Publications

Found 195 results
Author [ Title(Desc)] Type Year
Filters: First Letter Of Last Name is N  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
P
Gramm, J., Nierhoff T., & Tantau T. (2004).  Perfect Path Phylogeny Haplotyping with Missing Data is Fixed-Parameter Tractable. Proceedings of the First International Workshop on Parameterized and Exact Computation (IWPEC 2004).
Naor, M., Ostrovsky R., Venkatesan R., & Yung M. (1992).  Perfect Zero-Knowledge Arguments for NP Can Be Based on General Complexity Assumptions.
Alizadeh, F., Karp R. M., Newberg L. A., & Weisser D. K. (1993).  Physical Mapping of Chromosomes: A Combinatorial Problem in Molecular Biology.
Choi, J., Thomee B., Friedland G., Cao L., Ni K., Borth D., et al. (2014).  The Placing Task: A Large-Scale Geo-Estimation Challenge for Social-Media Videos and Images. 27-31.
Friedrich, T., Hebbinghaus N., & Neumann F. (2010).  Plateaus Can Be Harder in Multi-Objective Optimization. Theoretical Computer Science. 411(6), 854-864.
Seehra, A.., Naous J.., Walfish M., Mazieres D.., Nicolosi A.., & Shenker S. (2009).  A Policy Framework for the Future Internet. 1-6.
Seehra, A.., Naous J.., Walfish M., Mazieres D.., Nicolosi A.., & Shenker S. (2009).  A Policy Framework for the Future Internet. 1-6.
Skibola, C. F., Bracci P. M., Halperin E., Nieters A., Hubbard A., Paynter R. A., et al. (2008).  Polymorphisms in the Estrogen Receptor 1 and Vitamin C and Matrix Metalloproteinase Gene Families Are Associated with Susceptibility to Lymphoma. PLoS ONE. 3(7), 
Yosef, N.., Gramm J., Wang Q.-F.., Noble W.. S., Karp R. M., & Sharan R. (2010).  Prediction of Phenotype Information from Genotype Data. Communications in Information and Systems. 10(2), 99-114.
Nechaev, B., Allman M., Paxson V., & Gurtov A. (2010).  A Preliminary Analysis of TCP Performance in an Enterprise Network.
Frik, A., Nurgalieva L., Bernd J., Lee J. S., Schaub F., & Egelman S. (2019).  Privacy and Security Threat Models and Mitigation Strategies of Older Adults. Proceedings of the 15th Symposium on Usable Privacy and Security (SOUPS '19).
Frik, A., Nurgalieva L., Bernd J., Lee J. S., & Schaub F. (2019).  Privacy and Security Threat Models and Mitigation Strategies of Older Adults. Proceedings of SOUPS '19.
Karp, R. M., Motwani R., & Nisan N. (1993).  Probabilistic analysis of network flow algorithms. Mathematics of Operations Research. 18(1), 71-97.
Nishimura, J., & Friedman E. (2012).  Probabilistic Convergence Guarantees for Type-II Pulse-Coupled Oscillators. Physical Review E. 86,
Nieuwenhuis, C., Strekalovskiy E., & Cremers D. (2013).  Proportion Priors for Image Sequence Segmentation.
Bergbauer, J., Nieuwenhuis C., Souiai M., & Cremers D. (2013).  Proximity Priors for Variational Semantic Segmentation and Recognition.
Narayanan, S., Petruck M. R. L., Baker C. F., & Fillmore C. J. (2003).  Putting FrameNet Data into the ISO Linguistic Annotation FrameWork. Proceedings of the ACL 2003 Workshop on Linguistic Annotation: Getting the Model Right.
Chang, N., Narayanan S., & Petruck M. R. L. (2002).  Putting Frames in Perspective. Proceedings COLING 2002.

Pages