Publications

Export 7151 results:
Author Title [ Type(Desc)] Year
Journal Articles
Zelkowitz MV, Larsen HJ.  1978.  Implementation of a Capability-Based Data Abstraction. Software Engineering, IEEE Transactions on. SE-4(1):56-64.
Jallad K, Katz J, Schneier B.  2002.  Implementation of chosen-ciphertext attacks against PGP and GnuPG. Information Security. :90-101.
Zelkowitz MV, Lyle JR.  1981.  Implementation of language enhancements. Computer Languages. 6(3–4):139-153.
Vishkin U.  1983.  Implementation of simultaneous memory address access in models that forbid it. Journal of algorithms. 4(1):45-50.
Smorul M, Song S, JaJa JF.  2009.  An Implementation of the Audit Control Environment (ACE) to Support the Long Term Integrity of Digital Archives. Proceedings of DigCCurr2009 Digital Curation: Practice, Promise and Prospects. :164-164.
Mastronardi N, Lemmerling P, Kalsi A, O’Leary DP, Huffel VS.  2004.  Implementation of the regularized structured total least squares algorithms for blind image deblurring. Linear Algebra and its Applications. 391:203-221.
Bederson BB, Meyer J.  1998.  Implementing a zooming User Interface: experience building Pad++. Software: Practice and Experience. 28(10):1101-1135.
Jung J H, O'Leary DP.  2008.  Implementing an Interior Point Method for Linear Programs on a CPU-GPU System. Electronic Transactions on Numerical Analysis. 28:174-189.
Hussein M, Varshney A, Davis LS.  2007.  On implementing graph cuts on cuda. First Workshop on General Purpose Processing on Graphics Processing Units.
Feamster N, Johari R, Balakrishnan H.  2007.  Implications of Autonomy for the Expressiveness of Policy Routing. Networking, IEEE/ACM Transactions on. 15(6):1266-1279.
Olsen MB, Resnik P.  1997.  Implicit object constructions and the (in) transitivity continuum. 33rd Proceedings of the Chicago Linguistic Society. :327-336.
Park S, O’Leary DP.  2011.  Implicitly-weighted total least squares. Linear Algebra and its Applications. 435(3):560-577.
Souza CP, Almeida BC, Colwell RR, Rivera ING.  2011.  The Importance of Chitin in the Marine Environment. Marine Biotechnology. :1-8.
Giraud-Carrier C, Dunham MH, Atreya A, Elkan C, Perlich C, Swirszcz G, Shi X, Philip SY, Fürnkranz J, Sima JF.  2010.  On the importance of sharing negative results. SIGKDD explorations. 12(2):3-4.
Katz J, Schröder D, Yerukhimovich A.  2011.  Impossibility of blind signatures from one-way permutations. Theory of Cryptography. :615-629.
Khuller S, Kim YA, Malekian A.  2006.  Improved algorithms for data migration. Approximation, Randomization, and Combinatorial Optimization. Algorithms and Techniques. :164-175.
Chari S, Rohatgi P, Srinivasan A.  2000.  Improved Algorithms via Approximations of Probability Distributions. Journal of Computer and System Sciences. 61(1):81-107.
Gandhi R, Halperin E, Khuller S, Kortsarz G, Srinivasan A.  2006.  An improved approximation algorithm for vertex cover with hard capacities. Journal of Computer and System Sciences. 72(1):16-33.
Cho M, Mount D.  2008.  Improved approximation bounds for planar point pattern matching. Algorithmica. 50(2):175-207.
Cho M, Mount D.  2005.  Improved approximation bounds for planar point pattern matching. Algorithms and Data Structures. :432-443.
Srinivasan A.  1999.  Improved Approximation Guarantees for Packing and Covering Integer Programs. SIAM Journal on Computing. 29(2):648-648.
Gupta A, Srinivasan A.  2003.  An Improved Approximation Ratio for the Covering Steiner Problem. Theory of Computing. 2:53-64.
Tahmoush D, Samet H.  2007.  An improved asymmetry measure to detect breast cancer. Proceedings of SPIE. 6514(1):65141Q-65141Q-9-65141Q-65141Q-9.
Li Y, Long PM, Srinivasan A.  2001.  Improved Bounds on the Sample Complexity of Learning. Journal of Computer and System Sciences. 62(3):516-527.
Boneh D, Katz J.  2005.  Improved efficiency for CCA-secure cryptosystems built using identity-based encryption. Topics in Cryptology–CT-RSA 2005. :87-103.

Pages