Lecture Notes in Computer Science
Journal
-
- Overview
-
- Identity
-
- View All
-
Overview
publication venue for
-
A Comparison Between the Zero Forcing Number and the Strong Metric Dimension of Graphs.
8881:356-365.
2014
-
Altmetrics for country-level research assessment.
8839:59-64.
2014
-
Deep learning based imaging data completion for improved brain disease diagnosis..
17:305-312.
2014
-
Exploring Performative Authoring as a Story Creation Approach for Children.
8832:61-72.
2014
-
Multi-step Predictions of Landslide Displacements Based on Echo State Network.
8834:382-388.
2014
-
ROSRV: Runtime verification for robots.
8734:247-254.
2014
-
Robust Deep Learning for Improved Classification of AD/MCI Patients.
8679:240-247.
2014
-
Cognitive-Affective Interactions in Strategic Decision Making.
8027:512-520.
2013
-
Automated digital dental articulation..
13:278-286.
2010
-
Development of Integrated DAO Pattern Applying Iterator Pattern.
3983:955-965.
2006
-
Optimal embedding for shape indexing in medical image databases..
8:377-384.
2005
-
Autonomous acquisition of the meaning of sensory states through sensory-invariance driven action.
3141:176-188.
2004
-
Efficient and Universally Composable Committed Oblivious Transfer and Applications.
2951:297-316.
2004
-
Explaining low-level brightness-contrast illusions using disinhibition.
3141:166-175.
2004
-
Fault tolerant routing algorithm in hypercube networks with load balancing support.
3358:698-704.
2004
-
Integrating sample-driven and pattern-driven approaches in motif finding.
3240:438-449.
2004
-
Parallel performance of hierarchical multipole algorithms for inductance extraction.
3296:450-461.
2004
-
Polynomial Time Approximation Schemes and Parameterized Complexity.
3153:500-512.
2004
-
Genus characterizes the complexity of graph problems: Some tight results.
2719:845-856.
2003
-
GeoQuorums: Implementing atomic memory in mobile ad hoc networks: (Extended abstract).
2848:306-320.
2003
-
Identifying useful passages in documents based on annotation patterns.
2769:101-112.
2003
-
Labeled search trees and amortized analysis: Improved upper bounds for NP-hard problems.
2906:148-157.
2003
-
Minimization of sonic boom on supersonic aircraft using an evolutionary algorithm.
2724:2157-2167.
2003
-
Multi-writer consistency conditions for shared memory objects.
2848:106-120.
2003
-
Strengthening zero-knowledge protocols using signatures.
2656:177-194.
2003
-
Timed fair exchange of standard signatures [extended abstract].
2742:190-207.
2003
-
Non-memory-based and real-time zerotree building for wavelet zerotree coding systems.
1800:469-475.
2000
-
CRASH RESILIENT COMMUNICATION IN DYNAMIC NETWORKS.
725:129-144.
1993
-
AN ITERATION PARTITION APPROACH FOR CACHE OR LOCAL MEMORY THRASHING ON PARALLEL PROCESSING.
589:313-327.
1992
-
PARALLEL COMPUTATION OF LONGEST-COMMON-SUBSEQUENCE.
468:383-394.
1990
-
PARALLEL CONVEXITY ALGORITHMS FOR DIGITIZED IMAGES ON A LINEAR-ARRAY OF PROCESSORS.
450:397-406.
1990
-
CRYPTOSYSTEMS BASED ON AN ANALOG OF HEAT-FLOW.
293:306-329.
1988
-
A Case Study of How Mobile Robot Competitions Promote Future Research.
2377:123-132.
-
Potential Tasks and Research Issues for Mobile Robots in RoboCup Rescue.
2019:339-344.
-
Evolution of Filter Bubbles and Polarization in News Recommendation
2023
-
Comparative Study of Synthetic Bulk RNA-Seq Generators
2022
-
Learning Spatial Transformations and their Math Representations through Embodied Learning in Augmented Reality
2022
-
Video Face Recognition with Audio-Visual Aggregation Network
2021
-
Single-Cell Gene Regulatory Network Analysis Reveals Potential Mechanisms of Action of Antimalarials Against SARS-CoV-2
2021
-
A High-Fidelity 3D Micromechanical Model of Ventricular Myocardium.
2021
-
An image registration framework to estimate 3D myocardial strains from cine cardiac MRI in mice.
