Publications
2000. Convexity in Perceptual Completion. KLUWER INTERNATIONAL SERIES IN ENGINEERING AND COMPUTER SCIENCE. :73-90.
2008. Camera Phone Based Tools for People with Visual Impairments. The First International Workshop on Mobile Multimedia Processing.
2010. Identifying Differentially Abundant Metabolic Pathways in Metagenomic Datasets. Bioinformatics Research and Applications. 6053:101-112.
1990. Drosophila melanogaster genes for U1 snRNA variants and their expression during development. Nucleic Acids ResearchNucl. Acids Res.. 18(23):6971-6979.
1998. Semantics for Disjunctive and Normal Disjunctive Logic Programs. Handbook of logic in artificial intelligence and logic programming. 5:325-325.
2003. Goal-Driven Reconfiguration of Polymorphous Architectures. Domain-specific processors: systems, architectures, modeling, and simulation. 20:151-151.
1997. Automatic discovery of self-replicating structures in cellular automata. Evolutionary Computation, IEEE Transactions on. 1(3):165-178.
1995. Discovery of self-replicating structures using a genetic algorithm. Evolutionary Computation, 1995., IEEE International Conference on. 2:678-683.
2005. Improved HMM alignment models for languages with scarce resources. Proceedings of the ACL Workshop on Building and Using Parallel Texts. :83-86.
2011. Suppression subtractive hybridization PCR isolation of cDNAs from a Caribbean soft coral. Electronic Journal of Biotechnology. 14(1):8-9.
2000. Textual data mining to support science and technology management. Journal of Intelligent Information Systems. 15(2):99-119.
2005. Temperature-Driven Campylobacter Seasonality in England and Wales. Applied and Environmental MicrobiologyAppl. Environ. Microbiol.. 71(1):85-92.
2003. Predictability of Vibrio Cholerae in Chesapeake Bay. Applied and Environmental MicrobiologyAppl. Environ. Microbiol.. 69(5):2773-2785.
2009. Enabling search over encrypted multimedia databases. SPIE/IS&T Media Forensics and Security. :7254-18.
2011. Seam carving estimation using forensic hash. Proceedings of the thirteenth ACM multimedia workshop on Multimedia and security. :9-14.
2010. Forensic hash for multimedia information. SPIE Media Forensics and Security. :7541–0Y-7541–0Y.
2010. Security analysis for privacy preserving search of multimedia. Image Processing (ICIP). :26-29.
2007. Amino acid quantitative structure property relationship database: a web-based platform for quantitative investigations of amino acids. Protein Engineering Design and SelectionProtein Engineering, Design and Selection. 20(7):347-351.