15788<>0_14<>alexandre scherbyna:arnaud tisserand<>semi-logarithmic number systems<>tc<>jean-michel muller<>
15800<>0_26<>vincent lefevre:arnaud tisserand<>toward correctly rounded transcendentals<>tc<>jean-michel muller<>
39369<>11_2<>lawrence h. staib<>boundary finding with correspondence using statistical shape models<>cvpr<>yongmei wang<>
39388<>13_10<>woei-jyh lee<>comera: com extensible remoting architecture<>coots<>yi-min wang<>
39392<>13_14<>jichiang tsai:sy-yen kuo<>theoretical analysis for communication-induced checkpointing protocols with rollback-dependency trackability<>tpds<>yi-min wang<>
39397<>16_1<>rodger j. mcnab:ian h. witten:carl gutwin<>predicting query times<>sigir<>yong wang<>
39398<>16_2<>eibe frank:stuart inglis:geoffrey holmes:ian h. witten<>using model trees for classification<>ml<>yong wang<>
26553<>17_0<>edleno silva de moura:gonzalo navarro:nivio ziviani<>direct pattern matching on compressed text<>spire<>ricardo a. baeza-yates<>
26561<>17_8<>jesus vegas:gonzalo navarro:pablo de la fuente<>a model and a visual query language for structured text<>spire<>ricardo a. baeza-yates<>
26563<>17_10<>joaquim gabarro:xavier messeguer<>fringe analysis of synchronized parallel algorithms on 2-3 trees<>random<>ricardo a. baeza-yates<>
26568<>17_15<>hector soza-pollman<>analysis of linear hashing revisited<>njc<>ricardo a. baeza-yates<>
26622<>17_69<>nulo<>similarity in two-dimensional strings<>cocoon<>ricardo a. baeza-yates<>
26635<>17_82<>gonzalo navarro<>fast approximate string matching in a dictionary<>spire<>ricardo a. baeza-yates<>
26637<>17_84<>edleno silva de moura:gonzalo navarro:nivio ziviani<>fast searching on compressed text allowing errors<>sigir<>ricardo a. baeza-yates<>
23317<>18_6<>pankaj k. agarwal:nina amenta<>largest placement of one convex polygon inside another<>dcg<>micha sharir<>
23330<>18_19<>pankaj k. agarwal:emo welzl<>the discrete 2-center problem<>dcg<>micha sharir<>
23339<>18_28<>jean-daniel boissonnat:boaz tagansky:mariette yvinec<>voronoi diagrams in higher dimensions under certain polyhedral distance functions<>dcg<>micha sharir<>
23357<>18_46<>pankaj k. agarwal<>efficient algorithms for geometric optimization<>csur<>micha sharir<>
10951<>21_20<>didier dubois:regis sabbadin<>qualitative decision theory with sugeno integrals<>uai<>henri prade<>
25062<>25_0<>subhash suri<>surface approximation and geometric partitions<>siamcomp<>pankaj k. agarwal<>
25066<>25_4<>marc j. van kreveld:subhash suri<>label placement by maximum independent set in rectangles<>comgeo<>pankaj k. agarwal<>
25067<>25_5<>david eppstein:leonidas j. guibas:monika rauch henzinger<>parametric and kinetic minimum spanning trees<>focs<>pankaj k. agarwal<>
25080<>25_18<>boris aronov:timothy m. chan:micha sharir<>"on levels in arrangements of lines, segments, planes, and triangles%."<>dcg<>pankaj k. agarwal<>
25086<>25_24<>mark de berg:jiri matousek:otfried schwarzkopf<>constructing levels in arrangements and higher order voronoi diagrams<>siamcomp<>pankaj k. agarwal<>
25108<>25_46<>micha sharir<>efficient algorithms for geometric optimization<>csur<>pankaj k. agarwal<>
25119<>25_57<>jiri matousek:otfried schwarzkopf<>computing many faces in arrangements of lines and segments<>siamcomp<>pankaj k. agarwal<>
25145<>25_83<>micha sharir:emo welzl<>the discrete 2-center problem<>dcg<>pankaj k. agarwal<>
25172<>25_110<>lars arge:jeff erickson:paolo giulio franciosa:jeffrey scott vitter<>efficient searching with linear constraints<>pods<>pankaj k. agarwal<>
8501<>31_2<>erik h. d'hollander:qi wang<>the fortran parallel transformer and its programming<>isci<>fubo zhang<>
33420<>32_11<>manoel g. mendonca:inderpal s. bhandari:jack dawson<>an approach to improving existing measurement frameworks<>ibmsj<>victor r. basili<>
33434<>32_25<>carolyn b. seaman<>communication and organization: an empirical study of discussion in inspection meetings<>tse<>victor r. basili<>
33461<>32_52<>filippo lanubile:forrest shull<>investigating maintenance processes in a framework-based environment<>icsm<>victor r. basili<>
33475<>32_66<>lionel c. briand:yong-mi kim:walcelio l. melo:carolyn b. seaman<>"q-mopp: qualitative evaluation of maintenance organizations, processes and products."<>smr<>victor r. basili<>
5973<>42_0<>jeffrey horn<>a timing analysis of convergence to fitness sharing equilibrium<>ppsn<>david e. goldberg<>
26796<>48_0<>ehud aharoni<>restricted dynamic steiner trees for scalable multicast in datagram networks<>ton<>reuven cohen<>
26774<>50_5<>coralee allaby:christian cumbaa:mark fitzgerald:kinson ho:bowen hui:celine latulipe:fletcher lu:nancy moussa:david pooley:alex qian:saheem siddiqi<>what is initiative?<>umuai<>robin cohen<>
26745<>53_0<>amit cohen<>a dynamic approach for efficient tcp buffer allocation<>icccn<>reuven cohen<>
26762<>53_17<>edward bortnikov<>schemes for scheduling of control messages by hierarchical protocols<>infocom<>reuven cohen<>
18768<>57_14<>chiaki sakama<>specifying transactions for extended abduction<>kr<>katsumi inoue<>
18784<>57_30<>yoshihiko ohta:ryuzo hasegawa<>on the relationship between non-horn magic sets and relevancy testing<>cade<>katsumi inoue<>
4451<>70_1<>nulo<>a linear optimal test generation algorithm for interconnect testing<>iccad<>chauchin su<>
4455<>70_5<>yue-tsung chen<>comprehensive interconnect bist methodology for virtual socket interface<>ats<>chauchin su<>
32366<>83_2<>genshiro kitagawa<>automatic transaction of signal via statistical modeling<>dis<>tomoyuki higuchi<>
10844<>99_3<>david may<>a simple protocol to communicate channels over channels<>europar<>henk l. muller<>
34524<>100_33<>nabeel shirazi:peter y. k. cheung<>automating production of run-time reconfigurable designs<>fccm<>wayne luk<>
34527<>100_36<>steve mckeever<>pebble: a language for parametrised and reconfigurable hardware design<>fpl<>wayne luk<>
34538<>100_47<>p. andreou:arran derbyshire:f. dupont-de-dinechin:j. rice:nabeel shirazi:d. siganos<>a reconfigurable engine for real-time video processing<>fpl<>wayne luk<>
23402<>106_8<>michael n. huhns<>workflow agents<>internet<>munindar p. singh<>
23423<>106_29<>nulo<>applying the mu-calculus in planning and reasoning about action<>logcom<>munindar p. singh<>
23425<>106_31<>michael n. huhns<>multiagent systems in information-rich environments<>cia<>munindar p. singh<>
23441<>106_47<>nulo<>agent communication languages: rethinking the principles<>computer<>munindar p. singh<>
23449<>106_55<>nulo<>developing formal specifications to coordinate heterogeneous autonomous agents<>icmas<>munindar p. singh<>
23464<>106_70<>nulo<>semantical considerations on intention dynamics for bdi agents<>jetai<>munindar p. singh<>
23467<>106_73<>nulo<>"the intentions of teams: team structure, endodeixis, and exodeixis."<>ecai<>munindar p. singh<>
23498<>114_4<>annemieke craig:julie fisher:angela scollary<>closing the gap: women education and information technology courses in australia<>jss<>mohini singh<>
6602<>124_3<>hasan s. uyar<>combined learning and use for a mixture model equivalent to the rbf classifier<>neco<>david j. miller<>
31499<>129_3<>nulo<>pseudo-average block sensitivity equals average sensitivity<>ipl<>srinivasan venkatesh<>
32812<>135_14<>ning zhong:j. j. dong:setsuo ohsuga<>frameworks for mining binary relations in data<>rsctc<>tsau young lin<>
32821<>135_23<>keming xie:jianwei zhang<>the takagi-sugeno fuzzy model identification method of parameter varying systems<>rsctc<>tsau young lin<>
32837<>138_0<>steven woods:liam o'brien:keith gallagher:alex quilici<>an architecture for interoperable program understanding tools<>iwpc<>tao lin<>
32834<>140_1<>bill g. horne:c. lee giles<>how embedded memory in recurrent neural network architectures helps learning long-term temporal dependencies<>nn<>tsungnan lin<>
32836<>140_3<>joseph shu<>a color consistency algorithm between different printers<>pics<>tsung-nan lin<>
5755<>153_26<>pankaj k. agarwal:leonidas j. guibas:monika rauch henzinger<>parametric and kinetic minimum spanning trees<>focs<>david eppstein<>
5765<>153_36<>nulo<>finding the k shortest paths<>siamcomp<>david eppstein<>
5794<>153_65<>gill barequet:matthew dickerson<>on triangulating three-dimensional polygons<>comgeo<>david eppstein<>
5839<>153_110<>nulo<>incremental and decremental maintenance of planar width<>corr<>david eppstein<>
5849<>153_120<>nulo<>geometric lower bounds for parametric matroid optimization<>dcg<>david eppstein<>
5872<>153_143<>nina amenta:marshall w. bern:shang-hua teng<>regression depth and center points<>corr<>david eppstein<>
5891<>153_162<>nina amenta:marshall w. bern<>optimal point placement for mesh smoothing<>corr<>david eppstein<>
5893<>153_164<>jeff erickson<>"raising roofs, crashing cycles, and playing pool: applications of a data structure for finding pairwise interactions."<>compgeom<>david eppstein<>
5906<>153_177<>zvi galil:giuseppe f. italiano:thomas h. spencer<>separator-based sparsification ii: edge and vertex connectivity<>siamcomp<>david eppstein<>
5916<>153_187<>michael b. dillencourt:daniel s. hirschberg<>geometric thickness of complete graphs<>gd<>david eppstein<>
5917<>153_188<>nina amenta:marshall w. bern<>the crust and the beta-skeleton: combinatorial curve reconstruction<>cvgip<>david eppstein<>
5922<>153_193<>nulo<>fast hierarchical clustering and other applications of dynamic closest pairs<>soda<>david eppstein<>
5925<>153_196<>nulo<>linear complexity hexahedral mesh generation<>corr<>david eppstein<>
5718<>158_25<>henri prade:regis sabbadin<>qualitative decision theory with sugeno integrals<>uai<>didier dubois<>
22294<>167_8<>huaiqing wang:chen wang<>consumer privacy concerns about internet marketing<>cacm<>matthew k. o. lee<>
8748<>191_0<>yee leung:zong-ben xu<>a genetic algorithm for the multiple destination routing problems<>tec<>guo li<>
41379<>200_1<>chengzheng sun:abdul sattar:yanyan yang<>guaranteed mutually consistent checkpointing in distributed computations<>asian<>zhonghua yang<>
27151<>202_6<>ashwin srinivasan<>the discovery of indicator variables for qsar using inductive logic programming<>jcamd<>ross d. king<>
27167<>202_22<>luc dehaspe:hannu toivonen<>finding frequent substructures in chemical compounds<>kdd<>ross d. king<>
27174<>202_29<>stephen muggleton:ashwin srinivasan:michael j. e. sternberg<>biochemical knowledge discovery using inductive logic programming<>dis<>ross d. king<>
34719<>205_5<>jiong yang:richard r. muntz<>pk-tree: a spatial index structure for high dimensional point data<>fodo<>wei wang<>
34720<>205_6<>weiyi meng:clement t. yu:naphtali rishe<>performance analysis of three text-join algorithms<>tkde<>wei wang<>
34734<>205_20<>zhenyuan wang:george j. klir<>genetic algorithms for determining fuzzy measures from data<>jifs<>wei wang<>
34765<>205_51<>jiong yang:silvia nittel:richard r. muntz<>dynamo: dynamic objects with persistent storage<>pos<>wei wang<>
21520<>209_1<>nobuo koizumi<>virtual gain for audio windows<>presence<>michael cohen<>
1840<>225_1<>nulo<>visualizing decision table classifiers<>infovis<>barry g. becker<>
11894<>226_3<>nulo<>forward shadow mapping<>rt<>hansong zhang<>
17153<>228_3<>yi deng:rakesh sinha<>incremental architectural modeling and verification of real-time concurrent systems<>icfem<>jiacun wang<>
17159<>228_9<>yi deng<>integrated architectural modeling and analysis for high-assurance command and control system design<>hase<>jiacun wang<>
17110<>230_3<>jia li:gio wiederhold:oscar firschein<>system for screening objectionable images<>comcom<>james ze wang<>
17137<>230_30<>jia li:gio wiederhold:oscar firschein<>classifying objectionable websites based on image content<>idms<>james ze wang<>
17177<>234_16<>ming-yang kao<>efficient minimization of numerical summation errors<>icalp<>jie wang<>
17178<>234_17<>yaorong ge<>an optimization problem in virtual endoscopy<>tcs<>jie wang<>
39120<>236_0<>imari sato:katsushi ikeuchi<>3d shape and reflectance morphing<>scjapan<>yoichi sato<>
39125<>236_5<>mark d. wheeler:katsushi ikeuchi<>consensus surfaces for modeling 3d objects from multiple range images<>iccv<>yoichi sato<>
39130<>248_4<>jian chen:shinichi tamura<>orientation space filtering for multiple orientation line segmentation<>cvpr<>yoshinobu sato<>
34872<>263_0<>haris lekatsas<>code compression for embedded systems<>dac<>wayne wolf<>
30837<>269_4<>nulo<>evolution and learning in multiagent systems<>ijmms<>sandip sen<>
30839<>269_6<>mahendra sekaran<>individual learning of coordination knowledge<>jetai<>sandip sen<>
30846<>269_13<>neeraj arora:shounak roychowdhury<>using limited information to enhance group stability<>ijmms<>sandip sen<>
30850<>269_17<>anish biswas<>effects of misconception on reciprocative agents<>agents<>sandip sen<>
30853<>269_20<>thomas haynes<>learning cases to resolve conflicts and improve group behavior<>ijmms<>sandip sen<>
30911<>270_1<>neelima gupta<>distribution-sensitive algorithms<>swat<>sandeep sen<>
30899<>271_5<>krithi ramamritham:chia shen:oscar gonzalez:s. shirgurkar<>using windows nt for real-time applications: experimental observations and recommendations<>rtas<>subhabrata sen<>
29179<>280_20<>giovanni rumolo<>algebra for databases with explicit markings of damaged data<>tc11-5<>sushil jajodia<>
29181<>280_22<>jia-ling lin:xiaoyang sean wang<>abstraction-based misuse detection: high-level specifications and adaptable strategies<>csfw<>sushil jajodia<>
29184<>280_25<>neil f. johnson<>exploring steganography: seeing the unseen<>computer<>sushil jajodia<>
29212<>280_53<>xiaoyang sean wang:sona mohavni<>temporal mediators: supporting uniform accesses to heterogeneous temporal information<>ijait<>sushil jajodia<>
29215<>280_56<>neil f. johnson<>steganalysis of images created using current steganography software<>ih<>sushil jajodia<>
29240<>280_81<>luigi v. mancini:sanjeev setia<>a fair locking protocol for multilevel secure databases<>csfw<>sushil jajodia<>
29270<>280_111<>elisa bertino:luigi v. mancini:indrajit ray<>advanced transaction processing in multilevel secure file stores<>tkde<>sushil jajodia<>
29285<>280_126<>indrakshi ray:paul ammann<>a semantic-based transaction processing model for multilevel transactions<>jcs<>sushil jajodia<>
29313<>280_154<>peng liu:catherine d. mccollum<>application-level isolation to cope with malicious database users<>acsac<>sushil jajodia<>
29341<>280_182<>claudio bettini:xiaoyang sean wang<>a general framework for time granularity and its application to temporal reasoning<>amai<>sushil jajodia<>
29352<>280_193<>claudio bettini:xiaoyang sean wang:jia-ling lin<>discovering frequent event patterns with multiple granularities in time sequences<>tkde<>sushil jajodia<>
3763<>288_1<>nulo<>optimistic similarity-based real-time concurrency control<>rtas<>c. lai<>
33772<>293_4<>k. selcuk candan:p. venkat rangan<>collaborative multimedia systems: synthesis of media objects<>tkde<>v. s. subrahmanian<>
33778<>296_2<>khaled a. arisha:sarit kraus:fatma ozcan:robert ross<>impact: the interactive maryland platform for agents collaborating together<>icmas<>v. s. subrahmanian<>
18561<>307_18<>andreas paepcke:hector garcia-molina:terry winograd<>interoperability for digital libraries worldwide<>cacm<>kevin chen-chuan chang<>
18562<>307_19<>wen-syan li:yi-leh wu:corey bufi:divyakant agrawal:yoshinori hara<>powerbookmarks: an advanced web bookmark database system and its information sharing and management<>fodo<>kevin chen-chuan chang<>
18572<>307_29<>hector garcia-molina<>conjunctive constraint mapping for data translation<>dl<>kevin chen-chuan chang<>
18574<>307_31<>michelle q. wang baldonado:seth katz:andreas paepcke:hector garcia-molina:terry winograd<>"an extensible constructor tool for the rapid, interactive design of query synthesizers."<>dl<>kevin chen-chuan chang<>
7285<>320_2<>ying xu:edward c. uberbacher<>an efficient computational method for globally optimal threading<>jcb<>dong xu<>
4880<>327_0<>joseph y.-t. leung:tommy w. tam:gilbert h. young<>minimizing mean flow time with error constraint<>algorithmica<>c. s. wong<>
4885<>328_1<>xiaoyun lu:da-wei wang<>on avoidable and unavoidable claws<>dm<>c. k. wong<>
4888<>328_4<>ton kloks:haiko muller<>vertex ranking of asteroidal triple-free graphs<>ipl<>c. k. wong<>
4893<>328_9<>ton kloks:dieter kratsch<>minimum fill-in on circle and circular-arc graphs<>jal<>c. k. wong<>
23566<>333_6<>nulo<>sometimes and not never re-revisited: on branching versus linear time<>concur<>moshe y. vardi<>
23596<>333_36<>phokion g. kolaitis<>conjunctive-query containment and constraint satisfaction<>pods<>moshe y. vardi<>
23610<>333_50<>orna kupferman<>weak alternating automata and tree automata emptiness<>stoc<>moshe y. vardi<>
23612<>333_52<>rajeev alur:thomas a. henzinger:orna kupferman<>alternating refinement relations<>concur<>moshe y. vardi<>
23626<>333_66<>nulo<>reasoning about the past with two-way automata<>icalp<>moshe y. vardi<>
23644<>333_84<>kathi fisler<>bisimulation minimization in an automata-theoretic verification framework<>fmcad<>moshe y. vardi<>
23646<>333_86<>orna kupferman<>verification of fair transition systems<>cjtcs<>moshe y. vardi<>
23655<>333_95<>orna kupferman<>relating linear and branching model checking<>procomet<>moshe y. vardi<>
23706<>333_146<>ronald fagin:joseph y. halpern:yoram moses<>common knowledge revisited<>corr<>moshe y. vardi<>
23708<>333_148<>tomas feder<>the computational structure of monotone monadic snp and constraint satisfaction: a study through datalog and group theory<>siamcomp<>moshe y. vardi<>
23713<>333_153<>orna kupferman<>"freedom, weakness, and determinism: from linear-time to branching-time."<>lics<>moshe y. vardi<>
23715<>333_155<>nulo<>linear vs. branching time: a complexity-theoretic perspective<>lics<>moshe y. vardi<>
30467<>337_1<>jinpyo park<>optimistic register coalescing<>IEEEpact<>soo-mook moon<>
34409<>339_1<>sheng-wen shih:yi-ping hung<>calibration of an active binocular head<>tsmc<>wei-song lin<>
34410<>340_0<>zeng min song<>neighbourhood unions and edge-pancyclicity<>arscom<>wen song lin<>
17432<>354_0<>carson c. chow:jason ritt:cristina soto-trevino:nancy kopell<>"synchronization and oscillatory dynamics in heterogeneous, mutually inhibited neurons."<>jcns<>john a. white<>
33268<>355_0<>cong fu:xiangmin jiao<>efficient sparse lu factorization with partial pivoting on distributed memory architectures<>tpds<>tao yang<>
33300<>355_32<>cong fu<>space/time-efficient scheduling and execution of parallel irregular computations<>toplas<>tao yang<>
33305<>355_37<>vegard holmedahl:ben smith<>cooperative caching of dynamic content on a distributed web server<>hpdc<>tao yang<>
33307<>355_39<>kai shen:xiangmin jiao<>elimination forest guided 2d sparse lu factorization<>spaa<>tao yang<>
33311<>355_43<>huican zhu:qi zheng:david watson:oscar h. ibarra:terence r. smith<>adaptive load sharing for clustered digital library servers<>hpdc<>tao yang<>
33325<>372_0<>esther m. arkin:yi-jen chiang:martin held:joseph s. b. mitchell:vera sacristan:steven skiena<>on minimum-area hulls<>algorithmica<>tae-heng yang<>
14647<>394_1<>kyoung jun lee:hyun woo kim:tae hwan kim<>case- and constraint-based project planning for apartment construction<>aim<>jae kyu lee<>
38341<>400_7<>cecil c. rousseau<>a ramsey goodness result for graphs with many pendant edges<>arscom<>yusheng li<>
38330<>406_0<>anil k. jain<>classification of text documents<>cj<>y. h. li<>
22758<>424_11<>jules vleugels<>approximating voronoi diagrams of convex sites in any dimension<>ijcga<>mark h. overmars<>
22768<>424_21<>johan w. h. tangelder:joris s. m. vergeest<>interference-free nc machining using spatial planning and minkowski operations<>cad<>mark h. overmars<>
22770<>424_23<>robert-paul berretty:a. frank van der stappen<>dynamic motion planning in low obstacle density environments<>comgeo<>mark h. overmars<>
22784<>424_37<>robert-paul berretty:kenneth y. goldberg:a. frank van der stappen<>computing fence designs for orienting parts<>comgeo<>mark h. overmars<>
22788<>424_41<>petr svestka<>coordinated path planning for multiple robots<>ras<>mark h. overmars<>
22799<>424_52<>mark de berg:haggai david:matthew j. katz:a. frank van der stappen:jules vleugels<>guarding scenes against invasive hypercubes<>wae<>mark h. overmars<>
22803<>424_56<>mark de berg:matthew j. katz:a. frank van der stappen:jules vleugels<>models and motion planning<>swat<>mark h. overmars<>
22837<>424_90<>a. frank van der stappen:mark de berg:jules vleugels<>motion planning in environments with low obstacle density<>dcg<>mark h. overmars<>
22845<>424_98<>dan halperin<>"spheres, molecules, and hidden surface removal."<>comgeo<>mark h. overmars<>
22858<>424_111<>therese c. biedl:erik d. demaine:martin l. demaine:sylvain lazard:anna lubiw:joseph o'rourke:steve robbins:ileana streinu:godfried t. toussaint:sue whitesides<>locked and unlocked polygonal chains in 3d<>corr<>mark h. overmars<>
22869<>424_122<>mark de berg:henk meijer:gordon t. wilfong<>computing the angularity tolerance<>ijcga<>mark h. overmars<>
16359<>446_11<>nulo<>directed triangles in digraphs<>jct<>jian shen<>
1102<>480_3<>monica s. lam<>maximizing parallelism and minimizing synchronization with affine partitions<>pc<>amy w. lim<>
19486<>483_6<>pablo rodriguez:ernst biersack<>improving the www: caching or multicast?<>cn<>keith w. ross<>
19495<>483_15<>jean m. mcmanus<>a dynamic programming methodology for managing prerecorded vbr sources in packet-switched networks<>telsys<>keith w. ross<>
19508<>483_28<>srinivas rajagopal:martin reisslein<>packet multiplexers with adversarial regulated traffic<>infocom<>keith w. ross<>
19426<>485_1<>hui lei<>"faster joins, self-joins and multi-way joins using join indices."<>dke<>kenneth a. ross<>
19434<>485_9<>divesh srivastava:peter j. stuckey:s. sudarshan<>foundations of aggregation constraints<>tcs<>kenneth a. ross<>
19441<>485_16<>shih-fu chang:luis gravano:gail e. kaiser:salvatore j. stolfo<>database research at columbia university<>sigmod<>kenneth a. ross<>
19451<>485_26<>divesh srivastava:damianos chatziantoniou<>complex aggregation at multiple granularities<>edbt<>kenneth a. ross<>
19463<>485_38<>stefan berchtold:h. v. jagadish<>independence diagrams: a technique for visual data mining<>kdd<>kenneth a. ross<>
19472<>485_47<>jun rao<>reusing invariants: a new strategy for correlated queries<>sigmod<>kenneth a. ross<>
16862<>491_0<>ali beydoun:le yi wang:shiva sivashankar<>hybrid control of automotive powertrain systems: a case study<>hybrid<>jing sun<>
15333<>506_2<>adam cheyer:luc julia<>a unified framework for constructing multimodal experiments and applications<>cmc<>jean-claude martin<>
13937<>508_0<>n. lee:s. cha:doo-hwan bae<>towards reusable colored petri nets<>pdse<>jang-eui hong<>
15341<>510_2<>vincent e. devin:james l. crowley<>active hand tracking<>fgr<>jorome martin<>
33924<>529_19<>lisa ballesteros<>resolving ambiguity for cross-language retrieval<>sigir<>w. bruce croft<>
33945<>529_40<>ben shneiderman:donald byrd<>sorting out searching: a user-interface framework for text searches<>cacm<>w. bruce croft<>
33976<>529_71<>jay m. ponte<>a language modeling approach to information retrieval<>sigir<>w. bruce croft<>
15343<>533_0<>alex pentland:stan sclaroff:ron kikinis<>characterization of neuropathological shape deformations<>pami<>john martin<>
25370<>542_4<>fady alajaji<>a rate-distortion theorem for arbitrary discrete sources<>tit<>po-ning chen<>
25365<>543_0<>subhachandra chandra<>how fail-stop are faulty programs?<>ftcs<>peter m. chen<>
25327<>546_4<>david e. lowell<>persistent messages in local transactions<>podc<>peter m. chen<>
25336<>546_13<>wee teck ng<>integrating reliable memory in databases<>vldb<>peter m. chen<>
28<>564_0<>rainer leupers:peter marwedel<>optimized array index computation in dsp programs<>aspdac<>anupam basu<>
6377<>587_6<>divesh srivastava:dimitra vista<>generating advanced query interfaces<>cn<>dongwon lee<>
6229<>591_8<>qinglong hu:wang-chien lee<>optimal channel allocation for data dissemination in mobile computing environments<>icdcs<>dik lun lee<>
6316<>592_6<>chin-fang shen:dennis s. sheu<>geosheet: a distributed visualization tool for geometric algorithms<>ijcga<>d. t. lee<>
6317<>592_7<>evanthia papadopoulou<>critical area computation - a new approach<>ispd<>d. t. lee<>
6320<>592_10<>evanthia papadopoulou<>a new approach for the geodesic voronoi diagram of points in a simple polygon and other restricted polygonal domains<>algorithmica<>d. t. lee<>
6328<>592_18<>l. h. tseng:paul j. heffernan<>two-guard walkability of simple polygons<>ijcga<>d. t. lee<>
6331<>592_21<>hsiao-feng steven chen<>on crossing minimization problem<>tcad<>d. t. lee<>
6345<>592_35<>danny z. chen:r. sridhar:chandra n. sekharan<>solving the all-pair shortest path query problem on interval and circular-arc graphs<>networks<>d. t. lee<>
6299<>594_18<>thomas f. la porta:yow-jian lin:mihalis yannakakis<>protocol feature interactions<>forte<>david lee<>
6301<>594_20<>k. k. ramakrishnan:w. melody moh<>a formal specification of the atm abr rate control scheme<>cn<>david lee<>
6357<>599_1<>nicholas molton:stephen se:michael brady:penny probert<>a stereo vision-based aid for the visually impaired<>ivc<>david lee<>
6359<>599_3<>martin snaith:penny probert<>a low-cost system using sparse vision for navigation in the urban environment<>ivc<>david lee<>
446<>622_28<>jonathan aronson:boris pittel<>maximum matchings in sparse random graphs: karp-sipser revisited<>rsa<>alan m. frieze<>
466<>622_48<>andrei z. broder:stephen suen:eli upfal<>optimal construction of edge-disjoint paths in random graphs<>siamcomp<>alan m. frieze<>
474<>622_56<>andrew beveridge:colin mcdiarmid<>random minimum length spanning trees in regular graphs<>combinatorica<>alan m. frieze<>
34335<>623_9<>attahiru sule alfa<>actual holding times for calls in a pcs network<>icccn<>wei li<>
6551<>639_0<>randal c. burns<>in-place reconstruction of delta compressed files<>podc<>darrell d. e. long<>
31824<>672_4<>jack a. a. van der veen:gerhard j. woeginger<>sequencing jobs that require common resources on a single machine: a solvable case of the tsp<>mp<>shuzhong zhang<>
31825<>672_5<>jos f. sturm<>on the long-step path-following method for semidefinite programming<>orl<>shuzhong zhang<>
25736<>702_0<>michele colajanni:daniel m. dias<>analysis of task assignment policies in scalable distributed web-server systems<>tpds<>philip s. yu<>
25740<>702_4<>charu c. aggarwal<>mining large itemsets for association rules<>debu<>philip s. yu<>
25747<>702_11<>charu c. aggarwal<>a new framework for itemset generation<>pods<>philip s. yu<>
25749<>702_13<>kun-lung wu<>increasing multimedia system throughput with consumption-based buffer management<>mms<>philip s. yu<>
25755<>702_19<>hadas shachnai<>exploring wait tolerance in effective batching for video-on-demand scheduling<>mms<>philip s. yu<>
25783<>702_47<>michele colajanni:valeria cardellini<>dynamic load balancing in geographically distributed heterogeneous web servers<>icdcs<>philip s. yu<>
25784<>702_48<>hadas shachnai<>on analytic modeling of multimedia batching schemes<>pe<>philip s. yu<>
25794<>702_58<>uwe schwiegelshohn:walter ludwig:joel l. wolf:john turek<>smart smart bounds for weighted response time scheduling<>siamcomp<>philip s. yu<>
25823<>702_87<>edward a. macnair<>performance study of a collaborative method for hierarchical caching in proxy servers<>cn<>philip s. yu<>
25859<>702_123<>kun-lung wu<>range-based bitmap indexing for high cardinality attributes with skew<>compsac<>philip s. yu<>
25876<>702_140<>yun-wu huang<>a bandwidth-sensitive update scheduling method for internet push<>icdcs<>philip s. yu<>
25893<>702_157<>ming-syan chen:jong soo park<>efficient data mining for path traversal patterns<>tkde<>philip s. yu<>
18184<>728_8<>dharmavani bhagavathi:himabindu gurla:stephan olariu:james l. schwing:larry wilson<>time- and vlsi-optimal sorting on enhanced meshes<>tpds<>jingyuan zhang<>
40020<>736_18<>jitendra malik<>recovering photometric properties of architectural scenes from photographs<>siggraph<>yizhou yu<>
31904<>748_7<>nulo<>stochastic computation of medial axis in markov random fields<>cvpr<>song chun zhu<>
31959<>751_0<>robert g. reynolds<>fuzzy cultural algorithms with evolutionary programming<>eps<>shinin zhu<>
21547<>753_0<>tamas lukovszki:martin ziegler<>geometric searching in walkthrough animations with weak spanners in real time<>esa<>matthias fischer<>
21554<>753_7<>tamas lukovszki:martin ziegler<>a network based approach for realtime walkthrough of massive models<>wae<>matthias fischer<>
12298<>759_5<>guido minnen:ted briscoe<>can subcategorisation probabilities help a statistical parser?<>corr<>john carroll<>
