Publications
On a Search Problem Related to Branch-and-Bound Procedures.
Proceedings of the 27th Annual Symposium on Foundations of Computer Science. 19-28.
(1986). A Search for Overlapping Genetic Susceptibility Loci Between Non-Hodgkin Lymphoma and Autoimmune Diseases.
Genomics. 98(1), 9-14.
(2011).
(2000). Search and Replication in Unstructured Peer-to-Peer Networks.
Proceedings of the International Comference on Measurements and Modeling of Computer Systems (SIGMETRICS 2002). 258-259.
(2002). Search and Replication in Unstructured Peer-to-Peer Networks.
Proceedings of the 16th International Conference on Supercomputing (ICS-02). 84-95.
(2002). Seamless Multimedia Communications in Heterogeneous Mobile Access Networks.
Proceedings of the TERENA Networking Conference (TNC 2004).
(2004). Scoring Clustering Solutions by Their Biological Relevance.
Bioinformatics. 2381-2389.
(2003). SCL: Simplifying Distributed SDN Control Planes.
Proceedings of NSDI '17.
(2017).
(1977).
(1989).
(1999).
(2003).
(1998).
(1995). Scheduling parallel communication: the h-relation problem.
Proceedings of the 20th International Mathematical Foundations of Computer Science Symposium, (MFCS '95). 1-20.
(1995). A Scheduling Model for Reduced CPU Energy.
Proceedings of the 36th IEEE Annual Symposium on Foundations of Computer Science (FOCS). 374-382.
(1995). Scheduling for Reduced CPU Energy.
Proceedings of the First USENIX Symposium on Operating Systems Design and Implementation (OSDI). 13-23.
(1994).
(1977). Scene Intrinsics and Depth From a Single Image.
The IEEE International Conference on Computer Vision (ICCV) Workshops.
(2015). Scatter-Partitioning RBF Network for Function Regression and Image Segmentation: Preliminary Results.
(1998). Scanning the Internet for Liveness.
Computer Communication Review. 48(2),
(2018). Scaling Up: Learning Large-Scale Recognition Methods from Small-Scale Recognition Tasks.
Special Workshop in Maui(SWIM).
(2004).
(2003). Scaling Understanding Up to Mental Spaces.
Proceedings of ScaNaLU-2004.
(2004). Scaling the Security Wall: Developing a Security Behavior Intentions Scale (SeBIS).
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI ’15).
(2015).