Publications
A Polyhedral Approach to Surface Reconstruction from Planar Contours.
Proceedings of the Ninth Conference on Integer Programming and Combinatorial Optimization.
(2002). Polylogarithmic Inapproximability.
Proceedings of the 35th Annual ACM Symposium on Theory of Computing (STOC).
(2003). A Polynomial-Time Algorithm for the Matching of Crossing Contact-Map Patterns.
Proceedings of the Fourth International Workshop on Algorithms in Bioinformatics (WABI 2004).
(2004). Pop Out Many Small Structures from a Very Large Microscopic Image.
Medical Image Analysis. 690-707.
(2011).
(2012).
(2010). Poverty of the Stimulus? A Rational Approach.
Proceedings of the 28th Annual Conference of the Cognitive Science Society (CogSci 2006).
(2006). On The Power and Limitations of Detecting Network Filtering via Passive Observation.
Proceedings of the Passive and Active Management Conference (PAM 2015).
(2015). On the power of randomization in online algorithms.
Proceedings of the 22nd Annual ACM Symposium on Theory of Computing. 379-386.
(1990).
(2010).
(2012).
(2011).
(2013). Practical Comprehensive Bounds on Surreptitious Communication Over DNS.
SEC'13: Proceedings of the 22nd USENIX conference on Security. 17-32.
(2013). Practical Data-Centric Storage.
Proceedings of the Third Symposium on Networked Systems Design and Implementation (NSDI 2006). 325-338.
(2006).
(2009). Practical Security of Large-scale Elections: An Exploratory Case Study of Internet Voting in Estonia.
37-50.
(2008).
(2012).
(2010). PREDATOR: Proactive Recognition and Elimination of Domain Abuse at Time-Of-Registration.
Proceedings of ACM CCS.
(2016).
(2008). Predicting the U.S. Index of Industrial Production.
Proceedings of Parallel Applications in Statistics and Economics '93. 3(6), 791-794.
(1993). Prediction-driven Computational Auditory Scene Analysis for Dense Sound Mixtures.
Proceedings of the ESCA Workshop on the "Auditory Basis of Speech Perception".
(1996).
(2010). Preliminary Results Using ScaleDown to Explore Worm Dynamics.
Proceedings of the ACM Workshop on Rapid Malcode (WORM 2004).
(2004).