Publications
1997. Using content-derived names for configuration management. ACM SIGSOFT Software Engineering Notes. 22(3):104-109.
2002. On using correlation-based synopses during query optimization. Computer Science Division (EECS), University of California Berkeley.
1993. Using differential technlques to efficiently support transaction time. The VLDB JournalVLDB Journal. 2(1):75-111.
2004. Using distributed partial memories to improve self-organizing collective movements. Systems, Man, and Cybernetics, Part B: Cybernetics, IEEE Transactions on. 34(4):1697-1707.
2005. Using Dynamic Tracing Sampling to Measure Long Running Programs. Proceedings of the 2005 ACM/IEEE conference on Supercomputing. :59–-59–.
1998. Using elastic windows for World-Wide Web Browsing. CHI 98 conference summary on Human factors in computing systems. :189-190.
2000. Using Feature Hierarchies in Bayesian Network Learning. Abstraction, Reformulation, and Approximation. 1864:260-270.
1988. Using flow field divergence for obstacle avoidance in visual navigation. Science Applications International Corp, Proceedings: Image Understanding Workshop,. 2
2010. Using friendship ties and family circles for link prediction. Advances in Social Network Mining and Analysis. :97-113.
2009. Using Graphics Processors for High-Performance Computation and Visualization of Plasma Turbulence. Computing in Science Engineering. 11(2):52-59.
2007. Using GUI Run-Time State as Feedback to Generate Test Cases. Software Engineering, 2007. ICSE 2007. 29th International Conference on. :396-405.
2004. Using Hardware Counters to Automatically Improve Memory Performance. Proceedings of the 2004 ACM/IEEE conference on Supercomputing. :46–-46–.
2000. Using hardware performance monitors to isolate memory bottlenecks. Proceedings of the 2000 ACM/IEEE conference on Supercomputing (CDROM). :40-40.
2000. Using Hilbert curve in image storing and retrieving. Proceedings of the 2000 ACM workshops on Multimedia - MULTIMEDIA '00. :167-170.
2006. Using image similarity and asymmetry to detect breast cancer. Proc. of SPIE Vol. 6144:61441S–1-61441S–1.
2002. Using independent auditors as intrusion detection systems. Information and Communications Security. :291-302.
1995. Using information content to evaluate semantic similarity in a taxonomy. Arxiv preprint cmp-lg/9511007.
2001. Using interactive visualizations of WWW log data to characterize access patterns and inform site design. Journal of the American Society for Information Science and Technology. 52(4):331-343.
1999. Using Interactive Visualizations of WWW Log Data to Characterize Access Patterns and Inform Site Design. Institute for Systems Research Technical Reports.