324(4):637-647.
2005. Structural Determinants for Selective Recognition of a Lys48-Linked Polyubiquitin Chain by a UBA Domain. Molecular Cell. 18(6):687-698.
2004. Solution Conformation of Lys63-linked Di-ubiquitin Chain Provides Clues to Functional Diversity of Polyubiquitin Signaling. Journal of Biological ChemistryJ. Biol. Chem.. 279(8):7055-7063.
2005. Using NMR Spectroscopy to Monitor Ubiquitin Chain Conformation and Interactions with Ubiquitin‐Binding Domains. Ubiquitin and Protein Degradation, Part B. Volume 399:177-192.
2009. Flexible and efficient querying and ranking on hyperlinked data sources. Proceedings of the 12th International Conference on Extending Database Technology: Advances in Database Technology. :553-564.
2007. Position and distance specificity are important determinants of cis-regulatory motifs in addition to evolutionary conservation. Nucleic Acids Research. 35(10):3203-3213.
2004. Java-through-c compilation: An enabling technology for java in embedded systems. Proceedings of the conference on Design, automation and test in Europe-Volume 3. :30161-30161.
1992. Modeling of a Grasp for Handwriting. Proceedings of the Twenty-Third Annual Modeling and Simulation Conference. :2133-2140.
2011. Modeling and Analysis of Correlated Binary Fingerprints for Content Identification. Information Forensics and Security, IEEE Transactions on. 6(3):1146-1159.
2009. Modeling and analysis of content identification. Multimedia and Expo, 2009. ICME 2009. IEEE International Conference on. :1528-1531.
2011. Modeling temporal correlations in content fingerprints. Acoustics, Speech and Signal Processing (ICASSP), 2011 IEEE International Conference on. :1860-1863.
2009. Fingerprinting Compressed Multimedia Signals. Information Forensics and Security, IEEE Transactions on. 4(3):330-345.
2010. A framework for theoretical analysis of content fingerprinting. Proc. of SPIE Media Forensics and Security.
2009. Modeling content fingerprints using markov random fields. Information Forensics and Security, 2009. WIFS 2009. First IEEE International Workshop on. :111-115.