12311<>759_18<>nicolas nicolov:olga shaumyan:martine smets:david j. weir<>grammar compaction and computation sharing in automata-based parsing<>tapd<>john a. carroll<>
12280<>761_11<>mary beth rosson:george chin jr.:jurgen koenemann<>requirements development in scenario-based design<>tse<>john m. carroll<>
20069<>782_0<>robert g. sumner jr.:bert j. dempsey<>an interactive www search engine for user-defined collections<>dl<>kiduk yang<>
20060<>784_0<>kelly maglaughlin:lokman i. meho:robert g. sumner jr.<>iris at trec-7<>trec<>kiduk yang<>
19075<>785_0<>hyun woo kim:jae kyu lee:tae hwan kim<>case- and constraint-based project planning for apartment construction<>aim<>kyoung jun lee<>
22553<>795_0<>douglas c. williams:susan pedersen<>an evaluation of the use of problem-based learning software by middle school students<>jucs<>min liu<>
31653<>810_0<>von-wun soo<>a fuzzy game theoretic approach to multi-agent coordination<>pricai<>shih-hung wu<>
5485<>814_2<>nulo<>classification and boundary vagueness in mapping presettlement forest types<>gis<>daniel g. brown<>
5466<>818_2<>dan l. grecu<>dimensions of machine learning in design<>aiedam<>david c. brown<>
5469<>818_5<>alex h. b. duffy:ashok k. goel<>special issue: machine learning in design<>aiedam<>david c. brown<>
5472<>818_8<>nulo<>defining configuring<>aiedam<>david c. brown<>
5475<>818_11<>dan l. grecu<>guiding agent learning in design<>ifip5-2<>david c. brown<>
5476<>818_12<>craig e. wills:bertrum v. dunskus:jonathan kemble<>evaluating network serviceability<>cn<>david c. brown<>
21234<>832_3<>ingolf kruger:radu grosu:peter scholz<>from mscs to statecharts<>ifip10-3<>manfred broy<>
21251<>832_20<>nulo<>a logical basis for modular software and systems engineering<>sofsem<>manfred broy<>
21256<>832_25<>radu grosu:thomas stauner<>a modular visual model for hybrid systems<>ftrtft<>manfred broy<>
21257<>832_26<>nulo<>a functional rephrasing of the assumption/commitment specification style<>fmsd<>manfred broy<>
21263<>832_32<>radu grosu:gheorghe stefanescu<>visual formalisms revisited<>acsd<>manfred broy<>
40675<>836_0<>nulo<>fan-type conditions for collapsible graphs<>arscom<>zhi-hong chen<>
30801<>849_1<>vipin chaudhary<>strings: a high-performance distributed shared memory for symmetrical multiprocessor clusters<>hpdc<>sumit roy<>
30767<>854_1<>vijay chandru:ramesh subrahmanyam<>negation as failure as resolution<>constraints<>suman roy<>
3903<>875_0<>f. k. lam<>maximum segmented image information thresholding<>cvgip<>chi-kin leung<>
3890<>877_0<>raymond t. ng<>multiscale similarity matching for subimage queries of arbitrary size<>vdb<>carson kai-sang leung<>
19752<>889_1<>beng chin ooi:tat-seng chua:wynne hsu<>fast image retrieval using color-spatial information<>vldb<>kian-lee tan<>
14628<>909_0<>yong jae kim:jae woong chung:tag gon kim<>adaptive acknowledgment scheme for efficient error control in atm clustering system<>icccn<>jong-kwon lee<>
14556<>954_9<>ross j. anderson:francesco bergadano:bruno crispo:charalampos manifavas:roger m. needham<>a new family of authentication protocols<>sigops<>jong-hyeon lee<>
22891<>956_6<>chih-shun ding:cheng-ta hsieh<>improving sampling efficiency for system level power estimation<>islped<>massoud pedram<>
22899<>956_14<>qinru qiu:qing wu<>maximum power estimation using the limiting distributions of extreme order statistics<>dac<>massoud pedram<>
22926<>956_41<>radu marculescu:diana marculescu<>probabilistic modeling of dependencies during switching activity analysis<>tcad<>massoud pedram<>
22928<>956_43<>amir h. salek:jinan lou<>a simultaneous routing tree construction and fanout optimization algorithm<>iccad<>massoud pedram<>
22931<>956_46<>chi-ying tsui<>accurate and efficient power simulation strategy by compacting the input vector set<>integration<>massoud pedram<>
22932<>956_47<>chi-ying tsui:alvin m. despain<>low-power state assignment targeting two- and multilevel logic implementations<>tcad<>massoud pedram<>
22947<>956_62<>chih-shun ding:qing wu:cheng-ta hsieh<>stratified random sampling for power estimation<>tcad<>massoud pedram<>
22951<>956_66<>qing wu:xunwei wu<>a new design for double edge triggered flip-flops<>aspdac<>massoud pedram<>
22965<>956_80<>chih-shun ding:chi-ying tsui<>gate-level power estimation using tagged probabilistic simulation<>tcad<>massoud pedram<>
22975<>956_90<>jaewon oh<>multi-pad power/ground network design for uniform distribution of ground bounce<>dac<>massoud pedram<>
22992<>956_107<>pasquale cocchini:gianluca piccinini:maurizio zamboni<>fanout optimization under a submicron transistor-level delay model<>iccad<>massoud pedram<>
22993<>956_108<>diana marculescu:radu marculescu<>trace-driven steady-state probability estimation in fsms with application to power estimation<>date<>massoud pedram<>
23004<>956_119<>jaewon oh<>power reduction in microprocessor chips by gated clock routing<>aspdac<>massoud pedram<>
23006<>956_121<>enrico macii:fabio somenzi<>"high-level power modeling, estimation, and optimization."<>tcad<>massoud pedram<>
23007<>956_122<>diana marculescu:radu marculescu<>theoretical bounds for switching activity analysis in finite-state machines<>islped<>massoud pedram<>
23013<>956_128<>jaewon oh<>gated clock routing minimizing the switched capacitance<>date<>massoud pedram<>
3626<>963_1<>r. m. botting<>a formal and structured approach to the use of task analysis in accident modelling<>ijmms<>chris w. johnson<>
3635<>963_10<>nulo<>on the problems of validating desktopvr<>bcshci<>chris johnson<>
20644<>974_5<>joao gabriel silva<>system-level versus user-defined checkpointing<>srds<>luis moura silva<>
20653<>974_14<>joao gabriel silva<>avoiding checkpoint contamination in parallel systems<>ftcs<>luis moura silva<>
20668<>974_29<>paulo martins:joao gabriel silva<>a java interface for wmpi<>pvm<>luis moura silva<>
30747<>975_4<>andrew v. goldberg<>beyond the flow decomposition barrier<>jacm<>satish rao<>
10227<>986_11<>flavio a. m. cipparrone<>automatic design of nonlinear filters by nearest neighbor learning<>icip<>hae yong kim<>
31988<>988_16<>amin vahdat:michael dahlin:e. belani:david e. culler:p. eastham:chad yoshikawa<>webos: operating system services for wide area applications<>hpdc<>thomas e. anderson<>
32005<>988_33<>dennis c. lee:patrick crowley:jean-loup baer:brian n. bershad<>execution characteristics of desktop applications on windows nt<>isca<>thomas e. anderson<>
11777<>1006_2<>kwang-sik chung:chong-sun hwang<>reducing the rollback on mobile computing environments<>cata<>heon-chang yu<>
3165<>1007_0<>bor-liang chen:hung-lin fu:kuo-ching huang<>a study of the total chromatic number of equibipartite graphs<>dm<>chun-kan cheng<>
15874<>1012_4<>scott kerr:avigdor gal<>information services for the web: building and maintaining domain models<>coopis<>john mylopoulos<>
8219<>1031_1<>nulo<>modelling divergent production: a multi-domain approach<>ecai<>f. pereira<>
8227<>1031_9<>penousal machado:amilcar cardoso<>darwinci: creating bridges to creativity<>sbia<>francisco c. pereira<>
8250<>1037_6<>nulo<>an artificial life model for information retrieval in a distributed environment<>ecai<>f. b. pereira<>
22038<>1047_15<>gunter blache:juergen wirtgen<>on approximation intractability of the bandwidth problem<>eccc<>marek karpinski<>
22046<>1047_23<>nulo<>on the computational power of randomized branching programs<>eccc<>marek karpinski<>
22060<>1047_37<>dima grigoriev<>an exponential lower bound for depth 3 arithmetic circuits<>stoc<>marek karpinski<>
22077<>1047_54<>elias dahlhaus<>matching and multidimensional matching in chordal and strongly chordal graphs<>dam<>marek karpinski<>
22094<>1047_71<>dima grigoriev:andrew chi-chih yao<>an exponential lower bound on the size of algebraic decision trees for max<>cc<>marek karpinski<>
22098<>1047_75<>wenceslas fernandez de la vega<>polynomial time approximation of dense weighted instances of max-cut<>eccc<>marek karpinski<>
22101<>1047_78<>mikael goldmann<>simulating threshold circuits by majority circuits<>siamcomp<>marek karpinski<>
36422<>1067_3<>zhixiong chen:bard ermentrout<>wave propagation mediated by gabab synapse and rebound excitation in an inhibitory network: a reduced model approach<>jcns<>xiao-jing wang<>
36424<>1067_5<>marcelo camperi<>a model of visuospatial working memory in prefrontal cortex: recurrent network and cellular bistability<>jcns<>xiao-jing wang<>
37074<>1068_23<>gerard j. chang:lingling huang<>circular chromatic numbers and fractional chromatic numbers of distance graphs<>ejc<>xuding zhu<>
37087<>1068_36<>nulo<>pattern periodic coloring of distance graphs<>jct<>xuding zhu<>
36426<>1069_1<>claudio bettini:sushil jajodia:jia-ling lin<>discovering frequent event patterns with multiple granularities in time sequences<>tkde<>xiaoyang sean wang<>
33083<>1089_0<>jingchu luo:christoph sensen<>asia pacific bioinformatics network<>gcb<>tin wee tan<>
12230<>1090_7<>nulo<>a relation of primal-dual lattices and the complexity of shortest lattice vector problem<>tcs<>jin-yi cai<>
12237<>1090_14<>nulo<>a new transference theorem and applications to ajtai's connection factor<>eccc<>jin-yi cai<>
38482<>1099_19<>tzu-chieh tien:hsiao-pin su:yu-wen tsay:yih-chih chou<>integrating logic retiming and register placement<>iccad<>youn-long lin<>
38416<>1100_5<>jeu-yih jeng:wai chen<>dynamic resource assignment strategies for pcs data services<>isci<>yi-bing lin<>
38459<>1100_48<>yuguang fang:imrich chlamtac<>channel occupancy times and handoff rate for mobile computing and pcs networks<>tc<>yi-bing lin<>
38500<>1104_1<>nulo<>on ieee 802.14 medium access control protocols<>comsur<>ying-dar jason lin<>
28343<>1109_0<>nuria oliver:alex pentland<>3d modeling of human lip motion<>iccv<>sumit basu<>
28329<>1114_2<>nulo<>on the combinatorial and topological complexity of a single cell<>focs<>saugata basu<>
3328<>1128_12<>anil kumar:vassilis j. tsotras<>designing access methods for bitemporal databases<>tkde<>christos faloutsos<>
5589<>1134_0<>jack brimberg:reuven chen<>accelerating convergence in the fermat-weber location problem<>orl<>doron chen<>
23519<>1173_1<>takeo kanade<>video skimming and characterization through the combination of image and language understanding<>caivd<>michael a. smith<>
23520<>1173_2<>michael g. christel:c. roy taylor:david b. winkler<>evolving video skims into useful multimedia abstractions<>chi<>michael a. smith<>
19375<>1180_6<>david leevers:pedro gil:francisco martinho lopes:joao pereira:jose castro:joao gomes-mota:m. isabel ribeiro:joco g. m. goncalves:vitor sequeira:erik wolfart:vincent dupourque:vitor santos:stuart butterfield:david hogg<>an autonomous sensor for 3d reconstruction<>ecmast<>kia ng<>
1559<>1193_4<>jonathan schaeffer:duane szafron<>experience with parallel programming using code templates<>concurrency<>ajit singh<>
15360<>1204_3<>roberto bruni:ugo montanari:vladimiro sassone<>a comparison of petri net semantics under the collective token philosophy<>asian<>jose meseguer<>
8795<>1218_7<>qinglin yu<>toughness and perfect matchings in graphs<>arscom<>guizhen liu<>
27541<>1230_1<>tomas s. chanev<>simulation optimisation using a genetic algorithm<>simpra<>ray j. paul<>
25618<>1241_0<>jon m. kleinberg:christos h. papadimitriou<>segmentation problems<>stoc<>prabhakar raghavan<>
2143<>1242_1<>mitchell luskin<>nonconforming finite element approximation of crystalline microstructure<>moc<>bo li<>
34300<>1246_2<>rajeev barua:matthew frank:devabhaktuni srikrishna:jonathan babb:vivek sarkar:saman p. amarasinghe<>space-time scheduling of instruction-level parallelism on a raw machine<>asplos<>walter lee<>
34303<>1246_5<>kenneth mackenzie:john kubiatowicz:matthew frank:victor lee:anant agarwal:m. frans kaashoek<>exploiting two-case delivery for fast protected messaging<>hpca<>walter lee<>
34315<>1251_1<>sung deok cha:yong rae kwon<>integration and analysis of use cases using modular petri nets in requirements engineering<>tse<>woo jin lee<>
34309<>1253_4<>elwin lee:nadia magnenat-thalmann<>real face communication in a virtual world<>vw<>won-sook lee<>
19952<>1265_17<>siu-hang or:w. s. luk:irwin king<>an efficient iterative pose estimation algorithm<>ivc<>kin-hong wong<>
19953<>1265_18<>siu-hang or:w. s. luk:irwin king<>an efficient iterative pose estimation algorithm<>accv<>kin-hong wong<>
41211<>1266_0<>hao li:mei lu<>hamiltonicity in 2-connected graphs with claws<>dm<>zhiren sun<>
19958<>1267_4<>jason yuryevich<>optimal power flow method using evolutionary programming<>seal<>kit po wong<>
19959<>1267_5<>an li<>animating the evolution process of genetic algorithms<>seal<>kit po wong<>
41195<>1268_3<>dinesh p. mital:kap luk chan<>a representation for 3-d free-form object recognition<>ivcnz<>zehang sun<>
41175<>1272_1<>charu c. aggarwal:philip s. yu<>online algorithms for finding profile association rules<>cikm<>zheng sun<>
41177<>1272_3<>charu c. aggarwal:philip s. yu<>online generation of profile association rules<>kdd<>zheng sun<>
19908<>1273_3<>kostas kontogiannis:johannes martin:richard gregory:hausi a. muller:john mylopoulos<>code migration through transformations: an experience report<>cascon<>kenny wong<>
41188<>1274_1<>tolga ors:barry g. evans<>atm-over-satellite demonstration of broadband network interconnection<>comcom<>zhili sun<>
41190<>1274_3<>tolga ors:barry g. evans<>an adaptive random-reservation mac protocol to guarantee qos for atm over satellite<>broadband<>zhili sun<>
19846<>1276_5<>benson hin kwong ng:boon toh low<>resolving conflicting arguments under uncertainties<>uai<>kam-fai wong<>
19852<>1276_11<>m. howard williams<>extending the superimposed codeword indexing scheme to handle incomplete information<>kbs<>kam-fai wong<>
19858<>1276_17<>vincent y. lum:wai-ip lam<>chicon - a chinese text manipulation language<>spe<>kam-fai wong<>
9691<>1285_21<>yi-ming chung:marshall ramsey:christopher c. yang<>a smart itsy bitsy spider for the web<>jasis<>hsinchun chen<>
9695<>1285_25<>jay f. nunamaker:richard e. orwig:olga titkova<>information visualization for collaborative computing<>computer<>hsinchun chen<>
9871<>1290_0<>michael a. facello:jie liang<>on the definition and the construction of pockets in macromolecules<>dam<>herbert edelsbrunner<>
12750<>1293_1<>majid sarrafzadeh<>four-bend top-down global routing<>tcad<>jun dong cho<>
12725<>1297_6<>hector garcia-molina:lawrence page<>efficient crawling through url ordering<>cn<>junghoo cho<>
29845<>1306_0<>r. srikant:p. r. kumar<>bounding blocking probabilities and throughput in queueing networks with buffer capacity constraints<>questa<>sunil kumar<>
37935<>1325_0<>ke min zhang<>new upper bounds for ramsey numbers<>ejc<>yi ru huang<>
29622<>1327_8<>shahram ghandeharizadeh<>design of multi-user editing servers for continuous media<>ride<>seon ho kim<>
3744<>1368_0<>kai-chieh liang<>implementation and performance evaluation of a progressive image retrieval system<>spieSR<>c. c. jay kuo<>
3747<>1368_3<>yiliang bao:houng-jyh wang:randy chung<>design of a memory-scalable wavelet-based image codec<>icip<>c. c. jay kuo<>
3751<>1368_7<>xia wan<>an interactive approach to image retrieval using multiple seed images<>icip<>c. c. jay kuo<>
19401<>1382_4<>shaogang chen<>a distributed protocol for multi-class qos provision in noncooperative many-switch systems<>icnp<>kihong park<>
23050<>1403_1<>mani b. srivastava<>behavioral optimization using the manipulation of timing constraints<>tcad<>miodrag potkonjak<>
23051<>1403_2<>inki hong:darko kirovski:gang qu:mani b. srivastava<>power optimization of variable voltage core-based systems<>dac<>miodrag potkonjak<>
1445<>1410_1<>zoran duric:ehud rivlin<>understanding object motion of tools and vehicles<>iccv<>azriel rosenfeld<>
1446<>1410_2<>david s. doermann:ehud rivlin<>the function of documents<>ivc<>azriel rosenfeld<>
1451<>1410_7<>zoran duric:ehud rivlin<>understanding object motion<>ivc<>azriel rosenfeld<>
2597<>1418_0<>soam acharya<>compressed domain transcoding of mpeg<>icmcs<>brian c. smith<>
29592<>1432_0<>fred s. roberts<>the elimination procedure for the competition number<>arscom<>suh-ryung kim<>
23205<>1433_0<>yoshio tanaka:motohiko matsuda:makoto ando:kazuto kubota<>compas: a pentium pro pc-based smp cluster and its experience<>ipps<>mitsuhisa sato<>
23211<>1433_6<>hidemoto nakada:hiromitsu takagi:satoshi matsuoka:umpei nagashima:satoshi sekiguchi<>utilizing the metaserver architecture in the ninf global computing system<>hpcn<>mitsuhisa sato<>
23220<>1433_15<>kazuto kubota:ken'ichi itakura:taisuke boku<>practical simulation of large-scale parallel programs and its performance analysis of the nas parallel benchmarks<>europar<>mitsuhisa sato<>
16178<>1441_52<>james a. storer<>optimal lossless compression of a class of dynamic sources<>dcc<>john h. reif<>
16201<>1441_75<>hillel gazit<>a randomized parallel algorithm for planar graph isomorphism<>jal<>john h. reif<>
13125<>1465_4<>henri casanova<>using agent-based software for scientific computing in the netsolve system<>pc<>jack dongarra<>
13139<>1465_18<>ronald f. boisvert:roldan pozo:karin a. remington:g. w. stewart<>developing numerical libraries in java<>corr<>jack dongarra<>
13148<>1465_27<>jerzy wasniewski<>high performance linear algebra package lapack90<>ipps<>jack dongarra<>
13158<>1465_37<>ronald f. boisvert:roldan pozo:karin a. remington:g. w. stewart<>developing numerical libraries in java<>concurrency<>jack dongarra<>
13167<>1465_46<>frederic desprez:antoine petitet:cyril randriamaro:yves robert<>scheduling block-cyclic array redistribution<>tpds<>jack dongarra<>
13173<>1465_52<>joel h. saltz:alan sussman:susan l. graham:james demmel:scott b. baden<>programming tools and environments<>cacm<>jack dongarra<>
13186<>1465_65<>mauro migliardi:al geist:vaidy s. sunderam<>dynamic reconfiguration and virtual machine management in the harness metacomputing system<>iscope<>jack dongarra<>
13198<>1465_77<>frederic desprez:stephane domas:antoine petitet:cyril randriamaro:yves robert<>more on scheduling block-cyclic array redistribution<>lcr<>jack dongarra<>
13209<>1465_88<>james s. plank:henri casanova:micah beck<>deploying fault-tolerance and task migration with netsolve<>para<>jack dongarra<>
13252<>1465_131<>frederic desprez:fabrice rastello:yves robert<>determining the idle time of a tiling: new results<>jise<>jack dongarra<>
13266<>1465_145<>shirley browne:jeff horner:paul mcmahan:scott wells<>technologies for repository interoperation and access control<>dl<>jack dongarra<>
20603<>1466_0<>john g. cleary<>constructive negation using typed existence properties<>plilp<>lunjin lu<>
19304<>1482_2<>weiyi meng:clement t. yu:xiaodong wang:yuhsi chang:naphtali rishe<>determining text databases to search in the internet<>vldb<>king-lup liu<>
30223<>1485_18<>thyagarajan nandagopal:vaduvur bharghavan<>a wireless fair service algorithm for packet cellular networks<>mobicom<>songwu lu<>
9008<>1492_23<>agostino dovier:carla piazza:enrico pontelli<>on the representation and management of finite sets in clp languages<>iclp<>gianfranco rossi<>
9017<>1494_4<>alicia diaz:silvia e. gordillo:mauricio sansano:federico arambarri<>querying hypermedia applications in an object-oriented framework<>iadt<>gustavo rossi<>
12865<>1499_14<>lei he<>an efficient technique for device and interconnect optimization in deep submicron designs<>ispd<>jason cong<>
12873<>1499_22<>chang wu<>optimal fpga mapping and retiming with efficient initial state computation<>dac<>jason cong<>
12882<>1499_31<>songjie xu<>delay-optimal technology mapping for fpgas with heterogeneous luts<>dac<>jason cong<>
12890<>1499_39<>andrew b. kahng:kwok-shing leung<>efficient algorithms for the minimum shortest path steiner arborescence problem with applications to vlsi physical design<>tcad<>jason cong<>
12891<>1499_40<>songjie xu<>technology mapping for fpgas with embedded memory blocks<>fpga<>jason cong<>
12904<>1499_53<>songjie xu<>delay-oriented technology mapping for heterogeneous fpgas with bounded resources<>iccad<>jason cong<>
12919<>1499_68<>patrick h. madden<>performance driven multi-layer general area routing for pcb/mcm designs<>dac<>jason cong<>
12942<>1499_91<>andrew b. kahng:cheng-kok koh:chung-wen albert tsao<>bounded-skew clock and steiner routing<>todaes<>jason cong<>
12945<>1499_94<>darko kirovski:yean-yow hwang:miodrag potkonjak<>intellectual property protection by watermarking combinational logic synthesis solutions<>iccad<>jason cong<>
12949<>1499_98<>sung kyu lim<>multiway partitioning with pairwise movement<>iccad<>jason cong<>
12952<>1499_101<>yean-yow hwang<>boolean matching for complex plbs in lut-based fpgas with application to architecture evaluation<>fpga<>jason cong<>
12972<>1499_121<>chang wu<>an efficient algorithm for performance-optimal fpga technology mapping with retiming<>tcad<>jason cong<>
7626<>1520_13<>balachander krishnamurthy:jennifer rexford<>evaluating server-assisted cache replacement in the web<>esa<>edith cohen<>
7632<>1520_19<>balachander krishnamurthy:jennifer rexford<>improving end-to-end performance of the web using server volumes and proxy filters<>sigcomm<>edith cohen<>
7658<>1520_45<>nulo<>structure prediction and computation of sparse matrix products<>jco<>edith cohen<>
5042<>1521_0<>eric n. hanson:i.-cheng chen:roxana dastur:kurt engel:vijay ramaswamy:wendy tan<>a flexible and recoverable client/server database event notification system<>vldb<>chun xu<>
5031<>1522_1<>dzung l. pham:jerry l. prince:maryam e. etemad:daphne n. yu<>reconstruction of the central layer of the human cerebral cortex from mr images<>miccai<>chenyang xu<>
5035<>1522_5<>jerry l. prince<>"snakes, shapes, and gradient vector flow."<>tip<>chenyang xu<>
5003<>1523_7<>yibing nie<>relaxed implementation of spectral methods for graph partitioning<>irregular<>cheng-zhong xu<>
8173<>1532_0<>xiao-tao chen:fred j. meyer<>structural diagnosis of interconnects by coloring<>todaes<>fabrizio lombardi<>
8185<>1532_12<>wenyi feng:fred j. meyer:wei-kang huang<>on the complexity of sequential testing in configurable fpgas<>dft<>fabrizio lombardi<>
8192<>1532_19<>wenyi feng:wei-kang huang:fred j. meyer<>fault detection in a tristate system environment<>ats<>fabrizio lombardi<>
8203<>1532_30<>yinlei yu:jian xu:wei-kang huang<>a diagnosis method for interconnects in sram based fpgas<>ats<>fabrizio lombardi<>
8210<>1532_37<>nulo<>field-programmable gate arrays<>dt<>fabrizio lombardi<>
8216<>1532_43<>avinash munshi:fred j. meyer<>a new method for testing eepla's<>dft<>fabrizio lombardi<>
28860<>1544_4<>robert castaneda:jiangtao yan:rimli sengupta<>"comparative performance evaluation of routing protocols for mobile, ad hoc."<>icccn<>samir ranjan das<>
28870<>1544_14<>saman desilva<>experimental evaluation of channel state dependent scheduling in an in-building wireless lan<>icccn<>samir ranjan das<>
18931<>1553_4<>nulo<>amortized constant relaxed rebalancing using standard rotations<>acta<>kim s. larsen<>
18954<>1553_27<>peter hoyer<>parametric permutation routing via matchings<>njc<>kim s. larsen<>
18959<>1553_32<>nulo<>sort order problems in relational databases<>ijfcs<>kim s. larsen<>
18989<>1554_21<>jorn lind-nielsen:henrik reif andersen:gerd behrmann:henrik hulgaard:kare j. kristoffersen<>verification of large state/event systems using compositionality and dependency analysis<>tacas<>kim guldstrand larsen<>
19006<>1554_38<>francois laroussinie<>cmc: a tool for compositional model-checking of real-time systems<>forte<>kim guldstrand larsen<>
19008<>1554_40<>luca aceto:augusto burgueno<>model checking via reachability testing for timed automata<>tacas<>kim guldstrand larsen<>
19016<>1554_48<>luca aceto:patricia bouyer:augusto burgueno<>the power of reachability testing for timed automata<>fsttcs<>kim guldstrand larsen<>
19135<>1556_4<>jason cong:andrew b. kahng<>efficient algorithms for the minimum shortest path steiner arborescence problem with applications to vlsi physical design<>tcad<>kwok-shing leung<>
28208<>1573_2<>hong-ju moon:hong seong park:wook hyun kwon<>performance degradation of the ieee 802.4 token bus network in a noisy environment<>comcom<>sang chul ahn<>
17955<>1585_0<>vasant honavar<>feature subset selection using a genetic algorithm<>expert<>jihoon yang<>
17960<>1587_4<>cheng-yan kao<>an evolutionary algorithm for synthesizing optical thin-film designs<>ppsn<>jinn-moon yang<>
17963<>1587_7<>jorng-tzong horng:cheng-yan kao<>a new evolutionary approach to developing neural autonomous agents<>icra<>jinn-moon yang<>
10711<>1596_15<>r. ravi<>approximating maximum leaf spanning trees in almost linear time<>jal<>hsueh-i lu<>
10774<>1597_1<>chung-ming chen:i.-h. yang<>cross-reference weighted least square estimates for positron emission tomography<>tmi<>henry horng-shing lu<>
37432<>1611_0<>yung-yu chen:li-chen fu<>multi-agent based dynamic scheduling for a flexible assembly system<>icra<>yu-chien chen<>
37398<>1615_13<>haroon a. babri:t. yin<>improving backpropagation learning under limited precision<>prl<>yan qiu chen<>
37423<>1617_2<>songde ma<>hierarchical segmentation and representation with dynamic link architecture neural network<>accv<>yunqiang chen<>
13778<>1619_36<>nulo<>a comprehensive interface definition framework for software components<>apsec<>jun han<>
30516<>1627_15<>michael a. bender:soumen chakrabarti<>flow and stretch metrics for scheduling continuous job streams<>soda<>s. muthukrishnan<>
30542<>1627_41<>nulo<>randomization in parallel stringology<>ipps<>s. muthukrishnan<>
30552<>1627_51<>yossi matias:suleyman cenk sahinalp:jacob ziv<>"augmenting suffix trees, with applications."<>esa<>s. muthukrishnan<>
30556<>1627_55<>martin farach:paolo ferragina<>overcoming the memory bottleneck in suffix tree construction<>focs<>s. muthukrishnan<>
30564<>1627_63<>rajmohan rajaraman<>an adversarial model for distributed dynamic load balancing<>spaa<>s. muthukrishnan<>
30579<>1627_78<>h. v. jagadish:nick koudas:viswanath poosala:kenneth c. sevcik:torsten suel<>optimal histograms with quality guarantees<>vldb<>s. muthukrishnan<>
30581<>1627_80<>sanjeev khanna:mike paterson<>on approximating rectangle tiling and packing<>soda<>s. muthukrishnan<>
30587<>1627_86<>swarup acharya<>scheduling on-demand broadcasts: new metrics and algorithms<>mobicom<>s. muthukrishnan<>
30621<>1627_120<>maxime crochemore:leszek gasieniec:ramesh hariharan:wojciech rytter<>a constant time optimal parallel algorithm for two-dimensional pattern matching<>siamcomp<>s. muthukrishnan<>
23742<>1638_6<>peter stone<>using decision tree confidence factors for multi-agent control<>agents<>manuela m. veloso<>
23743<>1638_7<>karen zita haigh<>"planning, execution and learning in a robotic agent."<>aips<>manuela m. veloso<>
23747<>1638_11<>peter stone<>"communication in domains with unreliable, single-channel, low-bandwidth communication."<>crw<>manuela m. veloso<>
23749<>1638_13<>peter stone<>task decomposition and dynamic role assignment for real-time strategic teamwork<>atal<>manuela m. veloso<>
23750<>1638_14<>karen zita haigh<>interleaving planning and robot execution for asynchronous user requests<>arobots<>manuela m. veloso<>
23756<>1638_20<>karen zita haigh<>learning situation-dependent costs: improving planning from probabilistic robot execution<>agents<>manuela m. veloso<>
37778<>1646_0<>nulo<>a new decoding algorithm for complete decoding of linear block codes<>siamdm<>yunghsiang s. han<>
37779<>1646_1<>carlos r. p. hartmann:kishan g. mehrotra<>decoding linear block codes using a priority-first search : performance analysis and suboptimal version<>tit<>yunghsiang s. han<>
29075<>1659_1<>f. javier lerch:nick v. flor:mark fichman<>software reuse and competition: consumer preferences in a software component market<>ansoft<>se-joon hong<>
25727<>1682_4<>justy w. c. wong:oscar c. au:alexis m. tourapis<>predictive motion estimation for reduced-resolution video from high-resolution compressed video<>icip<>peter h. w. wong<>
6752<>1690_13<>nulo<>trace-based abstract interpretation of operational semantics<>lisp<>david a. schmidt<>
6667<>1691_1<>david l. levine:sumedh mungee<>the design of the tao real-time object request broker<>comcom<>douglas c. schmidt<>
6675<>1691_9<>sumedh mungee:sergio flores-gaitan:aniruddha s. gokhale<>alleviating priority inversion and non-determinism in real-time corba orb core architectures<>rtas<>douglas c. schmidt<>
6715<>1691_49<>prashant jain:seth widoff<>the design and performance of medjava<>coots<>douglas c. schmidt<>
18738<>1701_1<>bor-liang chen:chun-kan cheng:hung-lin fu<>a study of the total chromatic number of equibipartite graphs<>dm<>kuo-ching huang<>
11219<>1705_1<>mei han:richard szeliski<>interactive construction of 3d models from panoramic mosaics<>cvpr<>heung-yeung shum<>
