skip to main content
Skip header Section
Introduction to algorithmsSeptember 2001
Publisher:
  • MIT Press
  • 55 Hayward St.
  • Cambridge
  • MA
  • United States
ISBN:978-0-262-03293-3
Published:01 September 2001
Pages:
1179
Skip Bibliometrics Section
Bibliometrics
Skip Abstract Section
Abstract

This book covers a broad range of algorithms in depth, yet makes their design and analysis accessible to all levels of readers. Each chapter is relatively self-contained and can be used as a unit of study. The algorithms are described in English and in a pseudocode designed to be readable by anyone who has done a little prgramming. The explanations have been kept elementary without sacrificing depth of coverage or mathematical rigor.

Cited By

  1. ACM
    Li W (2024). Optimizing with Attractor: A Tutorial, ACM Computing Surveys, 56:9, (1-41), Online publication date: 31-Oct-2024.
  2. Cavecchia M, Alves de Queiroz T, Iori M, Lancellotti R and Zucchi G (2024). An Optimization-Based Decision Support System for Multi-trip Vehicle Routing Problems, SN Computer Science, 5:2, Online publication date: 20-Jan-2024.
  3. Nowrozian N, Tashtarian F and Forghani Y (2024). On optimizing the charging trajectory of mobile chargers in wireless sensor networks: a deep reinforcement learning approach, Wireless Networks, 30:1, (421-436), Online publication date: 1-Jan-2024.
  4. Chang L and Wang Z (2024). A near-optimal approach to edge connectivity-based hierarchical graph decomposition, The VLDB Journal — The International Journal on Very Large Data Bases, 33:1, (49-71), Online publication date: 1-Jan-2024.
  5. Song X, Jiang Z, Yang W and Gao S Improving Contraction Hierarchies by Combining with All-Pairs Shortest Paths Problem Algorithms Combinatorial Optimization and Applications, (431-442)
  6. ACM
    Ahmed A, Skopenkov M, Hadwiger M and Wonka P (2023). Analysis and Synthesis of Digital Dyadic Sequences, ACM Transactions on Graphics, 42:6, (1-17), Online publication date: 5-Dec-2023.
  7. Berger C, Doherty P, Rudol P and Wzorek M (2023). RGS: RDF graph synchronization for collaborative robotics, Autonomous Agents and Multi-Agent Systems, 37:2, Online publication date: 1-Dec-2023.
  8. ACM
    Deng S, Lu S and Tao Y On Join Sampling and the Hardness of Combinatorial Output-Sensitive Join Algorithms Proceedings of the 42nd ACM SIGMOD-SIGACT-SIGAI Symposium on Principles of Database Systems, (99-111)
  9. Hartmann T and Muluk K Make a Graph Singly Connected by Edge Orientations Combinatorial Algorithms, (221-232)
  10. Chang L, Feng X, Yao K, Qin L and Zhang W (2023). Accelerating Graph Similarity Search via Efficient GED Computation, IEEE Transactions on Knowledge and Data Engineering, 35:5, (4485-4498), Online publication date: 1-May-2023.
  11. Sundqvist M, Chiquet J and Rigaill G (2023). Adjusting the adjusted Rand Index, Computational Statistics, 38:1, (327-347), Online publication date: 1-Mar-2023.
  12. Subramani K and Wojciechowski P (2023). Integer Feasibility and Refutations in UTVPI Constraints Using Bit-Scaling, Algorithmica, 85:2, (610-637), Online publication date: 1-Feb-2023.
  13. ACM
    Rashed M, Jha S and Ewetz R Discovering the in-Memory Kernels of 3D Dot-Product Engines Proceedings of the 28th Asia and South Pacific Design Automation Conference, (240-245)
  14. Bae S and Yoon S (2023). Empty Squares in Arbitrary Orientation Among Points, Algorithmica, 85:1, (29-74), Online publication date: 1-Jan-2023.
  15. Sahabandu D, Moothedath S, Allen J, Clark A, Bushnell L, Lee W and Poovendran R Dynamic Information Flow Tracking Games for Simultaneous Detection of Multiple Attackers 2019 IEEE 58th Conference on Decision and Control (CDC), (567-574)
  16. Dakiche N, Benatchba K, Tayeb F, Slimani Y and Brahmi M A Hybrid Artificial Bee Colony Algorithm with Simulated Annealing for Enhanced Community Detection in Social Networks Proceedings of the 2022 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, (104-108)
  17. Sabek I, Vaidya K, Horn D, Kipf A, Mitzenmacher M and Kraska T (2022). Can Learned Models Replace Hash Functions?, Proceedings of the VLDB Endowment, 16:3, (532-545), Online publication date: 1-Nov-2022.
  18. Costa-Climent R (2022). The Role of Machine Learning in Creating and Capturing Value, International Journal of Software Science and Computational Intelligence, 14:1, (1-19), Online publication date: 25-Oct-2022.
  19. ACM
    Juárez J, Santos C and Brizuela C (2021). A Comprehensive Review and a Taxonomy Proposal of Team Formation Problems, ACM Computing Surveys, 54:7, (1-33), Online publication date: 30-Sep-2022.
  20. ACM
    Cao N, Fineman J and Russell K Parallel Shortest Paths with Negative Edge Weights Proceedings of the 34th ACM Symposium on Parallelism in Algorithms and Architectures, (177-190)
  21. ACM
    Rashed M, Awad A, Jha S and Ewetz R Towards resilient analog in-memory deep learning via data layout re-organization Proceedings of the 59th ACM/IEEE Design Automation Conference, (859-864)
  22. ACM
    Kurbatov E and Mironovich V Evaluation of inverse selection operators on maximum flow test generation problem Proceedings of the Genetic and Evolutionary Computation Conference Companion, (61-62)
  23. ACM
    Alonso T, Petrica L, Ruiz M, Petri-Koenig J, Umuroglu Y, Stamelos I, Koromilas E, Blott M and Vissers K (2021). Elastic-DF: Scaling Performance of DNN Inference in FPGA Clouds through Automatic Partitioning, ACM Transactions on Reconfigurable Technology and Systems, 15:2, (1-34), Online publication date: 30-Jun-2022.
  24. ACM
    Lu S, Martens W, Niewerth M and Tao Y Optimal Algorithms for Multiway Search on Partial Orders Proceedings of the 41st ACM SIGMOD-SIGACT-SIGAI Symposium on Principles of Database Systems, (175-187)
  25. ACM
    Dai Y, Qiao M and Chang L Anchored Densest Subgraph Proceedings of the 2022 International Conference on Management of Data, (1200-1213)
  26. Choudhary P (2022). Polynomial Time Algorithms for Tracking Path Problems, Algorithmica, 84:6, (1548-1570), Online publication date: 1-Jun-2022.
  27. ACM
    Alpizar-Chacon I and Sosnovsky S What’s in an Index: Extracting Domain-specific Knowledge Graphs from Textbooks Proceedings of the ACM Web Conference 2022, (966-976)
  28. Yao D, Frikken K, Atallah M and Tamassia R Point-Based Trust: Define How Much Privacy Is Worth Information and Communications Security, (190-209)
  29. Chang L and Wang Z (2022). A near-optimal approach to edge connectivity-based hierarchical graph decomposition, Proceedings of the VLDB Endowment, 15:6, (1146-1158), Online publication date: 1-Feb-2022.
  30. Mao Y, Mitra A, Sundaram S and Tabuada P (2021). On the computational complexity of the secure state-reconstruction problem, Automatica (Journal of IFAC), 136:C, Online publication date: 1-Feb-2022.
  31. ACM
    Cao N, Fineman J, Russell K and Yang E (2022). I/O-Efficient Algorithms for Topological Sort and Related Problems, ACM Transactions on Algorithms, 18:1, (1-24), Online publication date: 31-Jan-2022.
  32. Chakraborty M, Mehera R and Pal R (2021). Divide-and-conquer based all spanning tree generation algorithm of a simple connected graph, Theoretical Computer Science, 900:C, (35-52), Online publication date: 8-Jan-2022.
  33. ACM
    Ajieren E, Hourani K, Moses Jr. W and Pandurangan G Distributed Algorithms for Connectivity and MST in Large Graphs with Efficient Local Computation 23rd International Conference on Distributed Computing and Networking, (40-49)
  34. Gorbachev R, Zakharova E, Makarov I and Tsurkov V (2022). Construction of Motion in an Intelligent System with an Automated Dispatcher, Journal of Computer and Systems Sciences International, 61:1, (47-53), Online publication date: 1-Jan-2022.
  35. ACM
    Hecht M, Gonciarz K and Horvát S (2021). Tight Localizations of Feedback Sets, ACM Journal of Experimental Algorithmics, 26, (1-19), Online publication date: 31-Dec-2022.
  36. Taghaddos M, Mohamed Y, AbouRizk S, Taghaddos H and Hermann U Enhanced resource scheduling framework for industrial construction projects Proceedings of the Winter Simulation Conference, (1-12)
  37. Carscadden H, Machi L, Kuhlman C, Machi D and Ravi S GraphTrans Proceedings of the Winter Simulation Conference, (1-12)
  38. Pal R, Lu T, Liu P and Yin X Cyber (re-)insurance policy writing is NP-hard in IoT societies Proceedings of the Winter Simulation Conference, (1-12)
  39. McGlohon N and Carothers C Toward unbiased deterministic total orderings of parallel simulations with simultaneous events Proceedings of the Winter Simulation Conference, (1-15)
  40. ACM
    Geerts F, Muñoz T, Riveros C, Van den Bussche J and Vrgoč D (2021). Matrix Query Languages, ACM SIGMOD Record, 50:3, (6-19), Online publication date: 1-Dec-2021.
  41. Violettas G, Simoglou G, Petridou S and Mamatas L (2021). A Softwarized Intrusion Detection System for the RPL-based Internet of Things networks, Future Generation Computer Systems, 125:C, (698-714), Online publication date: 1-Dec-2021.
  42. ACM
    Cheng L, Ahmed S, Liljestrand H, Nyman T, Cai H, Jaeger T, Asokan N and Yao D (2021). Exploitation Techniques for Data-oriented Attacks with Existing and Potential Defense Approaches, ACM Transactions on Privacy and Security, 24:4, (1-36), Online publication date: 30-Nov-2021.
  43. Baidari I and Honnikoll N (2022). Bhattacharyya distance based concept drift detection method for evolving data stream, Expert Systems with Applications: An International Journal, 183:C, Online publication date: 30-Nov-2021.
  44. ACM
    Hsu K and Tseng H Accelerating applications using edge tensor processing units Proceedings of the International Conference for High Performance Computing, Networking, Storage and Analysis, (1-14)
  45. ACM
    Li R, Wang R, Liu J, Yu Z, He H, He T, Ruan S, Bao J, Chen C, Gu F, Hong L and Zheng Y Distributed Spatio-Temporal k Nearest Neighbors Join Proceedings of the 29th International Conference on Advances in Geographic Information Systems, (435-445)
  46. Shao M, Li J, Yan Q, Chen F, Huang H and Chen X (2021). Structured Sparsity Model Based Trajectory Tracking Using Private Location Data Release, IEEE Transactions on Dependable and Secure Computing, 18:6, (2983-2995), Online publication date: 1-Nov-2021.
  47. Haq Rashed M, Jha S and Ewetz R Hybrid Analog-Digital In-Memory Computing 2021 IEEE/ACM International Conference On Computer Aided Design (ICCAD), (1-9)
  48. ACM
    Even G, Levi R, Medina M and Rosén A (2021). Sublinear Random Access Generators for Preferential Attachment Graphs, ACM Transactions on Algorithms, 17:4, (1-26), Online publication date: 31-Oct-2021.
  49. ACM
    Sati A, Karamouzas I and Zordan V DIGISEW: Anisotropic Stitching for Variable Stretch in Textiles Symposium on Computational Fabrication, (1-10)
  50. ACM
    Li M, Wang J, Zheng L, Wu H, Cheng P, Chen L and Lin X Privacy-Preserving Batch-based Task Assignment in Spatial Crowdsourcing with Untrusted Server Proceedings of the 30th ACM International Conference on Information & Knowledge Management, (947-956)
  51. ACM
    Hui A and Gao B When is Nearest Neighbor Meaningful Proceedings of the 30th ACM International Conference on Information & Knowledge Management, (3103-3106)
  52. ACM
    Ishimwe D, Nguyen K and Nguyen T (2021). Dynaplex: analyzing program complexity using dynamically inferred recurrence relations, Proceedings of the ACM on Programming Languages, 5:OOPSLA, (1-23), Online publication date: 20-Oct-2021.
  53. ACM
    Besta M, Kanakagiri R, Kwasniewski G, Ausavarungnirun R, Beránek J, Kanellopoulos K, Janda K, Vonarburg-Shmaria Z, Gianinazzi L, Stefan I, Luna J, Golinowski J, Copik M, Kapp-Schwoerer L, Di Girolamo S, Blach N, Konieczny M, Mutlu O and Hoefler T SISA: Set-Centric Instruction Set Architecture for Graph Mining on Processing-in-Memory Systems MICRO-54: 54th Annual IEEE/ACM International Symposium on Microarchitecture, (282-297)
  54. Oh W, Yoo H, Ha T and Oh S Vision-Based 3D Reconstruction Using a Compound Eye Camera 2021 21st International Conference on Control, Automation and Systems (ICCAS), (418-423)
  55. ACM
    Gokul Vasan L, F. Zulian É, Weis C, Jung M and Wehn N Online Working Set Change Detection with Constant Complexity The International Symposium on Memory Systems, (1-16)
  56. Wu C, Peng Q, Lee J, Leibnitz K and Xia Y (2021). Effective hierarchical clustering based on structural similarities in nearest neighbor graphs, Knowledge-Based Systems, 228:C, Online publication date: 27-Sep-2021.
  57. Wu C, Wang L and Wang J (2021). A path relinking enhanced estimation of distribution algorithm for direct acyclic graph task scheduling problem, Knowledge-Based Systems, 228:C, Online publication date: 27-Sep-2021.
  58. Menelaou C, Timotheou S, Kolios P and Panayiotou C A convex reformulation solution approach for the joint perimeter control and route guidance problem 2021 IEEE International Intelligent Transportation Systems Conference (ITSC), (2541-2546)
  59. Di Stolfo P and Schröder A (2021). C and C 0 hp-finite elements on d-dimensional meshes with arbitrary hanging nodes, Finite Elements in Analysis and Design, 192:C, Online publication date: 15-Sep-2021.
  60. ACM
    Ju W, Yuan D, Bao W, Ge L and Zhou B (2021). eDeepSave: Saving DNN Inference using Early Exit During Handovers in Mobile Edge Environment, ACM Transactions on Sensor Networks, 17:3, (1-28), Online publication date: 31-Aug-2021.
  61. ACM
    Tang Y and Gao W Processor-Aware Cache-Oblivious Algorithms✱ 50th International Conference on Parallel Processing, (1-10)
  62. ACM
    Cao N, Fineman J and Russell K Brief Announcement Proceedings of the 2021 ACM Symposium on Principles of Distributed Computing, (493-496)
  63. ACM
    Becker K and Gottschlich J AI programmer Proceedings of the Genetic and Evolutionary Computation Conference Companion, (1513-1521)
  64. ACM
    Ton That D, Gharehdaghi M, Rasin A and Malik T On Lowering Merge Costs of an LSM Tree 33rd International Conference on Scientific and Statistical Database Management, (253-258)
  65. ACM
    Xu Y, Agrawal K and Lee I Efficient Parallel Determinacy Race Detection for Structured Futures Proceedings of the 33rd ACM Symposium on Parallelism in Algorithms and Architectures, (398-409)
  66. ACM
    López-Martínez A, Mukhopadhyay S and Nanongkai D Work-Optimal Parallel Minimum Cuts for Non-Sparse Graphs Proceedings of the 33rd ACM Symposium on Parallelism in Algorithms and Architectures, (351-361)
  67. ACM
    Ahmad Z, Chowdhury R, Das R, Ganapathi P, Gregory A and Zhu Y Fast Stencil Computations using Fast Fourier Transforms Proceedings of the 33rd ACM Symposium on Parallelism in Algorithms and Architectures, (8-21)
  68. ACM
    Ahmad Z, Chowdhury R, Das R, Ganapathi P, Gregory A and Javanmard M Low-Span Parallel Algorithms for the Binary-Forking Model Proceedings of the 33rd ACM Symposium on Parallelism in Algorithms and Architectures, (22-34)
  69. Takai S (2021). A general framework for diagnosis of discrete event systems subject to sensor failures, Automatica (Journal of IFAC), 129:C, Online publication date: 1-Jul-2021.
  70. ACM
    Bossek J and Neumann F Evolutionary diversity optimization and the minimum spanning tree problem Proceedings of the Genetic and Evolutionary Computation Conference, (198-206)
  71. ACM
    Salehi A, Coninx A and Doncieux S BR-NS Proceedings of the Genetic and Evolutionary Computation Conference, (172-179)
  72. Swat S and Kasprzak M A Heuristic Approach to the Treedepth Decomposition Problem for Large Graphs Graph-Theoretic Concepts in Computer Science, (169-181)
  73. ACM
    Tao Y and Wang Y New Algorithms for Monotone Classification Proceedings of the 40th ACM SIGMOD-SIGACT-SIGAI Symposium on Principles of Database Systems, (260-272)
  74. ACM
    Geerts F, Muñoz T, Riveros C and Vrgoč D Expressive Power of Linear Algebra Query Languages Proceedings of the 40th ACM SIGMOD-SIGACT-SIGAI Symposium on Principles of Database Systems, (342-354)
  75. ACM
    Paradis A, Bichsel B, Steffen S and Vechev M Unqomp: synthesizing uncomputation in Quantum circuits Proceedings of the 42nd ACM SIGPLAN International Conference on Programming Language Design and Implementation, (222-236)
  76. ACM
    Augustine J, Shetiya S, Esfandiari M, Basu Roy S and Das G A Generalized Approach for Reducing Expensive Distance Calls for A Broad Class of Proximity Problems Proceedings of the 2021 International Conference on Management of Data, (142-154)
  77. ACM
    Tseng T, Dhulipala L and Shun J Parallel Index-Based Structural Graph Clustering and Its Approximation Proceedings of the 2021 International Conference on Management of Data, (1851-1864)
  78. ACM
    Wang Y, Wang Q, Koehler H and Lin Y Query-by-Sketch: Scaling Shortest Path Graph Queries on Very Large Networks Proceedings of the 2021 International Conference on Management of Data, (1946-1958)
  79. Ruby R, Zhong S, ElHalawany B, Luo H and Wu K (2021). SDN-Enabled Energy-Aware Routing in Underwater Multi-Modal Communication Networks, IEEE/ACM Transactions on Networking, 29:3, (965-978), Online publication date: 1-Jun-2021.
  80. ACM
    Ghosh E, Kamara S and Tamassia R Efficient Graph Encryption Scheme for Shortest Path Queries Proceedings of the 2021 ACM Asia Conference on Computer and Communications Security, (516-525)
  81. ACM
    Kristensson P and Müllners T Design and Analysis of Intelligent Text Entry Systems with Function Structure Models and Envelope Analysis Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems, (1-12)
  82. Dudík M, Wang X, Pennock D and Rothschild D Log-time Prediction Markets for Interval Securities Proceedings of the 20th International Conference on Autonomous Agents and MultiAgent Systems, (465-473)
  83. Hu Y, Harabor D, Qin L and Yin Q (2021). Regarding Goal Bounding and Jump Point Search, Journal of Artificial Intelligence Research, 70, (631-681), Online publication date: 1-May-2021.
  84. Duarte G, Eto H, Hanaka T, Kobayashi Y, Kobayashi Y, Lokshtanov D, Pedrosa L, Schouery R and Souza U (2021). Computing the Largest Bond and the Maximum Connected Cut of a Graph, Algorithmica, 83:5, (1421-1458), Online publication date: 1-May-2021.
  85. ACM
    Aggarwal G, Gollapudi S, Raghavender and Sinop A Sketch-based Algorithms for Approximate Shortest Paths in Road Networks Proceedings of the Web Conference 2021, (3918-3929)
  86. ACM
    Sun Y, Zhuang F, Zhu H, He Q and Xiong H Cost-Effective and Interpretable Job Skill Recommendation with Deep Reinforcement Learning Proceedings of the Web Conference 2021, (3827-3838)
  87. ACM
    Wu Y, Lian D, Gong N, Yin L, Yin M, Zhou J and Yang H Linear-Time Self Attention with Codeword Histogram for Efficient Recommendation Proceedings of the Web Conference 2021, (1262-1273)
  88. ACM
    Tang C, Liao J, Wang H, Sung C and Lin W ConceptGuide: Supporting Online Video Learning with Concept Map-based Recommendation of Learning Path Proceedings of the Web Conference 2021, (2757-2768)
  89. ACM
    Chikhi R, Holub J and Medvedev P (2021). Data Structures to Represent a Set of k-long DNA Sequences, ACM Computing Surveys, 54:1, (1-22), Online publication date: 1-Apr-2021.
  90. ACM
    Wang S, Bao Z, Culpepper J and Cong G (2021). A Survey on Trajectory Data Management, Analytics, and Learning, ACM Computing Surveys, 54:2, (1-36), Online publication date: 1-Apr-2021.
  91. Kianian S and Rostamnia M (2021). An efficient path-based approach for influence maximization in social networks, Expert Systems with Applications: An International Journal, 167:C, Online publication date: 1-Apr-2021.
  92. Burhan H, Attea B, Abbood A, Abbas M and Al-Ani M (2021). Evolutionary multi-objective set cover problem for task allocation in the Internet of Things, Applied Soft Computing, 102:C, Online publication date: 1-Apr-2021.
  93. Olivier A, Bielsa G, Tejado I, Zorzi M, Widmer J and Casari P Lightweight Indoor Localization for 60-GHz Millimeter Wave Systems 2016 13th Annual IEEE International Conference on Sensing, Communication, and Networking (SECON), (1-9)
  94. Plessen M and Bemporad A Shortest path computations under trajectory constraints for ground vehicles within agricultural fields 2016 IEEE 19th International Conference on Intelligent Transportation Systems (ITSC), (1733-1738)
  95. Hou Y, Qin J and Yu C On the connectivity of 2-hop neighbor graph 2016 IEEE 55th Conference on Decision and Control (CDC), (6092-6097)
  96. Chelini L, Drebes A, Zinenko O, Cohen A, Vasilache N, Grosser T and Corporaal H Progressive raising in multi-level IR Proceedings of the 2021 IEEE/ACM International Symposium on Code Generation and Optimization, (15-26)
  97. Cslovjecsek J, Eisenbrand F, Hunkenschröder C, Rohwedder L and Weismantel R Block-structured integer and linear programming in strongly polynomial and near linear time Proceedings of the Thirty-Second Annual ACM-SIAM Symposium on Discrete Algorithms, (1666-1681)
  98. ACM
    Charalampopoulos P, Iliopoulos C, Liu C and Pissis S (2020). Property Suffix Array with Applications in Indexing Weighted Sequences, ACM Journal of Experimental Algorithmics, 25, (1-16), Online publication date: 6-Dec-2020.
  99. Jiang J, Chen J and Wang C (2020). Multi-granularity hybrid parallel network simplex algorithm for minimum-cost flow problems, The Journal of Supercomputing, 76:12, (9800-9826), Online publication date: 1-Dec-2020.
  100. ACM
    Jiang L, Tan R and Easwaran A (2020). Resilience Bounds of Network Clock Synchronization with Fault Correction, ACM Transactions on Sensor Networks, 16:4, (1-30), Online publication date: 30-Nov-2020.
  101. ACM
    Asai H Palmtrie Proceedings of the 16th International Conference on emerging Networking EXperiments and Technologies, (323-335)
  102. ACM
    Ghzouli R, Berger T, Johnsen E, Dragule S and Wąsowski A Behavior trees in action: a study of robotics applications Proceedings of the 13th ACM SIGPLAN International Conference on Software Language Engineering, (196-209)
  103. ACM
    Kelly T (2020). A penny in every fuse box, ACM Inroads, 11:4, (52-53), Online publication date: 12-Nov-2020.
  104. ACM
    Jiang J, Li Z, Ju C and Wang W MARU Proceedings of the 29th ACM International Conference on Information & Knowledge Management, (575-584)
  105. ACM
    Xian Y, Fu Z, Zhao H, Ge Y, Chen X, Huang Q, Geng S, Qin Z, de Melo G, Muthukrishnan S and Zhang Y CAFE Proceedings of the 29th ACM International Conference on Information & Knowledge Management, (1645-1654)
  106. ACM
    Zhou J, Zhang X and Fan J Pipelined implementation of serial comparison based iterative sort on FPGA Proceedings of the 2nd International Conference on Artificial Intelligence and Advanced Manufacture, (26-30)
  107. ACM
    Khader M and Al-Naymat G (2020). Density-based Algorithms for Big Data Clustering Using MapReduce Framework, ACM Computing Surveys, 53:5, (1-38), Online publication date: 15-Oct-2020.
  108. ACM
    Shao W, Tan S, Zhao S, Qin K, Hei X, Chan J and Salim F (2020). Incorporating LSTM Auto-Encoders in Optimizations to Solve Parking Officer Patrolling Problem, ACM Transactions on Spatial Algorithms and Systems, 6:3, (1-21), Online publication date: 30-Sep-2020.
  109. Song G, Lee H, Shim K, Park Y and Kim W String Joins with Synonyms Database Systems for Advanced Applications, (389-405)
  110. ACM
    Seo S and Salem S Post-Processing Summarization for Mining Frequent Dense Subnetworks Proceedings of the 11th ACM International Conference on Bioinformatics, Computational Biology and Health Informatics, (1-9)
  111. ACM
    Wu Z, Li C, Cao J and Ge Y (2020). On Scalability of Association-rule-based Recommendation, ACM Transactions on the Web, 14:3, (1-21), Online publication date: 31-Aug-2020.
  112. Ahmad N, Yilmaz B and Unat D A Prediction Framework for Fast Sparse Triangular Solves Euro-Par 2020: Parallel Processing, (529-545)
  113. ACM
    Yan J, Xu Z, Tiwana B and Chatterjee S Ads Allocation in Feed via Constrained Optimization Proceedings of the 26th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, (3386-3394)
  114. ACM
    Konar A and Sidiropoulos N Mining Large Quasi-cliques with Quality Guarantees from Vertex Neighborhoods Proceedings of the 26th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, (577-587)
  115. ACM
    Fujiwara Y, Kumagai A, Kanai S, Ida Y and Ueda N Efficient Algorithm for the b-Matching Graph Proceedings of the 26th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, (187-197)
  116. ACM
    Liénardy S Learning Computer Programming around a CAFÉ Proceedings of the 2020 ACM Conference on International Computing Education Research, (318-319)
  117. Roy A and Chakraborty R (2020). Toward Optimal Prediction Error Expansion-Based Reversible Image Watermarking, IEEE Transactions on Circuits and Systems for Video Technology, 30:8, (2377-2390), Online publication date: 1-Aug-2020.
  118. ACM
    Feng Y, Shi Q, Gao X, Wan J, Fang C and Chen Z DeepGini: prioritizing massive tests to enhance the robustness of deep neural networks Proceedings of the 29th ACM SIGSOFT International Symposium on Software Testing and Analysis, (177-188)
  119. Tomlinson K and Benson A Choice set optimization under discrete choice models of group decisions Proceedings of the 37th International Conference on Machine Learning, (9514-9525)
  120. ACM
    Lokshtanov D, Panolan F, Saurabh S, Sharma R and Zehavi M (2020). Covering Small Independent Sets and Separators with Applications to Parameterized Algorithms, ACM Transactions on Algorithms, 16:3, (1-31), Online publication date: 26-Jun-2020.
  121. ACM
    Cao N, Fineman J and Russell K Efficient construction of directed hopsets and parallel approximate shortest paths Proceedings of the 52nd Annual ACM SIGACT Symposium on Theory of Computing, (336-349)
  122. ACM
    McGlohon N, Ross R and Carothers C Evaluation of Link Failure Resilience in Multirail Dragonfly-Class Networks through Simulation Proceedings of the 2020 ACM SIGSIM Conference on Principles of Advanced Discrete Simulation, (105-116)
  123. ACM
    Chatterjee K, Fu H, Goharshady A and Goharshady E Polynomial invariant generation for non-deterministic recursive programs Proceedings of the 41st ACM SIGPLAN Conference on Programming Language Design and Implementation, (672-687)
  124. ACM
    Besta M, Fischer M, Ben-Nun T, Stanojevic D, Licht J and Hoefler T (2020). Substream-Centric Maximum Matchings on FPGA, ACM Transactions on Reconfigurable Technology and Systems, 13:2, (1-33), Online publication date: 10-Jun-2020.
  125. ACM
    Khamesi A, Silvestri S, Baker D and Paola A (2020). Perceived-Value-driven Optimization of Energy Consumption in Smart Homes, ACM Transactions on Internet of Things, 1:2, (1-26), Online publication date: 31-May-2020.
  126. ACM
    Li W, Jiang D, Xiong J and Bao Y HiLSM Proceedings of the 17th ACM International Conference on Computing Frontiers, (208-216)
  127. ACM
    Li K, Ni W, Emami Y, Shen Y, Severino R, Pereira D and Tovar E (2019). Design and Implementation of Secret Key Agreement for Platoon-based Vehicular Cyber-physical Systems, ACM Transactions on Cyber-Physical Systems, 4:2, (1-20), Online publication date: 30-Apr-2020.
