Publications

Export 7151 results:
Author Title [ Type(Asc)] Year
Filters: Efficient-model-checking-buchi-tableau-automata%E2%8B%86 is   [Clear All Filters]
Journal Articles
Raykar VC, Duraiswami R.  2007.  The improved fast Gauss transform with applications to machine learning. Large Scale Kernel Machines. :175-201.
Boneh D, Katz J.  2005.  Improved efficiency for CCA-secure cryptosystems built using identity-based encryption. Topics in Cryptology–CT-RSA 2005. :87-103.
Li Y, Long PM, Srinivasan A.  2001.  Improved Bounds on the Sample Complexity of Learning. Journal of Computer and System Sciences. 62(3):516-527.
Tahmoush D, Samet H.  2007.  An improved asymmetry measure to detect breast cancer. Proceedings of SPIE. 6514(1):65141Q-65141Q-9-65141Q-65141Q-9.
Gupta A, Srinivasan A.  2003.  An Improved Approximation Ratio for the Covering Steiner Problem. Theory of Computing. 2:53-64.
Srinivasan A.  1999.  Improved Approximation Guarantees for Packing and Covering Integer Programs. SIAM Journal on Computing. 29(2):648-648.
Cho M, Mount D.  2008.  Improved approximation bounds for planar point pattern matching. Algorithmica. 50(2):175-207.
Cho M, Mount D.  2005.  Improved approximation bounds for planar point pattern matching. Algorithms and Data Structures. :432-443.
Gandhi R, Halperin E, Khuller S, Kortsarz G, Srinivasan A.  2006.  An improved approximation algorithm for vertex cover with hard capacities. Journal of Computer and System Sciences. 72(1):16-33.
Chari S, Rohatgi P, Srinivasan A.  2000.  Improved Algorithms via Approximations of Probability Distributions. Journal of Computer and System Sciences. 61(1):81-107.
Khuller S, Kim YA, Malekian A.  2006.  Improved algorithms for data migration. Approximation, Randomization, and Combinatorial Optimization. Algorithms and Techniques. :164-175.
Katz J, Schröder D, Yerukhimovich A.  2011.  Impossibility of blind signatures from one-way permutations. Theory of Cryptography. :615-629.
Giraud-Carrier C, Dunham MH, Atreya A, Elkan C, Perlich C, Swirszcz G, Shi X, Philip SY, Fürnkranz J, Sima JF.  2010.  On the importance of sharing negative results. SIGKDD explorations. 12(2):3-4.
Souza CP, Almeida BC, Colwell RR, Rivera ING.  2011.  The Importance of Chitin in the Marine Environment. Marine Biotechnology. :1-8.
Park S, O’Leary DP.  2011.  Implicitly-weighted total least squares. Linear Algebra and its Applications. 435(3):560-577.
Olsen MB, Resnik P.  1997.  Implicit object constructions and the (in) transitivity continuum. 33rd Proceedings of the Chicago Linguistic Society. :327-336.
Feamster N, Johari R, Balakrishnan H.  2007.  Implications of Autonomy for the Expressiveness of Policy Routing. Networking, IEEE/ACM Transactions on. 15(6):1266-1279.
Hussein M, Varshney A, Davis LS.  2007.  On implementing graph cuts on cuda. First Workshop on General Purpose Processing on Graphics Processing Units.
Jung J H, O'Leary DP.  2008.  Implementing an Interior Point Method for Linear Programs on a CPU-GPU System. Electronic Transactions on Numerical Analysis. 28:174-189.
Bederson BB, Meyer J.  1998.  Implementing a zooming User Interface: experience building Pad++. Software: Practice and Experience. 28(10):1101-1135.
Mastronardi N, Lemmerling P, Kalsi A, O’Leary DP, Huffel VS.  2004.  Implementation of the regularized structured total least squares algorithms for blind image deblurring. Linear Algebra and its Applications. 391:203-221.
Smorul M, Song S, JaJa JF.  2009.  An Implementation of the Audit Control Environment (ACE) to Support the Long Term Integrity of Digital Archives. Proceedings of DigCCurr2009 Digital Curation: Practice, Promise and Prospects. :164-164.
Vishkin U.  1983.  Implementation of simultaneous memory address access in models that forbid it. Journal of algorithms. 4(1):45-50.
Zelkowitz MV, Lyle JR.  1981.  Implementation of language enhancements. Computer Languages. 6(3–4):139-153.
Jallad K, Katz J, Schneier B.  2002.  Implementation of chosen-ciphertext attacks against PGP and GnuPG. Information Security. :90-101.

Pages