Publications

Export 7151 results:
Author [ Title(Asc)] Type Year
Filters: Block-preconditioners-discrete-incompressible-navier%E2%80%93stokes-equations is   [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
C
Katz J, Malka L.  2011.  Constant-Round Private Function Evaluation with Linear Complexity. Advances in Cryptology–ASIACRYPT 2011. :556-571.
Srinivasan A, Teo C-P.  1997.  A constant-factor approximation algorithm for packet routing, and balancing local vs. global criteria. Proceedings of the twenty-ninth annual ACM symposium on Theory of computing. :636-643.
Basri R, Jacobs DW.  1997.  Constancy and similarity. Computer Vision and Image Understanding. 65(3):447-449.
Perlis D.  1986.  On the consistency of commonsense reasoning. Computational Intelligence. 2(1):180-190.
Monahemi M, Barlow J, O'Leary DP.  1991.  Considerations on Loop Transfer Recovery for Non-minimum Phase Plants. Proceedings of the AIAA Aircraft Design Systems and Operations MeetingProceedings of the AIAA Aircraft Design Systems and Operations Meeting. AIAA-91-3086
Evans P, Donahue G, Hannenhalli S.  2006.  Conservation Patterns in cis-Elements Reveal Compensatory Mutations. Comparative GenomicsComparative Genomics. 4205:186-199.
Li J, Deshpande A.  2009.  Consensus answers for queries over probabilistic databases. Proceedings of the twenty-eighth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems. :259-268.
Perlis D.  1997.  Consciousness as self-function. Journal of Consciousness Studies, 4. 5(6):509-525.
Perlis D.  1995.  Consciousness and complexity: the cognitive quest. Annals of Mathematics and Artificial Intelligence. 14(2):309-321.
Chang J, Boyd-Graber J, Blei DM.  2009.  Connections between the lines: augmenting social networks with text. Proceedings of the 15th ACM SIGKDD international conference on Knowledge discovery and data mining. :169-178.
Doszkocs TE, Reggia JA, others.  1990.  Connectionist models and information retrieval. Annual review of information science and technology. 25:209-262.
Whitfield KC, Goodall SM, Reggia JA.  1989.  A connectionist model for dynamic control. Telematics and Informatics. 6(3-4):375-390.
Peng Y, Reggia JA.  1989.  A connectionist model for diagnostic problem solving. Systems, Man and Cybernetics, IEEE Transactions on. 19(2):285-298.
Peng Y, Reggia JA, Li T.  1992.  A connectionist approach to vertex covering problems. Int’l J. Neural Systems. 3(1):43-56.
Reggia JA, Peng Y, Tuhrim S.  1993.  A connectionist approach to diagnostic problem solving using causal networks. Information sciences. 70(1-2):27-48.
Xie B, Druin A, Fails J, Massey S, Golub E, Franckel S, Schneider K.  2010.  Connecting generations: developing co-design methods for older adults and children. Behaviour & Information Technology. 99999(1):1-11.
O'Leary DP.  1996.  Conjugate Gradients and Related KMP Algorithms: The Beginnings. Linear and Nonlinear Conjugate Gradient-Related MethodsLinear and Nonlinear Conjugate Gradient-Related Methods. :1-8.
O'Leary DP.  1979.  Conjugate Gradient Algorithms in the Solution of Optimization Problems for Nonlinear Elliptic Partial Differential Equations. Computing. 22:59-77.
Fermüller C, Aloimonos Y.  1997.  The confounding of translation and rotation in reconstruction from multiple views. , 1997 IEEE Computer Society Conference on Computer Vision and Pattern Recognition, 1997. Proceedings. :250-256.
Stantchev G, Juba D, Dorland W, Varshney A.  2008.  Confluent Volumetric Visualization of Gyrokinetic Turbulence. Plasma Science, IEEE Transactions on. 36(4):1112-1113.
Dachman-Soled D, Sreedhar V.C..  2007.  Configuration Reasoning and Ontology For Web. IEEE International Conference on Services Computing, 2007. SCC 2007. :387-394.
Corretjer I, Hsu C, Bhattacharyya SS.  2006.  Configuration and representation of large-scale dataflow graphs using the dataflow interchange format. Proceedings of the IEEE Workshop on Signal Processing Systems, Banff, Canada. :10-15.
Seri M, Courtney T, Cukier M, Gupta V, Krishnmamurthy S, Lyons J, Ramasamy H, Ren J, Sanders WH.  2002.  A configurable CORBA gateway for providing adaptable system properties.
Swaminathan A, Mao Y, Su G-M, Gou H, Varna AL, He S, M. Wu, Oard D.  2007.  Confidentiality-preserving rank-ordered search. Proceedings of the 2007 ACM workshop on Storage security and survivability. :7-12.
desJardins M, MacGlashan J, Wagstaff KL.  2010.  Confidence-based feature acquisition to minimize training and test costs. Proceedings of the SIAM Conference on Data Mining. 76(373):514-524.

Pages