David Lee: Publications

David Lee
David Lee, Director, Networking and Communications Lab
Palo Alto

Selected publications

A.      Network System Management


A.1. Network System Monitoring, Measurement and Management

  1. D. Lee, D. Cheng, R. Hao, R. E. Miller, J. Wu and X. Yin, “Network Protocol System Monitoring - a Formal Approach with Passive Testing”, IEEE/ACM Trans. On Networking, Vol. 14, No. 2, April 2006, pp. 424-437
  2. D. Lee, A. N. Netravali, K. K. Sabnani, B. Sugla, and A. John, “Passive Testing and it Applications to Network Management”, ICNP, October 1997
  3. P. Calyam, C.-G. Lee, P. K. Arava, D. Crymskiy and D. Lee, “On Time Measurement: A Scalable Framework for Scheduling Active Measurement, IEEE/IFIP Workshop on End-to-End Monitoring         Techniques and Services (E2EMON), May 2005
  4. R. Hao, D. Lee, J.-T. Ma and J.-H. Yang, “Fault Management for Networks with Link-State Routing Protocols”, IEEE/IFIP Network Operations and Management Symposium (NOMS), April 2004
  5. E. Ayanoglu and D. Lee, “Reading Notes on Network Management Part I: Fault Management”, Bell Laboratories Tech Memo, May 1998
  6. D. Huang and D. Lee, “Constructing Very Low Rate Optimal Convolutional Codes by Searching Path-generator Matrix and Linear Programming”, ISITA, April 2004

A.2. All-Optical Network Management Systems

  1. C. Chi, D. Huang, D. Lee and X. Sun, “Lazy Flooding: A New Technique for Information Dissemination in Distributed Network Systems”, IEEE/ACM Trans. on Networking, Vol. 15, Feb, 2007. An early version appeared in OFC’2002
  2. D. Lee, L. Libman and A. Orda, Path Protection and Blocking Probability Minimization in Optical Networks, IEEE INFOCOM, March 2004
  3. C. Chi, D. Huang, D. Lee and X. Sun, “Signaling in All-optical Network Systems”, ICII’2001 (invited paper), 2003

