Publications

Found 187 results
[ Author(Asc)] Title Type Year
Filters: First Letter Of Last Name is L  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
L
Lysenko, M., & Shapiro V. (2016).  Effective contact measures. Computer-Aided Design. 70, 134-143.
Lv, Q., Ratnasamy S., & Shenker S. J. (2002).  Can Heterogeneity Make Gnutella Scalable?. 94-103.
Lv, Q., Cao P., Cohen E., Li K., & Shenker S. J. (2002).  Search and Replication in Unstructured Peer-to-Peer Networks. Proceedings of the 16th International Conference on Supercomputing (ICS-02). 84-95.
Lv, Q., Cao P., Cohen E., Li K., & Shenker S. J. (2002).  Search and Replication in Unstructured Peer-to-Peer Networks. Proceedings of the International Comference on Measurements and Modeling of Computer Systems (SIGMETRICS 2002). 258-259.
Luque, C., Moretó M., Cazorla F. J., Gioiosa R., Buyuktosunoglu A., & Valero M. (2012).  CPU Accounting for Multicore Processors. IEEE Transactions on Computers. Vol. 61.
Luo, Z., Fu S., Theis M., Hasan S., Ratnasamy S., & Shenker S. (2021).  Democratizing cellular access with CellBricks. SIGCOMM '21: Proceedings of the 2021 ACM SIGCOMM 2021 Conference.
Lüning, A.., Friedland G., Knipping L., & Rojas R. (2007).  Visualizing Large-Screen Electronic Chalkboard Content on Handheld Devices. Proceedings of the Second IEEE International Workshop on Multimedia Technologies for E-Learning at 9th IEEE Symposium on Multimedia. 369-375.
Lukyanenko, A., Nikolaevskiy I., Kuptsov D., Gurtov A., Ghodsi A., & Shenker S. J. (2014).  STEM+: Allocating Bandwidth Fairly To Tasks.
Luckie, M., Beverly R., Wu T., Allman M., & claffy kc. (2015).  Resilience of Deployed TCP to Blind Off-Path Attacks. Proceedings of ACM Internet Measurement Conference.
Luby, M., Padovani R., Richardson T. J., Minder L., & Aggarwal P. (2019).  Liquid Cloud Storage. ACM Transactions on Storage. 15(1), 
Luby, M. (1995).  Derandomizing Approximation Algorithms for Hard Counting Problems.
Luby, M., Mitzenmacher M., M. Shokrollahi A., & Spielman D. A. (1997).  Analysis of Low Density Codes and Improved Designs Using Irregular Graphs.
Luby, M., & Ertel W. (1993).  Optimal Parallelization of Las Vegas Algorithms.
Luby, M. (2018).  ICSI 30th Anniversary Celebration. 30 Years of Innovation: ICSI 30th Anniversary Celebration.
Luby, M., Mitzenmacher M., M. Shokrollahi A., & Spielman D. A. (1997).  Improved Low-Density Parity-Check Codes Using Irregular Graphs and Belief Propagation.
Luby, M. (1989).  Removing Randomness in Parallel Computation Without a Processor Penalty.
Luby, M. (2019).  Systems and methods for storing, maintaining, and accessing objects in storage system clusters. US Patent 10,191,808.
Luby, M., Sinclair A., & Zuckerman D. (1993).  Optimal Speedup of Las Vegas Algorithms.
Luby, M., Mitzenmacher M., & M. Shokrollahi A. (1997).  Analysis of Random Processes via And-Or Tree Evaluation.
Luby, M., & Velickovic B. (1993).  On Deterministic Approximation of DNF.
Luby, M., & Wigderson A. (1995).  Pairwise Independence and Derandomization.
Luby, M. (1996).  A Geometric Proof of a Formula for the Number of Young Tableaux of a Given Shape.
Luby, M., & Vigoda E. (1999).  Fast Convergence of the Glauber Dynamics for Sampling Independent Sets: Part I.
Luby, M., Naor J., & Naor M. (1993).  On Removing Randomness from a Parallel Algorithm for Minimum Cuts.
Luby, M., & Rackoff C. (1989).  A Study of Password Security.

Pages