Found 529 results
Author Title [ Type(Desc)] Year
Filters: First Letter Of Last Name is W  [Clear All Filters]
Journal Article
Karp, R. M., & Wigderson A. (1985).  A fast parallel algorithm for the maximal independent set problem. Journal of the Association for Computing Machinery. 32(4), 762-773.
Fillmore, C. J., Petruck M. R. L., Ruppenhofer J., & Wright A. (2003).  FrameNet in Action: The Case of Attaching. 297-332.
Gusfield, D., Karp R. M., Wang L., & Stelling P. (1998).  Graph Traversals, Genes and Matroids: An Efficient Case of the Travelling Salesman Problem. 88,
Alon, N., Karp R. M., Peleg D., & West D. (1995).  A graph-theoretic game and its application to the k-server problem. SIAM Journal on Computing. 24(1), 78-100.
Asanović, K., & Wittig R.. (2010).  Guest Editors' Introduction: Proceedings of the 21st Symposium on High Performance Chips (Hot Chips 21), Stanford, California. IEEE Micro. 30(2), 5-6.
Wang, J., Geesman G. J., Hostikka S. Liisa, Atallah M., Blackwell B., Lee E., et al. (2011).  Inhibition of Activated Pericentromeric SINE/Alu Repeat Transcription in Senescent Human Adult Stem Cells Reinstates Self-Renewal. Cell Cycle. 10(17), 3016-3030.
Moore, D., Paxson V., Savage S., Shannon C., Staniford S., & Weaver N. (2003).  Inside the Slammer Worm. IEEE Magazine of Security and Privacy. 1(4), 33-39.
Baumbach, J., Wittkop T., Kleindt C. Katja, & Tauch A. (2009).  Integrated Analysis and Reconstruction of Microbial Transcriptional Gene Regulatory Networks Using CoryneRegNet. Nature Protocols. 4(6), 992-1005.
Schulz, P., Matthé M., Klessig H., Simsek M., Fettweis G., Ansari J., et al. (2017).  Latency Critical IoT Applications in 5G: Perspective on the Design of Radio Interface and Network Architecture. IEEE Communications Magazine. 55(2), 
Karp, R. M., McKellar A.. C., & Wong C.. K. (1975).  Near-optimal Solutions to a 2-dimensional Placement Problem. SIAM Journal on Computing. 4(3), 271-286.
Hellerstein, J. M., Paxson V., Peterson L., Roscoe T., Shenker S. J., & Wetherall D. (2005).  The Network Oracle. Bulletin of the IEEE Computer Society Technical Committee on Data Engineering. 28(1), 3-10.
Friedland, G., Jantz K., Lenz T., Wiesel F., & Rojas R. (2007).  Object Cut and Paste in Images and Videos. International Journal of Semantic Computing. 1(2), 221-247.
Shenker, S. J., & Weinrib A. (1989).  The Optimal Control of Heterogeneous Queuing Systems: A Paradigm for Load-Sharing and Routing. IEEE Transactions of Computers. 38(12), 1724-1735.
Wittkop, T., Emig D., Lange S.. J., Rahmann S., Albrecht M., Morris J.. H., et al. (2010).  Partitioning Biological Data with Transitivity Clustering. Nature Methods. 7(6), 419-420.
Moody, J., Wu L., Liao Y., & Saffell M. (1998).  Performance Functions and Reinforcement Learning for Trading Systems and Portfolios. 17, 441-470.
Ben-David, S., Borodin A., Karp R. M., Tardos G., & Wigderson A. (1994).  On the power of randomization in on-line algorithms. Algorithmica. 11(1), 2-14.
Yosef, N.., Gramm J., Wang Q.-F.., Noble W.. S., Karp R. M., & Sharan R. (2010).  Prediction of Phenotype Information from Genotype Data. Communications in Information and Systems. 10(2), 99-114.
Padhukasahasram, B.., Halperin E., Wessel J.., Thomas D.. J., Silver E.., Trumbower H.., et al. (2010).  Presymptomatic Risk Assessment for Chronic Non-Communicable Diseases. PLoS ONE. 5,
Daskalakis, C., Dimakis A.. G., Karp R. M., & Wainwright M.. J. (2008).  Probabilistic Analysis of Linear Programming Decoding. IEEE Transactions on Information Theory. 54(8), 3565-3578.
Wawrzynek, J., Patterson D., Oskin M., Lu S-L., Kozyrakis C., Hoe J. C., et al. (2007).  RAMP: Research Accelerator for Multiple Processors. IEEE Micro. 27(2), 46-57.
Blömer, J., Karp R. M., & Welzl E. (1997).  The Rank of Sparse Random Matrices Over Finite Fields. Random Structures and Algorithms. 10,
Stolcke, A., Chen B. Y., Franco H., Gadde V.. R. R., Graciarena M., Hwang M-Y., et al. (2006).  Recent Innovations in Speech-to-Text Transcription at SRI-ICSI-UW. IEEE Transactions on Audio. 14(5), 1729-1744.
Weaver, N., & Ellis D. (2004).  Reflections on Witty: Analyzing the Attacker. ;login: The USENIX Magazine. 29(3), 34-37.
Weaver, N. (2018).  Risks of Cryptocurrencies. Communications of the ACM. 61(6), 20-24.
Wendelken, C. (2002).  The Role of Mid-Dorsolateral Prefrontal Cortex in Working Memory: A Connectionist Model. Neurocomputing. 44-46, 1009-1016.