Publications
2005. Algorithmic and architectural design methodology for particle filters in hardware. Computer Design: VLSI in Computers and Processors, 2005. ICCD 2005. Proceedings. 2005 IEEE International Conference on. :275-280.
2003. Classification-based spatial error concealment for images. Image Processing, 2003. ICIP 2003. Proceedings. 2003 International Conference on. 2:II-675-8vol.3-II-675-8vol.3.
2011. Computing the Tree of Life: Leveraging the Power of Desktop and Service Grids. Parallel and Distributed Processing Workshops and Phd Forum (IPDPSW), 2011 IEEE International Symposium on. :1896-1902.
2004. Constant-time navigation in four-dimensional nested simplicial meshes. Shape Modeling Applications, 2004. Proceedings. :221-230.
2005. Detecting rotational symmetries. Computer Vision, 2005. ICCV 2005. Tenth IEEE International Conference on. 2:954-961Vol.2-954-961Vol.2.
2004. Dynamic join-exit amortization and scheduling for time-efficient group key agreement. INFOCOM 2004. Twenty-third AnnualJoint Conference of the IEEE Computer and Communications Societies. 4:2617-2627vol.4-2617-2627vol.4.
1992. Efficient minimum cost matching using quadrangle inequality. Foundations of Computer Science, 1992. Proceedings., 33rd Annual Symposium on. :583-592.
2010. Gradient descent approach for secure localization in resource constrained wireless sensor networks. Acoustics Speech and Signal Processing (ICASSP), 2010 IEEE International Conference on. :1854-1857.
2005. The half-edge tree: a compact data structure for level-of-detail tetrahedral meshes. Shape Modeling and Applications, 2005 International Conference. :332-337.
1992. An improved classification tree analysis of high cost modules based upon an axiomatic definition of complexity. Software Reliability Engineering, 1992. Proceedings., Third International Symposium on. :164-172.
2003. Improved fast gauss transform and efficient kernel density estimation. Computer Vision, 2003. Proceedings. Ninth IEEE International Conference on. :664-671vol.1-664-671vol.1.
2011. Odd Leaf Out: Improving Visual Recognition with Games. Privacy, security, risk and trust (passat), 2011 ieee third international conference on and 2011 ieee third international conference on social computing (socialcom). :87-94.
1995. Stochastic completion fields: a neural model of illusory contour shape and salience. Computer Vision, 1995. Proceedings., Fifth International Conference on. :408-415.
2007. Collusion-Resistant Video Fingerprinting for Large User Group. Information Forensics and Security, IEEE Transactions on. 2(4):697-709.
2005. Efficient bandwidth resource allocation for low-delay multiuser video streaming. Circuits and Systems for Video Technology, IEEE Transactions on. 15(9):1124-1137.
2006. Joint coding and embedding techniques for MultimediaFingerprinting. Information Forensics and Security, IEEE Transactions on. 1(2):231-247.
2004. Optimal models of disjunctive logic programs: semantics, complexity, and computation. Knowledge and Data Engineering, IEEE Transactions on. 16(4):487-503.
1996. Robust and efficient detection of salient convex groups. Pattern Analysis and Machine Intelligence, IEEE Transactions on. 18(1):23-37.
2008. Understanding the High-Performance-Computing Community: A Software Engineer's Perspective. Software, IEEE. 25(4):29-36.
1991. VLSI architectures for multidimensional transforms. Computers, IEEE Transactions on. 40(9):1053-1057.