Publications

Export 7151 results:
Author [ Title(Asc)] Type Year
Filters: Block-preconditioners-discrete-incompressible-navier%E2%80%93stokes-equations is   [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
T
Hannenhalli S, Pevzner P.  1996.  To cut… or not to cut (applications of comparative physical maps in molecular evolution). Proceedings of the seventh annual ACM-SIAM symposium on Discrete algorithms. :304-313.
Duraiswami R, Seydou F, Gumerov NA.  2004.  TM Electromagnetic Scattering from 2D Multilayered Dielectric Bodies-Numerical Solution. Applied Computational Electromagnetics Society journal. (2):100-107.
Bongki CC, Chang C, Moon B, Acharya A, Shock C, Sussman A, Saltz J.  1997.  Titan: a High-Performance Remote-sensing Database. In Proceedings of the 1997 International Conference on Data Engineering.
Coolahan JE, Roussopoulos N.  1983.  Timing Requirements for Time-Driven Systems Using Augmented Petri Nets. IEEE Transactions on Software Engineering. SE-9(5):603-616.
Anderson ML, Josyula DP, Okamoto YA, Perlis D.  2002.  Time-situated agency: Active logic and intention formation. in: Workshop on Cognitive Agents, 25th German Conference on Artificial Intelligence.
Roginsky J, Stewart G.W.  1998.  Time-Domain Extraction of Broad-Band Sources by Tikhonov-Phillips Regularization of Triangular Toeplitz Kernels*. UMIACS-TR-95-87
Coolahan Jr JE, Roussopoulos N.  1985.  A timed petri net methodolgoy for specifying real-time system timing requirements. International Workshop on Timed Petri Nets. :24-31.
Wallace DF, Anderson NS, Shneiderman B.  1987.  Time Stress Effects on Two Menu Selection Systems. Proceedings of the Human Factors and Ergonomics Society Annual MeetingProceedings of the Human Factors and Ergonomics Society Annual Meeting. 31(7):727-731.
Zhuolin Jiang, Li S-F, Gao D-F.  2006.  A Time Saving Method for Human Detection in Wide Angle Camera Images. Machine Learning and Cybernetics, 2006 International Conference on. :4029-4034.
Bullock SS, Brennen GK, O’Leary DP.  2005.  Time reversal and n-qubit canonical decompositions. Journal of Mathematical Physics. 46(6):062104-062104-19-062104-062104-19.
Gaitan M, Mayergoyz ID.  1987.  TIME PERTURBATION ANALYSIS FOR THE MOS SYSTEM. COMPEL: The International Journal for Computation and Mathematics in Electrical and Electronic Engineering. 6(2):77-83.
Aryangat S, Andrade H, Sussman A.  2004.  Time and space optimization for processing groups of multi-dimensional scientific queries. Proceedings of the 18th annual international conference on Supercomputing. :95-105.
Papamanthou C, Tamassia R.  2007.  Time and Space Efficient Algorithms for Two-Party Authenticated Data Structures. Information and Communications Security. :1-15.
Golub GH, Hansen P C, O'Leary DP.  1999.  Tikhonov Regularization and Total Least Squares. SIAM Journal on Matrix Analysis and Applications. 21(1):185-194.
Haft DH, Selengut JD, Richter RA, Harkins D, Basu MK, Beck E.  2013.  TIGRFAMs and Genome Properties in 2013.. Nucleic Acids Res. 41(Database issue):D387-95.
Arya S, Mount D, Xia J.  2010.  Tight lower bounds for halfspace range searching. Proceedings of the 2010 annual symposium on Computational geometry. :29-37.
Alon N, Azar Y, Vishkin U.  1986.  Tight complexity bounds for parallel comparison sorting. 27th Annual Symposium on Foundations of Computer Science. :502-510.
Azar Y, Vishkin U.  1987.  Tight comparison bounds on the complexity of parallel sorting. SIAM J. Comput.. 16(3):458-464.
Feamster N, Balazinska M, Wang W, Balakrishnan H, Karger D.  2003.  Thwarting Web Censorship with Untrusted Messenger Discovery. Privacy Enhancing TechnologiesPrivacy Enhancing Technologies. 2760:125-140.
Karlson AK, Bederson BB.  2007.  Thumbspace: Generalized one-handed input for touchscreen-based mobile devices. Proceedings of the 11th IFIP TC 13 international conference on Human-computer interaction. :324-338.
Mundur P, Sood A, Simon R.  1998.  Threshold-based admission control for multi-class video-on-demand systems. Performance, Computing and Communications, 1998. IPCCC '98., IEEE International. :154-160.
Katz J, Yung M.  2002.  Threshold cryptosystems based on factoring. Advances in Cryptology—ASIACRYPT 2002. :139-147.
Kundu K, Sessions C, desJardins M, Rheingans P.  2002.  Three-dimensional visualization of hierarchical task network plans. In Proceedings of the 3rd International NASA Workshop on Planning and Scheduling for.
Madabhushi R, Korman CE, Mayergoyz ID.  1996.  A three-dimensional MOSFET solver implementing the fixed point iteration technique. Solid-State Electronics. 39(1):147-157.
Kerr DC, Goldsman N, Mayergoyz ID.  1998.  Three-Dimensional Hydrodynamic Modeling of MOSFET Devices. VLSI Design. 6(1-4):261-265.

Pages