11222<>1705_4<>richard szeliski:simon baker:mei han:p. anandan<>interactive 3d modeling from multiple images using scene regularities<>smile<>heung-yeung shum<>
16982<>1706_3<>min fang:narayanan shivakumar:hector garcia-molina:rajeev motwani<>computing iceberg queries efficiently<>vldb<>jeffrey d. ullman<>
16989<>1706_10<>shalom tsur:serge abiteboul:chris clifton:rajeev motwani:svetlozar nestorov:arnon rosenthal<>query flocks: a generalization of association-rule mining<>sigmod<>jeffrey d. ullman<>
16992<>1706_13<>craig silverstein:sergey brin:rajeev motwani<>scalable techniques for mining causal structures<>vldb<>jeffrey d. ullman<>
33656<>1707_3<>kiran bondalapati<>mapping loops onto reconfigurable architectures<>fpl<>viktor k. prasanna<>
33692<>1707_39<>jinwoo suh<>portable implementation of real-time signal processing benchmarks on hpc platforms<>para<>viktor k. prasanna<>
33704<>1707_51<>yongwha chung<>parallelizing image feature extraction on coarse-grain machines<>pami<>viktor k. prasanna<>
37951<>1727_0<>guoren wang:akifumi makinouchi<>dynamic parallel query processing for distributed objects<>dexaw<>yun jiang<>
29827<>1744_4<>christopher b. wilkerson<>exploiting spatial locality in data caches using spatial footprints<>isca<>sanjeev kumar<>
29832<>1744_9<>carl bruggeman:r. kent dybvig<>threads yield continuations<>lisp<>sanjeev kumar<>
33249<>1745_0<>nulo<>the secure remote password protocol<>ndss<>thomas d. wu<>
33243<>1759_1<>trevor hastie:scott c. schmidler:douglas l. brutlag<>regression analysis of multiple protein structures<>recomb<>thomas d. wu<>
33245<>1759_3<>scott c. schmidler:trevor hastie:douglas l. brutlag<>regression analysis of multiple protein structures<>jcb<>thomas d. wu<>
14521<>1761_1<>jin ho kwak:jang-ho chun<>enumeration of regular graph coverings having finite abelian covering transformation groups<>siamdm<>jaeun lee<>
14524<>1761_4<>jin ho kwak<>isomorphism classes of bipartite cycle permutation graphs<>arscom<>jaeun lee<>
14525<>1761_5<>rongquan feng:jin ho kwak:juyoung kim<>isomorphism classes of concrete graph coverings<>siamdm<>jaeun lee<>
14531<>1763_0<>jin seek choi:chong kwan un<>performance analysis of an input queueing atm switch with two priority classes<>pe<>jang wong lee<>
14491<>1769_0<>samuel p. midkiff:david a. padua<>a constant propagation algorithm for explicitly parallel programs<>ijpp<>jaejin lee<>
41112<>1783_48<>henny sipma<>deductive verification of hybrid systems using step<>hybrid<>zohar manna<>
3912<>1784_0<>nulo<>a family of quasiprimitive 2-arc transitive graphs which have non-quasiprimitive full automorphism groups<>ejc<>cai heng li<>
3917<>1784_5<>nulo<>the solution of a problem of godsil on cubic cayley graphs<>jct<>cai heng li<>
3920<>1784_8<>marston d. e. conder<>on isomorphisms of finite cayley graphs<>ejc<>cai heng li<>
3923<>1784_11<>cheryl e. praeger:ming yao xu<>isomorphisms of finite cayley digraphs of bounded valency<>jct<>cai heng li<>
3931<>1784_19<>xin gui fang:cheryl e. praeger<>on orbital regular graphs and frobenius graphs<>dm<>cai heng li<>
3932<>1784_20<>nulo<>"on isomorphisms of connected cayley graphs, ii."<>jct<>cai heng li<>
3947<>1789_3<>ramana yerneni:vasilis vassalos:hector garcia-molina:yannis papakonstantinou:jeffrey d. ullman:murty valiveti<>capability based mediation in tsimmis<>sigmod<>chen li<>
3949<>1789_5<>edward y. chang:hector garcia-molina<>2d bubbleup: managing parallel disks for media servers<>fodo<>chen li<>
3987<>1790_3<>roland wilson<>image segmentation based on a multiresolution bayesian framework<>icip<>chang-tsun li<>
8872<>1796_66<>nulo<>control volume meshes using sphere packing<>irregular<>gary l. miller<>
4153<>1804_1<>j. k. lee:y.-w. chang:w.-k. shih<>real-time gang schedulings with workload models for parallel computers<>icpads<>c.-d. lin<>
1486<>1816_4<>edward a. lee<>a framework for comparing models of computation<>tcad<>alberto l. sangiovanni-vincentelli<>
27702<>1822_1<>david w. embley:douglas m. campbell:stephen w. liddle<>ontology-based extraction and structuring of information from data-rich unstructured documents<>cikm<>randy d. smith<>
27703<>1822_2<>david w. embley:douglas m. campbell:y. s. jiang:stephen w. liddle:yiu-kai ng:dallan quass<>a conceptual-modeling approach to extracting data from the web<>er<>randy d. smith<>
27699<>1824_8<>ranald hixon:bernard horan<>supporting flexible roles in a shared space<>cscw<>randall b. smith<>
11816<>1841_1<>vijay kumar:james p. ostrowski<>motion planning with uncertainty<>icra<>hong zhang<>
37449<>1854_3<>spiros mancoridis:brian s. mitchell:c. rorres:emden r. gansner<>using automatic clustering to produce high-level system organizations of source code<>iwpc<>yih-farn chen<>
38954<>1870_16<>eyal kushilevitz<>computation in noisy radio networks<>soda<>yishay mansour<>
38992<>1870_54<>michael j. kearns<>exact inference of hidden structure from sample data in noisy-or networks<>uai<>yishay mansour<>
39001<>1870_63<>boaz patt-shamir<>jitter control in qos networks<>focs<>yishay mansour<>
39007<>1870_69<>michal parnas<>learning conjunctions with noise under product distributions<>ipl<>yishay mansour<>
39010<>1870_72<>amotz bar-noy:baruch schieber<>competitive dynamic bandwidth allocation<>podc<>yishay mansour<>
39020<>1870_82<>eyal kushilevitz:michael o. rabin:david zuckerman<>lower bounds for randomized mutual exclusion<>siamcomp<>yishay mansour<>
39037<>1870_99<>baruch awerbuch:israel cidon:shay kutten:david peleg<>optimal broadcast with partial knowledge<>siamcomp<>yishay mansour<>
17809<>1882_0<>james allan:james p. callan:mark sanderson:steven wegmann<>inquery and trec-7<>trec<>jinxi xu<>
17810<>1882_1<>james p. callan<>effective retrieval with distributed collections<>sigir<>jinxi xu<>
17805<>1884_3<>alexander b. romanovsky:brian randell<>coordinated exception handling in distributed object systems: from model to system implementation<>icdcs<>jie xu<>
17764<>1887_4<>danny z. chen<>an efficient direct approach for computing shortest rectilinear paths among obstacles in a two-layer interconnection model<>cccg<>jinhui xu<>
17782<>1887_22<>danny z. chen:ovidiu daescu:xiaobo hu<>finding an optimal path without growing the tree<>esa<>jinhui xu<>
2935<>1891_3<>helder araujo:rodrigo l. carceroni<>a fully projective formulation to improve the accuracy of lowe's pose-estimation algorithm<>cviu<>christopher m. brown<>
32427<>1898_10<>andras frank:hiroshi nagamochi<>two arc-disjoint paths in eulerian digraphs<>siamdm<>toshihide ibaraki<>
32430<>1898_13<>kazuhisa makino<>a fast and simple algorithm for identifying 2-monotonic positive boolean functions<>jal<>toshihide ibaraki<>
32436<>1898_19<>hiroshi nagamochi<>polyhedral structure of submodular and posi-modular systems<>isaac<>toshihide ibaraki<>
32438<>1898_21<>thomas eiter:kazuhisa makino<>on disguised double horn functions and extensions<>stacs<>toshihide ibaraki<>
32467<>1898_50<>thomas eiter:kazuhisa makino<>double horn functions<>iandc<>toshihide ibaraki<>
3508<>1906_0<>daniel hagimont<>mutual suspicion in a generic object-support system<>ecoopw<>christian damsgaard jensen<>
3512<>1906_4<>george coulouris:daniel hagimont<>ecoop workshop on distributed object security<>ecoopw<>christian damsgaard jensen<>
3525<>1906_17<>daniel hagimont<>protection reconfiguration for reusable software<>csmr<>christian damsgaard jensen<>
3563<>1907_35<>michael h. bohlen:renato busatto<>point-versus interval-based temporal data models<>icde<>christian s. jensen<>
3568<>1907_40<>kristian torp:leo mark<>efficient differential timeslice computation<>tkde<>christian s. jensen<>
3577<>1907_49<>kristian torp:richard t. snodgrass<>stratum approaches to temporal dbms implementation<>ideas<>christian s. jensen<>
3590<>1907_62<>vassilis j. tsotras:richard t. snodgrass<>an extensible notation for spatiotemporal index queries<>sigmod<>christian s. jensen<>
3609<>1907_81<>rasa bliujute:simonas saltenis:giedrius slivinskas<>r-tree based indexing of now-relative bitemporal data<>vldb<>christian s. jensen<>
3610<>1907_82<>torben bach pedersen<>research issues in clinical data warehousing<>ssdbm<>christian s. jensen<>
3616<>1907_88<>michael h. bohlen:bjorn skjellaug<>spatio-temporal database support for legacy applications<>sac<>christian s. jensen<>
27298<>1917_0<>anthony s. fong:derek chi-wai pao<>architecture support of a descriptor computer on object-orientation<>cata<>richard c. li<>
16402<>1934_5<>jitendra malik<>motion segmentation and tracking using normalized cuts<>iccv<>jianbo shi<>
9474<>1943_9<>torben hagerup<>tree decompositions of small diameter<>mfcs<>hans l. bodlaender<>
9513<>1943_48<>jitender s. deogun:klaus jansen:ton kloks:dieter kratsch:haiko muller:zsolt tuza<>rankings of graphs<>siamdm<>hans l. bodlaender<>
9516<>1943_51<>nulo<>a partial -arboretum of graphs with bounded treewidth<>tcs<>hans l. bodlaender<>
9565<>1943_100<>torben hagerup<>parallel algorithms with optimal speedup for bounded treewidth<>siamcomp<>hans l. bodlaender<>
9573<>1943_108<>ton kloks:dieter kratsch:haiko muller<>treewidth and minimum fill-in on d-trapezoid graphs<>jgaa<>hans l. bodlaender<>
9584<>1943_119<>jens gustedt:jan arne telle<>linear-time register allocation for a fixed number of registers<>soda<>hans l. bodlaender<>
26317<>1945_6<>per-ake larson<>solving local cost estimation problem for global query optimization in multidatabase systems<>dpd<>qiang zhu<>
26320<>1945_9<>ying chen:nengbin wang<>query processing with quality control in the world wide web<>www<>qiang zhu<>
26337<>1945_26<>d. h. h. yoon:v. mohanram:j. cheng<>obj-net: an object oriented system design tool<>jsi<>q. zhu<>
26341<>1945_30<>brian dunkel:nandit soparkar:suyun chen:berni schiefer:tony lai<>a piggyback method to collect statistics for query optimization in database management systems<>cascon<>qiang zhu<>
34893<>1954_18<>joseph robert horgan:saul london:aditya p. mathur<>effect of test set minimization on fault detection effectiveness<>spe<>w. eric wong<>
34915<>1954_40<>hiralal agrawal:james l. alberi:joseph robert horgan:j. jenny li:saul london:sudipto ghosh:norman wilde<>mining system tests to aid software maintenance<>computer<>w. eric wong<>
9196<>1961_17<>james ze wang:jia li:oscar firschein<>classifying objectionable websites based on image content<>idms<>gio wiederhold<>
9206<>1961_27<>michel bilello<>protecting inappropriate release of data from realistic databases<>dexaw<>gio wiederhold<>
9218<>1961_39<>james ze wang:jia li:oscar firschein<>system for screening objectionable images<>comcom<>gio wiederhold<>
11960<>1967_23<>d. f. wong<>optimal river routing with crosstalk constraints<>todaes<>hai zhou<>
11969<>1967_32<>d. f. wong<>global routing with crosstalk constraints<>dac<>hai zhou<>
11974<>1967_37<>anuj goel:khurram sajid:adnan aziz:vigyan singhal<>bdd based procedures for a theory of equality with uninterpreted functions<>cav<>hai zhou<>
4698<>1978_0<>gerard g. medioni<>extremal feature extraction from 3-d vector and noisy scalar fields<>visualization<>chi-keung tang<>
8042<>1981_0<>won-sook lee:nadia magnenat-thalmann<>real face communication in a virtual world<>vw<>elwin lee<>
4664<>1995_10<>chin lung lu<>solving the weighted efficient edge domination problem on bipartite permutation graphs<>dam<>chuan yi tang<>
4665<>1995_11<>wen-jer wu:wen-huei chen<>synchronizable test sequence for multi-party protocol conformance testing<>comcom<>chuan yi tang<>
4674<>1995_20<>bang ye wu:giuseppe lancia:vineet bafna:kun-mao chao:r. ravi<>a polynomial time approximation scheme for minimum routing cost spanning trees<>soda<>chuan yi tang<>
4676<>1995_22<>bor-kuan lu:fang-rong hsu<>guarding in a simple polygon<>cccg<>chuan yi tang<>
27890<>1997_0<>peyman oreizy<>on the role of software architectures in runtime system reconfiguration<>iee<>richard n. taylor<>
27902<>1997_12<>peyman oreizy:nenad medvidovic<>architecture-based runtime software evolution<>icse<>richard n. taylor<>
27903<>1997_13<>roy t. fielding:e. james whitehead jr.:kenneth m. anderson:gregory alan bolcer:peyman oreizy<>web-based development of complex information products<>cacm<>richard n. taylor<>
27930<>1997_40<>gregory alan bolcer<>advanced workflow management technologies<>sopr<>richard n. taylor<>
4449<>2006_0<>michael m. richter:rolf wiehagen:thomas zeugmann<>editor's introduction<>alt<>carl h. smith<>
4422<>2008_12<>lloyd g. williams<>performance engineering models of corba-based distributed-object systems<>cmg<>connie u. smith<>
4434<>2008_24<>lloyd g. williams<>performance evaluation of distributed software architectures<>cmg<>connie u. smith<>
4448<>2014_0<>carl singer<>teaching teachers to teach with technology while encouraging students to look forward to college: a case study of learner-centered training<>siguccs<>carol l. smith<>
29472<>2020_3<>behzad dariush:keith waters<>"spatiotemporal analysis of face profiles: detection, segmentation, and registration."<>fgr<>sing bang kang<>
29491<>2020_22<>nulo<>hands-free navigation in vr environments by tracking the head<>ijmms<>sing bing kang<>
29499<>2020_30<>pavan k. desikan<>virtual navigation of complex scenes using clusters of cylindrical panoramic images<>graphicsinterface<>sing bing kang<>
27989<>2029_1<>john c. bernard:warren hall:robert either:timothy mount:william schulze:ray zimmerman:david gan:carlos murillo-sanchez:richard e. schuler<>experimental results for single period auctions<>hicss<>robert j. thomas<>
27995<>2029_7<>ray zimmerman:deqiang gan:carlos murillo-sanchez<>an internet-based platform for testing generation scheduling auctions<>hicss<>robert j. thomas<>
27997<>2029_9<>carlos murillo-sanchez<>thermal unit commitment including optimal ac power flow constraints<>hicss<>robert j. thomas<>
27941<>2033_2<>nulo<>industry experience in migrating to object technology<>tools<>richard thomas<>
14385<>2036_0<>jin-hyuk yang:byoung-woon kim:sang-jun nam:jang-ho cho:sung-won seo:chang-ho ryu:young-su kwon:dae-hyun lee:jong-yeol lee:jong-sun kim:hyun-dhong yoon:jae-yeol kim:kun-moo lee:chan-soo hwang:in-hyung kim:kwang-il park:kyu ho park:yong-hoon lee:seung ho hwang:in-cheol park:chong-min kyung<>metacore: an application specific dsp development system<>dac<>jun sung kim<>
39859<>2040_0<>chengzheng sun:yanchun zhang:xiaohua jia<>a web-based real-time cooperative editor in java<>webnet<>yun yang<>
39875<>2040_16<>nulo<>issues on supporting distributed software processes<>ewspt<>yun yang<>
39892<>2040_33<>nulo<>mechanisms for web-based visualised teamwork support<>webnet<>yun yang<>
39895<>2040_36<>chengzheng sun:xiaohua jia:yanchun zhang:david chen<>"achieving convergence, causality preservation, and intention preservation in real-time cooperative editing systems."<>tochi<>yun yang<>
39837<>2041_14<>jaime g. carbonell:ralf d. brown:robert e. frederking<>translingual information retrieval: learning from bilingual corpora<>ai<>yiming yang<>
39822<>2044_5<>zhonghua yang:chengzheng sun:abdul sattar<>guaranteed mutually consistent checkpointing in distributed computations<>asian<>yanyan yang<>
12037<>2049_10<>tsong-min chen:chiang lee<>performance evaluation of forwarding strategies for location management in mobile networks<>cj<>ing-ray chen<>
12039<>2049_12<>sheng-tzong cheng:chi-ming chen<>a study of self-adjusting quality of service control schemes<>wsc<>ing-ray chen<>
12047<>2049_20<>tsong-min chen:chiang lee<>agent-based forwarding strategies for reducing location management cost in mobile networks<>icpads<>ing-ray chen<>
32171<>2060_1<>ing-ray chen:chiang lee<>performance evaluation of forwarding strategies for location management in mobile networks<>cj<>tsong-min chen<>
32172<>2060_2<>ing-ray chen:chiang lee<>agent-based forwarding strategies for reducing location management cost in mobile networks<>icpads<>tsong-min chen<>
24454<>2083_10<>robert p. dick<>cords: hardware-software co-synthesis of reconfigurable real-time distributed embedded systems<>iccad<>niraj k. jha<>
24497<>2083_53<>ganesh lakshminarayana<>synthesis of power-optimized and area-optimized circuits from hierarchical behavioral descriptions<>dac<>niraj k. jha<>
24500<>2083_56<>srivaths ravi:ganesh lakshminarayana<>removal of memory access bottlenecks for scheduling control-flow intensive behavioral descriptions<>iccad<>niraj k. jha<>
24541<>2083_97<>srivaths ravi:ganesh lakshminarayana<>tao: regular expression based high-level testability analysis and optimization<>itc<>niraj k. jha<>
24544<>2083_100<>ganesh lakshminarayana<>: a framework for the application of throughput and power optimizing transformations to control-flow intensive behavioral descriptions<>dac<>niraj k. jha<>
24550<>2083_106<>kamal s. khouri:ganesh lakshminarayana<>impact: a high-level synthesis system for low power control-flow intensive circuits<>date<>niraj k. jha<>
24566<>2083_122<>indradeep ghosh<>high-level test synthesis: a survey<>integration<>niraj k. jha<>
24571<>2083_127<>bharat p. dave<>casper: concurrent hardware-software co-synthesis of hard real-time aperiodic and periodic specifications of embedded system architectures<>date<>niraj k. jha<>
24575<>2083_131<>ganesh lakshminarayana:anand raghunathan<>incorporating speculative execution into scheduling of control-flow intensive behavioral descriptions<>dac<>niraj k. jha<>
24582<>2083_138<>ganesh lakshminarayana:anand raghunathan:sujit dey<>transforming control-flow intensive designs to facilitate power management<>iccad<>niraj k. jha<>
24588<>2083_144<>indradeep ghosh:anand raghunathan<>a design-for-testability technique for register-transfer level circuits using control/data flow extraction<>tcad<>niraj k. jha<>
24600<>2083_156<>indradeep ghosh:sudipta bhawmik<>a bist scheme for rtl controller-data paths based on symbolic testability analysis<>dac<>niraj k. jha<>
24612<>2083_168<>bharat p. dave<>cohra: hardware-software co-synthesis of hierarchical distributed embedded system architectures<>vlsid<>niraj k. jha<>
40989<>2126_6<>jincheng huang:yao wang<>integration of audio and visual information for content-based video segmentation<>icip<>zhu liu<>
4175<>2133_1<>michael p. wellman<>using qualitative relationships for bounding probability distributions<>uai<>chao-lin liu<>
4180<>2133_6<>michael p. wellman<>incremental tradeoff resolution in qualitative probabilistic networks<>uai<>chao-lin liu<>
40930<>2152_4<>zhi-li zhang:donald f. towsley<>closed-form deterministic end-to-end performance bounds for the generalized processor sharing scheduling discipline<>jco<>zhen liu<>
40931<>2152_5<>alain jean-marie:sophie lefebvre-barbaroux<>an analytical approach to the performance evaluation of master-slave computational models<>pc<>zhen liu<>
40932<>2152_6<>nulo<>performance analysis of stochastic timed petri nets using linear programming approach<>tse<>zhen liu<>
40937<>2152_11<>nulo<>worst-case analysis of scheduling heuristics of parallel systems<>pc<>zhen liu<>
41602<>2157_1<>linzhong liu:jianxun zhang:jianfang wang<>on the relations between arboricity and independent number or covering number<>dam<>zhongfu zhang<>
31234<>2180_3<>stephen y. chen<>"putting the ""genetics"" back into genetic algorithms (reconsidering the role of crossover in hybrid operators)."<>foga<>stephen f. smith<>
31248<>2180_17<>amedeo cesta:angelo oddi<>scheduling multi-capacitated resources under complex temporal constraints<>cp<>stephen f. smith<>
41267<>2183_6<>wei wang:george j. klir<>genetic algorithms for determining fuzzy measures from data<>jifs<>zhenyuan wang<>
40178<>2192_2<>sushil j. louis<>an empirical comparison of randomized algorithms for large join query optimization<>flairs<>yongmian zhang<>
40142<>2193_22<>norman y. foo<>updating logic programs<>ecai<>yan zhang<>
40152<>2193_32<>nulo<>representing defeasible constraints and observations in action theories<>ausai<>yan zhang<>
4284<>2226_0<>sankar k. pal:sanghamitra bandyopadhyay<>genetic algorithms for generation of class boundaries<>tsmc<>c. a. murthy<>
4286<>2226_2<>sanghamitra bandyopadhyay:sankar k. pal<>pattern classification using genetic algorithms: determination of h<>prl<>c. a. murthy<>
4287<>2226_3<>suman k. mitra:malay kumar kundu<>technique for fractal image compression using genetic algorithm<>tip<>c. a. murthy<>
4294<>2226_10<>jennifer pittman<>multilayer perceptrons and fractals<>isci<>c. a. murthy<>
4297<>2226_13<>suman k. mitra:malay kumar kundu<>a study on partitioned iterative function systems for image compression<>fuin<>c. a. murthy<>
4304<>2226_20<>b. uma shankar:sankar k. pal<>a new gray level based hough transform for region extraction: an application to irs images<>prl<>c. a. murthy<>
4308<>2226_24<>sanghamitra bandyopadhyay:sankar k. pal<>simulated annealing based pattern classification<>isci<>c. a. murthy<>
26824<>2237_18<>anmol mathur:ali dasdan<>rate analysis for embedded systems<>todaes<>rajesh k. gupta<>
26825<>2237_19<>ali dasdan<>faster maximum and minimum mean cycle algorithms for system-performance analysis<>tcad<>rajesh k. gupta<>
26833<>2238_6<>soner onder<>automatic generation of microarchitecture simulators<>iccl<>rajiv gupta<>
7002<>2267_24<>ke chen<>perceiving without learning: from spirals to inside/outside relations<>nips<>deliang l. wang<>
7004<>2267_26<>xiuwen liu:j. raul ramirez<>oriented statistical nonlinear smoothing filter<>icip<>deliang l. wang<>
7014<>2268_6<>thierry boy de la tour:stephane fevre<>clifford term rewriting for geometric reasoning in 3d<>adg<>dongming wang<>
7023<>2268_15<>nulo<>decomposing polynomial systems into simple systems<>jsc<>dongming wang<>
7024<>2268_16<>nulo<>decomposing algebraic varieties<>adg<>dongming wang<>
7028<>2268_20<>stephane fevre<>combining algebraic computing and term-rewriting for geometry theorem proving<>aisc<>dongming wang<>
29866<>2278_1<>chuan-ching sue<>synchronous flow control in wormhole routed optical networks<>icpads<>sy-yen kuo<>
23368<>2280_8<>nuno maria:pedro gaspar:nuno grilo:antonio ferreira<>ariadne - digital library architecture<>ercimdl<>mario j. silva<>
27757<>2308_16<>nulo<>constraints in graph drawing algorithms<>constraints<>roberto tamassia<>
27760<>2308_19<>michael t. goodrich<>dynamic trees and dynamic point location<>siamcomp<>roberto tamassia<>
27765<>2308_24<>nulo<>implementing algorithms and data structures: an educational and research perspective<>isaac<>roberto tamassia<>
27772<>2308_31<>stina s. bridgeman<>difference metrics for interactive orthogonal graph drawing algorithms<>gd<>roberto tamassia<>
27782<>2308_41<>michael t. goodrich<>teaching the analysis of algorithms with visual proofs<>sigcse<>roberto tamassia<>
27817<>2308_76<>paola bertolazzi:giuseppe di battista:carlo mannino<>optimal upward planarity testing of single-source digraphs<>siamcomp<>roberto tamassia<>
27844<>2308_103<>olivier devillers:giuseppe liotta:franco p. preparata<>checking the convexity of polytopes and the planarity of subdivisions<>comgeo<>roberto tamassia<>
27845<>2308_104<>natasha gelfand<>algorithmic patterns for orthogonal graph drawing<>gd<>roberto tamassia<>
27848<>2308_107<>natasha gelfand:michael t. goodrich<>teaching data structure design patterns<>sigcse<>roberto tamassia<>
27860<>2308_119<>giuseppe liotta:franco p. preparata<>robust proximity queries: an illustration of degree-driven algorithm design<>siamcomp<>roberto tamassia<>
32079<>2316_1<>chiu-kwong wong<>total variation blind deconvolution<>tip<>tony f. chan<>
32022<>2317_7<>nulo<>deterministic algorithms for 2-d convex programming and 3-d online linear programming<>jal<>timothy m. chan<>
32034<>2317_19<>nulo<>on enumerating and selecting distances<>compgeom<>timothy m. chan<>
32047<>2317_32<>pankaj k. agarwal:boris aronov:micha sharir<>"on levels in arrangements of lines, segments, planes, and triangles%."<>dcg<>timothy m. chan<>
32053<>2317_38<>nulo<>approximate nearest neighbor queries revisited<>dcg<>timothy m. chan<>
32057<>2317_42<>nulo<>backwards analysis of the karger-klein-tarjan algorithm for minimum spanning<>ipl<>timothy m. chan<>
32062<>2317_47<>nulo<>geometric applications of a randomized optimization technique<>compgeom<>timothy m. chan<>
21450<>2326_92<>jong soo park:philip s. yu<>efficient data mining for path traversal patterns<>tkde<>ming-syan chen<>
39967<>2334_4<>nulo<>on the complexity of approximating a kkt point of quadratic programming<>mp<>yinyu ye<>
39977<>2334_14<>minyue fu:zhi-quan luo<>approximation algorithms for quadratic programming<>jco<>yinyu ye<>
39984<>2334_21<>michael j. todd<>approximate farkas lemmas and stopping rules for iterative infeasible-point algorithms for linear programming<>mp<>yinyu ye<>
7070<>2339_0<>xiaoyun lu:c. k. wong<>on avoidable and unavoidable claws<>dm<>da-wei wang<>
17709<>2346_0<>eric brill<>classifier combination for improved lexical disambiguation<>acl<>jun wu<>
23820<>2354_0<>william k. purves<>computers and learning<>aiedam<>mary e. williams<>
23805<>2355_2<>nulo<>applications of belief revision<>dagstuhl<>mary-anne williams<>
23822<>2356_1<>nulo<>about this issue<>annals<>michael r. williams<>
23824<>2356_3<>nulo<>about this issue<>annals<>michael r. williams<>
23829<>2356_8<>nulo<>about this issue<>annals<>michael r. williams<>
17601<>2361_64<>ke huang:eduardo b. fernandez<>a generalized forward recovery checkpointing scheme<>ipps<>jie wu<>
17606<>2361_69<>eduardo b. fernandez:donglai dai<>optimal fault-secure scheduling<>cj<>jie wu<>
17624<>2361_87<>nulo<>fault-tolerant adaptive and minimal routing in mesh-connected multicomputers using extended safety levels<>icdcs<>jie wu<>
17635<>2361_98<>nulo<>adaptive fault-tolerant routing in cube-based multicomputers using safety vectors<>tpds<>jie wu<>
1706<>2381_28<>jaikumar radhakrishnan<>improved bounds and algorithms for hypergraph two-coloring<>focs<>aravind srinivasan<>
1725<>2381_47<>michael e. saks:shiyu zhou<>explicit or-dispersers with polylogarithmic degree<>jacm<>aravind srinivasan<>
1741<>2381_63<>doug cook:vance faber:madhav v. marathe:yoram j. sussmann<>low-bandwidth routing and electrical power networks<>icalp<>aravind srinivasan<>
1762<>2383_0<>paul w. finn:stephen muggleton:david page<>pharmacophore discovery using the inductive logic programming system progol<>ml<>ashwin srinivasan<>
1764<>2383_2<>stephen muggleton:ross d. king:michael j. e. sternberg<>biochemical knowledge discovery using inductive logic programming<>dis<>ashwin srinivasan<>
35442<>2395_8<>hiroyuki iida:jos w. h. m. uiterwijk:h. jaap van den herik<>a speculative strategy<>cg<>xinbo gao<>
16060<>2396_4<>ming-syan chen:philip s. yu<>efficient data mining for path traversal patterns<>tkde<>jong soo park<>
16038<>2400_10<>ravi s. sandhu<>decentralized user-role assignment for web-based intranets<>rbac<>joon s. park<>
39680<>2410_3<>michael c. nechyba<>on discontinuous human control strategies<>icra<>yangsheng xu<>
39707<>2415_0<>dong xu:edward c. uberbacher<>an efficient computational method for globally optimal threading<>jcb<>ying xu<>
27327<>2427_5<>peter m. hall:a. david marshall<>incremental eigenanalysis for classification<>bmvc<>ralph r. martin<>
37658<>2433_7<>nulo<>bisimulation lattice of chi processes<>asian<>yuxi fu<>
21500<>2447_1<>takeo kanade:henry a. rowley:dean pomerleau<>anomaly detection through registration<>cvpr<>mei chen<>
31655<>2459_0<>margaret b. cozzens<>vertex-neighbor-integrity of powers of cycles<>arscom<>shu-shih y. wu<>
13815<>2478_2<>avaneendra gupta<>optimal 2-d cell layout with integrated transistor folding<>iccad<>john p. hayes<>
13820<>2478_7<>hyungwon kim<>high-coverage atpg for datapath circuits with unimplemented blocks<>itc<>john p. hayes<>
2917<>2491_0<>dong-yeon cho<>genetic programming with active data selection<>seal<>byoung-tak zhang<>
10548<>2493_7<>nulo<>on-the-fly instantiation of value-passing processes<>forte<>huimin lin<>
12522<>2503_2<>nathalie mathe:shawn wolfe<>collaborative information agents on the world wide web<>dl<>james r. chen<>
12475<>2522_75<>liming cai:johan hastad<>circuit bottom fan-in and computational power<>siamcomp<>jianer chen<>
39442<>2537_25<>mike burmester:yvo desmedt<>using approximation hardness to achieve dependable computation<>random<>yongge wang<>
5324<>2544_14<>katherine heinrich:jiping liu<>triangle-free circuit decompositions and petersen minor<>jct<>cun-quan zhang<>
39460<>2547_3<>carl mccrosky<>solving boolean equations using rosop forms<>tc<>yuke wang<>
39477<>2551_1<>alex waibel<>modeling with structures in statistical machine translation<>acl<>ye-yi wang<>
26743<>2569_1<>jack brimberg:doron chen<>accelerating convergence in the fermat-weber location problem<>orl<>reuven chen<>
26740<>2573_0<>jianhua shao<>mcm interconnect design using two-pole approximation<>date<>richard m. m. chen<>
26978<>2589_0<>mark aagaard:carl-johan h. seger<>combining theorem proving and trajectory evaluation in an industrial environment<>dac<>robert b. jones<>
