Janjarasjitt, S., & Loparo, K. A.(2012).Examination of temporal characteristics of epileptic eeg subbands based on the local min-max.Proceedings of The International MultiConference of Engineers and Computer Scientists.
Piryatinska, A., Woyczynski, W., Scher, M., & Loparo, K. A.(2012).Optimal channel selection for analysis of EEG-sleep patterns of neonates.Computer methods and programs in biomedicine,106(1),14–26.
Cruz-Roa, A., Gonzalez, F., Galaro, J., Judkins, A., Ellison, D., Baccon, J., Madabhushi, A., & Romero, E.(2012).A visual latent semantic approach for automatic analysis and interpretation of anaplastic medulloblastoma virtual slides..Medical image computing and computer-assisted intervention : MICCAI ... International Conference on Medical Image Computing and Computer-Assisted Intervention,15(Pt 1),157-64.
Ayday, E., & Fekri, F.(2012).An iterative algorithm for trust management and adversary detection for delay-tolerant networks.IEEE Transactions on Mobile Computing,11(9),1514--1531.
Monaco, J., Hipp, J., Lucas, D., Smith, S., Balis, U., & Madabhushi, A.(2012).Image segmentation with implicit color standardization using spatially constrained expectation maximization: detection of nuclei..Medical image computing and computer-assisted intervention : MICCAI ... International Conference on Medical Image Computing and Computer-Assisted Intervention,15(Pt 1),365-72.
Ayday, E., Delgosha, F., & Fekri, F.(2012).Data authenticity and availability in multihop wireless sensor networks.ACM Transactions on Sensor Networks (TOSN),8(2),10.
Webster, V., Szczecinski, N., Tietz, B., Daltorio, K. A., Quinn, R. D., PORR, D. D., RICHARDS, J. D., & Ritzmann, R. D.(2012).Barrier navigating and shelter seeking robot inspired by cockroach behavior..
Ayday, E., & Fekri, F.(2012).A secure broadcasting scheme to provide availability, reliability and authentication for wireless sensor networks.Ad Hoc Networks,10(7),1278--1290.
Ayday, E., Delgosha, F., & Fekri, F.(2012).Data authenticity and availability in multihop wireless sensor networks.ACM Transactions on Sensor Networks (TOSN),8(2),1--26.
Xiao, X., Paradkar, A., Thummalapenta, S., & Xie, T.(2012).Automated extraction of security policies from natural-language software documents.International Symposium on the Foundations of Software Engineering (FSE).
Daltorio, K. A., Tietz, B. A., Bender, J. A., Webster, V. A., Szczecinski, N. A., Branicky, M. S., Ritzmann, R. S., & Quinn, R. D.(2012).A stochastic algorithm for explorative goal seeking extracted from cockroach walking data..
Kascak, P., Jansen, R., Dever, T., Nagorny, A., & Loparo, K. A.(2012).Counteracting rotor imbalance in a bearingless motor system with feedforward control..
Saha, S., Roman, T., Galante, A., Koyutürk, M., & Ewing, R.(2012).Network-based approaches for extending the Wnt signalling pathway and identifying context-specific sub-networks..International journal of computational biology and drug design,5(3-4),185-205.
Chung, A., Fishman, M., Dasenbrook, E., Loparo, K. A., Dick, T. A., & Jacono, F. A.(2012).Isoflurane and ketamine anesthesia have different effects on ventilatory pattern variability in rats.Respiratory physiology & neurobiology.
Cruz-Roa, A., Gonzalez, F., Galaro, J., Judkins, A., Ellison, D., Baccon, J., Madabhushi, A., & Romero, E.(2012).A visual latent semantic approach for automatic analysis and interpretation of anaplastic medulloblastoma virtual slides..Medical image computing and computer-assisted intervention : MICCAI ... International Conference on Medical Image Computing and Computer-Assisted Intervention,15(Pt 1),157-64.