A.3. Networking Protocol System Fault Management and Testing

  1. D. Lee and M. Yannakakis, “Principles and Methods of Testing Finite State Machines - A Survey”, Proceedings of The IEEE, Vol. 84, No. 8, August 1996, pp. 1090-1123
  2. M. Yannakakis and D. Lee, “Testing Finite State Machines: Fault Detection”,
  3. J. Computer Science and Systems, Vol. 50, No. 2, 1995, pp. 209-227
  4. D. Lee and M. Yannakakis, “Testing Finite State Machines: State Identification and Verification”, IEEE Trans. on Computers, Vol. 43, No. 3, March 1994, pp. 306-320. An extended abstract with a title “Testing Finite State Machines” appeared in Proc. 23rd Annual ACM Symposium Theory of Computing, May 1991, pp. 476-485
  5. K.-Q. Li and D. Lee, Fault Detection of Hierarchical Networks with Probabilistic Testing Algorithms, TestCom, 2005
  6. D. Lee, D. Chen, R. Hao, R. E. Miller, J. Wu, and X. Yin, “A Formal Approach for Passive Testing of Protocol Data Portions”, ICNP’2002
  7. D. Lee and M. Yannakakis, “Closed Partition Lattice and Machine Decomposition”, IEEE Trans. on Computers, Vol. 51, No. 2, 2001, pp. 216-228
  8. A. V. Aho, A. T. Dahbura, D. Lee, and M. U. Uyar, “An Optimization Technique for Protocol Conformance Test Generation Based on UIO Sequences and Rural Chinese Postman Tours”, IEEE Transactions on Communications, Vol. 39, No. 11, 1991, pp. 1604-1615. An earlier version with a same title appeared in Proc. IFIP WG 6.18th International Symposium on Protocol Specification, Testing, and Verification, June 1988
  9. D. Lee and M. Yannakakis, “On-line Minimization of Transition Systems”, 24th Annual ACM Symposium on Theory of Computing, May 1992, pp. 264-274
  10. D. Lee and M. Yannakakis, “Conformance Testing”, Wiley Encyclopedia of Electrical and Electronics Engineering, 1998 (invited paper)
  11. D. Lee and R. Hao, “Test Sequence Selection”, PSTV-FORTE’2001
  12. D. Lee and R. Hao, “Efficient Algorithms for Test Sequence Selection”, FATE’2001 (invited paper, keynote)
  13. T. F. LaPorta, D. Lee, Y. -J. Lin, and M. Yannakakis, “Protocol Feature Interactions”, FORTE/PSTV, 1998
  14. D. Lee and M. Yannakakis, “Optimization Problems from Feature Testing of Communication Protocols”, ICNP, October 1996, pp. 66-75
  15. M. Yannakakis and D. Lee, “Testing Finite State Machines”, CSL, November 1998 (invited paper)
  16. M. Yannakakis and D. Lee, “An Efficient Algorithm for Minimizing Real-time Transition Systems”, J. of Formal Methods in System Design, 1996. An earlier version appeared in Proc. CAV, 1993, pp. 210-224
  17. D. Lee, K. K. Sabnani, D. M. Kristol and S. Paul, “Conformance Testing of Protocols Specified as Communicating Finite State Machines - a Guided Random Walk Based Approach”, IEEE Trans. on Communications, Vol. 44, No. 5, 1996, pp. 631-640. An earlier version with a title “Conformance Testing of Protocols Specified as Communicating FSMs” appeared in IEEE INFOCOM'93, March 30 - April 1, 1993, pp. 115-127
  18. A. Cavalli, D. Lee, C. Rinderknecht and F. Zaidi, “HIT-OR-JUMP: an Algorithm for Embedded Testing with Applications to IN Services”, FORTE/PSTV, 1999
  19. S. Huang, D. Lee and M. Staskauskas, “Validation-Based Test Sequence Generation for Networks of Extended Finite State Machines”, FORTE/PSTV, October 1996
  20. D. Lee and K. Sabnani, “Reverse Engineering of Communication Protocols”, ICNP, October 1993, pp. 208-216
  21. D. Lee and D. Su, “Modeling and Testing of Protocol Systems”, IWTCS'97, pp. 339-364, September, 1997
  22. C. Besse, A. Cavalli, and D. Lee, “An Automatic and Optimized Test Generation Technique Applying to TCP/IP Protocol”, ASE, 1999
  23. D. Wang, R. Hao and D. Lee, “Fault Detection in Rule-based Software Systems”, CPWCSE’2001 (invited paper)
  24. A. Cavalli, D. Lee and S. Maag, “A Scenario-based Approach to Communication Software Systems Feature Interactions with Applications to IP Telephony”, International Conference on Software Engineering and Applications, 2002
  25. B. Alcalde, A. Cavalli, D. Chen, D. Khuu, and D. Lee, “Passive Testing on EFSM by Variable Determination and Backward Checking”, FORTE, 2004