  128. ACM
    Qi Y, Wang P, Zhang Y, Zhao J, Tian G and Guan X Fast Generating A Large Number of Gumbel-Max Variables Proceedings of The Web Conference 2020, (796-807)
  129. Gill G, Dathathri R, Hoang L, Peri R and Pingali K (2020). Single machine graph analytics on massive datasets using Intel optane DC persistent memory, Proceedings of the VLDB Endowment, 13:8, (1304-1318), Online publication date: 1-Apr-2020.
  130. Ofir N, Galun M, Alpert S, Brandt A, Nadler B and Basri R (2020). On Detection of Faint Edges in Noisy Images, IEEE Transactions on Pattern Analysis and Machine Intelligence, 42:4, (894-908), Online publication date: 1-Apr-2020.
  131. ACM
    Lockerman E, Feldmann A, Bakhshalipour M, Stanescu A, Gupta S, Sanchez D and Beckmann N Livia Proceedings of the Twenty-Fifth International Conference on Architectural Support for Programming Languages and Operating Systems, (417-433)
  132. Juma N, Shahen J, Bijon K and Tripunitara M (2020). The Overhead from Combating Side-Channels in Cloud Systems Using VM-Scheduling, IEEE Transactions on Dependable and Secure Computing, 17:2, (422-435), Online publication date: 1-Mar-2020.
  133. ACM
    Poyiadzi R, Sokol K, Santos-Rodriguez R, De Bie T and Flach P FACE Proceedings of the AAAI/ACM Conference on AI, Ethics, and Society, (344-350)
  134. Alam T, Rahman M, Carrillo P, Bobadilla L and Rapp B (2019). Stochastic Multi-Robot Patrolling with Limited Visibility, Journal of Intelligent and Robotic Systems, 97:2, (411-429), Online publication date: 1-Feb-2020.
  135. Schymura C and Kolossa D (2020). Audiovisual Speaker Tracking Using Nonlinear Dynamical Systems With Dynamic Stream Weights, IEEE/ACM Transactions on Audio, Speech and Language Processing, 28, (1065-1078), Online publication date: 1-Jan-2020.
  136. ACM
    Hladky J, Seidel H and Steinberger M (2019). The camera offset space, ACM Transactions on Graphics, 38:6, (1-14), Online publication date: 31-Dec-2020.
  137. ACM
    Rahul S and Tao Y (2019). A Guide to Designing Top-k Indexes, ACM SIGMOD Record, 48:2, (6-17), Online publication date: 19-Dec-2019.
  138. ACM
    Edelkamp S and Weiß A (2019). BlockQuicksort, ACM Journal of Experimental Algorithmics, 24, (1-22), Online publication date: 17-Dec-2019.
  139. Barros R and Santos S (2019). An overview and comprehensive comparison of ensembles for concept drift, Information Fusion, 52:C, (213-244), Online publication date: 1-Dec-2019.
  140. ACM
    Li M, Liu W, Guan N, Xie Y and Ye Y (2019). Hardware-Software Collaborative Thermal Sensing in Optical Network-on-Chip--based Manycore Systems, ACM Transactions on Embedded Computing Systems, 18:6, (1-24), Online publication date: 30-Nov-2019.
  141. ACM
    Jabal A, Davari M, Bertino E, Makaya C, Calo S, Verma D, Russo A and Williams C (2019). Methods and Tools for Policy Analysis, ACM Computing Surveys, 51:6, (1-35), Online publication date: 30-Nov-2019.
  142. ACM
    Zhang C, Zhang W, Zhang Y, Qin L, Zhang F and Lin X Selecting the Optimal Groups Proceedings of the 28th ACM International Conference on Information and Knowledge Management, (1211-1220)
  143. Yuan Y, Lian X, Chen L, Wang G, Yu J, Wang Y and Ma Y (2019). GCache: Neighborhood-Guided Graph Caching in a Distributed Environment, IEEE Transactions on Parallel and Distributed Systems, 30:11, (2463-2477), Online publication date: 1-Nov-2019.
  144. Menelaou C, Timotheou S, Kolios P, Panayiotou C and Polycarpou M Scheduling Vehicles for On-Time Arrival using Route-Reservations 2019 IEEE Intelligent Transportation Systems Conference (ITSC), (1749-1754)
  145. Gupta N, Gupta T, Samaddar S and Roy S WebReLog: A Web-based Tool for Disaster Relief Logistics with Vehicle Route Planning 2019 IEEE International Conference on Systems, Man and Cybernetics (SMC), (1012-1017)
  146. Nayebi M and Ruhe G (2019). Asymmetric Release Planning: Compromising Satisfaction against Dissatisfaction, IEEE Transactions on Software Engineering, 45:9, (839-857), Online publication date: 1-Sep-2019.
  147. Mohammadi M, Ebrahimi Moghaddam M and Saadat S (2019). A multi-language writer identification method based on image mining and genetic algorithm techniques, Soft Computing - A Fusion of Foundations, Methodologies and Applications, 23:17, (7655-7669), Online publication date: 1-Sep-2019.
  148. Bayuelo A, Alam T, Bobadilla L, Niño L and Smith R Computing Feedback Plans from Dynamical System Composition 2019 IEEE 15th International Conference on Automation Science and Engineering (CASE), (1175-1180)
  149. ACM
    Biagiola M, Stocco A, Ricca F and Tonella P Diversity-based web test generation Proceedings of the 2019 27th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, (142-153)
  150. Munhoz P, do Carmo F, Souza U, Drummond L, González P, Ochi L and Michelon P Locality Sensitive Algotrithms for Data Mule Routing Problem Algorithmic Aspects in Information and Management, (236-248)
  151. Taha K and Yoo P (2019). Shortlisting the Influential Members of Criminal Organizations and Identifying Their Important Communication Channels, IEEE Transactions on Information Forensics and Security, 14:8, (1988-1999), Online publication date: 1-Aug-2019.
  152. Qiu K, Zhao J, Wang X, Fu X and Secci S (2019). Efficient Recovery Path Computation for Fast Reroute in Large-Scale Software-Defined Networks, IEEE Journal on Selected Areas in Communications, 37:8, (1755-1768), Online publication date: 1-Aug-2019.
  153. ACM
    Dey S, Zhang P, Sow D and Ng K PerDREP Proceedings of the 25th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, (1258-1268)
  154. ACM
    Bulanova N and Buzdalov M Limited memory, limited arity unbiased black-box complexity Proceedings of the Genetic and Evolutionary Computation Conference Companion, (2020-2023)
  155. Koley I and Samanta T (2019). Mobile sink based data collection for energy efficient coordination in wireless sensor network using cooperative game model, Telecommunications Systems, 71:3, (377-396), Online publication date: 1-Jul-2019.
  156. Subramani K and Wojciechowki P (2019). A Polynomial Time Algorithm for Read-Once Certification of Linear Infeasibility in UTVPI Constraints, Algorithmica, 81:7, (2765-2794), Online publication date: 1-Jul-2019.
  157. Kravchenko D, Khadiev K and Serov D On the Quantum and Classical Complexity of Solving Subtraction Games Computer Science – Theory and Applications, (228-236)
  158. ACM
    Tao Y, Li Y and Li G Interactive Graph Search Proceedings of the 2019 International Conference on Management of Data, (1393-1410)
  159. ACM
    Zhang Q, Zhang H, Sellam T and Wu E Mining Precision Interfaces From Query Logs Proceedings of the 2019 International Conference on Management of Data, (988-1005)
  160. ACM
    Sarkhel R and Nandi A Visual Segmentation for Information Extraction from Heterogeneous Visually Rich Documents Proceedings of the 2019 International Conference on Management of Data, (247-262)
  161. ACM
    Sommer J, Boehm M, Evfimievski A, Reinwald B and Haas P MNC Proceedings of the 2019 International Conference on Management of Data, (1607-1623)
  162. Akshay S, Gastin P, Jugé V and Krishna S Timed systems through the lens of logic Proceedings of the 34th Annual ACM/IEEE Symposium on Logic in Computer Science, (1-13)
  163. ACM
    Pach J, Rubin N and Tardos G Planar point sets determine many pairwise crossing segments Proceedings of the 51st Annual ACM SIGACT Symposium on Theory of Computing, (1158-1166)
  164. Martinez Suñé A and Lopez Pombo C Automatic Quality-of-Service Evaluation in Service-Oriented Computing Coordination Models and Languages, (221-236)
  165. Acampora L and Marra F Numerical Algorithms for the Parametric Continuation of Stiff ODEs Deriving from the Modeling of Combustion with Detailed Chemical Mechanisms Numerical Computations: Theory and Algorithms, (3-16)
  166. Malar B, Nadarajan R and Gowri Thangam J (2019). A hybrid isotonic separation training algorithm with correlation-based isotonic feature selection for binary classification, Knowledge and Information Systems, 59:3, (651-683), Online publication date: 1-Jun-2019.
  167. Gschwind T (2019). Route feasibility testing and forward time slack for the Synchronized Pickup and Delivery Problem, OR Spectrum, 41:2, (491-512), Online publication date: 1-Jun-2019.
  168. Li L, Bayuelo A, Bobadilla L, Alam T and Shell D Coordinated multi-robot planning while preserving individual privacy 2019 International Conference on Robotics and Automation (ICRA), (2188-2194)
  169. ACM
    Seddighin M, Saleh H and Ghodsi M Externalities and Fairness The World Wide Web Conference, (538-548)
  170. ACM
    Jung J, Iyer R and Vogel D Automating the Intentional Encoding of Human-Designable Markers Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems, (1-11)
  171. He X, Liu Z, Su B, Xu Y, Zheng F and Zhu B (2019). Efficient algorithms for computing one or two discrete centers hitting a set of line segments, Journal of Combinatorial Optimization, 37:4, (1408-1423), Online publication date: 1-May-2019.
  172. Kleine Büning H, Wojciechowski P and Subramani K Read-Once Resolutions in Horn Formulas Frontiers in Algorithmics, (100-110)
  173. Li L, Yue K, Zhang B and Sun Z A Probabilistic Approach for Inferring Latent Entity Associations in Textual Web Contents Database Systems for Advanced Applications, (3-18)
  174. Liu F, Lu H, Yu C and Liu Y An Energy-balanced Data Collection Framework with Wireless Charging for Rechargeable Sensor Networks 2019 IEEE Wireless Communications and Networking Conference (WCNC), (1-6)
  175. Subramani K and Wojciechowski P Read-Once Certification of Linear Infeasibility in UTVPI Constraints Theory and Applications of Models of Computation, (578-593)
  176. ACM
    Ramezanian S, Meskanen T and Niemi V Privacy preserving 2-party queries on bipartite graphs with private set intersection Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing, (1867-1870)
  177. ACM
    Devasia J, Chandran P, Soman A, Mathew A and Jharwal J Graph sparsification with parallelization to optimize the identification of causal genes and dysregulated pathways Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing, (747-753)
  178. ACM
    Lunardi W, Voos H and Cherri L An effective hybrid imperialist competitive algorithm and tabu search for an extended flexible job shop scheduling problem Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing, (204-211)
  179. Sharma D, Khanna M and Chauhan N (2020). Search for Prioritized Test Cases during Web Application Testing, International Journal of Applied Metaheuristic Computing, 10:2, (1-26), Online publication date: 1-Apr-2019.
  180. Do T, Carrillo-Arce L and Roumeliotis S (2020). High-speed autonomous quadrotor navigation through visual and inertial paths, International Journal of Robotics Research, 38:4, (486-504), Online publication date: 1-Apr-2019.
  181. Syed A and Fohler G (2019). Efficient offline scheduling of task-sets with complex constraints on large distributed time-triggered systems, Real-Time Systems, 55:2, (209-247), Online publication date: 1-Apr-2019.
  182. Mertzios G, Michail O and Spirakis P (2019). Temporal Network Optimization Subject to Connectivity Constraints, Algorithmica, 81:4, (1416-1449), Online publication date: 1-Apr-2019.
  183. ACM
    Shan Z, Ren K, Blanton M and Wang C (2018). Practical Secure Computation Outsourcing, ACM Computing Surveys, 51:2, (1-40), Online publication date: 31-Mar-2019.
  184. Buzdalov M Make Evolutionary Multiobjective Algorithms Scale Better with Advanced Data Structures: Van Emde Boas Tree for Non-dominated Sorting Evolutionary Multi-Criterion Optimization, (66-77)
  185. Cicotti P, Shantharam M and Carrington L (2020). Reducing communication in parallel graph search algorithms with software caches, International Journal of High Performance Computing Applications, 33:2, (384-396), Online publication date: 1-Mar-2019.
  186. Li H, Nutanong S, Xu H, Yu C and Ha F (2019). C2Net, IEEE Transactions on Knowledge and Data Engineering, 31:3, (423-436), Online publication date: 1-Mar-2019.
  187. Lee K, Han C, Jun J, Lee J and Lee S (2019). Batch-Free Event Sequence Pattern Mining for Communication Stream Data with Instant and Persistent Events, Wireless Personal Communications: An International Journal, 105:2, (673-689), Online publication date: 1-Mar-2019.
  188. Lefebvre D (2019). Approximated timed reachability graphs for the robust control of discrete event systems, Discrete Event Dynamic Systems, 29:1, (31-56), Online publication date: 1-Mar-2019.
  189. Riveret R, Gao Y, Governatori G, Rotolo A, Pitt J and Sartor G (2019). A probabilistic argumentation framework for reinforcement learning agents, Autonomous Agents and Multi-Agent Systems, 33:1-2, (216-274), Online publication date: 1-Mar-2019.
  190. ACM
    He L, Kong L, Gu Y, Liu C, He T and Shin K (2019). Extending Battery System Operation via Adaptive Reconfiguration, ACM Transactions on Sensor Networks, 15:1, (1-21), Online publication date: 28-Feb-2019.
  191. Chen Y, Zhao X, Lin X, Wang Y and Guo D (2019). Efficient Mining of Frequent Patterns on Uncertain Graphs, IEEE Transactions on Knowledge and Data Engineering, 31:2, (287-300), Online publication date: 1-Feb-2019.
  192. Al-Adwan A, Sharieh A and Mahafzah B (2019). Parallel heuristic local search algorithm on OTIS hyper hexa-cell and OTIS mesh of trees optoelectronic architectures, Applied Intelligence, 49:2, (661-688), Online publication date: 1-Feb-2019.
  193. ACM
    Edwards S, Townsend R, Barker M and Kim M (2019). Compositional Dataflow Circuits, ACM Transactions on Embedded Computing Systems, 18:1, (1-27), Online publication date: 31-Jan-2019.
  194. ACM
    Bhattacharyya A, Dey P and Woodruff D (2018). An Optimal Algorithm for ℓ1-Heavy Hitters in Insertion Streams and Related Problems, ACM Transactions on Algorithms, 15:1, (1-27), Online publication date: 25-Jan-2019.
  195. Cao N, Fineman J, Russell K and Yang E I/O-Efficient algorithms for topological sort and related problems Proceedings of the Thirtieth Annual ACM-SIAM Symposium on Discrete Algorithms, (2053-2070)
  196. (2019). AltaRica 3.0 in ten modelling patterns, International Journal of Critical Computer-Based Systems, 9:1-2, (133-165), Online publication date: 1-Jan-2019.
  197. Jerew O, Al Bassam N and Darsena D (2019). Delay Tolerance and Energy Saving in Wireless Sensor Networks with a Mobile Base Station, Wireless Communications & Mobile Computing, 2019, Online publication date: 1-Jan-2019.
  198. Petunin A, Chentsov A and Chentsov P (2019). Optimizing Insertions in a Constraint Routing Problem with Complicated Cost Functions, Journal of Computer and Systems Sciences International, 58:1, (113-125), Online publication date: 1-Jan-2019.
  199. Bai S, Galbraith S, Li L and Sheffield D (2019). Improved Combinatorial Algorithms for the Inhomogeneous Short Integer Solution Problem, Journal of Cryptology, 32:1, (35-83), Online publication date: 1-Jan-2019.
  200. Carmi P, Maheshwari A, Mehrabi S, Schultz L and da Silveira X Approximability of Covering Cells with Line Segments Combinatorial Optimization and Applications, (436-448)
  201. ACM
    Dathathri R, Gill G, Hoang L, Dang H, Brooks A, Dryden N, Snir M and Pingali K (2018). Gluon: a communication-optimizing substrate for distributed heterogeneous graph analytics, ACM SIGPLAN Notices, 53:4, (752-768), Online publication date: 2-Dec-2018.
  202. Achleitner S, Bartolini N, He T, La Porta T and Zad Tootaghaj D (2018). Fast Network Configuration in Software Defined Networking, IEEE Transactions on Network and Service Management, 15:4, (1249-1263), Online publication date: 1-Dec-2018.
  203. Bhattacharya S and Ghrist R (2018). Path homotopy invariants and their application to optimal trajectory planning, Annals of Mathematics and Artificial Intelligence, 84:3-4, (139-160), Online publication date: 1-Dec-2018.
  204. ACM
    Shah V, Bhattacharjee S, Silvestri S and Das S (2018). Designing Green Communication Systems for Smart and Connected Communities via Dynamic Spectrum Access, ACM Transactions on Sensor Networks, 14:3-4, (1-32), Online publication date: 30-Nov-2018.
  205. ACM
    Anastopoulos V and Katsikas S Design of a dynamic log management infrastructure using risk and affiliation network analysis Proceedings of the 22nd Pan-Hellenic Conference on Informatics, (52-57)
  206. Zhou Z, Yao Y, Huang S, Su S, Meng C and Qian W DALS: Delay-driven Approximate Logic Synthesis 2018 IEEE/ACM International Conference on Computer-Aided Design (ICCAD), (1-7)
  207. ACM
    Muntoni A, Livesu M, Scateni R, Sheffer A and Panozzo D (2018). Axis-Aligned Height-Field Block Decomposition of 3D Shapes, ACM Transactions on Graphics, 37:5, (1-15), Online publication date: 31-Oct-2018.
  208. Baba K Filtering Documents for Plagiarism Detection Discovery Science, (361-372)
  209. Jain T and Schneider K Optimal self-routing split modules for radix-based interconnection networks Proceedings of the 16th ACM-IEEE International Conference on Formal Methods and Models for System Design, (99-108)
  210. ACM
    Chen L and Liu J EasyGO Proceedings of the 24th Annual International Conference on Mobile Computing and Networking, (835-837)
  211. ACM
    Xiao M, Wang S, Zhou C, Liu L, Li Z, Liu Y and Chen S MiniView Layout for Bandwidth-Efficient 360-Degree Video Proceedings of the 26th ACM international conference on Multimedia, (914-922)
  212. Guo C, Sartipi K, DuToit R, Georgiou G, Li R, O’Leary J, Nerurkar E, Hesch J and Roumeliotis S (2018). Resource-Aware Large-Scale Cooperative Three-Dimensional Mapping Using Multiple Mobile Devices, IEEE Transactions on Robotics, 34:5, (1349-1369), Online publication date: 1-Oct-2018.
  213. Wang L and Horn B (2018). Machine Vision to Alert Roadside Personnel of Night Traffic Threats, IEEE Transactions on Intelligent Transportation Systems, 19:10, (3245-3254), Online publication date: 1-Oct-2018.
  214. Chen G, Pui C, Chow W, Lam K, Kuang J, Young E and Yu B (2018). RippleFPGA, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 37:10, (2022-2035), Online publication date: 1-Oct-2018.
  215. Zamani H and Shakery A (2018). A language model-based framework for multi-publisher content-based recommender systems, Information Retrieval, 21:5, (369-409), Online publication date: 1-Oct-2018.
  216. ACM
    Eclarin B, Fajardo A and Medina R A Novel Feature Hashing With Efficient Collision Resolution for Bag-of-Words Representation of Text Data Proceedings of the 2nd International Conference on Natural Language Processing and Information Retrieval, (12-16)
  217. Mehta A, Malik K, Gunturi V, Goel A, Sethia P and Aggarwal A Load Balancing in Network Voronoi Diagrams Under Overload Penalties Database and Expert Systems Applications, (457-475)
  218. Wen Y, Zhu X, Roy S and Yang J (2019). Interactive summarization and exploration of top aggregate query answers, Proceedings of the VLDB Endowment, 11:13, (2196-2208), Online publication date: 1-Sep-2018.
  219. Tosun S and Ajabshir V (2018). Energy-aware partitioning of fault-tolerant irregular topologies for 3D network-on-chips, The Journal of Supercomputing, 74:9, (4842-4863), Online publication date: 1-Sep-2018.
  220. ACM
    Zhao H, Zhang H, Xin S, Deng Y, Tu C, Wang W, Cohen-Or D and Chen B (2018). DSCarver, ACM Transactions on Graphics, 37:4, (1-14), Online publication date: 31-Aug-2018.
  221. Zheng Z, Song L, Han Z, Li G and Poor H (2018). A Stackelberg Game Approach to Proactive Caching in Large-Scale Mobile Edge Networks, IEEE Transactions on Wireless Communications, 17:8, (5198-5211), Online publication date: 1-Aug-2018.
  222. Chen L, Wu J, Zhou G and Ma L (2018). QUICK, The Journal of Supercomputing, 74:8, (4037-4059), Online publication date: 1-Aug-2018.
  223. Del Pia A and Khajavirad A (2018). On decomposability of Multilinear sets, Mathematical Programming: Series A and B, 170:2, (387-415), Online publication date: 1-Aug-2018.
  224. ACM
    Ara H, Behrouzian A, Hendriks M, Geilen M, Goswami D and Basten T (2018). Scalable Analysis for Multi-Scale Dataflow Models, ACM Transactions on Embedded Computing Systems, 17:4, (1-26), Online publication date: 31-Jul-2018.
  225. ACM
    Lu G, Banerjee A, Bhattacharya B, Ho T and Chen H (2018). Reliability Hardening Mechanisms in Cyber-Physical Digital-Microfluidic Biochips, ACM Journal on Emerging Technologies in Computing Systems, 14:3, (1-22), Online publication date: 31-Jul-2018.
  226. ACM
    Mokhov A, Mitchell N and Peyton Jones S (2018). Build systems à la carte, Proceedings of the ACM on Programming Languages, 2:ICFP, (1-29), Online publication date: 30-Jul-2018.
  227. ACM
    Elliott C (2018). The simple essence of automatic differentiation, Proceedings of the ACM on Programming Languages, 2:ICFP, (1-29), Online publication date: 30-Jul-2018.
  228. ACM
    Celińska D Coding together in a social network Proceedings of the 9th International Conference on Social Media and Society, (31-40)
  229. ACM
    CHAN T (2018). Improved Deterministic Algorithms for Linear Programming in Low Dimensions, ACM Transactions on Algorithms, 14:3, (1-10), Online publication date: 16-Jul-2018.
  230. Ahmed N, Duffield N and Xia L Sampling for approximate bipartite network projection Proceedings of the 27th International Joint Conference on Artificial Intelligence, (3286-3292)
  231. ACM
    Einarsson H, Lengler J, Gauy M, Meier F, Mujika A, Steger A and Weissenberger F The linear hidden subset problem for the (1 + 1) EA with scheduled and adaptive mutation rates Proceedings of the Genetic and Evolutionary Computation Conference, (1491-1498)
  232. ACM
    Buzdalov M Generalized offline orthant search Proceedings of the Genetic and Evolutionary Computation Conference, (593-600)
  233. Zhang K and Zhang L (2018). Extracting hierarchical spatial and temporal features for human action recognition, Multimedia Tools and Applications, 77:13, (16053-16068), Online publication date: 1-Jul-2018.
  234. ACM
    Atiyah A and Almajali S A traffic tracking algorithm for a fast detection of active network sources Proceedings of the 2nd International Conference on Future Networks and Distributed Systems, (1-6)
  235. Oddi A and Rasconi R Greedy Randomized Search for Scalable Compilation of Quantum Circuits Integration of Constraint Programming, Artificial Intelligence, and Operations Research, (446-461)
  236. Janicki R Modeling Operational Semantics with Interval Orders Represented by Sequences of Antichains Application and Theory of Petri Nets and Concurrency, (251-271)
  237. ACM
    Archer J and Leach G Further improvements to OIT sort performance Proceedings of Computer Graphics International 2018, (147-152)
  238. ACM
    Dathathri R, Gill G, Hoang L, Dang H, Brooks A, Dryden N, Snir M and Pingali K Gluon: a communication-optimizing substrate for distributed heterogeneous graph analytics Proceedings of the 39th ACM SIGPLAN Conference on Programming Language Design and Implementation, (752-768)
  239. Sampaio F, Silva E, da Silva L and Filho P An Embedded Classifier for Mobile Robot Localization Using Support Vector Machines and Gray-Level Co-occurrence Matrix Artificial Intelligence and Soft Computing, (201-213)
  240. Cabaret L, Lacassagne L and Etiemble D (2018). Parallel Light Speed Labeling, Journal of Real-Time Image Processing, 15:1, (173-196), Online publication date: 1-Jun-2018.
  241. Abujassar R (2018). Restoration of IP Networks by Using a Hybrid Interacting Mechanism Between Layer 2 & 3 in the Networks Over OA&M, Wireless Personal Communications: An International Journal, 100:3, (819-849), Online publication date: 1-Jun-2018.
  242. Wang B, Sun Y, Cao Q, Li S and Wang Y (2018). Cooperative Game-based Cheating in Full-duplex Relaying-based D2D Communication Underlaying Heterogeneous Cellular Networks, Mobile Networks and Applications, 23:3, (599-610), Online publication date: 1-Jun-2018.
  243. ACM
    Lewicki A and Eberbach E Learning network flow based on rough set flow graphs and ACO clustering in distributed cognitive environments Proceedings of the 1st International Workshop on Software Engineering for Cognitive Services, (18-24)
  244. ACM
    Chowdhury S, Mohian S, Mehra S, Gawsane S, Johnson T and Csallner C Automatically finding bugs in a commercial cyber-physical system development tool chain with SLforge Proceedings of the 40th International Conference on Software Engineering, (981-992)
  245. Cousty J, Najman L, Kenmochi Y and Guimarães S (2018). Hierarchical Segmentations with Graphs, Journal of Mathematical Imaging and Vision, 60:4, (479-502), Online publication date: 1-May-2018.
  246. Petrov I and Smeliansky R (2018). Minimization of Multicast Traffic and Ensuring Its Fault Tolerance in Software-Defined Networks, Journal of Computer and Systems Sciences International, 57:3, (407-419), Online publication date: 1-May-2018.
  247. Fan H, Hu Y, Zhang S and Ren Q (2018). Hardware Acceleration Resource Allocation Mechanism for VNF, Procedia Computer Science, 131:C, (746-755), Online publication date: 1-May-2018.
  248. Burattin A, Bernstein V, Neurauter M, Soffer P and Weber B (2018). Detection and quantification of flow consistency in business process models, Software and Systems Modeling (SoSyM), 17:2, (633-654), Online publication date: 1-May-2018.
  249. Marvaniya S, Gupta R and Mittal A (2018). Adaptive locally affine-invariant shape matching, Machine Vision and Applications, 29:4, (553-572), Online publication date: 1-May-2018.
  250. Li X, Tang Q and Sun C (2018). Energy efficient dispatch strategy for the dual-functional mobile sink in wireless rechargeable sensor networks, Wireless Networks, 24:3, (671-681), Online publication date: 1-Apr-2018.
  251. Zhang K and Zhang L (2018). Supervised Dictionary Learning with Smooth Shrinkage for Image Denoising, Neural Processing Letters, 47:2, (535-548), Online publication date: 1-Apr-2018.
  252. ACM
    Sun Y, Ferizovic D and Belloch G (2018). PAM, ACM SIGPLAN Notices, 53:1, (290-304), Online publication date: 23-Mar-2018.
  253. Drwal M (2018). Robust scheduling to minimize the weighted number of late jobs with interval due-date uncertainty, Computers and Operations Research, 91:C, (13-20), Online publication date: 1-Mar-2018.
  254. ACM
    Han L, Shen Z, Liu D, Shao Z, Huang H and Li T (2018). A Novel ReRAM-Based Processing-in-Memory Architecture for Graph Traversal, ACM Transactions on Storage, 14:1, (1-26), Online publication date: 28-Feb-2018.
  255. ACM
    Sun Y, Ferizovic D and Belloch G PAM Proceedings of the 23rd ACM SIGPLAN Symposium on Principles and Practice of Parallel Programming, (290-304)
  256. Zhou G, Luo P, Cao R, Xiao Y, Lin F, Chen B and He Q Tree-structured neural machine for linguistics-aware sentence generation Proceedings of the Thirty-Second AAAI Conference on Artificial Intelligence and Thirtieth Innovative Applications of Artificial Intelligence Conference and Eighth AAAI Symposium on Educational Advances in Artificial Intelligence, (5722-5729)
  257. Wang H, Wang J, Wang J, Zhao M, Zhang W, Zhang F, Xie X and Guo M GraphGAN Proceedings of the Thirty-Second AAAI Conference on Artificial Intelligence and Thirtieth Innovative Applications of Artificial Intelligence Conference and Eighth AAAI Symposium on Educational Advances in Artificial Intelligence, (2508-2515)
  258. ACM
    Rezvani M, Wang Q and Liang W FACH Proceedings of the Eleventh ACM International Conference on Web Search and Data Mining, (486-494)
  259. Xia X and Zhou Y (2018). On the effectiveness of immune inspired mutation operators in some discrete optimization problems, Information Sciences: an International Journal, 426:C, (87-100), Online publication date: 1-Feb-2018.
  260. Arakaki R and Usberti F (2018). Hybrid genetic algorithm for the open capacitated arc routing problem, Computers and Operations Research, 90:C, (221-231), Online publication date: 1-Feb-2018.