2021
-
The Fractional k-truncated Metric Dimension of Graphs
2021
-
Bioinspired Simulation of Knotting Hagfish
2020
-
On the Security of Application Installers and Online Software Repositories
2020
-
Fractional Maker-Breaker Resolving Game
2020
-
A Comparison of Children's Narrative Expressions in Enactment and Writing
2020
-
Online Community Conflict Decomposition with Pseudo Spatial Permutation
2019
-
Scalable Self-taught Deep-Embedded Learning Framework for Drug Abuse Spatial Behaviors Detection
2019
-
Towards a Gesture-Based Story Authoring System: Design Implications from Feature Analysis of Iconic Gestures During Storytelling
2019
-
L(a)ying in (Test)Bed
2019
-
Toward Resilient Smart Grid Communications Using Distributed SDN with ML-Based Anomaly Detection
2018
-
Design of a Low-Cost Social Robot: Towards Personalized Human-Robot Interaction
2014
-
Provably Secure DNS: A Case Study in Reliable Software
2013
-
Improving Density Based Clustering with Multi-scale Analysis
2012
-
Energy Proportionality and Performance in Data Parallel Computing Clusters
2011
-
A Second Order Central Scheme for Hamilton-Jacobi Equations on Triangular Grids
2009
-
Wavelet-based 3-D multifractal spectrum with applications in breast MRI images
2008
-
DDDAS/ITR: A Data Mining and Exploration Middleware for Grid and Distributed Computing
2007
-
Intelligent sequential mining via alignment: Optimization techniques for very large DB
2007
-
Wavelet image interpolation (WII): A wavelet-based approach to enhancement of digital mammography images
2007
-
Computational Model of a Central Pattern Generator
2006
-
From extraneous noise to categorizable signatures: Using multi-scale analyses to assess implicit interaction needs of older adults with visual impairments
2005
-
Multiscale Angiogenesis Modeling
2005
-
The Convergence of Control, Communication, and Computation
2003
-
Simulation Studies for Predicting Surgical Outcomes in Breast Reconstructive Surgery
2003
-
Modeling for Plastic and Reconstructive Breast Surgery
2000
-
Modeling dynamic load balancing in molecular dynamics to achieve scalable parallel execution
1998
-
The ART behind IDEAS
1995
-
Modeling Cellular User Mobility Using a Leap Graph
-
Dissecting Applications Uninstallers and Removers: Are They Effective?
2022
-
Artificial Intelligence (AI), the Future of Work, and the Building of a National Talent Ecosystem
2022
-
Why We Need a Theory of Maliciousness: Hardware Performance Counters in Security
2022
-
Blockchains from Non-idealized Hash Functions
2020
-
Recommending Music Curators: A Neural Style-Aware Approach
2020
-
Consensus from Signatures of Work
2020
-
Cone-Beam Computed Tomography (CBCT) Segmentation by Adversarial Learning Domain Adaptation
2019
-
Semi-semantic Line-Cluster Assisted Monocular SLAM for Indoor Environments
2019
-
A Two-Stage Constrained Submodular Maximization
2019
-
Interaction-Aware Influence Maximization and Iterated Sandwich Method
2019
-
A Directional Medium Access Control Protocol for 5G Millimeter-Wave Local Area Networks
2019
-
An Interpretable Neural Model with Interactive Stepwise Influence
2019
-
Designing Educational Virtual Environments for Construction Safety: A Case Study in Contextualizing Incident Reports and Engaging Learners
2019
-
Field-Aware Parameterization for 3D Painting
2019
-
Global Stabilization for Delayed Fuzzy Inertial Neural Networks
2019
-
L(a)ying in (Test)Bed How Biased Datasets Produce Impractical Results for Actual Malware Families' Classification
2019
-
Libra: Succinct Zero-Knowledge Proofs with Optimal Prover Computation
2019
-
Computational Data and Social Networks
2018
-
A System Analytics Framework for Detecting Infrastructure-Related Topics in Disasters Using Social Sensing
2018
-
AWCR: Adaptive and Weighted Collaborative Representations for Face Super-Resolution with Context Residual-Learning
2018
-
Bootstrapping the Blockchain, with Applications to Consensus and Fast PKI Setup
2018
-
Boundedness and Stability for a Class of Timescale-Type Time-Varying Systems
2018
-
Control Plane Reflection Attacks in SDNs: New Attacks and Countermeasures
