Publications

Export 7148 results:
[ Author(Asc)] Title Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
A
Arya S, Malamatos T, Mount D.  2009.  Space-time tradeoffs for approximate nearest neighbor searching. Journal of the ACM (JACM). 57(1):1:1–1:54-1:1–1:54.
Arya S, Malamatos T, Mount D.  2006.  On the importance of idempotence. Proceedings of the thirty-eighth annual ACM symposium on Theory of computing. :564-573.
Arya S, Mount D.  1993.  Algorithms for fast vector quantization. Data Compression Conference, 1993. DCC '93.. :381-390.
Arya S, Mount D.  2000.  Approximate range searching. Computational Geometry. 17(3–4):135-152.
Arya S, da Fonseca G, Mount D.  2010.  A unified approach to approximate proximity searching. Algorithms–ESA 2010. :374-385.
Arya S, da Fonseca GD, Mount D.  2012.  Polytope approximation and the Mahler volume. Proceedings of the Twenty-Third Annual ACM-SIAM Symposium on Discrete Algorithms. :29-42.
Arya S, Phamdo N, Farvardin N, Mount D.  1993.  Fast search algorithms with applications to split and multi-stage vector quantization of speech lsp parameters. Speech Coding for Telecommunications, 1993. Proceedings., IEEE Workshop on. :65-66.
Arya S, Mount D.  1993.  Approximate nearest neighbor queries in fixed dimensions. Proceedings of the fourth annual ACM-SIAM Symposium on Discrete algorithms. :271-280.
Arya S, Malamatos T, Mount D.  2001.  Entropy-preserving cuttings and space-efficient planar point location. Proceedings of the twelfth annual ACM-SIAM symposium on Discrete algorithms. :256-261.
Arya S, Mount D, Narayan O.  1996.  Accounting for boundary effects in nearest-neighbor searching. Discrete & Computational Geometry. 16(2):155-176.
Arya S, Mount D, Vigneron A, Xia J.  2008.  Space-time tradeoffs for proximity searching in doubling spaces. Algorithms-ESA 2008. :112-123.
Arya S, Dast G, Mount D, Salowe JS, Smid M.  1995.  M.H.M: Euclidean spanners: short, thin, and lanky. In: 27th ACM Symposium on Theory of Computing. :489-498.
Armentrout SL, Reggia JA, Weinrich M.  1994.  A neural model of cortical map reorganization following a focal lesion. Artificial Intelligence in Medicine. 6(5):383-400.
Arlt S, Banerjee I, Bertolini C, Memon AM, Schäf M.  2012.  Grey-box GUI Testing: Efficient Generation of Event Sequences. arXiv:1205.4928.
Arlat DPMCJ, Crouzet Y.  1996.  Estimation of time-dependent coverage. 96466
Arkin E, Goodrich M, Mitchell J, Mount D, Piatko C, Skiena S.  1993.  Point probe decision trees for geometric concept classes. Algorithms and Data Structures. :95-106.
Arkin EM, Khuller S, Mitchell JSB.  1993.  Geometric knapsack problems. Algorithmica. 10(5):399-427.
Arkin EM, Belleville P, Mitchell JSB, Mount D, Romanik K, Salzberg S, Souvaine D.  1997.  Testing simple polygons. Computational Geometry. 8(2):97-114.
Aris A, Shneiderman B.  2007.  Designing Semantic Substrates for Visual Network Exploration. Information VisualizationInformation Visualization. 6(4):281-300.
Aris A, Shneiderman B.  2008.  A Node Aggregation Strategy to Reduce Complexity of Network Visualization using Semantic Substrates.
Aris A, Shneiderman B, Plaisant C, Shmueli G, Jank W.  2005.  Representing Unevenly-Spaced Time Series Data for Visualization and Interactive Exploration. Human-Computer Interaction - INTERACT 2005Human-Computer Interaction - INTERACT 2005. 3585:835-846.
Aris A, Shneiderman B, Plaisant C, Shmueli G, Jank W.  2005.  Representing Unevenly-Spaced Time Series Data for Visualization and Interactive Exploration (2005). Institute for Systems Research Technical Reports.
Aris A, Shneiderman B, Qazvinian V, Radev D.  2009.  Visual overviews for discovering key papers and influences across research fronts. Journal of the American Society for Information Science and Technology. 60(11):2219-2228.
Archer A, Bateni MH, Hajiaghayi MT, Karloff H.  2009.  Improved approximation algorithms for prize-collecting Steiner tree and TSP. 2009 50th Annual IEEE Symposium on Foundations of Computer Science. :427-436.
Arbaugh WA, Keromytis AD, Farber DJ, Smith JM.  1998.  Automated recovery in a secure bootstrap process. Proceedings of the Symposium on Network and Distributed Systems Security (NDSS’98). :155-167.

Pages