Publications

Found 242 results
[ Author(Asc)] Title Type Year
Filters: First Letter Of Last Name is G  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
G
Gambosi, G., Protasi M., & Talamo M. (1993).  Dynamic Maintenance of Approximate Solutions of Min-Weighted Node Cover and Min-Weighted Set Cover Problems.
Gallopoulos, E., Drineas P., Ipsen I., & Mahoney M. W. (2016).  RandNLA, Pythons, and the CUR for Your Data Problems: Reporting from G2S3 2015 in Delphi. SIAM News.
Galley, M., & McKeown K. R. (2003).  Improving Word Sense Disambiguation in Lexical Chaining. Proceedings of the 18th International Joint Conference on Artificial Intelligence (IJCAI 03). 1486-1488.
Galley, M., McKeown K. R., Fosler-Lussier E., & Jing H.. (2003).  Discourse Segmentation of Multi-party Conversation. Proceedings of the 41st Annual Meeting of the Association for Computational Linguistics (ACL-03).
Galley, M., McKeown K. R., Hirschberg J., & Shriberg E. (2004).  Identifying Agreement and Disagreement in Conversational Speech: Use of Bayesian Networks to Model Pragmatic Dependencies. Proceedings of the 42nd Meeting of the Association for Computational Linguistics (ACL 04).
Gallardo-Antolin, A.., Anguera X., & Wooters C. (2006).  Multi-Stream Speaker Diarization Systems for the Meetings Domain. Proceedings of the 9th International Conference on Spoken Language Processing (Interspeech 2006 ICSLP). 2186-2189.
Galindo, L.. A., & Ruiz P. M. (2004).  QoS and Micromobility Coupling Integrated with UMTS. Proceedings of the 15th IEEE Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC 2004).
Galera, F.. J., Ruiz P. M., & Gómez-Skarmeta A. (2005).  Security Extensions to MMARP Through Cryptographically Generated Addresses. Lecture Notes on Informatics. P-68,
Gale, D.., & Karp R. M. (1972).  A Phenomenon in the Theory of Sorting. Journal of Computer and System Sciences. 6(2), 103-115.
Gairing, M., Lücking T., Mavronicolas M., & Monien B. (2010).  Computing Nash Equilibria for Scheduling on Restricted Parallel Links. Theory of Computing Systems. 47(2), 405-432.
Gairing, M. (2009).  Covering Games: Approximation Through Non-Cooperation. 184-195.
Gairing, M. (2008).  Malicious Bayesian Congestion Games. 119-132.
Gairing, M., & Schoppmann F.. (2007).  Total Latency in Singleton Congestion Games. Proceedings of the Third International Workshop on Internet and Network Economics (WINE 2007). 381-387.
Gahl, S. (1998).  Automatic extraction of Subcorpora for Corpus-based Dictionary-building. Proceedings of the 8th EURALEX Conference. 445-452.
Gahl, S. (1998).  Automatic Extraction of Subcorpora Based on Subcategorization Frames from a Part-of-Speech Tagged Corpus. Proceedings of Joint Conference of the International Committee on Computational Linguistics and the Association for Computational Linguistics (COLING-ACL 1998). 428-432.
Gaede, V., & Günther O. (1996).  Multidimensional Access Methods.
Gaede, V., & Günther O. (1994).  Processing Joins With User-Defined Functions.

Pages