Publications
2005. Comparative book review: Cryptography: An Introduction by V. V. Yaschenko (American Mathematical Society, 2002); Cryptanalysis of Number Theoretic Ciphers by S.S. Wagstaff, Jr. (Chapman & Hall/CRC Press, 2003); RSA and Public-Key Cryptography by R. A.. SIGACT News. 36(2):14-19.
2000. Comparative Evaluation of a Natural Language Dialog Based System and a Menu-Driven System for Information Access: A Case Study. In Proceedings of the International Conference on Multimedia Information Retrieval (RIAO 2000).
2002. Comparative Genome Sequencing for Discovery of Novel Polymorphisms in Bacillus Anthracis. Science. 296(5575):2028-2033.
2017. Comparative genomic analysis and characterization of incompatibility group FIB plasmid encoded virulence factors of Salmonella enterica isolated from food sources. BMC Genomics.
2010. Comparative genomic analysis reveals evidence of two novel Vibrio species closely related to V. cholerae. BMC Microbiology. 10
2010. Comparative Genomics of Clinical and Environmental Vibrio Mimicus. Proceedings of the National Academy of SciencesPNAS. 107(49):21134-21139.
2017. Comparative Genomics of Escherichia coli Isolated from Skin and Soft Tissue and Other Extraintestinal Infections. mBio. (4)
2009. Comparative genomics reveals mechanism for short-term and long-term clonal transitions in pandemic Vibrio cholerae. Proceedings of the National Academy of Sciences. 106(36):15442-15447.
1998. A comparative study of query and document translation for cross-language information retrieval. Machine Translation and the Information Soup. :472-483.
2004. A Comparative Study of Spatial Indexing Techniques for Multidimensional Scientific Datasets. Scientific and Statistical Database Management, International Conference on. :171-171.
1999. A comparative study of the backbone dynamics of two closely related lipid binding proteins: Bovine heart fatty acid binding protein and porcine ileal lipid binding protein. Molecular and Cellular Biochemistry. 192(1):109-121.
2010. Comparing and combining lighting insensitive approaches for face recognition. Computer Vision and Image Understanding. 114(1):135-145.
2003. Comparing bootstrap and posterior probability values in the four-taxon case. Syst Biol. 52(4):477-487.
1999. Comparing causal-link and propositional planners: Tradeoffs between plan length and domain size.
1998. Comparing detection methods for software requirements inspections: A replication using professional subjects. Empirical Software Engineering. 3(4):355-379.
1995. Comparing detection methods for software requirements inspections: a replicated experiment. IEEE Transactions on Software Engineering. 21(6):563-575.
1998. Comparing images under variable illumination. Computer Vision and Pattern Recognition, 1998. Proceedings. 1998 IEEE Computer Society Conference on. :610-617.
2011. Comparing Social Tags to Microblogs. Privacy, security, risk and trust (passat), 2011 IEEE third international conference on and 2011 IEEE third international conference on social computing (socialcom). :1380-1383.
2005. Comparing the Performance of High-Level Middleware Systems in Shared and Distributed Memory Parallel Environments. Parallel and Distributed Processing Symposium, 2005. Proceedings. 19th IEEE International. :30-30.
2003. Comparing user-assisted and automatic query translation. Advances in cross-language information retrieval. :400-415.
2011. Comparing values and sentiment using Mechanical Turk. Proceedings of the 2011 iConference. :783-784.