Publications
2010. Outsourcing home network security. Proceedings of the 2010 ACM SIGCOMM workshop on Home networks. :37-42.
2010. Overcoming the Hole in the Bucket: Public-Key Cryptography Resilient to Continual Memory Leakage. Foundations of Computer Science (FOCS), 2010 51st Annual IEEE Symposium on. :501-510.
2010. Overlap-based cell tracker. The Journal of Research of the National Institute of Standards and Technology. 115(6)
2010. Overlay Networking and Resiliency. Guide to Reliable Internet Services and Applications. :221-251.
2010. PADS: A Probabilistic Activity Detection Framework for Video Data. Pattern Analysis and Machine Intelligence, IEEE Transactions on. 32(12):2246-2261.
2010. Parallel and concurrent security of the HB and HB+ protocols. Journal of cryptology. 23(3):402-421.
2010. Parsimonious rule generation for a nature-inspired approach to self-assembly. ACM Transactions on Autonomous and Adaptive Systems (TAAS). 5(3):1-24.
2010. Partial fairness in secure two-party computation. Advances in Cryptology–EUROCRYPT 2010. :157-176.
2010. Partial least squares on graphical processor for efficient pattern recognition. Technical Reports of the Computer Science Department.
2010. Performance Evaluation Tools for Zone Segmentation and Classification (PETS). International Conference on Pattern Recognition. :503-506.
2010. Performance impact of ordinal ranking on content fingerprinting. IEEE Int. Conf. on Image Processing.
2010. Perturbing the Ubiquitin Pathway Reveals How Mitosis Is Hijacked to Denucleate and Regulate Cell Proliferation and Differentiation In Vivo. PLoS ONEPLoS ONE. 5(10):e13331-e13331.
2010. Plane-Wave Decomposition of Acoustical Scenes Via Spherical and Cylindrical Microphone Arrays. IEEE Transactions on Audio, Speech, and Language Processing. 18(1):2-16.
2010. Portfolio Selection Using Tikhonov Filtering to Estimate the Covariance Matrix. SIAM Journal on Financial Mathematics. 1:932-961.
2010. Pose estimation in heavy clutter using a multi-flash camera. Robotics and Automation (ICRA), 2010 IEEE International Conference on. :2028-2035.
2010. Pose-robust albedo estimation from a single image. Computer Vision and Pattern Recognition (CVPR), 2010 IEEE Conference on. :2683-2690.
2010. The power of protein interaction networks for associating genes with diseases. Bioinformatics. 26(8):1057-1057.
2010. The pre‐seventh pandemic Vibrio cholerae BX 330286 El Tor genome: evidence for the environment as a genome reservoir. Environmental Microbiology Reports. 2(1):208-216.
2010. Probabilistic similarity logic. Proceedings of the Conference on Uncertainty in Artificial Intelligence.
2010. The problem with zoning: nonlinear effects of interactions between location preferences and externalities on land use and utility. Environment and Planning B: Planning and Design. 37(3):408-428.
2010. Putting the user in the loop: interactive Maximal Marginal Relevance for query-focused summarization. Human Language Technologies: The 2010 Annual Conference of the North American Chapter of the Association for Computational Linguistics. :305-308.