A.4. Network System Reliability, Interface, and Interoperability

  1. R. E. Miller, D.-L. Chen, D. Lee and R. Hao, “Coping with Non-determinism in Network Protocol Testing”, IFIP TestCom, May 2005 (won the best paper award); also published in Lecture Notes in Computer Science, Springer, 2005
  2. D. Lee, C. Liu and M. Yannakakis, “Distributed Protocol System Integration, Interface and Interoperability”, OPODIS 2004 (invited paper);  an expanded version appeared in Lecture Notes in Computer Science, December 2005, Springer, 2005
  3. K.-Q. Li and D. Lee, “Fault Detection of Hierarchical Networks with Probabilistic Testing Algorithms”, IFIP TestCom, May 2005; also published in Lecture Notes in Computer Science, Springer, 2005
  4.  R. Hao, D. Lee, Sinha, and N. Griffeth, "Integrated System Interoperability Testing  with Applications to VoIP", IEEE/ACM Trans on Networking, Aug. 2004; an early  version appeared in FORTE/PSTV 2000, Pisa, Italy, October 10-13, 2000 (Won the best paper award of the conference)
  5. D. Lee, “Integrated Software System Interoperability Testing”, Wiley Encyclopedia of Electrical and Electronics Engineering, 2001 (invited paper)
  6. N. Griffeth, R. Hao, D. Lee and R. Sinha, "Interoperability Testing of VoIP", IEEE GLOBECOM, 2000
  7. R. Hao, D. Lee, R. Sinha and D. Vlah, "SOCRATES on IP Router Fault Detection", IEEE GLOBECOM, 2000
  8. N. Griffeth, R. Hao, D. Lee and R. Sinha, "Testing Interoperability of Reactive  Communication Systems", AST'99 - Automated Software Testing conference, Lisle, IL, November 11-12, 1999
  9. D. Cypher, D. Lee, M. Martin-Villalba, C. Prins, and D, Su, “Formal Specification, Verification, and Interoperability Testing of ATM Routing Protocol: PNNI”, FORTE/PSTV, 1998

B.     Information  and Networking System Security

  1. W. Yu, X. Wang, A. Champion, D. Xuan and D. Lee, “On Detecting Active Worms with Varying Scan Rate”, Journal of Computer Communications, 2011, to appear
  2. Y. Hsu and D. Lee, “Authentication and Authorization Protocol Security Property Analysis with Trace Inclusion Transformation and Online Minimization”, IEEE ICNP, Oct 2010
  3. G. Shu and D. Lee, "A Formal Methodology for Network Protocol Fingerprinting", IEEE Trans on Parallel and Distributed Systems, 2010
  4. Z. Liu, G. Shu and D. Lee, Instant Messaging Security, in Network Security, Administration and Management: Advancing Technologies and Practices, D. C. Kar and M. R. Syed, ed., IGI Global, 2010
  5. F. Yu, V. Gopalakrishnan, K. K. Ramakrishnan and D. Lee, “Loss-tolerant Real-time Content Integrity Validation for P2P Video Streaming”, COMSNETS 2009
  6. Y. Hsu, G. Shu and D. Lee, “A Model-based Approach to Security Flaw Detection of Network Protocol Implementations”, IEEE ICNP Oct 2008
  7. G. Shu, Y. Hsu and D. Lee, “Fuzz Testing and Communications Protocol Security Flaws”, June FORTE 2008
  8. G. Shu, D. Chen, Z. Liu, N. Li, L. Sang and D. Lee, “VCSTC: Virtual Cyber Security Testing Capability – An Application Oriented Paradigm for Network Infrastructure Protection”, TESTCOM/FATES June 2008
  9. P. Pederson, D. Lee, G.-Q. Shu, D. Chen, Z. Liu, N. Li and L. Sang, "Virtual Cyber-Security Testing Capability for Large Scale Distributed Information Infrastructure Protection", IEEE/DHS International Conference on Technologies for Homeland Security, May 2008
  10. F. Yu and D. Lee, "Internet Attack Traceback - Cross-validation and Pebble Tracing", IEEE/DHS International Conference on Technologies for Homeland Security, May 2008
  11. G.-Q. Shu and D. Lee, “Testing Security Properties of Protocol Implementations – a Machine Learning Based Approach”, June ICDCS, 2007
  12. D. Lee, “Hash Function Vulnerability Index and Hash Chain Attacks”, IEEE ICNP NPSEC Nov 2007 (invited paper)
  13. N. Li and D. Lee, “Network Court Protocol and Malicious Node Conviction”, IEEE ICNP Nov 2007
  14. G. Shu and D. Lee, “Minutiae: A Formal Methodology for Accurate Protocol Fingerprinting”, IEEE ICNP NPSEC Nov 2007
  15. N. Li and D. Lee, “Virtual Authentication Ring for Securing Network Operations”, NTMS, 2007
  16. Z. Liu and D. Lee, “Coping with Instant Messaging Worms - Statistical Modeling and Analysis”, LANMAN June 2007
  17. Z. Liu, N. Li, G. Shu and D. Lee, “Defending against Instant Messaging Worms”, GLOBECOM, Nov. 2006
  18. G.-Q. Shu and D. Lee, “Message Confidentiality Testing of Security Protocols - Passive Monitoring and Active Checking”, IFIP TestCom May 2006
  19. G.-Q. Shu, D. Lee and M. Yannakakis, “Key Management for Large Scale Emergency Alert Systems”, SSN May 2006.
  20. G.-Q. Shu and D. Lee, “Network Protocol System Fingerprinting - A Formal Approach”, IEEE Infocom May 2006
  21. W. Yu, X. Wang, A. Champion, D. Xuan and D. Lee, “On Detecting of Active Worms with Varying Scan Rate”, Securecom 2006
  22. D. Lee, B. Vishal, T. L. Stewart and D. Carwile, “A New Broadcast Cryptography Scheme with Applications to Secure and Authenticated DTV Broadcasting for Emergency Alert”, First DHS Conference on Working Together: Research & Development Partnerships in Homeland Security, May 2005
  23. B. Vishal and Z.-J. Liu and D. Lee, “Network Architecture and Protocols for National Critical Infrastructure Protection”, First DHS Conference on Working Together: Research & Development partnerships in Homeland Security, May 2005 
  24. G.-Q. Shu and D. Lee, “Defending Against Internet Host Fingerprinting - Towards an Outermost Barrier of Cyberspace Security”, First DHS Conference on Working Together: Research & Development partnerships in Homeland Security, May 2005
  25. Z. Liu, N. Li, G. Shu, W. Lin and D. Lee, “Instant Messaging Spams and Worms - their Detection and Filtering”, ICNP NPSEC, Nov. 2005