26981<>2589_3<>jens u. skakkebaek:david l. dill<>formal verification of out-of-order execution using incremental flushing<>cav<>robert b. jones<>
26991<>2589_13<>jens u. skakkebaek:david l. dill<>reducing manual abstraction in formal verification of out-of-order execution<>fmcad<>robert b. jones<>
26977<>2590_10<>helena rodrigues<>cyclic distributed garbage collection with group merger<>ecoop<>richard jones<>
18492<>2596_0<>lawrence m. seiford<>an acceptance system decision rule with data envelopment analysis<>cor<>joe zhu<>
186<>2603_1<>naveena nagi:heebyung yoon:jacob a. abraham<>signature analysis for analog and mixed-signal circuit test response compaction<>tcad<>abhijit chatterjee<>
187<>2603_2<>huy nguyen:rabindra k. roy<>partial reset methodologies for improving random-pattern testability and bist of sequential circuits<>vlsid<>abhijit chatterjee<>
19204<>2637_3<>matthias a. blumrich:richard alpert:cezary dubnicki:edward w. felten:jonathan sandberg<>virtual memory mapped network interface for the shrimp multicomputer<>isca<>kai li<>
19211<>2645_0<>hamid r. arabnia<>guest editorial<>isci<>keqin li<>
8137<>2649_0<>hong liu:abhijit ghosh<>a methodology for feature interaction detection in the ain 0.1 framework<>tse<>fuchun joseph lin<>
8141<>2653_2<>gek woo tan:michael j. shaw<>modeling supply-chain networks by a multi-agent system<>hicss<>fu-ren lin<>
8142<>2653_3<>troy j. strader:michael j. shaw<>simulation of order fulfillment in divergent assembly supply chains<>jasss<>fu-ren lin<>
11800<>2670_0<>tianming wang<>an inequality on connected domination parameters<>arscom<>hongquan yu<>
11616<>2678_0<>nulo<>on vertex-triads in 3-connected binary matroids<>cpc<>haidong wu<>
30972<>2683_4<>tapani hyttinen<>on the number of elementary submodels of an unsuperstable homogeneous structure<>mlq<>saharon shelah<>
31032<>2683_64<>marek balcerzak:andrzej roslanowski<>ideals without ccc<>jsyml<>saharon shelah<>
31036<>2683_68<>renling jin<>compactness of loeb spaces<>jsyml<>saharon shelah<>
31073<>2683_105<>shmuel lifsches<>uniformization and skolem functions in the class of trees<>jsyml<>saharon shelah<>
23860<>2684_3<>nicholas r. jennings<>pitfalls of agent-oriented development<>agents<>michael wooldridge<>
23869<>2684_12<>clare dixon:michael fisher<>a tableau-based proof method for temporal logics of knowledge and belief<>jancl<>michael wooldridge<>
23880<>2684_23<>michael p. georgeff:barney pell:martha e. pollack:milind tambe<>the belief-desire-intention model of agency<>atal<>michael wooldridge<>
23882<>2684_25<>clare dixon:michael fisher<>resolution for temporal logics of knowledge<>logcom<>michael wooldridge<>
23889<>2684_32<>nicholas r. jennings:katia p. sycara<>a roadmap of agent research and development<>aamas<>michael wooldridge<>
23895<>2684_38<>simon parsons<>intention reconsideration reconsidered<>atal<>michael wooldridge<>
23931<>2684_74<>nulo<>verifiable semantics for agent communication languages<>icmas<>michael wooldridge<>
23953<>2684_96<>nulo<>a knowledge-theoretic approach to distributed problem solving<>ecai<>michael wooldridge<>
21281<>2703_12<>jan ramon<>a framework for defining distances between first-order logic objects<>ilp<>maurice bruynooghe<>
3030<>2709_7<>nulo<>augmenting user interfaces for digital libraries with virtual reality<>hicss<>chaomei chen<>
3033<>2709_10<>nulo<>bridging the gap: the use of pathfinder networks in visual navigation<>vlc<>chaomei chen<>
3034<>2709_11<>mary czerwinski<>from latent semantics to spatial hypertext - an integrated approach<>ht<>chaomei chen<>
3043<>2709_20<>julian newman:rhona newman:roy rada<>how did university departments interweave the web: a study of connectivity and underlying factors<>iwc<>chaomei chen<>
3048<>2709_25<>nulo<>generalised similarity analysis and pathfinder network scaling<>iwc<>chaomei chen<>
3054<>2709_31<>janet cole:linda thomas<>fostering social interaction in a shared semantic space for collaborative learning<>webnet<>chaomei chen<>
13084<>2721_21<>brendan p. mahony<>network topology and a case study in tcoz<>zum<>jin song dong<>
3074<>2722_1<>nulo<>matchings and matching extensions in graphs<>dm<>ciping chen<>
8908<>2734_24<>paolo bottoni:stefano levialdi<>successful visual human-computer interaction is undecidable<>ipl<>gheorghe paun<>
8953<>2734_69<>jurgen dassow<>remarks on operations suggested by mutations in genomes<>fuin<>gheorghe paun<>
8960<>2734_76<>carlos martin-vide<>structured contextual grammars<>grammars<>gheorghe paun<>
8962<>2734_78<>solomon marcus:carlos martin-vide<>contextual grammars as generative models of natural languages<>coling<>gheorghe paun<>
8970<>2734_86<>nulo<>dna computing based on splicing: universality results<>mcu<>gheorghe paun<>
2771<>2739_6<>litong xie:guizhen liu<>on endo-homology of complexes of graphs<>dm<>baogang xu<>
39770<>2741_0<>christopher lee<>message-based evaluation for high-level robot control<>icra<>yangsheng xu<>
39772<>2741_2<>gora c. nandy<>dynamic model of a gyroscopic wheel<>icra<>yangsheng xu<>
7213<>2747_27<>nulo<>an algorithm for three-dimensional orthogonal graph drawing<>gd<>david r. wood<>
7169<>2750_16<>steven k. reinhardt:robert w. pfile<>hardware support for flexible distributed shared memory<>tc<>david a. wood<>
36866<>2759_0<>victor r. lesser:bryan horling:frank klassner:anita raja:thomas wagner<>big: a resource-bounded information gathering agent<>aaai<>xiaoqin zhang<>
31122<>2773_16<>peter dayan<>analytical mean squared error curves for temporal difference learning<>ml<>satinder p. singh<>
31124<>2773_18<>john loch<>using eligibility traces to find the best memoryless policy in partially observable markov decision processes<>icml<>satinder p. singh<>
31146<>2773_40<>richard s. sutton:doina precup:balaraman ravindran<>improved switching among temporally abstract actions<>nips<>satinder p. singh<>
31148<>2773_42<>richard s. sutton:doina precup<>intra-option learning about temporally abstract actions<>icml<>satinder p. singh<>
31169<>2773_63<>timothy x. brown:hui tong<>optimizing admission control while ensuring quality of service in multimedia networks via reinforcement learning<>nips<>satinder p. singh<>
31175<>2773_69<>michael j. kearns<>finite-sample convergence rates for q-learning and indirect algorithms<>nips<>satinder p. singh<>
31182<>2780_5<>alex yahja:anthony stentz:barry brumitt<>framed-quadtree path planning for mobile robots operating in sparse environments<>icra<>sanjiv singh<>
31185<>2780_8<>howard cannon<>multi-resolution planning for earthmoving<>icra<>sanjiv singh<>
3100<>2782_0<>enver yucesan:insup lee<>web-based simulation experiments<>wsc<>chun-hung chen<>
3130<>2813_0<>sheng-tzong cheng:ing-ray chen<>a study of self-adjusting quality of service control schemes<>wsc<>chi-ming chen<>
32390<>2822_0<>paul w. fieguth:alan s. willsky<>computationally efficient multiscale estimation of large-scale dynamic systems<>icip<>terrence t. ho<>
28100<>2845_8<>arvind patel:marc sim<>stakeholder experiences with conceptual modeling: an empirical investigation<>icis<>ron weber<>
28102<>2846_0<>hans-jorg schek:stephen blott<>a quantitative analysis and performance study for similarity-search methods in high-dimensional spaces<>vldb<>roger weber<>
6166<>2853_5<>richard n. czerwinski:william d. o'brien jr.<>line and boundary detection in speckle images<>tip<>douglas l. jones<>
6168<>2853_7<>swaroop appadwedula:kannan ramchandran:igor kozintsev<>joint source channel matching for a wireless communications link<>dcc<>douglas l. jones<>
6169<>2853_8<>swaroop appadwedula:kannan ramchandran:leiming qian<>joint source channel matching for a wireless image transmission<>icip<>douglas l. jones<>
21839<>2854_1<>nulo<>proof nets and the complexity of processing center embedded constructions<>jolli<>mark johnson<>
21857<>2854_19<>nulo<>pcfg models of linguistic tree representations<>coling<>mark johnson<>
21858<>2854_20<>nulo<>finite-state approximation of constraint-based grammars using left-corner grammar transforms<>acl<>mark johnson<>
4961<>2857_23<>sailaja shivakumar:chittari v. shivakumar:sheng-chih chen<>genefind web server for protein family identification and information retrieval<>bioinformatics<>cathy h. wu<>
6181<>2858_0<>denny james roehm:michelle schultz<>on matchings in graphs<>arscom<>dawn m. jones<>
4970<>2861_0<>jie-yong juang<>experiences with a bilingual hierarchical regional directory in taiwan<>webnet<>chun-hsing wu<>
38077<>2869_5<>woo jin lee:sung deok cha<>integration and analysis of use cases using modular petri nets in requirements engineering<>tse<>yong rae kwon<>
38092<>2869_20<>yoon kyu jang:heung seok chae:doo-hwan bae<>change impact analysis for a class hierarchy<>apsec<>yong rae kwon<>
28052<>2871_3<>costas courcoubetis:frank p. kelly:vasilios a. siris<>a study of simple usage-based charging schemes for broadband networks<>broadband<>richard r. weber<>
38110<>2874_0<>jin-hyuk yang:byoung-woon kim:sang-jun nam:jang-ho cho:sung-won seo:chang-ho ryu:dae-hyun lee:jong-yeol lee:jong-sun kim:hyun-dhong yoon:jae-yeol kim:kun-moo lee:chan-soo hwang:in-hyung kim:jun sung kim:kwang-il park:kyu ho park:yong-hoon lee:seung ho hwang:in-cheol park:chong-min kyung<>metacore: an application specific dsp development system<>dac<>young-su kwon<>
2023<>2876_2<>chun-kan cheng:hung-lin fu:kuo-ching huang<>a study of the total chromatic number of equibipartite graphs<>dm<>bor-liang chen<>
26110<>2903_12<>irene abi-zeid:luc lamontagne<>an agent for intelligent situation assessment<>aimsa<>qiang yang<>
26138<>2903_40<>steven g. woods<>program understanding as constraint satisfaction: representation and reasoning techniques<>ase<>qiang yang<>
26139<>2903_41<>zhong zhang<>towards lifetime maintenance of case based indexes for continual case based reasoning<>aimsa<>qiang yang<>
26195<>2903_97<>alex quilici:steven woods<>applying plan recognition algorithms to program understanding<>ase<>qiang yang<>
961<>2948_3<>nulo<>comparative performance analysis of versions of tcp in a local network with a lossy link<>ton<>anurag kumar<>
966<>2948_8<>santosh paul abraham<>a stochastic approximation approach for max-min fair adaptive rate control of abr sessions with mcrs<>infocom<>anurag kumar<>
933<>2949_5<>nulo<>a randomized algorithm for distributed consensus<>srds<>akhil kumar<>
938<>2949_10<>noha adly<>hpp: a reliable causal broadcast protocol for large-scale replication<>cj<>akhil kumar<>
32921<>2983_3<>martin l. brady:kenneth k. jung:h. t. nguyen<>interactive volume navigation<>tvcg<>thinh p. q. nguyen<>
29901<>3002_0<>yu-ping wang<>scale-space derived from b-splines<>pami<>seng luan lee<>
4746<>3019_0<>jan p. allebach:zygmunt pizlo<>the image fidelity assessor<>pics<>christopher c. taylor<>
4699<>3021_0<>timothy f. cootes:gareth j. edwards<>active appearance models<>eccv<>christopher j. taylor<>
4741<>3022_11<>jana kosecka:robert blasi:jitendra malik<>a comparative study of vision-based lateral control strategies for autonomous highway driving<>icra<>camillo j. taylor<>
19531<>3044_12<>robin kravets:kenneth l. calvert<>payoff-based communication adaptation based on network service availability<>icmcs<>karsten schwan<>
19539<>3044_20<>daniela rosu:sudhakar yalamanchili<>fara - a framework for adaptive resource allocation in complex real-time systems<>rtas<>karsten schwan<>
19540<>3044_21<>marcel-catalin rosu:richard fujimoto<>supporting parallel applications on clusters of workstations: the virtual communication machine-based architecture<>cluster<>karsten schwan<>
19544<>3044_25<>prince kohli:mustaque ahamad<>indigo: user-level support for building distributed shared abstractions<>concurrency<>karsten schwan<>
13508<>3046_2<>nulo<>set-theoretic completeness for epistemic and conditional logic<>corr<>joseph y. halpern<>
13511<>3046_5<>craig boutilier:nir friedman<>belief revision with unreliable observations<>aaai<>joseph y. halpern<>
13512<>3046_6<>adam j. grove<>updating sets of probabilities<>uai<>joseph y. halpern<>
13513<>3046_7<>nulo<>time to publication: a progress report<>jacm<>joseph y. halpern<>
13519<>3046_13<>nulo<>characterizing the common prior assumption<>tark<>joseph y. halpern<>
13521<>3046_15<>cynthia dwork:orli waarts<>performing work efficiently in the presence of faults<>siamcomp<>joseph y. halpern<>
13528<>3047_2<>nulo<>hypothetical knowledge and counterfactual reasoning<>tark<>joseph y. halpern<>
13530<>3047_4<>yoram moses<>using counterfactuals in knowledge-based programming<>tark<>joseph y. halpern<>
13549<>3047_23<>nulo<>axiomatizing causal reasoning<>uai<>joseph y. halpern<>
13610<>3047_84<>nulo<>using multi-agent systems to represent uncertainty<>icmas<>joseph y. halpern<>
13620<>3047_94<>ronen i. brafman:yoav shoham<>on the knowledge requirements of tasks<>ai<>joseph y. halpern<>
13636<>3047_110<>nir friedman:daphne koller<>first-order conditional logic revisited<>corr<>joseph y. halpern<>
13639<>3047_113<>ronald fagin:yoram moses:moshe y. vardi<>common knowledge revisited<>corr<>joseph y. halpern<>
13737<>3047_211<>nir friedman<>plausibility measures and default reasoning<>corr<>joseph y. halpern<>
29954<>3048_25<>tae-joon park:sung yong shin<>optical flow rendering<>cgf<>seungyong lee<>
29395<>3060_18<>sigbjorn finne:daan leijen:erik meijer<>h/direct: a binary foreign language interface for haskell<>icfp<>simon l. peyton jones<>
29403<>3060_26<>mark shields:john launchbury:andrew p. tolmach<>bridging the gulf: a common intermediate language for ml and haskell<>popl<>simon l. peyton jones<>
29414<>3060_37<>andre l. m. santos<>a transformation-based optimiser for haskell<>scp<>simon l. peyton jones<>
29416<>3060_39<>mark shields:tim sheard<>dynamic typing as staged type inference<>popl<>simon l. peyton jones<>
14929<>3066_0<>alberto o. mendelzon<>merging databases under constraints<>ijcis<>jinxin lin<>
35021<>3074_0<>wei pan:tai-sung lee<>parallel implementation of divide-and-conquer semiempirical quantum chemistry calculations<>jcc<>weitao yang<>
28784<>3088_0<>katsunori shimohara<>evolutionary learning of modular neural networks with genetic programming<>apin<>sung-bae cho<>
34099<>3111_0<>chu-cheow lim:yoke-hean low:wentong cai:shell-ying huang:stephen john turner<>an empirical comparison of runtime systems for conservative parallel simulation<>ipps<>wen-jing hsu<>
34095<>3113_0<>beng chin ooi:kian-lee tan:tat-seng chua<>fast image retrieval using color-spatial information<>vldb<>wynne hsu<>
34090<>3115_7<>sylvian r. ray<>self-organized-expert modular network for classification of spatiotemporal sequences<>ida<>william h. hsu<>
1805<>3119_0<>peter bro miltersen:noam nisan:shmuel safra<>on data structures and asymmetric communication complexity<>jcss<>avi wigderson<>
34053<>3121_3<>jih-kwon peir:yongjoon lee<>capturing dynamic memory reference behavior with adaptive cache topology<>asplos<>windsor w. hsu<>
8037<>3128_0<>clifford nass:eun-young kim<>when my face is the interface: an experimental comparison of interacting with one's own face or someone else's face<>chi<>eun-ju lee<>
8013<>3147_6<>alberto l. sangiovanni-vincentelli<>a framework for comparing models of computation<>tcad<>edward a. lee<>
3876<>3177_0<>mark g. stoodley<>simple vector microprocessors for multimedia applications<>micro<>corinna g. lee<>
5413<>3189_37<>chienhua chen:j. richard burke<>hybrid graph-based networks for multiprocessing<>telsys<>dharma p. agrawal<>
5438<>3189_62<>sekhar darbha<>optimal scheduling algorithm for distributed-memory machines<>tpds<>dharma p. agrawal<>
30057<>3194_1<>fang-jung hsu:bao-shuh p. lin<>video data indexing by 2d c-trees<>vlc<>suh-yin lee<>
4325<>3195_6<>zhi-zhong chen:michelangelo grigni<>planar map graphs<>stoc<>christos h. papadimitriou<>
4338<>3195_19<>pierluigi crescenzi:deborah goldman:antonio piccolboni:mihalis yannakakis<>on the complexity of protein folding<>jcb<>christos h. papadimitriou<>
4358<>3195_39<>prabhakar raghavan:hisao tamaki:santosh vempala<>latent semantic indexing: a probabilistic analysis<>pods<>christos h. papadimitriou<>
3859<>3202_0<>yangsheng xu<>message-based evaluation for high-level robot control<>icra<>christopher lee<>
3843<>3208_4<>chih-horng ke:j.-b. chang:yaw-huei chen<>minimization of resource consumption for multidatabase query optimization<>coopis<>chiang lee<>
3846<>3208_7<>ing-ray chen:tsong-min chen<>performance evaluation of forwarding strategies for location management in mobile networks<>cj<>chiang lee<>
3855<>3208_16<>ing-ray chen:tsong-min chen<>agent-based forwarding strategies for reducing location management cost in mobile networks<>icpads<>chiang lee<>
14927<>3211_0<>richard c. davis:jason a. brotherton:james a. landay:morgan n. price:bill n. schilit<>a framework for sharing handwritten notes<>uist<>james lin<>
4374<>3235_1<>jon m. kleinberg:prabhakar raghavan<>segmentation problems<>stoc<>christos h. papadimitriou<>
27718<>3262_1<>allen s. parrish:joanne e. hale<>cost estimation for component based software development<>ACMse<>randy k. smith<>
36238<>3265_3<>douglas b. west<>line digraphs and coreflexive vertex sets<>dm<>xinming liu<>
35688<>3290_0<>victor y. pan<>fast rectangular matrix multiplication and applications<>jc<>xiaohan huang<>
14808<>3292_0<>nulo<>cycles containing many vertices of subsets in 1-tough graphs with large degree sums<>arscom<>jianping li<>
36199<>3299_0<>kenneth a. berman<>cycles through large degree vertices in digraphs: a generalization of meyniel's theorem<>jct<>xin liu<>
35711<>3371_4<>sotiris skevoulis<>code synthesis based on object-oriented design models and formal specifications<>compsac<>xiaoping jia<>
16249<>3386_1<>joerg domaschke:steven brown:franz leibl<>effective implementation of cycle time reduction strategies for semiconductor back-end manufacturing<>wsc<>jennifer robinson<>
16250<>3386_2<>navdeep s. grewal:alvin c. bruska:timbur m. wulf<>integrating targeted cycle-time reduction into the capital planning process<>wsc<>jennifer k. robinson<>
16238<>3396_6<>barry g. t. lowden<>attribute-pair range rules<>dexa<>jerome robinson<>
1166<>3411_27<>krzysztof diks:evangelos kranakis<>perfect broadcasting in unlabeled networks<>dam<>andrzej pelc<>
1170<>3411_31<>evangelos kranakis:anthony spatharis<>optimal adaptive fault diagnosis for simple multiprocessor systems<>sirocco<>andrzej pelc<>
1194<>3411_55<>eli upfal<>reliable fault diagnosis with few tests<>cpc<>andrzej pelc<>
1197<>3411_58<>evangelos kranakis:danny krizanc:david peleg<>approximate maxima finding of continuous functions under restricted budget<>tcs<>andrzej pelc<>
1214<>3411_75<>leszek gasieniec<>broadcasting with linearly bounded transmission faults<>dam<>andrzej pelc<>
1215<>3411_76<>arthur m. farley:andrzej proskurowski<>minimum-time multidrop broadcast<>dam<>andrzej pelc<>
1253<>3411_114<>petrisor panaite<>exploring unknown undirected graphs<>soda<>andrzej pelc<>
1260<>3411_121<>krzysztof diks:evangelos kranakis<>broadcasting in unlabeled tori<>ppl<>andrzej pelc<>
1275<>3411_136<>artur czumaj:leszek gasieniec<>time and cost trade-offs in gossiping<>siamdm<>andrzej pelc<>
1276<>3411_137<>nulo<>optimal diagnosis of heterogeneous systems with random faults<>tc<>andrzej pelc<>
1277<>3411_138<>krzysztof diks<>system diagnosis with smallest risk of error<>tcs<>andrzej pelc<>
9758<>3421_5<>hanqin zhang<>diffusion approximations for kumar-seidman network under a priority service discipline<>orl<>hong chen<>
27264<>3427_5<>h. s. chao:fang-rong hsu<>an optimal algorithm for finding the minimum cardinality dominating set on permutation graphs<>cocoon<>richard c. t. lee<>
27413<>3434_3<>krishna bharat<>"sphinx: a framework for creating personal, site-specific web crawlers."<>cn<>robert c. miller<>
1997<>3437_4<>kevin kreeger:ingmar bitter:frank dachille:arie e. kaufman<>adaptive perspective ray casting<>vvs<>baoquan chen<>
1986<>3439_2<>arjen p. a. vestjens:gerhard j. woeginger<>on-line scheduling of two-machine open shops where jobs arrive over time<>jco<>bo chen<>
48<>3448_1<>jurgen assfalg:carlo colombo:pietro pala<>embodying semiotic cues in video retrieval<>minar<>alberto del bimbo<>
57<>3448_10<>maria de marsico:stefano levialdi:giuliano peritore<>query by dialog: an interactive approach to pictorial querying<>ivc<>alberto del bimbo<>
64<>3448_17<>jacopo m. corridoni<>structured representation and automatic indexing of movie information content<>pr<>alberto del bimbo<>
65<>3448_18<>carlo colombo:ivan genovesi<>interactive image retrieval by color distributions<>icmcs<>alberto del bimbo<>
76<>3448_29<>m. caliani:carlo colombo:pietro pala<>commercial video retrieval by induced semantics<>caivd<>alberto del bimbo<>
79<>3448_32<>mauro mugnaini:pietro pala:f. turco<>visual querying by color perceptive regions<>pr<>alberto del bimbo<>
95<>3448_48<>m. caliani:carlo colombo:pietro pala<>computer analysis of tv spots: the semiotics perspective<>icmcs<>alberto del bimbo<>
123<>3448_76<>carlo colombo:pietro pala<>retrieval of commercials by video semantics<>cvpr<>alberto del bimbo<>
144<>3448_97<>jacopo m. corridoni:pietro pala<>retrieval of paintings using effects induced by color features<>caivd<>alberto del bimbo<>
158<>3448_111<>jacopo m. corridoni:enrico vicario<>image retrieval by color semantics with incomplete knowledge<>jasis<>alberto del bimbo<>
159<>3448_112<>jurgen assfalg:pietro pala<>virtual reality for image retrieval<>mis<>alberto del bimbo<>
16709<>3449_23<>gabriel m. kuper:sridhar ramaswamy:kyuseok shim<>a constraint-based spatial extension to sql<>gis<>jianwen su<>
16710<>3449_24<>richard hull<>deductive query languages for recursively typed complex objects<>jlp<>jianwen su<>
25456<>3458_3<>sunil kumar:r. srikant<>bounding blocking probabilities and throughput in queueing networks with buffer capacity constraints<>questa<>p. r. kumar<>
25460<>3458_7<>james r. morrison<>on the guaranteed throughput and efficiency of closed re-entrant lines<>questa<>p. r. kumar<>
25475<>3464_0<>c. e. veni madhavan<>minimal vertex separators of chordal graphs<>dam<>p. sreenivasa kumar<>
4396<>3480_10<>gilles muller:renaud marlet:eugen-nicolae volanschi:charles consel:ashvin goel<>"fast, optimized sun rpc using automatic program specialization."<>icdcs<>calton pu<>
41036<>3482_0<>jinzhao wu<>well-behaved inference rules for first-order theorem proving<>jar<>zhuojun liu<>
41030<>3521_2<>zhiquan hu<>a strongly polynomial algorithm for the inverse shortest arborescence problem<>dam<>zhenhong liu<>
18064<>3526_33<>li-yan yuan<>coherence approach to logic program revision<>tkde<>jia-huai you<>
18082<>3526_51<>li-yan yuan:randy goebel<>regular extension semantics and disjunctive eshghi kowalski procedure<>iclp<>jia-huai you<>
21112<>3529_0<>chuck thorpe<>qualitative and quantitative car tracking from a range image sequence<>cvpr<>liang zhao<>
6954<>3541_1<>paola quaglia<>on encoding p-pi in m-pi<>fsttcs<>david walker<>
6960<>3542_5<>vijay r. sar-dessai<>accurate fault modeling and fault simulation of resistive bridges<>dft<>d. m. h. walker<>
34454<>3553_0<>myungho lee:viktor k. prasanna<>a mapping methodology for designing software task pipelines for embedded signal processing<>ipps<>wenheng liu<>
36178<>3562_0<>cornelis hoede<>word graphs: the second set<>iccs<>x. liu<>
12213<>3567_3<>nulo<>the ribonuclease p database<>nar<>james w. brown<>
12191<>3569_6<>nulo<>chromatic polynomials and order ideals of monomials<>dm<>jason i. brown<>
12195<>3569_10<>nulo<>on the roots of chromatic polynomials<>jct<>jason i. brown<>
12198<>3569_13<>dimitris achlioptas:derek g. corneil:michael s. o. molloy<>the existence of uniquely -g colourable graphs<>dm<>jason i. brown<>
22467<>3584_2<>nulo<>on pancyclic claw-free graphs<>arscom<>mingchu li<>
22474<>3584_9<>nulo<>vertex pancyclism in claw-free graphs<>dm<>mingchu li<>
22405<>3590_5<>harry buhrman:tao jiang:paul m. b. vitanyi<>new applications of the incompressibility method: part ii<>corr<>ming li<>
22407<>3590_7<>bin ma:lusheng wang<>fixed topology alignment with recombination<>cpm<>ming li<>
22411<>3590_11<>moses charikar:chandra chekuri:to-yat cheung:zuo dai:ashish goel:sudipto guha<>approximation algorithms for directed steiner problems<>soda<>ming li<>
22413<>3590_13<>tao jiang:paul m. b. vitanyi<>new applications of the incompressibility method: part i<>corr<>ming li<>
22414<>3590_14<>charles h. bennett:pater gacs:paul m. b. vitanyi:wojciech h. zurek<>information distance<>tit<>ming li<>
18315<>3616_0<>zhongfu zhang:linzhong liu:jianfang wang<>on the relations between arboricity and independent number or covering number<>dam<>jianxun zhang<>
16605<>3617_0<>william a. arbaugh:james r. davin:david j. farber<>security for virtual private intranets<>computer<>jonathan m. smith<>
16606<>3617_1<>william a. arbaugh:angelos d. keromytis:david j. farber<>automated recovery in a secure bootstrap process<>ndss<>jonathan m. smith<>
16601<>3619_10<>santosh k. shrivastava<>performance of fault-tolerant data and compute intensive programs over a network of workstations<>tcs<>j. a. smith<>
19976<>3634_0<>wai wan tsang<>an efficient shadow algorithm for area light sources using bsp trees<>pg<>kam-wah wong<>
6969<>3636_6<>j. gregory morrisett:karl crary:neal glew<>stack-based typed assembly language<>tic<>david walker<>
6972<>3636_9<>j. gregory morrisett:karl crary:neal glew<>from system f to typed assembly language<>popl<>david walker<>
16520<>3656_11<>chung-sheng li:lawrence d. bergman:vittorio castelli<>sequential processing for content-based retrieval of composite objects<>spieSR<>john r. smith<>
16551<>3656_42<>rakesh mohan:chung-sheng li<>content-based transcoding of images in the internet<>icip<>john r. smith<>
16552<>3656_43<>chung-sheng li:vittorio castelli<>s-stir: similarity search through iterative refinement<>spieSR<>john r. smith<>
16574<>3662_8<>frank vavak<>replacement strategies in steady state genetic algorithms: static environments<>foga<>jim smith<>
32146<>3670_1<>yuen-tak yu<>on the test allocations for the best lower bound performance of partition testing<>aswec<>tsong yueh chen<>
32148<>3670_3<>p. l. poon<>on the effectiveness of classification trees for test case construction<>infsof<>t. y. chen<>
32149<>3670_4<>m. f. lau<>a simulation study on some heuristics for test suite reduction<>infsof<>t. y. chen<>
32150<>3670_5<>m. f. lau<>a new heuristic for test suite reduction<>infsof<>t. y. chen<>
32116<>3681_5<>neng-chung wang:chih-ping chu<>path-based multicast communication in wormhole-routed star graph multicomputers<>icpads<>tzung-shi chen<>
25951<>3686_3<>haiyuan wu:takeshi fukumoto:masahiko yachida<>3d head pose estimation without feature tracking<>fgr<>qian chen<>
8432<>3716_8<>pao-ann hsiung<>automatic verification on the large<>hase<>farn wang<>
8434<>3716_10<>pao-ann hsiung<>a state graph manipulator tool for real-time system specification and verification<>rtcsa<>farn wang<>
873<>3736_2<>emerson cabrera paraiso:edson emilio scalabrin:celso a. a. kaestner<>intelligent management of computer networks: the gir proposal<>sccc<>alceu de souza britto jr.<>
33214<>3759_0<>phillip c.-y. sheu:carl cotman<>active rule processing in the biocompose database<>isorc<>taehyung wang<>
33220<>3759_6<>phillip c.-y. sheu:brian cummings:carl cotman<>an object relational database for brain aging research<>srds<>taehyung wang<>
8268<>3772_7<>olivier devillers:giuseppe liotta:roberto tamassia<>checking the convexity of polytopes and the planarity of subdivisions<>comgeo<>franco p. preparata<>
8316<>3772_55<>giuseppe liotta:roberto tamassia<>robust proximity queries: an illustration of degree-driven algorithm design<>siamcomp<>franco p. preparata<>
32555<>3781_0<>mike blackwell:constantinos nikou:anthony m. digioia<>an image overlay system for medical data visualization<>miccai<>takeo kanade<>
32563<>3781_8<>henry a. rowley:shumeet baluja<>neural network-based face detection<>pami<>takeo kanade<>
32564<>3781_9<>jeffrey f. cohn:adena j. zlochower:james jenn-jier lien<>feature-point tracking by optical flow discriminates subtle differences in facial expression<>fgr<>takeo kanade<>
32574<>3781_19<>henry schneiderman<>probabilistic modeling of local appearance and spatial relationships for object recognition<>cvpr<>takeo kanade<>
32584<>3781_29<>p. j. narayanan:peter rander<>constructing virtual worlds using dense stereo<>iccv<>takeo kanade<>
32593<>3781_38<>mei chen:henry a. rowley:dean pomerleau<>anomaly detection through registration<>cvpr<>takeo kanade<>
32597<>3781_42<>vladimir brajovic:ryohei miyagawa<>temporal photoreception for adaptive dynamic range image sensing and encoding<>nn<>takeo kanade<>
32598<>3781_43<>henry a. rowley:shumeet baluja<>rotation invariant neural network-based face detection<>cvpr<>takeo kanade<>
