Publications

Found 4228 results
[ Author(Asc)] Title Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
G
Gomes, B., Löwe W., Quittek J. W., & Weissman B. (1997).  Sather 2: A Language Design for Safe, High-Performance Computing.
Gomes, B., Stoutamire D., & Weissman B. (1997).  Type-Safety and Overloading in Sather.
Gomes, B., Weissman B., & Feldman J. (1998).  Parallelizing Connectionist Networks for Pattern Recognition: A Library Approach. Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications (PDPTA ’98).
Goldwasser, S., & Ostrovsky R. (1992).  Invariant Signatures and Non-Interactive Zero-Knowledge Proofs Are Equivalent.
Goldreich, O. (1989).  A Note on Computational Indistinguishability.
Goldreich, O., Ostrovsky R., & Petrank E. (1994).  Computational Complexity and Knowledge Complexity.
Goldreich, O., & Ostrovsky R. (1993).  Software Protection and Simulation on Oblivious RAMs.
Goldmann, M., & Karpinski M. (1992).  Simulating Threshold Circuits by Majority Circuits.
Goldmann, M., & Karpinski M. (1994).  Simulating Threshold Circuits by Majority Circuits (Extended Version).
Gold, B., Morgan N., & Ellis D. P. W. (2011).  Speech and Audio Signal Processing: Processing and Perception of Speech and Music, 2nd Edition.
Gold, B., & Morgan N. (1999).  Speech and Audio Signal Processing.
Göhring, D., Hoffman J., Rodner E., Saenko K., & Darrell T. (2014).  Interactive Adaptation of Real-Time Object Detectors.
Göhring, D., Latotzky D., Wang M., & Rojas R. (2012).  Semi-Autonomous Car Control Using Brain Computer Interfaces. 393-408.
Goga, O., Perito D., Lei H., Teixeira R., & Sommer R. (2013).  Large-scale Correlation of Accounts Across Social Networks.
Goga, O., Lei H., Parthasarathi S. Hari Krish, Friedland G., Sommer R., & Teixeira R. (2012).  On Exploiting Innocuous User Activity for Correlating Accounts Across Social Network Sites.
Goga, O., Lei H., Parthasarathi S. Hari Krish, Friedland G., Sommer R., & Teixeira R. (2013).  Exploiting Innocuous Activity for Correlating Users Across Sites.
Goebel, C., Tribowski C., Günther O., & Tröger R.. (2009).  RFID in the Supply Chain: How to Obtain a Positive ROI – The Case of Gerry Weber.
Goebel, C., & Günther O. (2009).  The Value of Visibility and RFID in Transshipment Operations—A Simulation Study. 129-138.
Goebel, C., Tribowski C., & Günther O. (2009).  Adoption of Cross-Company RFID: An Empirical Analysis of Perceived Influence Factors.
Goebel, C., Tribowski C., & Günther O. (2009).  EPCIS-Based Supply Chain Event Management—A Quantitative Comparison of Candidate System Architectures. 494-499.
Goebel, C., Krasnova H., Syllwasschy H.., & Günther O. (2009).  Vertical Integration and Information Sharing—An Empirical Investigation in the German Apparel Industry. 399-408.
Goebel, C., Krasnova H., Hildebrand T., Günther O., & Bidault F. (2008).  Enterprise Software Adoption and Perceived Business Performance—An Empirical Investigation in Germany and the U.S..
P. Godfrey, B., Schapira M., Zohar A.., & Shenker S. J. (2010).  Incentive Compatibility and Dynamics of Congestion Control. ACM SIGMETRICS Performance Evaluation Review. 36(1), 95-106.
P. Godfrey, B., Shenker S. J., & Stoica I. (2006).  Minimizing Churn in Distributed Systems. Proceedings of ACM Special Interest Group on Data Communications Conference (SIGCOMM 2006). 147-158.
P. Godfrey, B., Karp R. M., Lakshminarayanan K., Surana S., & Stoica I. (2004).  Load Balancing in Dynamic Structured P2P Systems. Proceedings of INFOCOMM.

Pages