Publications

Found 321 results
[ Author(Asc)] Title Type Year
Filters: First Letter Of Last Name is B  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
B
Brockhoff, D.., Friedrich T., Hebbinghaus N., Klein C.., Neumann F., & Zitzler E.. (2009).  On the Effects of Adding Objectives to Plateau Functions. IEEE Transactions on Evolutionary Computation. 13(3), 591-603.
Bringmann, K., & Friedrich T. (2009).  Approximating the Least Hypervolume Contributor : NP-Hard in General, but Fast in Practice. 6-20.
Bringmann, K., & Friedrich T. (2010).  Approximating the Volume of Unions and Intersections of High-Dimensional Geometric Objects. Computational Geometry. 43(6-7), 601-610.
Bringmann, K., & Friedrich T. (2008).  Approximating the Volume of Unions and Intersections of High-Dimensional Geometric Objects. 436-447.
Bringmann, K., & Friedrich T. (2009).  Don’t Be Greedy When Calculating Hypervolume Contributions.. 103-112.
Brewka, G. (1992).  An Abductive Framework for Generalized Logic Programs: Preliminary Report.
Brewka, G., Guesgen H. Werner, & Hertzberg J. (1992).  Constraint Relaxation and Nonmonotonic Reasoning.
Brewka, G. (1992).  A Framework for Cumulative Default Logics.
Brewer, E., Demmer M., Ho M., Honicky R.. J., Pal J., Plauché M., et al. (2006).  The challenges of IT research in developing regions. IEEE Pervasive Computing. 5(2), 15-23.
Breuer, P.. T., A. Lopez M., & A. Ares G. (2000).  The Network Block Device. Linux Journal.
Bretones, C. (2001).  Synaesthetic Metaphors in English.
Bretones, C., Cristóbal M., & Ibarretxe-Antuñano I. (2001).  Exiting Events in Spanish: Boundary I-Schema and Move X-Schema.
Breslau, L., Knightly E. W., Shenker S., Stoica I., & Zhang H. (2000).  Endpoint Admission Control: Architectural Issues and Performance. Proceedings of the ACM SIGCOMM Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication.
Breslau, L. (1999).  Advances in Network Simulation.
Breslau, L., Jamin S., & Shenker S. (2000).  Comments on the Performance of Measurement-Based Admission Control Algorithms.
Breslau, L. (2000).  Advances in Network Simulation. IEEE Computer. 59-67.
Breslau, L., Jamin S., & Shenker S. (2000).  Comments on the Performance of Measurement-Based Admission Control Algorithms. Proceedings of the Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM 2000). 3, 1233-1242.
Breslau, L., Cao P., Fan L., Phillips G., & Shenker S. (1999).  Web Caching and Zipf-Like Distributions: Evidence and Implications. Proceedings of the Eighteenth Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM '99). 1, 126-134.
Breslau, L., & Shenker S. (1998).  Best-Effort versus Reservations: A Simple Comparative Analysis. ACM Computer Communication Review. 28, 3-16.
Bregler, C., & Konig Y. (1994).  "Eigenlips" for Robust Speech Recognition.
Bregler, C., & Omohundro S. (1994).  Surface Learning with Applications to Lip-Reading.
Bregler, C., Omohundro S., Covell M., Slaney M., Ahmad S., Forsyth D.., et al. (1998).  Probabilistic Models of Verbal and Body Gestures.
Bradonjic, M.., Elsässer R., Friedrich T., Sauerwald T., & Stauffer A. (2010).  Efficient Broadcast on Random Geometric Graphs. 1412-1421.
Bradner, S.., & Paxson V. (2000).  IANA Allocation Guidelines For Values In the Internet Protocol and Related Headers.
Braden, R., Clark D. D., Crowcroft J., Davie B., Deering S., Estrin D., et al. (1998).  Recommendations on Queue Management and Congestion Avoidance in the Internet.

Pages