Publications
Export 326 results:
[ Author] Title Type Year Filters: First Letter Of Last Name is P [Clear All Filters]
1983. Splicing of messenger RNA precursors is inhibited by antisera to small nuclear ribonucleoprotein. Cell. 35(1):101-107.
2006. An architecture for adaptive intrusion-tolerant applications. Software: Practice and Experience. 36(11-12):1331-1354.
2003. Footloose: a case for physical eventual consistency and selective conflict resolution. Mobile Computing Systems and Applications, 2003. Proceedings. Fifth IEEE Workshop on. :170-179.
2005. Evolutionary discovery of arbitrary self-replicating structures. Computational Science–ICCS 2005. :404-411.
1997. Randomized Distributed Edge Coloring via an Extension of the Chernoff--Hoeffding Bounds. SIAM Journal on Computing. 26(2):350-350.
1992. Improved distributed algorithms for coloring and network decomposition problems. Proceedings of the twenty-fourth annual ACM symposium on Theory of computing. :581-592.
1992. Fast randomized algorithms for distributed edge coloring. Proceedings of the eleventh annual ACM symposium on Principles of distributed computing. :251-262.
1995. The local nature of Δ-coloring and its algorithmic applications. Combinatorica. 15(2):255-280.
2012. TACI: Taxonomy-Aware Catalog Integration. IEEE Transactions on Knowledge and Data Engineering (TKDE).
2005. Merging Network Measurement with Data Transport. Passive and Active Network MeasurementPassive and Active Network Measurement. 3431:368-371.
2007. Towards a semantic web system for understanding real world representations. Proceedings of the Tenth International Conference on Computer Graphics and Artificial Intelligence.
2009. Semantic-based segmentation and annotation of 3d models. Image Analysis and Processing–ICIAP 2009. :103-112.
2010. Applications of Parameterized st-Orientations. Journal of Graph Algorithms and Applications. 14(2):337-365.
2008. Algorithms for Location Estimation Based on RSSI Sampling. Algorithmic Aspects of Wireless Sensor Networks. :72-86.
2007. Time and Space Efficient Algorithms for Two-Party Authenticated Data Structures. Information and Communications Security. :1-15.
2005. A parametric visualization software for the assignment problem. Yugoslav Journal of Operations Research. 15(1):147-158.
2004. Computational experience with exterior point algorithms for the transportation problem. Applied Mathematics and Computation. 158(2):459-475.