Publications

Export 1435 results:
Author [ Title(Asc)] Type Year
Filters: First Letter Of Last Name is K  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
A
Kanungo T, Mount D, Netanyahu NS, Piatko C, Silverman R, Wu AY.  2000.  The analysis of a simple k-means clustering algorithm. Proceedings of the sixteenth annual symposium on Computational geometry. :100-109.
LaCount DJ, El-Sayed NM, Kaul S, Wanless D, Turner CMR, Donelson JE.  2001.  Analysis of a donor gene region for a variant surface glycoprotein and its expression site in African trypanosomes. Nucleic acids research. 29(10):2012-2012.
Kotidis Y, Roussopoulos N.  1998.  An alternative storage organization for ROLAP aggregate views based on cubetrees. ACM Sigmod Record. 27:249-258.
White JR, Navlakha S, Nagarajan N, Ghodsi M-R, Kingsford C, Pop M.  2010.  Alignment and clustering of phylogenetic markers - implications for microbial diversity studies. BMC Bioinformatics. 11(1):152-152.
Kalsi A, O'Leary DP.  2006.  Algorithms for Structured Total Least Squares Problems with Applications to Blind Image Deblurring. Journal of Research of the National Institute of Standards and Technology. 111(2):113-119.
Kashyap S, Khuller S.  2006.  Algorithms for non-uniform size data placement on parallel disks. Journal of Algorithms. 60(2):144-167.
Kashyap S, Khuller S.  2006.  Algorithms for non-uniform size data placement on parallel disks. Journal of Algorithms. 60(2):144-167.
Charikar M, Khuller S, Mount D, Narasimhan G.  2001.  Algorithms for facility location problems with outliers. Proceedings of the twelfth annual ACM-SIAM symposium on Discrete algorithms. :642-651.
Agarwal PK, Guibas LJ, Edelsbrunner H, Erickson J, Isard M, Har-Peled S, Hershberger J, Jensen C, Kavraki L, Koehl P et al..  2002.  Algorithmic issues in modeling motion. ACM Comput. Surv.. 34(4):550-572.
Agarwal PK, Guibas LJ, Edelsbrunner H, Erickson J, Isard M, Har-Peled S, Hershberger J, Jensen C, Kavraki L, Koehl P et al..  2002.  Algorithmic issues in modeling motion. ACM Comput. Surv.. 34(4):550-572.
Demaine ED, Hajiaghayi MT, Kawarabayashi K.  2005.  Algorithmic graph minor theory: Decomposition, approximation, and coloring. Foundations of Computer Science, 2005. FOCS 2005. 46th Annual IEEE Symposium on. :637-646.
Kumar AVS, Marathe MV, Parthasarathy S, Srinivasan A.  2005.  Algorithmic aspects of capacity in wireless networks. Proceedings of the 2005 ACM SIGMETRICS international conference on Measurement and modeling of computer systems. :133-144.
Kolda TG, O'Leary DP.  2000.  Algorithm 805: computation and uses of the semidiscrete matrix decomposition. ACM Trans. Math. Softw.. 26(3):415-435.
Kozen D, Teitelbaum T, Chen WZ, Field JH, Pugh W, Vander Zanden BT.  1987.  ALEX-an Alexical Programming Language. TR87-835
Shekhar C, Chellappa R.  2003.  Airborne Video Registration for Activity Monitoring. Video RegistrationVideo Registration. 5:130-143.
Horvitz E, Getoor L, Guestrin C, Hendler J, Konstan J, Subramanian D, Wellman M, Kautz H.  2010.  AI Theory and Practice: A Discussion on Hard Challenges and Opportunities Ahead. AI Magazine. 31(3):103-114.
Horvitz E, Getoor L, Guestrin C, Hendler J, Konstan J, Subramanian D, Wellman M, Kautz H.  2010.  AI Theory and Practice: A Discussion on Hard Challenges and Opportunities Ahead. AI Magazine. 31(3):103-114.
Katz J, Lindell A.  2008.  Aggregate message authentication codes. Topics in Cryptology–CT-RSA 2008. :155-169.
Sánchez AJ, Etzioni O, Kautz H, Lieberman H, Shneiderman B.  1999.  Agents vs. direct manipulation: what's best to disentangle the Web? Computer Networks: The International Journal of Computer and Telecommunications Networking. 31(11-16):1765-1767.
Sánchez JA, Etzioni O, Kautz H, Lieberman H, Shneiderman B.  1999.  Agents vs. direct manipulation: what's best to disentangle the Web? Proceedings of the eighth international conference on World Wide Web.
Ertugay O, Hicks MW, Smith J, Kornblum J.  2000.  Agents in Network Management. Technical Reports (CIS).
Dix J, Kraus S, V.S. Subrahmanian.  2002.  Agents dealing with time and uncertainty. Proceedings of the first international joint conference on Autonomous agents and multiagent systems: part 2. :912-919.
Doermann D, Sauvola J, Haapakoski S, Kauniskangas H, Seppanen T, Pietikainen M.  1997.  ADistributed Management System for Testing Document Image Database Analysis Algorithms. ICDAR. :989-995.
W Easterday R, Kausrud KL, Star B, Heier L, Haley BJ, Ageyev V, Colwell RR, Stenseth NChr.  2012.  An additional step in the transmission of Yersinia pestis? The ISME Journal. (2):231-236.
Canetti R, Halevi S, Katz J.  2005.  Adaptively-secure, non-interactive public-key encryption. Theory of Cryptography. :150-168.

Pages