Publications

Found 593 results
Author Title [ Type(Desc)] Year
Filters: First Letter Of Last Name is L  [Clear All Filters]
Technical Report
Albanese, A., Blömer J., Edmonds J., & Luby M. (1994).  Priority Encoding Transmission.
Ladkin, P., & Vogt F. (1990).  Proceedings of the Berkeley Workshop on Temporal and Real-Time Specification, August 9-10, 1990.
Lowery, C. M. (1991).  Protocols for Providing Performance Guarantees in a Packet Switching Internet.
Feldman, J., Lim C-C., & Murer S. (1993).  pSather: Layered Extensions to an Object-Oriented Language for Efficient Parallel Computation.
Murer, S., Feldman J., Lim C-C., & Seidel M-M. (1993).  pSather: Layered Extensions to an Object-Oriented Language for Efficient Parallel Computation.
Feldman, J., Lim C-C., & Mazzanti F. (1989).  pSather monitors: Design, Tutorial, Rationale and Implementation.
Feldman, J., Lim C-C., & Mazzanti F. (1991).  pSather Monitors: Design, Tutorial, Rationale and Implementation.
Impagliazzo, R., & Luby M. (1989).  Pseudo-Random Number Generator From ANY One-Way Function.
Herzberg, A., & Luby M. (1992).  Public Randomness in Cryptography.
Lischke, G. (1992).  The Quality of Separation Between NP and Exponential Time; Reducing the Cases.
Bürgisser, P., Karpinski M., & Lickteig T. Michael (1992).  On Randomized Algebraic Test Complexity.
Li, H., Ghodsi A., Zaharia M., Shenker S. J., & Stoica I. (2014).  Reliable, Memory Speed Storage for Cluster Computing Frameworks.
Luby, M., Naor J., & Naor M. (1993).  On Removing Randomness from a Parallel Algorithm for Minimum Cuts.
Luby, M. (1989).  Removing Randomness in Parallel Computation Without a Processor Penalty.
Ee, C. Tien, Ramachandran V., Chun B-G., Lakshminarayanan K., & Shenker S. J. (2007).  Resolving Inter-Domain Policy Disputes.
Waterman, A., Lee Y., Patterson D., & Asanović K. (2011).  The RISC-V Instruction Set Manual, Volume I: Base User-Level ISA.
Lakshminarayanan, K., Stoica I., Shenker S. J., & Rexford J. (2006).  Routing as a Service.
Gomes, B., Löwe W., Quittek J. W., & Weissman B. (1997).  Sather 2: A Language Design for Safe, High-Performance Computing.
Omohundro, S., & Lim C-C. (1992).  The Sather Language and Libraries.
Lim, C-C., & Stolcke A. (1991).  Sather Language Design and Performance Evaluation.
Li, M. (2003).  SchemaDB - An Extensible Schema Database System Using ECG Representation.
Blum, M. E., Luby M., & Rubinfeld R. (1990).  Self-Testing/Correcting with Applications to Numerical Problems.
Blum, M. E., Luby M., & Rubinfeld R. (1991).  Self-Testing/Correcting with Applications to Numerical Problems (Revised Version).
Lickteig, T. Michael (1990).  On Semi-Algebraic Decision Complexity.
Ee, C. Tien, Lee J., Maltz D., Shenker S. J., & Subramanian L. (2007).  Simplifying Access Control in Enterprise Networks.

Pages