C.     Data Networking and Internet Protocol Systems

  1. M. Karol, J. Golestani and D. Lee, “Prevention of Deadlocks and Livelocks in Lossless, Backpressured Packet Networks”, IEEE/ACM Trans. on Networking, Vol. 11, No. 8, Dec. 2003; an earlier version published in IEEE INFOCOM 2000
  2. A. V. Aho and D. Lee, “Hierarchical Networks and the LSA N-Squared Problem in OSPF Routing”, IEEE GLOBECOM 2000, Nov. 27 - Dec. 1, San Francisco, CA
  3. R. Hao, D. Lee, R. Sinha and D. Vlah, "Testing IP Routing Protocols: From Probabilistic Algorithms to Software Tool", FORTE/PSTV, Pisa, Italy, October 10-13, 2000
  4. D. Lee, K. K. Ramakrishnan and M. Moh, “A Formal Specification of the ATM ABR Rate Control Scheme”, Computer Networks and ISDN Syst., Vol. 30, 1998, pp. 1735-1748 (invited paper)
  5. D. Lee, K. K. Ramakrishnan, W. M. Moh and A. U. Shankar, “Performance and Correctness of the ATM ABR Rate Control Scheme”, IEEE INFOCOM'97, April 1997
  6. D. Lee, D. Su , L. Collica and N. Golmie, “Conformance Test Suite for the ABR Rate Control Scheme in TM v4.0”, ATM Forum/97-0034, February, 1997
  7. D. Lee, W. M. Moh, K. K. Ramakrishnan and A. U. Shankar, “An Extended Finite State Machine Representation of the Source/Destination Behavior”, ATM Forum Contribution ATM_Forum/96-0231, Feb. 1996
  8. D. Lee, K. K. Ramakrishnan, W. M. Moh and A. U. Shankar, “Protocol Specification Using Parameterized Communicating Extended Finite State Machines - A Case Study of the ATM ABR Rate Control Scheme”, ICNP, October 1996
  9. D. Lee, D. Su, L. Collica and N. Golmie, “Conformance Test Suite for the ABR Rate Control Scheme in TM v4.0”, ATM Forum/97-0034, February, 1997
  10. A. U. Shankar and D. Lee, “Modulo-N Incarnation Numbers for Cache-based Transport Protocols”, IEEE/ACM Trans. on Networking, Vol. 3, No. 3, June 1995, pp. 255-268; an earlier version with a same title appeared in Proc. ICNP, October 1993, pp. 46-54
  11.  D. Lee, A. N. Netravali, and K. K. Sabnani, “Protocol Pruning”, Proceedings of The IEEE, Vol. 83, No. 10, 1995, pp. 526-542
  12. D. Kristol, D. Lee, A. N. Netravali, and K. Sabnani, “A Polynomial Algorithm for Gateway Generation from Formal Specifications”, IEEE/ACM Trans. on Networking, Vol. 1, No. 2, April 1993, pp. 217-229; an earlier version with a title “An Efficient Gateway synthesis from Formal Specification” appeared in ACM SIGCOMM, September 1991, pp. 89-97

