Publications
Export 359 results:
[ Author] Title Type Year Filters: First Letter Of Last Name is R [Clear All Filters]
1998. Linger longer: Fine-grain cycle stealing for networks of workstations. Proceedings of the 1998 ACM/IEEE Conference on Supercomputing (CDROM). :1-12.
2000. Exploiting fine-grained idle periods in networks of workstations. IEEE Transactions on Parallel and Distributed Systems. 11(7):683-698.
1989. List ranking on the Hypercube. Proceedings of the 1989 International Conference on Parallel Processing. 3:20-23.
2004. Resource policing to support fine-grain cycle stealing in networks of workstations. IEEE Transactions on Parallel and Distributed Systems. 15(10):878-892.
2001. Efficient network and I/O throttling for fine-grain cycle stealing. Proceedings of the 2001 ACM/IEEE conference on Supercomputing (CDROM) - Supercomputing '01. :3-3.
1990. Efficient algorithms for list ranking and for solving graph problems on the hypercube. Parallel and Distributed Systems, IEEE Transactions on. 1(1):83-90.
2004. Unobtrusiveness and efficiency in idle cycle stealing for PC grids. Parallel and Distributed Processing Symposium, 2004. Proceedings. 18th International.
2006. Interdomain mobility in di-ubiquitin revealed by NMR. Proteins: Structure, Function, and Bioinformatics. 63(4):787-796.
2006. An Efficient Computational Method for Predicting Rotational Diffusion Tensors of Globular Proteins Using an Ellipsoid Representation. Journal of the American Chemical Society. 128(48):15432-15444.
2004. A comparison of bug finding tools for Java. Software Reliability Engineering, 2004. ISSRE 2004. 15th International Symposium on. :245-256.
2008. Residual periodograms for choosing regularization parameters for ill-posed problems. Inverse Problems. 24(3):034005-034005.
2010. Modelling Type 1a Supernova Light Curves. Exponential Data Fitting and Its ApplicationsExponential Data Fitting and Its Applications. :169-186.
1994. Confidence Intervals for Discrete Approximations to Ill-Posed Problems. The Journal of Computational and Graphical Statistics. 3:67-96.
2002. Empirical evaluation of techniques and methods used for achieving and assessing software high dependability. Proc. DSN Workshop on Dependability Benchmarking.
1996. Computational studies of synaptic alterations in Alzheimer’s disease. Neural modeling of brain and cognitive disorders. :63-87.
1995. A neural model of memory impairment in diffuse cerebral atrophy. The British Journal of Psychiatry. 166(1):19-19.
1996. Pathogenesis of schizophrenic delusions and hallucinations: a neural model. Schizophrenia bulletin. 22(1):105-105.
2001. Cortical Spreading depression and the pathogenesis of brain disorders: a computational and neural network-based investigation. Neurological research. 23(5):447-456.
1995. Patterns of functional damage in neural network models of associative memory. Neural computation. 7(5):1105-1127.
1999. Penumbral tissue damage following acute stroke: a computational investigation. Progress in brain research. 121:243-260.
1999. Pathogenic mechanisms in ischemic damage: a computational study. Computers in biology and medicine. 29(1):39-59.
1995. A neural model of delusions and hallucinations in schizophrenia. Advances in Neural Information Processing Systems. :149-156.
1997. Combining Closed World Assumptions with Stable Negation. Fundamenta Informaticae. 32(2):163-181.
1998. Logic knowledge bases with two default rules. Annals of Mathematics and Artificial Intelligence. 22(3):333-361.