Publications

Found 4258 results
Author Title [ Type(Asc)] Year
Technical Report
Chasins, S., Cheung A., Crooks N., Ghodsi A., Goldberg K., Gonzalez J. E., et al. (2022).  The Sky Above the Clouds: A Berkeley View on the Future of Cloud Computing. arxiv.org.
Genoud, D., Ellis D. P. W., & Morgan N. (1999).  Simultaneous Speech and Speaker Recognition Using Hybrid Architecture.
Goldmann, M., & Karpinski M. (1994).  Simulating Threshold Circuits by Majority Circuits (Extended Version).
Goldmann, M., & Karpinski M. (1992).  Simulating Threshold Circuits by Majority Circuits.
Ee, C. Tien, Lee J., Maltz D., Shenker S. J., & Subramanian L. (2007).  Simplifying Access Control in Enterprise Networks.
Baraldi, A., & Alpaydin E. (1998).  Simplified ART: A New Class of ART Algorithms.
Pan, V. (1993).  Simple Multivariate Polynomial Multiplication.
M. Shokrollahi, A., & Stemann V. (1996).  A Simple Approximation Algorithm in Z[e^{2?i/8}].
Rodriguez, N.., & Ierusalimschy R. (1994).  Side Effect Free Functions in Object-Oriented Languages.
Grigoriev, D. Yu., Karpinski M., & Odlyzko A. M. (1991).  Short Proofs for Nondivisibility of Sparse Polynomials under the Extended Riemann Hypothesis.
Xin, R., Rosen J., Zaharia M., Franklin M. J., Shenker S. J., & Stoica I. (2012).  Shark: SQL and Rich Analytics at Scale.
Cáceres, R. (1989).  Separating Abstraction from Implementation in Communication Network Design.
Bernasconi, A., & Codenotti B. (1993).  Sensitivity of Boolean Functions, Harmonic Analysis, and Circuit Complexity.
Kääriäinen, M. (2005).  Semi-Supervised Model Selection Based on Cross-Validation.
Lickteig, T. Michael (1990).  On Semi-Algebraic Decision Complexity.
Blum, M. E., Luby M., & Rubinfeld R. (1991).  Self-Testing/Correcting with Applications to Numerical Problems (Revised Version).
Blum, M. E., Luby M., & Rubinfeld R. (1990).  Self-Testing/Correcting with Applications to Numerical Problems.
Unger, H. (1998).  A Security Mechanism for the Resource Management in a Web Operating System.
Oppliger, R., Gupta A., Moran M., & Bettati R. (1995).  A Security Architecture for Tenet Scheme 2.
Rojas, R. (1993).  Second Order Backpropagation - Efficient Computation of the Hessian Matrix for Neural Networks.
Beamer, S., Asanović K., & Patterson D. (2011).  Searching for a Parent Instead of Fighting Over Children: A Fast Breadth-First Search Implementation for Graph500.
Ferrari, D., & Verma D. C. (1989).  A Scheme for Real-Time Channel Establishment in Wide-Area Networks.
Freksa, C., Moratz R., & Barkowsky T. (1999).  Schematic Maps for Robot Navigation.
Li, M. (2003).  SchemaDB - An Extensible Schema Database System Using ECG Representation.
Schmidt, G. (1998).  Scheduling with Limited Machine Availability.

Pages