Publications

Found 4079 results
Author Title [ Type(Desc)] Year
Technical Report
Blum, M. E., Luby M., & Rubinfeld R. (1990).  Self-Testing/Correcting with Applications to Numerical Problems.
Blum, M. E., Luby M., & Rubinfeld R. (1991).  Self-Testing/Correcting with Applications to Numerical Problems (Revised Version).
Lickteig, T. Michael (1990).  On Semi-Algebraic Decision Complexity.
Kääriäinen, M. (2005).  Semi-Supervised Model Selection Based on Cross-Validation.
Bernasconi, A., & Codenotti B. (1993).  Sensitivity of Boolean Functions, Harmonic Analysis, and Circuit Complexity.
Cáceres, R. (1989).  Separating Abstraction from Implementation in Communication Network Design.
Xin, R., Rosen J., Zaharia M., Franklin M. J., Shenker S., & Stoica I. (2012).  Shark: SQL and Rich Analytics at Scale.
Grigoriev, D. Yu., Karpinski M., & Odlyzko A. M. (1991).  Short Proofs for Nondivisibility of Sparse Polynomials under the Extended Riemann Hypothesis.
Rodriguez, N.., & Ierusalimschy R. (1994).  Side Effect Free Functions in Object-Oriented Languages.
M. Shokrollahi, A., & Stemann V. (1996).  A Simple Approximation Algorithm in Z[e^{2?i/8}].
Pan, V. (1993).  Simple Multivariate Polynomial Multiplication.
Baraldi, A., & Alpaydin E. (1998).  Simplified ART: A New Class of ART Algorithms.
Ee, C. Tien, Lee J., Maltz D., Shenker S., & Subramanian L. (2007).  Simplifying Access Control in Enterprise Networks.
Goldmann, M., & Karpinski M. (1992).  Simulating Threshold Circuits by Majority Circuits.
Goldmann, M., & Karpinski M. (1994).  Simulating Threshold Circuits by Majority Circuits (Extended Version).
Genoud, D., Ellis D. P. W., & Morgan N. (1999).  Simultaneous Speech and Speaker Recognition Using Hybrid Architecture.
Oropesa, E., Cycon H. L., & Jobert M. (1999).  Sleep Stage Classification using Wavelet Transform and Neural Network.
Kannan, J., Yang B., Shenker S., Sharma P., Banerjee S., Basu S., et al. (2005).  Smartseer: Continuous Queries over Citeseer.
Knightly, E. W., & Rossaro P. (1995).  Smoothing and Multiplexing Tradeoffs for Deterministic Performance Guarantees to VBR Video.
Liver, B., & Altmann J. (1997).  Social Carrier Recommendation for Selecting Services in Electronic Telecommunication Markets: A Preliminary Report.
Baraldi, A., & Schenato L.. (1999).  Soft-to-Hard Model Transition in Clustering: A Review.
Goldreich, O., & Ostrovsky R. (1993).  Software Protection and Simulation on Oblivious RAMs.
Blum, M. E., & Wasserman H. (1994).  Software Reliability via Run-Time Result-Checking.
van Huu, L. (1993).  A Software Reuse System for C Codes.
Bürgisser, P., Karpinski M., & Lickteig T. Michael (1991).  Some Computational Problems in Linear Algebra as Hard as Matrix Multiplication.

Pages