Publications
On The Power and Limitations of Detecting Network Filtering via Passive Observation.
Proceedings of the Passive and Active Management Conference (PAM 2015).
(2015). Poverty of the Stimulus? A Rational Approach.
Proceedings of the 28th Annual Conference of the Cognitive Science Society (CogSci 2006).
(2006).
(2010).
(2012). Pop Out Many Small Structures from a Very Large Microscopic Image.
Medical Image Analysis. 690-707.
(2011). A Polynomial-Time Algorithm for the Matching of Crossing Contact-Map Patterns.
Proceedings of the Fourth International Workshop on Algorithms in Bioinformatics (WABI 2004).
(2004). Polylogarithmic Inapproximability.
Proceedings of the 35th Annual ACM Symposium on Theory of Computing (STOC).
(2003). A Polyhedral Approach to Surface Reconstruction from Planar Contours.
Proceedings of the Ninth Conference on Integer Programming and Combinatorial Optimization.
(2002). Policy-Controlled Event Management for Distributed Intrusion Detection.
Proceedings of the Fourth International Workshop on Distributed Event-Based Systems (DEBS) (ICDCSW'05). 4, 385-391.
(2005).
(2009).
(2011).
(2014). Pktd: A Packet Capture and Injection Daemon.
Proceedings of Passive and Active Measurement Workshop (PAM-2003). 87-96.
(2003). On the Pitfalls of Geographic Face Routing.
Proceedings of the DIALM-POMC Joint Workshop on Foundations of Mobile Computing. 34-43.
(2005). Pitch-Based Emphasis Detection for Characterization of Meeting Recordings.
Proceedings of the IEEE Workshop on Automatic Speech Recognition and Understanding (ASRU 2003).
(2003). Physical mapping of chromosomes using unique probes.
Proceedings of Fifth Annual ACM-SIAM Symposium on Discrete Algorithms. 489-500.
(1994).
(2009). Photo-Based Question Answering.
389-398.
(2008). Phonetic Context in Hybrid HMM/MLP Continuous Speech Recognition.
Proceedings of the Second European Conference on Speech Communication and Technology (Eurospeech '91). 109-112.
(1991).
(2012).
(2013). Perspectives on Associative Memories.
Proceedings of the IEEE First International Conference on Neural Networks.
(1987). Personalized Security Messaging: Nudges for Compliance with Browser Warnings.
Proceedings of the European Workshop on Usable Security (EuroUSEC '17).
(2017).
(2008). Personal Namespaces.
Proceedings of ACM Special Interest Group on Data Communications Workshop on Hot Topics in Networks (HotNets-VI).
(2007).