2018
-
Enhanced Discriminative Generative Adversarial Network for Face Super-Resolution
2018
-
Error-Sensor: Mining Information from HTTP Error Traffic for Malware Intelligence
2018
-
Hopf-Pitchfork Bifurcation Analysis of a Coupled Neural Oscillator System with Excitatory-to-Inhibitory Connection and Time Delay
2018
-
Relaxed Data Types as Consistency Conditions
2018
-
Unsupervised CNN-Based Co-saliency Detection with Graphical Optimization
2018
-
Validation of Semantic Relation of Synonymy in Domain Ontologies Using Lexico-Syntactic Patterns and Acronyms
2018
-
Vitriol on Social Media: Curation and Investigation
2018
-
A Protocol for Mixed Autonomous and Human-Operated Vehicles at Intersections
2017
-
An Interactive Diagnostic Application for Food Crop Irrigation
2017
-
Anomalies and Similarities Among Consensus Numbers of Variously-Relaxed Queues
2017
-
Complex-Valued Feedforward Neural Networks Learning Without Backpropagation
2017
-
Fast Approximate Distance Queries in Unweighted Graphs Using Bounded Asynchrony
2017
-
Geometry and Gesture-Based Features from Saccadic Eye-Movement as a Biometric in Radiology
2017
-
Investigating the Role of Biofeedback and Haptic Stimulation in Mobile Paced Breathing Tools
2017
-
InvisiShapes: A Recognition System for Sketched 3D Primitives in Continuous Interaction Spaces
2017
-
Learning of Phase-Amplitude-Type Complex-Valued Neural Networks with Application to Signal Coherence
2017
-
Neuro-Adaptive Containment Seeking of Multiple Networking Agents with Unknown Dynamics
2017
-
On Approximation Algorithms for Two-Stage Scheduling Problems
2017
-
Precisely and Scalably Vetting JavaScript Bridge in Android Hybrid Apps
2017
-
A Novel Computer-Aided Surgical Simulation (CASS) System to Streamline Orthognathic Surgical Planning
2016
-
Asynchronous Nested Parallelism for Dynamic Applications in Distributed Memory
2016
-
Automated Reconstruction of Neurovascular Networks in Knife-Edge Scanning Microscope Rat Brain Nissl Data Set
2016
-
Data-Based Optimal Tracking Control of Nonaffine Nonlinear Discrete-Time Systems
2016
-
Hardware-Based Sequential Consistency Violation Detection Made Simpler
2016
-
Memristor-Based Neuromorphic System with Content Addressable Memory Structure
2016
-
Project iMARECULTURE: Advanced VR, iMmersive Serious Games and Augmented REality as Tools to Raise Awareness and Access to European Underwater CULTURal heritagE
2016
-
SMT Solving for the Theory of Ordering Constraints
2016
-
Thought Chart: Tracking Dynamic EEG Brain Connectivity with Unsupervised Manifold Learning
2016
-
On-Demand Big Data Analysis in Digital Repositories: A Lightweight Approach
2015
-
EvolutionWorks Towards Improved Visualization of Citation Networks
2015
-
A Noise-Filtering Approach for Spatio-temporal Event Detection in Social Media
2015
-
A little honesty goes a long way: The two-tier model for secure multiparty computation
2015
-
Creating Diverse Product Review Summaries: A Graph Approach
2015
-
Detecting Spam URLs in Social Media via Behavioral Analysis
2015
-
Enabling Instrumental Interaction Through Electronics Making: Effects on Children's Storytelling
2015
-
Enhanced Task Modelling for Systematic Identification and Explicit Representation of Human Errors
2015
-
Host Trait Prediction of Metagenomic Data for Topology-Based Visualization
2015
-
Improved MaxSAT Algorithms for Instances of Degree 3
2015
-
Memristor Crossbar Array for Image Storing
2015
-
Simulating a Shared Register in an Asynchronous System that Never Stops Changing
2015
-
The Disjunctive Bondage Number and the Disjunctive Total Bondage Number of Graphs
2015
-
The STAPL Skeleton Framework
2015
-
KLA: A New Algorithmic Paradigm for Parallel Graph Computations
2014
-
EAGL: An Elliptic Curve Arithmetic GPU-Based Library for Bilinear Pairing
2014
-
Stabilizing Dining with Failure Locality 1
2014
-
DroidMiner: Automated Mining and Characterization of Fine-grained Malicious Behaviors in Android Applications
2014
-
GoldenEye: Efficiently and Effectively Unveiling Malwares Targeted Environment
