Publications
2003. Multimedia Data Hiding.
2007. Community response grids for older adults: Motivations, usability, and sociability. Proceedings of the 13th Americas Conference on Information Systems.
2003. Data hiding in image and video .I. Fundamental issues and solutions. Image Processing, IEEE Transactions on. 12(6):685-695.
2002. A recognition algorithm for Chinese characters in diverse fonts. Image Processing. 2002. Proceedings. 2002 International Conference on. 3:981-984vol.3-981-984vol.3.
2003. Joint security robustness enhancement for quantization embedding. Image Processing, 2003. ICIP 2003. Proceedings. 2003 International Conference on. 2:II-483-6vol.3-II-483-6vol.3.
2005. Handling uneven embedding capacity in binary images: a revisit. Proceedings of SPIE. 5681(1):194-205.
2006. Analysis of Shock Motion in a Compression Ramp Configuration using DNS data. Bulletin of the American Physical Society.
2007. In Situ Evaluation of Tracking Algorithms Using Time Reversed Chains. Computer Vision and Pattern Recognition, 2007. CVPR '07. IEEE Conference on. :1-8.
2007. A Signal Processing and Randomization Perspective of Robust and Secure Image Hashing. Statistical Signal Processing, 2007. SSP '07. IEEE/SP 14th Workshop on. :166-170.
2003. Automating DAML-S Web Services Composition Using SHOP2. The Semantic Web - ISWC 2003. 2870:195-210.
2010. Online Empirical Evaluation of Tracking Algorithms. IEEE Transactions on Pattern Analysis and Machine Intelligence. 32(8):1443-1458.
2012. Making Recommendations in a Microblog to Improve the Impact of a Focal User. 6th ACM Conference on Recommender Systems (RecSys).
2006. An exploratory study of the W3C mailing list test collection for retrieval of emails with pro/con arguments. Proceedings of the Third Conference on Email and Anti-Spam, Mountain View, CA, July.
1998. Watermarking for image authentication. Image Processing, 1998. ICIP 98. Proceedings. 1998 International Conference on. 2:437-441vol.2-437-441vol.2.
2008. Community response grid (CRG) for a university campus: Design requirements and implications. Proceedings of the 5th International ISCRAM Conference. :34-43.
2000. Data hiding in digital binary image. Multimedia and Expo, 2000. ICME 2000. 2000 IEEE International Conference on. 1:393-396vol.1-393-396vol.1.
2003. Joint security and robustness enhancement for quantization based data embedding. Circuits and Systems for Video Technology, IEEE Transactions on. 13(8):831-841.
2006. Schistosoma mansoni (Platyhelminthes, Trematoda) nuclear receptors: Sixteen new members and a novel subfamily. Gene. 366(2):303-315.
2001. Analysis of attacks on SDMI audio watermarks. Acoustics, Speech, and Signal Processing, 2001. Proceedings. (ICASSP '01). 2001 IEEE International Conference on. 3:1369-1372vol.3-1369-1372vol.3.
2010. Deliberate Interactions: Characterizing Technology Use in Nairobi, Kenya. SIGCHI '10. :2593-2602.
1996. Dynamic view-dependent simplification for polygonal models. Visualization '96. Proceedings.. :327-334.