  261. ACM
    Pallavoor R, Raskhodnikova S and Varma N (2017). Parameterized Property Testing of Functions, ACM Transactions on Computation Theory, 9:4, (1-19), Online publication date: 12-Jan-2018.
  262. Jothi R, Mohanty S and Ojha A (2018). Fast approximate minimum spanning tree based clustering algorithm, Neurocomputing, 272:C, (542-557), Online publication date: 10-Jan-2018.
  263. Eisenbrand F and Weismantel R Proximity results and faster algorithms for integer programming using the steinitz lemma Proceedings of the Twenty-Ninth Annual ACM-SIAM Symposium on Discrete Algorithms, (808-816)
  264. ACM
    Modekurthy V, Saifullah A and Madria S Distributed Graph Routing for WirelessHART Networks Proceedings of the 19th International Conference on Distributed Computing and Networking, (1-10)
  265. ACM
    Zhou C, Mazumder A, Das A, Basu K, Matin-Moghaddam N, Mehrani S and Sen A Relay Node Placement Under Budget Constraint Proceedings of the 19th International Conference on Distributed Computing and Networking, (1-11)
  266. Gayathri R, Nair J, Thampi S, El-Alfy E, Mitra S and Trajkovic L (2018). ex-FTCD, Journal of Intelligent & Fuzzy Systems: Applications in Engineering and Technology, 34:3, (1643-1652), Online publication date: 1-Jan-2018.
  267. Gozzard A, Ward M and Datta A (2018). Converting a network into a small-world network, Information Sciences: an International Journal, 422:C, (282-289), Online publication date: 1-Jan-2018.
  268. Al-Adwan A, Mahafzah B and Sharieh A (2018). Solving traveling salesman problem using parallel repetitive nearest neighbor algorithm on OTIS-Hypercube and OTIS-Mesh optoelectronic architectures, The Journal of Supercomputing, 74:1, (1-36), Online publication date: 1-Jan-2018.
  269. Liu M and Ding H Protein Mover’s Distance: A Geometric Framework for Solving Global Alignment of PPI Networks Combinatorial Optimization and Applications, (56-69)
  270. ACM
    Abd-Alsabour N Nature as a Source for Inspiring New Optimization Algorithms Proceedings of the 9th International Conference on Signal Processing Systems, (51-56)
  271. Ferdaus M, Murshed M, Calheiros R and Buyya R (2017). An algorithm for network and data-aware placement of multi-tier applications in cloud data centers, Journal of Network and Computer Applications, 98:C, (65-83), Online publication date: 15-Nov-2017.
  272. Jia Z, Kwon Y, Shipman G, McCormick P, Erez M and Aiken A (2017). A distributed multi-GPU system for fast graph processing, Proceedings of the VLDB Endowment, 11:3, (297-310), Online publication date: 1-Nov-2017.
  273. Jiang R, Zhu Y and Yang Y (2017). Improving Throughput and Fairness of Convergecast in Vehicular Networks, IEEE Transactions on Mobile Computing, 16:11, (3070-3083), Online publication date: 1-Nov-2017.
  274. alik B, Mongus D, alik K and Luka N (2017). Boolean operations on rasterized shapes represented by chain codes using space filling curves, Journal of Visual Communication and Image Representation, 49:C, (420-432), Online publication date: 1-Nov-2017.
  275. Han S and Crespi N (2017). Semantic service provisioning for smart objects, Future Generation Computer Systems, 76:C, (180-197), Online publication date: 1-Nov-2017.
  276. Liu C, Zhang Y, Huang T and Cai Y (2017). Identification of transcription factors that may reprogram lung adenocarcinoma, Artificial Intelligence in Medicine, 83:C, (52-57), Online publication date: 1-Nov-2017.
  277. Cicalese F, Laber E and Saettler A (2017). Decision Trees for Function Evaluation, Algorithmica, 79:3, (763-796), Online publication date: 1-Nov-2017.
  278. Saettler A, Laber E and Cicalese F (2017). Trading Off Worst and Expected Cost in Decision Tree Problems, Algorithmica, 79:3, (886-908), Online publication date: 1-Nov-2017.
  279. ACM
    Petsios T, Zhao J, Keromytis A and Jana S SlowFuzz Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, (2155-2168)
  280. ACM
    Moreira R, Collange C and Quintão Pereira F (2017). Function Call Re-Vectorization, ACM SIGPLAN Notices, 52:8, (313-326), Online publication date: 26-Oct-2017.
  281. Alam T, Rahman M, Bobadilla L and Rapp B Multi-vehicle patrolling with limited visibility and communication constraints MILCOM 2017 - 2017 IEEE Military Communications Conference (MILCOM), (465-470)
  282. ACM
    Chatterjee K and Velner Y (2017). The Complexity of Mean-Payoff Pushdown Games, Journal of the ACM, 64:5, (1-49), Online publication date: 15-Oct-2017.
  283. Sanyal R, Jaiswal M and Chaudhury K (2017). On a Registration-Based Approach to Sensor Network Localization, IEEE Transactions on Signal Processing, 65:20, (5357-5367), Online publication date: 15-Oct-2017.
  284. Soorki M, MacKenzie A and Saad W Millimeter wave network coverage with stochastic user orientation 2017 IEEE 28th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC), (1-6)
  285. ACM
    Garman C, Guo X and Spear M A study of unnecessary write backs Proceedings of the International Symposium on Memory Systems, (127-129)
  286. ACM
    Lloyd S and Gokhale M Near memory key/value lookup acceleration Proceedings of the International Symposium on Memory Systems, (26-33)
  287. Gao C, Li Y, Zhao Y and Chen S (2017). A Two-Level Game Theory Approach for Joint Relay Selection and Resource Allocation in Network Coding Assisted D2D Communications, IEEE Transactions on Mobile Computing, 16:10, (2697-2711), Online publication date: 1-Oct-2017.
  288. Zhang S, Qian Z, Wu J, Kong F and Lu S (2017). Optimizing Itinerary Selection and Charging Association for Mobile Chargers, IEEE Transactions on Mobile Computing, 16:10, (2833-2846), Online publication date: 1-Oct-2017.
  289. Ciecholewski M (2017). River channel segmentation in polarimetric SAR images, Expert Systems with Applications: An International Journal, 82:C, (196-215), Online publication date: 1-Oct-2017.
  290. Sedlacek M and Bestak R (2017). Analysis of Neighbourhood Relations for Femtocell Networks, Wireless Personal Communications: An International Journal, 96:4, (5239-5252), Online publication date: 1-Oct-2017.
  291. Renold A and Chandrakala S (2017). MRL-SCSO, Wireless Personal Communications: An International Journal, 96:4, (5061-5079), Online publication date: 1-Oct-2017.
  292. Lai Y and Jiang J (2017). Optimizing Detection Quality and Transmission Quality of Barrier Coverage in Heterogeneous Wireless Sensor Networks, Mobile Networks and Applications, 22:5, (959-969), Online publication date: 1-Oct-2017.
  293. Chen L and Chung J (2017). Mobility-Aware and Congestion-Relieved Dedicated Path Planning for Group-Based Emergency Guiding Based on Internet of Things Technologies, IEEE Transactions on Intelligent Transportation Systems, 18:9, (2453-2466), Online publication date: 1-Sep-2017.
  294. Chen Q, Lan C, Chen B, Wang L, Li J and Zhang C (2017). Exploring Consensus RNA Substructural Patterns Using Subgraph Mining, IEEE/ACM Transactions on Computational Biology and Bioinformatics, 14:5, (1134-1146), Online publication date: 1-Sep-2017.
  295. Driouch E and Ajib W (2017). Heuristic Algorithms for Underlay Spectrum Sharing in Cognitive Radio Networks, Wireless Personal Communications: An International Journal, 96:2, (2563-2583), Online publication date: 1-Sep-2017.
  296. Thi M, Huynh T, Radwan A and Hwang W (2017). Coalition Formation Game for Joint Power Control and Fair Channel Allocation in Device-to-Device Communications Underlaying Cellular Networks, Wireless Personal Communications: An International Journal, 96:1, (1173-1191), Online publication date: 1-Sep-2017.
  297. ACM
    Kartakis S, Yang S and Mccann J (2017). Reliability or Sustainability, ACM Transactions on Sensor Networks, 13:3, (1-27), Online publication date: 31-Aug-2017.
  298. ACM
    Zhang L, Wu Y and Wu X Achieving Non-Discrimination in Data Release Proceedings of the 23rd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, (1335-1344)
  299. ACM
    Li X, Cheng Y, Cong G and Chen L Discovering Pollution Sources and Propagation Patterns in Urban Area Proceedings of the 23rd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, (1863-1872)
  300. ACM
    Cohavi K and Dobzinski S (2017). Faster and Simpler Sketches of Valuation Functions, ACM Transactions on Algorithms, 13:3, (1-9), Online publication date: 9-Aug-2017.
  301. Morrow T, Hurson A and Sarvestani S A Multi-stage Approach to Personalized Course Selection and Scheduling 2017 IEEE International Conference on Information Reuse and Integration (IRI), (253-262)
  302. Du Y, Shen D, Nie T, Kou Y and Yu G (2017). Discovering context-aware conditional functional dependencies, Frontiers of Computer Science: Selected Publications from Chinese Universities, 11:4, (688-701), Online publication date: 1-Aug-2017.
  303. Ahmed N, Duffield N, Willke T and Rossi R (2017). On sampling from massive graph streams, Proceedings of the VLDB Endowment, 10:11, (1430-1441), Online publication date: 1-Aug-2017.
  304. Tonini F, Fiorani M, Furdek M, Raffaelli C, Wosinska L and Monti P (2017). Radio and Transport Planning of Centralized Radio Architectures in 5G Indoor Scenarios, IEEE Journal on Selected Areas in Communications, 35:8, (1837-1848), Online publication date: 1-Aug-2017.
  305. ACM
    Panagopoulos A, Maleki S, Rogers A, Venanzi M and Jennings N (2017). Advanced Economic Control of Electricity-Based Space Heating Systems in Domestic Coalitions with Shared Intermittent Energy Resources, ACM Transactions on Intelligent Systems and Technology, 8:4, (1-27), Online publication date: 31-Jul-2017.
  306. ACM
    Mironovich V and Buzdalov M Evaluation of heavy-tailed mutation operator on maximum flow test generation problem Proceedings of the Genetic and Evolutionary Computation Conference Companion, (1423-1426)
  307. ACM
    Cruz-Salinas A and Perdomo J Self-adaptation of genetic operators through genetic programming techniques Proceedings of the Genetic and Evolutionary Computation Conference, (913-920)
  308. Kim D, Wang W, Son J, Wu W, Lee W and Tokuta A (2017). Maximum Lifetime Combined Barrier-Coverage of Weak Static Sensors and Strong Mobile Sensors, IEEE Transactions on Mobile Computing, 16:7, (1956-1966), Online publication date: 1-Jul-2017.
  309. Thangaraj A, Kramer G and Böcherer G (2017). Capacity Bounds for Discrete-Time, Amplitude-Constrained, Additive White Gaussian Noise Channels, IEEE Transactions on Information Theory, 63:7, (4172-4182), Online publication date: 1-Jul-2017.
  310. Chen J, He Q, Ye D, Chen W, Xiang Y, Chiew K and Zhu L (2017). Joint affinity aware grouping and virtual machine placement, Microprocessors & Microsystems, 52:C, (365-380), Online publication date: 1-Jul-2017.
  311. Lavoie T, Mrineau M, Merlo E and Potvin P (2017). A case study of TTCN-3 test scripts clone analysis in an industrial telecommunication setting, Information and Software Technology, 87:C, (32-45), Online publication date: 1-Jul-2017.
  312. Oh G, Kim Y, Ahn J and Choi H (2017). Market-Based Task Assignment for Cooperative Timing Missions in Dynamic Environments, Journal of Intelligent and Robotic Systems, 87:1, (97-123), Online publication date: 1-Jul-2017.
  313. Yona Y and Diggavi S The effect of bias on the guesswork of hash functions 2017 IEEE International Symposium on Information Theory (ISIT), (2248-2252)
  314. ACM
    Aurangzeb and Eigenmann R HiPA Proceedings of the International Conference on Supercomputing, (1-10)
  315. Ahlawat P and Dave M (2017). A Hybrid Approach for Path Vulnerability Matrix on Random Key Predistribution for Wireless Sensor Networks, Wireless Personal Communications: An International Journal, 94:4, (3327-3353), Online publication date: 1-Jun-2017.
  316. Ma C, Liang W and Zheng M (2017). PSH, Wireless Personal Communications: An International Journal, 94:3, (1491-1510), Online publication date: 1-Jun-2017.
  317. Sydow M, Baraniak K and Teisseyre P (2017). Diversity of editors and teams versus quality of cooperative work, Journal of Intelligent Information Systems, 48:3, (601-632), Online publication date: 1-Jun-2017.
  318. Corus D, He J, Jansen T, Oliveto P, Sudholt D and Zarges C (2017). On Easiest Functions for Mutation Operators in Bio-Inspired Optimisation, Algorithmica, 78:2, (714-740), Online publication date: 1-Jun-2017.
  319. Zhang W, Liu X and Yang Y Let smart ants help you reduce the delay penalty of multiple software projects Proceedings of the 39th International Conference on Software Engineering Companion, (271-273)
  320. Wang Y, Qi Z, Dai H, Wu H, Lei K and Liu B Statistical Optimal Hash-based Longest Prefix Match Proceedings of the Symposium on Architectures for Networking and Communications Systems, (153-164)
  321. ACM
    Renner T, Müller J, Thamsen L and Kao O Addressing Hadoop's Small File Problem With an Appendable Archive File Format Proceedings of the Computing Frontiers Conference, (367-372)
  322. ACM
    Madhavan R, Kulal S and Kuncak V (2017). Contract-based resource verification for higher-order functions with memoization, ACM SIGPLAN Notices, 52:1, (330-343), Online publication date: 11-May-2017.
  323. ACM
    Gan E and Bailis P Scalable Kernel Density Classification via Threshold-Based Pruning Proceedings of the 2017 ACM International Conference on Management of Data, (945-959)
  324. ACM
    Chang L, Li W and Zhang W Computing A Near-Maximum Independent Set in Linear Time by Reducing-Peeling Proceedings of the 2017 ACM International Conference on Management of Data, (1181-1196)
  325. Reimers A, Reimers A and Goldstein Y (2017). Minimal equivalent subgraphs containing a given set of arcs, Theoretical Computer Science, 675:C, (56-63), Online publication date: 2-May-2017.
  326. Qiu X, Ren Y, Suganthan P and Amaratunga G (2017). Empirical Mode Decomposition based ensemble deep learning for load demand time series forecasting, Applied Soft Computing, 54:C, (246-255), Online publication date: 1-May-2017.
  327. Subramani K and Wojciechowski P (2017). A Combinatorial Certifying Algorithm for Linear Feasibility in UTVPI Constraints, Algorithmica, 78:1, (166-208), Online publication date: 1-May-2017.
  328. ACM
    Cook B, Khlaaf H and Piterman N (2017). Verifying Increasingly Expressive Temporal Logics for Infinite-State Systems, Journal of the ACM, 64:2, (1-39), Online publication date: 30-Apr-2017.
  329. Vintescu A, Dupont F, Lavoue G, Memari P and Tierny J Conformal factor persistence for fast hierarchical cone extraction Proceedings of the European Association for Computer Graphics: Short Papers, (57-60)
  330. Khodaiemehr H and Kiani D (2017). Construction and Encoding of QC-LDPC Codes Using Group Rings, IEEE Transactions on Information Theory, 63:4, (2039-2060), Online publication date: 1-Apr-2017.
  331. Kim J and Kim T (2017). Adjustable Delay Buffer Allocation under Useful Clock Skew Scheduling, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 36:4, (641-654), Online publication date: 1-Apr-2017.
  332. Chen X, Yan X and Guo R (2017). A Study on the Convergence and Analysis of Public Opinion in Cross-linguistic Network on Mongolian and Chinese, Procedia Computer Science, 107:C, (768-771), Online publication date: 1-Apr-2017.
  333. Kumar P, Gupta S and Bhasker B (2017). An upper approximation based community detection algorithm for complex networks, Decision Support Systems, 96:C, (103-118), Online publication date: 1-Apr-2017.
  334. Beck M and Botero J (2017). Scalable and coordinated allocation of service function chains, Computer Communications, 102:C, (78-88), Online publication date: 1-Apr-2017.
  335. Dalmazo B, Vilela J and Curado M (2017). Performance Analysis of Network Traffic Predictors in the Cloud, Journal of Network and Systems Management, 25:2, (290-320), Online publication date: 1-Apr-2017.
  336. Lin C and Wu B (2017). On the minimum routing cost clustered tree problem, Journal of Combinatorial Optimization, 33:3, (1106-1121), Online publication date: 1-Apr-2017.
  337. Comin C, Posenato R and Rizzi R (2017). Hyper temporal networks, Constraints, 22:2, (152-190), Online publication date: 1-Apr-2017.
  338. Chang Y, Rao S and Tawarmalani M Robust validation of network designs under uncertain demands and failures Proceedings of the 14th USENIX Conference on Networked Systems Design and Implementation, (347-362)
  339. Ibrahim M, Chakrabarty K and Schlichtmann U CoSyn Proceedings of the Conference on Design, Automation & Test in Europe, (1677-1682)
  340. Kostenko V (2017). Combinatorial optimization algorithms combining greedy strategies with a limited search procedure, Journal of Computer and Systems Sciences International, 56:2, (218-226), Online publication date: 1-Mar-2017.
  341. Wu C, Deng C, Liu L, Han J, Chen J, Yin S and Wei S (2017). A Multi-Objective Model Oriented Mapping Approach for NoC-based Computing Systems, IEEE Transactions on Parallel and Distributed Systems, 28:3, (662-676), Online publication date: 1-Mar-2017.
  342. Pereg U and Tal I (2017). Channel Upgradation for Non-Binary Input Alphabets and MACs, IEEE Transactions on Information Theory, 63:3, (1410-1424), Online publication date: 1-Mar-2017.
  343. Pourpanah F, Tan C, Lim C and Mohamad-Saleh J (2017). A Q-learning-based multi-agent system for data classification, Applied Soft Computing, 52:C, (519-531), Online publication date: 1-Mar-2017.
  344. Paul G, Davidson I, Mukherjee I and Ravi S (2017). Keyless dynamic optimal multi-bit image steganography using energetic pixels, Multimedia Tools and Applications, 76:5, (7445-7471), Online publication date: 1-Mar-2017.
  345. Stein J, Song H, Baldi M and Li J (2017). On the most representative summaries of network user activities, Computer Networks: The International Journal of Computer and Telecommunications Networking, 113:C, (205-217), Online publication date: 11-Feb-2017.
  346. Zhang L, Tang X and He B (2017). Analysis of Minimum Interaction Time for Continuous Distributed Interactive Computing, IEEE Transactions on Parallel and Distributed Systems, 28:2, (401-415), Online publication date: 1-Feb-2017.
  347. Chang L, Li W, Qin L, Zhang W and Yang S (2017). $\mathsf {pSCAN}$, IEEE Transactions on Knowledge and Data Engineering, 29:2, (387-401), Online publication date: 1-Feb-2017.
  348. Zhang P, Lin H, Yao B and Lu D (2017). Level-aware collective spatial keyword queries, Information Sciences: an International Journal, 378:C, (194-214), Online publication date: 1-Feb-2017.
  349. ACM
    Moreira R, Collange C and Quintão Pereira F Function Call Re-Vectorization Proceedings of the 22nd ACM SIGPLAN Symposium on Principles and Practice of Parallel Programming, (313-326)
  350. Kintali S (2017). Directed width parameters and circumference of digraphs, Theoretical Computer Science, 659:C, (83-87), Online publication date: 10-Jan-2017.
  351. ACM
    Madhavan R, Kulal S and Kuncak V Contract-based resource verification for higher-order functions with memoization Proceedings of the 44th ACM SIGPLAN Symposium on Principles of Programming Languages, (330-343)
  352. Wang X, Yuen C, Hassan N, An N and Wu W (2017). Electric Vehicle Charging Station Placement for Urban Public Bus Systems, IEEE Transactions on Intelligent Transportation Systems, 18:1, (128-139), Online publication date: 1-Jan-2017.
  353. Hu K, Dinh T, Ho T and Chakrabarty K (2017). Control-Layer Routing and Control-Pin Minimization for Flow-Based Microfluidic Biochips, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 36:1, (55-68), Online publication date: 1-Jan-2017.
  354. (2017). Did 32% Waterfall Surprise You?, IEEE Software, 34:1, (7-7), Online publication date: 1-Jan-2017.
  355. Ewetz R and Koh C (2017). Fast clock scheduling and an application to clock tree synthesis, Integration, the VLSI Journal, 56:C, (115-127), Online publication date: 1-Jan-2017.
  356. Pal (nee Biswas) A, Chaudhuri A, Pal R and Datta A (2017). Hardness of crosstalk minimization in two-layer channel routing, Integration, the VLSI Journal, 56:C, (139-147), Online publication date: 1-Jan-2017.
  357. Dabaghi F, Movahedi Z and Langar R (2017). A survey on green routing protocols using sleep-scheduling in wired networks, Journal of Network and Computer Applications, 77:C, (106-122), Online publication date: 1-Jan-2017.
  358. Cao J, Wang B and Brown D (2016). Similarity based leaf image retrieval using multiscale R-angle description, Information Sciences: an International Journal, 374:C, (51-64), Online publication date: 20-Dec-2016.
  359. ACM
    Mukherjee S, Vamshi B, Reddy K, Krishna R and Harish S Recognizing facial expressions using novel motion based features Proceedings of the Tenth Indian Conference on Computer Vision, Graphics and Image Processing, (1-8)
  360. Namkoong H and Duchi J Stochastic gradient methods for distributionally robust optimization with f-divergences Proceedings of the 30th International Conference on Neural Information Processing Systems, (2216-2224)
  361. ACM
    Li X, Liu J and Zhao H Point cloud registration by discrete spin image and normal alignment radial feature Proceedings of the 15th ACM SIGGRAPH Conference on Virtual-Reality Continuum and Its Applications in Industry - Volume 1, (373-379)
  362. Bash B, Goeckel D and Towsley D (2016). Covert Communication Gains From Adversary’s Ignorance of Transmission Time, IEEE Transactions on Wireless Communications, 15:12, (8394-8405), Online publication date: 1-Dec-2016.
  363. Chiang Y and Liao W (2016). Green Multicell Cooperation in Heterogeneous Networks With Hybrid Energy Sources, IEEE Transactions on Wireless Communications, 15:12, (7911-7925), Online publication date: 1-Dec-2016.
  364. Master N and Bambos N (2016). Power control for packet streaming with head-of-line deadlines, Performance Evaluation, 106:C, (1-18), Online publication date: 1-Dec-2016.
  365. Rahat A, Everson R and Fieldsend J (2016). Evolutionary multi-path routing for network lifetime and robustness in wireless sensor networks, Ad Hoc Networks, 52:C, (130-145), Online publication date: 1-Dec-2016.
  366. Fischer L, Hammer B and Wersing H (2016). Optimal local rejection for classifiers, Neurocomputing, 214:C, (445-457), Online publication date: 19-Nov-2016.
  367. ACM
    Fomin F, Lokshtanov D, Panolan F and Saurabh S (2016). Efficient Computation of Representative Families with Applications in Parameterized and Exact Algorithms, Journal of the ACM, 63:4, (1-60), Online publication date: 8-Nov-2016.
  368. Kannan P and Sivaswamy S Performance driven routing for modern FPGAs invited paper 2016 IEEE/ACM International Conference on Computer-Aided Design (ICCAD), (1-6)
  369. Bhattacharjee D and Chattopadhyay A Delay-optimal technology mapping for In-Memory Computing using ReRAM devices 2016 IEEE/ACM International Conference on Computer-Aided Design (ICCAD), (1-6)
  370. Zheng A, Yuan , Zhou J, Guo Y, Yang H and Au O (2016). Adaptive Block Coding Order for Intra Prediction in HEVC, IEEE Transactions on Circuits and Systems for Video Technology, 26:11, (2152-2158), Online publication date: 1-Nov-2016.
  371. Homem T, Perico D, Santos P, Bianchi R and de Mantaras R Qualitative Case-Based Reasoning for Humanoid Robot Soccer: A New Retrieval and Reuse Algorithm Case-Based Reasoning Research and Development, (170-185)
  372. ACM
    Pai S and Pingali K A compiler for throughput optimization of graph algorithms on GPUs Proceedings of the 2016 ACM SIGPLAN International Conference on Object-Oriented Programming, Systems, Languages, and Applications, (1-19)
  373. ACM
    Eom C, Lee W and Lee J Spammer detection for real-time big data graphs Proceedings of the Sixth International Conference on Emerging Databases: Technologies, Applications, and Theory, (51-60)
  374. Tchendji V, Myoupo J and Dequen G (2016). High Performance CGM-based Parallel Algorithms for the Optimal Binary Search Tree Problem, International Journal of Grid and High Performance Computing, 8:4, (55-77), Online publication date: 1-Oct-2016.
  375. Nguyen H and McLachlan G (2016). Maximum likelihood estimation of triangular and polygonal distributions, Computational Statistics & Data Analysis, 102:C, (23-36), Online publication date: 1-Oct-2016.
  376. Karathanasopoulos N and Kress G (2016). Two dimensional modeling of helical structures, an application to simple strands, Computers and Structures, 174:C, (79-84), Online publication date: 1-Oct-2016.
  377. ACM
    Cai F, Reinanda R and Rijke M (2016). Diversifying Query Auto-Completion, ACM Transactions on Information Systems, 34:4, (1-33), Online publication date: 14-Sep-2016.
  378. ACM
    Swoboda T, Hemmje M, Dascalu M and Trausan-Matu S Combining Taxonomies using Word2vec Proceedings of the 2016 ACM Symposium on Document Engineering, (131-134)
  379. Sevenich M, Hong S, van Rest O, Wu Z, Banerjee J and Chafi H (2016). Using domain-specific languages for analytic graph databases, Proceedings of the VLDB Endowment, 9:13, (1257-1268), Online publication date: 1-Sep-2016.
  380. Yuan B, Li B, Chen H and Yao X (2016). Defect- and Variation-Tolerant Logic Mapping in Nanocrossbar Using Bipartite Matching and Memetic Algorithm, IEEE Transactions on Very Large Scale Integration (VLSI) Systems, 24:9, (2813-2826), Online publication date: 1-Sep-2016.
  381. Zhan X, Qian X and Ukkusuri S (2016). A Graph-Based Approach to Measuring the Efficiency of an Urban Taxi Service System, IEEE Transactions on Intelligent Transportation Systems, 17:9, (2479-2489), Online publication date: 1-Sep-2016.
  382. Chatterjee K and Ibsen-Jensen R The complexity of deciding legality of a single step of magic Proceedings of the Twenty-second European Conference on Artificial Intelligence, (1432-1439)
  383. ACM
    Hossain A, Sreenan C and Alberola R (2016). Neighbour-Disjoint Multipath for Low-Power and Lossy Networks, ACM Transactions on Sensor Networks, 12:3, (1-25), Online publication date: 29-Aug-2016.
  384. Chowdhury R, Ganapathi P, Pradhan V, Tithi J and Xiao Y An Efficient Cache-oblivious Parallel Viterbi Algorithm Proceedings of the 22nd International Conference on Euro-Par 2016: Parallel Processing - Volume 9833, (574-587)
  385. Rosenberg A Scheduling DAGs Opportunistically Proceedings of the 22nd International Conference on Euro-Par 2016: Parallel Processing - Volume 9833, (22-33)
  386. Ma Z, Fan Y, Su K, Li C and Sattar A Local search with noisy strategy for minimum vertex cover in massive graphs Proceedings of the 14th Pacific Rim International Conference on Trends in Artificial Intelligence, (283-294)
  387. ACM
    Chen W, Wilson J, Tyree S, Weinberger K and Chen Y Compressing Convolutional Neural Networks in the Frequency Domain Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, (1475-1484)
  388. Kastrati F and Moerkotte G (2016). Optimization of conjunctive predicates for main memory column stores, Proceedings of the VLDB Endowment, 9:12, (1125-1136), Online publication date: 1-Aug-2016.
  389. Xhafa F and Loia V (2016). Guest Editorial for Special Section on Advanced Techniques for Efficient and Reliable Cloud Storage, IEEE Transactions on Computers, 65:8, (2346-2347), Online publication date: 1-Aug-2016.
  390. Wang C, Li J, Ye F and Yang Y (2016). A Mobile Data Gathering Framework for Wireless Rechargeable Sensor Networks with Vehicle Movement Costs and Capacity Constraints, IEEE Transactions on Computers, 65:8, (2411-2427), Online publication date: 1-Aug-2016.
  391. Riechert M, Höner zu Siederdissen C and Stadler P (2016). Algebraic dynamic programming for multiple context-free grammars, Theoretical Computer Science, 639:C, (91-109), Online publication date: 1-Aug-2016.
  392. Jensen U, Kugler P, Ring M and Eskofier B (2016). Approaching the accuracy---cost conflict in embedded classification system design, Pattern Analysis & Applications, 19:3, (839-855), Online publication date: 1-Aug-2016.
  393. ACM
    Sui X, Lenharth A, Fussell D and Pingali K (2016). Proactive Control of Approximate Programs, ACM SIGARCH Computer Architecture News, 44:2, (607-621), Online publication date: 29-Jul-2016.
