Publications
2009. A dimension-independent library for building and manipulating multiresolution triangulations. DISI-TR-99-03
2009. Directing JavaScript with arrows. Proceedings of the 5th symposium on Dynamic languages. :49-58.
2009. Distance Oracles for Spatial Networks. Data Engineering, 2009. ICDE '09. IEEE 25th International Conference on. :652-663.
2009. Distinguishing knowledge vs social capital in social media with roles and context. Proceedings of the ICWSM. 9
2009. A distributed learning algorithm for particle systems. Integrated Computer-Aided Engineering. 16(1):1-20.
2009. Distributed Strategies for Channel Allocation and Scheduling in Software-Defined Radio Networks. IEEE INFOCOM 2009. :1521-1529.
2009. Diversity and Seasonality of Bioluminescent Vibrio Cholerae Populations in Chesapeake Bay. Applied and Environmental MicrobiologyAppl. Environ. Microbiol.. 75(1):135-146.
2009. Do you know the way to SNA?: A process model for analyzing and visualizing social media data University of Maryland Tech Report: HCIL-2009-17.
2009. Dynamic Provable Data Possession. CCS '09 Proceedings of the 16th ACM Conference on Computer and Communications Security . :213-222.
2009. Dynamic software updates: a VM-centric approach. Proceedings of the 2009 ACM SIGPLAN conference on Programming language design and implementation. :1-12.
2009. Dynamic software updates for Java: A VM-centric approach. Proceedings of the ACM Conference on Programming Language Design and Implementation (PLDI).
2009. The Dynamics of Actor Loyalty to Groups in Affiliation Networks. Social Network Analysis and Mining, 2009. ASONAM '09. International Conference on Advances in. :101-106.
2009. Dynamics of online scam hosting infrastructure. Passive and Active Network Measurement. :219-228.
2009. Ef?cient Query Evaluation over Temporally Correlated Probabilistic Streams IEEE 25th International Conference on Data Engineering, 2009. ICDE '09. :1315-1318.
2009. The effect of corners on the complexity of approximate range searching. Discrete & Computational Geometry. 41(3):398-443.
2009. Efficient and secure authenticated key exchange using weak passwords. Journal of the ACM (JACM). 57(1):3:1–3:39-3:1–3:39.
2009. Efficient band approximation of Gram matrices for large scale kernel methods on GPUs. Proceedings of the Conference on High Performance Computing Networking, Storage and Analysis. :31:1–31:10-31:1–31:10.
2009. Efficient peer-to-Peer lookup in multi-hop wireless networks. KSII Trans. Internet and Information Systems. 3(1):5-25.
2009. Efficient Robust Private Set Intersection. Applied Cryptography and Network Security. :125-142.
2009. Efficient subset selection via the kernelized Rényi distance. Computer Vision, 2009 IEEE 12th International Conference on. :1081-1088.
2009. Efficient systematic testing for dynamically updatable software. Proceedings of the 2nd International Workshop on Hot Topics in Software Upgrades. :9:1–9:5-9:1–9:5.
2009. Efficient systematic testing for dynamically updatable software. Proceedings of the 2nd International Workshop on Hot Topics in Software Upgrades. :9-9.