Publications

Found 321 results
[ Author(Asc)] Title Type Year
Filters: First Letter Of Last Name is B  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
B
Brockhoff, D.., Friedrich T., Hebbinghaus N., Klein C.., Neumann F., & Zitzler E.. (2009).  On the Effects of Adding Objectives to Plateau Functions. IEEE Transactions on Evolutionary Computation. 13(3), 591-603.
Bringmann, K., & Friedrich T. (2008).  Approximating the Volume of Unions and Intersections of High-Dimensional Geometric Objects. 436-447.
Bringmann, K., & Friedrich T. (2009).  Don’t Be Greedy When Calculating Hypervolume Contributions.. 103-112.
Bringmann, K., & Friedrich T. (2009).  Approximating the Least Hypervolume Contributor : NP-Hard in General, but Fast in Practice. 6-20.
Bringmann, K., & Friedrich T. (2010).  Approximating the Volume of Unions and Intersections of High-Dimensional Geometric Objects. Computational Geometry. 43(6-7), 601-610.
Brewka, G., Guesgen H. Werner, & Hertzberg J. (1992).  Constraint Relaxation and Nonmonotonic Reasoning.
Brewka, G. (1992).  A Framework for Cumulative Default Logics.
Brewka, G. (1992).  An Abductive Framework for Generalized Logic Programs: Preliminary Report.
Brewer, E., Demmer M., Ho M., Honicky R.. J., Pal J., Plauché M., et al. (2006).  The challenges of IT research in developing regions. IEEE Pervasive Computing. 5(2), 15-23.
Breuer, P.. T., A. Lopez M., & A. Ares G. (2000).  The Network Block Device. Linux Journal.
Bretones, C., Cristóbal M., & Ibarretxe-Antuñano I. (2001).  Exiting Events in Spanish: Boundary I-Schema and Move X-Schema.
Bretones, C. (2001).  Synaesthetic Metaphors in English.
Breslau, L., Cao P., Fan L., Phillips G., & Shenker S. (1999).  Web Caching and Zipf-Like Distributions: Evidence and Implications. Proceedings of the Eighteenth Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM '99). 1, 126-134.
Breslau, L., & Shenker S. (1998).  Best-Effort versus Reservations: A Simple Comparative Analysis. ACM Computer Communication Review. 28, 3-16.
Breslau, L., Jamin S., & Shenker S. (2000).  Comments on the Performance of Measurement-Based Admission Control Algorithms. Proceedings of the Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM 2000). 3, 1233-1242.
Breslau, L., Knightly E. W., Shenker S., Stoica I., & Zhang H. (2000).  Endpoint Admission Control: Architectural Issues and Performance. Proceedings of the ACM SIGCOMM Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication.
Breslau, L. (1999).  Advances in Network Simulation.
Breslau, L., Jamin S., & Shenker S. (2000).  Comments on the Performance of Measurement-Based Admission Control Algorithms.
Breslau, L. (2000).  Advances in Network Simulation. IEEE Computer. 59-67.
Bregler, C., Omohundro S., Covell M., Slaney M., Ahmad S., Forsyth D.., et al. (1998).  Probabilistic Models of Verbal and Body Gestures.
Bregler, C., & Konig Y. (1994).  "Eigenlips" for Robust Speech Recognition.
Bregler, C., & Omohundro S. (1994).  Surface Learning with Applications to Lip-Reading.
Bradonjic, M.., Elsässer R., Friedrich T., Sauerwald T., & Stauffer A. (2010).  Efficient Broadcast on Random Geometric Graphs. 1412-1421.
Bradner, S.., & Paxson V. (2000).  IANA Allocation Guidelines For Values In the Internet Protocol and Related Headers.
Braden, R., Faber T.., & Handley M. (2002).  From Protocol Stack to Protocol Heap - Role-Based Architecture. Proceedings of the First Workshop on Hot Topics in Networking (HotNets-I).

Pages