Publications

Found 1886 results
Author Title [ Type(Desc)] Year
Filters: First Letter Of Last Name is S  [Clear All Filters]
Technical Report
Schuett, D.., Eckhardt U.., & Suda P.. (1992).  Boot Algebras.
Schindelhauer, C. (2000).  Broadcasting Time Cannot be Approximated Within a Factor of 57/56-epsilon.
Szyperski, C., & Ventre G. (1993).  A Characterization of Multi-Party Interactive Multimedia Applications.
Radoslavov, P., Tangmunarunkit H., Yu H., Govindan R., Shenker S. J., & Estrin D. (2000).  On Characterizing Network Topologies and Analyzing Their Impact on Protocol Design.
Schmidt, H. W., & Omohundro S. (1991).  CLOS, Eiffel, and Sather: A Comparison.
Asanović, K., Beck J., Callahan T. J., Feldman J., Irissou B., Kingsbury B., et al. (1993).  CNS-1 Architecture Specification: A Connectionist Network Supercomputer.
Seredynski, F. (1996).  Coevolutionary Game-Theoretic Multi-Agent Systems: the Application to Mapping and Scheduling Problems.
Blum, L., Cucker F., Shub M., & Smale S. (1995).  Complexity and Real Computation: A Manifesto.
Blum, L., Cucker F., Shub M., & Smale S. (1995).  Complexity and Real Computation: A Manifesto.
Santos, E. E. (1994).  Complexity Issues for Solving Triangular Linear Systems in Parallel.
M. Shokrollahi, A. (1996).  Computation of Irregular Primes up to Eight Million (Preliminary Report).
Grigoriev, D. Yu., Karpinski M., & Singer M. F. (1991).  Computational Complexity of Sparse Rational Interpolation.
Omrani, A.., & M. Shokrollahi A. (1996).  Computing Irreducible Representations of Supersolvable Groups over Small Finite Fields.
Shastri, L., Grannes D. Jeffrey, Narayanan S., & Feldman J. (2002).  A Connectionist Encoding of Parameterized Schemas and Reactive Plans.
Shastri, L., Grannes D. Jeffrey, Narayanan S., & Feldman J. (2002).  A Connectionist Encoding of Parameterized Schemas and Reactive Plans.
Stolcke, A. (1989).  A Connectionist Model of Unification.
Kannan, J. Kumar, Caesar M., Stoica I., & Shenker S. J. (2007).  On the Consistency of DHT-Based Routing.
Kannan, J. Kumar, Caesar M., Stoica I., & Shenker S. J. (2007).  On the Consistency of DHT-Based Routing.
Scheler, G. (1997).  Constructing Semantic Representations Using the MDL Principle.
Pietracaprina, A., Pucci G., & Sibeyn J. Frederik (1993).  Constructive Deterministic PRAM Simulation on a Mesh-Connected Computer.
Janin, A., Friedland G., & Sommer R. (2012).  Content?based Privacy for Consumer?Produced Multimedia.
Günes, M., & Siekermann J. (2005).  CosMos - Communication Scenario and Mobility Scenario Generator.
Gathen, J. von zur, Karpinski M., & Shparlinski I. (1994).  Counting Curves and Their Projections.
Choi, J., Akkus I. Ekin, Egelman S., Friedland G., Sommer R., Tschantz M. Carl, et al. (2018).  Cybercasing 2.0: You Get What You Pay For.
Friedland, G., & Sommer R. (2010).  Cybercasing the Joint: On the Privacy Implications of Geo-Tagging.

Pages