2014
-
SRID: State Relation Based Intrusion Detection for False Data Injection Attacks in SCADA
2014
-
A Closed-Form Solution for Transcription Factor Activity Estimation Using Network Component Analysis
2014
-
An Improved Learning Algorithm with Tunable Kernels for Complex-Valued Radial Basis Function Neural Networks
2014
-
Approximation Algorithms for Maximum Agreement Forest on Multiple Trees
2014
-
Computational Neuro-Modeling of Visual Memory: Multimodal Imaging and Analysis
2014
-
Deep Learning Based Imaging Data Completion for Improved Brain Disease Diagnosis
2014
-
Deeper Local Search for Better Approximation on Maximum Internal Spanning Trees
2014
-
Eyedecryptprivate interactions in plain sight
2014
-
Improving Average Performance by Relaxing Distributed Data Structures
2014
-
Management of Visual Clutter in Annotated 3D CAD Models: A Comparative Study
2014
-
Mixed FEM for Second Order Elliptic Problems on Polygonal Meshes with BEM-Based Spaces
2014
-
On the Attack-and-Fault Tolerance of Intrusion Detection Systems in Wireless Mesh Networks
2014
-
On the Complexity of UC Commitments
2014
-
n-Step Cycle Inequalities: Facets for Continuous n-Mixing Set and Strong Cuts for Multi-Module Capacitated Lot-Sizing Problem
2014
-
Simultaneous Tracking, 3D Reconstruction and Deforming Point Detection for Stereoscope Guided Surgery
2013
-
PRIDE: Practical Intrusion Detection in Resource Constrained Wireless Mesh Networks
2013
-
Parameterized Complexity of Control and Bribery for d-Approval Elections
2013
-
Performative Authoring: Nurturing Storytelling in Children through Imaginative Enactment
2013
-
The Fractional Strong Metric Dimension of Graphs
2013
-
The STAPL Parallel Graph Library
2013
-
Galerkin FEM for Fractional Order Parabolic Equations with Initial Data in H-s, 0 <= s <= 1
2013
-
An Effective Branching Strategy for Some Parameterized Edge Modification Problems with Multiple Forbidden Induced Subgraphs
2013
-
Parameterized Algorithms for Maximum Agreement Forest on Multiple Trees
2013
-
Random Methods for Parameterized Problems
2013
-
Can Social Reference Management Systems Predict a Ranking of Scholarly Venues?
2013
-
Checking Out: Download and Digital Library Exchange for Complex Objects
2013
-
Social Navigation Support for Groups in a Community-Based Educational Portal
2013
-
The Role of XSLT in Digital Libraries, Editions, and Cultural Exhibits
2013
-
A Novel Approach Based on Joint Optimization of Alignment and Statistical Surface Representation with Wavelet Transform for CBCT Segmentation
2013
-
Finding-NEVO: Toward Radical Design in HCI
2013
-
Information Holodeck: Thinking in Technology Ecologies
2013
-
Organizing Documents to Support Activities
2013
-
Modeling cellular user mobility using a leap graph
2013
-
Parameterized and Approximation Algorithms for the MAF Problem in Multifurcating Trees
2013
-
The Evolution of Scholarly Digital Library Needs in an International Environment: Social Reference Management Systems and Qatar
2013
-
A Hybrid Approach to Proving Memory Reference Monotonicity
2013
-
On Optimal Connectivity Restoration in Segmented Sensor Networks
2013
-
Stochastic Modeling of Dynamic Distributed Systems with Crash Recovery and Its Application to Atomic Registers
2012
-
A Crowd Modeling Framework for Socially Plausible Animation Behaviors
2012
-
RAFNI: Robust Analysis of Functional NeuroImages with Non-normal -Stable Error
2012
-
The Circuit Realization of a Neuromorphic Computing System with Memristor-Based Synapse Design
2012
-
Environmental effect on egress simulation
2012
-
PoisonAmplifier: A Guided Approach of Discovering Compromised Websites through Reversing Search Poisoning Attacks
2012
-
Collaborative Authoring of Waldens Paths
2012
-
Enhancing Digital Libraries and Portals with Canonical Structures for Complex Objects
2012
-
Self-organized Clustering of Square Objects by Multiple Robots
2012
-
Examining the Information Requirements for Flocking Motion
2012
-
On Zero Forcing Number of Permutation Graphs
2012
-
Parameterized Complexity and Subexponential-Time Computability
