Publications
Experiments with Linear and Nonlinear Feature Transformations in HMM Based Phone Recognition.
Proceedings of ICASSP-2003.
(2003). Exploiting Independent State For Network Intrusion Detection.
Proceedings of the 21st Annual Computer Security Applications Conference (ACSAC 2005). 59-71.
(2005).
(2004). Enhancing Byte-Level Network Intrusion Detection Signatures with Context.
Proceedings of ACM CCS.
(2003).
(1993).
(2007).
(2008). Efficiently Solvable Perfect Phylogeny Problems on Binary and k-State Data with Missing Values.
Proceedings of the 11th Workshop on Algorithms in Bioinformatics (WABI 2011).
(2011).
(1993).
(1995).
(1996). E-QED: An Efficient Method for Interpreting eQTL Associations Using Protein Networks.
Molecular Systems Biology.
(2008).
(1993).
(1993). Energy-Efficient Routing on the Virtual Spanner.
Lecture Notes in Computer Science. 4104,
(2006).
(1992).
(1995). Empty Links and Crossing Lines: Querying Multilayer Annotation and Alignment in Parallel Corpora.
In Translation: Computation. 1(1), 75-104.
(2011). Effects of Usage Based Feedback on Video Retrieval: A Simulation Based Study.
ACM Transactions on Information Systems. 29(2),
(2011). Explaining the Structure of FrameNet with Concept Lattices.
Proceedings of the Third International Conference on Formal Concept Analysis (ICFCA 2005). 79-94.
(2005).
(2009).
(1991).
(2009).
(2008). On Enhancing MPEG Video Broadcast Over Wireless Networks with an Auxiliary Broadcast Channel.
Proceedings of IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2005).
(2005).