32602<>3781_47<>james jenn-jier lien:jeffrey f. cohn:ching-chung li<>automated facial expression recognition based on facs action units<>fgr<>takeo kanade<>
32622<>3781_67<>yu-te wu:jeffrey f. cohn:ching-chung li<>optical flow estimation using wavelet motion model<>iccv<>takeo kanade<>
32628<>3781_73<>james jenn-jier lien:jeffrey f. cohn:ching-chung li<>subtly different facial expression recognition and expression intensity estimation<>cvpr<>takeo kanade<>
32633<>3781_78<>henry a. rowley:shumeet baluja<>rotation invariant neural network-based face detection<>cvpr<>takeo kanade<>
32640<>3781_85<>michael a. smith<>video skimming and characterization through the combination of image and language understanding<>caivd<>takeo kanade<>
16962<>3808_3<>dong wei:raymond o. wells jr.:c. sidney burrus<>a new class of biorthogonal wavelet systems for image transform coding<>tip<>jun tian<>
16925<>3812_0<>joe palma<>analyzing and improving reliability: a tree-based approach<>software<>jeff tian<>
16933<>3812_8<>nulo<>early measurement and improvement of software quality<>compsac<>jeff tian<>
16940<>3812_15<>nulo<>"reliability measurement, analysis, and improvement for large software systems."<>ac<>jeff tian<>
16944<>3812_19<>joel troster<>a comparison of measurement and defect characteristics of new and legacy software systems<>jss<>jeff tian<>
13268<>3833_0<>pascal van eck:dieter fensel:frank van harmelen:yde venema:mark willems<>specification of dynamics for knowledge-based systems<>dagstuhl<>joeri engelfriet<>
13275<>3833_7<>catholijn m. jonker:jan treur<>compositional verification of multi-agent systems in temporal multi-epistemic logic<>atal<>joeri engelfriet<>
13279<>3833_11<>heinrich herre:jan treur<>nonmonotonic reasoning with multiple belief sets<>amai<>joeri engelfriet<>
13280<>3833_12<>nulo<>monotonicity and persistence in preferential logics<>corr<>joeri engelfriet<>
13284<>3833_16<>nulo<>monotonicity and persistence in preferential logics<>jair<>joeri engelfriet<>
13299<>3841_3<>frank drewes<>decidability of the finiteness of ranges of tree transductions<>iandc<>joost engelfriet<>
18106<>3850_3<>sanming zhou<>harper-type lower bounds and the bandwidths of the compositions of graphs<>dm<>jinjiang yuan<>
15351<>3851_5<>steve marchand<>towards intelligent retrieval in image databases<>iwmmdbms<>jose martinez<>
28694<>3862_3<>chia-mei chen:jing-wen hwang<>low-power design for real-time systems<>rts<>sheng-tzong cheng<>
27562<>3877_11<>donko donjerkovic:arvind ranganathan:kevin s. beyer:muralidhar krishnaprasad<>srql: sorted relational query language<>ssdbm<>raghu ramakrishnan<>
6131<>3888_0<>ali nahvi:donald d. nelson:john m. hollerbach<>haptic manipulation of virtual mechanisms from mechanical cad designs<>icra<>david e. johnson<>
6133<>3888_2<>elaine cohen<>a framework for efficient minimum distance computations<>icra<>david e. johnson<>
6094<>3890_31<>alexander i. barvinok:gerhard j. woeginger:russell woodroofe<>the maximum traveling salesman problem under polyhedral norms<>ipco<>david s. johnson<>
38136<>3894_1<>daeyoung kim:mohamed f. younis:jeffrey x. zhou<>partition scheduling in apex runtime environment for embedded avionics software<>rtcsa<>yann-hang lee<>
37645<>3899_1<>jianlin feng<>binary partition based algorithms for mining association rules<>adl<>yucai feng<>
38202<>3903_15<>won yong kim:myoung-ho kim<>probabilistic retrieval incorporating the relationships of descriptors incrementally<>ipm<>yoon-joon lee<>
39939<>3907_0<>nulo<>a comparative study of fuzzy sets and rough sets<>isci<>y. y. yao<>
22579<>3929_8<>ulf grenander:anuj srivastava<>hilbert-schmidt lower bounds for estimators on matrix lie groups for atr<>pami<>michael i. miller<>
22585<>3929_14<>n. khaneja:ulf grenander<>dynamic programming generation of curves on brain surfaces<>pami<>michael i. miller<>
19229<>3930_5<>gautam das:heikki mannila:gopal renganathan:padhraic smyth<>rule discovery from time series<>kdd<>king-ip lin<>
22606<>3935_11<>elias dahlhaus:paul d. manuel<>a characterization of strongly chordal graphs<>dm<>mirka miller<>
22607<>3935_12<>ljiljana brankovic:jin plesnik:joseph f. ryan:jozef siran<>a note on constructing large cayley graphs of given degree and diameter by voltage assignments<>combinatorics<>mirka miller<>
22608<>3935_13<>brendan d. mckay:jozef siran<>"a note on large graphs of diameter two and given maximum degree."<>jct<>mirka miller<>
19247<>3944_6<>yu-chung wang<>enhancing the real-time capability of the linux kernel<>rtcsa<>kwei-jay lin<>
19251<>3944_10<>jose-miguel pulido<>sm: real-time multicast protocols for simultaneous message delivery<>rtcsa<>kwei-jay lin<>
32706<>3951_4<>nulo<>segmenting images corrupted by correlated noise<>pami<>thomas c. m. lee<>
32696<>3957_0<>michael e. bradley:jennifer l. walowitz<>"influence of promoter potency on the transcriptional effects of yy1, srf and msx-1 in transient transfection analysis."<>nar<>techung lee<>
32697<>3958_0<>michael s. lewicki:terrence j. sejnowski<>unsupervised classification with non-gaussian mixture models using ica<>nips<>te-won lee<>
35855<>3966_0<>nulo<>a new term representation method for prolog<>jlp<>xining li<>
35753<>3970_10<>nulo<>the connectivity of the see-graph and aee-graph for the connected spanning k-edge subgraphs of a graph<>dm<>xueliang li<>
35776<>3970_33<>hortensia galeana-sanchez<>kernels in a special class of digraphs<>dm<>xueliang li<>
32396<>3971_2<>stuart j. russell<>object identification: a bayesian analysis with application to traffic surveillance<>ai<>timothy huang<>
35802<>3974_15<>shang-hua teng<>dynamic load balancing for parallel adaptive mesh refinement<>irregular<>xiang-yang li<>
2427<>3975_47<>kian-lee tan:tat-seng chua:wynne hsu<>fast image retrieval using color-spatial information<>vldb<>beng chin ooi<>
2458<>3975_78<>david j. abel:kian-lee tan:soon huat tan<>towards integrated geographical information processing<>gis<>beng chin ooi<>
32722<>3976_2<>p. c. ching:lai-wan chan<>isolated word recognition using modular recurrent neural networks<>pr<>tan lee<>
14278<>3984_0<>nulo<>rough mereology for industrial design<>rsctc<>julia a. johnson<>
38008<>3988_4<>owen d. evans<>efficient implementation of image warping on a multimedia processor<>rti<>yongmin kim<>
38009<>3988_5<>sayan d. pathak:p. d. grimm:vikram chalana<>pubic arch detection in transrectal ultrasound guided prostate cancer therapy<>tmi<>yongmin kim<>
38010<>3988_6<>chris basoglu:ravi managuli:george york<>computing requirements of modern medical diagnostic ultrasound machines<>pc<>yongmin kim<>
14286<>3989_0<>nulo<>"database: models, languages, design."<>jdm<>james l. johnson<>
14267<>3995_4<>nulo<>simplifying the controls of an interactive movie game<>chi<>jeff a. johnson<>
33170<>4000_69<>pedro meseguer<>interleaved and discrepancy based search<>ecai<>toby walsh<>
23968<>4009_5<>wayne wolf:bede liu<>an algorithm for wipe detection<>icip<>min wu<>
23980<>4009_17<>bede liu<>watermarking for image authentication<>icip<>min wu<>
24009<>4013_9<>ross wilkinson<>using document relationships for better answers<>ep<>mingfang wu<>
23990<>4017_0<>alejandro p. buchmann<>encoded bitmap indexing for data warehouses<>icde<>ming-chuan wu<>
32647<>4022_2<>william jao:steven w. k. tjiang<>arithmetic optimization using carry-save-adders<>dac<>taewhan kim<>
40317<>4025_0<>nulo<>"on the edge reconstruction of graphs embedded in surfaces, iii."<>jct<>yue zhao<>
40322<>4025_5<>daniel p. sanders<>on 2-connected spanning subgraphs with low maximum degree<>jct<>yue zhao<>
40326<>4025_9<>hugh hind<>edge colorings of graphs embeddable in a surface of low genus<>dm<>yue zhao<>
19641<>4037_27<>david abramson:paul logothetis:david duke<>fpga based implementation of a hopfield neural network for solving constraint satisfaction problems<>euromicro<>kate a. smith<>
15295<>4050_0<>tim zajic<>rough asymptotics of forward-backward stochastic differential equations<>ifip7-2<>jin ma<>
25186<>4054_0<>victor kim<>parallel algorithms for power estimation<>dac<>prithviraj banerjee<>
7866<>4058_1<>nigel g. sharp<>density propagation for surface tracking<>prl<>edwin r. hancock<>
5554<>4062_1<>murphy chien-chang ho:ming ouhyoung<>videovr: a real-time system for automatically constructing panoramic images from video clips<>captech<>ding-yun chen<>
5564<>4063_8<>ovidiu daescu:xiaobo hu:jinhui xu<>finding an optimal path without growing the tree<>esa<>danny z. chen<>
5545<>4067_15<>chengzheng sun:xiaohua jia:yanchun zhang:yun yang<>"achieving convergence, causality preservation, and intention preservation in real-time cooperative editing systems."<>tochi<>david chen<>
33595<>4070_6<>sunil samtani:mukesh k. mohania:yahiko kambayashi<>recent advances and research problems in data warehousing<>er<>vijay kumar<>
33602<>4070_13<>margaret h. dunham<>location dependent data and its management in mobile databases<>dexaw<>vijay kumar<>
33800<>4079_5<>nulo<>the pessimistic search and the straightening involution for trees<>ejc<>william y. c. chen<>
33636<>4082_0<>anurag srivastava:eui-hong han:vineet singh<>parallel formulations of decision-tree classification algorithms<>icpp<>vipin kumar<>
23271<>4085_4<>martin erwig:ralf hartmut guting:michalis vazirgiannis<>abstract and discrete modeling of spatio-temporal data types<>gis<>markus schneider<>
23291<>4085_24<>martin erwig:ralf hartmut guting<>temporal objects for spatio-temporal data models and a comparison of their representations<>er<>markus schneider<>
33844<>4088_6<>marcos kawazoe aguilera:sam toueg<>failure detection and consensus in the crash-recovery model<>wdag<>wei chen<>
577<>4097_1<>frederick damastra:brent k. jesiek<>gallium arsenide based floating point adder/subtractor<>cata<>ashok k. goel<>
570<>4099_4<>gilles muller:renaud marlet:eugen-nicolae volanschi:charles consel:calton pu<>"fast, optimized sun rpc using automatic program specialization."<>icdcs<>ashvin goel<>
574<>4099_8<>thomas w. page jr.:richard g. guy:john s. heidemann:david ratner:peter l. reiher:geoffrey h. kuenning:gerald j. popek<>"perspectives on optimistically replicated, peer-to-peer filing."<>spe<>ashish goel<>
535<>4101_11<>moses charikar:chandra chekuri:to-yat cheung:zuo dai:sudipto guha:ming li<>approximation algorithms for directed steiner problems<>soda<>ashish goel<>
537<>4101_13<>monika rauch henzinger:serge a. plotkin<>online throughput-competitive algorithm for multicast routing and admission control<>soda<>ashish goel<>
7682<>4102_1<>martin l. demaine:anna lubiw<>folding and cutting paper<>jcdcg<>erik d. demaine<>
7683<>4102_2<>therese c. biedl:martin l. demaine:sylvain lazard:anna lubiw:joseph o'rourke:mark h. overmars:steve robbins:ileana streinu:godfried t. toussaint:sue whitesides<>locked and unlocked polygonal chains in 3d<>corr<>erik d. demaine<>
7687<>4102_6<>martin l. demaine<>planar drawings of origami polyhedra<>gd<>erik d. demaine<>
7697<>4102_16<>therese c. biedl:martin l. demaine:anna lubiw:mark h. overmars:joseph o'rourke:steve robbins:sue whitesides<>unfolding some classes of orthogonal polyhedra<>cccg<>erik d. demaine<>
7712<>4102_31<>therese c. biedl:martin l. demaine:anna lubiw:godfried t. toussaint<>hiding disks in folded polygons<>cccg<>erik d. demaine<>
7723<>4102_42<>therese c. biedl:martin l. demaine:sylvain lazard:anna lubiw:joseph o'rourke:steve robbins:ileana streinu:godfried t. toussaint:sue whitesides<>on reconfiguring tree linkages: trees can lock<>cccg<>erik d. demaine<>
21761<>4103_0<>wynn c. stirling:richard l. frost<>a theory of satisficing decisions and control<>tsmc<>michael a. goodrich<>
21663<>4104_2<>christopher g. wagner<>a framework for drawing planar graphs with curves and polylines<>gd<>michael t. goodrich<>
21664<>4104_3<>gill barequet<>efficiently approximating polygonal paths in three and higher dimensions<>compgeom<>michael t. goodrich<>
21668<>4104_7<>roberto tamassia<>dynamic trees and dynamic point location<>siamcomp<>michael t. goodrich<>
21675<>4104_14<>natasha gelfand:roberto tamassia<>teaching data structure design patterns<>sigcse<>michael t. goodrich<>
21696<>4104_35<>christian a. duncan:stephen g. kobourov<>balanced aspect ratio trees and their use for drawing very large graphs<>gd<>michael t. goodrich<>
21728<>4104_67<>roberto tamassia<>teaching the analysis of algorithms with visual proofs<>sigcse<>michael t. goodrich<>
21752<>4104_91<>gill barequet:amy j. briggs:matthew dickerson<>offset-polygon annulus placement problems<>comgeo<>michael t. goodrich<>
21760<>4104_99<>nulo<>an improved ray shooting method for constructive solid geometry models via tree contraction<>ijcga<>michael t. goodrich<>
27034<>4105_23<>daniel p. fasulo:tao jiang:nitin sharma<>constructing maps using the span and inclusion relations<>recomb<>richard m. karp<>
27058<>4105_47<>yangun zhang<>on parallel evaluation of game trees<>jacm<>richard m. karp<>
27064<>4105_53<>tao jiang<>mapping clones with a given ordering or interleaving<>algorithmica<>richard m. karp<>
27087<>4105_76<>paul beame:toniann pitassi:michael e. saks<>on the complexity of unsatisfiability proofs for random -cnf formulas<>stoc<>richard m. karp<>
27122<>4105_111<>ron shamir<>algorithms for optical mapping<>recomb<>richard m. karp<>
35546<>4108_2<>tom hintz:ury szewcow<>replicated shared object model for parallel edge detection algorithm based on spiral architecture<>fgcs<>xiangjian he<>
35547<>4108_3<>tom hintz:ury szewcow<>replicated shared object model for edge detection with spiral architecture<>ipps<>xiangjian he<>
1677<>4118_0<>michael walpole<>an australasian experience of the use of selected technologies in the delivery of a legal education program - some lessons for faculties and educational program planners<>jilt<>alan smith<>
33585<>4122_35<>thomas sugar<>decentralized control of cooperating mobile manipulators<>icra<>vijay kumar<>
34975<>4141_1<>feng cao:ding-zhu du:d. frank hsu:lihui hwang<>super line-connectivity of consecutive-d digraphs<>dm<>weili wu<>
30484<>4146_13<>mark d. hill<>the impact of data transfer and buffering alternatives on network interface design<>hpca<>shubhendu s. mukherjee<>
30486<>4146_15<>mark d. hill<>using prediction to accelerate coherence protocols<>isca<>shubhendu s. mukherjee<>
30487<>4146_16<>mark d. hill<>making network interfaces less peripheral<>computer<>shubhendu s. mukherjee<>
6758<>4168_0<>hyuncheol jang:honglan jin<>bus: an effective indexing and retrieval scheme in structured documents<>dl<>dongwook shin<>
6633<>4190_0<>carlo h. sequin<>risc i: a reduced instruction set vlsi computer<>isca<>david a. patterson<>
26804<>4191_0<>nulo<>issue management<>db<>robert l. glass<>
3232<>4196_0<>weng-long chang<>the i+ test<>lcpc<>chih-ping chu<>
3236<>4196_4<>weng-long chang<>the infinity lambda test<>ics<>chih-ping chu<>
3238<>4196_6<>tzung-shi chen:neng-chung wang<>path-based multicast communication in wormhole-routed star graph multicomputers<>icpads<>chih-ping chu<>
3244<>4196_12<>weng-long chang:jesse wu<>the generalized lambda test<>ipps<>chih-ping chu<>
3212<>4198_7<>martin d. f. wong<>a matrix synthesis approach to thermal placement<>tcad<>chris c. n. chu<>
3216<>4198_11<>chung-ping chen:d. f. wong<>fast and exact simultaneous gate and wire sizing by lagrangian relaxation<>iccad<>chris c. n. chu<>
3225<>4198_20<>d. f. wong<>greedy wire-sizing is linear time<>ispd<>chris c. n. chu<>
34023<>4205_11<>peter buneman:alin deutsch:hartmut liefke:arnaud sahuguet:wang chiew tan<>beyond xml query languages<>w3c<>wenfei fan<>
27668<>4212_2<>lothar gierl<>experiences with prototype designs and retrieval methods in medical case-based reasoning systems<>ewcbr<>rainer schmidt<>
27672<>4212_6<>lothar gierl:mathias bull<>cbr in medicine<>iccbr<>rainer schmidt<>
27622<>4222_4<>ullrich hustadt<>issues of decidability for description logics in the framework of resolution<>ftp<>renate a. schmidt<>
27623<>4222_5<>harald ganzinger:ullrich hustadt:christoph meyer<>a resolution-based decision procedure for extensions of k4<>aiml<>renate a. schmidt<>
27624<>4222_6<>nulo<>-unification for subsystems of<>rta<>renate a. schmidt<>
27642<>4222_24<>ullrich hustadt<>simplification and backjumping in modal tableau<>tableaux<>renate a. schmidt<>
30319<>4241_9<>somnath ghosh:margaret martonosi<>precise miss analysis for program transformations with caches of arbitrary associativity<>asplos<>sharad malik<>
30342<>4241_32<>peixin zhong:margaret martonosi:pranav ashar<>accelerating boolean satisfiability with configurable hardware<>fccm<>sharad malik<>
30344<>4241_34<>peixin zhong:pranav ashar:margaret martonosi<>using reconfigurable computing techniques to accelerate problems in the cad domain: a case study with boolean satisfiability<>dac<>sharad malik<>
30362<>4241_52<>peixin zhong:margaret martonosi:pranav ashar<>solving boolean satisfiability with dynamic hardware configurations<>fpl<>sharad malik<>
16630<>4279_1<>philip j. smith:jodi heintz obradovich:stephanie guerlain:sally rudmann:patricia strohm:john svirbley:larry sachs<>successful use of an expert system to teach diagnostic reasoning for antibody identification<>its<>jack w. smith<>
22664<>4280_27<>benny pinkas<>secure and efficient metering<>eurocrypt<>moni naor<>
22683<>4280_46<>miklos ajtai:james aspnes:yuval rabani:leonard j. schulman:orli waarts<>fairness in scheduling<>jal<>moni naor<>
22691<>4280_54<>cynthia dwork<>an efficient existentially unforgeable signature scheme and its applications<>joc<>moni naor<>
22693<>4280_56<>avishai wool<>access control and signatures via quorum secret sharing<>tpds<>moni naor<>
22696<>4280_59<>benny pinkas<>threshold traitor tracing<>crypto<>moni naor<>
22715<>4280_78<>matt blaze:joan feigenbaum<>a formal treatment of remotely keyed encryption<>eurocrypt<>moni naor<>
22722<>4280_85<>cynthia dwork:amit sahai<>concurrent zero-knowledge<>stoc<>moni naor<>
22736<>4280_99<>rafail ostrovsky:ramarathnam venkatesan:moti yung<>perfect zero-knowledge arguments for  using any one-way permutation<>joc<>moni naor<>
22746<>4280_109<>avishai wool<>"the load, capacity, and availability of quorum systems."<>siamcomp<>moni naor<>
16622<>4284_2<>tanel tammet<>optimized encodings of fragments of type theory in first-order logic<>logcom<>jan m. smith<>
20834<>4301_4<>chi chiu cheung:shun-ichi amari<>learned parametric mixture based ica algorithm<>ijon<>lei xu<>
20840<>4301_10<>nulo<>bayesian kullback ying-yang dependence reduction theory<>ijon<>lei xu<>
20864<>4301_34<>nulo<>"rbf nets, mixture experts, and bayesian ying-yang learning."<>ijon<>lei xu<>
204<>4302_4<>mahmut t. kandemir:j. ramanujam:prithviraj banerjee<>improving locality using loop and data transformations in an integrated framework<>micro<>alok n. choudhary<>
207<>4302_7<>mahmut t. kandemir:j. ramanujam:meenakshi a. kandaswamy<>locality optimization algorithms for compilation of out-of-core codes<>jise<>alok n. choudhary<>
209<>4302_9<>mahmut t. kandemir:j. ramanujam:prithviraj banerjee<>a matrix-based approach to the global locality optimization problem<>IEEEpact<>alok n. choudhary<>
213<>4302_13<>mahmut t. kandemir:j. ramanujam:nagaraj shenoy:prithviraj banerjee<>enhancing spatial locality via data layout optimizations<>europar<>alok n. choudhary<>
220<>4302_20<>jaechun no:sung-soon park:jesus carretero:pang chen<>design and implementation of a parallel i/o runtime system for irregular applications<>ipps<>alok n. choudhary<>
225<>4302_25<>mahmut t. kandemir:j. ramanujam:prithviraj banerjee<>a loop transformation algorithm based on explicit data layout representation for optimizing locality<>lcpc<>alok n. choudhary<>
232<>4302_32<>mahmut t. kandemir:prithviraj banerjee:j. ramanujam:nagaraj shenoy<>a generalized framework for global communication optimization<>ipps<>alok n. choudhary<>
237<>4302_37<>mahmut t. kandemir:j. ramanujam<>improving locality in out-of-core computations using data layout transformations<>lcr<>alok n. choudhary<>
279<>4302_79<>chutimet srinilta<>performance enhancement using intra-server caching in a continuous media server<>ride<>alok n. choudhary<>
286<>4302_86<>mahmut t. kandemir:j. ramanujam:rajesh bordawekar<>compilation techniques for out-of-core parallel computations<>pc<>alok n. choudhary<>
301<>4302_101<>mahmut t. kandemir:nagaraj shenoy:prithviraj banerjee:j. ramanujam<>minimizing data and synchronization costs in one-way communication<>icpp<>alok n. choudhary<>
310<>4302_110<>meenakshi a. kandaswamy:mahmut t. kandemir:david e. bernholdt<>performance implications of architectural and software techniques on i/o-intensive applications<>icpp<>alok n. choudhary<>
312<>4302_112<>dhruva r. chakrabarti:nagaraj shenoy:prithviraj banerjee<>an efficient uniform run-time scheme for mixed regular-irregular applications<>ics<>alok n. choudhary<>
330<>4302_130<>sanjay goil<>high performance data mining using data cubes on parallel computers<>ipps<>alok n. choudhary<>
334<>4302_134<>wei-keng liao:donald weiner:pramod k. varshney:richard w. linderman:mark h. linderman<>"design, implementation and evaluation of parallel pipelined stap on parallel computers."<>ipps<>alok n. choudhary<>
337<>4302_137<>sanjay goil<>high performance multidimensional analysis of large datasets<>dolap<>alok n. choudhary<>
354<>4302_154<>peter brezany:minh dang<>language and compiler support for out-of-core irregular applications on distributed-memory multiprocessors<>lcr<>alok n. choudhary<>
357<>4302_157<>mahmut t. kandemir:nagaraj shenoy:prithviraj banerjee:j. ramanujam<>a hyperplane based approach for optimizing spatial locality in loop nests<>ics<>alok n. choudhary<>
20545<>4308_0<>zhongfu zhang:jianxun zhang:jianfang wang<>on the relations between arboricity and independent number or covering number<>dam<>linzhong liu<>
20448<>4309_4<>calton pu:wei tang:david buttler:john biggs:tong zhou:paul benninghoff:wei han:fenghua yu<>cq: a personalized update monitoring toolkit<>sigmod<>ling liu<>
20449<>4309_5<>calton pu:kirill richine<>distributed query scheduling service: an architecture and its implementation<>ijcis<>ling liu<>
20462<>4309_18<>calton pu<>methodical restructuring of complex workflow activities<>icde<>ling liu<>
20485<>4309_41<>calton pu<>update monitoring: the cq project<>wwca<>ling liu<>
20498<>4309_54<>tong zhou:calton pu<>dynamic restructuring of transactional workflow activities: a practical implementation method<>cikm<>ling liu<>
16277<>4333_6<>john l. schnase:kay l. tomlinson:mark a. spasser<>managing cognitive overload in the flora of north america project<>hicss<>j. alfredo sanchez<>
16284<>4333_13<>cristina a. lopez:john l. schnase<>an agent-based approach to the construction of floristic digital libraries<>dl<>j. alfredo sanchez<>
16289<>4335_0<>christine hoogland:luisa tonella:amos bairoch:denis f. hochstrasser:ron d. appel<>current status of the swiss-2dpage database<>nar<>jean-charles sanchez<>
38614<>4348_0<>frank dellaert<>a classification based similarity metric for 3d image retrieval<>cvpr<>yanxi liu<>
38639<>4348_25<>william e. rothfus:takeo kanade<>content-based 3d neuroradiologic image retrieval: preliminary results<>caivd<>yanxi liu<>
38573<>4350_1<>gustavo gomez<>automatic accurate time-bound analysis for high-level languages<>lctrts<>yanhong a. liu<>
38582<>4350_10<>scott d. stoller<>loop optimization for aggregate array computations<>iccl<>yanhong a. liu<>
38597<>4350_25<>scott d. stoller:tim teitelbaum<>static caching for incremental computation<>toplas<>yanhong a. liu<>
38601<>4350_29<>nulo<>dependence analysis for recursive data<>iccl<>yanhong a. liu<>
38608<>4350_36<>scott d. stoller<>efficient symbolic detection of global properties in distributed systems<>cav<>yanhong a. liu<>
20087<>4359_7<>yi ru huang<>new upper bounds for ramsey numbers<>ejc<>ke min zhang<>
38727<>4374_2<>xin yao<>making use of population information in evolutionary artificial neural networks<>tsmc<>yong liu<>
38730<>4374_5<>ko-hsin liang:xin yao:charles s. newton:david hoffman<>an experimental investigation of self-adaptation in evolutionary programming<>eps<>yong liu<>
38734<>4374_9<>xin yao<>scaling up evolutionary programming algorithms<>eps<>yong liu<>
38737<>4374_12<>xin yao<>time series prediction by using negatively correlated neural networks<>seal<>yong liu<>
38741<>4374_16<>xin yao<>towards designing neural network ensembles by evolution<>ppsn<>yong liu<>
9243<>4388_6<>nulo<>the toughness of split graphs<>dm<>gerhard j. woeginger<>
40355<>4389_1<>john l. lowther:ching-kuang shene<>a tool for teaching curve design<>sigcse<>yuan zhao<>
20250<>4448_1<>thomas s. huang:tsutomu miyasato:ryohei nakatsu<>multimodal human emotion/expression recognition<>fgr<>lawrence s. chen<>
20234<>4459_1<>i-chen wu<>an efficient incremental algorithm for identifying consistent checkpoints<>icpads<>loon-been chen<>
20235<>4459_2<>i-chen wu<>on detection of bounded global predicates<>cj<>loon-been chen<>
20238<>4459_5<>i-chen wu<>on the time complexity of minimum and maximum global snapshot problems<>ipl<>loon-been chen<>
14703<>4461_8<>robert m. gray<>context based multiscale classification of images<>icip<>jia li<>
14710<>4461_15<>james ze wang:gio wiederhold:oscar firschein<>system for screening objectionable images<>comcom<>jia li<>
14718<>4461_23<>robert m. gray<>text and picture segmentation by the distribution analysis of wavelet coefficients<>icip<>jia li<>
34100<>4465_0<>matthew t. mason<>experiments in impulsive manipulation<>icra<>wesley h. huang<>
16451<>4485_1<>paulo martins:luis moura silva<>a java interface for wmpi<>pvm<>joao gabriel silva<>
16458<>4485_8<>paula prata:mario zenha rela:henrique madeira<>practical issues in the use of abft and a new failure model<>ftcs<>joao gabriel silva<>
16459<>4485_9<>luis moura silva<>avoiding checkpoint contamination in parallel systems<>ftcs<>joao gabriel silva<>
16466<>4485_16<>luis moura silva:paulo martins<>merging web-based with cluster-based computing<>iscope<>joao gabriel silva<>
16470<>4485_20<>luis moura silva<>system-level versus user-defined checkpointing<>srds<>joao gabriel silva<>
7560<>4498_22<>hector garcia-molina<>cost-based media server design<>ride<>edward y. chang<>
1002<>4508_0<>vassilis j. tsotras:christos faloutsos<>designing access methods for bitemporal databases<>tkde<>anil kumar<>
12575<>4527_5<>shih-chien chou<>enacting object-oriented methods by a process environment<>infsof<>jason jen-yen chen<>
10422<>4530_0<>peter e. d. love<>visualisation of building interior design to reduce rework<>iv<>heng li<>
10402<>4533_5<>mei lu:zhiren sun<>hamiltonicity in 2-connected graphs with claws<>dm<>hao li<>
12545<>4562_9<>nulo<>a sound and complete proof theory for the generalized logic of only knowing<>jetai<>jianhua chen<>
10996<>4566_19<>claudio esperanca<>vertex representations and their applications in computer graphics<>vc<>hanan samet<>
11011<>4566_34<>aya soffer<>pictorial query specification for browsing through spatially referenced image databases<>vlc<>hanan samet<>
11016<>4566_39<>frantisek brabec<>the vasco r-tree java applet<>vdb<>hanan samet<>
11017<>4566_40<>aya soffer<>integrating symbolic images into a multimedia database system using classification and abstraction approaches<>vldb<>hanan samet<>
11036<>4566_59<>frantisek brabec<>visualizing and animating r-trees and spatial operations in spatial databases on the worldwide web<>vdb<>hanan samet<>
11061<>4566_84<>aya soffer<>magellan: map acquisition of geographic labels by legend analysis<>ijdar<>hanan samet<>
11109<>4566_132<>gisli r. hjaltason<>incremental distance join algorithms for spatial databases<>sigmod<>hanan samet<>
7259<>4585_1<>hongsing wong<>machine translation with a stochastic grammatical channel<>acl<>dekai wu<>
14049<>4609_0<>michael p. wellman<>conjectural equilibrium in multiagent learning<>ml<>junling hu<>
14046<>4611_2<>chris mungall:david nicholson:alan l. archibald<>design and implementation of a corba-based genome mapping system prototype<>bioinformatics<>jian hu<>
5043<>4630_0<>tzi-cker chiueh:tulika mitra:anindya neogi<>zodiac: a history-based interactive video authoring system<>mm<>chuan-kai yang<>
11324<>4654_12<>ichiro ide:koji yamamoto<>automatic video indexing based on shot classification<>amcp<>hidehiko tanaka<>
31315<>4657_0<>bruce m. maggs:c. greg plaxton:marco zagha<>sorting algorithms<>mst<>stephen j. smith<>
7085<>4663_12<>david b. leake<>categorizing case-base maintenance: dimensions and directions<>ewcbr<>david c. wilson<>
36347<>4671_0<>weifa liang:george havas<>improved lightpath (wavelength) routing in large wdm networks<>icdcs<>xiaojun shen<>
2560<>4681_12<>stuart a. grant<>trying harder to fail first<>ecai<>barbara m. smith<>
2570<>4682_0<>steve a. chien:nicola muscettola:kanna rajan:gregg rabideau<>automated planning and scheduling for goal-based autonomous spacecraft<>expert<>benjamin d. smith<>