2012
-
Simulation-Based Training of Ill-Defined Social Domains: The Complex Environment Assessment and Tutoring System (CEATS)
2012
-
Robust Solvers for Symmetric Positive Definite Operators and Weighted Poincar Inequalities
2012
-
Kernels for Packing and Covering Problems
2012
-
FPT Results for Signed Domination
2012
-
Improved FPT Algorithms for Rectilinear k-Links Spanning Path
2012
-
RESQUE: Network Reduction Using Semi-Markov Random Walk Scores for Efficient Querying of Biological Networks (Extended Abstract)
2012
-
How influential are you: Detecting influential bloggers in a blogging community
2012
-
Towards Optimal Event Detection and Localization in Acyclic Flow Networks
2012
-
Fast Object Detection with Foveated Imaging and Virtual Saccades on Resource Limited Robots
2011
-
Cross-Analysis of Botnet Victims: New Insights and Implications
2011
-
Die Free or Live Hard? Empirical Evaluation and New Design for Fighting Evolving Twitter Spammers
2011
-
Roadmap-Based Level Clearing of Buildings
2011
-
Dynamic Regular Registers in Systems with Churn
2011
-
An Efficient Static Trace Simplification Technique for Debugging Concurrent Programs
2011
-
Digital Library 2.0 for Educational Resources
2011
-
Understanding the Dynamic Scholarly Research Needs and Behavior as Applied to Social Reference Management
2011
-
WPv4: A Re-imagined Waldens Paths to Support Diverse User Communities
2011
-
Linear Problem Kernels for Planar Graph Problems with Small Distance Property
2011
-
Multicut in Trees Viewed through the Eyes of Vertex Cover
2011
-
Cograph Editing: Complexity and Parameterized Algorithms
2011
-
Matching and P2-Packing: Weighted Versions
2011
-
Full Reversal Routing as a Linear Dynamical System
2011
-
Partial is Full
2011
-
Energy Efficient Monitoring for Intrusion Detection in Battery-Powered Wireless Mesh Networks
2011
-
An Improved Kernel for Planar Connected Dominating Set
2011
-
The STAPL pView
2011
-
Reliable Networks with Unreliable Sensors
2011
-
Extending Open Dynamics Engine for Robotics Simulation
2010
-
Brief Announcement: Failure Detectors Encapsulate Fairness
2010
-
Toward Simulating Realistic Pursuit-Evasion Using a Roadmap-Based Approach
2010
-
Art 101: Learning to Draw through Sketch Recognition
2010
-
Brief Announcement: Regional Consecutive Leader Election in Mobile Ad-Hoc Networks
2010
-
Cluster Editing: Kernelization Based on Edge Cuts
2010
-
Electron Microscopy Image Segmentation with Graph Cuts Utilizing Estimated Symmetric Three-Dimensional Shape Prior
2010
-
Failure Detectors Encapsulate Fairness
2010
-
The Effects of Finger-Walking in Place (FWIP) for Spatial Knowledge Acquisition in Virtual Environments
2010
-
Component-Based Authoring of Complex, Petri net-based Digital Library Infrastructure
2010
-
CritSpace: A Workspace for Critical Engagement within Cultural Heritage Digital Libraries
2010
-
Enhancing Digital Libraries with Social Navigation: The Case of Ensemble
2010
-
Ensemble: A Distributed Portal for the Distributed Community of Computing Education
2010
-
Visual Expression for Organizing and Accessing Music Collections in Music Wiz
2010
-
Manifold Alpha-Integration
2010
-
Automated Digital Dental Articulation
2010
-
Real-Time Control of a Remote Virtual Tutor Using Minimal Pen-Gestures
2010
-
Mobile Sensor Network Localization in Harsh Environments
2010
-
A 2k Kernel for the Cluster Editing Problem
2010
-
On Feedback Vertex Set New Measure and New Structures
2010
-
The STAPL pList
2010
-
Discontinuous Galerkin Subgrid Finite Element Method for Heterogeneous Brinkman's Equations
2010
-
Multiscale Modeling and Simulation of Fluid Flows in Highly Deformable Porous Media
2010
-
Benchmarking Parallel I/O Performance for a Large Scale Scientific Application on the TeraGrid
2010
-
Some Geometrical Aspects of Control Points for Toric Patches
2010
-
Biomechanical Simulation of Human Eye Movement
2010
-
Brief Announcement: Regional Consecutive Leader Election in Mobile Ad-Hoc Networks
2010
-
The Problem with Evolutionary Art Is ...
2010
-
The problem with evolutionary art is ...
