Publications

Found 1106 results
Author [ Title(Desc)] Type Year
Filters: First Letter Of Last Name is K  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
A
Grigoriev, D. Yu., & Karpinski M. (1991).  Algorithms for Sparse Rational Interpolation.
Hodgkinson, L., & Karp R. M. (2011).  Algorithms to Detect Multi-Protein Modularity Conserved During Evolution.
Hodgkinson, L., & Karp R. M. (2011).  Algorithms to Detect Multiprotein Modularity Conserved During Evolution.
Hodgkinson, L., & Karp R. M. (2011).  Algorithms to Detect Multiprotein Modularity Conserved During Evolution. IEEE/ACM Transactions on Computational Biology and Bioinformatics.
Yuan, A., Luther K., Krause M., Vennix S. Isabel, Dow S. P., & Hartmann B. (2016).  Almost an expert: The effects of rubrics and expertise on perceived value of crowdsourced design critiques. Proceedings of the 19th ACM Conference on Computer-Supported Cooperative Work & Social Computing. 1005-1017.
Karpinski, M., & Rytter W. (1993).  An Alphabet-Independent Optimal Parallel Search for Three Dimensional Patterns.
Chiang, H-L., Kadur T., & Fettweis G. (2016).  Analyses of orthogonal and non-orthogonal steering vectors at millimeter wave systems. 2016 IEEE 17th International Symposium on A World of Wireless, Mobile and Multimedia Networks (WoWMoM). 1-6.
Demers, A. J., Keshav S., & Shenker S. (1990).  Analysis and Simulation of a Fair Queuing Algorithm. Journal of Internetworking: Research and Experience. 1(1), 3-26.
Demers, A. J., Keshav S., & Shenker S. (1989).  Analysis and Simulation of a Fair Queuing Algorithm. Proceedings of the 1989 SIGCOMM Symposium on Communications Architectures & Protocols. 1-12.
Ikram, M., Vallina-Rodriguez N., Seneviratne S., Kaafar M. Ali, & Paxson V. (2016).  An Analysis of the Privacy and Security Risks of Android VPN Permission-enabled Apps. Proceedings of ACM Internet Measurement Conference.
Eklund, R., Bates R., Kuyper C., Willingham E., & Shriberg E. (2006).  The Annotation and Analysis of Importance in Meetings.
Kushilevitz, E., Micali S., & Ostrovsky R. (1993).  Any Non-Private Boolean Function Is Complete For Private Multi-Party Computations.
Karayev, S., Fritz M., & Darrell T. (2014).  Anytime Recognition of Objects and Scenes.
Kaiser, M. (1993).  An Application of a Neural Net for Fuzzy Abductive Reasoning.
Ratnasamy, S., Handley M., Karp R. M., & Shenker S. (2001).  Application-Level Multicast Using Content-Addressable Networks. 2233, 14-29.
Tavakoli, A., Casado M., Koponen T., & Shenker S. (2009).  Applying NOX to the Datacenter.
Berman, P., Fößmeier U., Karpinski M., Kaufmann M., & Zelikovsky A. (1994).  Approaching the 5/4-Approximation for Rectilinear Steiner Trees.
Berman, P., Fößmeier U., Karpinski M., Kaufmann M., & Zelikovsky A. (1994).  Approaching the 5/4-Approximation for Rectilinear Steiner Trees.
Karpinski, M., & Zelikovsky A. (1996).  Approximating Dense Cases of Covering Problems.
Karpinski, M., & Luby M. (1990).  Approximating the Number of Solutions of a GF[2] Polynomial.
Karpinski, M., Wirtgen J., & Zelikovsky A. (1997).  An Approximation Algorithm for the Bandwidth Problem on Dense Graphs.
Grigoriev, D. Yu., & Karpinski M. (1991).  An Approximation Algorithm for the Number of Zeros of Arbitrary Polynomials over GF[q].
Krick, C., Räcke H., & Westermann M. (2001).  Approximation Algorithms for Data Management in Networks. Proceedings of the Thirteenth ACM Symposium on Parallel Algorithms and Architectures (SPAA). 237-246.
Krick, C., Räcke H., & Westermann M. (2001).  Approximation Algorithms for Data Management in Networks.
Feigenbaum, J., Krishnamurthy A., Sami R., & Shenker S. (2001).  Approximation and Collusion in Multicast Cost Sharing. Proceedings of the Third ACM Conference on Electronic Commerce (ACM-EE 2001). 253-255.

Pages