Publications
2011. Boosting the scalability of botnet detection using adaptive traffic sampling. Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security. :124-134.
2011. Brief announcement: better speedups for parallel max-flow. Proceedings of the 23rd ACM symposium on Parallelism in algorithms and architectures. :131-134.
2011. Broadband internet performance: A view from the gateway. SIGCOMM-Computer Communication Review. 41(4):134-134.
2011. Bypassing synthesis: PLS for face recognition with pose, low-resolution and sketch. Computer Vision and Pattern Recognition (CVPR), 2011 IEEE Conference on. :593-600.
2011. Can Deliberately Incomplete Gene Sample Augmentation Improve a Phylogeny Estimate for the Advanced Moths and Butterflies (Hexapoda: Lepidoptera)? Systematic BiologySyst Biol. 60(6):782-796.
2011. A Canonical Form for Testing Boolean Function Properties. Approximation, Randomization, and Combinatorial Optimization. Algorithms and Techniques. :460-471.
2011. Capacity of wireless networks under SINR interference constraints. Wireless Networks. 17(7):1605-1624.
2011. A case for query by image and text content: searching computer help using screenshots and keywords. Proceedings of the 20th international conference on World wide web. :775-784.
2011. A case for query by image and text content: searching computer help using screenshots and keywords. Proceedings of the 20th international conference on World wide web. :775-784.
2011. A Case Study in Optimization of Gait and Physical Parameters for a Snake-Inspired Robot Based on a Rectilinear Gait. Journal of mechanisms and robotics. 3(1)
2011. A case study of measuring process risk for early insights into software safety. Software Engineering (ICSE), 2011 33rd International Conference on. :623-632.
2011. Cell cycle dependent TN-C promoter activity determined by live cell imaging.. Cytometry. Part A : the journal of the International Society for Analytical Cytology. 79(3):192-202.
2011. CHI 2011 sustainability community invited panel: challenges ahead. 2011 annual conference extended abstracts on Human factors in computing systems. :73-76.
2011. Clonal transmission, dual peak, and off-season cholera in Bangladesh. Infection Ecology & Epidemiology. 1(1)
2011. Cloud software upgrades: Challenges and opportunities. 2011 International Workshop on the Maintenance and Evolution of Service-Oriented and Cloud-Based Systems (MESOCA) . :1-10.
2011. Collective graph identification. Proceedings of the 17th ACM SIGKDD international conference on Knowledge discovery and data mining. :87-95.
2011. Communicating with caps: managing usage caps in home networks. ACM SIGCOMM Computer Communication Review. 41(4):470-471.
2011. Communicating with Caps: Managing Usage Caps in Home Networks. SIGCOMM Comput. Commun. Rev.. 41(4):470-471.
2011. Comparing Social Tags to Microblogs. Privacy, security, risk and trust (passat), 2011 IEEE third international conference on and 2011 IEEE third international conference on social computing (socialcom). :1380-1383.
2011. Comparing values and sentiment using Mechanical Turk. Proceedings of the 2011 iConference. :783-784.
2011. Complete Fairness in Secure Two-Party Computation. Journal of the ACM. 58(6):24:1–24:37-24:1–24:37.
2011. Component-based restoration of speckled images. 2011 18th IEEE International Conference on Image Processing (ICIP). :2797-2800.