Publications
2009. Age progression in human faces: A survey. Journal of Visual Languages and Computing. 15:3349-3361.
2009. Computational methods for modeling facial aging: A survey. Journal of Visual Languages & Computing. 20(3):131-144.
1994. Optimal randomized parallel algorithms for computing the row maxima of a totally monotone matrix. Proceedings of the fifth annual ACM-SIAM symposium on Discrete algorithms. :613-621.
2003. Using state modules for adaptive query processing. 19th International Conference on Data Engineering, 2003. Proceedings. :353-364.
1995. Parallel algorithms for database operations and a database operation for parallel algorithms. Parallel Processing Symposium, 1995. Proceedings., 9th International. :173-179.
2007. Some observations on multigrid convergence for convection–diffusion equations. Computing and Visualization in Science. 10(1):43-56.
2011. Action recognition using Partial Least Squares and Support Vector Machines. Image Processing (ICIP), 2011 18th IEEE International Conference on. :533-536.
2002. Eye tracking using active deformable models. Proc. of the IIIrd Indian Conference on Computer Vision, Graphics and Image Processing.
2006. Understanding the network-level behavior of spammers. Proceedings of the 2006 conference on Applications, technologies, architectures, and protocols for computer communications. :291-302.
2005. A method for converting a smiling face to a neutral face with applications to face recognition. Acoustics, Speech, and Signal Processing, 2005. Proceedings. (ICASSP '05). IEEE International Conference on. 2:ii/977-ii/980Vol.2-ii/977-ii/980Vol.2.
2007. Bitstore: An incentive-compatible solution for blocked downloads in bittorrent. Proc. Joint Workshop on The Economics of Networked Systems and Incentive-Based Computing (NetEcon).
2008. Fast monitoring of traffic subpopulations. Proceedings of the 8th ACM SIGCOMM conference on Internet measurement. :257-270.
2011. Spam or ham?: characterizing and detecting fraudulent "not spam" reports in web mail systems Proceedings of the 8th Annual Collaboration, Electronic messaging, Anti-Abuse and Spam Conference. :210-219.
2006. Revealing botnet membership using DNSBL counter-intelligence. Proc. 2nd USENIX Steps to Reducing Unwanted Traffic on the Internet. :49-54.
2011. A Fast Bilinear Structure from Motion Algorithm Using a Video Sequence and Inertial Sensors. IEEE Transactions on Pattern Analysis and Machine Intelligence. 33(1):186-193.
2008. Authenticated out-of-band communication over social links. Proceedings of the first workshop on Online social networks. :61-66.
2007. Filtering spam with behavioral blacklisting. Proceedings of the 14th ACM conference on Computer and communications security. :342-351.
1988. Efficient parallel triconnectivity in logarithmic time. VLSI Algorithms and Architectures. :33-42.