Publications
1998. Interfaces and tools for the library of congress national digital library program. Information Processing & Management. 34(5):535-555.
2006. Integrating data and interfaces to enhance understanding of government statistics: toward the national statistical knowledge network project briefing. Proceedings of 7th Annual International Conference on Digital Libraries (DG06). :21-24.
2003. The people in digital libraries: Multifaceted approaches to assessing needs and impact. Digital library use: Social practice in design and evaluationDigital library use: Social practice in design and evaluation. :119-160.
2004. Project highlight: toward the statistical knowledge network. Proceedings of the 2004 annual national conference on Digital government research. :125:1–125:2-125:1–125:2.
2005. Toward a Statistical Knowledge Network (2004). Institute for Systems Research Technical Reports.
2000. Extending understanding of federal statistics in tables. Proceedings of the 2000 annual national conference on Digital government research. :1-7.
2003. Toward a statistical knowledge network. Proceedings of the 2003 annual national conference on Digital government research. :1-6.
1986. Parallel ear decomposition search (EDS) and st-numbering in graphs. Theoretical Computer Science. 47:277-298.
2004. Dynamic join-exit amortization and scheduling for time-efficient group key agreement. INFOCOM 2004. Twenty-third AnnualJoint Conference of the IEEE Computer and Communications Societies. 4:2617-2627vol.4-2617-2627vol.4.
2007. Tracing malicious relays in cooperative wireless communications. Information Forensics and Security, IEEE Transactions on. 2(2):198-212.
2006. Security Issues in Cooperative Communications: Tracing Adversarial Relays. Acoustics, Speech and Signal Processing, 2006. ICASSP 2006 Proceedings. 2006 IEEE International Conference on. 4:IV-IV.
2006. A joint signal processing and cryptographic approach to multimedia encryption. Image Processing, IEEE Transactions on. 15(7):2061-2075.
2005. Coordinated sensor deployment for improving secure communications and sensing coverage. Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks. :117-128.
2004. Security evaluation for communication-friendly encryption of multimedia. Image Processing, 2004. ICIP '04. 2004 International Conference on. 1:569-572Vol.1-569-572Vol.1.
2007. Unicity Distance of Robust Image Hashing. Information Forensics and Security, IEEE Transactions on. 2(3):462-467.
2006. JET: dynamic join-exit-tree amortization and scheduling for contributory key management. IEEE/ACM Trans. Netw.. 14(5):1128-1140.
2006. Septaplex PCR assay for rapid identification of Vibrio cholerae including detection of virulence and int SXT genes. FEMS Microbiology Letters. 265(2):208-214.
2009. Measuring vlan-induced dependencies on a campus network. Proceedings of the ACM SIGCOMM Internet measurement conference.
1999. Trade-offs between communication throughput and parallel time. Journal of Complexity. 15(1):148-166.
1994. Trade-offs between communication throughput and parallel time. Proceedings of the twenty-sixth annual ACM symposium on Theory of computing. :372-381.
2005. The Java memory model. Proceedings of the 32nd ACM SIGPLAN-SIGACT symposium on Principles of programming languages. :378-391.
2001. Core semantics of multithreaded Java. Proceedings of the 2001 joint ACM-ISCOPE conference on Java Grande - JGI '01. :29-38.
1993. Evaluating surface intersections in lower dimensions. Second International Conference on Curves and Surfaces.