2010
-
Enabling High-Performance Internet-Wide Measurements on Windows
2010
-
Crash-Quiescent Failure Detection
2009
-
Deterministic Collision Free Communication Despite Continuous Motion
2009
-
Link Reversal: How to Play Better to Work Less
2009
-
Probabilistic Combination of Multiple Evidence
2009
-
Robust Stability of Fuzzy Cohen-Grossberg Neural Networks with Delays
2009
-
Supporting the Creation of Scholarly Bibliographies by Communities through Online Reputation Based Social Collaboration
2009
-
Time-Space-Activity Conflict Detection Using 4D Visualization in Multi-storied Construction Project
2009
-
Workspace Narrative Exploration: Overcoming Interruption-Caused Context Loss in Information Seeking Tasks
2009
-
Global Exponential Stability of Recurrent Neural Networks with Time-Dependent Switching Dynamics
2009
-
An Efficient Fixed-Parameter Enumeration Algorithm for Weighted Edge Dominating Set
2009
-
The Design of a Low-Cost Wide Area Network Simulator
2009
-
Representation of Complex Concepts for Semantic Routed Network
2009
-
RE2-CD: Robust and Energy Efficient Cut Detection in Wireless Sensor Networks
2009
-
An Improved SAT Algorithm in Terms of Formula Length
2009
-
Self-Organization of Tactile Receptive Fields: Exploring Their Textural Origin and Their Representational Properties
2009
-
Inventing Requirements with Creativity Support Tools
2009
-
A Second Order Central Scheme for Hamilton-Jacobi Equations on Triangular Grids
2009
-
Surface Reconstruction via L1-Minimization
2009
-
On Parameterized Exponential Time Complexity
2009
-
Hierarchical Organization of Functional Modules in Weighted Protein Interaction Networks Using Clustering Coefficient
2009
-
Ontological Substance and Meaning in Live Electroacoustic Music
2009
-
A practical parameterized algorithm for the individual haplotyping problem MLF
2008
-
An improved parameterized algorithm for a generalized matching problem
2008
-
Clock Offset Estimation in Wireless Sensor Networks Using Bootstrap Bias Correction
2008
-
Design for Interoperability in STAPL: pMatrices and Linear Algebra Algorithms
2008
-
Gesture Recognition Based on Manifold Learning
2008
-
Implementation of Sensitivity Analysis for Automatic Parallelization
2008
-
On the Domain Attraction of Fuzzy Neural Networks
2008
-
On the Pseudo-achromatic Number Problem
2008
-
Safety and liveness in intelligent intersections
2008
-
The smallest multistationary mass-preserving chemical reaction network
2008
-
DDDAS predictions for water spills
2008
-
Randomized disposal of unknowns and implicitly enforced bounds on parameters
2008
-
IMR-Pathload: Robust available bandwidth estimation under end-host interrupt delay
2008
-
Mobility Allowance Shuttle Transit (MAST) services: MIP formulation and strengthening with logic constraints
2008
-
Associative parallel containers in STAPL
2008
-
Genotype Sequence Segmentation: Handling Constraints and Noise
2008
-
Getting Started with Sketch Tools A Tutorial on Sketch Recognition Tools
2008
-
Supporting computational systems science: Genomic analysis tool federations using aspects and AOP
2008
-
A lower bound on approximation algorithms for the closest substring problem
2007
-
A randomized approximation algorithm for parameterized 3-D matching counting problem
2007
-
An improved parameterized algorithm for the minimum node multiway cut problem
2007
-
Design and use of htalib - A library for hierarchically tiled arrays
2007
-
Efficient Program Power Behavior Characterization
2007
-
Improved algorithms for the feedback vertex set problems
2007
-
Improved algorithms for weighted and unweighted set splitting problems
2007
-
Load balancing on an interactive multiplayer game server
2007
-
Lower cost modular spatially innnersive visualization
2007
-
Measurement informed route selection
2007
-
Personal environment management
2007
-
Texts, illustrations, and physical objects: The case of ancient shipbuilding treatises
2007
-
The semantic web and human inference: A lesson from cognitive science
2007
-
Improved pattern-driven algorithms for motif finding in DNA sequences
2007
-
Multiple sequence alignment based on profile alignment of intermediate sequences
2007
-
Tools for simulating and analyzing RNA folding kinetics
2007
-
Custom memory allocation for free
2007
-
Synchronization of impulsive fuzzy cellular neural networks with parameter mismatches
2007
-
Maintaining Information About Nearby Processors in a Mobile Environment
2006
-
Optimal clock synchronization under energy constraints in wireless ad-hoc networks - (Extended abstract)
2006
-
Parallel support graph preconditioners
2006
-
Scalable array SSA and array data flow analysis
2006
-
Simulating protein motions with rigidity analysis
2006
-
Towards a Third Generation of Control Systems
2006
-
Nonbinary quantum codes from Hermitian curves
2006
-
Postprocessing and improved accuracy of the lowest-order mixed finite element approximation for biharmonic eigenvalues
