Publications

Found 4258 results
Author Title [ Type(Asc)] Year
Technical Report
Cantone, D., & Cutello V. (1992).  Decision Procedures for Flat Set-Theorectical Syllogistics.I. General Union, Powerset and Singleton Operators.
Sander, T., & M. Shokrollahi A. (1997).  Deciding Properties of Polynomials without Factoring.
Cantone, D., & Cutello V. (1991).  On the Decidability Problem for a Topological Syllogistic Involving the Notion of Topological Product.
Shastri, L., & Grannes D. Jeffrey (1995).  Dealing with Negated Knowledge and Inconsistency in a Neurally Motivated Model of Memory and Reflexive Reasoning.
Shastri, L., & Grannes D. Jeffrey (1995).  Dealing with negated knowledge and inconsistency in a neurally motivated model of memory and reflexive reasoning.
Chun, B-G., Chen K., Lee G., Katz R. H., & Shenker S. J. (2008).  D3: Declarative Distributed Debugging.
Lange, J. Matti (1996).  Cyclical Local Structural Risk Minimization with Growing Neural Networks.
Friedland, G., & Sommer R. (2010).  Cybercasing the Joint: On the Privacy Implications of Geo-Tagging.
Choi, J., Akkus I. Ekin, Egelman S., Friedland G., Sommer R., Tschantz M. Carl, et al. (2018).  Cybercasing 2.0: You Get What You Pay For.
Attardi, G., & Flagella T. (1994).  A Customisable Memory Management Framework.
Caglioti, V.. (1993).  On a Criterion for Minimum Uncertainty Sensing.
Randall, D. (1994).  Counting in Lattices: Combinatorial Problems from Statistical Mechanics.
Gathen, J. von zur, Karpinski M., & Shparlinski I. (1994).  Counting Curves and Their Projections.
Günes, M., & Siekermann J. (2005).  CosMos - Communication Scenario and Mobility Scenario Generator.
Karpinski, M., Larmore L. L., & Rytter W. (1996).  Correctness of Constructing Optimal Alphabetic Trees Revisited.
Jacobsen, H-A., & Voisard A. (1998).  CORBA-Based Interoperable Geographic Information Systems.
Alfano, M., & Radouniklis N. (1996).  A Cooperative Multimedia Environment with QOS Control: Architectural and Implementation Issues.
Keshav, S. (1991).  A Control-Theoretic Approach to Flow Control.
Mahajan, R., & Floyd S. (2001).  Controlling High Bandwidth Flows at the Congested Router.
Cleve, R. (1989).  Controlled Gradual Disclosure Schemes for Random Bits and Their Applications.
Morgan, N., Wooters C., Bourlard H., & Cohen M. (1990).  Continuous Speech Recognition on the Resource Management Database Using Connectionist Probability Estimation.
Di Gesu, V., & Isgro F. (1995).  Context and Vision.
Janin, A., Friedland G., & Sommer R. (2012).  Content?based Privacy for Consumer?Produced Multimedia.
Cleve, R., & Dagum P. (1989).  A Constructive Omega(t(superscript 1.26)) Lower Bound for the Ramsey Number R (3,t).
Pietracaprina, A., Pucci G., & Sibeyn J. Frederik (1993).  Constructive Deterministic PRAM Simulation on a Mesh-Connected Computer.

Pages