Publications

Found 4258 results
Author [ Title(Asc)] Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
I
Luby, M., Mitzenmacher M., M. Shokrollahi A., & Spielman D. A. (1997).  Improved Low-Density Parity-Check Codes Using Irregular Graphs and Belief Propagation.
Roth, V., & Arnold M.. (2002).  Improved Key Management for Digital Watermark Monitoring. Proceedings of SPIE.
Moody, J., & Wu L. (1996).  Improved Estimates for the Rescaled Range and Hurst Exponents. Proceedings of the Third International Conference on Neural Networks in Financial Engineering. 537-553.
Chang, K., Lei H., & Canny J.. (2011).  Improved Classification of Speaking Styles for Mental Health Monitoring using Phoneme Dynamics. 85-88.
Pan, V. (1993).  Improved Band Matrix Computations.
Halperin, E., & Srinivasan R.. (2002).  Improved Approximation Algorithms for the Partial Vertex Cover Problem.
Gandhi, R., Halperin E., Khuller S., Kortsarz G., & Srinivasan A. (2003).  An Improved Approximation Algorithm for Vertex Cover with Hard Capacities. Proceedings of the 30th International Colloquium on Automata, Languages and Programming (ICALP 2003). 164-175.
Bermudez-Edo, M.., Hurtado-Torres N.., & Aragon-Correa J.. A. (2010).  The Importance of Trusting Beliefs Linked to the Corporate Website for Diffusion of Recruiting-Related Online Innovations. Information Technology and Management. 11(4), 177-189.
Lei, H., & Lopez-Gonzalo E. (2009).  Importance of Nasality Measures for Speaker Recognition Data Selection and Performance Prediction. 888-891.
Feldman, J. (1980).  On the Importance of Basic Research in Robotics. Proceedings of the Robotics Research Workshop.
Bertoni, A., & Dorigo M. (1993).  Implicit Parallelism in Genetic Algorithms.
Kulis, B., & Bartlett P. L. (2010).  Implicit Online Learning.
Karp, R. M. (2010).  Implicit Hitting Set Problems and Multi-Genome Alignment.
Weaver, N., Kreibich C., Nechaev B., & Paxson V. (2011).  Implications of Netalyzr's DNS Measurements.
Krashinsky, R., Batten C., & Asanović K. (2008).  Implementing the Scale Vector-Thread Processor. ACM Transactions on Design Automation of Electronic Systems. 13(3), 
Yang, J., Meng X., & Mahoney M. (2015).  Implementing Randomized Matrix Algorithms in Parallel and Distributed Environments.
Lamparter, B., & Kalfane M. (1995).  The Implementation of PET.
Nieto-Carvajal, I.., Botia J., Ruiz P. M., & Gómez-Skarmeta A. (2004).  Implementation and Evaluation of a Location-Aware Wireless Multi-Agent System. Lecture Notes in Computer Science. 3207, 528-537.
Philippsen, M. (1995).  Imperative Concurrent Object-Oriented Languages: An Annotated Bibliography.
Philippsen, M. (1995).  Imperative Concurrent Object-Oriented Languages.
Kirchner, M., Winkler P., & Farid H. (2013).  Impeding Forgers at Photo Inception.
Tangmunarunkit, H., Govindan R., Shenker S. J., & Estrin D. (2001).  The Impact of Routing Policy on Internet Paths. Proceedings of the Twentieth Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM '01). 2, 736-742.
Varadhan, K.., Estrin D., & Floyd S. (1998).  Impact of Network Dynamics on End-to-End Protocols: Case Studies in TCP and Reliable Multicast. Proceedings of the IEEE Symposium on Computers and Communications.
Aberer, K., & Klas W. (1992).  The Impact of Multimedia Data on Database Management Systems.
hmann, D. Ö., Awada A., Viering I., Simsek M., & Fettweis G. (2017).  Impact of Mobility on the Reliability Performance of 5G Multi-Connectivity Architectures. Proceedings of IEEE Wireless Communications and Networking Conference (WCNC).

Pages