Publications

Found 823 results
Author Title [ Type(Desc)] Year
Filters: First Letter Of Last Name is B  [Clear All Filters]
Technical Report
Ar, S., Blum M. E., Codenotti B., & Gemmell P. (1992).  Checking Approximate Computations Over the Reals.
Asanović, K., Beck J., Callahan T. J., Feldman J., Irissou B., Kingsbury B., et al. (1993).  CNS-1 Architecture Specification: A Connectionist Network Supercomputer.
Beigel, R. (1992).  Communicating with Low-Diffraction Lasers and Mirrors.
Böcking, S. (1995).  Communication Performance Models.
Blum, L., Cucker F., Shub M., & Smale S. (1995).  Complexity and Real Computation: A Manifesto.
Berman, P., Karpinski M., Larmore L. L., Plandowski W., & Rytter W. (1996).  The Complexity of Two-Dimensional Compressed Pattern Matching.
Feldman, J., & Ballard D. Harry (1981).  Computing with Connections.
Renals, S., Morgan N., Bourlard H., Cohen M., Franco H., Wooters C., et al. (1991).  Connectionist Speech Recognition: Status and Prospects.
Brewka, G., Guesgen H. Werner, & Hertzberg J. (1992).  Constraint Relaxation and Nonmonotonic Reasoning.
Berthold, M. R., & Huber K-P.. (1997).  Constructing Fuzzy Graphs from Examples.
Morgan, N., Wooters C., Bourlard H., & Cohen M. (1990).  Continuous Speech Recognition on the Resource Management Database Using Connectionist Probability Estimation.
Bernhardt, M. (1996).  Design and Implementation of a Web-based Tool for ATM Connection Management.
Blum, M. E. (1988).  Designing Programs to Check Their Work.
Byers, J. W., Luby M., Mitzenmacher M., & Rege A. (1998).  A Digital Fountain Approach to Reliable Distribution of Bulk Data.
Byers, J. W., Luby M., Mitzenmacher M., & Rege A. (1998).  Digital Fountain Approach to Reliable Distribution of Bulk Data.
Bettati, R., & Gupta A. (1995).  Dynamic Resource Migration for Multi-Party Real-Time Communication.
Brockmann, K., & Wanka R. (1996).  Efficient Oblivious Parallel Sorting on the MasPar MP-1.
Bregler, C., & Konig Y. (1994).  "Eigenlips" for Robust Speech Recognition.
Brickson, L., Vollrath F., & Titus A. J. (2023).  Elephants and Algorithms: A Review of the Current and Future Role of AI in Elephant Monitoring. arXiv.
Bergen, B. K., & Chang N. (2002).  Embodied Construction Grammar in Simulation-Based Language Understanding.
Bilmes, J. A., Vahdat A., Hsu W., & Im E-J. (1997).  Empirical Observations of Probabilistic Heuristics for the Clustering Problem.
Hasan, S., Ben-David Y., Scott C., Brewer E., & Shenker S. J. (2012).  Enabling Rural Connectivity with SDN.
Hasan, S., Ben-David Y., Scott C., Brewer E., & Shenker S. J. (2012).  Enabling Rural Connectivity with SDN.
Bretones, C., Cristóbal M., & Ibarretxe-Antuñano I. (2001).  Exiting Events in Spanish: Boundary I-Schema and Move X-Schema.
Banerjea, A., Knightly E. W., Templin F. L., & Zhang H. (1994).  Experiments with the Tenet Real-Time Protocol Suite on the Sequoia 2000 Wide Area Network.

Pages