Publications
2000. A first step towards automated detection of buffer overrun vulnerabilities. The 2000 Network and Distributed Systems Security Conference. San Diego, CA. 14
2000. From instances to classes in probabilistic relational models. Proc. ICML 2000 Workshop on Attribute-Value and Relational Learning.
2000. GCCS: A graphical coordination language for system specification. Coordination Languages and Models. :207-212.
2000. Generating dynamic content at database-backed web servers. ACM SIGMOD RecordSIGMOD Rec.. 29(1):26-31.
2000. Genomic Sequence, Splicing, and Gene Annotation. American Journal of Human GeneticsAm J Hum Genet. 67(4):788-792.
2000. Geo-registration of Landsat data by robust matching of wavelet features. Geoscience and Remote Sensing Symposium, 2000. Proceedings. IGARSS 2000. IEEE 2000 International. 4:1610-1612vol.4-1610-1612vol.4.
2000. GP+ echo+ subsumption= improved problem solving. Proceedings of the Genetic and Evolutionary Computation Conference (GECCO 2000). :411-418.
2000. High performance computing algorithms for land cover dynamics using remote sensing data. International Journal of Remote Sensing. 21(6-7):1513-1536.
2000. Identifying Sports Videos using Replay, Text and Camera Motion Features. SPIE Conference on Storage and Retrieval for Image and Video Databases. :332-343.
2000. Improved Algorithms via Approximations of Probability Distributions. Journal of Computer and System Sciences. 61(1):81-107.
2000. In search of illumination invariants. Computer Vision and Pattern Recognition, 2000. Proceedings. IEEE Conference on. 1:254-261vol.1-254-261vol.1.
2000. Introduction to logic-based artificial intelligence. Logic-based artificial intelligenceLogic-based artificial intelligence. :3-33.
2000. An inverse method for the acoustic detection, localization and determination of the shape evolution of a bubble. Inverse Problems. 16:1741-1741.
2000. Iterative methods for stabilized discrete convection-diffusion problems. IMA journal of numerical analysis. 20(3):333-333.
2000. Iterative regularization and MINRES. SIAM Journal on Matrix Analysis and Applications. 21(2):613-628.
2000. The Java memory model is fatally flawed. Concurrency - Practice and Experience. 12(6):445-455.