Publications

Found 305 results
Author Title [ Type(Asc)] Year
Filters: First Letter Of Title is A  [Clear All Filters]
Magazine Article
Metere, A. (2019).  AI will never conquer humanity. It’s too rational. Cosmos Magazine.
Journal Article
Zarchy, D., Mittal R., Schapira M., & Shenker S. (2019).   Axiomatizing Congestion Control. Proceedings of the ACM on Measurement and Analysis of Computing Systems. 3(2), 
Ajwani, D.., & Friedrich T. (2010).  Average-Case Analysis of Incremental Topological Ordering. Discrete Applied Mathematics. 158(4), 240-250.
Moulin, H., & Shenker S. (1994).  Average Cost Pricing Versus Serial Cost Sharing: An Axiomatic Comparison. Journal of Economic Theory. 64(1), 178-201.
Karp, R. M., Kan A.. H. G. Rinn, & Vohra R.. V. (1994).  Average case analysis of a heuristic for the assignment problem. Mathematics of Operations Research. 19(3), 513-522.
Azadi, S., Feng J., Jegelka S., & Darrell T. (2015).  Auxiliary Image Regularization for Deep CNNs with Noisy Labels. CoRR. abs/1511.07069,
Satzger, B., Pietzowski A., & Ungerer T. (2011).  Autonomous and Scalable Failure Detection in Distributed Systems. International Journal of Autonomous and Adaptive Communications Systems. 4(1), 61-77.
Holmberg, M., Gelbart D., & Hemmert W. (2006).  Automatic Speech Recognition with an Adaptation Model Motivated by Auditory Processing. IEEE Transactions on Speech and Audio Processing. 14(1), 44-49.
Gildea, D., & Jurafsky D. (2002).  Automatic Labeling of Semantic Roles. Computational Linguistics. 28(3), 245-288.
Gramm, J., Guo J., Hüffner F., & Niedermeier R. (2004).  Automated Generation of Search Tree Algorithms for Hard Graph-Modification Problems. Algorithmica. 39(4), 321-347.
Lee, K., & Ellis D. P. W. (2010).  Audio-Based Semantic Concept Classification for Consumer Video. IEEE Transactions on Audio. 18(6), 1406-1416.
Chun, B-G., Maniatis P., Shenker S., & Kubiatowicz J. D. (2007).  Attested Append-Only Memory: Making Adversaries Stick to their Word. ACM SIGOPS Operating Systems Review. 41(6), 189-204.
Regier, T., & Zheng M. (2007).  Attention to Endpoints: A Cross-Linguistic Constraint on Spatial Meaning. Cognitive Science. 31(4), 705-719.
Chuzhoy, J., Guha S., Halperin E., Khanna S., Kortsarz G., Krauthgamer R., et al. (2005).  Asymmetric K-Center Is Log* N-Hard to Approximate. Journal of the ACM. 52(4), 538-551.
Friedman, E. (2012).  Asymmetric Cost Sharing Mechanisms. Games and Economic Behavior. 75(1), 139-151.
Kimmel, G., Karp R. M., Jordan M.. A., & Halperin E. (2008).  Association Mapping and Significance Estimation via the Coalescent. Journal of Human Genetics. 83(6), 675-683.
Paxson, V., Mahdavi J., Adams A. K., & Mathis M. (1998).  An Architecture for Large-Scale Internet Measurement. IEEE Communications. 36(8), 48-54.
Sommer, R., Weaver N., & Paxson V. (2009).  An Architecture for Exploiting Multi-Core Processors to Parallelize Network Intrusion Prevention. Concurrency and Computation: Practice and Experience. 21(10), 1255-1279.
Jiang, X., Taneja J., Ortiz J., Tavakoli A., Dutta P., Jeong J., et al. (2007).  An Architecture for Energy Management in Wireless Sensor Networks. 4(3), 31-36.
Regier, T., & M. Khalidi A. (2009).  The Arab Street: Tracking a Political Metaphor. 63(1), 11-29.
Feigenbaum, J., Archer A.., Krishnamurthy A., Sami R., & Shenker S. (2004).  Approximation and Collusion in Multicast Cost Sharing. Games and Economic Behavior. 47(1), 36-71.
Bringmann, K., & Friedrich T. (2010).  Approximating the Volume of Unions and Intersections of High-Dimensional Geometric Objects. Computational Geometry. 43(6-7), 601-610.
Friedrich, T., He J., Hebbinghaus N., Neumann F., & Witt C. (2010).  Approximating Covering Problems by Randomized Search Heuristics using Multi-Objective Models. Evolutionary Computation. 18(4), 617-633.

Pages