2006
-
"I keep collecting": College students build and utilize collections in spite of breakdowns
2006
-
A treecode for accurate force calculations
2006
-
An exploration of space-time constraints on contextual information in image-based testing interfaces
2006
-
DSO: Dependable Signing Overlay
2006
-
Dynamic contaminant identification in water
2006
-
A framework for building collaboration tools by leveraging industrial components
2006
-
Ergodic Dynamics for Large-Scale Distributed Robot Systems
2006
-
Expanding a humanities digital library: Musical references in Cervantes' works
2006
-
Greedy localization and color-coding: Improved matching and packing algorithms
2006
-
Improved parameterized upper bounds for vertex cover
2006
-
Insight for practical subdivision modeling with discrete Gauss-Bonnet theorem
2006
-
Interactive face-replacements for modeling detailed shapes
2006
-
Link availability at any time in MANET
2006
-
Mission unaccomplished: Form and behavior but no function
2006
-
On the effective enumerability of NP problems
2006
-
Process mining by measuring process block similarity
2006
-
Research on multi-valued and multi-labeled decision trees
2006
-
Stability of fuzzy cellular neural networks with impulses
2006
-
Stability of periodic solution in fuzzy BAM neural networks with finite distributed delays
2006
-
The nautical archaeology digital library
2006
-
Unmixing mix traffic
2006
-
Effects of display configurations on document triage
2005
-
Integrating diverse research in a digital library focused on a single author
2005
-
On the Interaction of SIP and Admission Control: An Inter-domain Call Authorization Model for Internet Multimedia Applications
2005
-
Optimal Embedding for Shape Indexing in Medical Image Databases
2005
-
Parallel reductions: An application of adaptive algorithm selection
2005
-
Performance measurements for privacy preserving data mining
2005
-
Automatic parallelization using the value evolution graph
2005
-
SAS: A scalar anonymous communication system
2005
-
A polynomial time solvable formulation of multiple sequence alignment
2005
-
A multipole based treecode using spherical harmonics for potentials of the form r(-lambda)
2005
-
W-hardness under linear FPT-reductions: Structural properties and further applications
2005
-
Inventory and facility location models with market selection
2005
-
Aggregated aggressiveness control on groups of TCP flows
2005
-
Batch scheduling algorithms for optical burst switching networks
2005
-
Exponential stability of fuzzy cellular neural networks with unbounded delay
2005
-
A study of burstiness in TCP flows
2005
-
On flow correlation attacks and countermeasures in mix networks
2005
-
Traffic matrix reloaded: Impact of routing changes
2005
-
DNA-based computation times
2005
-
Multiscale interpolation, backward in time error analysis for data-driven contaminant simulation
2005
-
On product covering in supply chain models: Natural complete problems for W[3] and W [4]
2005
-
Parametric duality and kernelization: Lower bounds and upper bounds on kernel size
2005
-
Swarming behavior using probabilistic roadmap techniques
2005
-
An improved group setup strategy for PCB assembly
2005
-
Brain image analysis using spherical splines
2005
-
Hybridization of blind source separation and rough sets for proteomic biomarker identification
2004
-
A note on data-driven contaminant simulation
2004
-
Detecting traffic anomalies using discrete wavelet transform
2004
-
Empirical and theoretical evaluation of active probing attacks and their countermeasures
2004
-
Incorporating physical and digital artifacts into growing personal collections
2004
-
Load balanced onion relay for prevention of traffic analysis inn ad hoc networks
2004
-
On reshaping of clustering coefficients in degree-based topology generators
2004
-
TCP-DCR: Making TCP robust to non-congestion events
2004
-
Virtual mobile nodes for mobile ad hoc networks
2004
-
Detecting traffic anomalies through aggregate analysis of packet header data
2004
-
Structuring access to a dynamic collection of digital documents: The Walden's Paths virtual directories
2004
-
Theory and algorithms for parallel computation
2004
-
Connecting interface metaphors to support creation of path-based collections
2003
-
On a class of Boussinesq equations for shallow water waves
2003
-
On a two-level parallel MIC(0) preconditioning of Crouzeix-Raviart non-conforming FEM systems
2003
-
STAPL: An adaptive, generic parallel C++ library
2003
-
Unitary error bases: Constructions, equivalence, and applications
2003
-
Virtual telemetry for dynamic data-driven application simulations
2003
-
GeoQuorums: Implementing atomic memory in mobile ad hoc networks
2003
-
Timed release of standard digital signatures extended abstract
2003
-
Distributed resource allocation in ad hoc networks
2002
-
On the approximability of multiprocessor task scheduling problems
