Found 304 results
Author Title [ Type(Desc)] Year
Filters: First Letter Of Title is A  [Clear All Filters]
Technical Report
Liebeherr, J., Wrege D. E., & Ferrari D. (1994).  Admission Control in Networks with Bounded Delay Services.
Renals, S., Morgan N., Bourlard H., Cohen M., Franco H., Wooters C., et al. (1991).  Advances in Connectionist Speech Recognition.
Breslau, L. (1999).  Advances in Network Simulation.
Shastri, L. (1998).  Advances in SHRUTI: A neurally motivated model of relational knowledge representation and rapid inference using temporal synchrony..
Eddy, W. M., & Allman M. (2000).  Advantages of Parallel Processing and the Effects of Communications Time.
Guesgen, H. Werner, & Ladkin P. (1990).  An Algebraic Approach to General Boolean Constraint Problems.
Blum, L., Cucker F., Shub M., & Smale S. (1996).  Algebraic Settings for the Problem.
Feldman, J., & Rovner P. D. (1968).  An ALGOL-based Associative Language.
Bshouty, N. H., Hancock T. R., Hellerstein L., & Karpinski M. (1993).  An Algorithm to Learn Read-Once Threshold Formulas, and Some Generic Transformations Between Learning Models (Revised Version).
Grigoriev, D. Yu., & Karpinski M. (1991).  Algorithms for Sparse Rational Interpolation.
Hodgkinson, L., & Karp R. M. (2011).  Algorithms to Detect Multi-Protein Modularity Conserved During Evolution.
Müller, S. M. (1993).  All-to-All Broadcast on the CNS-1.
Karpinski, M., & Rytter W. (1993).  An Alphabet-Independent Optimal Parallel Search for Three Dimensional Patterns.
Richter, D. (1992).  Ambiguities in Object Specifications in View of Data Testing.
Nakamura, T., & Berlekamp E. (2002).  Analysis of Composite Corridors.
Luby, M., Mitzenmacher M., M. Shokrollahi A., & Spielman D. A. (1997).  Analysis of Low Density Codes and Improved Designs Using Irregular Graphs.
Luby, M., Mitzenmacher M., & M. Shokrollahi A. (1997).  Analysis of Random Processes via And-Or Tree Evaluation.
Stoutamire, D., Zimmermann W., & Trapp M. (1996).  An Analysis of the Divergence of Two Sather Dialects.
Govindan, R., & Radoslavov P. (2002).  An Analysis of The Internal Structure of Large Autonomous Systems.
Eklund, R., Bates R., Kuyper C., Willingham E., & Shriberg E. (2006).  The Annotation and Analysis of Importance in Meetings.
Kushilevitz, E., Micali S., & Ostrovsky R. (1993).  Any Non-Private Boolean Function Is Complete For Private Multi-Party Computations.
Kaiser, M. (1993).  An Application of a Neural Net for Fuzzy Abductive Reasoning.
Haban, D., & Shin K. G. (1989).  Application of Real-Time Monitoring to Scheduling Tasks with Random.
Hirsch, M. D. (1990).  Applications of Topology to Lower Bound Estimates in Computer Science.
Ma, K. W. (1995).  Applying Large Vocabulary Hybrid HMM-MLP Methods to Telephone Recognition of Digits and Natural Numbers.