Publications
Export 353 results:
[ Author] Title Type Year Filters: First Letter Of Last Name is G [Clear All Filters]
2011. Exploiting Statically Schedulable Regions in Dataflow Programs. Journal of Signal Processing Systems. 63(1):129-142.
2006. Stigmergic self-assembly of prespecified artificial structures in a constrained and continuous environment. Integrated Computer-Aided Engineering. 13(4):289-312.
2010. Parsimonious rule generation for a nature-inspired approach to self-assembly. ACM Transactions on Autonomous and Adaptive Systems (TAAS). 5(3):1-24.
2005. Evolving processing speed asymmetries and hemispheric interactions in a neural network model. Neurocomputing. 65:47-53.
2008. Automated design of distributed control rules for the self-assembly of prespecified artificial structures. Robotics and Autonomous Systems. 56(4):334-359.
1998. Wrapper generation for Web accessible data sources. 3rd IFCIS International Conference on Cooperative Information Systems, 1998. Proceedings. :14-23.
2000. Learning response time for websources using query feedback and application in query optimization. The VLDB Journal—The International Journal on Very Large Data Bases. 9(1):18-37.
1996. Learning Activation Rules Rather Than Connection Weights. International journal of neural systems. 7(2):129-148.
2007. Assessment of WENO methods with shock-confining filtering for LES of compressible turbulence. AIAA Paper 2007. 4198
1996. Space/time trade-offs for associative memory. Pattern Recognition, 1996., Proceedings of the 13th International Conference on. 4:296-302vol.4-296-302vol.4.
2006. What do high-level memory models mean for transactions? Proceedings of the 2006 workshop on Memory system performance and correctness - MSPC '06. :62-62.
1987. Mapping a single-assignment language onto the Warp systolic array. Functional Programming Languages and Computer Architecture. :347-363.
2006. Towards Dependability in Everyday Software Using Software Telemetry. Engineering of Autonomic and Autonomous Systems, IEEE International Workshop on. :9-18.
2010. A new framework for efficient password-based authenticated key exchange. Proceedings of the 17th ACM conference on Computer and communications security. :516-525.
2011. Limits of computational differential privacy in the client/server setting. Theory of Cryptography. :417-431.
2009. The Ins and Outs of Home Networking: The Case for Useful and Usable Domestic Networking. ACM Trans. Comput.-Hum. Interact.. 16(2):8:1-8:28.
2010. VAST 2010 Challenge: Arms dealings and pandemics. Visual Analytics Science and Technology (VAST), 2010 IEEE Symposium on. :263-264.
2006. VAST 2006 Contest - A Tale of Alderwood. Visual Analytics Science And Technology, 2006 IEEE Symposium On. :215-216.
2007. VAST 2007 Contest - Blue Iguanodon. Visual Analytics Science and Technology, 2007. VAST 2007. IEEE Symposium on. :231-232.
2008. VAST 2008 Challenge: Introducing mini-challenges. Visual Analytics Science and Technology, 2008. VAST '08. IEEE Symposium on. :195-196.