Publications
2006. Accident or intention: That is the question (in the noisy iterated prisoner’s dilemma). :561-568.
2006. Achieving anonymity via clustering. Proceedings of the twenty-fifth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems. :153-162.
2006. Acquisition of Articulated Human Body Models Using Multiple Cameras. Articulated Motion and Deformable ObjectsArticulated Motion and Deformable Objects. 4069:78-89.
2006. An adaptive probabilistic replication method for unstructured p2p networks. On the Move to Meaningful Internet Systems 2006: CoopIS, DOA, GADA, and ODBASE. :480-497.
2006. Adaptive pull-based policies for wide area data delivery. ACM Transactions on Database Systems (TODS). 31(2):631-671.
2006. An Adaptive Threshold Method for Hyperspectral Target Detection. Acoustics, Speech and Signal Processing, 2006. ICASSP 2006 Proceedings. 2006 IEEE International Conference on. 5:V-V.
2006. Adaptive Transformation-based Learning for Improving Dictionary Tagging. Proceedings of the 11th Conference on European Chapter of the Association for Computational Linguistics. :257-264.
2006. Adding dense, weighted connections to wordnet. Proceedings of the Third International WordNet Conference. :29-36.
2006. Algorithms for non-uniform size data placement on parallel disks. Journal of Algorithms. 60(2):144-167.
2006. Algorithms for on-line monitoring of components in an optical tweezers-based assembly cell. :1-13.
2006. Algorithms for Structured Total Least Squares Problems with Applications to Blind Image Deblurring. Journal of Research of the National Institute of Standards and Technology. 111(2):113-119.
2006. Alternative custodians for congestion control in delay tolerant networks. Proceedings of the 2006 SIGCOMM workshop on Challenged networks. :229-236.
2006. Analysis and comparison of geometric and algebraic multigrid for convection-diffusion equations. ANALYSIS. 28(6):2208-2228.
2006. Analysis of Shock Motion in a Compression Ramp Configuration using DNS data. Bulletin of the American Physical Society.
2006. Analyzing the HB and HB+ protocols in the “large error” case. IACR ePrint report. 326:2006-2006.
2006. ANew Algorithm for Detecting Text Line in Handwritten Documents. 10th International Workshop on Frontiers in Handwriting Recognition. :35-40.
2006. Annotation compatibility working group report. Proceedings of the Workshop on Frontiers in Linguistically Annotated Corpora 2006. :38-53.
2006. Appearance-based person recognition using color/path-length profile. Journal of Visual Communication and Image Representation. 17(3):605-622.
2006. Applications of Parameterized st-Orientations in Graph Drawing Algorithms. Graph Drawing. :355-367.
2006. Applying flow-sensitive CQUAL to verify MINIX authorization check placement. Proceedings of the 2006 workshop on Programming languages and analysis for security. :3-6.
2006. Approximate Data Collection in Sensor Networks using Probabilistic Models. Proceedings of the 22nd International Conference on Data Engineering, 2006. ICDE '06. :48-48.
2006. Approximating the minimal sensor selection for supervisory control. Discrete Event Dynamic Systems. 16(1):143-170.