Publications

Export 353 results:
[ Author(Desc)] Title Type Year
Filters: First Letter Of Last Name is G  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
G
Gasarch W, Golub E, Srinivasan A.  2003.  When does a random Robin Hood win? Theoretical Computer Science. 304(1–3):477-484.
Gaston ME, desJardins M.  2005.  Agent-organized networks for multi-agent production and exchange. Proceedings of the 20th national conference on Artificial intelligence - Volume 1. :77-82.
Gaston ME, desJardins M.  2008.  THE EFFECT OF NETWORK STRUCTURE ON DYNAMIC TEAM FORMATION IN MULTI‐AGENT SYSTEMS. Computational Intelligence. 24(2):122-157.
Gaston ME, desJardins M.  2005.  Agent-organized networks for dynamic team formation. Proceedings of the fourth international joint conference on Autonomous agents and multiagent systems. :230-237.
Gaston M, desJardins M.  2003.  Team formation in complex networks. Proceedings of the 1st NAACSOS Conference.
Gaston M, Simmons J, desJardins M.  2004.  Adapting network structure for efficient team formation. Proceedings of the AAAI 2004 Fall Symposium on Artificial Multi-agent Learning.
Ge LN, He ZH, Zhuolin Jiang.  2009.  Encryption Algorithm Based on Circle Property. Jisuanji Gongcheng/ Computer Engineering. 35(4):180-182.
Ge QJ, Varshney A, Menon JP, Chang CF.  1998.  Double quaternions for motion interpolation. Proceedings of the ASME Design Engineering Technical Conference.
Gebremichael M, Hicks MW.  2003.  Implementing On-line Software Upgrades in Java.
Gehl J, Shneiderman B.  2000.  Credit for computer crashes? Ubiquity. 1(31):2-9.
Geisbrecht BV, Bouyain S, Pop M.  2006.  An optimized system for expression and purification of secreted bacterial proteins. Protein Expression and Purification. 46(1):23-32.
Gennaro R, Katz J, Krawczyk H, Rabin T.  2010.  Secure network coding over the integers. Public Key Cryptography–PKC 2010. :142-160.
Gennaro R, Gertner Y, Katz J.  2003.  Lower bounds on the efficiency of encryption and digital signature schemes. Proceedings of the thirty-fifth annual ACM symposium on Theory of computing. :417-425.
Gennaro R, Gertner Y, Katz J.  2002.  Bounds on the efficiency of encryption and digital signatures. 2002-22
Gennaro R, Gertner Y, Katz J, Trevisan L.  2005.  Bounds on the efficiency of generic cryptographic constructions. SIAM Journal on Computing. 35(1):217-217.
Gerber R, Pugh W, Saksena M.  1995.  Parametric dispatching of hard real-time tasks. IEEE Transactions on ComputersIEEE Trans. Comput.. 44(3):471-479.
Gerdes JW, Gupta SK, Wilkerson SA.  2010.  A Review of Bird-Inspired Flapping Wing Miniature Air Vehicle Designs. 2:57-67.
Gerevini A, Kuter U, Nau DS, Saetti A, Waisbrot N.  2008.  Combining Domain-Independent Planning and HTN Planning: The Duet Planner. :573-577.
Gershon AL, Gyger LS, Bruck HA, Gupta SK.  2009.  In Situ Characterization and Modeling of Strains near Embedded Electronic Components During Processing and Break-in for Multifunctional Polymer Structures. Advances in Mathematical Modeling and Experimental Methods for Materials and Structures. 168:145-159.
Gershon N, Card SK, Roth SF, Shneiderman B.  1994.  Visualization in the information highway. Proceedings of the conference on Visualization '94. :4-7.
Getoor L, Koller D, Friedman N.  2000.  From instances to classes in probabilistic relational models. Proc. ICML 2000 Workshop on Attribute-Value and Relational Learning.
Getoor L.  2005.  Link-based classification. Advanced methods for knowledge discovery from complex data. :189-207.
Getoor L.  2005.  Tutorial on statistical relational learning. Inductive Logic Programming. :415-415.
Getoor L, Mihalkova L.  2011.  Exploiting statistical and relational information on the web and in social media. Proceedings of the fourth ACM international conference on Web search and data mining. :9-10.
Getoor L, Licamele L.  2005.  Link Mining for the Semantic Web, Position Statement. Proceedings of the Dagstuhl Seminar in Machine Learning for the Semantic Web.

Pages