Publications
2005. Markerless Motion Capture using Multiple Cameras. Computer Vision for Interactive and Intelligent Environment, 2005. :15-26.
2006. Acquisition of Articulated Human Body Models Using Multiple Cameras. Articulated Motion and Deformable ObjectsArticulated Motion and Deformable Objects. 4069:78-89.
2006. Building complex coupled physical simulations on the grid with InterComm. Engineering with Computers. 22(3):311-323.
1992. PARTI primitives for unstructured and block structured problems. Computing Systems in Engineering. 3(1-4):73-86.
1992. Model-driven mapping onto distributed memory parallel computers. Proceedings of the 1992 ACM/IEEE conference on Supercomputing. :818-829.
1994. Effects of normalization constraints on competitive learning. Neural Networks, IEEE Transactions on. 5(3):502-504.
1990. Supervised and reinforced competitive learning. Neural Networks, 1990., 1990 IJCNN International Joint Conference on. :563-567.
1990. Competitive learning using competitive activation rules. Neural Networks, 1990., 1990 IJCNN International Joint Conference on. :285-291.
2011. Trajectory planning with look-ahead for Unmanned Sea Surface Vehicles to handle environmental disturbances. :1154-1159.
2012. Automated synthesis of action selection policies for unmanned vehicles operating in adverse environments. Autonomous Robots. 32(2):149-164.
2011. Automated Planning Logic Synthesis for Autonomous Unmanned Vehicles in Competitive Environments with Deceptive Adversaries. New Horizons in Evolutionary Robotics. 341:171-193.
2007. A Component Estimation Framework for Information Forensics. Multimedia Signal Processing, 2007. MMSP 2007. IEEE 9th Workshop on. :397-400.
2007. Intrinsic fingerprints for image authentication and steganalysis. Proc. SPIE Conf. Security, Steganography, Watermarking of Multimedia Contents.
2005. Security of feature extraction in image hashing. Acoustics, Speech, and Signal Processing, 2005. Proceedings. (ICASSP '05). IEEE International Conference on. 2:ii/1041-ii/1044Vol.2-ii/1041-ii/1044Vol.2.
2007. Nonintrusive component forensics of visual sensors using output images. Information Forensics and Security, IEEE Transactions on. 2(1):91-106.
2006. Non-Intrusive Forensic Analysis of Visual Sensors Using Output Images. Acoustics, Speech and Signal Processing, 2006. ICASSP 2006 Proceedings. 2006 IEEE International Conference on. 5:V-V.
2007. Confidentiality-preserving rank-ordered search. Proceedings of the 2007 ACM workshop on Storage security and survivability. :7-12.
2006. Component Forensics of Digital Cameras: A Non-Intrusive Approach. Information Sciences and Systems, 2006 40th Annual Conference on. :1194-1199.
2006. Image Tampering Identification using Blind Deconvolution. Image Processing, 2006 IEEE International Conference on. :2309-2312.
2005. Data hiding in compiled program binaries for enhancing computer system performance. Information Hiding. :357-371.
2008. Digital image forensics via intrinsic fingerprints. Information Forensics and Security, IEEE Transactions on. 3(1):101-117.