Journal Articles

Pages

Lee CH, Kim Y, Varshney A. Saliency-guided lighting. IEICE TRANSACTIONS on Information and Systems. 2009;2:369-73.
Kim Y, Patro R, Ip CY, O’Leary DP, Anishkin A, Sukharev S, et al. Salient Frame Detection for Molecular Dynamics Simulations. Scientific Visualization: Interactions, Features, Metaphors. 1998;2:160-175.
Jutla A, Aldaach H, Billian H, Akanda A, Huq A, Colwell RR. Satellite Based Assessment of Hydroclimatic Conditions Related to Cholera in Zimbabwe. PLOS ONE. 2015;(9Suppl 1):e0137828.
Akanda A, Aziz S, Jutla A, Huq A, Alam M, Ahsan G, et al. Satellites and Cell Phones Form a Cholera Early-Warning System. Eos. 2018;99.
Banerjee S, Bhattacharjee B, Kommareddy C. Scalable application layer multicast. SIGCOMM Comput. Commun. Rev.. 2002;32(4):205-217.
Zadorozhny V, Raschid L, Gal A. SCALABLE CATALOG INFRASTRUCTURE FOR MANAGING ACCESS COSTS AND SOURCE SELECTION IN WIDE AREA NETWORKS. International Journal of Cooperative Information Systems. 2008;17(1):77-109.
Katz J, Yung M. Scalable protocols for authenticated group key exchange. Journal of Cryptology. 2007;20(1):85-113.
Katz J, Yung M. Scalable protocols for authenticated group key exchange. Advances in Cryptology-CRYPTO 2003. 2003:110-125.
Banerjee S, Bhattacharjee B. Scalable secure group communication over IP multicast. Selected Areas in Communications, IEEE Journal on. 2002;20(8):1511-1527.
Mayergoyz ID. Scalar Preisach Models of Hysteresis. The Science of Hysteresis: Mathematical modeling and applications. 2006;1:293.
O’Leary DP. Scaling symmetric positive definite matrices to prescribed row sums. Linear Algebra and its Applications. 2003;370:185-191.
Kembhavi A, Siddiquie B, Miezianko R, McCloskey S, Davis LS, Schwartz WR, et al. Scene it or not? incremental multiple kernel learning for object detection. Proceedings of the International Conference on Computer Vision. 2009.
Anil Kumar V, Marathe M, Parthasarathy S, Srinivasan A. Scheduling on Unrelated Machines under Tree-Like Precedence Constraints. Algorithmica. 2009;55(1):205-226.
Bhattacharyya SS, Lee EA. Scheduling synchronous dataflow graphs for efficient looping. The Journal of VLSI Signal Processing. 1993;6(3):271-288.
Roussopoulos N, Mark L. Schema manipulation in self-describing and self-documenting data models. International Journal of Parallel Programming. 1985;14(1):1-28.
LoVerde PT, Hirai H, Merrick JM, Lee NH, El-Sayed NM. Schistosoma mansoni genome project: an update. Parasitology International. 2004;53(2):183-192.
Haas BJ, Berriman M, Hirai H, Cerqueira GG, LoVerde PT, El-Sayed NM. Schistosoma mansoni genome: Closing in on a final gene set. Experimental Parasitology. 2007;117(3):225-228.
Lansky AL, Getoor L. Scope and abstraction: Two criteria for localized planning. INTERNATIONAL JOINT CONFERENCE ON ARTIFICIAL INTELLIGENCE. 1995;14:1612-1619.
Yi L, Zheng Y, Doermann D, Jaeger S. Script-Independent Text Line Segmentation in Freestyle Handwritten Documents. IEEETransactions on Pattern Analysis and Machine Intelligence. 2008:1313-1329.
Plaisant C, Lam S, Shneiderman B, Smith MS, Roseman D, Marchand G, et al. Searching Electronic Health Records for Temporal Patterns in Patient Histories: A Case Study with Microsoft Amalga. AMIA Annual Symposium ProceedingsAMIA Annu Symp Proc. 2008;2008:601-605.
Langmead B, Schatz MC, Jimmy Lin, Pop M, Salzberg SL. Searching for SNPs with cloud computing. Genome Biology. 2009;10(11):R134.
Kim J, Oard D, Soergel D. Searching large collections of recorded speech: A preliminary study. Proceedings of the American Society for Information Science and Technology. 2003;40(1):330-339.
Jong F, Oard D, Ordelman R, Raaijmakers S. Searching spontaneous conversational speech. ACM SIGIR Forum. 2007;41:104.
Belhumeur P, Chen D, Feiner S, Jacobs DW, Kress W, Ling H, et al. Searching the world’s herbaria: A system for visual identification of plant species. Computer Vision–ECCV 2008. 2008:116-129.
Alam M, Hasan NA, Sadique A, Bhuiyan NA, Ahmed KU, Nusrin S, et al. Seasonal Cholera Caused by Vibrio Cholerae Serogroups O1 and O139 in the Coastal Aquatic Environment of Bangladesh. Applied and Environmental MicrobiologyAppl. Environ. Microbiol.. 2006;72(6):4096-4104.
Stine CO, Alam M, Tang L, Nair BG, Siddique KA, Faruque SM, et al. Seasonal Cholera from Multiple Small Outbreaks, Rural Bangladesh. Emerging Infectious DiseasesEmerg Infect Dis. 2008;14(5):831-833.
Bonatti PA, Kraus S, V.S. Subrahmanian. Secure agents. Annals of Mathematics and Artificial Intelligence. 2003;37(1):169-235.
Pillai J, Patel VM, Chellappa R, Ratha N. Secure and robust iris recognition using random projections and sparse representations. Pattern Analysis and Machine Intelligence, IEEE Transactions on. 2010;(99):1.
M. Wu, Mui L, Mohtashemi M, Szolovits P. Secure Health Information Sharing System: SHARE. Proceedings of the AMIA SymposiumProc AMIA Symp. 2001:1060.
Choi S, Hwang KW, Katz J, Malkin T, Rubenstein D. Secure multi-party computation of boolean circuits with applications to privacy in on-line marketplaces. Topics in Cryptology–CT-RSA 2012. 2012:416-432.
Gennaro R, Katz J, Krawczyk H, Rabin T. Secure network coding over the integers. Public Key Cryptography–PKC 2010. 2010:142-160.
Alexander DS, Arbaugh WA, Keromytis AD, Muir S, Smith JM. Secure quality of service handling: SQoSH. IEEE Communications Magazine. 2000;38(4):106-112.
Boyen X, Dodis Y, Katz J, Ostrovsky R, Smith A. Secure remote authentication using biometric data. Advances in Cryptology–EUROCRYPT 2005. 2005:147-163.
Ray A, Sengupta B, Cleaveland R. Secure requirements elicitation through triggered message sequence charts. Distributed Computing and Internet Technology. 2005:273-282.
Katz J. Secure routing in ad hoc networks. Workshop on Security of ad hoc and Sensor Networks: Proceedings of the 2 nd ACM workshop on Security of ad hoc and sensor networks. 2004.
Ramachandran A, Mundada Y, Tariq MB, Feamster N. Securing enterprise networks using traffic tainting. Special Interest Group on Data Communication. 2008.
Lu W, Varna AL, Wu M. Security analysis for privacy preserving search of multimedia. Image Processing (ICIP). 2010:26-29.

Pages