Found 101 results
Author Title [ Type(Desc)] Year
Filters: First Letter Of Title is B  [Clear All Filters]
Technical Report
Seidel, R.. (1992).  Backwards Analysis of Randomized Geometric Algorithms.
Haban, D., & Wybranietz D. (1989).  Behavior and Performance Analysis of Distributed Systems Using a Hybrid.
Omohundro, S. (1992).  Best-First Model Merging for Dynamic Learning and Recognition.
Stolcke, A., & Omohundro S. (1994).  Best-First Model Merging for Hidden Markov Model Induction.
Afroz, S., Javed M., Paxson V., Qazi S. Asif, Sajid S., & Tschantz M. Carl (2018).  A Bestiary of Blocking The Motivations and Modes behind Website Unavailability.
Vallina-Rodriguez, N., Sundaresan S., Kreibich C., Weaver N., & Paxson V. (2014).  Beyond the Radio: Illuminating the Higher Layers of Mobile Networks.
Shastri, L. (1999).  A Biological Grounding of Recruitment Learning and Vicinal Algorithms.
Schnorr, C. P., & Vaudenay S. (1994).  Black Box Cryptanalysis of Hash Networks Based on Multipermutations.
Schnorr, C. P. (1992).  Block Korkin-Zolotarev Bases and Successive Minima.
Karpinski, M. (1989).  Boolean Circuit Complexity of Algebraic Interpolation Problems.
Schuett, D.., Eckhardt U.., & Suda P.. (1992).  Boot Algebras.
Althaus, E., Kohlbacher O., Lenhof H-P., & Müller P. (2000).  A Branch and Cut Algorithm for the Optimal Solution of the Side Chain Placement Problem.
Blum, L. (1991).  A Brief History of the Association for Women in Mathematics: The Presidents' Perspectives.
Lei, H., & Mirghafori N. (2014).  Broad Phonetic Classes for Speaker Verification with Noisy, Large-Scale Data.
Schindelhauer, C. (2000).  Broadcasting Time Cannot be Approximated Within a Factor of 57/56-epsilon.
Bell, O., Allman M., & Kuperman B. (2012).  On Browser-Level Event Logging.
Ferrari, D., & Verma D. C. (1990).  Buffer Space Allocation for Real-Time Channels in a Packet-Switching Network.
Pellegrini, M. (1993).  Building Convex Space Partitions Induced by Pairwise Interior-Disjoint Simplices.