Publications
2007. Recognizing Faces Across Age Progression. Face Biometrics for Personal IdentificationFace Biometrics for Personal Identification. :27-42.
2009. Learning Facial Aging Models: A Face Recognition Perspective. Biometrics: theory, methods, and applications. 9:271-271.
2003. Using state modules for adaptive query processing. 19th International Conference on Data Engineering, 2003. Proceedings. :353-364.
1994. Optimal randomized parallel algorithms for computing the row maxima of a totally monotone matrix. Proceedings of the fifth annual ACM-SIAM symposium on Discrete algorithms. :613-621.
1995. Parallel algorithms for database operations and a database operation for parallel algorithms. Parallel Processing Symposium, 1995. Proceedings., 9th International. :173-179.
2007. Some observations on multigrid convergence for convection–diffusion equations. Computing and Visualization in Science. 10(1):43-56.
2011. Action recognition using Partial Least Squares and Support Vector Machines. Image Processing (ICIP), 2011 18th IEEE International Conference on. :533-536.
2002. Eye tracking using active deformable models. Proc. of the IIIrd Indian Conference on Computer Vision, Graphics and Image Processing.
2007. Bitstore: An incentive-compatible solution for blocked downloads in bittorrent. Proc. Joint Workshop on The Economics of Networked Systems and Incentive-Based Computing (NetEcon).
2007. Fast Bilinear SfM with Side Information. Computer Vision, 2007. ICCV 2007. IEEE 11th International Conference on. :1-8.
2008. Fast monitoring of traffic subpopulations. Proceedings of the 8th ACM SIGCOMM conference on Internet measurement. :257-270.
2006. Stabilization and Mosaicing of Airborne Videos. Image Processing, 2006 IEEE International Conference on. :345-348.
2011. Spam or ham?: characterizing and detecting fraudulent "not spam" reports in web mail systems Proceedings of the 8th Annual Collaboration, Electronic messaging, Anti-Abuse and Spam Conference. :210-219.
2006. Revealing botnet membership using DNSBL counter-intelligence. Proc. 2nd USENIX Steps to Reducing Unwanted Traffic on the Internet. :49-54.
2008. Authenticated out-of-band communication over social links. Proceedings of the first workshop on Online social networks. :61-66.
2011. A Fast Bilinear Structure from Motion Algorithm Using a Video Sequence and Inertial Sensors. IEEE Transactions on Pattern Analysis and Machine Intelligence. 33(1):186-193.
1988. Efficient parallel triconnectivity in logarithmic time. VLSI Algorithms and Architectures. :33-42.
2007. Filtering spam with behavioral blacklisting. Proceedings of the 14th ACM conference on Computer and communications security. :342-351.
2008. Securing enterprise networks using traffic tainting. Special Interest Group on Data Communication.
2006. Understanding the network-level behavior of spammers. Proceedings of the 2006 conference on Applications, technologies, architectures, and protocols for computer communications. :291-302.