Export 353 results:
[ Author(Asc)] Title Type Year
Filters: First Letter Of Last Name is G  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
Gu R, Bhattacharyya SS, Levine WS.  2010.  Methods for efficient implementation of Model Predictive Control on multiprocessor systems. 2010 IEEE International Conference on Control Applications (CCA). :1357-1362.
Grushin A, Reggia JA.  2008.  Automated design of distributed control rules for the self-assembly of prespecified artificial structures. Robotics and Autonomous Systems. 56(4):334-359.
Grushin A, Reggia JA.  2006.  Stigmergic self-assembly of prespecified artificial structures in a constrained and continuous environment. Integrated Computer-Aided Engineering. 13(4):289-312.
Grushin A, Reggia JA.  2010.  Parsimonious rule generation for a nature-inspired approach to self-assembly. ACM Transactions on Autonomous and Adaptive Systems (TAAS). 5(3):1-24.
Grushin A, Reggia JA.  2005.  Evolving processing speed asymmetries and hemispheric interactions in a neural network model. Neurocomputing. 65:47-53.
Gruser J, Raschid L, Vidal ME, Bright L.  1998.  Wrapper generation for Web accessible data sources. 3rd IFCIS International Conference on Cooperative Information Systems, 1998. Proceedings. :14-23.
Gruser JR, Raschid L, Zadorozhny V, Zhan T.  2000.  Learning response time for websources using query feedback and application in query optimization. The VLDB Journal—The International Journal on Very Large Data Bases. 9(1):18-37.
Grundstrom EL, Reggia JA.  1996.  Learning Activation Rules Rather Than Connection Weights. International journal of neural systems. 7(2):129-148.
Grube NE, Taylor EM, Martin, M.P.  2007.  Assessment of WENO methods with shock-confining filtering for LES of compressible turbulence. AIAA Paper 2007. 4198
GROVE AJ, Jacobs DW.  1996.  Space/time trade-offs for associative memory. Pattern Recognition, 1996., Proceedings of the 13th International Conference on. 4:296-302vol.4-296-302vol.4.
Grossman D, Hicks MW, Jim T, Morrisett G.  2005.  Cyclone: A type-safe dialect of C. C/C++ Users Journal. 23(1):112-139.
Grossman D, Manson J, Pugh W.  2006.  What do high-level memory models mean for transactions? Proceedings of the 2006 workshop on Memory system performance and correctness - MSPC '06. :62-62.
Grossman D, Morrisett G, Jim T, Hicks MW, Wang Y, Cheney J.  2001.  Cyclone User's Manual, Version 0.1. 3. Computer Science Technical Reports.
Grossman D, Morrisett G, Jim T, Hicks MW, Wang Y, Cheney J.  2002.  Region-based memory management in cyclone. SIGPLAN Not.. 37(5):282-293.
Gross KC, Votta LG, Porter A.  2004.  Detecting and correcting a failure sequence in a computer system before a failure occurs.
Gross T, Sussman A.  1987.  Mapping a single-assignment language onto the Warp systolic array. Functional Programming Languages and Computer Architecture. :347-363.
Gross KC, Urmanov A, Votta LG, McMaster S, Porter A.  2006.  Towards Dependability in Everyday Software Using Software Telemetry. Engineering of Autonomic and Autonomous Systems, IEEE International Workshop on. :9-18.
Groce A, Katz J.  2010.  A New Framework for Password-Based Authenticated Key Exchange. ACM CCCS 2010.
Groce A, Katz J.  2010.  A new framework for efficient password-based authenticated key exchange. Proceedings of the 17th ACM conference on Computer and communications security. :516-525.
Groce A, Katz J, Yerukhimovich A.  2011.  Limits of computational differential privacy in the client/server setting. Theory of Cryptography. :417-431.
Grinter RE, W. Edwards K, Chetty M, Poole ES, Sung J-Y, Yang J, Crabtree A, Tolmie P, Rodden T, Greenhalgh C et al..  2009.  The Ins and Outs of Home Networking: The Case for Useful and Usable Domestic Networking. ACM Trans. Comput.-Hum. Interact.. 16(2):8:1-8:28.
Grinstein G, Plaisant C, Laskowski S, O'Connell T, Scholtz J, Whiting M.  2007.  VAST 2007 Contest - Blue Iguanodon. Visual Analytics Science and Technology, 2007. VAST 2007. IEEE Symposium on. :231-232.
Grinstein G, Plaisant C, Laskowski S, O'Connell T, Scholtz J, Whiting M.  2008.  VAST 2008 Challenge: Introducing mini-challenges. Visual Analytics Science and Technology, 2008. VAST '08. IEEE Symposium on. :195-196.
Grinstein G, Scholtz J, Whiting M, Plaisant C.  2009.  VAST 2009 challenge: An insider threat. Visual Analytics Science and Technology, 2009. VAST 2009. IEEE Symposium on. :243-244.
Grinstein G, Kobsa A, Plaisant C, Shneiderman B, Stasko JT.  2003.  Which comes first, usability or utility? Proceedings of the 14th IEEE Visualization 2003 (VIS'03). :112–-112–.