2002
-
A framework for flexible information presentation in digital collections
2002
-
Additive complexity and roots of polynomials over number fields and p-adic fields
2002
-
Improved exact algorithms for MAX-SAT
2002
-
Visualization of variants in textual collations to analyze the evolution of literary works in the Cervantes Project
2002
-
Minimal complete primitives for secure multi-party computation
2001
-
Semi-normal schedulings: Improvement on Goemans' algorithm
2001
-
Randomized shared queues applied to distributed optimization algorithms
2001
-
Graph-based topology correction for brain cortex segmentation
2001
-
Identifying Long-Term High-Bandwidth Flows at a Router
2001
-
On constrained minimum vertex covers of bipartite graphs: Improved algorithms
2001
-
On strong menger-connectivity of star graphs
2001
-
SmartApps: An Application Centric Approach to High Performance Computing
2001
-
The cervantes project: Steps to a customizable and interlinked on-line electronic variorum edition supporting scholarship
2001
-
Using nondeterminism to design efficient deterministic algorithms
2001
-
A surface-based DNA algorithm for the expansion of symbolic determinants
2000
-
Take advantage of the computing power of DAN computers
2000
-
Diagramming aesthetics: Modernism and architecture in the 21st century
2000
-
A simple linear-time approximation algorithm for multi-processor job scheduling on four processors
2000
-
An intuitive and effective new representation for interconnection network structures
2000
-
Diagramming Aesthetics: Modernism and architecture in the 21st Century
2000
-
Long-lived broadcast encryption
2000
-
On approximating minimum vertex cover for graphs with perfect matching
2000
-
Run-Time Parallelization Optimization Techniques
2000
-
Speculative parallelization of partially parallel loops
2000
-
Techniques for reducing the overhead of run-time parallelization
2000
-
Training Teams with Collaborative Agents
2000
-
Evaluation of Data and Request Distribution Policies in Clustered Servers
1999
-
A hierarchical feature based deformation model applied to 4D cardiac SPECT data
1999
-
Implementation issues of loop-level speculative run-time parallelization
1999
-
Principles of speculative run-time parallelization
1999
-
Self-testing/correcting protocols
1999
-
Vertex cover: Further observations and further improvements
1999
-
Parallel simulation of particulate flows
1998
-
Standard Templates Adaptive Parallel Library (STAPL)
1998
-
A general theory of codes, II: Paradigms and homomorphisms
1998
-
A tool for maintaining multi-variant hypertext documents
1998
-
Successful Use of an Expert System to Teach Diagnostic Reasoning for Antibody Identification
1998
-
A timed automaton-based method for accurate computation of circuit delay in the presence of cross-talk
1998
-
Intrinsic near quadratic complexity bounds for real multivariate root counting
1998
-
Optimal parallel routing in star graphs
1997
-
Segmentation of medical image objects using deformable shape loci
1997
-
On the parametrization of algebraic discrete fourier transforms
1997
-
Vector coherence mapping: A parallelizable approach to image flow computation
1997
-
The transfusion medicine tutor: Using expert systems technology to teach domain-specific problem-solving skills
1996
-
A security architecture for Tenet Scheme 2
1996
-
Decomposition techniques for efficient ROBDD construction
1996
-
Efficient deterministic algorithms for embedding graphs on books
1996
-
On log-time alternating turing machines of alternation depth k (extended abstract)
1995
-
Optimal algorithms for finding connected components of an unknown graph
1995
-
Algorithmic graph embeddings
1995
-
Connection establishment for multi-party real-time communication
1995
-
On log-time alternating Turing machines of alternation depth k
1995
-
Polaris: Improving the effectiveness of parallelizing compilers
1995
-
Graph ear decompositions and graph embeddings
1994
-
On the structure of parameterized problems in NP
1994
-
A linear time algorithm for isomorphism of graphs of bounded average genus
1993
-
An optimal algorithm for finding the separation of simple polygons
1993
-
On assembly of four-connected graphs
1993
-
On the amount of nondeterminism and the power of verifying
1993
-
On the complexity of graph embeddings
1993
-
Using adaptive timeouts to achieve at-most-once message delivery
1992
-
Bounds on the costs of register implementations
1991
-
PARALLEL CONVEXITY ALGORITHMS FOR DIGITIZED IMAGES ON A LINEAR-ARRAY OF PROCESSORS
1990
-
SOLVING ELLIPTIC PROBLEMS BY THE DOMAIN DECOMPOSITION METHOD USING PRECONDITIONING MATRICES DERIVED BY MULTILEVEL SPLITTINGS OF THE FINITE-ELEMENT MATRIX
1988
-
Exploring Scholarly Impact Metrics in Receipt of Highly Prestigious Awards
-
Network Delay Tomography from End-to-End Unicast Measurements
Identity
International Standard Serial Number (ISSN)