Publications
2011. Link prediction by de-anonymization: How We Won the Kaggle Social Network Challenge. :1825-1834.
2005. Link Mining for the Semantic Web, Position Statement. Proceedings of the Dagstuhl Seminar in Machine Learning for the Semantic Web.
2005. The linguist's search engine: an overview. Proceedings of the ACL 2005 on Interactive poster and demonstration sessions. :33-36.
2012. Linguistic Resources for Handwriting Recognition and Translation Evaluation. Eight International Conference on Language Resources and Evaluation (LREC'12).
1998. Linger longer: Fine-grain cycle stealing for networks of workstations. Proceedings of the 1998 ACM/IEEE Conference on Supercomputing (CDROM). :1-12.
1993. A linear-time model-checking algorithm for the alternation-free modal mu-calculus. Formal methods in system design. 2(2):121-147.
2011. Linear versus Mel Frequency Cepstral Coefficients for Speaker Recognition. IEEE Automatic Speech Recognition and Understanding Workshop.
1979. Linear programming Problems Arising from Partial Differential Equations. Sparse Matrix Proceedings 1978Sparse Matrix Proceedings 1978. :25-40.
2002. A Linear Iterative Approach for Hierarchical Shortest Path Finding. Technical Reports from UMIACS, UMIACS-TR-2002-97.
2001. Linear Fitting with Missing Data for Structure-from-Motion. Computer Vision and Image Understanding. 82(1):57-81.
1999. Linear fitting with missing data: applications to structure-from-motion and to characterizing intensity images. (6009437)
1997. Linear fitting with missing data: applications to structure-from-motion and to characterizing intensity images. Computer Vision and Pattern Recognition, 1997. Proceedings., 1997 IEEE Computer Society Conference on. :206-212.
1994. The linear algebra of block quasi-newton algorithms. Linear Algebra and its Applications. 212–213:153-168.
2010. Lineage processing over correlated probabilistic databases. Proceedings of the 2010 international conference on Management of data. :675-686.
2011. Limits on the power of zero-knowledge proofs in cryptographic constructions. Theory of Cryptography. :559-578.
2005. The limits of speech recognition: Understanding acoustic memory and appreciating prosody (2000). Institute for Systems Research Technical Reports.
2011. Limits of computational differential privacy in the client/server setting. Theory of Cryptography. :417-431.
1990. Limited scope and circumscriptive reasoning. International Journal of Expert Systems. 3(3):207-217.
2002. A light-weight process for capturing and evolving defect reduction experience. Engineering of Complex Computer Systems, 2002. Proceedings. Eighth IEEE International Conference on. :129-132.
2011. Lightweight monadic programming in ML. Proceedings of the 16th ACM SIGPLAN international conference on Functional programming. :15-27.