33408<>4684_0<>soumitra bose:prathima agrawal<>deriving logic systems for path delay test generation<>tc<>vishwani d. agrawal<>
1499<>4692_0<>sharad mehrotra:rajeev rastogi:henry f. korth<>ensuring consistency in multidatabases by preserving two-level serializability<>tods<>abraham silberschatz<>
1509<>4693_0<>banu ozden:sridhar ramaswamy<>cyclic association rules<>icde<>abraham silberschatz<>
17522<>4703_0<>oscar c. au:peter h. w. wong:alexis m. tourapis<>predictive motion estimation for reduced-resolution video from high-resolution compressed video<>icip<>justy w. c. wong<>
27589<>4718_6<>olac fuentes<>hierarchical learning of navigational behaviors in an autonomous robot using a predictive sparse distributed memory<>arobots<>rajesh p. n. rao<>
27611<>4718_28<>daniel l. ruderman<>learning lie groups for invariant visual perception<>nips<>rajesh p. n. rao<>
27613<>4718_30<>olac fuentes<>hierarchical learning of navigational behaviors in an autonomous robot using a predictive sparse distributed memory<>ml<>rajesh p. n. rao<>
25187<>4720_0<>mark de berg:david bremner:suneeta ramaswami:gordon t. wilfong<>computing constrained minimum-width annuli of point sets<>cad<>prosenjit bose<>
25191<>4720_4<>luc devroye<>intersections with random geometric objects<>comgeo<>prosenjit bose<>
25194<>4720_7<>jurek czyzowicz:evangelos kranakis:anil maheshwari<>algorithms for packing two circles in a convex polygon<>jcdcg<>prosenjit bose<>
25207<>4720_20<>hazel everett:sandor p. fekete:michael e. houle:anna lubiw:henk meijer:kathleen romanik:gunter rote:thomas c. shermer:sue whitesides:christian zelle<>a visibility representation for graphs in three dimensions<>jgaa<>prosenjit bose<>
25221<>4720_34<>marc j. van kreveld:godfried t. toussaint<>filling polyhedral molds<>cad<>prosenjit bose<>
25229<>4720_42<>jurek czyzowicz:dominic lessard<>cutting rectangles in equal area pieces<>cccg<>prosenjit bose<>
25231<>4720_44<>pat morin<>testing the quality of manufactured disks and cylinders<>isaac<>prosenjit bose<>
25245<>4720_58<>jean-denis caron:kilani ghoudi<>detection of text-line orientation<>cccg<>prosenjit bose<>
25250<>4720_63<>jonathan f. buss:anna lubiw<>pattern matching for permutations<>ipl<>prosenjit bose<>
25263<>4720_76<>mark de berg:david bremner:william s. evans:lata narayanan<>recovering lines with fixed linear probes<>cccg<>prosenjit bose<>
25273<>4720_86<>jurek czyzowicz:evangelos kranakis:danny krizanc:anil maheshwari<>polygon cutting: revisited<>jcdcg<>prosenjit bose<>
31402<>4731_0<>richard furuta<>vrml-based representations of asl fingerspelling on the world wide web<>assets<>s. augustine su<>
849<>4743_6<>nulo<>role of constrained computational systems in natural language processing<>ai<>aravind k. joshi<>
851<>4743_8<>bonnie l. webber<>anchoring a lexicalized tree-adjoining grammar for discourse<>corr<>aravind k. joshi<>
797<>4744_0<>harini bharadvaj:sansanee auephanwiriyakul<>an active transcoding proxy to support mobile web access<>srds<>anupam joshi<>
828<>4744_31<>vineeth subramanyam<>security in mobile systems<>srds<>anupam joshi<>
17447<>4760_5<>david g. humphrey<>a revised simplex search procedure for stochastic simulation response-surface optimization<>wsc<>james r. wilson<>
17455<>4760_13<>michael e. kuhl:halim damerdji<>least squares estimation of nonhomogeneous poisson processes<>wsc<>james r. wilson<>
2208<>4765_20<>ke wang:lai-fun mun:xin-zhi qi<>using decision tree induction for discovering holes in data<>pricai<>bing liu<>
2216<>4765_28<>wynne hsu:yiming ma<>integrating classification and association rule mining<>kdd<>bing liu<>
2235<>4765_47<>ke wang:soon hock william tay<>interestingness-based interval merger for numeric association rules<>kdd<>bing liu<>
2248<>4765_60<>ke wang<>concurrent discretization of multiple attributes<>pricai<>bing liu<>
2287<>4769_0<>min wu<>watermarking for image authentication<>icip<>bede liu<>
27739<>4770_1<>jana dittmann:frank nack:arnd steinmetz<>interactive watermarking environments<>icmcs<>ralf steinmetz<>
30127<>4774_1<>chiou-shann fuh<>the fourier slice theorem for range data reconstruction<>ivc<>shih-schon lin<>
30301<>4780_3<>k. t. arasu<>abelian difference sets without self-conjugacy<>dcc<>siu lun ma<>
6841<>4784_0<>don coppersmith:bruce schneier:john kelsey<>cryptanalysis of twoprime<>fse<>david wagner<>
6842<>4784_1<>chris hall:john kelsey:bruce schneier<>building prfs from prps<>crypto<>david wagner<>
6868<>4784_27<>john kelsey:bruce schneier:chris hall<>cryptanalytic attacks on pseudorandom number generators<>fse<>david wagner<>
6869<>4784_28<>chris hall:john kelsey:vincent rijmen:bruce schneier<>cryptanalysis of speed<>sacrypt<>david wagner<>
6871<>4784_30<>nulo<>cryptanalysis of some recently-proposed multiple modes of operation<>fse<>david wagner<>
6872<>4784_31<>bruce schneier:john kelsey:doug whiting:chris hall<>on the twofish key schedule<>sacrypt<>david wagner<>
6876<>4784_35<>leone simpson:ed dawson:john kelsey:william millan:bruce schneier<>cryptanalysis of oryx<>sacrypt<>david wagner<>
6878<>4784_37<>nulo<>differential cryptanalysis of khf<>fse<>david wagner<>
6883<>4784_42<>chris hall:john kelsey:bruce schneier<>cryptanalysis of speed<>fc<>david wagner<>
6888<>4784_47<>john kelsey:bruce schneier:chris hall<>side channel cryptanalysis of product ciphers<>esorics<>david wagner<>
6914<>4786_16<>ulrik brandes<>using graph layout to visualize train interconnection data<>gd<>dorothea wagner<>
11240<>4796_11<>hongyuan zha:osni marques<>large-scale svd and subspace-based methods for information retrieval<>irregular<>horst d. simon<>
11243<>4796_14<>kesheng wu<>thick-restart lanczos method for symmetric eigenvalue problems<>irregular<>horst d. simon<>
31426<>4828_0<>hock-hai teo:bernard c. y. tan:kwok kee wei<>environmental scanning on the internet<>icis<>sharon s. l. tan<>
28349<>4831_1<>fabio casati:barbara pernici:giuseppe pozzi<>workflow evolution<>dke<>stefano ceri<>
20287<>4844_16<>dan halperin:hirohisa hirukawa:jean-claude latombe:randall h. wilson<>polyhedral assembly partitioning using maximally covered cells in arrangements of convex polytopes<>ijcga<>leonidas j. guibas<>
20293<>4844_22<>pankaj k. agarwal:david eppstein:monika rauch henzinger<>parametric and kinetic minimum spanning trees<>focs<>leonidas j. guibas<>
2939<>4862_2<>nulo<>a rough set approach to attribute generalization in data mining<>isci<>chien-chung chan<>
9932<>4871_0<>sri parameswaran<>power reduction in pipelines<>aspdac<>hui guo<>
9934<>4871_2<>sri parameswaran<>unrolling loops with indeterminate loop counts in system level pipelines<>aspdac<>hui guo<>
10161<>4875_8<>remy prost<>multi-port filtering system for lossless image compression<>icip<>ho-youl jung<>
10781<>4878_0<>hing-yan lee:hiroshi motoda<>knowledge discovery and data mining<>kbs<>hongjun lu<>
34613<>4880_6<>douglas h. norrie<>combining mediation and bidding mechanisms for agent-based manufacturing scheduling<>agents<>weiming shen<>
22014<>4885_9<>neill occhiogrosso:shang-hua teng<>simple and efficient graph compression schemes for dense and complement graphs<>jco<>ming-yang kao<>
22019<>4885_14<>nulo<>tree contractions and evolutionary trees<>siamcomp<>ming-yang kao<>
34290<>4886_1<>stephen w. keckler:william j. dally:daniel maskit:nicholas p. carter:andrew chang<>exploiting fine-grain thread level parallelism on the mit multi-alu processor<>isca<>whay sing lee<>
22020<>4887_0<>ching-tien ho<>efficient submesh permutations in wormhole-routed meshes<>isci<>ming-yang kao<>
34249<>4889_29<>salvatore j. stolfo:kui w. mok<>mining audit data to build intrusion detection models<>kdd<>wenke lee<>
34265<>4890_1<>peter l. bartlett:robert c. williamson<>the importance of convexity in learning with squared loss<>tit<>wee sun lee<>
34284<>4890_20<>michael r. frater:mark r. pickering:john f. arnold<>spatial temporal concealment of lost blocks in coded video<>icip<>wee sun lee<>
34209<>4893_23<>qinglong hu:dik lun lee<>optimal channel allocation for data dissemination in mobile computing environments<>icdcs<>wang-chien lee<>
22535<>4898_5<>ming-sang chang:deng-jyi chen:kuo-lung ku<>the distributed program reliability analysis on star topologies<>icpads<>min-sheng lin<>
31682<>4923_2<>erik brynjolfsson:lorin m. hitt<>intangible assets: how the interaction of computers and organizational structure affects stock market valuations<>icis<>shinkyu yang<>
15069<>4936_1<>katherine heinrich:cun-quan zhang<>triangle-free circuit decompositions and petersen minor<>jct<>jiping liu<>
15072<>4936_4<>huishan zhou<>edge k-to-1 homomorphisms<>arscom<>jiping liu<>
15073<>4938_0<>weiping shi:naveen kakani:tiejun yu<>a fast hierarchical algorithm for 3-d capacitance extraction<>dac<>jianguo liu<>
13341<>4939_4<>yucai feng<>binary partition based algorithms for mining association rules<>adl<>jianlin feng<>
11158<>4942_7<>piyush maheshwari<>an efficient clustering algorithm for partitioning parallel programs<>pc<>hong shen<>
11169<>4942_18<>sven venema:francis suraweera<>nc algorithms for the single most vital edge problem with respect to all pairs shortest paths<>ipps<>hong shen<>
11179<>4942_28<>keqin li:yi pan:gilbert h. young:si-qing zheng<>lower bounds for dynamic tree embedding in bipartite networks<>jpdc<>hong shen<>
11195<>4944_0<>david l. kao<>a new line integral convolution algorithm for visualizing time-varying flow fields<>tvcg<>han-wei shen<>
35606<>4977_1<>danny z. chen:ovidiu daescu:jinhui xu<>finding an optimal path without growing the tree<>esa<>xiaobo hu<>
35609<>4979_1<>d. frank hsu<>on shortest two-connected steiner networks with euclidean distance<>networks<>xiao-dong hu<>
28369<>4995_0<>kok f. lai:hong zhou<>query expansion by raw image features and text annotations in image retrieval<>accv<>syin chan<>
28377<>4997_2<>vincent t. y. ng:albert s. f. au<>a solid modeling library for the world wide web<>cn<>stephen chi-fai chan<>
17926<>5006_9<>hector garcia-molina:wilburt labio<>expiring data in a warehouse<>vldb<>jun yang<>
35106<>5018_36<>milind tambe<>towards flexible teamwork in persistent teams<>icmas<>weixiong zhang<>
35111<>5018_41<>nulo<>complete anytime beam search<>aaai<>weixiong zhang<>
13857<>5026_22<>chris olston:michael stonebraker:alexander aiken<>viqing: visual interactive querying<>vl<>joseph m. hellerstein<>
13859<>5026_24<>philip a. bernstein:michael l. brodie:stefano ceri:david j. dewitt:michael j. franklin:hector garcia-molina:jim gray:gerald held:h. v. jagadish:michael lesk:david maier:jeffrey f. naughton:hamid pirahesh:michael stonebraker:jeffrey d. ullman<>the asilomar report on database research<>sigmod<>joseph m. hellerstein<>
13869<>5026_34<>remzi h. arpaci-dusseau:andrea c. arpaci-dusseau:david e. culler:david a. patterson<>"the architectural costs of streaming i/o: a comparison of workstations, clusters, and smps."<>hpca<>joseph m. hellerstein<>
13880<>5026_45<>kimberly keeton:david a. patterson<>a case for intelligent disks (idisks)<>sigmod<>joseph m. hellerstein<>
13903<>5026_68<>nulo<>optimization techniques for queries with expensive methods<>tods<>joseph m. hellerstein<>
13906<>5026_71<>philip a. bernstein:michael l. brodie:stefano ceri:david j. dewitt:michael j. franklin:hector garcia-molina:jim gray:gerald held:h. v. jagadish:michael lesk:david maier:jeffrey f. naughton:hamid pirahesh:michael stonebraker:jeffrey d. ullman<>the asilomar report on database research<>corr<>joseph m. hellerstein<>
18642<>5035_3<>nulo<>a connectionist method for pattern classification with diverse features<>prl<>ke chen<>
18645<>5035_6<>deliang l. wang<>perceiving without learning: from spirals to inside/outside relations<>nips<>ke chen<>
32737<>5038_0<>stephane bressan:stuart e. madnick<>source attribution for querying against semi-structured documents<>widm<>thomas lee<>
24201<>5078_9<>ayal zaks<>t-choosability in graphs<>dam<>noga alon<>
24220<>5078_28<>michael krivelevich:benny sudakov<>finding a large hidden clique in a random graph<>rsa<>noga alon<>
24249<>5078_57<>nulo<>the shannon capacity of a union<>combinatorica<>noga alon<>
24257<>5078_65<>nulo<>on the capacity of digraphs<>ejc<>noga alon<>
24265<>5078_73<>eran halperin<>bipartite subgraphs of integer weighted graphs<>dm<>noga alon<>
24280<>5078_88<>michael krivelevich:benny sudakov<>finding a large hidden clique in a random graph<>soda<>noga alon<>
32192<>5081_2<>rajeev alur:sriram k. rajamani<>symbolic exploration of transition hierarchies<>tacas<>thomas a. henzinger<>
32200<>5081_10<>rajeev alur<>finitary fairness<>toplas<>thomas a. henzinger<>
32224<>5081_34<>jsrg preusig:stefan kowalewski:howard wong-toi<>an algorithm for the approximative analysis of rectangular automata<>ftrtft<>thomas a. henzinger<>
32246<>5081_56<>rajeev alur:orna kupferman:moshe y. vardi<>alternating refinement relations<>concur<>thomas a. henzinger<>
32257<>5081_67<>jean-francois raskin:pierre-yves schobbens<>the regular real-time languages<>icalp<>thomas a. henzinger<>
32267<>5081_77<>luca de alfaro:orna kupferman<>concurrent reachability games<>focs<>thomas a. henzinger<>
32299<>5081_109<>shaz qadeer:sriram k. rajamani<>"you assume, we guarantee: methodology and case studies."<>cav<>thomas a. henzinger<>
32305<>5081_115<>shaz qadeer:sriram k. rajamani:serdar tasiran<>an assume-guarantee rule for checking simulation<>fmcad<>thomas a. henzinger<>
32322<>5081_132<>vlad rusu<>reachability verification for hybrid automata<>hybrid<>thomas a. henzinger<>
32328<>5081_138<>rajeev alur:freddy y. c. mang:shaz qadeer:sriram k. rajamani:serdar tasiran<>mocha: modularity in model checking<>cav<>thomas a. henzinger<>
32337<>5081_147<>jean-francois raskin:pierre-yves schobbens<>axioms for real-time logics<>concur<>thomas a. henzinger<>
32350<>5081_160<>peter w. kopke:anuj puri:pravin varaiya<>what's decidable about hybrid automata?<>jcss<>thomas a. henzinger<>
35218<>5082_40<>dong xuan:weijia jia<>routing algorithms for anycast messages<>icpp<>wei zhao<>
35230<>5082_52<>chengzhi li:riccardo bettati<>response time analysis for distributed real-time systems with bursty job arrivals<>icpp<>wei zhao<>
2961<>5093_3<>luqi:hong zhu<>specifications in software prototyping<>jss<>carl k. chang<>
9428<>5105_4<>eric klavins:william c. rounds<>experimenting with power default reasoning<>aaai<>guo-qiang zhang<>
3263<>5124_0<>robert g. reynolds<>culturing evolution strategies to support the exploration of novel environments by an intelligent robotic agent<>eps<>chan-jin chung<>
37876<>5130_6<>r. j. blake:d. r. emerson<>an optimal migration algorithm for dynamic load balancing<>concurrency<>y. f. hu<>
22321<>5148_0<>francesco m. donini:daniele nardi:werner nutt:andrea schaerf<>an epistemic operator for description logics<>ai<>maurizio lenzerini<>
22323<>5148_2<>diego calvanese:daniele nardi<>description logics for conceptual data modeling<>dagstuhl<>maurizio lenzerini<>
22329<>5148_8<>diego calvanese:giuseppe de giacomo<>extending semi-structured data<>sebd<>maurizio lenzerini<>
22331<>5148_10<>diego calvanese:giuseppe de giacomo<>what can knowledge representation do for semi-structured data?<>aaai<>maurizio lenzerini<>
22336<>5148_15<>diego calvanese:giuseppe de giacomo<>on the decidability of query containment under constraints<>pods<>maurizio lenzerini<>
22338<>5148_17<>diego calvanese:giuseppe de giacomo<>semi-structured data with constraints and incomplete information<>dlog<>maurizio lenzerini<>
22339<>5148_18<>diego calvanese:giuseppe de giacomo:daniele nardi:riccardo rosati<>information integration: conceptual modeling and reasoning support<>coopis<>maurizio lenzerini<>
22357<>5148_36<>diego calvanese:giuseppe de giacomo:daniele nardi:riccardo rosati<>description logic framework for information integration<>kr<>maurizio lenzerini<>
22377<>5148_56<>diego calvanese:giuseppe de giacomo:daniele nardi:riccardo rosati<>source integration in data warehousing<>dexaw<>maurizio lenzerini<>
23109<>5149_7<>silvia chiusano:fulvio corno:roberto vietti<>a system for evaluating on-line testability at the rt-level<>dft<>matteo sonza reorda<>
23112<>5149_10<>fulvio corno:paolo prinetto:massimo violante<>exploiting symbolic techniques for partial scan flip flop selection<>date<>matteo sonza reorda<>
23120<>5149_18<>fulvio corno:paolo prinetto:maurizio rebaudengo<>a test pattern generation methodology for low-power consumption<>vts<>matteo sonza reorda<>
23155<>5149_53<>alfredo benso:paolo prinetto:maurizio rebaudengo<>a fault injection environment for microprocessor-based boards<>itc<>matteo sonza reorda<>
23158<>5149_56<>alfredo benso:maurizio rebaudengo:pierluigi civera<>an integrated hw and sw fault injection environment for real-time systems<>dft<>matteo sonza reorda<>
21607<>5163_4<>laurent amsaleg:anthony tomasic<>dynamic query operator scheduling for wide-area remote access<>dpd<>michael j. franklin<>
21617<>5163_14<>demet aksoy:mehmet altinel:rahul bose:ugur cetintemel:jane wang:stanley b. zdonik<>research in data broadcast and dissemination<>amcp<>michael j. franklin<>
21620<>5163_17<>bjorn oor jonsson:divesh srivastava<>interaction of query evaluation and buffer management for information retrieval<>sigmod<>michael j. franklin<>
21629<>5163_26<>demet aksoy<>scheduling for large-scale on-demand data broadcasting<>infocom<>michael j. franklin<>
21640<>5163_37<>tolga urhan:laurent amsaleg<>cost based query scrambling for initial delays<>sigmod<>michael j. franklin<>
21642<>5163_39<>stanley b. zdonik<>data in your face: push technology in perspective<>sigmod<>michael j. franklin<>
21653<>5163_50<>ugur cetintemel:bjorn oor jonsson:c. lee giles:divesh srivastava<>evaluating answer quality/efficiency tradeoffs<>krdb<>michael j. franklin<>
31849<>5170_9<>nulo<>"interpolation theorems for graphs, hypergraphs and matroids."<>dm<>sanming zhou<>
31850<>5170_10<>beifang chen<>"upper bounds for f-domination number of graphs."<>dm<>sanming zhou<>
31851<>5170_11<>jinjiang yuan<>harper-type lower bounds and the bandwidths of the compositions of graphs<>dm<>sanming zhou<>
3431<>5195_0<>michael orshansky:james c. chen<>a statistical performance simulation methodology for vlsi circuits<>dac<>chenming hu<>
38927<>5202_17<>bing liu:wynne hsu<>integrating classification and association rule mining<>kdd<>yiming ma<>
6452<>5207_0<>nulo<>automatic retrieval and clustering of similar words<>acl<>dekang lin<>
6455<>5207_3<>nulo<>an information-theoretic definition of similarity<>icml<>dekang lin<>
4540<>5220_21<>p. o. ng<>text extraction using pyramid<>pr<>c. l. tan<>
4551<>5220_32<>li kwang angela wee:loong cheong tong<>knowledge representation issues in information extraction<>pricai<>chew lim tan<>
4598<>5220_79<>jingtao yao:nicholas teng:hean-lee poh<>forecasting and analysis of marketing data using neural networks<>jise<>chew lim tan<>
8706<>5226_3<>ramaswamy govindarajan:n. s. s. narasimha rao:erik r. altman<>an enhanced co-scheduling method using reduced ms-state diagrams<>ipps<>guang r. gao<>
11711<>5228_8<>howard huang<>"type reconstruction for syntactic control of interference, part 2."<>iccl<>hongseok yang<>
33650<>5234_3<>bryan horling:frank klassner:anita raja:thomas wagner:xiaoqin zhang<>big: a resource-bounded information gathering agent<>aaai<>victor r. lesser<>
33646<>5236_2<>nulo<>reflections on the nature of multi-agent coordination and its implications for an agent architecture<>aamas<>victor r. lesser<>
28104<>5256_0<>sanjeev khanna:rajeev motwani<>on certificates and lookahead in dynamic graph problems<>algorithmica<>randall h. wilson<>
28106<>5256_2<>leonidas j. guibas:dan halperin:hirohisa hirukawa:jean-claude latombe<>polyhedral assembly partitioning using maximally covered cells in arrangements of convex polytopes<>ijcga<>randall h. wilson<>
28721<>5288_11<>jelena v. misic:samuel t. chanson<>towards a framework for testing distributed multimedia software systems<>pdse<>shing-chi cheung<>
28737<>5288_27<>kam-keung wong:samuel t. chanson<>a two-tier technique for authoring distributed multimedia applications<>icmcs<>shing-chi cheung<>
40685<>5293_2<>david eppstein:giuseppe f. italiano:thomas h. spencer<>separator-based sparsification ii: edge and vertex connectivity<>siamcomp<>zvi galil<>
10345<>5302_0<>hongjun lu:hiroshi motoda<>knowledge discovery and data mining<>kbs<>hing-yan lee<>
31729<>5307_0<>bob barr:thomas j. cheatham<>network monitoring system design<>sigcse<>sung yoo<>
10346<>5309_0<>jin-hyung kim<>gesture spotting from continuous hand motion<>prl<>hyeon-kyu lee<>
31718<>5316_1<>seung-moon kang<>a bootstrapped nmos charge recovery logic<>glvlsi<>seung-moon yoo<>
15697<>5326_27<>esther m. arkin:giri narasimhan<>resource-constrained geometric network optimization<>compgeom<>joseph s. b. mitchell<>
15713<>5326_43<>james t. klosowski:martin held:henry sowizral:karel zikan<>efficient collision detection using bounding volume hierarchies of k-dops<>tvcg<>joseph s. b. mitchell<>
15715<>5326_45<>avrim blum:prasad chalasani:santosh vempala<>a constant-factor approximation algorithm for the geometric k-mst problem in the plane<>siamcomp<>joseph s. b. mitchell<>
15728<>5326_58<>esther m. arkin:martin held:steven skiena<>recognizing polygonal parts from width measurements<>comgeo<>joseph s. b. mitchell<>
15730<>5326_60<>esther m. arkin:yi-jen chiang:martin held:vera sacristan:steven skiena:tae-heng yang<>on minimum-area hulls<>algorithmica<>joseph s. b. mitchell<>
15735<>5326_65<>arie tamir<>a maximum b-matching problem arising from median location models with applications to the roommates problem<>mp<>joseph s. b. mitchell<>
15740<>5326_70<>esther m. arkin:henk meijer:david rappaport:steven skiena<>decision trees for geometric models<>ijcga<>joseph s. b. mitchell<>
15603<>5327_18<>mark mitchell:andre scedrov<>a linguistic characterization of bounded oracle computation and probabilistic polynomial time<>focs<>john c. mitchell<>
15632<>5327_47<>kathleen fisher<>"on the relationship between classes, objects, and data abstraction."<>tapos<>john c. mitchell<>
15635<>5327_50<>patrick lincoln:mark mitchell:andre scedrov<>a probabilistic poly-time framework for protocol analysis<>ccs<>john c. mitchell<>
15651<>5327_66<>stephen n. freund<>a type system for object initialization in the java bytecode language<>oopsla<>john c. mitchell<>
2518<>5328_22<>catherine plaisant:rich mushlin<>an information architecture to support the visualization of personal histories<>ipm<>ben shneiderman<>
21014<>5341_7<>kee way ng<>incorporating priority scheme in ipv6 over atm networks<>icccn<>liren zhang<>
5215<>5343_0<>weiyi meng:king-lup liu:xiaodong wang:yuhsi chang:naphtali rishe<>determining text databases to search in the internet<>vldb<>clement t. yu<>
20992<>5351_3<>boris aronov:leonidas j. guibas:marek teichmann<>visibility queries in simple polygons and applications<>isaac<>li zhang<>
20995<>5351_6<>leonidas j. guibas<>euclidean proximity and power diagrams<>cccg<>li zhang<>
26414<>5357_19<>kenneth l. mcmillan:doron peled<>deciding global partial-order properties<>icalp<>rajeev alur<>
26417<>5357_22<>thomas a. henzinger:sriram k. rajamani<>symbolic exploration of transition hierarchies<>tacas<>rajeev alur<>
26422<>5357_27<>thomas a. henzinger<>finitary fairness<>toplas<>rajeev alur<>
26442<>5357_47<>mihalis yannakakis<>model checking of hierarchical state machines<>sigsoft<>rajeev alur<>
26507<>5357_112<>thomas a. henzinger:freddy y. c. mang:shaz qadeer:sriram k. rajamani:serdar tasiran<>mocha: modularity in model checking<>cav<>rajeev alur<>
26514<>5357_119<>thomas a. henzinger:orna kupferman:moshe y. vardi<>alternating refinement relations<>concur<>rajeev alur<>
24642<>5359_20<>roberto segala:rainer gawlick:jorgen f. sogaard-andersen<>liveness in timed and untimed systems<>iandc<>nancy a. lynch<>
24656<>5359_34<>henrik ejersbo jensen<>a proof of burns -process mutual exclusion algorithm using abstraction<>tacas<>nancy a. lynch<>
24664<>5359_42<>mandana vaziri:jeannette m. wing<>proving correctness of a controller algorithm for the raid level 5 system<>ftcs<>nancy a. lynch<>
24691<>5359_69<>roger khazan:alan fekete<>multicast group communication as a base for a load-balancing replicated data service<>wdag<>nancy a. lynch<>
24720<>5359_98<>carolos livadas<>formal verification of safety-critical hybrid systems<>hybrid<>nancy a. lynch<>
24725<>5359_103<>john lygeros<>strings of vehicles: modeling and safety conditions<>hybrid<>nancy a. lynch<>
15181<>5366_0<>stan z. li<>generalizing capacity of face database for face recognition<>fgr<>juwei lu<>
15161<>5368_0<>masateru harao:masami hagiya<>higher order generalization<>jelia<>jianguo lu<>
13449<>5369_2<>tom barclay:robert eberl:john nordlinger:guru raghavendran:donald r. slutz:greg smith:phil smoot:john hoffman:natt robb iii:hedy rossmeissl:beth duff:george lee:theresa mathesmier:randall sunne<>microsoft terraserver<>corr<>jim gray<>
13453<>5369_6<>philip a. bernstein:michael l. brodie:stefano ceri:david j. dewitt:michael j. franklin:hector garcia-molina:gerald held:joseph m. hellerstein:h. v. jagadish:michael lesk:david maier:jeffrey f. naughton:hamid pirahesh:michael stonebraker:jeffrey d. ullman<>the asilomar report on database research<>corr<>jim gray<>
13454<>5369_7<>philip a. bernstein:michael l. brodie:stefano ceri:david j. dewitt:michael j. franklin:hector garcia-molina:gerald held:joseph m. hellerstein:h. v. jagadish:michael lesk:david maier:jeffrey f. naughton:hamid pirahesh:michael stonebraker:jeffrey d. ullman<>the asilomar report on database research<>sigmod<>jim gray<>
14158<>5376_18<>subhash suri:philip m. hubbard<>collision detection in aspect and scale bounded polyhedra<>soda<>john f. hughes<>
33066<>5385_2<>ross peeters<>fast convergence with a greedy tag-phrase dictionary<>dcc<>tony c. smith<>
14186<>5386_5<>nulo<>type specialization<>csur<>john hughes<>
14196<>5386_15<>nulo<>a type specialisation tutorial<>pepm<>john hughes<>
15890<>5401_13<>nulo<>objects and constraints<>tools<>james noble<>
15893<>5401_16<>jan vitek:john potter<>flexible alias protection<>ecoop<>james noble<>
15895<>5401_18<>david holmes:john potter<>toward reusable synchronisation for object-oriented languages<>ecoopw<>james noble<>
15904<>5401_27<>david g. clarke:john potter<>ownership types for flexible alias protection<>oopsla<>james noble<>
15914<>5401_37<>john potter:david clarke<>the ins and outs of objects<>aswec<>james noble<>
26523<>5424_1<>markus g. kuhn<>soft tempest: hidden data transmission using electromagnetic emanations<>ih<>ross j. anderson<>
26540<>5424_18<>nulo<>on the security of digital tachographs<>esorics<>ross j. anderson<>
26541<>5424_19<>francesco bergadano:bruno crispo:jong-hyeon lee:charalampos manifavas:roger m. needham<>a new family of authentication protocols<>sigops<>ross j. anderson<>
26544<>5424_22<>roger m. needham:adi shamir<>the steganographic file system<>ih<>ross j. anderson<>
26546<>5424_24<>fabien a. p. petitcolas:markus g. kuhn<>attacks on copyright marking systems<>ih<>ross j. anderson<>
37217<>5430_6<>jai-ming lin:d. f. wong<>graph matching-based algorithms for fpga segmentation design<>iccad<>yao-wen chang<>
34666<>5450_8<>feng zhu:sanjai rayadurgam<>automating regression testing for real-time software in a distributed environment<>isorc<>wei-tek tsai<>
34667<>5450_9<>yamin wang:ramakrishna v. vishnuvajjala<>sequence specification for concurrent object-oriented applications<>ijseke<>wei-tek tsai<>
34674<>5450_16<>satish subramanian:sanjai rayadurgam<>design for constraint violation detection in safety-critical systems<>hase<>wei-tek tsai<>
34681<>5450_23<>i-ling yen:raymond a. paul:victor l. winter:john m. covan:larry j. dalton:leon alkalai:ann t. tai:rick harper:barry flahive:ramin mojdehbakhsh:sanjai rayadurgam:kinji mori:michael r. lowry<>key applications for high-assurance systems<>computer<>wei-tek tsai<>
34683<>5450_25<>feng zhu<>framework-oriented analysis<>compsac<>wei-tek tsai<>
34684<>5450_26<>akira k. onoma:mustafa h. poonawala:hiroshi suganuma<>regression testing in an industrial environment<>cacm<>wei-tek tsai<>
4040<>5451_1<>gail a. alverson:william g. griswold:david notkin:lawrence snyder<>"abstractions for portable, scalable parallel programming."<>tpds<>calvin lin<>
4046<>5451_7<>jian yin:lorenzo alvisi:michael dahlin<>using leases to support server-driven consistency in large-scale systems<>icdcs<>calvin lin<>
4047<>5451_8<>john a. gunnels:greg morrow:robert a. van de geijn<>a flexible class of parallel matrix multiplication algorithms<>ipps<>calvin lin<>
4059<>5451_20<>bradford l. chamberlain:sung-eun choi:e. christopher lewis:lawrence snyder:derrick weathersby<>zpl's wysiwyg performance model<>hips<>calvin lin<>
4061<>5451_22<>e. christopher lewis:lawrence snyder<>the implementation and evaluation of fusion and contraction in array languages<>pldi<>calvin lin<>
