Publications

Found 4078 results
Author Title [ Type(Desc)] Year
Technical Report
Baraldi, A., & Parmiggiani F. (1998).  SAR Image Segmentation Exploiting No Background Knowledge on Speckled Radiance: A Feasibility Study.
Stoutamire, D., & Omohundro S. (1995).  The Sather 1.0 Specification.
Philippsen, M. (1994).  Sather 1.0 Tutorial.
Stoutamire, D., & Omohundro S. (1996).  The Sather 1.1 Specification.
Gomes, B., Löwe W., Quittek J. W., & Weissman B. (1997).  Sather 2: A Language Design for Safe, High-Performance Computing.
Murer, S., Omohundro S., & Szyperski C. (1993).  Sather Iters: Object-Oriented Iteration Abstraction.
Omohundro, S., & Lim C-C. (1992).  The Sather Language and Libraries.
Lim, C-C., & Stolcke A. (1991).  Sather Language Design and Performance Evaluation.
Ratnasamy, S., Francis P., Handley M., Karp R. M., & Shenker S. (2000).  A Scalable Content Addressable Network.
Gupta, A., Howe W., Moran M., & Nguyen Q. (1994).  Scalable Resource Reservation for Multi-Party Real-Time Communication.
Sharma, P., Estrin D., Floyd S., & Zhang L. (1998).  Scalable Session Messages in SRM.
Batten, C., Krashinsky R., & Asanović K. (2007).  Scale Control Processor Test-chip.
Heffner, W. (1995).  Scaling Issues in the Design and Implementation of the Tenet RCAP2 Signaling Protocol.
Morgan, N., Chen B. Y., Zhu Q., & Stolcke A. (2003).  Scaling Up: Learning Large-Scale Recognition Methods from Small-Scale Recognition Tasks.
Baraldi, A. (1998).  Scatter-Partitioning RBF Network for Function Regression and Image Segmentation: Preliminary Results.
Adler, M., Byers J. W., & Karp R. M. (1995).  Scheduling Parallel Communication: The h-Relation Problem.
Schmidt, G. (1998).  Scheduling with Limited Machine Availability.
Li, M. (2003).  SchemaDB - An Extensible Schema Database System Using ECG Representation.
Freksa, C., Moratz R., & Barkowsky T. (1999).  Schematic Maps for Robot Navigation.
Ferrari, D., & Verma D. C. (1989).  A Scheme for Real-Time Channel Establishment in Wide-Area Networks.
Beamer, S., Asanović K., & Patterson D. (2011).  Searching for a Parent Instead of Fighting Over Children: A Fast Breadth-First Search Implementation for Graph500.
Rojas, R. (1993).  Second Order Backpropagation - Efficient Computation of the Hessian Matrix for Neural Networks.
Oppliger, R., Gupta A., Moran M., & Bettati R. (1995).  A Security Architecture for Tenet Scheme 2.
Unger, H. (1998).  A Security Mechanism for the Resource Management in a Web Operating System.
Blum, M. E., Luby M., & Rubinfeld R. (1990).  Self-Testing/Correcting with Applications to Numerical Problems.

Pages