  394. ACM
    WU Y, Zhu X, Li L, Fan W, Jin R and Zhang X (2016). Mining Dual Networks, ACM Transactions on Knowledge Discovery from Data, 10:4, (1-37), Online publication date: 27-Jul-2016.
  395. ACM
    Wu P, Lin M, Li X and Ho T (2016). Parasitic-Aware Common-Centroid FinFET Placement and Routing for Current-Ratio Matching, ACM Transactions on Design Automation of Electronic Systems, 21:3, (1-22), Online publication date: 26-Jul-2016.
  396. Jamadagni C, Anilkumar A, Mathew K, Mulimani M and Koolagudi S Dynamic 3D graph visualizations in julia Proceedings of the Summer Computer Simulation Conference, (1-8)
  397. ACM
    Bender M, Demaine E, Ebrahimi R, Fineman J, Johnson R, Lincoln A, Lynch J and McCauley S Cache-Adaptive Analysis Proceedings of the 28th ACM Symposium on Parallelism in Algorithms and Architectures, (135-144)
  398. Brandenburg F and Gleißner A (2016). Ranking chain sum orders, Theoretical Computer Science, 636:C, (66-76), Online publication date: 11-Jul-2016.
  399. Senel F and Younis M (2016). Novel relay node placement algorithms for establishing connected topologies, Journal of Network and Computer Applications, 70:C, (114-130), Online publication date: 1-Jul-2016.
  400. Ferdosian N, Othman M, Ali B and Lun K (2016). Greedy---knapsack algorithm for optimal downlink resource allocation in LTE networks, Wireless Networks, 22:5, (1427-1440), Online publication date: 1-Jul-2016.
  401. ACM
    Wei H, Yu J, Lu C and Lin X Speedup Graph Processing by Graph Ordering Proceedings of the 2016 International Conference on Management of Data, (1813-1828)
  402. ACM
    Lam A and Li V Energy loss minimization for vehicular energy network routing Proceedings of the Workshop on Electric Vehicle Systems, Data, and Applications, (1-6)
  403. ACM
    Rahul S and Tao Y Efficient Top-k Indexing via General Reductions Proceedings of the 35th ACM SIGMOD-SIGACT-SIGAI Symposium on Principles of Database Systems, (277-288)
  404. ACM
    Abo Khamis M, Ngo H and Rudra A FAQ Proceedings of the 35th ACM SIGMOD-SIGACT-SIGAI Symposium on Principles of Database Systems, (13-28)
  405. ACM
    Sui X, Lenharth A, Fussell D and Pingali K (2016). Proactive Control of Approximate Programs, ACM SIGPLAN Notices, 51:4, (607-621), Online publication date: 9-Jun-2016.
  406. ACM
    Rokni S and Ghasemzadeh H Plug-n-learn Proceedings of the 53rd Annual Design Automation Conference, (1-6)
  407. Hu X, Wang M, Leeson M, Di Paolo E and Liu H (2016). Deterministic agent-based path optimization by mimicking the spreading of ripples, Evolutionary Computation, 24:2, (319-346), Online publication date: 1-Jun-2016.
  408. He L, Zhu H and Jarvis S (2016). Developing Graph-Based Co-Scheduling Algorithms on Multicore Computers, IEEE Transactions on Parallel and Distributed Systems, 27:6, (1617-1632), Online publication date: 1-Jun-2016.
  409. Ma S, Li J, Hu C, Lin X and Huai J (2016). Big graph search, Frontiers of Computer Science: Selected Publications from Chinese Universities, 10:3, (387-398), Online publication date: 1-Jun-2016.
  410. ACM
    Salinas S, Luo C, Liao W and Li P Efficient Secure Outsourcing of Large-scale Quadratic Programs Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, (281-292)
  411. ACM
    Chiariotti F, D'Aronco S, Toni L and Frossard P Online learning adaptation strategy for DASH clients Proceedings of the 7th International Conference on Multimedia Systems, (1-12)
  412. ACM
    Bae J, Bae S, Moon I and Kim T (2016). Efficient Flattening Algorithm for Hierarchical and Dynamic Structure Discrete Event Models, ACM Transactions on Modeling and Computer Simulation, 26:4, (1-25), Online publication date: 2-May-2016.
  413. Ndoye M, Anderson J and Greene D (2016). An MM-Based Algorithm for ${\ell }_{1}$ -Regularized Least-Squares Estimation With an Application to Ground Penetrating Radar Image Reconstruction, IEEE Transactions on Image Processing, 25:5, (2206-2221), Online publication date: 1-May-2016.
  414. Fang S, Liu Y and Ning P (2016). Wireless Communications under Broadband Reactive Jamming Attacks, IEEE Transactions on Dependable and Secure Computing, 13:3, (394-408), Online publication date: 1-May-2016.
  415. Wang H, Li Y, Jin D, Hui P and Wu J (2016). Saving Energy in Partially Deployed Software Defined Networks, IEEE Transactions on Computers, 65:5, (1578-1592), Online publication date: 1-May-2016.
  416. Taheri K, Moradi H, Asadpour M and Parhami P (2016). MVGS, Robotics and Autonomous Systems, 79:C, (72-86), Online publication date: 1-May-2016.
  417. Hu Y and Nie L (2016). An aerial image recognition framework using discrimination and redundancy quality measure, Journal of Visual Communication and Image Representation, 37:C, (53-62), Online publication date: 1-May-2016.
  418. Wen Y (2016). Energy-aware dynamical hosts and tasks assignment for cloud computing, Journal of Systems and Software, 115:C, (144-156), Online publication date: 1-May-2016.
  419. ACM
    Lenharth A, Nguyen D and Pingali K (2016). Parallel graph analytics, Communications of the ACM, 59:5, (78-87), Online publication date: 26-Apr-2016.
  420. Pezoa F, Reutter J, Suarez F, Ugarte M and Vrgoč D Foundations of JSON Schema Proceedings of the 25th International Conference on World Wide Web, (263-273)
  421. Zhang A, Goyal A, Baeza-Yates R, Chang Y, Han J, Gunter C and Deng H Towards Mobile Query Auto-Completion Proceedings of the 25th International Conference on World Wide Web, (579-590)
  422. Maugey T, Petrazzuoli G, Frossard P, Cagnazzo M and Pesquet-Popescu B (2016). Reference View Selection in DIBR-Based Multiview Coding, IEEE Transactions on Image Processing, 25:4, (1808-1819), Online publication date: 1-Apr-2016.
  423. ACM
    Sui X, Lenharth A, Fussell D and Pingali K Proactive Control of Approximate Programs Proceedings of the Twenty-First International Conference on Architectural Support for Programming Languages and Operating Systems, (607-621)
  424. Schulz S and Bringmann O Accelerating source-level timing simulation Proceedings of the 2016 Conference on Design, Automation & Test in Europe, (1574-1579)
  425. ACM
    Lacassagne L, Cabaret L, Etiemble D, Hebache F and Petreto A A new SIMD iterative connected component labeling algorithm Proceedings of the 3rd Workshop on Programming Models for SIMD/Vector Processing, (1-8)
  426. Liu X, Cao J, Tang S and Wen J (2016). Enabling Reliable and Network-Wide Wakeup in Wireless Sensor Networks, IEEE Transactions on Wireless Communications, 15:3, (2262-2275), Online publication date: 1-Mar-2016.
  427. Colombo F, Cordone R and Lulli G (2016). The multimode covering location problem, Computers and Operations Research, 67:C, (25-33), Online publication date: 1-Mar-2016.
  428. ACM
    Thomas A and Pattabiraman K (2016). Error Detector Placement for Soft Computing Applications, ACM Transactions on Embedded Computing Systems, 15:1, (1-25), Online publication date: 20-Feb-2016.
  429. ACM
    Efrat A, Fekete S, Mitchell J, Polishchuk V and Suomela J (2015). Improved Approximation Algorithms for Relay Placement, ACM Transactions on Algorithms, 12:2, (1-28), Online publication date: 12-Feb-2016.
  430. Avci M and Najm F (2016). Verification of the Power and Ground Grids Under General and Hierarchical Constraints, IEEE Transactions on Very Large Scale Integration (VLSI) Systems, 24:2, (729-742), Online publication date: 1-Feb-2016.
  431. Alvanos M, Farreras M, Tiotto E, Amaral J and Martorell X (2016). Combining Static and Dynamic Data Coalescing in Unified Parallel C, IEEE Transactions on Parallel and Distributed Systems, 27:2, (381-393), Online publication date: 1-Feb-2016.
  432. Bienkowski M, Gąsieniec L, Klonowski M, Korzeniowski M, Mans B, Schmid S and Wattenhofer R (2016). Distributed alarming in the on-duty and off-duty models, IEEE/ACM Transactions on Networking, 24:1, (218-230), Online publication date: 1-Feb-2016.
  433. Iyengar A, Siegel P and Wolf J (2016). On the Capacity of Channels With Timing Synchronization Errors, IEEE Transactions on Information Theory, 62:2, (793-810), Online publication date: 1-Feb-2016.
  434. Zhang L, Yang Y, Wang M, Hong R, Nie L and Li X (2016). Detecting Densely Distributed Graph Patterns for Fine-Grained Image Categorization, IEEE Transactions on Image Processing, 25:2, (553-565), Online publication date: 1-Feb-2016.
  435. Li L, Li J and Gao H (2016). Evaluating entity-description conflict on duplicated data, Journal of Combinatorial Optimization, 31:2, (918-941), Online publication date: 1-Feb-2016.
  436. Jawaherul Alam M, Kobourov S and Mondal D Orthogonal Layout with Optimal Face Complexity Proceedings of the 42nd International Conference on SOFSEM 2016: Theory and Practice of Computer Science - Volume 9587, (121-133)
  437. ACM
    Yoon J An efficient geometric shape coding and representation approach to obtain both skeleton and contours Proceedings of the 10th International Conference on Ubiquitous Information Management and Communication, (1-8)
  438. ACM
    Garg P and Kothapalli K STIC-D Proceedings of the 17th International Conference on Distributed Computing and Networking, (1-10)
  439. Shultz G (2016). The simplex method in an advanced algorithms course, Journal of Computing Sciences in Colleges, 31:3, (70-77), Online publication date: 1-Jan-2016.
  440. Abeywickrama T, Cheema M and Taniar D (2016). k-nearest neighbors on road networks, Proceedings of the VLDB Endowment, 9:6, (492-503), Online publication date: 1-Jan-2016.
  441. Faisal M, Mathkour H and Alsulaiman M (2016). AntStar, Scientific Programming, 2016, (2-2), Online publication date: 1-Jan-2016.
  442. Han K, Zhang C, Luo J, Hu M and Veeravalli B (2016). Truthful Scheduling Mechanisms for Powering Mobile Crowdsensing, IEEE Transactions on Computers, 65:1, (294-307), Online publication date: 1-Jan-2016.
  443. Xu B, Zhu Y, Kim D, Li D, Jiang H and Tokuta A (2016). Strengthening barrier-coverage of static sensor network with mobile sensor nodes, Wireless Networks, 22:1, (1-10), Online publication date: 1-Jan-2016.
  444. He Y, Zhang X, Li W, Li X, Wu W and Gao S (2016). Algorithms for randomized time-varying knapsack problems, Journal of Combinatorial Optimization, 31:1, (95-117), Online publication date: 1-Jan-2016.
  445. ACM
    Newton R, Fogg P and Varamesh A (2015). Adaptive lock-free maps: purely-functional to scalable, ACM SIGPLAN Notices, 50:9, (218-229), Online publication date: 18-Dec-2015.
  446. ACM
    Chang Y and Garg V (2015). A parallel algorithm for global states enumeration in concurrent systems, ACM SIGPLAN Notices, 50:8, (140-149), Online publication date: 18-Dec-2015.
  447. ACM
    Zhang K, Chen R and Chen H (2015). NUMA-aware graph-structured analytics, ACM SIGPLAN Notices, 50:8, (183-193), Online publication date: 18-Dec-2015.
  448. Seshadri K and Shalinie S (2015). Parallelization of a graph-cut based algorithm for hierarchical clustering of web documents, Concurrency and Computation: Practice & Experience, 27:17, (5156-5176), Online publication date: 10-Dec-2015.
  449. ACM
    Chen G and Shen X Free launch Proceedings of the 48th International Symposium on Microarchitecture, (407-419)
  450. Grady M (2015). PARI/GP, Journal of Computing Sciences in Colleges, 31:2, (32-40), Online publication date: 1-Dec-2015.
  451. Shuai Ma , Liang Duan , Wenfei Fan , Chunming Hu and Wenguang Chen (2015). Extending Conditional Dependencies with Built-in Predicates, IEEE Transactions on Knowledge and Data Engineering, 27:12, (3274-3288), Online publication date: 1-Dec-2015.
  452. Ashlock D and McEachern A (2015). Evolutionary Nonlinear Projection, IEEE Transactions on Evolutionary Computation, 19:6, (857-869), Online publication date: 1-Dec-2015.
  453. Lu P, Peng F, Chen H and Zheng L (2015). Deciding determinism of unary languages, Information and Computation, 245:C, (181-196), Online publication date: 1-Dec-2015.
  454. Silva J, Gomes T, Tipper D, Martins L and Kounev V (2015). An effective algorithm for computing all-terminal reliability bounds, Networks, 66:4, (282-295), Online publication date: 1-Dec-2015.
  455. ACM
    Bai Y, Ahmed S and Granado B (2015). ARC 2014, ACM Transactions on Reconfigurable Technology and Systems, 9:1, (1-16), Online publication date: 24-Nov-2015.
  456. ACM
    Yu C, Huang J, Austin W, Xiao B and Biros G Performance optimization for the k-nearest neighbors kernel on x86 architectures Proceedings of the International Conference for High Performance Computing, Networking, Storage and Analysis, (1-12)
  457. ACM
    Shigezumi J, Asai T, Morikawa H and Inakoshi H A Fast Algorithm for Matching Planar Maps with Minimum Fréchet Distances Proceedings of the 4th International ACM SIGSPATIAL Workshop on Analytics for Big Geospatial Data, (25-34)
  458. ACM
    Jung A, Hahmann S, Rohmer D, Begault A, Boissieux L and Cani M (2015). Sketching Folds, ACM Transactions on Graphics, 34:5, (1-12), Online publication date: 3-Nov-2015.
  459. ACM
    Sanders P, Speck J and Steffen R (2015). Work-Efficient Matrix Inversion in Polylogarithmic Time, ACM Transactions on Parallel Computing, 2:3, (1-29), Online publication date: 2-Nov-2015.
  460. ACM
    Koutris P, Upadhyaya P, Balazinska M, Howe B and Suciu D (2015). Query-Based Data Pricing, Journal of the ACM, 62:5, (1-44), Online publication date: 2-Nov-2015.
  461. Gay G, Staats M, Whalen M and Heimdahl M (2015). Automated Oracle Data Selection Support, IEEE Transactions on Software Engineering, 41:11, (1119-1137), Online publication date: 1-Nov-2015.
  462. Heckel R and Bolcskei H (2015). Robust Subspace Clustering via Thresholding, IEEE Transactions on Information Theory, 61:11, (6320-6342), Online publication date: 1-Nov-2015.
  463. Subramani K and Wojciechowski P A Graphical Theorem of the Alternative for UTVPI Constraints Proceedings of the 12th International Colloquium on Theoretical Aspects of Computing - ICTAC 2015 - Volume 9399, (328-345)
  464. ACM
    Chen X, Candan K, Sapino M and Shakarian P KSGM Proceedings of the 24th ACM International on Conference on Information and Knowledge Management, (1101-1110)
  465. Afek Y, Matveev A, Moll O and Shavit N Amalgamated Lock-Elision Proceedings of the 29th International Symposium on Distributed Computing - Volume 9363, (309-324)
  466. ACM
    Stevens J, Tschirhart P and Jacob B The Semantic Gap Between Software and the Memory System Proceedings of the 2015 International Symposium on Memory Systems, (43-46)
  467. Surynek P (2015). On the Complexity of Optimal Parallel Cooperative Path-Finding, Fundamenta Informaticae, 137:4, (517-548), Online publication date: 1-Oct-2015.
  468. ACM
    Costa A, Buccio E and Melucci M (2015). A Document Retrieval Model Based on Digital Signal Filtering, ACM Transactions on Information Systems, 34:1, (1-37), Online publication date: 1-Oct-2015.
  469. Yun Liang , Xiaolong Xie , Guangyu Sun and Deming Chen (2015). An Efficient Compiler Framework for Cache Bypassing on GPUs, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 34:10, (1677-1690), Online publication date: 1-Oct-2015.
  470. Zhang S, Liu X, Wang J, Cao J and Min G (2015). Energy-efficient active tag searching in large scale RFID systems, Information Sciences: an International Journal, 317:C, (143-156), Online publication date: 1-Oct-2015.
  471. Goemans M (2015). Smallest compact formulation for the permutahedron, Mathematical Programming: Series A and B, 153:1, (5-11), Online publication date: 1-Oct-2015.
  472. Kojima R, Sugiyama O and Nakadai K Audio-visual scene understanding utilizing text information for a cooking support robot 2015 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS), (4210-4215)
  473. ACM
    Asai H and Ohara Y (2015). Poptrie, ACM SIGCOMM Computer Communication Review, 45:4, (57-70), Online publication date: 22-Sep-2015.
  474. ACM
    Mei J, Kou X, Yao Z, Rau-Chaplin A, Islam A, Moh'd A and Milios E Efficient Computation of Co-occurrence Based Word Relatedness Proceedings of the 2015 ACM Symposium on Document Engineering, (43-46)
  475. ACM
    Hata T, Kawasaki H, Kurasawa H, Sato H, Nakamura M and Tsutsui A Top of worlds Adjunct Proceedings of the 2015 ACM International Joint Conference on Pervasive and Ubiquitous Computing and Proceedings of the 2015 ACM International Symposium on Wearable Computers, (1405-1412)
  476. Wang J, Ding X, Lahijanian M, Paschalidis I and Belta C (2015). Temporal logic motion control using actor–critic methods, International Journal of Robotics Research, 34:10, (1329-1344), Online publication date: 1-Sep-2015.
  477. Toni L, Maugey T and Frossard P (2015). Optimized Packet Scheduling in Multiview Video Navigation Systems, IEEE Transactions on Multimedia, 17:9, (1604-1616), Online publication date: 1-Sep-2015.
  478. Hegde C, Indyk P and Schmidt L (2015). Approximation Algorithms for Model-Based Compressive Sensing, IEEE Transactions on Information Theory, 61:9, (5129-5147), Online publication date: 1-Sep-2015.
  479. Boucheron S, Gassiat E and Ohannessian M (2015). About Adaptive Coding on Countable Alphabets: Max-Stable Envelope Classes, IEEE Transactions on Information Theory, 61:9, (4948-4967), Online publication date: 1-Sep-2015.
  480. Gang Feng and Korkmaz T (2015). Finding Multi-Constrained Multiple Shortest Paths, IEEE Transactions on Computers, 64:9, (2559-2572), Online publication date: 1-Sep-2015.
  481. Aved A and Blasch E (2015). Multi-INT Query Language for DDDAS Designs, Procedia Computer Science, 51:C, (2518-2532), Online publication date: 1-Sep-2015.
  482. Cervilla A, Tabik S and Romero L (2015). Siting Multiple Observers for Maximum Coverage, Procedia Computer Science, 51:C, (356-365), Online publication date: 1-Sep-2015.
  483. Seshadri K, Mercy Shalinie S and Kollengode C (2015). Design and evaluation of a parallel algorithm for inferring topic hierarchies, Information Processing and Management: an International Journal, 51:5, (662-676), Online publication date: 1-Sep-2015.
  484. Yu J (2015). A model for tracing cross-referenced statement validity, Computer Standards & Interfaces, 41:C, (10-16), Online publication date: 1-Sep-2015.
  485. ACM
    Newton R, Fogg P and Varamesh A Adaptive lock-free maps: purely-functional to scalable Proceedings of the 20th ACM SIGPLAN International Conference on Functional Programming, (218-229)
  486. Lin C, Wu G and Yu C (2015). Protecting location privacy and query privacy, Concurrency and Computation: Practice & Experience, 27:12, (3021-3043), Online publication date: 25-Aug-2015.
  487. ACM
    Zhang W, Yang Y, Xiao J, Liu X and Babar M Ant colony algorithm based scheduling for handling software project delay Proceedings of the 2015 International Conference on Software and System Process, (52-56)
  488. Su L and Vaidya N Reaching Approximate Byzantine Consensus with Multi-hop Communication Proceedings of the 17th International Symposium on Stabilization, Safety, and Security of Distributed Systems - Volume 9212, (21-35)
  489. ACM
    Asai H and Ohara Y Poptrie Proceedings of the 2015 ACM Conference on Special Interest Group on Data Communication, (57-70)
  490. ACM
    Qin L, Li R, Chang L and Zhang C Locally Densest Subgraph Discovery Proceedings of the 21th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, (965-974)
  491. ACM
    Zhang A, Goyal A, Kong W, Deng H, Dong A, Chang Y, Gunter C and Han J adaQAC Proceedings of the 38th International ACM SIGIR Conference on Research and Development in Information Retrieval, (143-152)
  492. ACM
    Prountzos D, Manevich R and Pingali K (2015). Synthesizing parallel graph programs via automated planning, ACM SIGPLAN Notices, 50:6, (533-544), Online publication date: 7-Aug-2015.
  493. Dong Li , Huiling Zhou and Kin-Man Lam (2015). High-resolution face verification using pore-scale facial features, IEEE Transactions on Image Processing, 24:8, (2317-2327), Online publication date: 1-Aug-2015.
  494. Kyungmin Lim , Jaeho Lee , Seongwan Kim and Sangyoun Lee (2015). Fast PU Skip and Split Termination Algorithm for HEVC Intra Prediction, IEEE Transactions on Circuits and Systems for Video Technology, 25:8, (1335-1346), Online publication date: 1-Aug-2015.
  495. Werth T, Büttner S and Krumke S (2015). Robust bottleneck routing games, Networks, 66:1, (57-66), Online publication date: 1-Aug-2015.
  496. Stern R, Kiesel S, Puzis R, Felner A and Ruml W Max is more than min Proceedings of the 24th International Conference on Artificial Intelligence, (4324-4330)
  497. Qian C, Yu Y and Zhou Z On constrained boolean pareto optimization Proceedings of the 24th International Conference on Artificial Intelligence, (389-395)
  498. Moon C and Conitzer V Maximal cooperation in repeated games on social networks Proceedings of the 24th International Conference on Artificial Intelligence, (216-223)
  499. Conca P, Stracquadanio G and Nicosia G Automatic Tuning of Algorithms Through Sensitivity Minimization Revised Selected Papers of the First International Workshop on Machine Learning, Optimization, and Big Data - Volume 9432, (14-25)
  500. ACM
    Singhee A, Lavin M, Finkler U, Heng F, Qu J and Hirsch S HAMS Proceedings of the 2015 ACM Sixth International Conference on Future Energy Systems, (171-178)
  501. ACM
    Almeida R, Furtado P and Bernardino J Performance Evaluation MySQL InnoDB and Microsoft SQL Server 2012 for Decision Support Environments Proceedings of the Eighth International C* Conference on Computer Science & Software Engineering, (56-62)
  502. ACM
    Mironovich V and Buzdalov M Hard Test Generation for Maximum Flow Algorithms with the Fast Crossover-Based Evolutionary Algorithm Proceedings of the Companion Publication of the 2015 Annual Conference on Genetic and Evolutionary Computation, (1229-1232)
  503. ACM
    Corus D, He J, Jansen T, Oliveto P, Sudholt D and Zarges C On Easiest Functions for Somatic Contiguous Hypermutations And Standard Bit Mutations Proceedings of the 2015 Annual Conference on Genetic and Evolutionary Computation, (1399-1406)
  504. ACM
    Pourhassan M, Gao W and Neumann F Maintaining 2-Approximations for the Dynamic Vertex Cover Problem Using Evolutionary Algorithms Proceedings of the 2015 Annual Conference on Genetic and Evolutionary Computation, (903-910)
  505. ACM
    Schlottfeldt S, Walter M, Timmis J, Carvalho A, Telles M and Diniz-Filho J Using Multi-Objective Artificial Immune Systems to Find Core Collections Based on Molecular Markers Proceedings of the 2015 Annual Conference on Genetic and Evolutionary Computation, (1271-1278)
  506. Carrière M, Oudot S and Ovsjanikov M Stable topological signatures for points on 3D shapes Proceedings of the Eurographics Symposium on Geometry Processing, (1-12)
  507. ACM
    Iwainsky A Navigation support for old and handicapped persons in urban regions Proceedings of the 16th International Conference on Computer Systems and Technologies, (128-135)
  508. ACM
    Ping D, Sun X and Mao B TextLogger Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks, (1-12)
  509. ACM
    Zhang L, Yang Y and Zimmermann R Fine-Grained Image Categorization by Localizing TinyObject Parts from Unannotated Images Proceedings of the 5th ACM on International Conference on Multimedia Retrieval, (107-114)
  510. ACM
    Weissman S, Ayhan S, Bradley J and Lin J Identifying Duplicate and Contradictory Information in Wikipedia Proceedings of the 15th ACM/IEEE-CS Joint Conference on Digital Libraries, (57-60)
  511. ACM
    Green O, Dukhan M and Vuduc R Branch-Avoiding Graph Algorithms Proceedings of the 27th ACM symposium on Parallelism in Algorithms and Architectures, (212-223)
  512. ACM
    Tuncer O, Leung V and Coskun A PaCMap Proceedings of the 29th ACM on International Conference on Supercomputing, (37-46)
  513. ACM
    Prountzos D, Manevich R and Pingali K Synthesizing parallel graph programs via automated planning Proceedings of the 36th ACM SIGPLAN Conference on Programming Language Design and Implementation, (533-544)
  514. ACM
    Carvalho T, Pinto P and Cardoso J Programming Strategies for Contextual Runtime Specialization Proceedings of the 18th International Workshop on Software and Compilers for Embedded Systems, (3-11)
  515. Bhattacharya S, Ghrist R and Kumar V (2015). Persistent Homology for Path Planning in Uncertain Environments, IEEE Transactions on Robotics, 31:3, (578-590), Online publication date: 1-Jun-2015.
  516. Bopardikar S, Englot B and Speranzon A (2015). Multiobjective Path Planning: Localization Constraints and Collision Probability, IEEE Transactions on Robotics, 31:3, (562-577), Online publication date: 1-Jun-2015.
  517. Perret B, Cousty J, Tankyevych O, Talbot H and Passat N (2015). Directed Connected Operators: Asymmetric Hierarchies for Image Filtering and Segmentation, IEEE Transactions on Pattern Analysis and Machine Intelligence, 37:6, (1162-1176), Online publication date: 1-Jun-2015.
  518. Karbasi A, Ioannidis S and Massoulie L (2015). From Small-World Networks to Comparison-Based Search, IEEE Transactions on Information Theory, 61:6, (3056-3074), Online publication date: 1-Jun-2015.
  519. Nunes I, Miles S, Luck M, Barbosa S and Lucena C (2015). Decision making with natural language based preferences and psychology-inspired heuristics, Engineering Applications of Artificial Intelligence, 42:C, (16-35), Online publication date: 1-Jun-2015.
  520. ACM
    Hassaan M, Nguyen D and Pingali K (2015). Kinetic Dependence Graphs, ACM SIGARCH Computer Architecture News, 43:1, (457-471), Online publication date: 29-May-2015.
  521. ACM
    Lambrou T (2015). Optimized Cooperative Dynamic Coverage in Mixed Sensor Networks, ACM Transactions on Sensor Networks, 11:3, (1-35), Online publication date: 28-May-2015.
  522. ACM
    Wang X, Zhang Y, Zhang W, Lin X and Cheema M Optimal Spatial Dominance Proceedings of the 2015 ACM SIGMOD International Conference on Management of Data, (923-938)
  523. ACM
    Müller I, Sanders P, Lacurie A, Lehner W and Färber F Cache-Efficient Aggregation Proceedings of the 2015 ACM SIGMOD International Conference on Management of Data, (1123-1136)
  524. ACM
    Chang L, Lin X, Qin L, Yu J and Zhang W Index-based Optimal Algorithms for Computing Steiner Components with Maximum Connectivity Proceedings of the 2015 ACM SIGMOD International Conference on Management of Data, (459-474)
  525. ACM
    Chu X, He Y, Chakrabarti K and Ganjam K TEGRA Proceedings of the 2015 ACM SIGMOD International Conference on Management of Data, (1713-1728)
  526. ACM
    Acharya J, Diakonikolas I, Hegde C, Li J and Schmidt L Fast and Near-Optimal Algorithms for Approximating Distributions by Histograms Proceedings of the 34th ACM SIGMOD-SIGACT-SIGAI Symposium on Principles of Database Systems, (249-263)
  527. ACM
    Liu W, Salman E, Sitik C and Taskin B Clock Skew Scheduling in the Presence of Heavily Gated Clock Networks Proceedings of the 25th edition on Great Lakes Symposium on VLSI, (283-288)
  528. ACM
    Hassaan M, Nguyen D and Pingali K (2015). Kinetic Dependence Graphs, ACM SIGPLAN Notices, 50:4, (457-471), Online publication date: 12-May-2015.
  529. ACM
    Chatterjee K, Ibsen-Jensen R, Pavlogiannis A and Goyal P (2015). Faster Algorithms for Algebraic Path Properties in Recursive State Machines with Constant Treewidth, ACM SIGPLAN Notices, 50:1, (97-109), Online publication date: 11-May-2015.
  530. ACM
    Joisha P (2014). Sticky tries, ACM SIGPLAN Notices, 49:11, (35-46), Online publication date: 11-May-2015.