D.    Image Processing and Computer Vision


D.1. Shape and Feature Recognition and Reconstruction

  1. D. Lee, “A Provably Convergent Algorithm for Shape from Shading”, B. K. P. Horn and M. J. Brooks Ed., MIT Press, 1989, pp. 349-373. An earlier version with a same title appeared in Proc. Image Understanding Workshop, DARPA, December 1985, pp. 489-496
  2. Y. Vardi and D. Lee, “From Image Deblurring to Optimal Investments: Maximum Likelihood Solutions for Positive Linear Inverse Problems”, J. Royal Statist. Soc. B, Vol. 55, No. 3, 1993 [Read at the Research Section Meeting of the Royal Statistical Society on December 16, 1992, London, and published with discussions]
  3. D. Lee and Y. Vardi, “Experiments on Image Motion Deblurring Using Maximum Likelihood Methods”, Advances in Applied Statistics, Vol. II, K. V. Mardia Ed., Abington, Carfax Pub. Co., 1994, pp. 355-383
  4. Y. Vardi and D. Lee, “The Discrete Radon Transform and its Approximate Inversion via the EM Algorithm”, Workshop of Discrete Tomography, September, 1997
  5. D. Lee, “Algorithms for Shape from Shading and Occluding Boundaries”, IEEE Computer Society Conference on Computer Vision and Pattern Recognition, June 1988, pp. 478-485
  6. T. Pavlidis and D. Lee, “Residual Analysis for Feature Extraction”, Pre-proc. COST 13 Workshop, August 1988
  7. D. Lee, A. Papageorgiou, and G. W. Wasilkowski, “Computing Optical Flow”, IEEE Computer Society Workshop on Visual Motion, March 1989, pp. 99-106

