Publications

Found 4258 results
Author Title [ Type(Asc)] Year
Technical Report
Gupta, A., & Rothermel K. (1995).  Fault Handling for Multi-Party Real-Time Communication.
Ostrovsky, R., & Wilkerson D. (1994).  Faster Computation On Directed Networks of Automata.
Alaou, A. El, & Mahoney M. (2014).  Fast Randomized Kernel Methods With Statistical Guarantees.
Bar-On, I., Codenotti B., & Leoncini M. (1995).  A Fast Parallel Cholesky Decomposition Algorithm for Tridiagonal Symmetric Matrices.
Dahlhaus, E., Karpinski M., & Novick M. B. (1989).  Fast Parallel Algorithms for the Clique Separator Decomposition.
Reischuk, R. (1989).  Fast Evaluation of Boolean Formulas by CREW-PRAMs.
Damaskos, S., & Verma D. C. (1989).  Fast Establishment of Real-Time Channels.
Luby, M., & Vigoda E. (1999).  Fast Convergence of the Glauber Dynamics for Sampling Independent Sets: Part I.
Vigoda, E. (1999).  Fast Convergence of the Glauber Dynamics for Sampling Independent Sets: Part II.
Codenotti, B., Datta B. N., Datta K., & Leoncini M. (1994).  Fast and Efficient Parallel Algorithms for Problems in Control Theory.
Fromherz, T. (1998).  Face Recognition: a Summary of 1995 - 1997.
Amann, J., Vallentin M., Hall S., & Sommer R. (2012).  Extracting Certificates from Live Traffic: A Near Real Time SSL Notary Service.
Grigoriev, D. Yu., Karpinski M., & Yao A. C. (1995).  An Exponential Lower Bound on the Size of Algebraic Decision Trees for MAX.
Afroz, S., Tschantz M. Carl, Sajid S., Qazi S. Asif, Javed M., & Paxson V. (2018).  Exploring Server-side Blocking of Regions.
Radoslavov, P., Estrin D., & Govindan R. (1999).  Exploiting the Bandwidth-Memory Tradeoff in Multicast State Aggregation.
Shastri, L. (1997).  Exploiting Temporal Binding to Learn Relational Rules Within a Connectionist Network.
Shastri, L. (1997).  Exploiting Temporal Binding to Learn Relational Rules Within a Connectionist Network.
Pfoser, D., Efentakis A., Voisard A., & Wenk C. (2009).  Exploiting Road Network Properties in Efficient Shortest‐Path Computation.
Harchol-Balter, M., & Downey A. B. (1995).  Exploiting Process Lifetime Distributions for Dynamic Load Balancing.
Goga, O., Lei H., Parthasarathi S. Hari Krish, Friedland G., Sommer R., & Teixeira R. (2012).  On Exploiting Innocuous User Activity for Correlating Accounts Across Social Network Sites.
Sommer, R., & Paxson V. (2004).  Exploiting Independent State For Network Intrusion Detection.
Sperduti, A. (1993).  Exploitation of Structured Gating Connections for the Normalization of a Visual Pattern.
Krishnan, R., Allman M., Partridge C., & Sterbenz J. P. G. (2002).  Explicit Transport Error Notification (ETEN) for Error-Prone Wireless and Satellite Networks.
Bornscheuer, S-E., & Thielscher M. (1996).  Explicit and Implicit Indeterminism: Reasoning About Uncertain and Contradictory Specifications of Dynamic Systems.
Diederich, J. (1989).  Explanation and Connectionist Systems.

Pages