4072<>5452_6<>shih-fu chang<>robust image authentication method surviving jpeg lossy compression<>spieSR<>ching-yung lin<>
15399<>5454_8<>hans hagen:christian lohr:joachim w. deitmer<>interactive navigation through glial cells<>cgi<>jorg meyer<>
15400<>5454_9<>rolf hendrik van lengen:mathias matzat:hans hagen<>shadow generation for volumetric data sets<>vc<>jorg meyer<>
15434<>5456_8<>rogier m. van eijk:frank s. de boer:wiebe van der hoek<>constructing translations between individual vocabularies in multi-agent systems<>aimsa<>john-jules ch. meyer<>
15457<>5456_31<>bernd van linder:wiebe van der hoek<>formalising abilities and opportunities of agents<>fuin<>john-jules ch. meyer<>
15461<>5456_35<>rogier m. van eijk:frank s. de boer:wiebe van der hoek<>systems of communicating agents<>ecai<>john-jules ch. meyer<>
15467<>5456_41<>koen v. hindriks:frank s. de boer:wiebe van der hoek<>a formal embedding of agentspeak(l) in 3apl<>ausai<>john-jules ch. meyer<>
15470<>5456_44<>wiebe van der hoek:jan treur<>temporalizing epistemic default logic<>jolli<>john-jules ch. meyer<>
15475<>5456_49<>rogier m. van eijk:frank s. de boer:wiebe van der hoek<>information-passing and belief revision in multi-agent systems<>atal<>john-jules ch. meyer<>
15497<>5456_71<>rogier m. van eijk:frank s. de boer:wiebe van der hoek<>translations of vocabularies in systems of communicating agents<>entcs<>john-jules ch. meyer<>
15510<>5456_84<>rogier m. van eijk:frank s. de boer:wiebe van der hoek<>information-passing and belief revision in multi-agent systems<>icmas<>john-jules ch. meyer<>
15512<>5456_86<>roel wieringa:frank dignum<>the role of deontic logic in the specification of information systems<>dagstuhl<>john-jules ch. meyer<>
15519<>5456_93<>koen v. hindriks:frank s. de boer:wiebe van der hoek<>control structures of rule-based agent languages<>atal<>john-jules ch. meyer<>
15527<>5460_0<>dietrich boles:markus dreger:kai grosjohann:cornelia haber:andreas kusserow:stefan lohrum:dirk menke:gerhard moller:ricarda weber<>the medoc system - a digital publication and reference service for computer science<>medoc<>jochen meyer<>
15528<>5460_1<>hans-jurgen appelrath<>design and implementation of the medoc fulltext system<>medoc<>jochen meyer<>
15529<>5460_2<>cornelia haber:ricarda weber<>aufbau und realisierung des medoc-volltextspeichers<>ife<>jochen meyer<>
15532<>5464_2<>l. staples:scott l. minneman:michael naimark:a. glassner<>artists and technologists working together (panel)<>uist<>jon meyer<>
7460<>5470_0<>elena ferrari:giovanna guerrini:isabella merlo<>extending the odmg object model with time<>ecoop<>elisa bertino<>
7464<>5470_4<>giovanna guerrini<>extending the odmg object model with composite objects<>oopsla<>elisa bertino<>
7468<>5470_8<>elena ferrari:giovanna guerrini<>an approach to model and query event-based temporal data<>time<>elisa bertino<>
7475<>5470_15<>giovanna guerrini:rene bal<>a formal definition of the chimera object-oriented data model<>jiis<>elisa bertino<>
7478<>5470_18<>nulo<>data security<>dke<>elisa bertino<>
7479<>5470_19<>sushil jajodia:luigi v. mancini:indrajit ray<>advanced transaction processing in multilevel secure file stores<>tkde<>elisa bertino<>
7486<>5470_26<>barbara catania:vincenzo gervasi:alessandra raffaeta<>active-u-datalog: integrating active rules in a logical update language<>dagstuhl<>elisa bertino<>
7491<>5470_31<>elena ferrari<>data security<>compsac<>elisa bertino<>
7497<>5470_37<>alberto belussi:barbara catania<>an extended algebra for constraint databases<>tkde<>elisa bertino<>
7502<>5470_42<>barbara catania<>a constraint-based approach to shape management in multimedia databases<>mms<>elisa bertino<>
7507<>5470_47<>elena ferrari:pierangela samarati<>mandatory security and object-oriented systems: a multilevel entity model and its mapping onto a single-level object model<>tapos<>elisa bertino<>
7511<>5470_51<>barbara catania:alberto belussi<>introducing external functions in constraint query languages<>cp<>elisa bertino<>
7525<>5470_65<>barbara catania:luca chiesa<>definition and analysis of index organizations for object-oriented database systems<>is<>elisa bertino<>
7528<>5470_68<>barbara catania:boris shidlovsky<>towards optimal indexing for segment databases<>edbt<>elisa bertino<>
7529<>5470_69<>francesco buccafurri:elena ferrari:pasquale rullo<>an authorization model and its formal semantics<>esorics<>elisa bertino<>
7530<>5470_70<>claudio bettini:elena ferrari:pierangela samarati<>an access control model supporting periodicity constraints and temporal reasoning<>tods<>elisa bertino<>
32903<>5488_0<>tu bao ho:ngoc binh nguyen:takuyu ito<>development of some methods and tools for discovering conceptual knowledge<>dis<>trong dung nguyen<>
30826<>5503_5<>debabrata dey<>psql: a query language for probabilistic relational data<>dke<>sumit sarkar<>
30820<>5505_2<>p. p. chakrabarti:sujoy ghose<>learning while solving problems in best first search<>tsmc<>sudeshna sarkar<>
1538<>5538_13<>pedro sousa:miguel antunes<>naming: design pattern and framework<>compsac<>antonio rito silva<>
17991<>5554_6<>nicholas teng:hean-lee poh:chew lim tan<>forecasting and analysis of marketing data using neural networks<>jise<>jingtao yao<>
29011<>5557_3<>dana s. nau:william c. regli<>imacs: a case study in real-world planning<>expert<>satyandra k. gupta<>
29017<>5557_9<>christiaan j. j. paredis:p. f. brown<>micro planning for mechanical assembly operations<>icra<>s. k. gupta<>
28975<>5558_2<>ahmed helmy:deborah estrin<>fault-oriented test generation for multicast routing protocol design<>forte<>sandeep k. s. gupta<>
28976<>5558_3<>weiyu chen:melvin a. breuer<>test generation in vlsi circuits for crosstalk noise<>itc<>sandeep k. gupta<>
28978<>5558_5<>suriyaprakash natarajan:melvin a. breuer<>process variations and their impact on circuit operation<>dft<>sandeep k. gupta<>
28979<>5558_6<>seongmoon wang<>atpg for heat dissipation minimization during test application<>tc<>sandeep k. gupta<>
28983<>5558_10<>chen-huan chiang<>bist tpg for combinational cluster (glue logic) interconnect testing at board level<>ats<>sandeep k. gupta<>
28992<>5558_19<>yuan-chieh hsu<>an automatic test pattern generator for at-speed robust path delay testing<>ats<>sandeep k. gupta<>
8576<>5565_14<>ralph j. faudree:warren e. shreve<>note on whitney's theorem for k-connected graphs<>arscom<>guantao chen<>
8588<>5565_26<>michael s. jacobson:andre e. kezdy:jeno lehel<>tough enough chordal graphs are hamiltonian<>networks<>guantao chen<>
37982<>5571_1<>john c. kunz:tore r. christiansen:geoff p. cohen:raymond e. levitt<>the virtual design team<>cacm<>yan jin<>
31780<>5578_5<>kai salomaa<>synchronization expressions with extended join operation<>tcs<>sheng yu<>
31781<>5578_6<>jin ma<>practical rules for reduction on the number of states of a state diagram<>tools<>sheng yu<>
31783<>5578_8<>lila kari:gheorghe paun:grzegorz rozenberg:arto salomaa<>"dna computing, sticker systems, and universality."<>acta<>sheng yu<>
31791<>5578_16<>cezar campeanu:nicolae santean<>minimal cover-automata for finite languages<>wia<>sheng yu<>
31795<>5582_2<>gupdong guo:songle ma<>unsupervised segmentation of color images<>icip<>shan yu<>
37962<>5588_3<>nulo<>decentralized adaptive fuzzy control of robot manipulators<>tsmc<>yaochu jin<>
29032<>5616_3<>c. p. ravikumar:akshay jajoo<>synthesis of testable rtl designs<>vlsid<>sumit gupta<>
35414<>5622_0<>binhai zhu<>on computing and drawing maxmin-height covering triangulation<>gd<>xiaotie deng<>
20357<>5632_0<>gerard j. chang:xuding zhu<>circular chromatic numbers and fractional chromatic numbers of distance graphs<>ejc<>lingling huang<>
18381<>5636_8<>thomas w. sederberg:david sewell:malcolm a. sabin<>non-uniform recursive subdivision surfaces<>siggraph<>jianmin zheng<>
37013<>5638_34<>shuji isobe:takao nishizeki<>a polynomial-time algorithm for finding total colorings of partial k-trees<>wg<>xiao zhou<>
37018<>5638_39<>takao nishizeki<>the edge-disjoint paths problem is np-complete for partial k-trees<>isaac<>xiao zhou<>
36915<>5640_2<>jitian xiao:yanchun zhang:xiaohua jia<>data declustering and cluster-ordering technique for spatial join scheduling<>fodo<>xiaofang zhou<>
36918<>5640_5<>david j. abel:david truffet<>data partitioning for parallel spatial join processing<>geoinformatica<>xiaofang zhou<>
1439<>5647_3<>shimon even:ami litman<>monochromatic paths and triangulated graphs<>siamdm<>arnold l. rosenberg<>
8657<>5648_0<>bryan carpenter:donald leskiw:xiaoming li:yuhong wen:guansong zhang<>language bindings for a data-parallel runtime<>hips<>geoffrey fox<>
8660<>5648_3<>bryan carpenter:guansong zhang:xiaoming li:xinying li:yuhong wen<>towards a java environment for spmd programming<>europar<>geoffrey fox<>
8662<>5648_5<>guansong zhang:bryan carpenter:xinying li:yuhong wen<>considerations in hpjava language design and implementation<>lcpc<>geoffrey fox<>
27431<>5672_9<>david hsu:lydia e. kavraki:jean-claude latombe<>capturing the connectivity of high-dimensional geometric spaces by parallelizable random sampling techniques<>ipps<>rajeev motwani<>
27448<>5672_26<>david r. karger:madhu sudan<>approximate graph coloring by semidefinite programming<>jacm<>rajeev motwani<>
27458<>5672_36<>min fang:narayanan shivakumar:hector garcia-molina:jeffrey d. ullman<>computing iceberg queries efficiently<>vldb<>rajeev motwani<>
27463<>5672_41<>craig silverstein:sergey brin:jeffrey d. ullman<>scalable techniques for mining causal structures<>vldb<>rajeev motwani<>
27466<>5672_44<>sergey brin:lawrence page:terry winograd<>what can you do with a web in your pocket?<>debu<>rajeev motwani<>
27482<>5672_60<>piotr indyk<>approximate nearest neighbors: towards removing the curse of dimensionality<>stoc<>rajeev motwani<>
27493<>5672_71<>surajit chaudhuri:vivek r. narasayya<>random sampling for histogram construction: how much is enough?<>sigmod<>rajeev motwani<>
27494<>5672_72<>sanjeev khanna:randall h. wilson<>on certificates and lookahead in dynamic graph problems<>algorithmica<>rajeev motwani<>
27500<>5672_78<>moses charikar:dan halperin<>the dynamic servers problem<>soda<>rajeev motwani<>
27517<>5672_95<>david r. karger:madhu sudan<>approximate graph coloring by semidefinite programming<>corr<>rajeev motwani<>
27529<>5672_107<>svetlozar nestorov:serge abiteboul<>extracting schema from semistructured data<>sigmod<>rajeev motwani<>
27537<>5672_115<>lydia e. kavraki:jean-claude latombe:prabhakar raghavan<>randomized query processing in robot path planning<>jcss<>rajeev motwani<>
17282<>5701_27<>chia-yo chang:roger k. chang<>scientific data mining: a case study<>ijseke<>jason tsong-li wang<>
17291<>5701_36<>bruce a. shapiro:dennis shasha:kaizhong zhang:kathleen m. currey<>an algorithm for finding the largest approximately common substructures of two trees<>pami<>jason tsong-li wang<>
17245<>5703_3<>zhongfu zhang:linzhong liu:jianxun zhang<>on the relations between arboricity and independent number or covering number<>dam<>jianfang wang<>
28492<>5724_4<>a. n. rajagopalan:k. sunil kumar:jayashree karlekar:r. manivasakan:m. milind patil:uday b. desai:p. g. poonacha<>finding faces in photographs<>iccv<>subhasis chaudhuri<>
28498<>5724_10<>s. g. deshpande<>recursive estimation of illuminant motion from flow field and simultaneous recovery of shape<>cviu<>subhasis chaudhuri<>
28510<>5724_22<>m. kamath:uday b. desai<>direct parametric object detection in tomographic images<>ivc<>subhasis chaudhuri<>
35930<>5725_9<>zhiming liu:anders p. ravn<>verifying duration properties of timed transition systems<>procomet<>xiaoshan li<>
17377<>5745_2<>nulo<>primal and dual neural networks for shortest-path routing<>tsmc<>jun wang<>
17378<>5745_3<>guang wu<>a multilayer recurrent neural network for solving continuous-time algebraic riccati equations<>nn<>jun wang<>
34586<>5746_0<>tien-tsin wong:pheng-ann heng:siu-hang or<>illumination of image-based objects<>jvca<>wai-yin ng<>
10377<>5766_1<>nulo<>separating exponentially ambiguous finite automata from polynomially ambiguous finite automata<>siamcomp<>hing leung<>
10383<>5766_7<>nulo<>on finite automata with limited nondeterminism<>acta<>hing leung<>
24023<>5768_1<>cai heng li:cheryl e. praeger<>isomorphisms of finite cayley digraphs of bounded valency<>jct<>ming yao xu<>
24029<>5768_7<>nulo<>automorphism groups and isomorphisms of cayley digraphs<>dm<>ming-yao xu<>
26848<>5769_1<>nulo<>a comparison of hashing schemes for address lookup in computer networks<>corr<>raj jain<>
26849<>5769_2<>nulo<>congestion control and traffic management in atm networks: recent advances and a survey<>corr<>raj jain<>
26850<>5769_3<>bobby vandalore:rohit goyal:sonia fahmy<>design and analysis of queue control functions for explicit rate switch schemes<>icccn<>raj jain<>
26852<>5769_5<>bobby vandalore:sonia fahmy:rohit goyal:mukul goyal<>a definition of general weighted fairness and its support in explicit rate switch algorithms<>icnp<>raj jain<>
26854<>5769_7<>shivkumar kalyanaraman:jianping jiang:rohit goyal:sonia fahmy<>design considerations for the virtual source/virtual destination (vs/vd) feature in the abr service of atm networks<>cn<>raj jain<>
26855<>5769_8<>dah-ming chiu:w. hawe<>a quantitative measure of fairness and discrimination for resource allocation in shared computer systems<>corr<>raj jain<>
26856<>5769_9<>sonia fahmy:rohit goyal:bobby vandalore:shivkumar kalyanaraman:sastri kota:pradeep samudra<>feedback consolidation algorithms for abr point-to-multipoint connections in atm networks<>infocom<>raj jain<>
26857<>5769_10<>shivkumar kalyanaraman:bobby vandalore:rohit goyal:sonia fahmy:seong-cheol kim:sastri kota<>performance of tcp over abr with long-range dependent vbr background traffic over terrestrial and satellite atm networks<>corr<>raj jain<>
26858<>5769_11<>rohit goyal:steve lai:arjan durresi<>laboratories for data communications and computer networks<>corr<>raj jain<>
26859<>5769_12<>rohit goyal:sonia fahmy:bobby vandalore<>providing rate guarantees to tcp over the atm gfr service<>lcn<>raj jain<>
26860<>5769_13<>bobby vandalore:rohit goyal:sonia fahmy<>design and analysis of queue control functions for explicit rate switch schemes<>corr<>raj jain<>
26862<>5769_15<>nulo<>myths about congestion management in high speed networks<>corr<>raj jain<>
26864<>5769_17<>nulo<>error characteristics of fiber distributed data interface (fddi)<>corr<>raj jain<>
26865<>5769_18<>rohit goyal:sonia fahmy:shobana narayanaswamy<>modeling traffic management in atm networks with opnet<>corr<>raj jain<>
26868<>5769_21<>shivkumar kalyanaraman:ram viswanathan<>the osu scheme for congestion avoidance in atm networks using explicit rate indication<>corr<>raj jain<>
26869<>5769_22<>gojko babic:bobby vandalore<>analysis and modeling of traffic in modern data communication networks<>corr<>raj jain<>
26870<>5769_23<>shivkumar kalyanaraman:jianping jiang:rohit goyal:sonia fahmy:pradeep samudra<>design considerations for the virtual source/virtual destination (vs/vd) feature in the abr service of atm networks<>corr<>raj jain<>
26872<>5769_25<>bobby vandalore:sonia fahmy:rohit goyal:mukul goyal<>overload based explicit rate switch schemes with mcr guarantees<>corr<>raj jain<>
26875<>5769_28<>nulo<>a delay based approach for congestion avoidance in interconnected heterogeneous computer networks<>corr<>raj jain<>
26876<>5769_29<>gopal dommety<>potential networking applications of global positioning systems (gps)<>corr<>raj jain<>
26880<>5769_33<>shivkumar kalyanaraman:sonia fahmy:rohit goyal<>buffer requirements for tcp/ip over abr<>corr<>raj jain<>
26881<>5769_34<>sonia fahmy:shivkumar kalyanaraman:rohit goyal:fang lu<>on source rules for abr service on atm networks with satellite links<>corr<>raj jain<>
26882<>5769_35<>shivkumar kalyanaraman:rohit goyal:sonia fahmy:seong-cheol kim<>performance of tcp/ip using atm abr and ubr services over satellite networks<>corr<>raj jain<>
26883<>5769_36<>shivkumar kalyanaraman:bobby vandalore:rohit goyal:sonia fahmy<>performance of tcp over abr with long-range dependent vbr background traffic over terrestrial and satellite atm networks<>lcn<>raj jain<>
26884<>5769_37<>k. ramakrishnan:dah-ming chiu<>congestion avoidance in computer networks with a connectionless network layer<>corr<>raj jain<>
26885<>5769_38<>nulo<>performance analysis of fddi token ring networks: effect of parameters and guidelines for setting ttrt<>corr<>raj jain<>
26887<>5769_40<>nulo<>congestion control in computer networks: trends and issues<>corr<>raj jain<>
26888<>5769_41<>sonia fahmy:rohit goyal:bobby vandalore:shivkumar kalyanaraman:sastri kota:pradeep samudra<>feedback consolidation algorithms for abr point-to-multipoint connections in atm networks<>corr<>raj jain<>
26890<>5769_43<>bobby vandalore:shivkumar kalyanaraman:rohit goyal:sonia fahmy<>worst case buffer requirements for tcp over abr<>corr<>raj jain<>
26892<>5769_45<>rohit goyal:shivkumar kalyanaraman:sonia fahmy:bobby vandalore<>improving the performance of tcp over the atm-ubr service<>comcom<>raj jain<>
26894<>5769_47<>shivkumar kalyanaraman:rohit goyal:sonia fahmy:pradeep samudra<>use-it-or-lose-it policies for the available bit rate (abr) service in atm networks<>cn<>raj jain<>
26895<>5769_48<>rohit goyal:shivkumar kalyanaraman:sonia fahmy:bobby vandalore:sastri kota<>tcp selective acknowledgments and ubr drop policies to improve atm-ubr performance over terrestrial and satellite networks<>corr<>raj jain<>
26896<>5769_49<>nulo<>on caching out-of-order packets in window flow controlled networks<>corr<>raj jain<>
26897<>5769_50<>bobby vandalore:shivkumar kalyanaraman:rohit goyal:sonia fahmy:seong-cheol kim<>performance of bursty world wide web (www) sources over abr<>corr<>raj jain<>
26898<>5769_51<>bobby vandalore:shivkumar kalyanaraman:rohit goyal:sonia fahmy<>simulation study of world wide web traffic over the atm abr service<>corr<>raj jain<>
26899<>5769_52<>rohit goyal:sonia fahmy:bobby vandalore<>providing rate guarantees to tcp over the atm gfr service<>corr<>raj jain<>
26900<>5769_53<>sastri kota:rohit goyal<>satellite atm network architectural considerations and tcp/ip performance<>corr<>raj jain<>
26903<>5769_56<>nulo<>data flies standby with abr service<>corr<>raj jain<>
26905<>5769_58<>shivkumar kalyanaraman:sonia fahmy:rohit goyal:jianping jiang:seong-cheol kim<>performance of tcp over abr on atm backbone and with various vbr traffic patterns<>corr<>raj jain<>
26906<>5769_59<>sonia fahmy<>abr flow control for multipoint connections<>corr<>raj jain<>
26909<>5769_62<>anna charny:d. clark<>congestion control with explicit rate indication<>corr<>raj jain<>
26910<>5769_63<>nulo<>a timeout based congestion control scheme for window flow- controlled networks<>corr<>raj jain<>
26911<>5769_64<>nulo<>characteristics of destination address locality in computer networks: a comparison of caching schemes<>corr<>raj jain<>
26912<>5769_65<>shivkumar kalyanaraman:ram viswanathan<>the osu scheme for congestion avoidance in atm networks: lessons learnt and extensions<>corr<>raj jain<>
26913<>5769_66<>bobby vandalore:sonia fahmy:rohit goyal:mukul goyal<>a definition of general weighted fairness and its support in explicit rate switch algorithms<>corr<>raj jain<>
26914<>5769_67<>rohit goyal:shivkumar kalyanaraman:sonia fahmy:bobby vandalore<>improving the performance of tcp over the atm-ubr service<>corr<>raj jain<>
26916<>5769_69<>sonia fahmy:rohit goyal:bobby vandalore<>fairness for abr multipoint-to-point connections<>corr<>raj jain<>
26917<>5769_70<>shivkumar kalyanaraman:sonia fahmy:rohit goyal:bobby vandalore<>the erica switch algorithm for abr traffic management in atm networks<>corr<>raj jain<>
26918<>5769_71<>shivkumar kalyanaraman:rohit goyal:sonia fahmy:seong-cheol kim<>use-it or lose-it policies for the available bit rate (abr) service in atm networks<>corr<>raj jain<>
26921<>5769_74<>nulo<>divergence of timeout algorithms for packet retransmissions<>corr<>raj jain<>
26922<>5769_75<>rohit goyal:sonia fahmy:bobby vandalore:shivkumar kalyanaraman<>design issues for providing minimum rate guarantees to the atm unspecified bit rate service<>corr<>raj jain<>
26924<>5769_77<>sonia fahmy:shivkumar kalyanaraman:rohit goyal:bobby vandalore<>on determining the fair bandwidth share for abr connections in atm networks<>corr<>raj jain<>
26925<>5769_78<>shivkumar kalyanaraman:sonia fahmy:rohit goyal:seong-cheol kim<>performance and buffering requirements of internet protocols over atm abr and ubr services<>corr<>raj jain<>
26927<>5769_80<>shivkumar kalyanaraman:sonia fahmy:rohit goyal:seong-cheol kim<>source behavior for atm abr traffic management: an explanation<>corr<>raj jain<>
10367<>5791_0<>nulo<>improving defect removal effectiveness for software development<>csmr<>hareton k. n. leung<>
2602<>5794_1<>nulo<>case-base maintenance<>ieaaie<>barry smyth<>
2681<>5794_80<>mark t. keane<>adaptation-guided retrieval: questioning the similarity assumption in reasoning<>ai<>barry smyth<>
2686<>5794_85<>padraig cunningham:andrea bonzano<>an incremental retrieval mechanism for case-based electronic fault diagnosis<>kbs<>barry smyth<>
2689<>5794_88<>wolfgang wilke:padraig cunningham<>using configuration techniques for adaptation<>iccbr<>barry smyth<>
36470<>5815_2<>menas kafatos:zuotao li:ruixin yang:dan ziskin<>information technology implementation for a distributed data system serving earth scientists: seasonal to interannual esip<>ssdbm<>xiaoyang sean wang<>
4010<>5823_0<>charles x. ling<>data mining for direct marketing: problems and solutions<>kdd<>chenghui li<>
40897<>5831_1<>nulo<>a neural model of contour integration in the primary visual cortex<>neco<>zhaoping li<>
40898<>5831_2<>peter dayan<>computational differences between asymmetrical and symmetrical networks<>nips<>zhaoping li<>
40899<>5839_0<>osmar r. zaiane:jiawei han:jean hou<>mining multimedia data<>cascon<>ze-nian li<>
6200<>5847_0<>nulo<>riemann mapping based constraint handling for evolutionary search<>sac<>dae gyu kim<>
40381<>5867_2<>omar m. al-jarrah<>intelligent compliant motion control<>tsmc<>yuan f. zheng<>
40399<>5871_11<>kanta matsuura:hideki imai<>compact and flexible resolution of cbt multicast key-distribution<>wwca<>yuliang zheng<>
40407<>5871_19<>xian-mo zhang<>the nonhomomorphicity of s-boxes<>icisc<>yuliang zheng<>
40408<>5871_20<>xian-mo zhang<>the nonhomomorphicity of boolean functions<>sacrypt<>yuliang zheng<>
40419<>5871_31<>hideki imai<>compact and unforgeable key establishment over an atm network<>infocom<>yuliang zheng<>
40421<>5871_33<>miodrag j. mihaljevic:hideki imai<>a cellular automaton based fast one-way hash function suitable for hardware implementation<>pkc<>yuliang zheng<>
40427<>5871_39<>hideki imai<>how to construct efficient signcryption schemes on elliptic curves<>ipl<>yuliang zheng<>
7808<>5877_5<>murat bayraktar:change zhang:bharadwaj vadapalli:neill a. kipp<>a web art gallery<>dl<>edward a. fox<>
7833<>5877_30<>binzhang liu:ghaleb abdulla:tommy johnson<>web response time and proxy caching<>webnet<>edward a. fox<>
7851<>5877_48<>osman balci:cengiz ulusarac:poorav shah<>a library of reusable model components for visual simulation of the ncstrl system<>wsc<>edward a. fox<>
12109<>5879_0<>jin-hyuk yang:byoung-woon kim:sang-jun nam:jang-ho cho:sung-won seo:chang-ho ryu:young-su kwon:dae-hyun lee:jong-yeol lee:jong-sun kim:hyun-dhong yoon:jae-yeol kim:kun-moo lee:chan-soo hwang:jun sung kim:kwang-il park:kyu ho park:yong-hoon lee:seung ho hwang:in-cheol park:chong-min kyung<>metacore: an application specific dsp development system<>dac<>in-hyung kim<>
12114<>5886_0<>gunter mahler<>correlation between correlations: process and time in quantum networks<>qcqc<>ilki kim<>
35564<>5889_9<>stephen a. billings<>dual-orthogonal radial basis function networks for nonlinear time series prediction<>nn<>xia hong<>
4786<>5894_17<>gabriel rivera<>data transformations for eliminating conflict misses<>pldi<>chau-wen tseng<>
4790<>5894_21<>gabriel rivera<>eliminating conflict misses for high performance architectures<>ics<>chau-wen tseng<>
4799<>5894_30<>hwansoo han:peter j. keleher<>eliminating barrier synchronization for compiler-parallelized codes on software dsms<>ijpp<>chau-wen tseng<>
28933<>5897_1<>benedetto matarazzo:roman slowinski<>a new rough set approach to multicriteria and multiattribute classification<>rsctc<>salvatore greco<>
28944<>5897_12<>benedetto matarazzo:roman slowinski<>fuzzy similarity relation as a basis for rough approximations<>rsctc<>salvatore greco<>
28202<>5911_0<>svetlozar nestorov:rajeev motwani<>extracting schema from semistructured data<>sigmod<>serge abiteboul<>
32981<>5913_52<>martin andersson<>leveled commitment contracting among myopic individually rational agents<>icmas<>tuomas sandholm<>
20038<>5916_3<>horst d. simon<>thick-restart lanczos method for symmetric eigenvalue problems<>irregular<>kesheng wu<>
20009<>5917_13<>philip s. yu:ming-syan chen<>energy-efficient mobile cache invalidation<>dpd<>kun-lung wu<>
20020<>5917_24<>philip s. yu<>increasing multimedia system throughput with consumption-based buffer management<>mms<>kun-lung wu<>
30649<>5945_19<>luitpold babel<>on the structure of graphs with few ps<>dam<>stephan olariu<>
4461<>5959_2<>yun yang:yanchun zhang:xiaohua jia<>a web-based real-time cooperative editor in java<>webnet<>chengzheng sun<>
4472<>5972_7<>xiaohua jia:yanchun zhang:yun yang:david chen<>"achieving convergence, causality preservation, and intention preservation in real-time cooperative editing systems."<>tochi<>chengzheng sun<>
4473<>5972_8<>zhiyi huang:abdul sattar<>exploring regional locality in distributed shared memory<>asian<>chengzheng sun<>
4474<>5972_9<>clarence a. ellis<>"operational transformation in real-time group editors: issues, algorithms, and achievements."<>cscw<>chengzheng sun<>
4475<>5972_10<>zhonghua yang:abdul sattar:yanyan yang<>guaranteed mutually consistent checkpointing in distributed computations<>asian<>chengzheng sun<>
4488<>5972_23<>zhiyi huang:wan-ju lei:abdul sattar<>toward transparent selective sequential consistency in distributed shared memory systems<>icdcs<>chengzheng sun<>
19663<>5985_1<>qi he:timothy w. finin<>personal security agent: kqml-based pki<>agents<>katia p. sycara<>
19672<>5985_10<>nicholas r. jennings:michael wooldridge<>a roadmap of agent research and development<>aamas<>katia p. sycara<>
19675<>5985_13<>prasad chalasani:somesh jha:onn shehory<>strategies for querying information agents<>cia<>katia p. sycara<>
19680<>5985_18<>qi he:zhongmin su<>a solution to open standard of pki<>acisp<>katia p. sycara<>
19683<>5985_21<>onn shehory:prasad chalasani:somesh jha<>agent cloning<>icmas<>katia p. sycara<>
19690<>5985_28<>onn shehory:prasad chalasani:somesh jha<>increasing resource utilization and task performance by agent cloning<>atal<>katia p. sycara<>
19691<>5985_29<>michael lewis:terri l. lenox:linda roberts<>calibrating trust to integrate intelligent agents into human teams<>hicss<>katia p. sycara<>
19700<>5985_38<>james d. thomas<>"heterogeneity, stability, and efficiency in distributed systems."<>icmas<>katia p. sycara<>
19709<>5985_47<>dajun zeng<>bayesian learning in negotiation<>ijmms<>katia p. sycara<>
19714<>5986_0<>nulo<>multiagent systems<>aim<>katia p. sycara<>
25404<>5991_14<>ira a. smith:jeffrey bradshaw:mark greaves:heather holmback<>designing conversation policies using joint intention theory<>icmas<>philip r. cohen<>
22268<>6005_0<>andrew w. moore<>cached sufficient statistics for efficient machine learning with large datasets<>jair<>mary s. lee<>
22269<>6005_1<>andrew w. moore<>cached sufficient statistics for efficient machine learning with large datasets<>corr<>mary s. lee<>
22262<>6012_2<>gerard g. medioni<>inferring segmented surface description from stereo data<>cvpr<>mi-suen lee<>
22265<>6012_5<>gerard g. medioni<>"a unified framework for salient curves, regions, and junctions inference."<>accv<>mi-suen lee<>
24815<>6022_7<>mihir bellare:erez petrank<>uniform generation of np-witnesses using an np-oracle<>eccc<>oded goldreich<>
24844<>6022_36<>alfredo de santis:giovanni di crescenzo:giuseppe persiano<>the graph clustering problem has a perfect zero-knowledge proof<>eccc<>oded goldreich<>
24849<>6022_41<>benny chor:eyal kushilevitz:madhu sudan<>private information retrieval<>jacm<>oded goldreich<>
24867<>6022_59<>shafi goldwasser:dana ron<>property testing and its connection to learning and approximation<>jacm<>oded goldreich<>
24870<>6022_62<>dana ron:madhu sudan<>chinese remaindering with errors<>eccc<>oded goldreich<>
24878<>6022_70<>shafi goldwasser:nathan linial<>fault-tolerant computation in the full information model<>siamcomp<>oded goldreich<>
