Publications
2010. Why Did the Person Cross the Road (There)? Scene Understanding Using Probabilistic Logic Models and Common Sense Reasoning Computer Vision – ECCV 2010. 6312:693-706.
2008. Tracking Down Under: Following the Satin Bowerbird. Applications of Computer Vision, 2008. WACV 2008. IEEE Workshop on. :1-7.
2011. Vehicle Detection Using Partial Least Squares. Pattern Analysis and Machine Intelligence, IEEE Transactions on. 33(6):1250-1265.
1995. Code generation for multiple mappings. Frontiers of Massively Parallel Computation, 1995. Proceedings. Frontiers '95., Fifth Symposium on the. :332-341.
1996. Transitive closure of infinite graphs and its applications. Languages and Compilers for Parallel Computing. :126-140.
1995. A unifying framework for iteration reordering transformations. Algorithms and Architectures for Parallel Processing, 1995. ICAPP 95. IEEE First ICA/sup 3/PP., IEEE First International Conference on. 1:153-162.
2011. Extracting Between-Pathway Models from E-MAP Interactions Using Expected Graph Compression. Journal of Computational Biology. 18(3):379-390.
2012. Gene Prediction with Glimmer for Metagenomic Sequences Augmented by Classification and Clustering. Nucleic Acids ResearchNucl. Acids Res.. 40(1):e9-e9-e9-e9.
1999. Exposing Application Alternatives. Distributed Computing Systems, International Conference on. :0384-0384.
2007. Chit-based access control.
1993. Remote direct manipulation: A case study of a telemedicine workstation. Sparks of innovation in human-computer interactionSparks of innovation in human-computer interaction. :51-51.
2000. Visibility stabs and depth-first spiralling on line segments in output sensitive time. International Journal of Computational Geometry and Applications. 10(5):535-552.
2006. Differential Transcriptional Response to Nonassociative and Associative Components of Classical Fear Conditioning in the Amygdala and Hippocampus. Learning & MemoryLearn. Mem.. 13(2):135-142.
2012. Mapping Parameterized Cyclo-static Dataflow Graphs onto Configurable Hardware. Journal of Signal Processing Systems. 66(3):285-301.
2010. FPGA-based design and implementation of the 3GPP-LTE physical layer using parameterized synchronous dataflow techniques. 2010 IEEE International Conference on Acoustics Speech and Signal Processing (ICASSP). :1510-1513.
2010. Efficient static buffering to guarantee throughput-optimal FPGA implementation of synchronous dataflow graphs. 2010 International Conference on Embedded Computer Systems (SAMOS). :136-143.
2011. Model-based precision analysis and optimization for digital signal processors. Proceedings of the European Signal Processing Conference. :506-510.
2011. Toolchain for Programming, Simulating and Studying the XMT Many-Core Architecture. Parallel and Distributed Processing Workshops and Phd Forum (IPDPSW), 2011 IEEE International Symposium on. :1282-1291.
1998. Engagement Theory: A Framework for Technology-Based Teaching and Learning.. Educational TechnologyEducational Technology. 38(5):20-23.
2011. Increased gene sampling provides stronger support for higher-level groups within gracillariid leaf mining moths and relatives (Lepidoptera: Gracillariidae). BMC Evol Biol. 11:182
1997. Content-based Image Retrieval Using Composite Features. Proceedings of the 1997 Scandinavian Conference on Image Analysis. :35-42.
2005. Simulation and Secure Computation-Handling Expected Polynomial-Time Strategies in Simulation-Based Security Proofs. Lecture Notes in Computer Science. 3378:128-149.
2009. Signature schemes with bounded leakage resilience. Advances in Cryptology–ASIACRYPT 2009. :703-720.