D.2. Edge and Discontinuities Detection

  1. D. Lee, “Coping with Discontinuities in Computer Vision: their Detection, Classification, and Measurement”, IEEE Transactions on Pattern Analysis and Machine Intelligence, Vol. 12, No. 4, 1990, pp. 321-343. An earlier version with a same title appeared in Proc. The Second International Conference on Computer Vision, December 1988, pp. 546-557
  2. D. Lee and T. Pavlidis, “One-dimensional Regularization with Discontinuities”, IEEE Transactions on Pattern Analysis and Machine Intelligence, Vol. 10, No. 6, 1988, pp. 822-829. An earlier version with a same title appeared in Proc. The First International Conference on Computer Vision, June 1987, pp. 572-577
  3. D. Lee, G. W. Wasilkowski, and R. Mehrotra, “A New Zero-crossing-based Discontinuity Detector”, IEEE Trans. on Image Processing, April 1993, pp. 265-268.  An earlier version with a title “An Optimal Zero-crossing-based Discontinuity Detector” appeared in Proc. 7th Scandinavian Conference on Image Analysis, August 1991.
  4. M. Chen, D. Lee, and T. Pavlidis, “Residual Analysis for Feature Detection”, IEEE Transactions on Pattern Analysis and Machine Intelligence, Vol. 13, No. 1, 1991, pp. 30-40. An earlier version with a same title appeared in Proc. IEEE 11th Int. Conf. on Pattern Recognition
  5. D. Lee and G. W. Wasilkowski, “Discontinuity Detection and Thresholding - a Stochastic Approach”, J. of Complexity, April 1993. An earlier version with a same title appeared in Proc. IEEE Computer Society Conference on Computer Vision and Pattern Recognition, June 1991, pp. 208-214
  6. D. Lee, “Edge Detection, Classification, and Measurement”, IEEE Computer Society Conference on Computer Vision and Pattern Recognition, June 1989, pp. 2-10
  7. K. Huang, D. Lee, and T. Pavlidis, “Edge Detection through Two-dimensional Regularization”, IEEE Computer Society Workshop on Computer Vision, November 1987, pp. 225-227
  8. D. Lee, T. Pavlidis, and K. Huang, “Edge Detection through Residual Analysis”, IEEE Computer Society Conference on Computer Vision and Pattern Recognition, June 1988, pp. 215-222
  9. D. Lee, “Edge Detection from Severely Degraded Images, Advances in Image Analysis”, Y. Mahdavieh and R. C. Gonzalez Ed., SPIE Optical Engineering Press, Bellingham, Washington, 1992, pp. 55-74
  10. D. Lee, “Discontinuity Detection from Band-limited Signals”, J. of Complexity, Vol. 6, 1990, pp. 170-191
  11. D. Lee and J. H. Shiau, “Surface Reconstruction with Discontinuities”, SPIE, Vol. 1383, Sensor Fusion III: 3-D perception and Recognition, November 1990, pp. 297-304

