Publications
Export 344 results:
Author Title [ Type] Year Filters: First Letter Of Title is R [Clear All Filters]
2007. Randomized Algorithms and Probabilistic Analysis in Wireless Networking. Stochastic Algorithms: Foundations and ApplicationsStochastic Algorithms: Foundations and Applications. 4665:54-57.
2008. The Randomized Coloring Procedure with Symmetry-Breaking. Automata, Languages and ProgrammingAutomata, Languages and Programming. 5125:306-319.
2007. Recognizing Faces Across Age Progression. Face Biometrics for Personal IdentificationFace Biometrics for Personal Identification. :27-42.
1997. Regularization algorithms based on total least squares. Recent advances in total least squares techniques and errors-in-variables modeling (Leuven, 1996)Recent advances in total least squares techniques and errors-in-variables modeling (Leuven, 1996). :127-137.
1994. Regularization of Ill-Posed Problems in Image Restoration. Proceedings of the Fifth SIAM Conference on Applied Linear AlgebraProceedings of the Fifth SIAM Conference on Applied Linear Algebra. :102-105.
2010. Regulating the Regulators: Modulators of Transcription Factor Activity. Computational Biology of Transcription Factor BindingComputational Biology of Transcription Factor Binding. 674:297-312.
1997. Regulation of Cable Television. The Froehlich/Kent Encyclopedia of Telecommunications: Volume 15-Radio Astronomy to Submarine Cable SystemsThe Froehlich/Kent Encyclopedia of Telecommunications: Volume 15-Radio Astronomy to Submarine Cable Systems. 15:84-84.
1993. Remote direct manipulation: A case study of a telemedicine workstation. Sparks of innovation in human-computer interactionSparks of innovation in human-computer interaction. :51-51.
2005. Representing Unevenly-Spaced Time Series Data for Visualization and Interactive Exploration. Human-Computer Interaction - INTERACT 2005Human-Computer Interaction - INTERACT 2005. 3585:835-846.
2000. Resource-aware meta-computing. Emphasizing Distributed SystemsEmphasizing Distributed Systems. Volume 53:109-169.
2008. Review of Classifier Combination Methods. Studies in Computational Intelligence: Machine Learning in Document Analysis and RecognitionStudies in Computational Intelligence: Machine Learning in Document Analysis and Recognition. :361-386.
2012. Re-wiring Activity of Malicious Networks. Passive and Active MeasurementPassive and Active Measurement. 7192:116-125.
2003. Robust Face Recognition in the Presence of Clutter. Audio- and Video-Based Biometric Person AuthenticationAudio- and Video-Based Biometric Person Authentication. 2688:1062-1062.
2002. RECOMB '02: Proceedings of the sixth annual international conference on Computational biology.
1999. The RNA World.
2012. A Random Forest System Combination Approach for Error Detection in Digital Dictionaries. Innovative hybrid approaches to the processing of textual data, EACL 2012 Workshop. :78-86.
2003. Random MAX SAT, random MAX CUT, and their phase transitions. Proceedings of the fourteenth annual ACM-SIAM symposium on Discrete algorithms. :364-373.
2009. On random sampling auctions for digital goods. Proceedings of the 10th ACM conference on Electronic commerce. :187-196.
1994. Randomized and deterministic algorithms for geometric spanners of small diameter. Foundations of Computer Science, 1994 Proceedings., 35th Annual Symposium on. :703-712.
1984. Randomized speed-ups in parallel computation. Proceedings of the sixteenth annual ACM symposium on Theory of computing. :230-239.