24903<>6022_95<>amit sahai:salil p. vadhan<>honest-verifier statistical zero-knowledge equals general statistical zero-knowledge<>stoc<>oded goldreich<>
24907<>6022_99<>rafail ostrovsky:erez petrank<>computational complexity and knowledge complexity<>siamcomp<>oded goldreich<>
24913<>6022_105<>ziv bar-yossef:avi wigderson<>deterministic amplification of space bounded probabilistic algorithms<>eccc<>oded goldreich<>
15569<>6026_2<>bonnie a. nardi:david j. wright<>"collaborative, programmable intelligent agents."<>cacm<>james r. miller<>
34869<>6039_0<>kuen-jong lee:jhing-fa wang<>a general structure of feedback shift registers for built-in self test<>jise<>wei-lun wang<>
28250<>6044_0<>chatchai khunboa<>network traffic characterization of distributed database applications<>anss<>sujata banerjee<>
28260<>6044_10<>panos k. chrysanthis<>network latency optimizations in distributed database systems<>icde<>sujata banerjee<>
30132<>6049_1<>kung-kiu lau:mario ornaghi:alan wills<>interacting frameworks in catalysis<>icfem<>s. liu<>
30139<>6049_8<>nulo<>a formal definition of frsm and applications<>ijseke<>shaoying liu<>
778<>6077_1<>nadia a. chuzhanova:steve margetts<>feature selection for genetic sequence classification<>bioinformatics<>antonia j. jones<>
6776<>6091_17<>lee blaine:limei gilham:junbo liu:stephen j. westfold<>planware - domain-specific synthesis of high-performance schedulers<>kbse<>douglas r. smith<>
3374<>6093_9<>jou-ming chang<>the recognition of geodetically connected graphs<>ipl<>chin-wen ho<>
3384<>6093_19<>sun-yuan hsieh:gen-huey chen<>an efficient parallel strategy for computing k-terminal reliability and finding most vital edges in 2-trees and partial 2-trees<>jpdc<>chin-wen ho<>
6422<>6146_0<>xun yu zhou<>explicit efficient frontier of a continuous-time mean variance portfolio selection problem<>ifip7-2<>d. li<>
6414<>6148_1<>richard r. muntz<>coca: collaborative objects coordination architecture<>cscw<>du li<>
24790<>6157_3<>n. ranganathan:ravi gadekarla<>object-oriented architectural support for a java processor<>ecoop<>narayanan vijaykrishnan<>
1822<>6162_0<>connie loggia ramsey:kenneth a. de jong:john j. grefenstette:donald s. burke<>genome length as an evolutionary self-adaptation<>ppsn<>annie s. wu<>
1827<>6162_5<>donald s. burke:kenneth a. de jong:john j. grefenstette:connie loggia ramsey<>putting more genetics into genetic algorithms<>ec<>annie s. wu<>
1829<>6163_1<>david m. mount:nathan s. netanyahu:christine d. piatko:ruth silverman<>quantile approximation for robust statistical estimation<>cccg<>angela y. wu<>
20363<>6166_2<>ido dagan:fernando c. n. pereira<>similarity-based models of word cooccurrence probabilities<>corr<>lillian lee<>
33487<>6174_2<>nulo<>interval methods in knowledge representation<>ijufks<>vladik kreinovich<>
33495<>6174_10<>diane i. doser:kevin d. crain:mark r. baker:matthew c. gerstenberger<>estimating uncertainties for geophysical tomography<>rc<>vladik kreinovich<>
33508<>6174_23<>gerhard heindl:anatoly v. lakeyev<>solving linear interval systems is np-hard even if we exclude overflow and underflow<>rc<>vladik kreinovich<>
33512<>6174_27<>ann q. gates:luc longpre<>kolmogorov complexity justifies software engineering heuristics<>eatcs<>vladik kreinovich<>
33517<>6174_32<>nulo<>interval methods in knowledge representation<>ijufks<>vladik kreinovich<>
33518<>6174_33<>nulo<>interval methods in knowledge representation<>ijufks<>vladik kreinovich<>
33522<>6174_37<>nulo<>interval methods in knowledge representation<>ijufks<>vladik kreinovich<>
33530<>6174_45<>nulo<>interval methods in knowledge representation<>ijufks<>vladik kreinovich<>
33535<>6174_50<>daniel e. cooke:joseph e. urban<>a distributed version of the sequencel language<>srds<>vladik kreinovich<>
33536<>6174_51<>gerhard heindl:anatoly v. lakeyev<>solving linear interval systems is np-hard even if we exclude overflow and underflow<>rc<>vladik kreinovich<>
33539<>6174_54<>nulo<>interval methods in knowledge representation<>ijufks<>vladik kreinovich<>
12152<>6180_0<>j. h. m. byne<>surface based hypothesis verification in intensity images using geometric and appearance data<>accv<>j. a. d. w. anderson<>
12153<>6180_1<>j. h. m. byne<>a cad-based computer vision system<>ivc<>j. a. d. w. anderson<>
10577<>6187_9<>hiroshi motoda:manoranjan dash<>a monotonic measure for optimal feature selection<>ecml<>huan liu<>
10588<>6187_20<>rudy setiono<>analysis of hidden representations by greedy clustering<>connection<>huan liu<>
10592<>6187_24<>rudy setiono<>incremental feature selection<>apin<>huan liu<>
10613<>6187_45<>manoranjan dash<>hybrid search of feature subsets<>pricai<>huan liu<>
10620<>6187_52<>hongjun lu:jun yao<>identifying relevant databases for multidatabase mining<>pakdd<>huan liu<>
10623<>6187_55<>rudy setiono<>feature transformation and multivariate decision tree induction<>dis<>huan liu<>
10639<>6188_7<>ke wang<>discovering typical structures of documents: a road map approach<>sigir<>huiqing liu<>
24303<>6192_9<>katia p. sycara:michael wooldridge<>a roadmap of agent research and development<>aamas<>nicholas r. jennings<>
24318<>6192_24<>simon parsons:carles sierra<>agents that reason and negotiate by arguing<>logcom<>nicholas r. jennings<>
24320<>6192_26<>peyman faratin:carles sierra<>negotiation decision functions for autonomous agents<>ras<>nicholas r. jennings<>
24328<>6192_34<>michael wooldridge<>pitfalls of agent-oriented development<>agents<>nicholas r. jennings<>
24341<>6192_47<>m. a. gibney<>dynamic resource allocation by market-based routing in telecommunications networks<>iata<>nicholas r. jennings<>
24387<>6192_93<>noyda matos:carles sierra<>determining successful negotiation strategies: an evolutionary approach<>icmas<>nicholas r. jennings<>
24404<>6192_110<>timothy j. norman:peyman faratin<>adept: an agent-based approach to business process management<>sigmod<>nicholas r. jennings<>
11390<>6201_44<>carlo zaniolo<>user defined aggregates for logical data languages<>deductive<>haixun wang<>
14087<>6219_1<>roger crawfis:don stredney<>edge preservation in volume rendering using splatting<>vvs<>jian huang<>
11457<>6222_0<>nulo<>vertex-disjoint triangles in claw-free graphs with minimum degree at least three<>combinatorica<>hong wang<>
11468<>6222_11<>nulo<>vertex-disjoint hexagons with chords in a bipartite graph<>dm<>hong wang<>
11473<>6222_16<>nulo<>triangles in claw-free graphs<>dm<>hong wang<>
14073<>6225_5<>nulo<>a note on spanning local tournaments in locally semicomplete digraphs<>dam<>jing huang<>
14082<>6225_14<>jorgen bang-jensen<>kings in quasi-transitive digraphs<>dm<>jing huang<>
14085<>6225_17<>anders yeo<>maximal and minimal vertex-critical graphs of diameter two<>jct<>jing huang<>
10876<>6236_0<>martin l. brady:kenneth k. jung:thinh p. q. nguyen<>interactive volume navigation<>tvcg<>h. t. nguyen<>
10879<>6240_0<>nulo<>from optimal hyperplanes to optimal decision trees<>fuin<>hung son nguyen<>
10885<>6240_6<>sinh hoa nguyen<>pattern extraction from data<>fuin<>hung son nguyen<>
36283<>6242_4<>da-wei wang:c. k. wong<>on avoidable and unavoidable claws<>dm<>xiaoyun lu<>
40708<>6254_1<>akihiko takano:masato takeichi<>program transformation in calculational form<>csur<>zhenjiang hu<>
40715<>6254_8<>wei-ngan chin:akihiko takano<>parallelization via context preservation<>iccl<>zhenjiang hu<>
40729<>6254_22<>hideya iwasaki:masato takeichi<>towards manipulation of mutually recursive functions<>flops<>zhenjiang hu<>
40745<>6257_4<>zhenhong liu<>a strongly polynomial algorithm for the inverse shortest arborescence problem<>dam<>zhiquan hu<>
18530<>6264_1<>tianrong liu:stan z. li<>model-based active object recognition using mrf matching and sensor planning<>accv<>kap luk chan<>
36551<>6272_0<>gui liang feng:t. r. n. rao<>new double-byte error-correcting codes for memory systems<>tit<>xinwen wu<>
7884<>6286_17<>shimon even<>a note on limited preemption<>ppl<>edward g. coffman jr.<>
7896<>6286_29<>leopold flatto:predrag r. jelenkovic:bjorn poonen<>packing random intervals on-line<>algorithmica<>edward g. coffman jr.<>
7929<>6286_62<>nabil kahale:frank thomson leighton<>processor-ring communication: a tight asymptotic bound on packet waiting times<>siamcomp<>edward g. coffman jr.<>
7942<>6287_0<>nulo<>linearly derived steiner triple systems<>dcc<>e. f. assmus jr.<>
7946<>6287_4<>nulo<>the category of linear codes<>tit<>e. f. assmus jr.<>
7976<>6288_22<>roy t. fielding:kenneth m. anderson:gregory alan bolcer:peyman oreizy:richard n. taylor<>web-based development of complex information products<>cacm<>e. james whitehead jr.<>
7978<>6288_24<>meredith wiggins<>webdav: ietf standard for collaborative authoring on the web<>internet<>e. james whitehead jr.<>
10017<>6304_6<>kunihiko sadakane:kensuke onishi:mary inaba:fumihiko takeuchi:keiko imai<>voronoi diagrams by divergences with additive weights<>compgeom<>hiroshi imai<>
9822<>6309_9<>herbert edelsbrunner:ping fu<>shape space from deformation<>pg<>ho-lun cheng<>
33880<>6323_0<>georgios b. giannakis:n. nandhakumar<>a harmonic retrieval framework for discontinuous motion estimation<>tip<>wei-ge chen<>
17861<>6326_0<>mukesh singhal<>design of a high-performance atm firewall<>ccs<>jun xu<>
17862<>6326_1<>mukesh singhal<>a firewalling scheme for securing mpoa-based enterprise networks<>hase<>jun xu<>
17812<>6333_0<>juha kuusela:alessandro maccari<>architectural modeling in industry - an experience report<>icse<>jianli xu<>
17819<>6333_7<>juha kuusela<>analyzing the execution architecture of mobile phone software with colored petri nets<>sttt<>jianli xu<>
13035<>6345_1<>nulo<>mosaics of scenes with moving objects<>cvpr<>james davis<>
715<>6348_13<>james p. delgrande<>revising timegraph-ii<>ai<>arvind gupta<>
716<>6348_14<>tim van allen:james p. delgrande<>point-based approaches to qualitative temporal reasoning<>pricai<>arvind gupta<>
674<>6352_8<>elise de doncker<>multivariate integration on hypercubic and mesh networks<>pc<>ajay gupta<>
13003<>6357_15<>aaron f. bobick<>a robust human-silhouette extraction technique for interactive virtual environments<>captech<>james w. davis<>
35327<>6360_4<>t. liang:ce-kuen shieh<>cluster queue structure for shared-memory multiprocessor systems<>icpads<>weiping zhu<>
1663<>6363_2<>bryan a. norman:rifat aykut arapoglu<>integrated facility design using an evolutionary approach with a subordinate network algorithm<>ppsn<>alice e. smith<>
1620<>6370_38<>john tse<>cpu cache prefetching: timing evaluation of hardware implementations<>tc<>alan jay smith<>
18869<>6382_6<>anthony chiu:ben kao<>an analysis of lock-based and optimistic concurrency control protocols in multiprocessor real-time databases<>jss<>kam-yiu lam<>
18881<>6382_18<>tony s. h. lee<>approaches for scheduling of triggered transactions in real-time active database systems<>euromicro<>kam-yiu lam<>
18888<>6382_25<>wai-cheong yau<>on using similarity for concurrency control in real-time database systems<>jss<>kam-yiu lam<>
5595<>6385_4<>cheng liao:dongming jiang:liviu iftode:margaret martonosi<>monitoring shared virtual memory performance on a myrinet-based pc cluster<>ics<>douglas w. clark<>
5596<>6385_5<>pritpal s. ahuja:kevin skadron:margaret martonosi<>multipath execution: opportunities and limits<>ics<>douglas w. clark<>
5600<>6385_9<>matthias a. blumrich:richard alpert:yuqun chen:stefanos n. damianakis:cezary dubnicki:edward w. felten:liviu iftode:kai li:margaret martonosi:robert a. shillner<>design choices in the shrimp system: an empirical study<>isca<>douglas w. clark<>
5602<>6385_11<>kevin skadron:pritpal s. ahuja:margaret martonosi<>improving prediction for procedure returns with return-address-stack repair mechanisms<>micro<>douglas w. clark<>
14982<>6393_16<>nulo<>a method of spatial reasoning based on qualitative trigonometry<>ai<>jiming liu<>
14989<>6393_23<>hong qin<>behavioral self-organization in lifelike agents<>agents<>jiming liu<>
15003<>6393_37<>nulo<>reactive agents for adaptive image analysis<>agents<>jiming liu<>
395<>6420_5<>sarit mukherjee:igor r. viguier<>buffer management in real-time active database systems<>jss<>anindya datta<>
3802<>6434_3<>ragunathan rajkumar:john p. lehoczky:daniel p. siewiorek<>practical solutions for qos-based resource allocation<>rtss<>chen lee<>
26950<>6442_2<>theresa p. vaughan<>"on union-closed families, i ."<>jct<>robert t. johnson<>
37259<>6467_12<>qing-hong zhu:arie e. kaufman:shigeru muraki<>physically-based animation of volumetric objects<>ca<>yan chen<>
37314<>6470_30<>nulo<>modelling software operational reliability via input domain-based reliability growth model<>ftcs<>yinong chen<>
37334<>6474_1<>chiang lee:chih-horng ke:j.-b. chang<>minimization of resource consumption for multidatabase query optimization<>coopis<>yaw-huei chen<>
28617<>6482_2<>stephen f. smith<>"putting the ""genetics"" back into genetic algorithms (reconsidering the role of crossover in hybrid operators)."<>foga<>stephen y. chen<>
28572<>6490_33<>rangasami l. kashyap<>empirical studies of multimedia semantic models for multimedia presentations<>cata<>shu-ching chen<>
25515<>6495_3<>perry cheng:robert harper<>generational stack collection and profile-driven pretenuring<>pldi<>peter lee<>
25516<>6495_4<>philip wickline:frank pfenning<>run-time code generation and modal-ml<>pldi<>peter lee<>
25518<>6495_6<>george c. necula<>the design and implementation of a certifying compiler<>pldi<>peter lee<>
25520<>6495_8<>george c. necula<>efficient representation and validation of proofs<>lics<>peter lee<>
25525<>6495_13<>philip wickline:frank pfenning:rowan davies<>modal types as staging specifications for run-time code generation<>csur<>peter lee<>
25527<>6495_15<>george c. necula<>"safe, untrusted agents using proof-carrying code."<>mas<>peter lee<>
25530<>6495_18<>edoardo biagioni:kenneth cline:chris okasaki:chris stone<>safe-for-space threads in standard ml<>lisp<>peter lee<>
32885<>6506_20<>davi geiger:robert kohn<>representation and self-similarity of shapes<>iccv<>tyng-luh liu<>
36097<>6514_1<>lewis hassell:il-yeol song:tamas e. doszkocs<>visual interactions with web database content<>npiv<>xia lin<>
36082<>6515_3<>youshou wu:chi fang:xiaoqing ding<>knowledge extraction based multilayer feedforward neural networks<>iconip<>xiaofan lin<>
36085<>6515_6<>xiaoqing ding:youbin chen:jinhui liu:youshou wu<>evaluation and application of recognition confidence in ocr<>accv<>xiaofan lin<>
36092<>6515_13<>xiaoqing ding:ming chen:rui zhang:youshou wu<>adaptive confidence transform based classifier combination for chinese character recognition<>prl<>xiaofan lin<>
29142<>6539_5<>chu-cheow lim:yoke-hean low:boon-ping gan<>implementations of dispatch rules in parallel manufacturing simulation<>wsc<>sanjay jain<>
28028<>6542_19<>arvind krishnamurthy:richard p. martin:thomas e. anderson:david e. culler<>modeling communication pipeline latency<>sigmetrics<>randolph y. wang<>
10050<>6544_0<>christian kanzow<>a continuation method for (strongly) monotone variational inequalities<>mp<>houyuan jiang<>
39318<>6550_33<>cheng-chung tan<>on termination detection protocols in a mobile distributed computing environment<>icpads<>yu-chee tseng<>
28405<>6555_24<>patricia l. albacete:giuseppe polese<>iconic language design for people with significant speech and multiple impairments<>assistive<>shi-kuo chang<>
28409<>6555_28<>ehab hassanein:chung-yuan hsieh<>a multimedia micro-university<>ieeemm<>shi-kuo chang<>
28411<>6555_30<>paolo bottoni:maria francesca costabile:stefano levialdi:piero mussio<>on the specification of dynamic visual languages<>vl<>shi-kuo chang<>
28419<>6555_38<>taieb znati<>fusion of multimedia information<>iwmmdbms<>shi-kuo chang<>
28447<>6555_66<>ana b. benitez:mandis beigi<>using relevance feedback in content-based image metasearch<>internet<>shih-fu chang<>
12061<>6557_4<>paul stelling:carl kesselman:craig a. lee:gregor von laszewski<>a fault detection service for wide area distributed computations<>hpdc<>ian t. foster<>
12065<>6557_8<>carl kesselman<>the globus project: a status report<>hcw<>ian t. foster<>
12074<>6557_17<>warren smith:valerie e. taylor<>predicting application run times using historical information<>jsspp<>ian t. foster<>
12081<>6557_24<>sharon brunett:karl czajkowski:steven fitzgerald:andrew e. johnson:carl kesselman:jason leigh:steven tuecke<>application experiences with the globus toolkit<>hpdc<>ian t. foster<>
12090<>6557_33<>karl czajkowski:nicholas t. karonis:carl kesselman:stuart martin:warren smith:steven tuecke<>a resource management architecture for metacomputing systems<>jsspp<>ian t. foster<>
12102<>6557_45<>carl kesselman:gene tsudik:steven tuecke<>a security architecture for computational grids<>ccs<>ian t. foster<>
12107<>6557_50<>jonathan geisler:william gropp:nicholas t. karonis:ewing l. lusk:george k. thiruvathukal:steven tuecke<>wide-area implementation of the message passing interface<>pc<>ian t. foster<>
28485<>6558_1<>bin yu:martin vetterli<>spatially adaptive wavelet thresholding with context modeling for image denoising<>icip<>s. grace chang<>
21825<>6565_0<>elizabeth d. mynatt:vicki l. o'day:annette adler<>"network communities: something old, something new, something borrowed?"<>cscw<>mizuko ito<>
40818<>6579_3<>jenn-yuan tsai:zhenzhen jiang:david j. lilja:xin wang:pen-chung yew:bixia zheng:stephen j. schwinn<>integrating parallelizing compilation technology and processor architecture for cost-effective concurrent multithreading<>jise<>zhiyuan li<>
40827<>6579_12<>trung n. nguyen<>interprocedural analysis for loop scheduling and data allocation<>pc<>zhiyuan li<>
40850<>6580_0<>nulo<>a subresultant theory for ore polynomials with applications<>issac<>ziming li<>
1412<>6583_0<>tamarah arons<>verification of data-insensitive circuits: an in-order-retirement case study<>fmcad<>amir pnueli<>
1417<>6583_5<>werner damm:sitvanit ruah<>herbrand automata for hardware verification<>concur<>amir pnueli<>
1418<>6583_6<>ofer strichman:michael siegel<>translation validation for synchronous languages<>icalp<>amir pnueli<>
1302<>6584_16<>allen leung:krishna v. palem<>a fast algorithm for scheduling time-constrained instructions on processors with ilp<>IEEEpact<>amir pnueli<>
1333<>6584_47<>michael siegel:eli singerman<>translation validation<>tacas<>amir pnueli<>
1340<>6584_54<>eugene asarin:oded maler<>on discretization of delays in timed automata and digital circuits<>concur<>amir pnueli<>
1345<>6584_59<>natarajan shankar:eli singerman<>fair synchronous transition systems and their liveness proofs<>ftrtft<>amir pnueli<>
1349<>6584_63<>yonit kesten:li-on raviv<>algorithmic verification of linear temporal logic specifications<>icalp<>amir pnueli<>
1400<>6584_114<>ofer strichman:michael siegel<>the code validation tool cvt: automatic verification of a compilation process<>sttt<>amir pnueli<>
33397<>6628_0<>roberto bruni:jose meseguer:vladimiro sassone<>a comparison of petri net semantics under the collective token philosophy<>asian<>ugo montanari<>
33237<>6639_0<>hongquan yu<>an inequality on connected domination parameters<>arscom<>tianming wang<>
1117<>6653_10<>colin j. fidge:ian j. hayes:axel wabenhorst<>a set-theoretic model for real-time specification and reasoning<>mpc<>a. p. martin<>
4280<>6664_0<>chuan yi tang<>solving the weighted efficient edge domination problem on bipartite permutation graphs<>dam<>chin lung lu<>
41494<>6671_9<>en-hui yang<>an on-line universal lossy data compression algorithm via continuous codebook refinement - part iii: redundancy analysis<>tit<>zhen zhang<>
41503<>6671_18<>raymond w. yeung<>on characterization of entropy function via information inequalities<>tit<>zhen zhang<>
41504<>6671_19<>rudolf ahlswede:ning cai<>zero-error capacity for models with memory and the enlightened dictator channel<>tit<>zhen zhang<>
41452<>6673_13<>james d. salehi:james f. kurose:donald f. towsley<>supporting stored video reducing rate variability and end-to-end resource requirements through optimal smoothing<>ton<>zhi-li zhang<>
41463<>6673_24<>yuewei wang:david hung-chang du:dongli su<>a network-conscious approach to end-to-end video delivery over wide area networks using proxy servers<>infocom<>zhi-li zhang<>
41430<>6674_20<>ikuko shimizu:shigeru akamatsu:koichiro deguchi<>head pose determination from one image using a generic model<>fgr<>zhengyou zhang<>
41434<>6674_24<>michael j. lyons:michael schuster:shigeru akamatsu<>comparison between geometry-based and gabor-wavelets-based facial expression recognition using multi-layer perceptron<>fgr<>zhengyou zhang<>
3694<>6676_0<>robert weibel<>computational perspectives on map generalization<>geoinformatica<>christopher b. jones<>
3698<>6676_4<>j. mark ware<>matching and aligning features in overlayed coverages<>gis<>christopher b. jones<>
3703<>6676_9<>j. mark ware<>proximity search with a triangulated spatial model<>cj<>christopher b. jones<>
16505<>6682_0<>vera lucia strube de lima<>lexical categorical disambiguation using a multi-agent systems architecture<>icmas<>joa l. t. da silva<>
1870<>6684_7<>hervo bronnimann<>optimal slope selection via cuttings<>comgeo<>bernard chazelle<>
1962<>6684_99<>nulo<>the discrepancy method<>isaac<>bernard chazelle<>
1967<>6684_104<>nulo<>a spectral approach to lower bounds with applications to geometric searching<>siamcomp<>bernard chazelle<>
36893<>6689_1<>kevin lai:mema roussopoulos:diane tang:mary baker<>experiences with a mobile testbed<>wwca<>xinhua zhao<>
36895<>6689_3<>claude castelluccia:mary baker<>flexible network support for mobility<>mobicom<>xinhua zhao<>
11660<>6704_0<>j. barba<>minimum entropy restoration of star field images<>tsmc<>hai-shan wu<>
5656<>6706_5<>jianjun wen<>preemptive on-line scheduling for two uniform processors<>orl<>donglei du<>
5678<>6707_19<>feng cao:d. frank hsu:lihui hwang:weili wu<>super line-connectivity of consecutive-d digraphs<>dm<>ding-zhu du<>
5688<>6709_0<>al borchers:biao gao:peng-jun wan<>the -steiner ratio in the rectilinear plane<>jal<>ding-zhu du<>
18442<>6710_39<>kwok-yan lam<>undeniable billing in mobile communication<>mobicom<>jianying zhou<>
6661<>6719_20<>cyril gavoille<>the compactness of interval routing for almost all graphs<>wdag<>david peleg<>
26393<>6740_0<>dimitrios gunopulos:frank leymann<>mining process models from workflow logs<>edbt<>rakesh agrawal<>
26365<>6741_7<>sunita sarawagi:nimrod megiddo<>discovery-driven exploration of olap data cubes<>edbt<>rakesh agrawal<>
26369<>6741_11<>johannes gehrke:dimitrios gunopulos:prabhakar raghavan<>automatic subspace clustering of high dimensional data for data mining applications<>sigmod<>rakesh agrawal<>
37988<>6742_0<>yanchun zhang:yun yang:chengzheng sun<>a novel timestamp ordering approach for co-existing traditional and cooperative transaction processing<>coopis<>yahiko kambayashi<>
3332<>6743_0<>tsungnan lin:bill g. horne<>how embedded memory in recurrent neural network architectures helps learning long-term temporal dependencies<>nn<>c. lee giles<>
3341<>6743_9<>ugur cetintemel:bjorn oor jonsson:michael j. franklin:divesh srivastava<>evaluating answer quality/efficiency tradeoffs<>krdb<>c. lee giles<>
3343<>6743_11<>steve lawrence<>context and page analysis for improved web search<>internet<>c. lee giles<>
29769<>6748_6<>karthik visweswariah:sergio verdu<>source codes as random number generators<>tit<>sanjeev r. kulkarni<>
29787<>6748_24<>andrew b. nobel:gusztav morvai<>density estimation from an individual numerical sequence<>tit<>sanjeev r. kulkarni<>
29731<>6749_0<>anish arora<>multitolerance in distributed reset<>cjtcs<>sandeep s. kulkarni<>
29733<>6749_2<>anish arora<>low-cost fault-tolerance in barrier synchronizations<>icpp<>sandeep s. kulkarni<>
29737<>6749_6<>anish arora<>detectors and correctors: a theory of fault-tolerance components<>icdcs<>sandeep s. kulkarni<>
29740<>6749_9<>anish arora<>component based design of multitolerant systems<>tse<>sandeep s. kulkarni<>
29744<>6749_13<>anish arora<>designing masking fault-tolerance via nonmasking fault-tolerance<>tse<>sandeep s. kulkarni<>
2803<>6757_2<>andrew r. barron:jorma rissanen<>the minimum description length principle in coding and modeling<>tit<>bin yu<>
2804<>6757_3<>s. grace chang:martin vetterli<>spatially adaptive wavelet thresholding with context modeling for image denoising<>icip<>bin yu<>
11519<>6767_4<>kenneth c. sevcik<>experiments with improved approximate mean value analysis algorithms<>cpe<>hai wang<>
40804<>6771_19<>john bell<>safety logics<>drums<>zhisheng huang<>
11506<>6772_6<>satish kaveti:eam khwang teoh<>efficient algorithms for obtaining algebraic invariants from higher degree implicit polynomials for recognition of curved objects<>pr<>han wang<>
11589<>6793_0<>v. karakostas<>business-object semantics communication model in distributed environment<>ecoopw<>hei-chia wang<>
9098<>6829_1<>r. j. quick:victor j. rayward-smith<>fitness distance correlation and ridge functions<>ppsn<>g. d. smith<>
35344<>6841_2<>liqun qi:defeng sun<>global and superlinear convergence of the smoothing newton method and its application to general box constrained variational inequalities<>moc<>xiaojun chen<>
8061<>6862_3<>dan s. bloomberg<>summarization of imaged documents without ocr<>cviu<>francine chen<>
22544<>6874_0<>patrick perry:mingche li:zhen zhang<>runlength limited codes for single error-detection and single error-correction with mixed type errors<>tit<>mao chao lin<>
5158<>6877_2<>hsinchun chen:yi-ming chung:marshall ramsey<>a smart itsy bitsy spider for the web<>jasis<>christopher c. yang<>
5159<>6877_3<>jerome yen:hsinchun chen<>intelligent internet searching engine based on hybrid simulated annealing<>hicss<>christopher c. yang<>
21525<>6881_2<>daniela florescu:alon y. levy:dan suciu<>warehousing and incremental evaluation for web site management<>bda<>mary f. fernandez<>
21532<>6881_9<>dan suciu<>a query language for xml<>w3c<>mary f. fernandez<>
21537<>6881_14<>daniela florescu:alon y. levy:dan suciu<>reasoning about web-site structure<>krdb<>mary f. fernandez<>
21540<>6883_2<>ian mackie<>coinductive techniques for operational equivalence of interaction nets<>lics<>maribel fernandez<>
21542<>6883_4<>ian mackie<>interaction nets and term-rewriting systems<>tcs<>maribel fernandez<>
21544<>6883_6<>nulo<>type assignment and termination of interaction nets<>mscs<>maribel fernandez<>
5168<>6886_1<>amie l. souter:lori l. pollock<>all-du-path coverage for parallel programs<>issta<>cheer-sun d. yang<>
2315<>6889_2<>christine mingins:heinz schmidt<>providing trusted components to the industry<>computer<>bertrand meyer<>
2331<>6889_18<>nulo<>"tell less, say more: the power of implicitness."<>computer<>bertrand meyer<>
2333<>6889_20<>nulo<>the role of object-oriented metrics<>computer<>bertrand meyer<>
2336<>6889_23<>nulo<>prelude to a theory of void<>joop<>bertrand meyer<>
2338<>6889_25<>nulo<>the component combinator for enterprise applications<>joop<>bertrand meyer<>
2340<>6889_27<>nulo<>the future of object technology<>computer<>bertrand meyer<>
2342<>6889_29<>nulo<>approaches to portability<>joop<>bertrand meyer<>
2352<>6889_39<>nulo<>design by contract: the eiffel method<>tools<>bertrand meyer<>
2363<>6889_50<>christopher creel<>is object technology ready for the embedded world?<>joop<>bertrand meyer<>
14345<>6898_2<>jeff kahn<>random matchings in regular graphs<>combinatorica<>jeong han kim<>
14346<>6898_3<>peter c. fishburn:j. c. lagarias:paul e. wright<>interference-minimizing colorings of regular graphs<>siamdm<>j. h. kim<>
17014<>6903_11<>pankaj k. agarwal:lars arge:jeff erickson:paolo giulio franciosa<>efficient searching with linear constraints<>pods<>jeffrey scott vitter<>
17027<>6903_24<>yossi matias:min wang<>wavelet-based histograms for selectivity estimation<>sigmod<>jeffrey scott vitter<>
17031<>6903_28<>min wang:balakrishna r. iyer<>scalable mining for classification rules in relational databases<>ideas<>jeffrey scott vitter<>
17039<>6903_36<>nulo<>external memory algorithms<>pods<>jeffrey scott vitter<>
17052<>6903_49<>nulo<>external memory algorithms<>esa<>jeffrey scott vitter<>
17054<>6903_51<>min wang:balakrishna r. iyer<>data cube approximation and histograms via wavelets<>cikm<>jeffrey scott vitter<>
17064<>6903_61<>p. krishnan<>optimal prediction for prefetching in the worst case<>siamcomp<>jeffrey scott vitter<>
2090<>6912_0<>jin-hyuk yang:sang-jun nam:jang-ho cho:sung-won seo:chang-ho ryu:young-su kwon:dae-hyun lee:jong-yeol lee:jong-sun kim:hyun-dhong yoon:jae-yeol kim:kun-moo lee:chan-soo hwang:in-hyung kim:jun sung kim:kwang-il park:kyu ho park:yong-hoon lee:seung ho hwang:in-cheol park:chong-min kyung<>metacore: an application specific dsp development system<>dac<>byoung-woon kim<>
2096<>6916_3<>krishna m. kavi:ali r. hurson<>multithreaded systems<>ac<>ben lee<>
