Publications

Export 353 results:
[ Author(Desc)] Title Type Year
Filters: First Letter Of Last Name is G  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
G
Gasarch W, Golub E, Srinivasan A.  2003.  When does a random Robin Hood win? Theoretical Computer Science. 304(1–3):477-484.
Gaston ME, desJardins M.  2005.  Agent-organized networks for multi-agent production and exchange. Proceedings of the 20th national conference on Artificial intelligence - Volume 1. :77-82.
Gaston ME, desJardins M.  2008.  THE EFFECT OF NETWORK STRUCTURE ON DYNAMIC TEAM FORMATION IN MULTI‐AGENT SYSTEMS. Computational Intelligence. 24(2):122-157.
Gaston ME, desJardins M.  2005.  Agent-organized networks for dynamic team formation. Proceedings of the fourth international joint conference on Autonomous agents and multiagent systems. :230-237.
Gaston M, desJardins M.  2003.  Team formation in complex networks. Proceedings of the 1st NAACSOS Conference.
Gaston M, Simmons J, desJardins M.  2004.  Adapting network structure for efficient team formation. Proceedings of the AAAI 2004 Fall Symposium on Artificial Multi-agent Learning.
Ge QJ, Varshney A, Menon JP, Chang CF.  1998.  Double quaternions for motion interpolation. Proceedings of the ASME Design Engineering Technical Conference.
Ge LN, He ZH, Zhuolin Jiang.  2009.  Encryption Algorithm Based on Circle Property. Jisuanji Gongcheng/ Computer Engineering. 35(4):180-182.
Gebremichael M, Hicks MW.  2003.  Implementing On-line Software Upgrades in Java.
Gehl J, Shneiderman B.  2000.  Credit for computer crashes? Ubiquity. 1(31):2-9.
Geisbrecht BV, Bouyain S, Pop M.  2006.  An optimized system for expression and purification of secreted bacterial proteins. Protein Expression and Purification. 46(1):23-32.
Gennaro R, Katz J, Krawczyk H, Rabin T.  2010.  Secure network coding over the integers. Public Key Cryptography–PKC 2010. :142-160.
Gennaro R, Gertner Y, Katz J.  2003.  Lower bounds on the efficiency of encryption and digital signature schemes. Proceedings of the thirty-fifth annual ACM symposium on Theory of computing. :417-425.
Gennaro R, Gertner Y, Katz J.  2002.  Bounds on the efficiency of encryption and digital signatures. 2002-22
Gennaro R, Gertner Y, Katz J, Trevisan L.  2005.  Bounds on the efficiency of generic cryptographic constructions. SIAM Journal on Computing. 35(1):217-217.
Gerber R, Pugh W, Saksena M.  1995.  Parametric dispatching of hard real-time tasks. IEEE Transactions on ComputersIEEE Trans. Comput.. 44(3):471-479.
Gerdes JW, Gupta SK, Wilkerson SA.  2010.  A Review of Bird-Inspired Flapping Wing Miniature Air Vehicle Designs. 2:57-67.
Gerevini A, Kuter U, Nau DS, Saetti A, Waisbrot N.  2008.  Combining Domain-Independent Planning and HTN Planning: The Duet Planner. :573-577.
Gershon N, Card SK, Roth SF, Shneiderman B.  1994.  Visualization in the information highway. Proceedings of the conference on Visualization '94. :4-7.
Gershon AL, Gyger LS, Bruck HA, Gupta SK.  2009.  In Situ Characterization and Modeling of Strains near Embedded Electronic Components During Processing and Break-in for Multifunctional Polymer Structures. Advances in Mathematical Modeling and Experimental Methods for Materials and Structures. 168:145-159.
Getoor L, Rhee JT, Koller D, Small P.  2004.  Understanding tuberculosis epidemiology using structured statistical models. Artificial Intelligence in Medicine. 30(3):233-256.
Getoor L, Friedman N, Koller D.  2002.  Learning structured statistical models from relational data. Linköping Electronic Articles in Computer and Information Science. 7:13-13.
Getoor L, Mihalkova L.  2011.  Exploiting statistical and relational information on the web and in social media. Proceedings of the fourth ACM international conference on Web search and data mining. :9-10.
Getoor L, Diehl CP.  2005.  Introduction to the special issue on link mining. ACM SIGKDD Explorations Newsletter. 7(2):1-2.
Getoor L, Segal E, Taskar B, Koller D.  2001.  Probabilistic models of text and link structure for hypertext classification. IJCAI workshop on text learning: beyond supervision. :24-29.

Pages