Publications
1995. Parametric dispatching of hard real-time tasks. IEEE Transactions on ComputersIEEE Trans. Comput.. 44(3):471-479.
2005. Bounds on the efficiency of generic cryptographic constructions. SIAM Journal on Computing. 35(1):217-217.
2003. Lower bounds on the efficiency of encryption and digital signature schemes. Proceedings of the thirty-fifth annual ACM symposium on Theory of computing. :417-425.
2006. An optimized system for expression and purification of secreted bacterial proteins. Protein Expression and Purification. 46(1):23-32.
2009. Encryption Algorithm Based on Circle Property. Jisuanji Gongcheng/ Computer Engineering. 35(4):180-182.
1998. Double quaternions for motion interpolation. Proceedings of the ASME Design Engineering Technical Conference.
2004. Adapting network structure for efficient team formation. Proceedings of the AAAI 2004 Fall Symposium on Artificial Multi-agent Learning.
2005. Agent-organized networks for multi-agent production and exchange. Proceedings of the 20th national conference on Artificial intelligence - Volume 1. :77-82.
2008. THE EFFECT OF NETWORK STRUCTURE ON DYNAMIC TEAM FORMATION IN MULTI‐AGENT SYSTEMS. Computational Intelligence. 24(2):122-157.
2005. Agent-organized networks for dynamic team formation. Proceedings of the fourth international joint conference on Autonomous agents and multiagent systems. :230-237.
2011. "Seeing" ENF: natural time stamp for digital video via optical sensing and signal processing. Proceedings of the 19th ACM international conference on Multimedia. :23-32.
2010. Gradient descent approach for secure localization in resource constrained wireless sensor networks. Acoustics Speech and Signal Processing (ICASSP), 2010 IEEE International Conference on. :1854-1857.
2002. Phylogenetic analysis based on 18S ribosomal RNA gene sequences supports the existence of class Polyacanthocephala (Acanthocephala). Mol Phylogenet Evol. 23(2):288-292.
2000. Phylogenetic relationships of Acanthocephala based on analysis of 18S ribosomal RNA gene sequences. J Mol Evol. 50(6):532-540.
2011. Adaptively secure broadcast, revisited. Proceedings of the 30th Annual ACM Symposium on Principles of Distributed Computing.
2007. Round Complexity of Authenticated Broadcast with a Dishonest Majority. Foundations of Computer Science, 2007. FOCS '07. 48th Annual IEEE Symposium on. :658-668.