


default search action
CoRR, August 2002
- Carlos Gershenson:

Classification of Random Boolean Networks. - A. Lavrenov:

Theoretical limit of the compression for the information. - A. Lavrenov:

MV2-algorithm's clones. - Philip N. Klein, Hsueh-I Lu, Robert H. B. Netzer:

Detecting Race Conditions in Parallel Programs that Use Semaphores. - Ulrich Hillenbrand, Gerd Hirzinger:

Probabilistic Search for Object Segmentation and Recognition. - Hartmut Klauck:

Rectangle Size Bounds and Threshold Covers in Communication Complexity. - Kamil Kulesza, Zbigniew Kotulski

:
On the graph coloring check-digit scheme with applications to verifiable secret sharing. - Stefano Bistarelli

, Ugo Montanari, Francesca Rossi:
Soft Concurrent Constraint Programming. - Michael Leuschel, Jesper Jørgensen, Wim Vanhoof, Maurice Bruynooghe:

Offline Specialisation in Prolog Using a Hand-Written Compiler Generator. - Tom Barclay, Jim Gray, Eric Strand, Steve Ekblad, Jeffrey Richter:

TerraService.NET: An Introduction to Web Services. - Jim Gray, Wyman Chong, Tom Barclay, Alexander S. Szalay, Jan vandenBerg:

TeraScale SneakerNet: Using Inexpensive Disks for Backup, Archiving, and Data Exchange. - Jim Gray, Alexander S. Szalay

, Ani Thakar, Christopher Stoughton, Jan vandenBerg:
Online Scientific Data Curation, Publication, and Archiving. - Alexander S. Szalay

, Jim Gray, Jan vandenBerg:
Petabyte Scale Data Mining: Dream or Reality? - Alexander S. Szalay

, Tamas Budavari, Tanu Malik, Jim Gray, Ani Thakar:
Web Services for the Virtual Observatory. - Alexander S. Szalay

, Tamas Budavari, Andrew J. Connolly, Jim Gray, Takahiko Matsubara
, Adrian Pope, Istvan Szapudi
:
Spatial Clustering of Galaxies in Large Datasets. - Wen Chen:

A note on fractional derivative modeling of broadband frequency-dependent absorption: Model III. - Yves Moinard:

Linking Makinson and Kraus-Lehmann-Magidor preferential entailments. - Mikalai Birukou:

Knowledge Representation. - Masaki Murata, Hitoshi Isahara:

Using the DIFF Command for Natural Language Processing. - Gregory Allen Kohring:

Implicit Simulations using Messaging Protocols. - Boris Kovalerchuk, Evgenii Vityaev, H. Yusupov:

Symbolic Methodology in Numeric Data Mining: Relational Techniques for Financial Applications. - Ahmed Helmy, Sandeep Gupta, Deborah Estrin:

The STRESS Method for Boundary-point Performance Analysis of End-to-end Multicast Timer-Suppression Mechanisms. - Saurabh Garg, Priyatham Pamu, Nitin Nahata, Ahmed Helmy:

Contact-Based Architecture for Resource Discovery (CARD) in Large Scale MANets. - Ahmed Helmy, Muhammad Jaseemuddin, Ganesha Bhaskara:

Efficient Micro-Mobility using Intra-domain Multicast-based Mechanisms (M&M). - Charles Sauerbier:

Mathematical basis for polySAT implication operator. - Robert C. Steinke, Gary J. Nutt:

A Unified Theory of Shared Memory Consistency. - Joseph Y. Halpern, Ron van der Meyden:

A logical reconstruction of SPKI. - Peter Van Roy, Per Brand, Denys Duchier, Seif Haridi, Martin Henz, Christian Schulte:

Logic programming in the context of multiparadigm programming: the Oz experience. - Wen Chen:

A direct time-domain FEM modeling of broadband frequency-dependent absorption with the presence of matrix fractional power: Model I. - Alina Andreica:

Parameterized Type Definitions in Mathematica: Methods and Advantages. - Krzysztof R. Apt, C. F. M. Vermeulen:

First-order Logic as a Constraint Programming Language. - Joseph Y. Halpern, Ron van der Meyden, Moshe Y. Vardi:

Complete Axiomatizations for Reasoning About Knowledge and Time. - Joseph Y. Halpern, Judea Pearl:

Causes and Explanations: A Structural-Model Approach. Part II: Explanations. - Andrei Popescu-Belis, Isabelle Robba:

Evaluation of Coreference Rules on Complex Narrative Texts. - Andrei Popescu-Belis, Isabelle Robba:

Three New Methods for Evaluating Reference Resolution. - Andrei Popescu-Belis, Isabelle Robba:

Cooperation between Pronoun and Reference Resolution for Unrestricted Texts. - Andrei Popescu-Belis, Isabelle Robba, Gérard Sabah:

Reference Resolution Beyond Coreference: a Conceptual Frame and its Application. - Elizabeth Anderson, Robert Atkinson, Elizabeth Buckley-Geer, Cynthia Crego, Lisa Giacchetti, Stephen Hanson, David Ritchie, Jean Slisz, Sara Tompson, Stephen Wolbers:

A Virtual Library of Technical Publications. - Alex Verstak, Naren Ramakrishnan, Kyung Kyoon Bae, William H. Tranter, Layne T. Watson, Jian He, Clifford A. Shaffer, Theodore S. Rappaport:

Using Hierarchical Data Mining to Characterize Performance of Wireless System Configurations. - Yvo Desmedt, Yongge Wang:

Perfectly Secure Message Transmission Revisited. - Frank S. de Boer, Maurizio Gabbrielli, Maria Chiara Meo:

Proving correctness of Timed Concurrent Constraint Programs. - John M. Hitchcock:

Gales Suffice for Constructive Dimension. - Stephen A. Fenner:

Gales and supergales are equivalent for defining constructive Hausdorff dimension. - Jens Christian Claussen:

Generalized Winner-Relaxing Kohonen Self-Organizing Feature Maps. - Roberto Mulet, Andrea Pagnani, Martin Weigt, Riccardo Zecchina:

Coloring random graphs. - Attila Fekete, M. Marodi, Gábor Vattay:

On the Prospects of Chaos Aware Traffic Modeling. - Thomas Fischbacher:

Introducing LambdaTensor1.0 - A package for explicit symbolic and numeric Lie algebra and Lie group calculations. - Iordanis Kerenidis, Ronald de Wolf:

Exponential Lower Bound for 2-Query Locally Decodable Codes via a Quantum Argument. - Peter Høyer, Robert Spalek:

Quantum Circuits with Unbounded Fan-out.

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














