Publications
2010. Wide-area route control for distributed services. Proceedings of the 2010 USENIX conference on USENIX annual technical conference. :2-2.
2008. MINT: a Market for INternet Transit. Proceedings of the 2008 ACM CoNEXT Conference. :70:1–70:6-70:1–70:6.
2008. Deciding kCFA is Complete for EXPTIME. ICFP '08 Proceedings of the 13th ACM SIGPLAN International Conference on Functional Programming. :275-282.
2011. Abstracting Abstract Machines: A Systematic Approach to Higher-Order Program Analysis. arXiv:1105.1743 [cs].
2007. Relating Complexity and Precision in Control Flow Analysis. ICFP '07 Proceedings of the 12th ACM SIGPLAN International Conference on Functional Programming. :85-96.
1998. User Interface Reengineering: A Diagnostic Approach. Technical Reports of the Computer Science Department.
2004. Solution Conformation of Lys63-linked Di-ubiquitin Chain Provides Clues to Functional Diversity of Polyubiquitin Signaling. Journal of Biological ChemistryJ. Biol. Chem.. 279(8):7055-7063.
2005. Using NMR Spectroscopy to Monitor Ubiquitin Chain Conformation and Interactions with Ubiquitin‐Binding Domains. Ubiquitin and Protein Degradation, Part B. Volume 399:177-192.
2002. Structural Properties of Polyubiquitin Chains in Solution. Journal of Molecular Biology. 324(4):637-647.
2005. Structural Determinants for Selective Recognition of a Lys48-Linked Polyubiquitin Chain by a UBA Domain. Molecular Cell. 18(6):687-698.
2009. Flexible and efficient querying and ranking on hyperlinked data sources. Proceedings of the 12th International Conference on Extending Database Technology: Advances in Database Technology. :553-564.
2007. Position and distance specificity are important determinants of cis-regulatory motifs in addition to evolutionary conservation. Nucleic Acids Research. 35(10):3203-3213.
1992. Modeling of a Grasp for Handwriting. Proceedings of the Twenty-Third Annual Modeling and Simulation Conference. :2133-2140.
2004. Java-through-c compilation: An enabling technology for java in embedded systems. Proceedings of the conference on Design, automation and test in Europe-Volume 3. :30161-30161.
2008. A decision theoretic framework for analyzing binary hash-based content identification systems. Proceedings of the 8th ACM workshop on Digital rights management. :67-76.
2009. Modeling and analysis of content identification. Multimedia and Expo, 2009. ICME 2009. IEEE International Conference on. :1528-1531.
2011. Modeling temporal correlations in content fingerprints. Acoustics, Speech and Signal Processing (ICASSP), 2011 IEEE International Conference on. :1860-1863.
2009. Fingerprinting Compressed Multimedia Signals. Information Forensics and Security, IEEE Transactions on. 4(3):330-345.
2009. Modeling content fingerprints using markov random fields. Information Forensics and Security, 2009. WIFS 2009. First IEEE International Workshop on. :111-115.
2007. Collusion-Resistant Fingerprinting for Compressed Multimedia Signals. Acoustics, Speech and Signal Processing, 2007. ICASSP 2007. IEEE International Conference on. 2:II-165-II-168-II-165-II-168.