  531. Jawaid S and Smith S (2015). Informative path planning as a maximum traveling salesman problem with submodular rewards, Discrete Applied Mathematics, 186:C, (112-127), Online publication date: 11-May-2015.
  532. Panagopoulos A, Alam M, Rogers A and Jennings N AdaHeat Proceedings of the 2015 International Conference on Autonomous Agents and Multiagent Systems, (1295-1303)
  533. Biswas A, Jain S, Mandal D and Narahari Y A Truthful Budget Feasible Multi-Armed Bandit Mechanism for Crowdsourcing Time Critical Tasks Proceedings of the 2015 International Conference on Autonomous Agents and Multiagent Systems, (1101-1109)
  534. Cogill R and Shrader B (2015). Delay Bounds for Random Linear Coding in Parallel Relay Networks, IEEE Transactions on Mobile Computing, 14:5, (964-974), Online publication date: 1-May-2015.
  535. Tal I and Vardy A (2015). List Decoding of Polar Codes, IEEE Transactions on Information Theory, 61:5, (2213-2226), Online publication date: 1-May-2015.
  536. ACM
    Amma C, Krings T, Böer J and Schultz T Advancing Muscle-Computer Interfaces with High-Density Electromyography Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems, (929-938)
  537. ACM
    Kosmalla F, Daiber F and Krüger A ClimbSense Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems, (2033-2042)
  538. Shoukourian H, Wilde T, Auweter A, Bode A and Tafani D Predicting energy consumption relevant indicators of strong scaling HPC applications for different compute resource configurations Proceedings of the Symposium on High Performance Computing, (115-126)
  539. Janota M, Lynce I and Marques-Silva J (2015). Algorithms for computing backbones of propositional formulae, AI Communications, 28:2, (161-177), Online publication date: 1-Apr-2015.
  540. Shao Y, Cui B, Chen L, Liu M and Xie X (2015). An efficient similarity search framework for SimRank over large dynamic graphs, Proceedings of the VLDB Endowment, 8:8, (838-849), Online publication date: 1-Apr-2015.
  541. Keyu Wang , Xufei Mao and Yunhao Liu (2015). BlindDate: A Neighbor Discovery Protocol, IEEE Transactions on Parallel and Distributed Systems, 26:4, (949-959), Online publication date: 1-Apr-2015.
  542. Grandin M (2015). Data structures and algorithms for high-dimensional structured adaptive mesh refinement, Advances in Engineering Software, 82:C, (75-86), Online publication date: 1-Apr-2015.
  543. Lin Y and Mouratidis K (2015). Best upgrade plans for single and multiple source-destination pairs, Geoinformatica, 19:2, (365-404), Online publication date: 1-Apr-2015.
  544. Zhu Y, Ma L and Zhang J (2015). An enhanced Kerberos protocol with non-interactive zero-knowledge proof, Security and Communication Networks, 8:6, (1108-1117), Online publication date: 1-Apr-2015.
  545. ACM
    Ewetz R and Koh C A Useful Skew Tree Framework for Inserting Large Safety Margins Proceedings of the 2015 Symposium on International Symposium on Physical Design, (85-92)
  546. ACM
    Wu P, Lin M, Li X and Ho T Common-Centroid FinFET Placement Considering the Impact of Gate Misalignment Proceedings of the 2015 Symposium on International Symposium on Physical Design, (25-31)
  547. ACM
    Hassaan M, Nguyen D and Pingali K Kinetic Dependence Graphs Proceedings of the Twentieth International Conference on Architectural Support for Programming Languages and Operating Systems, (457-471)
  548. Mishra A and Turuk A (2015). Residual energy-based replica detection scheme for mobile wireless sensor networks, Security and Communication Networks, 8:4, (637-648), Online publication date: 10-Mar-2015.
  549. ACM
    Biscaia M, Henriques D and Mateus P (2014). Decidability of Approximate Skolem Problem and Applications to Logical Verification of Dynamical Properties of Markov Chains, ACM Transactions on Computational Logic, 16:1, (1-17), Online publication date: 1-Mar-2015.
  550. Yanovich D (2015). Compact representation of polynomials for algorithms for computing Gröbner and involutive bases, Programming and Computing Software, 41:2, (126-130), Online publication date: 1-Mar-2015.
  551. Greco S, Spezzano F and Trubitsyna I (2015). Checking Chase Termination: Cyclicity Analysis and Rewriting Techniques, IEEE Transactions on Knowledge and Data Engineering, 27:3, (621-635), Online publication date: 1-Mar-2015.
  552. Xiongbin Rao and Lau V (2015). Minimization of CSI Feedback Dimension for Interference Alignment in MIMO Interference Multicast Networks, IEEE Transactions on Information Theory, 61:3, (1218-1246), Online publication date: 1-Mar-2015.
  553. Mozerov M and van de Weijer J (2015). Accurate Stereo Matching by Two-Step Energy Minimization, IEEE Transactions on Image Processing, 24:3, (1153-1163), Online publication date: 1-Mar-2015.
  554. Sheng Zhang , Jie Wu and Sanglu Lu (2015). Collaborative Mobile Charging, IEEE Transactions on Computers, 64:3, (654-667), Online publication date: 1-Mar-2015.
  555. Isaiah P and Shima T (2015). Motion planning algorithms for the Dubins Travelling Salesperson Problem, Automatica (Journal of IFAC), 53:C, (247-255), Online publication date: 1-Mar-2015.
  556. Kuhlman C, Anil Kumar V, Marathe M, Ravi S and Rosenkrantz D (2015). Inhibiting diffusion of complex contagions in social networks: theoretical and experimental results, Data Mining and Knowledge Discovery, 29:2, (423-465), Online publication date: 1-Mar-2015.
  557. Liu Y, Li W, Huang Z and Fang Q (2015). A fast method based on multiple clustering for name disambiguation in bibliographic citations, Journal of the Association for Information Science and Technology, 66:3, (634-644), Online publication date: 1-Mar-2015.
  558. Farhana E and Rahman M (2015). Constrained sequence analysis algorithms in computational biology, Information Sciences: an International Journal, 295:C, (247-257), Online publication date: 20-Feb-2015.
  559. Zhong C, Malinen M, Miao D and Fränti P (2015). A fast minimum spanning tree algorithm based on K-means, Information Sciences: an International Journal, 295:C, (1-17), Online publication date: 20-Feb-2015.
  560. ACM
    Merrill D, Garland M and Grimshaw A (2015). High-Performance and Scalable GPU Graph Traversal, ACM Transactions on Parallel Computing, 1:2, (1-30), Online publication date: 18-Feb-2015.
  561. Tashtarian F, Yaghmaee Moghaddam M, Sohraby K and Effati S (2015). ODT, Computer Networks: The International Journal of Computer and Telecommunications Networking, 77:C, (128-143), Online publication date: 11-Feb-2015.
  562. ACM
    Angione C, Occhipinti A and Nicosia G (2015). Satisfiability by Maxwell-Boltzmann and Bose-Einstein Statistical Distributions, ACM Journal of Experimental Algorithmics, 19, (1.1-1.15), Online publication date: 3-Feb-2015.
  563. Ruiz-Rivera A, Chin K and Soh S (2015). A novel framework to mitigate the negative impacts of green techniques on BGP, Journal of Network and Computer Applications, 48:C, (22-34), Online publication date: 1-Feb-2015.
  564. Matsubara S (2015). An enumeration algorithm for all integers nonrepresentable by some positive integers, Information Processing Letters, 115:2, (280-284), Online publication date: 1-Feb-2015.
  565. Chiu C, Dai T and Lyuu Y (2015). Pricing Asian option by the FFT with higher-order error convergence rate under Lévy processes, Applied Mathematics and Computation, 252:C, (418-437), Online publication date: 1-Feb-2015.
  566. Goldengorin B, Malyshev D, Pardalos P and Zamaraev V (2015). A tolerance-based heuristic approach for the weighted independent set problem, Journal of Combinatorial Optimization, 29:2, (433-450), Online publication date: 1-Feb-2015.
  567. ACM
    Chang Y and Garg V A parallel algorithm for global states enumeration in concurrent systems Proceedings of the 20th ACM SIGPLAN Symposium on Principles and Practice of Parallel Programming, (140-149)
  568. ACM
    Zhang K, Chen R and Chen H NUMA-aware graph-structured analytics Proceedings of the 20th ACM SIGPLAN Symposium on Principles and Practice of Parallel Programming, (183-193)
  569. Gonen B, Gunduz G and Yuksel M (2015). Automated network management and configuration using Probabilistic Trans-Algorithmic Search, Computer Networks: The International Journal of Computer and Telecommunications Networking, 76:C, (275-293), Online publication date: 15-Jan-2015.
  570. ACM
    Chatterjee K, Ibsen-Jensen R, Pavlogiannis A and Goyal P Faster Algorithms for Algebraic Path Properties in Recursive State Machines with Constant Treewidth Proceedings of the 42nd Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, (97-109)
  571. Gavruskin A, Khoussainov B, Kokho M and Liu J (2015). Dynamic algorithms for monotonic interval scheduling problem, Theoretical Computer Science, 562:C, (227-242), Online publication date: 11-Jan-2015.
  572. ACM
    Litz H, Dias R and Cheriton D (2015). Efficient Correction of Anomalies in Snapshot Isolation Transactions, ACM Transactions on Architecture and Code Optimization, 11:4, (1-24), Online publication date: 9-Jan-2015.
  573. ACM
    Jeon H, Nam S, Park S, Park J, Yoo C, Kim J and Kim T Unsupervised 3D human pose recognition from a single depth human silhouette using a geodesic map and kinematic body model Proceedings of the 9th International Conference on Ubiquitous Information Management and Communication, (1-4)
  574. ACM
    Chilukuri S and Sahoo A Delay-aware TDMA Scheduling for Multi-Hop Wireless Networks Proceedings of the 16th International Conference on Distributed Computing and Networking, (1-10)
  575. Chen L, Wang J, Peng X and Kui X (2015). An energy-efficient and relay hop bounded mobile data gathering algorithm in wireless sensor networks, International Journal of Distributed Sensor Networks, 2015, (12-12), Online publication date: 1-Jan-2015.
  576. Ji Y, Li Q, He Y and Guo D (2015). Overhead analysis and evaluation of approaches to host-based bot detection, International Journal of Distributed Sensor Networks, 2015, (51-51), Online publication date: 1-Jan-2015.
  577. Junhui Hou , Lap-Pui Chau , Magnenat-Thalmann N and Ying He (2015). Compressing 3-D Human Motions via Keyframe-Based Geometry Videos, IEEE Transactions on Circuits and Systems for Video Technology, 25:1, (51-62), Online publication date: 1-Jan-2015.
  578. Moiseev K, Wimer S and Kolodny A (2015). Timing-constrained power minimization in VLSI circuits by simultaneous multilayer wire spacing, Integration, the VLSI Journal, 48:C, (116-128), Online publication date: 1-Jan-2015.
  579. Manea F, Mercaş R and Tiseanu C (2014). An algorithmic toolbox for periodic partial words, Discrete Applied Mathematics, 179:C, (174-192), Online publication date: 31-Dec-2015.
  580. Inoue Y and Minato S An Efficient Method for Indexing All Topological Orders of a Directed Graph Algorithms and Computation, (103-114)
  581. Tong W and Lin G An Improved Approximation Algorithm for the Minimum Common Integer Partition Problem Algorithms and Computation, (353-364)
  582. ACM
    Culhane W, Jayaram K and Eugster P Fast, expressive top-k matching Proceedings of the 15th International Middleware Conference, (73-84)
  583. ACM
    Natarajan A and Mittal N (2014). Fast concurrent lock-free binary search trees, ACM SIGPLAN Notices, 49:8, (317-328), Online publication date: 26-Nov-2014.
  584. (2014). Capacity factors in a point-to-point network, Information Sciences: an International Journal, 285:C, (24-34), Online publication date: 20-Nov-2014.
  585. ACM
    Sinha S and Srikanthan T (2014). Dataflow Graph Partitioning for Area-Efficient High-Level Synthesis with Systems Perspective, ACM Transactions on Design Automation of Electronic Systems, 20:1, (1-18), Online publication date: 18-Nov-2014.
  586. Green O When merging and branch predictors collide Proceedings of the 4th Workshop on Irregular Applications: Architectures and Algorithms, (33-40)
  587. Green O, Yalamanchili P and Munguía L Fast triangle counting on the GPU Proceedings of the 4th Workshop on Irregular Applications: Architectures and Algorithms, (1-8)
  588. Patwary M, Satish N, Sundaram N, Manne F, Habib S and Dubey P Pardicle Proceedings of the International Conference for High Performance Computing, Networking, Storage and Analysis, (560-571)
  589. Pearce R, Gokhale M and Amato N Faster parallel traversal of scale free graphs at extreme scale with vertex delegates Proceedings of the International Conference for High Performance Computing, Networking, Storage and Analysis, (549-559)
  590. Cicotti P and Carrington L A caching approach to reduce communication in graph search algorithms Proceedings of the 2014 International Workshop on Data Intensive Scalable Computing Systems, (65-72)
  591. ACM
    Shan M, Chen G, Luo D, Zhu X and Wu X (2014). Building Maximum Lifetime Shortest Path Data Aggregation Trees in Wireless Sensor Networks, ACM Transactions on Sensor Networks, 11:1, (1-24), Online publication date: 7-Nov-2014.
  592. ACM
    Geng X, Takagi T, Arimura H and Uno T Enumeration of complete set of flock patterns in trajectories Proceedings of the 5th ACM SIGSPATIAL International Workshop on GeoStreaming, (53-61)
  593. ACM
    Sathe M, Knoblock C, Chiang Y and Harris A A parallel query engine for interactive spatiotemporal analysis Proceedings of the 22nd ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems, (429-432)
  594. ACM
    Goodrich M and Pszona P Two-phase bicriterion search for finding fast and efficient electric vehicle routes Proceedings of the 22nd ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems, (193-202)
  595. Tan M, Liu B, Dai S and Zhang Z Multithreaded pipeline synthesis for data-parallel kernels Proceedings of the 2014 IEEE/ACM International Conference on Computer-Aided Design, (718-725)
  596. Estébanez C, Saez Y, Recio G and Isasi P (2014). AUTOMATIC DESIGN OF NONCRYPTOGRAPHIC HASH FUNCTIONS USING GENETIC PROGRAMMING, Computational Intelligence, 30:4, (798-831), Online publication date: 1-Nov-2014.
  597. ACM
    Alstrup S, Thorup M, Gørtz I, Rauhe T and Zwick U (2014). Union-Find with Constant Time Deletions, ACM Transactions on Algorithms, 11:1, (1-28), Online publication date: 28-Oct-2014.
  598. Burckhardt S (2014). Principles of Eventual Consistency, Foundations and Trends in Programming Languages, 1:1-2, (1-150), Online publication date: 9-Oct-2014.
  599. ACM
    Bhagat S, Weinsberg U, Ioannidis S and Taft N Recommending with an agenda Proceedings of the 8th ACM Conference on Recommender systems, (65-72)
  600. ACM
    Nguyen-Dinh L, Calatroni A and Tröster G Towards a unified system for multimodal activity spotting Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing: Adjunct Publication, (807-816)
  601. Rebert A, Cha S, Avgerinos T, Foote J, Warren D, Grieco G and Brumley D Optimizing seed selection for fuzzing Proceedings of the 23rd USENIX conference on Security Symposium, (861-875)
  602. Saito S, Tomioka R and Yamanishi K Early detection of persistent topics in social networks Proceedings of the 2014 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, (417-424)
  603. Liu H, Kešelj V and Blouin C (2014). EXPLORING A SUBGRAPH MATCHING APPROACH FOR EXTRACTING BIOLOGICAL EVENTS FROM LITERATURE, Computational Intelligence, 30:3, (600-635), Online publication date: 1-Aug-2014.
  604. ACM
    De Wael M, Marr S and De Meuter W Data interface + algorithms = efficient programs Proceedings of the 9th International Workshop on Implementation, Compilation, Optimization of Object-Oriented Languages, Programs and Systems PLE, (1-4)
  605. van der Zander B, Liśkiewicz M and Textor J Constructing separators and adjustment sets in ancestral graphs Proceedings of the UAI 2014 Conference on Causal Inference: Learning and Prediction - Volume 1274, (11-24)
  606. ACM
    Arnold A, Giesbrecht M and Roche D Sparse interpolation over finite fields via low-order roots of unity Proceedings of the 39th International Symposium on Symbolic and Algebraic Computation, (27-34)
  607. ACM
    Gotlieb A and Marijan D FLOWER: optimal test suite reduction as a network maximum flow Proceedings of the 2014 International Symposium on Software Testing and Analysis, (171-180)
  608. ACM
    Rahat A, Everson R and Fieldsend J Multi-objective routing optimisation for battery-powered wireless sensor mesh networks Proceedings of the 2014 Annual Conference on Genetic and Evolutionary Computation, (1175-1182)
  609. ACM
    Sato Y, Oku Y and Fukuda M Applying GA with local search by taking hamming distances into consideration to credit erasure processing problems Proceedings of the 2014 Annual Conference on Genetic and Evolutionary Computation, (1183-1190)
  610. ACM
    Wang P, Shen C and Hsiao H View Synthesis Framework for Real-time Navigation of Free Viewpoint Videos Proceedings of International Conference on Internet Multimedia Computing and Service, (427-430)
  611. ACM
    Dahir N, Al-Dujaily R, Mak T and Yakovlev A (2014). Thermal Optimization in Network-on-Chip-Based 3D Chip Multiprocessors Using Dynamic Programming Networks, ACM Transactions on Embedded Computing Systems, 13:4s, (1-25), Online publication date: 1-Jul-2014.
  612. Sampath P (2014). An elementary theory of product-line variations, Formal Aspects of Computing, 26:4, (695-727), Online publication date: 1-Jul-2014.
  613. ACM
    Zhang Y, Zhang W, Lin X, Cheema M and Zhang C Matching dominance Proceedings of the 26th International Conference on Scientific and Statistical Database Management, (1-12)
  614. ACM
    Nilakant K, Dalibard V, Roy A and Yoneki E PrefEdge Proceedings of International Conference on Systems and Storage, (1-12)
  615. F. Vieira V, Xavier C, Ebecken N and Evsukoff A Modularity Based Hierarchical Community Detection in Networks Proceedings of the 14th International Conference on Computational Science and Its Applications — ICCSA 2014 - Volume 8584, (146-160)
  616. Kobayashi Y, Komuro K and Tamaki H Search Space Reduction through Commitments in Pathwidth Computation Proceedings of the 13th International Symposium on Experimental Algorithms - Volume 8504, (388-399)
  617. ACM
    Chang J, Khuller S and Mukherjee K LP rounding and combinatorial algorithms for minimizing active and busy time Proceedings of the 26th ACM symposium on Parallelism in algorithms and architectures, (118-127)
  618. ACM
    Kaler T, Hasenplaugh W, Schardl T and Leiserson C Executing dynamic data-graph computations deterministically using chromatic scheduling Proceedings of the 26th ACM symposium on Parallelism in algorithms and architectures, (154-165)
  619. Xu B, Kim D, Li D, Lee J, Jiang H and Tokuta A Fortifying Barrier-Coverage of Wireless Sensor Network with Mobile Sensor Nodes Proceedings of the 9th International Conference on Wireless Algorithms, Systems, and Applications - Volume 8491, (368-377)
  620. ACM
    M. J and Iyer S A method to prove query lower bounds Proceedings of the 2014 conference on Innovation & technology in computer science education, (81-86)
  621. ACM
    Tao Y A dynamic I/O-efficient structure for one-dimensional top-k range reporting Proceedings of the 33rd ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems, (256-265)
  622. ACM
    Joisha P Sticky tries Proceedings of the 2014 international symposium on Memory management, (35-46)
  623. ACM
    Biswas S, Huang J, Sengupta A and Bond M DoubleChecker Proceedings of the 35th ACM SIGPLAN Conference on Programming Language Design and Implementation, (28-39)
  624. ACM
    Wang S, Wang Y and Wenger R The JS-graphs of Join and Split Trees Proceedings of the thirtieth annual symposium on Computational geometry, (539-548)
  625. ACM
    Biswas S, Huang J, Sengupta A and Bond M (2014). DoubleChecker, ACM SIGPLAN Notices, 49:6, (28-39), Online publication date: 5-Jun-2014.
  626. ACM
    Lei Y, Guo L, Dou Y, Ma S and Xu J (2014). FPGA Implementation of a Special-Purpose VLIW Structure for Double-Precision Elementary Function, ACM Transactions on Reconfigurable Technology and Systems, 7:2, (1-21), Online publication date: 1-Jun-2014.
  627. ACM
    Cheung H, Lau L and Leung K (2014). Algebraic Algorithms for Linear Matroid Parity Problems, ACM Transactions on Algorithms, 10:3, (1-26), Online publication date: 1-Jun-2014.
  628. ACM
    Javaid H, Yachide Y, Shwe S, Bokhari H and Parameswaran S FALCON Proceedings of the 51st Annual Design Automation Conference, (1-6)
  629. ACM
    Lin C, Liu C, Chen I, Lee D and Ho T An Efficient Bi-criteria Flow Channel Routing Algorithm For Flow-based Microfluidic Biochips Proceedings of the 51st Annual Design Automation Conference, (1-6)
  630. Gent I, Jefferson C, Linton S, Miguel I and Nightingale P (2014). Generating custom propagators for arbitrary constraints, Artificial Intelligence, 211:1, (1-33), Online publication date: 1-Jun-2014.
  631. ACM
    Rekik Y, Vatavu R and Grisoni L Match-up & conquer Proceedings of the 2014 International Working Conference on Advanced Visual Interfaces, (201-208)
  632. ACM
    Javed M and Zdun U A systematic literature review of traceability approaches between software architecture and source code Proceedings of the 18th International Conference on Evaluation and Assessment in Software Engineering, (1-10)
  633. Czibula G, Czibula I and Gaceanu R (2014). A support vector machine model for intelligent selection of data representations, Applied Soft Computing, 18:C, (70-81), Online publication date: 1-May-2014.
  634. Panda B and Paul S (2014). Hardness results and approximation algorithm for total liar's domination in graphs, Journal of Combinatorial Optimization, 27:4, (643-662), Online publication date: 1-May-2014.
  635. Yang Y, Gao H, Yu J and Li J (2014). Finding the cost-optimal path with time constraint over time-dependent graphs, Proceedings of the VLDB Endowment, 7:9, (673-684), Online publication date: 1-May-2014.
  636. ACM
    Fan W, Ma S, Tang N and Yu W (2014). Interaction between Record Matching and Data Repairing, Journal of Data and Information Quality, 4:4, (1-38), Online publication date: 1-May-2014.
  637. Tang C, Tsai M, Chuang S, Cheng J and Wang W (2014). Shortest-linkage-based parallel hierarchical clustering on main-belt moving objects of the solar system, Future Generation Computer Systems, 34, (26-46), Online publication date: 1-May-2014.
  638. Conejero J, Caminero B, Carrión C and Tomás L (2014). From volunteer to trustable computing, Future Generation Computer Systems, 34, (76-93), Online publication date: 1-May-2014.
  639. Yang Y, Yu J, Gao H, Pei J and Li J (2014). Mining most frequently changing component in evolving graphs, World Wide Web, 17:3, (351-376), Online publication date: 1-May-2014.
  640. Ma Q and Duan Z (2014). Linear time-dependent constraints programming with MSVL, Journal of Combinatorial Optimization, 27:4, (724-766), Online publication date: 1-May-2014.
  641. He L, Kong L, Lin S, Ying S, Gu Y, He T and Liu C Reconfiguration-Assisted Charging in Large-Scale Lithium-Ion Battery Systems ICCPS '14: ACM/IEEE 5th International Conference on Cyber-Physical Systems (with CPS Week 2014), (60-71)
  642. Pussig B, Denil J, De Meulenaere P and Vangheluwe H Generation of functional mock-up units for co-simulation from simulink®, using explicit computational semantics Proceedings of the Symposium on Theory of Modeling & Simulation - DEVS Integrative, (1-6)
  643. Sharef B, Alsaqour R and Ismail M (2014). Vehicular communication ad hoc routing protocols, Journal of Network and Computer Applications, 40:C, (363-396), Online publication date: 1-Apr-2014.
  644. ACM
    Mitchell R and Chen I (2014). A survey of intrusion detection techniques for cyber-physical systems, ACM Computing Surveys, 46:4, (1-29), Online publication date: 1-Apr-2014.
  645. ACM
    Krishna C (2014). Fault-tolerant scheduling in homogeneous real-time systems, ACM Computing Surveys, 46:4, (1-34), Online publication date: 1-Apr-2014.
  646. Zhu D, Chen L, Yue S and Pedram M Application mapping for express channel-based networks-on-chip Proceedings of the conference on Design, Automation & Test in Europe, (1-6)
  647. ACM
    Clemons T, Faisal S, Tatikonda S, Aggarwal C and Parthasarathy S One, Two, Hash! Counting Hash Tables for Flash Devices Proceedings of the 1st IKDD Conference on Data Sciences, (1-10)
  648. Carapelle C, Feng S, Fernández Gil O and Quaas K Satisfiability for MTL and TPTL over Non-monotonic Data Words Proceedings of the 8th International Conference on Language and Automata Theory and Applications - Volume 8370, (248-259)
  649. Ibarra O and Ravikumar B On the Parikh Membership Problem for FAs, PDAs, and CMs Proceedings of the 8th International Conference on Language and Automata Theory and Applications - Volume 8370, (14-31)
  650. ACM
    Kurilova D and Rayside D (2013). On the simplicity of synthesizing linked data structure operations, ACM SIGPLAN Notices, 49:3, (155-158), Online publication date: 5-Mar-2014.
  651. ACM
    Arshad M, Kundu A, Bertino E, Madhavan K and Ghafoor A Security of graph data Proceedings of the 4th ACM conference on Data and application security and privacy, (223-234)
  652. Chentsov A, Chentsov A and Chentsov P (2014). Elements of dynamic programming in extremal routing problems, Automation and Remote Control, 75:3, (537-550), Online publication date: 1-Mar-2014.
  653. Yuan Y, Sun Q and Ge H (2014). Fractional-order embedding canonical correlation analysis and its applications to multi-view dimensionality reduction and recognition, Pattern Recognition, 47:3, (1411-1424), Online publication date: 1-Mar-2014.
  654. ACM
    Natarajan A and Mittal N Fast concurrent lock-free binary search trees Proceedings of the 19th ACM SIGPLAN symposium on Principles and practice of parallel programming, (317-328)
  655. ACM
    Alam M, Cho E, Huh E and Hong C Cloud based mental state monitoring system for suicide risk reconnaissance using wearable bio-sensors Proceedings of the 8th International Conference on Ubiquitous Information Management and Communication, (1-6)
  656. Afshani P, Sheng C, Tao Y and Wilkinson B Concurrent range reporting in two-dimensional space Proceedings of the twenty-fifth annual ACM-SIAM symposium on Discrete algorithms, (983-994)
  657. Fomin F, Lokshtanov D and Saurabh S Efficient computation of representative sets with applications in parameterized and exact algorithms Proceedings of the twenty-fifth annual ACM-SIAM symposium on Discrete algorithms, (142-151)
  658. Bhattacharya S, Ghrist R and Kumar V (2014). Multi-robot coverage and exploration on Riemannian manifolds with boundaries, International Journal of Robotics Research, 33:1, (113-137), Online publication date: 1-Jan-2014.
  659. ACM
    Ma S, Cao Y, Fan W, Huai J and Wo T (2014). Strong simulation, ACM Transactions on Database Systems, 39:1, (1-46), Online publication date: 1-Jan-2014.
  660. Maffray F (2014). Fast recognition of doubled graphs, Theoretical Computer Science, 516, (96-100), Online publication date: 1-Jan-2014.
  661. Li C, Liu H and Cai D (2014). Active learning on manifolds, Neurocomputing, 123, (398-405), Online publication date: 1-Jan-2014.
  662. Assis L, Franca P and Usberti F (2014). A redistricting problem applied to meter reading in power distribution networks, Computers and Operations Research, 41, (65-75), Online publication date: 1-Jan-2014.
  663. Parasyuk I and Kostukevich F (2014). The Software to Analyze the States of Complex Systems under Uncertainty based on Fuzzy Belief Network Models, Cybernetics and Systems Analysis, 50:1, (124-133), Online publication date: 1-Jan-2014.
  664. ACM
    Palahan S, Babić D, Chaudhuri S and Kifer D Extraction of statistically significant malware behaviors Proceedings of the 29th Annual Computer Security Applications Conference, (69-78)
  665. Cabanillas C, García J, Resinas M, Ruiz D, Mendling J and Ruiz-Cortés A Priority-Based Human Resource Allocation in Business Processes Proceedings of the 11th International Conference on Service-Oriented Computing - Volume 8274, (374-388)
  666. ACM
    Huang P, Chang Y, Tsao C, Yang M and Hsieh C (2013). Migration-based hybrid cache design for file systems over flash storage devices, ACM SIGAPP Applied Computing Review, 13:4, (8-16), Online publication date: 1-Dec-2013.
  667. ACM
    Weber I, Paik H and Benatallah B (2013). Form-Based Web Service Composition for Domain Experts, ACM Transactions on the Web, 8:1, (1-40), Online publication date: 1-Dec-2013.
  668. ACM
    Chang Y, Hsiu P, Chang Y and Chang C (2013). A resource-driven DVFS scheme for smart handheld devices, ACM Transactions on Embedded Computing Systems, 13:3, (1-22), Online publication date: 1-Dec-2013.
