Publications
2005. Secure remote authentication using biometric data. Advances in Cryptology–EUROCRYPT 2005. :147-163.
2005. Secure requirements elicitation through triggered message sequence charts. Distributed Computing and Internet Technology. :273-282.
2005. Security of feature extraction in image hashing. Acoustics, Speech, and Signal Processing, 2005. Proceedings. (ICASSP '05). IEEE International Conference on. 2:ii/1041-ii/1044Vol.2-ii/1041-ii/1044Vol.2.
2005. Seeking the source: software source code as a social and technical artifact. Proceedings of the 2005 international ACM SIGGROUP conference on Supporting group work. :197-206.
2005. Segmentation and appearance model building from an image sequence. Image Processing, 2005. ICIP 2005. IEEE International Conference on. 1:I-321-4-I-321-4.
2005. Serendipitous discovery of Wolbachia genomes in multiple Drosophila species. Genome Biology. 6(3):R23-R23.
2005. Severity and Impact of Computer User Frustration: A Comparison of Student and Workplace Users (2002). Institute for Systems Research Technical Reports.
2005. Shaky ladders, hyperplane-defined functions and genetic algorithms: Systematic controlled observation in dynamic environments. Applications of Evolutionary Computing. :600-609.
2005. "Shape Activity": a continuous-state HMM for moving/deforming shapes with application to abnormal activity detection. Image Processing, IEEE Transactions on. 14(10):1603-1616.
2005. Shape and the stereo correspondence problem. International Journal of Computer Vision. 65(3):147-162.
2005. Show Me! Guidelines for producing recorded demonstrations. 2005 IEEE Symposium on Visual Languages and Human-Centric Computing. :171-178.
2005. Show Me! Guidelines for Producing Recorded Demonstrations (2005). Institute for Systems Research Technical Reports.
2005. A simulation and data analysis system for large-scale, data-driven oil reservoir simulation studies. Concurrency and Computation: Practice and Experience. 17(11):1441-1467.
2005. Simulation and Secure Computation-Handling Expected Polynomial-Time Strategies in Simulation-Based Security Proofs. Lecture Notes in Computer Science. 3378:128-149.
2005. Snap-Together Visualization: A User Interface for Coordinating Visualizations via Relational Schemata (2000). Institute for Systems Research Technical Reports.
2005. Social and Psychological Influences on Computer User Frustration (Newhagen book chapter, 2002). Institute for Systems Research Technical Reports.
2005. Software defect reduction top 10 list. Foundations of empirical software engineering: the legacy of Victor R. Basili. :426-426.
2005. Software process improvement in small organizations: a case study. Software, IEEE. 22(6):68-75.
2005. Software repository mining with Marmoset: an automated programming project snapshot and testing system. ACM SIGSOFT Software Engineering Notes. 30(4):1-5.
2005. Software synthesis from the dataflow interchange format. Proceedings of the 2005 workshop on Software and compilers for embedded systems. :37-49.
2005. Space-efficient and fast algorithms for multidimensional dominance reporting and counting. Algorithms and Computation. :1755-1756.
2005. Space-time tradeoffs for approximate spherical range counting. Proceedings of the sixteenth annual ACM-SIAM symposium on Discrete algorithms. :535-544.
2005. Spatial indexing of distributed multidimensional datasets. IEEE International Symposium on Cluster Computing and the Grid, 2005. CCGrid 2005. 2:743-750Vol.2-743-750Vol.2.
2005. Spatial process and data models: Toward integration of agent-based models and GIS. Journal of Geographical Systems. 7(1):25-47.