Publications

Found 327 results
[ Author(Asc)] Title Type Year
Filters: First Letter Of Last Name is B  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
B
Brockmann, K., & Wanka R. (1996).  Efficient Oblivious Parallel Sorting on the MasPar MP-1.
Brockhoff, D.., Friedrich T., Hebbinghaus N., Klein C.., Neumann F., & Zitzler E.. (2009).  On the Effects of Adding Objectives to Plateau Functions. IEEE Transactions on Evolutionary Computation. 13(3), 591-603.
Bringmann, K., & Friedrich T. (2009).  Approximating the Least Hypervolume Contributor : NP-Hard in General, but Fast in Practice. 6-20.
Bringmann, K., & Friedrich T. (2010).  Approximating the Volume of Unions and Intersections of High-Dimensional Geometric Objects. Computational Geometry. 43(6-7), 601-610.
Bringmann, K., & Friedrich T. (2008).  Approximating the Volume of Unions and Intersections of High-Dimensional Geometric Objects. 436-447.
Bringmann, K., & Friedrich T. (2009).  Don’t Be Greedy When Calculating Hypervolume Contributions.. 103-112.
Brickson, L., Vollrath F., & Titus A. J. (2023).  Elephants and Algorithms: A Review of the Current and Future Role of AI in Elephant Monitoring. arXiv.
Brewka, G. (1992).  An Abductive Framework for Generalized Logic Programs: Preliminary Report.
Brewka, G., Guesgen H. Werner, & Hertzberg J. (1992).  Constraint Relaxation and Nonmonotonic Reasoning.
Brewka, G. (1992).  A Framework for Cumulative Default Logics.
Brewer, E., Demmer M., Ho M., Honicky R.. J., Pal J., Plauché M., et al. (2006).  The challenges of IT research in developing regions. IEEE Pervasive Computing. 5(2), 15-23.
Breuer, P.. T., A. Lopez M., & A. Ares G. (2000).  The Network Block Device. Linux Journal.
Bretones, C. (2001).  Synaesthetic Metaphors in English.
Bretones, C., Cristóbal M., & Ibarretxe-Antuñano I. (2001).  Exiting Events in Spanish: Boundary I-Schema and Move X-Schema.
Breslau, L., Knightly E. W., Shenker S. J., Stoica I., & Zhang H. (2000).  Endpoint Admission Control: Architectural Issues and Performance. Proceedings of the ACM SIGCOMM Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication.
Breslau, L. (1999).  Advances in Network Simulation.
Breslau, L., Jamin S., & Shenker S. J. (2000).  Comments on the Performance of Measurement-Based Admission Control Algorithms.
Breslau, L. (2000).  Advances in Network Simulation. IEEE Computer. 59-67.
Breslau, L., & Shenker S. J. (1998).  Best-Effort versus Reservations: A Simple Comparative Analysis. ACM Computer Communication Review. 28, 3-16.
Breslau, L., Cao P., Fan L., Phillips G., & Shenker S. J. (1999).  Web Caching and Zipf-Like Distributions: Evidence and Implications. Proceedings of the Eighteenth Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM '99). 1, 126-134.
Breslau, L., Jamin S., & Shenker S. J. (2000).  Comments on the Performance of Measurement-Based Admission Control Algorithms. Proceedings of the Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM 2000). 3, 1233-1242.
Bregler, C., & Konig Y. (1994).  "Eigenlips" for Robust Speech Recognition.
Bregler, C., & Omohundro S. (1994).  Surface Learning with Applications to Lip-Reading.
Bregler, C., Omohundro S., Covell M., Slaney M., Ahmad S., Forsyth D.., et al. (1998).  Probabilistic Models of Verbal and Body Gestures.
Bradonjic, M.., Elsässer R., Friedrich T., Sauerwald T., & Stauffer A. (2010).  Efficient Broadcast on Random Geometric Graphs. 1412-1421.

Pages