  669. ACM
    Al-Dujaily R, Dahir N, Mak T, Xia F and Yakovlev A (2013). Dynamic programming-based runtime thermal management (DPRTM), ACM Transactions on Design Automation of Electronic Systems, 19:1, (1-27), Online publication date: 1-Dec-2013.
  670. Eggermont C, Schrijver A and Woeginger G (2013). Analysis of multi-stage open shop processing systems, Mathematical Programming: Series A and B, 142:1-2, (331-348), Online publication date: 1-Dec-2013.
  671. Yuan K, Kuo C, Jiang J and Li M Encoding multi-valued functions for symmetry Proceedings of the International Conference on Computer-Aided Design, (771-778)
  672. Cho M, Xiang H, Ren H, Ziegler M and Puri R LatchPlanner Proceedings of the International Conference on Computer-Aided Design, (342-348)
  673. ACM
    Patwary M, Palsetia D, Agrawal A, Liao W, Manne F and Choudhary A Scalable parallel OPTICS data clustering using graph algorithmic techniques Proceedings of the International Conference on High Performance Computing, Networking, Storage and Analysis, (1-12)
  674. Gemelli N, Hudack J and Oh J Virtual Structure Reduction on Distributed K-Coloring Problems Proceedings of the 2013 IEEE/WIC/ACM International Joint Conferences on Web Intelligence (WI) and Intelligent Agent Technologies (IAT) - Volume 02, (46-52)
  675. Bampas E, Lamani A, Petit F and Valero M Self-stabilizing Balancing Algorithm for Containment-Based Trees 15th International Symposium on Stabilization, Safety, and Security of Distributed Systems - Volume 8255, (191-205)
  676. ACM
    Bernardy J and Claessen K (2013). Efficient divide-and-conquer parsing of practical context-free languages, ACM SIGPLAN Notices, 48:9, (111-122), Online publication date: 12-Nov-2013.
  677. Lunkeit A A Graph-Based Approach for Analysis of Software Security Risk Assessment and Risk-Driven Testing, (68-79)
  678. ACM
    Gudmundsson J, van Kreveld M and Staals F Algorithms for hotspot computation on trajectory data Proceedings of the 21st ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems, (134-143)
  679. ACM
    Nikolaenko V, Ioannidis S, Weinsberg U, Joye M, Taft N and Boneh D Privacy-preserving matrix factorization Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security, (801-812)
  680. ACM
    Nguyen D, Lenharth A and Pingali K A lightweight infrastructure for graph analytics Proceedings of the Twenty-Fourth ACM Symposium on Operating Systems Principles, (456-471)
  681. ACM
    Chazal F, Guibas L, Oudot S and Skraba P (2013). Persistence-Based Clustering in Riemannian Manifolds, Journal of the ACM, 60:6, (1-38), Online publication date: 1-Nov-2013.
  682. ACM
    Wang Y and Cao G (2013). Achieving full-view coverage in camera sensor networks, ACM Transactions on Sensor Networks, 10:1, (1-31), Online publication date: 1-Nov-2013.
  683. Häme L and Hakula H (2013). Routing by ranking, Operations Research Letters, 41:6, (664-669), Online publication date: 1-Nov-2013.
  684. Castelli M, Beretta S and Vanneschi L (2013). A hybrid genetic algorithm for the repetition free longest common subsequence problem, Operations Research Letters, 41:6, (644-649), Online publication date: 1-Nov-2013.
  685. Yeh S, Su M, Chen H and Lin C (2013). An efficient and secure approach for a cloud collaborative editing, Journal of Network and Computer Applications, 36:6, (1632-1641), Online publication date: 1-Nov-2013.
  686. De Souza E and Nikolaidis I (2013). An exploration of aggregation convergecast scheduling, Ad Hoc Networks, 11:8, (2391-2407), Online publication date: 1-Nov-2013.
  687. O'neil S, Chaudhary A, Chen D and Wang H (2013). The topology aware file distribution problem, Journal of Combinatorial Optimization, 26:4, (621-635), Online publication date: 1-Nov-2013.
  688. ACM
    Kurilova D and Rayside D On the simplicity of synthesizing linked data structure operations Proceedings of the 12th international conference on Generative programming: concepts & experiences, (155-158)
  689. ACM
    Ganu G and Marian A One size does not fit all Proceedings of the 22nd ACM international conference on Information & Knowledge Management, (9-18)
  690. Perovšek M, Cestnik B, UrbanăźIăź T, Colton S and Lavraăź N Towards Narrative Ideation via Cross-Context Link Discovery Using Banded Matrices Proceedings of the 12th International Symposium on Advances in Intelligent Data Analysis XII - Volume 8207, (333-344)
  691. Wasa K, Hirata K, Uno T and Arimura H Faster Algorithms for Tree Similarity Based on Compressed Enumeration of Bounded-Sized Ordered Subtrees Proceedings of the 6th International Conference on Similarity Search and Applications - Volume 8199, (73-84)
  692. ACM
    Huang P, Chang Y, Kuo T, Ho C and Choo H Joint management of performance-predictable virtualized storage devices with hard disk and flash memory Proceedings of the 2013 Research in Adaptive and Convergent Systems, (461-466)
  693. ACM
    Huang P, Chang Y and Kuo T (2013). An index-based management scheme with adaptive caching for huge-scale low-cost embedded flash storages, ACM Transactions on Design Automation of Electronic Systems, 18:4, (1-26), Online publication date: 1-Oct-2013.
  694. Chilowicz M, Duris í and Roussel G (2013). Viewing functions as token sequences to highlight similarities in source code, Science of Computer Programming, 78:10, (1871-1891), Online publication date: 1-Oct-2013.
  695. Cardinaux F, Brownsell S, Bradley D and Hawley M (2013). A home daily activity simulation model for the evaluation of lifestyle monitoring systems, Computers in Biology and Medicine, 43:10, (1428-1436), Online publication date: 1-Oct-2013.
  696. Kuncak V, Mayer M, Piskac R and Suter P (2013). Functional synthesis for linear arithmetic and sets, International Journal on Software Tools for Technology Transfer (STTT), 15:5-6, (455-474), Online publication date: 1-Oct-2013.
  697. Jantz M and Kulkarni P Exploiting phase inter-dependencies for faster iterative compiler optimization phase order searches Proceedings of the 2013 International Conference on Compilers, Architectures and Synthesis for Embedded Systems, (1-10)
  698. Sun W, France R and Ray I Contract-Aware Slicing of UML Class Models Proceedings of the 16th International Conference on Model-Driven Engineering Languages and Systems - Volume 8107, (724-739)
  699. ACM
    Bernardy J and Claessen K Efficient divide-and-conquer parsing of practical context-free languages Proceedings of the 18th ACM SIGPLAN international conference on Functional programming, (111-122)
  700. Liu W, Fan J, Zhang S and Wang X Relay Hop Constrained Rendezvous Algorithm for Mobile Data Gathering in Wireless Sensor Networks Proceedings of the 10th IFIP International Conference on Network and Parallel Computing - Volume 8147, (332-343)
  701. ACM
    Lei Y, Dou Y, Guo L, Xu J, Zhou J, Dong Y and Li H (2013). VLIW coprocessor for IEEE-754 quadruple-precision elementary functions, ACM Transactions on Architecture and Code Optimization, 10:3, (1-22), Online publication date: 16-Sep-2013.
  702. ACM
    Piccoli R and Oliveira J Balancing font sizes for flexibility in automated document layout Proceedings of the 2013 ACM symposium on Document engineering, (151-160)
  703. Oudinet J, Denise A and Gaudel M (2013). A new dichotomic algorithm for the uniform random generation of words in regular languages, Theoretical Computer Science, 502, (165-176), Online publication date: 1-Sep-2013.
  704. Sanyal B, Gupta P and Majumder S (2013). Colored top-K range-aggregate queries, Information Processing Letters, 113:19-21, (777-784), Online publication date: 1-Sep-2013.
  705. Ilić A and Ilić M (2013). Generalizations of Wiener Polarity Index and Terminal Wiener Index, Graphs and Combinatorics, 29:5, (1403-1416), Online publication date: 1-Sep-2013.
  706. Zhong C, Malinen M, Miao D and Fränti P Fast Approximate Minimum Spanning Tree Algorithm Based on K-Means Proceedings, Part I, of the 15th International Conference on Computer Analysis of Images and Patterns - Volume 8047, (262-269)
  707. Burkimsher A, Bate I and Indrusiak L Scheduling HPC workflows for responsiveness and fairness with networking delays and inaccurate estimates of execution times Proceedings of the 19th international conference on Parallel Processing, (126-137)
  708. ACM
    Kas M, Carley K and Carley L Incremental closeness centrality for dynamically changing social networks Proceedings of the 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, (1250-1258)
  709. ACM
    Subbian K, Sharma D, Wen Z and Srivastava J Finding influencers in networks using social capital Proceedings of the 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, (592-599)
  710. Lin Y and Mouratidis K Best Upgrade Plans for Large Road Networks Proceedings of the 13th International Symposium on Advances in Spatial and Temporal Databases - Volume 8098, (223-240)
  711. Andrade L, Carvalho R, Oliveira A and Queiroz R Linear Time Proof Verification on N-Graphs Proceedings of the 20th International Workshop on Logic, Language, Information, and Computation - Volume 8071, (34-48)
  712. ACM
    Doerr C and Blenn N Metric convergence in social network sampling Proceedings of the 5th ACM workshop on HotPlanet, (45-50)
  713. Sinha Roy S, Vercauteren F and Verbauwhede I High Precision Discrete Gaussian Sampling on FPGAs Revised Selected Papers on Selected Areas in Cryptography -- SAC 2013 - Volume 8282, (383-401)
  714. ACM
    Evans M, Oliver D, Shekhar S and Harvey F Fast and exact network trajectory similarity computation Proceedings of the 2nd ACM SIGKDD International Workshop on Urban Computing, (1-8)
  715. ACM
    Lam H, Calders T, Yang J, Mörchen F and Fradkin D Zips Proceedings of the ACM SIGKDD Workshop on Interactive Data Exploration and Analytics, (54-62)
  716. Kaspi M and Raviv T (2013). Service-Oriented Line Planning and Timetabling for Passenger Trains, Transportation Science, 47:3, (295-311), Online publication date: 1-Aug-2013.
  717. Dolinskaya I and Smith R (2013). Fastest-Path Planning for Direction-Dependent Speed Functions, Journal of Optimization Theory and Applications, 158:2, (480-497), Online publication date: 1-Aug-2013.
  718. ACM
    Zhang S, Wu J and Lu S Minimum makespan workload dissemination in DTNs Proceedings of the fourteenth ACM international symposium on Mobile ad hoc networking and computing, (293-296)
  719. ACM
    Wang Q, Zhang D and Si L Semantic hashing using tags and topic modeling Proceedings of the 36th international ACM SIGIR conference on Research and development in information retrieval, (213-222)
  720. ACM
    Godoi T, Torres R, Carvalho A, Gonçalves M, Ferreira A, Fan W and Fox E A relevance feedback approach for the author name disambiguation problem Proceedings of the 13th ACM/IEEE-CS joint conference on Digital libraries, (209-218)
  721. Braibant T and Chlipala A Formal Verification of Hardware Synthesis Proceedings of the 25th International Conference on Computer Aided Verification - Volume 8044, (213-228)
  722. ACM
    Hains D, Whitley D, Howe A and Chen W Hyperplane initialized local search for MAXSAT Proceedings of the 15th annual conference on Genetic and evolutionary computation, (805-812)
  723. ACM
    Liu S, Lo W, Lee C and Chen H (2013). Agglomerative-based flip-flop merging and relocation for signal wirelength and clock tree optimization, ACM Transactions on Design Automation of Electronic Systems, 18:3, (1-20), Online publication date: 1-Jul-2013.
  724. Milanič M and Schaudt O (2013). Computing square roots of trivially perfect and threshold graphs, Discrete Applied Mathematics, 161:10-11, (1538-1545), Online publication date: 1-Jul-2013.
  725. ACM
    Cheng J, Huang S, Wu H and Fu A TF-Label Proceedings of the 2013 ACM SIGMOD International Conference on Management of Data, (193-204)
  726. ACM
    Tao Y, Lin W and Xiao X Minimal MapReduce algorithms Proceedings of the 2013 ACM SIGMOD International Conference on Management of Data, (529-540)
  727. ACM
    Burton E and Sekerinski E Correctness of intrusive data structures using mixins Proceedings of the 16th International ACM Sigsoft symposium on Component-based software engineering, (53-58)
  728. ACM
    Henretty T, Veras R, Franchetti F, Pouchet L, Ramanujam J and Sadayappan P A stencil compiler for short-vector SIMD architectures Proceedings of the 27th international ACM conference on International conference on supercomputing, (13-24)
  729. ACM
    Rajamony R, Stephenson M and Speight W The power 775 architecture at scale Proceedings of the 27th international ACM conference on International conference on supercomputing, (183-192)
  730. ACM
    Lin C, Nagarajan V and Gupta R Address-aware fences Proceedings of the 27th international ACM conference on International conference on supercomputing, (313-324)
  731. ACM
    Łącki J (2013). Improved Deterministic Algorithms for Decremental Reachability and Strongly Connected Components, ACM Transactions on Algorithms, 9:3, (1-15), Online publication date: 1-Jun-2013.
  732. Huang H, Xiao J, Yang Q, Wang Q and Wu H (2013). Creating Process-Agents incrementally by mining process asset library, Information Sciences: an International Journal, 233, (183-199), Online publication date: 1-Jun-2013.
  733. Craciunas S, Kirsch C, Payer H, Röck H and Sokolova A (2013). Temporal isolation in real-time systems, International Journal on Software Tools for Technology Transfer (STTT), 15:3, (189-209), Online publication date: 1-Jun-2013.
  734. Diwan A, Kenkre S and Vishwanathan S (2013). Circumference, chromatic number and online coloring, Combinatorica, 33:3, (319-334), Online publication date: 1-Jun-2013.
  735. ACM
    Zhao X, Li L and Xue G Secure cloud-assisted location based reminder Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security, (323-328)
  736. Tan C, Lim C and Cheah Y (2013). A Modified micro Genetic Algorithm for undertaking Multi-Objective Optimization Problems, Journal of Intelligent & Fuzzy Systems: Applications in Engineering and Technology, 24:3, (483-495), Online publication date: 1-May-2013.
  737. Maniccam S (2013). Experimental study on Sudoku, Journal of Computing Sciences in Colleges, 28:5, (244-251), Online publication date: 1-May-2013.
  738. ACM
    Abbas H, Fainekos G, Sankaranarayanan S, Ivančić F and Gupta A (2013). Probabilistic Temporal Logic Falsification of Cyber-Physical Systems, ACM Transactions on Embedded Computing Systems, 12:2s, (1-30), Online publication date: 1-May-2013.
  739. ACM
    Lingamneni A, Enz C, Palem K and Piguet C (2013). Synthesizing Parsimonious Inexact Circuits through Probabilistic Design Techniques, ACM Transactions on Embedded Computing Systems, 12:2s, (1-26), Online publication date: 1-May-2013.
  740. Axenovich M, Person Y and Puzynina S (2013). A regularity lemma and twins in words, Journal of Combinatorial Theory Series A, 120:4, (733-743), Online publication date: 1-May-2013.
  741. Kim E and Oron D (2013). Multi-location production and delivery with job selection, Computers and Operations Research, 40:5, (1461-1466), Online publication date: 1-May-2013.
  742. Tseng Y, Wu F and Lai W (2013). Opportunistic data collection for disconnected wireless sensor networks by mobile mules, Ad Hoc Networks, 11:3, (1150-1164), Online publication date: 1-May-2013.
  743. ACM
    Rayside D, Montaghami V, Leung F, Yuen A, Xu K and Jackson D (2012). Synthesizing iterators from abstraction functions, ACM SIGPLAN Notices, 48:3, (31-40), Online publication date: 10-Apr-2013.
  744. Bertsimas D, Iancu D and Katz D (2013). A New Local Search Algorithm for Binary Optimization, INFORMS Journal on Computing, 25:2, (208-221), Online publication date: 1-Apr-2013.
  745. Zhang X, Zhu J, Wang Q and Zhao H (2013). Identifying influential nodes in complex networks with community structure, Knowledge-Based Systems, 42, (74-84), Online publication date: 1-Apr-2013.
  746. Adcock M, Høyer P and Sanders B (2013). Gaussian quantum computation with oracle-decision problems, Quantum Information Processing, 12:4, (1759-1779), Online publication date: 1-Apr-2013.
  747. Kratsch S and Neumann F (2013). Fixed-Parameter Evolutionary Algorithms and the Vertex Cover Problem, Algorithmica, 65:4, (754-771), Online publication date: 1-Apr-2013.
  748. Turki M, Marrakchi Z, Mehrez H and Abid M Iterative routing algorithm of Inter-FPGA signals for Multi-FPGA prototyping platform Proceedings of the 9th international conference on Reconfigurable Computing: architectures, tools, and applications, (210-217)
  749. ACM
    Bhattacharjee A and Jamil H CodeBlast Proceedings of the 28th Annual ACM Symposium on Applied Computing, (846-852)
  750. ACM
    Tiskin A Efficient high-similarity string comparison Proceedings of the Joint EDBT/ICDT 2013 Workshops, (358-365)
  751. ACM
    Lim L, Wang H and Wang M Semantic queries by example Proceedings of the 16th International Conference on Extending Database Technology, (347-358)
  752. Doerr B, Jansen T, Sudholt D, Winzen C and Zarges C (2013). Mutation rate matters even when optimizing monotonic functions, Evolutionary Computation, 21:1, (1-27), Online publication date: 1-Mar-2013.
  753. ACM
    Hochbaum D and Levin A (2013). Approximation Algorithms for a Minimization Variant of the Order-Preserving Submatrices and for Biclustering Problems, ACM Transactions on Algorithms, 9:2, (1-12), Online publication date: 1-Mar-2013.
  754. Dolev S, Lahiani L and Haviv Y (2013). Unique permutation hashing, Theoretical Computer Science, 475, (59-65), Online publication date: 1-Mar-2013.
  755. Miao Y, Yang Q, Wu C, Jiang M and Chen J (2013). Multicast virtual network mapping for supporting multiple description coding-based video applications, Computer Networks: The International Journal of Computer and Telecommunications Networking, 57:4, (990-1002), Online publication date: 1-Mar-2013.
  756. Attali D and Lieutier A (2013). Optimal Reconstruction Might be Hard, Discrete & Computational Geometry, 49:2, (133-156), Online publication date: 1-Mar-2013.
  757. Subramani K, Williamson M and Gu X (2013). Improved algorithms for optimal length resolution refutation in difference constraint systems, Formal Aspects of Computing, 25:2, (319-341), Online publication date: 1-Mar-2013.
  758. ACM
    Qu Y and Prasanna V Scalable high-throughput architecture for large balanced tree structures on FPGA (abstract only) Proceedings of the ACM/SIGDA international symposium on Field programmable gate arrays, (278-278)
  759. Furnass W, Mounce S and Boxall J (2013). Linking distribution system water quality issues to possible causes via hydraulic pathways, Environmental Modelling & Software, 40:C, (78-87), Online publication date: 1-Feb-2013.
  760. Harks T, König F and Matuschke J (2013). Approximation Algorithms for Capacitated Location Routing, Transportation Science, 47:1, (3-22), Online publication date: 1-Feb-2013.
  761. Pfingsthorn M and Birk A (2013). Simultaneous localization and mapping with multimodal probability distributions, International Journal of Robotics Research, 32:2, (143-171), Online publication date: 1-Feb-2013.
  762. ACM
    Hemmati H, Arcuri A and Briand L (2013). Achieving scalable model-based testing through test case diversity, ACM Transactions on Software Engineering and Methodology, 22:1, (1-42), Online publication date: 1-Feb-2013.
  763. ACM
    Zheng Y, Yan S, Zha Z, Li Y, Zhou X, Chua T and Jain R (2013). GPSView, ACM Transactions on Multimedia Computing, Communications, and Applications, 9:1, (1-18), Online publication date: 1-Feb-2013.
  764. Cova T, Pereira J and Pais A (2013). Is standard multivariate analysis sufficient in clinical and epidemiological studies?, Journal of Biomedical Informatics, 46:1, (75-86), Online publication date: 1-Feb-2013.
  765. De Meo P, Ferrara E, Fiumara G and Provetti A (2013). Enhancing community detection using a network weighting strategy, Information Sciences: an International Journal, 222, (648-668), Online publication date: 1-Feb-2013.
  766. Tarrataca L and Wichert A (2013). Intricacies of quantum computational paths, Quantum Information Processing, 12:2, (1365-1378), Online publication date: 1-Feb-2013.
  767. Guo Y and Zhao Y (2013). High-efficient quantum secret sharing based on the Chinese remainder theorem via the orbital angular momentum entanglement analysis, Quantum Information Processing, 12:2, (1125-1139), Online publication date: 1-Feb-2013.
  768. Wu B (2013). A Simpler and More Efficient Algorithm for the Next-to-Shortest Path Problem, Algorithmica, 65:2, (467-479), Online publication date: 1-Feb-2013.
  769. GalăýÍk F, Gąsieniec L and Lingas A (2013). Efficient broadcasting in radio networks with long-range interference, Distributed Computing, 26:1, (59-74), Online publication date: 1-Feb-2013.
  770. Mitchell J Approximating watchman routes Proceedings of the twenty-fourth annual ACM-SIAM symposium on Discrete algorithms, (844-855)
  771. Turki M, Marrakchi Z, Mehrez H and Abid M (2013). Frequency optimization objective during system prototyping on multi-FPGA platform, International Journal of Reconfigurable Computing, 2013, (9-9), Online publication date: 1-Jan-2013.
  772. Ovaska K, Lyly L, Sahu B, Janne O and Hautaniemi S (2013). Genomic Region Operation Kit for Flexible Processing of Deep Sequencing Data, IEEE/ACM Transactions on Computational Biology and Bioinformatics, 10:1, (200-206), Online publication date: 1-Jan-2013.
  773. Zhou S and Liu Z (2013). A theoretical development for the total tardiness problem and its application in branch and bound algorithms, Computers and Operations Research, 40:1, (248-252), Online publication date: 1-Jan-2013.
  774. Chen H, Xiao Y and Vrbsky S (2013). An update-based step-wise optimal cache replacement for wireless data access, Computer Networks: The International Journal of Computer and Telecommunications Networking, 57:1, (197-212), Online publication date: 1-Jan-2013.
  775. Long L and Kamal A (2013). Protecting multicast services in optical internet backbones, Computer Networks: The International Journal of Computer and Telecommunications Networking, 57:1, (17-28), Online publication date: 1-Jan-2013.
  776. Czibula G, Czibula I and GăźCeanu R (2013). Intelligent data structures selection using neural networks, Knowledge and Information Systems, 34:1, (171-192), Online publication date: 1-Jan-2013.
  777. Shekhar S, Evans M, Gunturi V, Yang K and Cugler D Benchmarking Spatial Big Data Revised Selected Papers of the First Workshop on Specifying Big Data Benchmarks - Volume 8163, (81-93)
  778. Gutenschwager K, Völker S, Radtke A and Zeller G The shortest path Proceedings of the Winter Simulation Conference, (1-12)
  779. Aztiria A, Farhadi G and Aghajan H User behavior shift detection in intelligent environments Proceedings of the 4th international conference on Ambient Assisted Living and Home Care, (90-97)
  780. Goodrich M, Hirschberg D, Mitzenmacher M and Thaler J Cache-Oblivious dictionaries and multimaps with negligible failure probability Proceedings of the First Mediterranean conference on Design and Analysis of Algorithms, (203-218)
  781. ACM
    Liu Z and Chen Y (2012). Exploiting and Maintaining Materialized Views for XML Keyword Queries, ACM Transactions on Internet Technology, 12:2, (1-27), Online publication date: 1-Dec-2012.
  782. ACM
    Amir A, Eisenberg E, Levy A, Porat E and Shapira N (2012). Cycle detection and correction, ACM Transactions on Algorithms, 9:1, (1-20), Online publication date: 1-Dec-2012.
  783. Rajasingh I, Manuel P, Rajan B and Arockiaraj M (2012). Wirelength of hypercubes into certain trees, Discrete Applied Mathematics, 160:18, (2778-2786), Online publication date: 1-Dec-2012.
  784. Takada M, Inada H, Nakazawa K, Tani S, Iwata M, Sugimoto Y and Nagata S (2012). A High-Speed Drug Interaction Search System for Ease of Use in the Clinical Environment, Journal of Medical Systems, 36:6, (3533-3541), Online publication date: 1-Dec-2012.
  785. Sudholt D and Thyssen C (2012). A Simple Ant Colony Optimizer for Stochastic Shortest Path Problems, Algorithmica, 64:4, (643-672), Online publication date: 1-Dec-2012.
  786. Hamada K, Kikuchi R, Ikarashi D, Chida K and Takahashi K Practically efficient multi-party sorting protocols from comparison sort algorithms Proceedings of the 15th international conference on Information Security and Cryptology, (202-216)
  787. ACM
    Prountzos D, Manevich R and Pingali K (2012). Elixir, ACM SIGPLAN Notices, 47:10, (375-394), Online publication date: 15-Nov-2012.
  788. ACM
    Lee M, Duffield N and Kompella R MAPLE Proceedings of the 2012 Internet Measurement Conference, (101-114)
  789. Dong X, Zou Q and Guan Y Set-Similarity joins based semi-supervised sentiment analysis Proceedings of the 19th international conference on Neural Information Processing - Volume Part I, (176-183)
  790. Patwary M, Palsetia D, Agrawal A, Liao W, Manne F and Choudhary A A new scalable parallel DBSCAN algorithm using the disjoint-set data structure Proceedings of the International Conference on High Performance Computing, Networking, Storage and Analysis, (1-11)
  791. Nguyen T, Cicotti P, Bylaska E, Quinlan D and Baden S Bamboo Proceedings of the International Conference on High Performance Computing, Networking, Storage and Analysis, (1-11)
  792. ACM
    Evans M, Oliver D, Shekhar S and Harvey F Summarizing trajectories into k-primary corridors Proceedings of the 20th International Conference on Advances in Geographic Information Systems, (454-457)
  793. ACM
    You G, Hwang S, Song Y, Jiang L and Nie Z (2012). Efficient Entity Translation Mining, ACM Transactions on Information Systems, 30:4, (1-23), Online publication date: 1-Nov-2012.
  794. Hashemikhabir S, Ayaz E, Kavurucu Y, Can T and Kahveci T (2012). Large-Scale Signaling Network Reconstruction, IEEE/ACM Transactions on Computational Biology and Bioinformatics, 9:6, (1696-1708), Online publication date: 1-Nov-2012.
  795. Wang G, Chen S, Zhang X and Zhou Z (2012). Topological ordering algorithm for LDAG, Information Processing Letters, 112:21, (823-828), Online publication date: 1-Nov-2012.
  796. Pradhan D (2012). Algorithmic aspects of k-tuple total domination in graphs, Information Processing Letters, 112:21, (816-822), Online publication date: 1-Nov-2012.
  797. Jakliăź G, Kanduăź T, Praprotnik S and źAgar E (2012). Energy Minimizing Mountain Ascent, Journal of Optimization Theory and Applications, 155:2, (680-693), Online publication date: 1-Nov-2012.
  798. ACM
    Wang M, Ishwar P, Konrad J, Gazen C and Saboo R Coherent image selection using a fast approximation to the generalized traveling salesman problem Proceedings of the 20th ACM international conference on Multimedia, (981-984)
  799. Gao Y, Peng L, Li F, MiaoLiu and Hu X Velocity-Free multi-objective particle swarm optimizer with centroid for wireless sensor network optimization Proceedings of the 4th international conference on Artificial Intelligence and Computational Intelligence, (682-689)
  800. ACM
    Tsyganok K, Tumoyan E, Babenko L and Anikeev M Classification of polymorphic and metamorphic malware samples based on their behavior Proceedings of the Fifth International Conference on Security of Information and Networks, (111-116)
  801. ACM
    Vatavu R, Anthony L and Wobbrock J Gestures as point clouds Proceedings of the 14th ACM international conference on Multimodal interaction, (273-280)
  802. ACM
    Prountzos D, Manevich R and Pingali K Elixir Proceedings of the ACM international conference on Object oriented programming systems languages and applications, (375-394)
  803. Ellen F, Ramachandran V and Woelfel P Efficient fetch-and-increment Proceedings of the 26th international conference on Distributed Computing, (16-30)
  804. ACM
    Höner zu Siederdissen C (2012). Sneaking around concatMap, ACM SIGPLAN Notices, 47:9, (215-226), Online publication date: 15-Oct-2012.
  805. ACM
    Delaviz R, Pouwelse J and Epema D Targeted and scalable information dissemination in a distributed reputation mechanism Proceedings of the seventh ACM workshop on Scalable trusted computing, (55-66)
  806. Pevac I (2012). First experiences with tutor for recursive algorithm time efficiency analysis, Journal of Computing Sciences in Colleges, 28:1, (56-65), Online publication date: 1-Oct-2012.
  807. ACM
    Chan J, Bailey J, Leckie C and Houle M (2012). ciForager, ACM Transactions on Knowledge Discovery from Data, 6:3, (1-50), Online publication date: 1-Oct-2012.
  808. ACM
    Mondal A, Chakrabarti P and Dasgupta P (2012). Symbolic-Event-Propagation-Based Minimal Test Set Generation for Robust Path Delay Faults, ACM Transactions on Design Automation of Electronic Systems, 17:4, (1-20), Online publication date: 1-Oct-2012.
