Publications
2002. Technologies for families. CHI '02 extended abstracts on Human factors in computing systems. :938-939.
1997. Bringing treasures to the surface: iterative design for the Library of Congress National Digital Library Program. Proceedings of the SIGCHI conference on Human factors in computing systems. :518-525.
2006. Exploring erotics in Emily Dickinson's correspondence with text mining and visual interfaces. Proceedings of the 6th ACM/IEEE-CS joint conference on Digital libraries. :141-150.
1998. Visualizing medical records with LifeLines. CHI 98 conference summary on Human factors in computing systems. :28-29.
2008. Promoting Insight-Based Evaluation of Visualizations: From Contest to Benchmark Repository. Visualization and Computer Graphics, IEEE Transactions on. 14(1):120-134.
2000. A storytelling robot for pediatric rehabilitation. Proceedings of the fourth international ACM conference on Assistive technologies. :50-55.
2005. Information Visualization and the Challenge of Universal Usability. Exploring GeovisualizationExploring Geovisualization. :53-82.
2010. Secure and robust iris recognition using random projections and sparse representations. Pattern Analysis and Machine Intelligence, IEEE Transactions on. (99):1-1.
2009. Sparsity inspired selection and recognition of iris images. Biometrics: Theory, Applications, and Systems, 2009. BTAS '09. IEEE 3rd International Conference on. :1-6.
2010. Sectored Random Projections for Cancelable Iris Biometrics. 2010 IEEE International Conference on Acoustics Speech and Signal Processing (ICASSP). :1838-1841.
2004. Polyubiquitin chains: polymeric protein signals. Current Opinion in Chemical Biology. 8(6):610-616.
2006. Is there a grand challenge or X-prize for data mining? Proceedings of the 12th ACM SIGKDD international conference on Knowledge discovery and data mining. :954-956.
2006. What are the grand challenges for data mining? - KDD-2006 panel report ACM SIGKDD Explorations Newsletter. 8(2):70-77.
2010. Loop transformations for interface-based hierarchies IN SDF graphs. 2010 21st IEEE International Conference on Application-specific Systems Architectures and Processors (ASAP). :341-344.
1998. Probabilistic resource failure in real-time process algebra. CONCUR'98 Concurrency Theory. :465-472.
2017. Beyond cost-effectiveness: Using systems analysis for infectious disease preparedness. Vaccine. 35:A46-A49.
2016. Strategic Planning in Population Health and Public Health Practice: A Call to Action for Higher Education. The Milbank Quarterly. 94906033(143S2):109-125.
2009. Triaging Checklists: a Substitute for a PhD in Static Analysis. Evaluation and Usability of Programming Languages and Tools (PLATEAU) PLATEAU 2009.
1999. Impact of Cl− and Na+ ions on simulated structure and dynamics of βARK1 PH domain. Proteins: Structure, Function, and Bioinformatics. 35(2):206-217.
2006. An architecture for specification-based detection of semantic integrity violations in kernel dynamic data. Proceedings of the 15th conference on USENIX Security Symposium. :20-20.
2004. Copilot - a coprocessor-based kernel runtime integrity monitor. Proceedings of the 13th conference on USENIX Security Symposium - Volume 13. :13-13.
2003. The dangers of mitigating security design flaws: a wireless case study. IEEE Security & Privacy. 1(1):28-36.