D.3. Signal Processing and Computer Vision

  1. D. Lee, T. Pavlidis, and G. W. Wasilkowski, “A Note on the Trade-off between Sampling and Quantization in Signal Processing”, J. of Complexity, Vol. 3, 1987, pp. 359-371
  2. D. Lee, “Some Computational Aspects of Low-level Computer Vision”, Proceedings of The IEEE, Vol. 76, No. 8, 1988, pp. 890-898
  3. D. Lee, A. Papageorgiou, and G. W. Wasilkowski, “Computational Aspects of Determining Optical Flow”, The Second International Conference on Computer Vision, December 1988. pp. 612-617
  4. D. Lee, “Optimal Algorithms for Image Understanding: Current Status and Future Plans”, J. of Complexity, Vol. 1, 1985, pp. 138-146
  5. J. R. Kender and D. Lee, “An Information Centered Approach to Optimal Algorithms Applied to the  2&1/2-D Sketch”, Image Understanding Workshop, DARPA, October 1984, pp. 107-112
  6. J. R. Kender, D. Lee, and T. E. Boult, “Information-based Complexity Applied to Optimal Recovery of 2&1/2-D Sketch”, IEEE Computer Society Third Workshop on Computer Vision: Representation and Control, October 1985, pp. 157-167
  7. M. Brown and D. Lee, “From a Sequence of Images to a Depth Map”, IASTED International Symposium on Robotics and Automation, May 1987, pp. 6-11 Approximation Theory and Numerical Methods
  8. D. Lee and G. W. Wasilkowski, “Approximation of Linear Functionals on a Banach Space with a Gaussian Measure”, J. of Complexity, Vol. 2, 1986, pp. 12-43
  9. D. Lee and J. H. Shiau, “Multivariate Splines with Discontinuities and Fast Algorithms for their Computation”, SIAM J. on Scientific and Statistical Computing, Vol. 15, No. 6, November 1994, pp. 1311-1329
  10. J. F. Traub and D. Lee, “Integration of Functions of Bounded Variation”, Mathematics of Computation, Vol. 45, No. 172, 1985, pp. 505-512
  11. D. Lee, “Approximation of Linear Operators on a Wiener Space”, Rocky Mountain J. of Mathematics, Vol. 16, No. 4, 1986, pp. 641-659
  12. D. Lee, “Discontinuity Detection, Classification, and Measurement”, SIAM J. on Scientific and Statistical Computing, Vol. 12, March 1991. An extended abstract with a title “Discontinuity Detection and Curve Fitting” appeared in Approximation Theory VI, C. K. Chui, L. L. Schumaker, and J. D. Ward Ed., Academic Press, Boston, 1989
  13. D. Lee, “A Note on the Bivariate Box Splines on a k-direction Mesh”, Computational and Applied Mathematics, Vol. 15, No. 1, 1986, pp. 117-121
  14. D. Lee and Wozniakowski, “Testing Linear Operators”, BIT, Vol. 35, 1995, pp. 331-351
  15. D. Lee and H. Wozniakowski, “Testing Nonlinear Operators”, Numerical Algorithms, Vol. 9, 1995, pp. 319-342
  16. D. Lee and Wozniakowski, “Testing Linear Operators - an Average Case Analysis”, BIT, 2000
  17. R. Churchill and D. Lee, “Harmonic Oscillator at Low Energy, Classical and Quantum Models and Arithmetic Problems”, D. V. Chudnovsky and G. V. Chudnovsky Ed., Marcel Dekker Inc., New York, 1984, pp. 239-286
  18. V. D. Agrawal, D. Lee and H. Wozniakowski, “Numerical Computation of Characteristic Polynomials of Boolean Functions and its Applications”, Numerical Algorithms, Vol. 17, 1998, pp. 261-278

F.     Theoretical Computer Science

  1. A. V. Aho and D. Lee, “Storing a Dynamic Sparse Table”, 27th Annual Symposium on Foundations of Computer Science, October 1986, pp. 55-60
  2. M. Yannakakis and D. Lee, “Testing Finite State Machines”, 23rd Annual ACM Symposium Theory of Computing, May 1991, pp. 476-485
  3. D. Lee and M. Yannakakis, “On-line Minimization of Transition Systems”, 24th Annual ACM Symposium on Theory of Computing, May 1992, pp. 264-274
  4. D. Lee, “Fast Multiplication of a Recursive Block Toeplitz Matrix by a Vector and its Application”, J. of Complexity, Vol. 2, 1986, pp. 295-305
  5. D. Lee, H. Wozniakowski, “A Probabilistic Analysis of Testing Linear Operators on Hilbert Spaces with a Gaussian Measure”, Theoretical Computer Science, 2001
  6. A. V. Aho and D. Lee, “Efficient Algorithms for Constructing Testing Sets”, Covering Paths, and Minimum-flows, CSTR #159, 1991
  7. D. Lee and H. Wozniakowski, “Approximate Evaluations of Characteristic Polynomials of Boolean Functions”, Theoretical Computer Science, Vol. 262, 2001, pp. 37-68

G.    Circuit Design and Analysis

  1. D. Lee, “Comparators with Completion Signal”, IEEE Transactions on Computers, Vol. C-34, No. 9, 1985, pp. 855-857
  2. V. D. Agrawal and D. Lee, “Characteristic Polynomial Method for Verification and Test of Combinational Circuits”, ACET, 1995
  3. D. Lee, “A Note on the Topological Design of a PLA”, Department of Computer Science Technical Report, Columbia University, 1985

H.    Ph. D. Thesis

D. Lee, “Contributions to Information-based Complexity, Image Understanding, and Logic Circuit Design”, Department of Computer Science, Columbia University, 1985