  809. Gao Y and Bouix S Synthesis of realistic subcortical anatomy with known surface deformations Proceedings of the 2012 international conference on Mesh Processing in Medical Image Analysis, (80-88)
  810. ACM
    Rayside D, Montaghami V, Leung F, Yuen A, Xu K and Jackson D Synthesizing iterators from abstraction functions Proceedings of the 11th International Conference on Generative Programming and Component Engineering, (31-40)
  811. ACM
    Blelloch G, Fineman J, Gibbons P and Shun J (2012). Internally deterministic parallel algorithms can be fast, ACM SIGPLAN Notices, 47:8, (181-192), Online publication date: 11-Sep-2012.
  812. Kitani E, Del-Moral-Hernandez E and Silva L SOMM – self-organized manifold mapping Proceedings of the 22nd international conference on Artificial Neural Networks and Machine Learning - Volume Part II, (355-362)
  813. Munro J and Nicholson P Succinct posets Proceedings of the 20th Annual European conference on Algorithms, (743-754)
  814. ACM
    Höner zu Siederdissen C Sneaking around concatMap Proceedings of the 17th ACM SIGPLAN international conference on Functional programming, (215-226)
  815. Calude C, Calude E and Queen M Inductive complexity of p versus NP problem Proceedings of the 11th international conference on Unconventional Computation and Natural Computation, (2-9)
  816. Shi L and Fapojuwo A (2012). Cross-layer optimization with cooperative communication for minimum power cost in packet error rate constrained wireless sensor networks, Ad Hoc Networks, 10:7, (1457-1468), Online publication date: 1-Sep-2012.
  817. Jansen T and Zarges C Computing longest common subsequences with the B-cell algorithm Proceedings of the 11th international conference on Artificial Immune Systems, (111-124)
  818. Ozgul F and Erdem Z Detecting Criminal Networks Using Social Similarity Proceedings of the 2012 International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2012), (581-585)
  819. Lai H, Li C, Lo Y and Lin S Exploiting and Evaluating MapReduce for Large-Scale Graph Mining Proceedings of the 2012 International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2012), (434-441)
  820. Sharma T Finding Communities in Weighted Signed Social Networks Proceedings of the 2012 International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2012), (978-982)
  821. ACM
    Yang Z, Wu C and Liu Y Locating in fingerprint space Proceedings of the 18th annual international conference on Mobile computing and networking, (269-280)
  822. ACM
    Yuan Q, Cong G, Sun A, Lin C and Thalmann N Category hierarchy maintenance Proceedings of the 35th international ACM SIGIR conference on Research and development in information retrieval, (791-800)
  823. ACM
    Mohapatra A and Genesereth M Incrementally maintaining run-length encoded attributes in column stores Proceedings of the 16th International Database Engineering & Applications Sysmposium, (146-154)
  824. ACM
    de Kruijf M, Sankaralingam K and Jha S (2012). Static analysis and compiler design for idempotent processing, ACM SIGPLAN Notices, 47:6, (475-486), Online publication date: 6-Aug-2012.
  825. Pradhan P and Panda G (2012). Connectivity constrained wireless sensor deployment using multiobjective evolutionary algorithms and fuzzy decision making, Ad Hoc Networks, 10:6, (1134-1145), Online publication date: 1-Aug-2012.
  826. ACM
    Sharma V and Yap C Near optimal tree size bounds on a simple real root isolation algorithm Proceedings of the 37th International Symposium on Symbolic and Algebraic Computation, (319-326)
  827. Wang M and Manning C Probabilistic finite state machines for regression-based MT evaluation Proceedings of the 2012 Joint Conference on Empirical Methods in Natural Language Processing and Computational Natural Language Learning, (984-994)
  828. Tao D, Tang S and Ma H Low cost data gathering using mobile hybrid sensor networks Proceedings of the 11th international conference on Ad-hoc, Mobile, and Wireless Networks, (193-206)
  829. Berant J, Dagan I, Adler M and Goldberger J Efficient tree-based approximation for entailment graph learning Proceedings of the 50th Annual Meeting of the Association for Computational Linguistics: Long Papers - Volume 1, (117-125)
  830. Cheng J, Shang Z, Cheng H, Wang H and Yu J (2012). K-reach, Proceedings of the VLDB Endowment, 5:11, (1292-1303), Online publication date: 1-Jul-2012.
  831. ACM
    Combi C, Gozzi M, Posenato R and Pozzi G (2012). Conceptual modeling of flexible temporal workflows, ACM Transactions on Autonomous and Adaptive Systems, 7:2, (1-29), Online publication date: 1-Jul-2012.
  832. ACM
    Ajwani D, Cosgaya-Lozano A and Zeh N (2012). A topological sorting algorithm for large graphs, ACM Journal of Experimental Algorithmics, 17, (3.1-3.21), Online publication date: 1-Jul-2012.
  833. ACM
    Sanders P and Schultes D (2012). Engineering highway hierarchies, ACM Journal of Experimental Algorithmics, 17, (1.1-1.40), Online publication date: 1-Jul-2012.
  834. Crochemore M, Giambruno L, Langiu A, Mignosi F and Restivo A (2012). Dictionary-symbolwise flexible parsing, Journal of Discrete Algorithms, 14, (74-90), Online publication date: 1-Jul-2012.
  835. Bird R (2012). On building cyclic and shared structures in Haskell, Formal Aspects of Computing, 24:4-6, (609-621), Online publication date: 1-Jul-2012.
  836. ACM
    Green O, McColl R and Bader D GPU merge path Proceedings of the 26th ACM international conference on Supercomputing, (331-340)
  837. Chatterjee K and Velner Y Mean-Payoff Pushdown Games Proceedings of the 2012 27th Annual IEEE/ACM Symposium on Logic in Computer Science, (195-204)
  838. Plissiti M and Nikou C Cervical cell classification based exclusively on nucleus features Proceedings of the 9th international conference on Image Analysis and Recognition - Volume Part II, (483-490)
  839. ACM
    Atanassov I An approach for indexing file names in a directory Proceedings of the 13th International Conference on Computer Systems and Technologies, (259-266)
  840. ACM
    Wang T, Srivatsa M and Liu L Fine-grained access control of personal data Proceedings of the 17th ACM symposium on Access Control Models and Technologies, (145-156)
  841. ACM
    de Kruijf M, Sankaralingam K and Jha S Static analysis and compiler design for idempotent processing Proceedings of the 33rd ACM SIGPLAN Conference on Programming Language Design and Implementation, (475-486)
  842. Nowak R Genome assembler for repetitive sequences Proceedings of the Third international conference on Information Technologies in Biomedicine, (422-429)
  843. Tamir D, King C and McKenney M Improving the performance of constructive multi-start search using record-keeping Proceedings of the 25th international conference on Industrial Engineering and Other Applications of Applied Intelligent Systems: advanced research in applied artificial intelligence, (176-186)
  844. Tidemann A, Bjørnson F and Aamodt A Operational support in fish farming through case-based reasoning Proceedings of the 25th international conference on Industrial Engineering and Other Applications of Applied Intelligent Systems: advanced research in applied artificial intelligence, (104-113)
  845. Wang M and Manning C SPEDE Proceedings of the Seventh Workshop on Statistical Machine Translation, (76-83)
  846. Wang M and Cer D Stanford Proceedings of the First Joint Conference on Lexical and Computational Semantics - Volume 1: Proceedings of the main conference and the shared task, and Volume 2: Proceedings of the Sixth International Workshop on Semantic Evaluation, (648-654)
  847. Obraztsova S and Elkind E Optimal manipulation of voting rules Proceedings of the 11th International Conference on Autonomous Agents and Multiagent Systems - Volume 2, (619-626)
  848. Szczepański P, Michalak T and Rahwan T A new approach to betweenness centrality based on the Shapley Value Proceedings of the 11th International Conference on Autonomous Agents and Multiagent Systems - Volume 1, (239-246)
  849. Keidar M and Kaminka G Robot exploration with fast frontier detection Proceedings of the 11th International Conference on Autonomous Agents and Multiagent Systems - Volume 1, (113-120)
  850. Ding C, Chen Y, Xu T and Fu X CloudGPS Proceedings of the 2012 IEEE 20th International Workshop on Quality of Service, (1-9)
  851. Dahlmeier D and Ng H Better evaluation for grammatical error correction Proceedings of the 2012 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, (568-572)
  852. ACM
    Liu C, Chen I and Lee D An efficient algorithm for multi-layer obstacle-avoiding rectilinear Steiner tree construction Proceedings of the 49th Annual Design Automation Conference, (613-622)
  853. ACM
    Su Y, Yang F and Zeng X AMOR Proceedings of the 49th Annual Design Automation Conference, (295-300)
  854. Dang Y, Wu R, Zhang H, Zhang D and Nobel P ReBucket: a method for clustering duplicate crash reports based on call stack similarity Proceedings of the 34th International Conference on Software Engineering, (1084-1093)
  855. Staats M, Gay G and Heimdahl M Automated oracle creation support, or: how I learned to stop worrying about fault propagation and love mutation testing Proceedings of the 34th International Conference on Software Engineering, (870-880)
  856. Hao D, Zhang L, Wu X, Mei H and Rothermel G On-demand test suite reduction Proceedings of the 34th International Conference on Software Engineering, (738-748)
  857. Yan D, Xu G and Rountev A Uncovering performance problems in Java applications with reference propagation profiling Proceedings of the 34th International Conference on Software Engineering, (134-144)
  858. ACM
    Martínez-Prieto M, Fernández J and Cánovas R (2012). Querying RDF dictionaries in compressed space, ACM SIGAPP Applied Computing Review, 12:2, (64-77), Online publication date: 1-Jun-2012.
  859. Matsopoulos G (2012). Medical imaging correction, Computer Methods and Programs in Biomedicine, 106:3, (308-327), Online publication date: 1-Jun-2012.
  860. Szydło T and Zieliński K (2012). Adaptive Enterprise Service Bus, New Generation Computing, 30:2-3, (189-214), Online publication date: 1-Jun-2012.
  861. Danylenko A and Löwe W Adaptation of legacy codes to context-aware composition using aspect-oriented programming Proceedings of the 11th international conference on Software Composition, (68-85)
  862. Xiang Y, Fuhry D, Jin R, Zhao Y and Huang K Visualizing clusters in parallel coordinates for visual knowledge discovery Proceedings of the 16th Pacific-Asia conference on Advances in Knowledge Discovery and Data Mining - Volume Part I, (505-516)
  863. Ponte A, Paquete L and Figueira J On beam search for multicriteria combinatorial optimization problems Proceedings of the 9th international conference on Integration of AI and OR Techniques in Constraint Programming for Combinatorial Optimization Problems, (307-321)
  864. ACM
    Koutris P, Upadhyaya P, Balazinska M, Howe B and Suciu D Query-based data pricing Proceedings of the 31st ACM SIGMOD-SIGACT-SIGAI symposium on Principles of Database Systems, (167-178)
  865. ACM
    Shekhar S, Gunturi V, Evans M and Yang K Spatial big-data challenges intersecting mobility and cloud computing Proceedings of the Eleventh ACM International Workshop on Data Engineering for Wireless and Mobile Access, (1-6)
  866. ACM
    Zellag K and Kemme B ConsAD Proceedings of the 2012 ACM SIGMOD International Conference on Management of Data, (641-644)
  867. ACM
    Cheng J, Ke Y, Chu S and Cheng C Efficient processing of distance queries in large graphs Proceedings of the 2012 ACM SIGMOD International Conference on Management of Data, (457-468)
  868. Tan X and Jiang B Minimization of the maximum distance between the two guards patrolling a polygonal region Proceedings of the 6th international Frontiers in Algorithmics, and Proceedings of the 8th international conference on Algorithmic Aspects in Information and Management, (47-57)
  869. Chen D, Liu X and Wang H Computing maximum non-crossing matching in convex bipartite graphs Proceedings of the 6th international Frontiers in Algorithmics, and Proceedings of the 8th international conference on Algorithmic Aspects in Information and Management, (105-116)
  870. Sun Z, Wang H, Wang H, Shao B and Li J (2012). Efficient subgraph matching on billion node graphs, Proceedings of the VLDB Endowment, 5:9, (788-799), Online publication date: 1-May-2012.
  871. ACM
    Zhang W, Lin X, Zhang Y, Cheema M and Zhang Q (2012). Stochastic skylines, ACM Transactions on Database Systems, 37:2, (1-34), Online publication date: 1-May-2012.
  872. ACM
    Sheng C, Tao Y and Li J (2012). Exact and approximate algorithms for the most connected vertex problem, ACM Transactions on Database Systems, 37:2, (1-39), Online publication date: 1-May-2012.
  873. Clarke P, Power J, Babich D and King T (2012). A testing strategy for abstract classes, Software Testing, Verification & Reliability, 22:3, (147-169), Online publication date: 1-May-2012.
  874. Ausiello G, Firmani D and Laura a (2012). Real-time monitoring of undirected networks: Articulation points, bridges, and connected and biconnected components, Networks, 59:3, (275-288), Online publication date: 1-May-2012.
  875. ACM
    Aydin Gol E, Lazar M and Belta C Language-guided controller synthesis for discrete-time linear systems Proceedings of the 15th ACM international conference on Hybrid Systems: Computation and Control, (95-104)
  876. ACM
    Ma S, Cao Y, Huai J and Wo T Distributed graph pattern matching Proceedings of the 21st international conference on World Wide Web, (949-958)
  877. Lanza-Gutiérrez J, Gómez-Pulido J, Vega-Rodríguez M and Sánchez-Pérez J Optimizing energy consumption in heterogeneous wireless sensor networks by means of evolutionary algorithms Proceedings of the 2012t European conference on Applications of Evolutionary Computation, (1-10)
  878. ACM
    Cheng R, Hong J, Kyrola A, Miao Y, Weng X, Wu M, Yang F, Zhou L, Zhao F and Chen E Kineograph Proceedings of the 7th ACM european conference on Computer Systems, (85-98)
  879. Delling D and Nannicini G (2012). Core Routing on Dynamic Time-Dependent Road Networks, INFORMS Journal on Computing, 24:2, (187-201), Online publication date: 1-Apr-2012.
  880. ACM
    Drmota M and Kutzelnigg R (2012). A precise analysis of Cuckoo hashing, ACM Transactions on Algorithms, 8:2, (1-36), Online publication date: 1-Apr-2012.
  881. ACM
    Zhang Z, Yu J, Qin L, Zhu Q and Zhou X I/O cost minimization Proceedings of the 15th International Conference on Extending Database Technology, (468-479)
  882. ACM
    Su Z, Tung A and Zhang Z Supporting top-K item exchange recommendations in large online communities Proceedings of the 15th International Conference on Extending Database Technology, (97-108)
  883. ACM
    Zhao Z, Yan D and Ng W Mining probabilistically frequent sequential patterns in uncertain databases Proceedings of the 15th International Conference on Extending Database Technology, (74-85)
  884. Higa D and Stefanes M A coarse-grained parallel algorithm for the matrix chain order problem Proceedings of the 2012 Symposium on High Performance Computing, (1-8)
  885. ACM
    Martínez-Prieto M, Fernández J and Cánovas R Compression of RDF dictionaries Proceedings of the 27th Annual ACM Symposium on Applied Computing, (340-347)
  886. ACM
    Cunha T, de Souza F, de A. Araújo A and Pappa G Rushes video summarization based on spatio-temporal features Proceedings of the 27th Annual ACM Symposium on Applied Computing, (45-50)
  887. Liu S, Lee C and Chen H Agglomerative-based flip-flop merging with signal wirelength optimization Proceedings of the Conference on Design, Automation and Test in Europe, (1391-1396)
  888. Molnár A, Benczúr A and Sidló C Flexible and efficient distributed resolution of large entities Proceedings of the 7th international conference on Foundations of Information and Knowledge Systems, (244-263)
  889. Schiffer T, Aurenhammer F and Demuth M (2012). Computing convex quadrangulations, Discrete Applied Mathematics, 160:4, (648-656), Online publication date: 1-Mar-2012.
  890. Molyboha A and Zabarankin M (2012). Stochastic Optimization of Sensor Placement for Diver Detection, Operations Research, 60:2, (292-312), Online publication date: 1-Mar-2012.
  891. ACM
    Blelloch G, Fineman J, Gibbons P and Shun J Internally deterministic parallel algorithms can be fast Proceedings of the 17th ACM SIGPLAN symposium on Principles and Practice of Parallel Programming, (181-192)
  892. ACM
    Myung J and Lee S Matrix chain multiplication via multi-way join algorithms in MapReduce Proceedings of the 6th International Conference on Ubiquitous Information Management and Communication, (1-5)
  893. Steinbrecher J and Shang W On supernode transformations and multithreading for the longest common subsequence problem Proceedings of the Tenth Australasian Symposium on Parallel and Distributed Computing - Volume 127, (3-12)
  894. Bodlaender H Fixed-Parameter tractability of treewidth and pathwidth The Multivariate Algorithmic Revolution and Beyond, (196-227)
  895. Meghanathan N (2012). Node Stability Index, International Journal of Interdisciplinary Telecommunications and Networking, 4:1, (31-46), Online publication date: 1-Jan-2012.
  896. Wayer S and Reichman A (2012). Resource management in satellite communication systems, Journal of Electrical and Computer Engineering, 2012, (2-2), Online publication date: 1-Jan-2012.
  897. Leea H and Shimb J (2011). Indexing method for transitive relationships of product information, Web Intelligence and Agent Systems, 9:4, (351-362), Online publication date: 1-Dec-2011.
  898. Ma S, Cao Y, Fan W, Huai J and Wo T (2011). Capturing topology in graph pattern matching, Proceedings of the VLDB Endowment, 5:4, (310-321), Online publication date: 1-Dec-2011.
  899. ACM
    Mukherjee S, Biswas S and Mukherjee D Recognizing interaction between human performers using 'key pose doublet' Proceedings of the 19th ACM international conference on Multimedia, (1329-1332)
  900. ACM
    Cao H, Candan K and Sapino M Skynets Proceedings of the 20th ACM international conference on Information and knowledge management, (1775-1784)
  901. ACM
    Bjørklund T, Götz M, Gehrke J and Grimsmo N Workload-aware indexing for keyword search in social networks Proceedings of the 20th ACM international conference on Information and knowledge management, (535-544)
  902. ACM
    Pu Y, Bodik R and Srivastava S Synthesis of first-order dynamic programming algorithms Proceedings of the 2011 ACM international conference on Object oriented programming systems languages and applications, (83-98)
  903. ACM
    Laoutaris N, Sirivianos M, Yang X and Rodriguez P (2011). Inter-datacenter bulk transfers with netstitcher, ACM SIGCOMM Computer Communication Review, 41:4, (74-85), Online publication date: 22-Oct-2011.
  904. ACM
    Pu Y, Bodik R and Srivastava S (2011). Synthesis of first-order dynamic programming algorithms, ACM SIGPLAN Notices, 46:10, (83-98), Online publication date: 18-Oct-2011.
  905. Kucherov G On-line construction of position heaps Proceedings of the 18th international conference on String processing and information retrieval, (326-337)
  906. Aissa M, Ben Mnaouer A, Murray R and Belghith A (2011). New Strategies and Extensions in Kruskal's Algorithm in Multicast Routing, International Journal of Business Data Communications and Networking, 7:4, (32-51), Online publication date: 1-Oct-2011.
  907. Gong P, Gai K and Zhang C (2011). Efficient Euclidean projections via Piecewise Root Finding and its application in gradient projection, Neurocomputing, 74:17, (2754-2766), Online publication date: 1-Oct-2011.
  908. Muhammad N, Hussain M, Muhamad G and Bebis G A non-intrusive method for copy-move forgery detection Proceedings of the 7th international conference on Advances in visual computing - Volume Part II, (516-525)
  909. ACM
    Hassaan M, Burtscher M and Pingali K (2011). Ordered vs. unordered, ACM SIGPLAN Notices, 46:8, (3-12), Online publication date: 7-Sep-2011.
  910. Zhao M, Li J and Yang Y Joint mobile energy replenishment and data gathering in wireless rechargeable sensor networks Proceedings of the 23rd International Teletraffic Congress, (238-245)
  911. Solak E, Rhouma R and Belghith S (2011). Breaking an orbit-based symmetric cryptosystem, Mathematical and Computer Modelling: An International Journal, 54:5-6, (1413-1419), Online publication date: 1-Sep-2011.
  912. ACM
    Maiya A and Berger-Wolf T Benefits of bias Proceedings of the 17th ACM SIGKDD international conference on Knowledge discovery and data mining, (105-113)
  913. Lê D (2011). On Three Alternative Characterizations of Combined Traces, Fundamenta Informaticae, 113:3-4, (265-293), Online publication date: 1-Aug-2011.
  914. Mo D and Huang S (2011). Feature selection based on inference correlation, Intelligent Data Analysis, 15:3, (375-398), Online publication date: 1-Aug-2011.
  915. ACM
    Sauthoff G, Janssen S and Giegerich R Bellman's GAP Proceedings of the 13th international ACM SIGPLAN symposium on Principles and practices of declarative programming, (29-40)
  916. Bijral A, Ratliff N and Srebro N Semi-supervised Learning with density based distances Proceedings of the Twenty-Seventh Conference on Uncertainty in Artificial Intelligence, (43-50)
  917. Farschtschi Y, Moeller D, Widemann M, Wittmann J and Vakilzadian H Global optimization of interdependent turnaround processes at airports Proceedings of the 2011 Grand Challenges on Modeling and Simulation Conference, (167-172)
  918. ACM
    Fan W, Li J, Ma S, Tang N and Yu W Interaction between record matching and data repairing Proceedings of the 2011 ACM SIGMOD International Conference on Management of data, (469-480)
  919. ACM
    Tao Y, Sheng C and Pei J On k-skip shortest paths Proceedings of the 2011 ACM SIGMOD International Conference on Management of data, (421-432)
  920. ACM
    Basu Roy S and Chakrabarti K Location-aware type ahead search on spatial databases Proceedings of the 2011 ACM SIGMOD International Conference on Management of data, (361-372)
  921. Planken L, de Weerdt M and van der Krogt R Computing all-pairs shortest paths by leveraging low treewidth Proceedings of the Twenty-First International Conference on International Conference on Automated Planning and Scheduling, (170-177)
  922. ACM
    Pingali K, Nguyen D, Kulkarni M, Burtscher M, Hassaan M, Kaleem R, Lee T, Lenharth A, Manevich R, Méndez-Lojo M, Prountzos D and Sui X The tao of parallelism in algorithms Proceedings of the 32nd ACM SIGPLAN Conference on Programming Language Design and Implementation, (12-25)
  923. ACM
    Pingali K, Nguyen D, Kulkarni M, Burtscher M, Hassaan M, Kaleem R, Lee T, Lenharth A, Manevich R, Méndez-Lojo M, Prountzos D and Sui X (2011). The tao of parallelism in algorithms, ACM SIGPLAN Notices, 46:6, (12-25), Online publication date: 4-Jun-2011.
  924. ACM
    Blelloch G, Fineman J, Gibbons P and Simhadri H Scheduling irregular parallel computations on hierarchical caches Proceedings of the twenty-third annual ACM symposium on Parallelism in algorithms and architectures, (355-366)
  925. McGuinness K and O'Connor N (2011). Toward automated evaluation of interactive segmentation, Computer Vision and Image Understanding, 115:6, (868-884), Online publication date: 1-Jun-2011.
  926. Arcuri A (2011). Evolutionary repair of faulty software, Applied Soft Computing, 11:4, (3494-3514), Online publication date: 1-Jun-2011.
  927. Yang J, Xu H, Pan L, Jia P, Long F and Jie M (2011). Task scheduling using Bayesian optimization algorithm for heterogeneous computing environments, Applied Soft Computing, 11:4, (3297-3310), Online publication date: 1-Jun-2011.
  928. ACM
    Xiao X, Xie T, Tillmann N and de Halleux J Precise identification of problems for structural test generation Proceedings of the 33rd International Conference on Software Engineering, (611-620)
  929. ACM
    Cordeiro L and Fischer B Verifying multi-threaded software using smt-based context-bounded model checking Proceedings of the 33rd International Conference on Software Engineering, (331-340)
  930. Lesniak M Thread-Safe priority queues in haskell based on skiplists Proceedings of the 12th international conference on Trends in Functional Programming, (114-129)
  931. ACM
    Yan J and Chen Z New optimal layer assignment for bus-oriented escape routing Proceedings of the 21st edition of the great lakes symposium on Great lakes symposium on VLSI, (205-210)
  932. Zou L, Mo J, Chen L, Özsu M and Zhao D (2011). gStore, Proceedings of the VLDB Endowment, 4:8, (482-493), Online publication date: 1-May-2011.
  933. Kuliamin V and Petukhov A (2011). A survey of methods for constructing covering arrays, Programming and Computing Software, 37:3, (121-146), Online publication date: 1-May-2011.
  934. Mindolin D and Chomicki J (2011). Contracting preference relations for database applications, Artificial Intelligence, 175:7-8, (1092-1121), Online publication date: 1-May-2011.
  935. Nunes J, Matos L and Trigo A Taxi pick-ups route optimization using genetic algorithms Proceedings of the 10th international conference on Adaptive and natural computing algorithms - Volume Part I, (410-419)
  936. ACM
    Sukwong O and Kim H Is co-scheduling too expensive for SMP VMs? Proceedings of the sixth conference on Computer systems, (257-272)
  937. Pantelidou A and Ephremides A (2011). Scheduling in Wireless Networks, Foundations and Trends® in Networking, 4:4, (421-511), Online publication date: 1-Apr-2011.
  938. ACM
    Liu X and Abdelzaher T (2011). Nonutilization bounds and feasible regions for arbitrary fixed-priority policies, ACM Transactions on Embedded Computing Systems, 10:3, (1-25), Online publication date: 1-Apr-2011.
  939. ACM
    Yan J and Chen Z Obstacle-aware length-matching bus routing Proceedings of the 2011 international symposium on Physical design, (61-68)
  940. ACM
    Nguyen D and Pingali K (2011). Synthesizing concurrent schedulers for irregular algorithms, ACM SIGPLAN Notices, 46:3, (333-344), Online publication date: 17-Mar-2011.
  941. ACM
    Nguyen D and Pingali K (2011). Synthesizing concurrent schedulers for irregular algorithms, ACM SIGARCH Computer Architecture News, 39:1, (333-344), Online publication date: 17-Mar-2011.
  942. ACM
    Nguyen D and Pingali K Synthesizing concurrent schedulers for irregular algorithms Proceedings of the sixteenth international conference on Architectural support for programming languages and operating systems, (333-344)
  943. ACM
    Thakurta P, Mallick N, Dutta G and Bandyopadhyay S A new approach on caching based routing for mobile networks Proceedings of the 2011 International Conference on Communication, Computing & Security, (32-35)
  944. ACM
    Hassaan M, Burtscher M and Pingali K Ordered vs. unordered Proceedings of the 16th ACM symposium on Principles and practice of parallel programming, (3-12)
  945. ACM
    Lang K, Delgado J, Jiang D, Ghosh B, Das S, Gajewar A, Jagadish S, Seshan A, Botev C, Bindeberger-Ortega M, Nagaraj S and Stata R Efficient online ad serving in a display advertising exchange Proceedings of the fourth ACM international conference on Web search and data mining, (307-316)
  946. ACM
    Prountzos D, Manevich R, Pingali K and McKinley K A shape analysis for optimizing parallel graph programs Proceedings of the 38th annual ACM SIGPLAN-SIGACT symposium on Principles of programming languages, (159-172)
  947. ACM
    Prountzos D, Manevich R, Pingali K and McKinley K (2011). A shape analysis for optimizing parallel graph programs, ACM SIGPLAN Notices, 46:1, (159-172), Online publication date: 26-Jan-2011.
  948. Kamousi P and Suri S Stochastic minimum spanning trees and related problems Proceedings of the Meeting on Analytic Algorithmics and Combinatorics, (107-116)
  949. Goodrich M Spin-the-bottle sort and annealing sort Proceedings of the Meeting on Analytic Algorithmics and Combinatorics, (93-106)
  950. Alnafie M, Chikalov I, Hussain S and Moshkov M Sequential optimization of binary search trees for multiple cost functions Proceedings of the Seventeenth Computing on The Australasian Theory Symposium - Volume 119, (41-44)
  951. Alnafie M, Chikalov I, Hussain S and Moshkov M Sequential optimization of binary search trees for multiple cost functions Proceedings of the Seventeenth Computing: The Australasian Theory Symposium - Volume 119, (41-44)
  952. ACM
    Jansen T and Zarges C Analysis of evolutionary algorithms Proceedings of the 11th workshop proceedings on Foundations of genetic algorithms, (1-14)
  953. Reichert M, Rinderle-Ma S and Jurisch M (2011). On Utilizing Web Service Equivalence for Supporting the Composition Life Cycle, International Journal of Web Services Research, 8:1, (41-67), Online publication date: 1-Jan-2011.
  954. Hung C and Peng W (2011). A regression-based approach for mining user movement patterns from random sample data, Data & Knowledge Engineering, 70:1, (1-20), Online publication date: 1-Jan-2011.
  955. Morihata A (2011). A Short Cut to Optimal Sequences, New Generation Computing, 29:1, (31-59), Online publication date: 1-Jan-2011.
  956. Alomair B and Poovendran R Efficient authentication for mobile and pervasive computing Proceedings of the 12th international conference on Information and communications security, (186-202)
  957. ACM
    Mukherjee S, Biswas S and Mukherjee D Human action recognition in video by 'meaningful' poses Proceedings of the Seventh Indian Conference on Computer Vision, Graphics and Image Processing, (9-16)
  958. Kim M, Kim H and Luk C SD3 Proceedings of the 2010 43rd Annual IEEE/ACM International Symposium on Microarchitecture, (535-546)
  959. Chen Z, Chen C and Wang Q (2010). On the scalability of Delay-Tolerant Botnets, International Journal of Security and Networks, 5:4, (248-258), Online publication date: 1-Dec-2010.
  960. Zheng L and Zhang X (2010). Cooperative beamforming with mobile wireless sensor nodes, IEEE Transactions on Communications, 58:12, (3375-3380), Online publication date: 1-Dec-2010.
  961. Luna J, Revoredo K and Cozman F Learning sentences and assessments in probabilistic description logics Proceedings of the 6th International Conference on Uncertainty Reasoning for the Semantic Web - Volume 654, (85-96)
  962. Lee H, Chang Y and Lee P Recent research development in flip-chip routing Proceedings of the International Conference on Computer-Aided Design, (404-410)
  963. Safta D and Gorgan D LDS 6th Symposium of the Workgroup Human-Computer Interaction and Usability Engineering on HCI in Work and Learning, Life and Leisure - Volume 6389, (228-243)
  964. Vansteenwegen P, Souffriau W and Sörensen K (2010). Solving the mobile mapping van problem, Computers and Operations Research, 37:11, (1870-1876), Online publication date: 1-Nov-2010.
  965. Kowalik L (2010). Fast 3-coloring Triangle-Free Planar Graphs, Algorithmica, 58:3, (770-789), Online publication date: 1-Nov-2010.
  966. Bose P, Carmi P, Farshi M, Maheshwari A and Smid M (2010). Computing the Greedy Spanner in Near-Quadratic Time, Algorithmica, 58:3, (711-729), Online publication date: 1-Nov-2010.
  967. ACM
    Zhao G and Yuan J Mining and cropping common objects from images Proceedings of the 18th ACM international conference on Multimedia, (975-978)
  968. ACM
    Shrestha P, de With P, Weda H, Barbieri M and Aarts E Automatic mashup generation from multiple-camera concert recordings Proceedings of the 18th ACM international conference on Multimedia, (541-550)
  969. ACM
    Chang Y and Kuo T A reliable MTD design for MLC flash-memory storage systems Proceedings of the tenth ACM international conference on Embedded software, (179-188)
  970. Caballini C, Giribone P, Revetria R and Testa A Study and development of ad hoc algorithms for designing waste collection routes Proceedings of the 9th WSEAS international conference on System science and simulation in engineering, (270-277)
  971. Liu R, Wu F and Kumaran S (2010). Transforming Activity-Centric Business Process Models into Information-Centric Models for SOA Solutions, Journal of Database Management, 21:4, (14-34), Online publication date: 1-Oct-2010.
  972. Douïeb K and Langerman S (2010). Near-Entropy Hotlink Assignments, Algorithmica, 58:2, (221-244), Online publication date: 1-Oct-2010.
  973. ACM
    Saipulla A, Liu B, Xing G, Fu X and Wang J Barrier coverage with sensors of limited mobility Proceedings of the eleventh ACM international symposium on Mobile ad hoc networking and computing, (201-210)
  974. ACM
    Bustos B and Morales N On the asymptotic behavior of nearest neighbor search using pivot-based indexes Proceedings of the Third International Conference on SImilarity Search and APplications, (33-39)
  975. ACM
    Virmani D and jain S Fault tolerant optimal path for data delivery in wireless sensor networks Proceedings of the 1st Amrita ACM-W Celebration on Women in Computing in India, (1-7)
  976. ACM
    Hassaan M, Burtscher M and Pingali K Ordered and unordered algorithms for parallel breadth first search Proceedings of the 19th international conference on Parallel architectures and compilation techniques, (539-540)
  977. Li Y, Chen F, Sun X, Zhou M, Jiao W, Cao D and Mei H (2010). Self-adaptive resource management for large-scale shared clusters, Journal of Computer Science and Technology, 25:5, (945-957), Online publication date: 1-Sep-2010.
  978. Fan W, Li J, Ma S, Wang H and Wu Y (2010). Graph homomorphism revisited for graph matching, Proceedings of the VLDB Endowment, 3:1-2, (1161-1172), Online publication date: 1-Sep-2010.
  979. Mathioudakis M, Bansal N and Koudas N (2010). Identifying, attributing and describing spatial bursts, Proceedings of the VLDB Endowment, 3:1-2, (1091-1102), Online publication date: 1-Sep-2010.
  980. Yildirim H, Chaoji V and Zaki M (2010). GRAIL, Proceedings of the VLDB Endowment, 3:1-2, (276-284), Online publication date: 1-Sep-2010.
  981. Neumann T and Weikum G (2010). x-RDF-3X, Proceedings of the VLDB Endowment, 3:1-2, (256-263), Online publication date: 1-Sep-2010.
  982. Werghi N, Boukadida H and Meguebli Y (2010). The spiral facets, 3D Research, 1:3, (1-11), Online publication date: 1-Sep-2010.
  983. ACM
    Triplett J, McKenney P and Walpole J (2010). Scalable concurrent hash tables via relativistic programming, ACM SIGOPS Operating Systems Review, 44:3, (102-109), Online publication date: 17-Aug-2010.
  984. Marques-Silva J, Janota M and Lynce I On Computing Backbones of Propositional Theories Proceedings of the 2010 conference on ECAI 2010: 19th European Conference on Artificial Intelligence, (15-20)
  985. ACM
    Wang J, Moore K, Zhang Q, de Villena F, Wang W and McMillan L Genome-wide compatible SNP intervals and their properties Proceedings of the First ACM International Conference on Bioinformatics and Computational Biology, (43-52)
  986. Ong L and Motani M (2010). Optimal routing for decode-forward in cooperative wireless networks, IEEE Transactions on Communications, 58:8, (2345-2355), Online publication date: 1-Aug-2010.
  987. ACM
    Dyagilev K, Mannor S and Yom-Tov E Generative models for rapid information propagation Proceedings of the First Workshop on Social Media Analytics, (35-43)
  988. ACM
    Rabinovich E, Etzion O, Ruah S and Archushin S Analyzing the behavior of event processing applications Proceedings of the Fourth ACM International Conference on Distributed Event-Based Systems, (223-234)
  989. Krüger B, Tautges J, Weber A and Zinke A Fast local and global similarity searches in large motion capture databases Proceedings of the 2010 ACM SIGGRAPH/Eurographics Symposium on Computer Animation, (1-10)
  990. Demaine E, Langerman S and Price E (2010). Confluently Persistent Tries for Efficient Version Control, Algorithmica, 57:3, (462-483), Online publication date: 1-Jul-2010.
  991. Cominetti R, Correa J, Rothvoß T and Martín J (2010). Optimal Selection of Customers for a Last-Minute Offer, Operations Research, 58:4-Part-1, (878-888), Online publication date: 1-Jul-2010.
  992. Ray N, Nivoliers V, Lefebvre S and Lévy B Invisible seams Proceedings of the 21st Eurographics conference on Rendering, (1489-1496)
  993. Yao C, Wang B, Chan B, Yong J and Paul J Multi-image based photon tracing for interactive global illumination of dynamic scenes Proceedings of the 21st Eurographics conference on Rendering, (1315-1324)
  994. ACM
    Hoblitzell A, Mukhopadhyay S, You Q, Fang S, Xia Y and Bidwell J Text mining for bone biology Proceedings of the 19th ACM International Symposium on High Performance Distributed Computing, (522-530)
  995. ACM
    Cho M, Ren H, Xiang H and Puri R History-based VLSI legalization using network flow Proceedings of the 47th Design Automation Conference, (286-291)
  996. ACM
    Kuncak V, Mayer M, Piskac R and Suter P (2010). Complete functional synthesis, ACM SIGPLAN Notices, 45:6, (316-329), Online publication date: 12-Jun-2010.
  997. ACM
    Das Sarma A, Jain A and Srivastava D I4E Proceedings of the 2010 ACM SIGMOD International Conference on Management of data, (795-806)
  998. ACM
    Kanagal B and Deshpande A Lineage processing over correlated probabilistic databases Proceedings of the 2010 ACM SIGMOD International Conference on Management of data, (675-686)
  999. ACM
    Onak K and Rubinfeld R Maintaining a large matching and a small vertex cover Proceedings of the forty-second ACM symposium on Theory of computing, (457-464)
  1000. ACM
    Narayanappa H, Bansal M and Rajan H Property-aware program sampling Proceedings of the 9th ACM SIGPLAN-SIGSOFT workshop on Program analysis for software tools and engineering, (45-52)
  1001. ACM
    Kuncak V, Mayer M, Piskac R and Suter P Complete functional synthesis Proceedings of the 31st ACM SIGPLAN Conference on Programming Language Design and Implementation, (316-329)
  1002. Dickerson J, Simari G, Subrahmanian V and Kraus S A graph-theoretic approach to protect static and moving targets from adversaries Proceedings of the 9th International Conference on Autonomous Agents and Multiagent Systems: volume 1 - Volume 1, (299-306)
  1003. Tan S, Huang W, Chen C and Chang Y (2010). A sweeping fingerprint verification system using the template matching method, WSEAS Transactions on Computers, 9:5, (516-525), Online publication date: 1-May-2010.
  1004. ACM
    Méndez-Lojo M, Nguyen D, Prountzos D, Sui X, Hassaan M, Kulkarni M, Burtscher M and Pingali K (2010). Structure-driven optimizations for amorphous data-parallel programs, ACM SIGPLAN Notices, 45:5, (3-14), Online publication date: 1-May-2010.
  1005. ACM
    Schaefer C, Pankratius V and Tichy W Engineering parallel applications with tunable architectures Proceedings of the 32nd ACM/IEEE International Conference on Software Engineering - Volume 1, (405-414)
  1006. ACM
    Albers S (2010). Energy-efficient algorithms, Communications of the ACM, 53:5, (86-96), Online publication date: 1-May-2010.
  1007. ACM
    Bhatia S, Mitra P and Giles C Finding algorithms in scientific articles Proceedings of the 19th international conference on World wide web, (1061-1062)
  1008. ACM
    Wang G, Luo T, Goodrich M, Du W and Zhu Z Bureaucratic protocols for secure two-party sorting, selection, and permuting Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, (226-237)
  1009. Liu J and Bing B A novel radio resource allocation scheme with delay considerations for OFDMA wireless networks Proceedings of the 33rd IEEE conference on Sarnoff, (300-304)
  1010. ACM
    Kandhalu A, Lakshmanan K and Rajkumar R U-connect Proceedings of the 9th ACM/IEEE International Conference on Information Processing in Sensor Networks, (350-361)
  1011. Dieudonné Y, Labbani-Igbida O and Petit F (2010). Deterministic robot-network localization is hard, IEEE Transactions on Robotics, 26:2, (331-339), Online publication date: 1-Apr-2010.
  1012. Baarir S, Hillah L, Kordon F and Renault E Self-reconfigurable modular robots and their symbolic configuration space Proceedings of the 16th Monterey conference on Foundations of computer software: modeling, development, and verification of adaptive systems, (103-121)
  1013. ACM
    Kale V Towards using and improving the NAS parallel benchmarks Proceedings of the 2010 Workshop on Parallel Programming Patterns, (1-6)
  1014. ACM
    Kale V and Solomonik E Parallel sorting pattern Proceedings of the 2010 Workshop on Parallel Programming Patterns, (1-12)
  1015. ACM
    Kundu A and Bertino E How to authenticate graphs without leaking Proceedings of the 13th International Conference on Extending Database Technology, (609-620)
  1016. ACM
    Xiao X, Yi K and Tao Y The hardness and approximation algorithms for l-diversity Proceedings of the 13th International Conference on Extending Database Technology, (135-146)
  1017. Jain A, Kulkarni S and Verdú S Minimum energy per bit for wideband wireless multicasting Proceedings of the 29th conference on Information communications, (2393-2401)
  1018. Shu T and Krunz M Truthful least-priced-path routing in opportunistic spectrum access networks Proceedings of the 29th conference on Information communications, (1037-1045)
  1019. ACM
    Jiang I, Chang H and Chang C Optimal wiring topology for electromigration avoidance considering multiple layers and obstacles Proceedings of the 19th international symposium on Physical design, (177-184)
  1020. ACM
    Pelley S, Meisner D, Zandevakili P, Wenisch T and Underwood J Power routing Proceedings of the fifteenth International Conference on Architectural support for programming languages and operating systems, (231-242)
  1021. ACM
    Pelley S, Meisner D, Zandevakili P, Wenisch T and Underwood J (2010). Power routing, ACM SIGPLAN Notices, 45:3, (231-242), Online publication date: 5-Mar-2010.
  1022. ACM
    Pelley S, Meisner D, Zandevakili P, Wenisch T and Underwood J (2010). Power routing, ACM SIGARCH Computer Architecture News, 38:1, (231-242), Online publication date: 5-Mar-2010.
  1023. Jansen T and Sudholt D (2010). Analysis of an asymmetric mutation operator, Evolutionary Computation, 18:1, (1-26), Online publication date: 1-Mar-2010.
  1024. ACM
    Madani O, Thorup M and Zwick U (2010). Discounted deterministic Markov decision processes and discounted all-pairs shortest paths, ACM Transactions on Algorithms, 6:2, (1-25), Online publication date: 1-Mar-2010.
  1025. ACM
    Nash N and Gregg D (2010). Comparing integer data structures for 32- and 64-bit keys, ACM Journal of Experimental Algorithmics, 15, (2.1-2.43), Online publication date: 1-Mar-2010.
  1026. Cattaneo G, Faruolo P, Petrillo U and Italiano G (2010). Maintaining dynamic minimum spanning trees, Discrete Applied Mathematics, 158:5, (404-425), Online publication date: 1-Mar-2010.
  1027. ACM
    Yang Y and Prasanna V High throughput and large capacity pipelined dynamic search tree on FPGA Proceedings of the 18th annual ACM/SIGDA international symposium on Field programmable gate arrays, (83-92)
  1028. Tan S, Huang W, Chen C and Chang Y Sweeping fingerprint verification system based on template matching Proceedings of the 12th international conference on Networking, VLSI and signal processing, (44-48)
  1029. ACM
    Jiang Y, Tian F, Wang H, Zhang X, Wang X and Dai G Intelligent understanding of handwritten geometry theorem proving Proceedings of the 15th international conference on Intelligent user interfaces, (119-128)
  1030. Pantazopoulos P, Stavrakakis I, Passarella A and Conti M Efficient social-aware content placement in opportunistic networks Proceedings of the 7th international conference on Wireless on-demand network systems and services, (17-24)
  1031. Demetrescu C, Eppstein D, Galil Z and Italiano G Dynamic graph algorithms Algorithms and theory of computation handbook, (9-9)
  1032. Lin C, Hsu F and Lin W (2010). Recognizing human actions using NWFE-based histogram vectors, EURASIP Journal on Advances in Signal Processing, 2010, (1-10), Online publication date: 1-Feb-2010.
  1033. Yan J, Jhong M and Chen Z Obstacle-aware longest path using rectangular pattern detouring in routing grids Proceedings of the 2010 Asia and South Pacific Design Automation Conference, (287-292)
  1034. ACM
    Maniccam S (2010). Sorting and searching using lisp, functional programming, and recursion, ACM SIGCSE Bulletin, 41:4, (53-56), Online publication date: 18-Jan-2010.
  1035. ACM
    Méndez-Lojo M, Nguyen D, Prountzos D, Sui X, Hassaan M, Kulkarni M, Burtscher M and Pingali K Structure-driven optimizations for amorphous data-parallel programs Proceedings of the 15th ACM SIGPLAN Symposium on Principles and Practice of Parallel Programming, (3-14)
  1036. LaPaugh A VLSI layout algorithms Algorithms and theory of computation handbook, (8-8)
  1037. Zomorodian A Computational topology Algorithms and theory of computation handbook, (3-3)
  1038. El-Khamy F, Nasr M, Shalaby H and Mouftah H Evaluate the blocking performance for "All optical wavelength routed WDM networks with and without wavelength converters" using the iterative path decomposition algorithm Proceedings of the 6th international conference on High capacity optical networks and enabling technologies, (22-29)
  1039. Rahimi A, Mohammadi S and Foroughi A Data path refinement algorithm in high-level synthesis based on dynamic programming Proceedings of the 6th international conference on Innovations in information technology, (101-105)
  1040. ACM
    Machado L and Feijó B (2010). Parallel culling and sorting based on adaptive static balancing, Computers in Entertainment, 7:4, (1-13), Online publication date: 1-Dec-2009.
  1041. ACM
    Deineko V and Tiskin A (2010). Fast minimum-weight double-tree shortcutting for metric TSP, ACM Journal of Experimental Algorithmics, 14, (4.6-4.16), Online publication date: 1-Dec-2009.
  1042. ACM
    Frias L, Petit J and Roura S (2010). Lists revisited, ACM Journal of Experimental Algorithmics, 14, (3.5-3.27), Online publication date: 1-Dec-2009.
  1043. Guan X, Wang P and Qin T A new data streaming method for locating hosts with large connection degree Proceedings of the 28th IEEE conference on Global telecommunications, (6421-6426)
  1044. Pantelidou A and Ephremides A Minimum-length scheduling for multicast traffic under channel uncertainty Proceedings of the 28th IEEE conference on Global telecommunications, (5437-5442)
  1045. Zhang L, Tang J and Zhang W Strong barrier coverage with directional sensors Proceedings of the 28th IEEE conference on Global telecommunications, (1816-1821)
  1046. Long L and Kamal A Tree-based protection of multicast services in WDM mesh networks Proceedings of the 28th IEEE conference on Global telecommunications, (1529-1534)
  1047. ACM
    Deng Y, Wang B and Mu S Taming irregular EDA applications on GPUs Proceedings of the 2009 International Conference on Computer-Aided Design, (539-546)
  1048. ACM
    Lee M, Chen Y, Cheng Y and Chang S An efficient wakeup scheduling considering resource constraint for sensor-based power gating designs Proceedings of the 2009 International Conference on Computer-Aided Design, (457-460)
  1049. ACM
    Lee P, Lin C, Chang Y, Shen C and Tseng W An efficient pre-assignment routing algorithm for flip-chip designs Proceedings of the 2009 International Conference on Computer-Aided Design, (239-244)
  1050. ACM
    Liu C, Yuan S, Kuo S and Weng J Obstacle-avoiding rectilinear Steiner tree construction based on Steiner point selection Proceedings of the 2009 International Conference on Computer-Aided Design, (26-32)
  1051. Kern W and Paulusma D (2009). On the Core and f-Nucleolus of Flow Games, Mathematics of Operations Research, 34:4, (981-991), Online publication date: 1-Nov-2009.
  1052. Duret-Lutz A, Poitrenaud D and Couvreur J On-the-fly Emptiness Check of Transition-Based Streett Automata Automated Technology for Verification and Analysis, (213-227)
  1053. Liu W, Shao S, Yang L and Zhu H An advanced scheduling algorithm in OFDM wireless communication systems Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing, (4336-4339)
  1054. Li X, Hong S and Fang K A heuristic routing protocol for wireless sensor networks in home automation Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing, (3597-3604)
  1055. Guo W, Gao H, Chen G, Cheng H and Yu L A PSO-based topology control algorithm in wireless sensor networks Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing, (3406-3409)
  1056. Chen X and Zheng L Battery-aware depth-first search routing for streaming data transmissions in WSNs Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing, (3121-3124)
  1057. Kovács G, Németh G, Subramaniam M and Pap Z Optimal string edit distance based test suite reduction for SDL specifications Proceedings of the 14th international SDL conference on Design for motes and mobiles, (82-97)
  1058. Swaminathan A, Mathew C and Kirovski D Essential Pages Proceedings of the 2009 IEEE/WIC/ACM International Joint Conference on Web Intelligence and Intelligent Agent Technology - Volume 01, (173-182)
  1059. Ferrante A, Napoli, M and Parente M (2009). Model Checking for Graded CTL, Fundamenta Informaticae, 96:3, (323-339), Online publication date: 1-Aug-2009.
  1060. Ferrante A, Napoli, M and Parente M (2009). Model Checking for Graded CTL, Fundamenta Informaticae, 96:3, (323-339), Online publication date: 1-Aug-2009.
  1061. U L, Mamoulis N and Mouratidis K (2009). A fair assignment algorithm for multiple preference queries, Proceedings of the VLDB Endowment, 2:1, (1054-1065), Online publication date: 1-Aug-2009.
  1062. ACM
    Liu C, Yuan S, Kuo S and Chou Y An O(n log n) path-based obstacle-avoiding algorithm for rectilinear Steiner tree construction Proceedings of the 46th Annual Design Automation Conference, (314-319)
  1063. Filippoupolitis A and Gelenbe E A decision support system for disaster management in buildings Proceedings of the 2009 Summer Computer Simulation Conference, (141-147)
  1064. Arulselvan A, Commander C, Elefteriadou L and Pardalos P (2009). Detecting critical nodes in sparse graphs, Computers and Operations Research, 36:7, (2193-2200), Online publication date: 1-Jul-2009.
  1065. ACM
    Han W and Lee J Dependency-aware reordering for parallelizing query optimization in multi-core CPUs Proceedings of the 2009 ACM SIGMOD International Conference on Management of data, (45-58)
  1066. ACM
    Kešelj V, Liu H, Zeh N, Blouin C and Whidden C Finding optimal parameters for edit distance based sequence classification is NP-hard Proceedings of the KDD-09 Workshop on Statistical and Relational Learning in Bioinformatics, (17-21)
  1067. ACM
    Tantipathananandh C and Berger-Wolf T Constant-factor approximation algorithms for identifying dynamic communities Proceedings of the 15th ACM SIGKDD international conference on Knowledge discovery and data mining, (827-836)
  1068. ACM
    Lappas T, Arai B, Platakis M, Kotsakos D and Gunopulos D On burstiness-aware search for document sequences Proceedings of the 15th ACM SIGKDD international conference on Knowledge discovery and data mining, (477-486)
  1069. Xu Y, Wan S, Tang J and Wolff R Interference aware routing and scheduling in wireless backhaul networks with smart antennas Proceedings of the 6th Annual IEEE communications society conference on Sensor, Mesh and Ad Hoc Communications and Networks, (117-125)
  1070. Bauer Jr. D, Carothers C and Holder A Scalable Time Warp on Blue Gene Supercomputers Proceedings of the 2009 ACM/IEEE/SCS 23rd Workshop on Principles of Advanced and Distributed Simulation, (35-44)
  1071. ACM
    Mitev M, Racheva E and Marinova G Algorithm for defining of initial package of notions for purpose of e-learning Proceedings of the International Conference on Computer Systems and Technologies and Workshop for PhD Students in Computing, (1-5)
  1072. Cortés J Global formation-shape stabilization of relative sensing networks Proceedings of the 2009 conference on American Control Conference, (1460-1465)
  1073. Cowlagi R and Tsiotras P Shortest distance problems in graphs using history-dependent transition costs with application to kinodynamic path planning Proceedings of the 2009 conference on American Control Conference, (414-419)
  1074. Van Long T and Linsen L Multiclustertree Proceedings of the 11th Eurographics / IEEE - VGTC conference on Visualization, (823-830)
  1075. ACM
    Agarwal P, Ezra E and Shair M Near-linear approximation algorithms for geometric hitting sets Proceedings of the twenty-fifth annual symposium on Computational geometry, (23-32)
  1076. ACM
    Aronov B, Ezra E and Shair M Small-size ε-nets for axis-parallel rectangles and boxes Proceedings of the forty-first annual ACM symposium on Theory of computing, (639-648)
  1077. ACM
    Andersen R and Peres Y Finding sparse cuts locally using evolving sets Proceedings of the forty-first annual ACM symposium on Theory of computing, (235-244)
  1078. Hsu H and Orso A MINTS Proceedings of the 31st International Conference on Software Engineering, (419-429)
  1079. Soulignac M, Taillibert P and Rueher M Time-minimal path planning in dynamic current fields Proceedings of the 2009 IEEE international conference on Robotics and Automation, (1554-1560)
  1080. ACM
    Yan J and Chen Z RDL pre-assignment routing for flip-chip designs Proceedings of the 19th ACM Great Lakes symposium on VLSI, (401-404)
  1081. ACM
    Srinivasan R and Carter H A taylor series methodology for analyzing the effects of process variation on circuit operation Proceedings of the 19th ACM Great Lakes symposium on VLSI, (203-208)
  1082. Arora A and Sang L Dialog codes for secure wireless communications Proceedings of the 2009 International Conference on Information Processing in Sensor Networks, (13-24)
  1083. Park Y, Shackney S and Schwartz R (2009). Network-Based Inference of Cancer Progression from Microarray Data, IEEE/ACM Transactions on Computational Biology and Bioinformatics, 6:2, (200-212), Online publication date: 1-Apr-2009.
  1084. Li R (2009). Note, Discrete Mathematics, 309:8, (2555-2558), Online publication date: 1-Apr-2009.
  1085. ACM
    Xiao Y, Wu W, Pei J, Wang W and He Z Efficiently indexing shortest paths by exploiting symmetry in graphs Proceedings of the 12th International Conference on Extending Database Technology: Advances in Database Technology, (493-504)
  1086. ACM
    Cheng J and Yu J On-line exact shortest distance query processing Proceedings of the 12th International Conference on Extending Database Technology: Advances in Database Technology, (481-492)
  1087. ACM
    Selçuk Candan K, Cao H, Qi Y and Sapino M AlphaSum Proceedings of the 12th International Conference on Extending Database Technology: Advances in Database Technology, (96-107)
  1088. ACM
    Biton O, Davidson S, Khanna S and Roy S Optimizing user views for workflows Proceedings of the 12th International Conference on Database Theory, (310-323)
  1089. ACM
    Harsh P and Newman R Using geo-spatial session tagging for smart multicast session discovery Proceedings of the 2009 ACM symposium on Applied Computing, (22-27)
  1090. Hui S, Fader P and Bradlow E (2009). Path Data in Marketing, Marketing Science, 28:2, (320-335), Online publication date: 1-Mar-2009.
  1091. Wu B, Chi C, Xu S, Gu M and Sun J (2009). QoS requirement generation and algorithm selection for composite service based on reference vector, Journal of Computer Science and Technology, 24:2, (357-372), Online publication date: 1-Mar-2009.
  1092. ACM
    Kulkarni M, Burtscher M, Inkulu R, Pingali K and Casçaval C (2009). How much parallelism is there in irregular applications?, ACM SIGPLAN Notices, 44:4, (3-14), Online publication date: 14-Feb-2009.
  1093. ACM
    Kulkarni M, Burtscher M, Inkulu R, Pingali K and Casçaval C How much parallelism is there in irregular applications? Proceedings of the 14th ACM SIGPLAN symposium on Principles and practice of parallel programming, (3-14)
  1094. Bouras C and Primpas D (2009). Architectures and performance evaluation of bandwidth brokers, International Journal of Network Management, 19:2, (101-117), Online publication date: 3-Feb-2009.
  1095. ACM
    Haverkort H, Toma L and Zhuang Y (2009). Computing visibility on terrains in external memory, ACM Journal of Experimental Algorithmics, 13, (1.5-1.23), Online publication date: 1-Feb-2009.
  1096. Abdulla P, Deneux J, Ouaknine J, Quaas K and Worrell J (2008). Universality Analysis for One-Clock Timed Automata, Fundamenta Informaticae, 89:4, (419-450), Online publication date: 31-Jan-2009.
  1097. Yan J and Chen Z IO connection assignment and RDL routing for flip-chip designs Proceedings of the 2009 Asia and South Pacific Design Automation Conference, (588-593)
  1098. Minh B, Pardi F, Klaere S and von Haeseler A (2009). Budgeted Phylogenetic Diversity on Circular Split Systems, IEEE/ACM Transactions on Computational Biology and Bioinformatics, 6:1, (22-29), Online publication date: 1-Jan-2009.
  1099. Lee H and Shim J Indexing Method for Transitive Relationships of Product Information Proceedings of the 2008 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology - Volume 03, (521-524)
  1100. Abdulla P, Deneux J, Ouaknine J, Quaas K and Worrell J (2008). Universality Analysis for One-Clock Timed Automata, Fundamenta Informaticae, 89:4, (419-450), Online publication date: 1-Dec-2008.
  1101. ACM
    Schmidt T, Wählisch M and Christ O AuthoCast Proceedings of the 6th International Conference on Advances in Mobile Computing and Multimedia, (142-149)
  1102. Kandemir M, Li F, Irwin M and Son S A novel migration-based NUCA design for chip multiprocessors Proceedings of the 2008 ACM/IEEE conference on Supercomputing, (1-12)
  1103. Wang J and Zhou H Linear constraint graph for floorplan optimization with soft blocks Proceedings of the 2008 IEEE/ACM International Conference on Computer-Aided Design, (9-15)
  1104. ACM
    Wang M and Hua X Study on the combination of video concept detectors Proceedings of the 16th ACM international conference on Multimedia, (647-650)
  1105. Wu Y, Ai C, Gao S and Li Y p-Percent Coverage in Wireless Sensor Networks Proceedings of the Third International Conference on Wireless Algorithms, Systems, and Applications, (200-211)
  1106. Bouillard A, Jouhet L and Thierry E Computation of a (min,+) multi-dimensional convolution for end-to-end performance analysis Proceedings of the 3rd International Conference on Performance Evaluation Methodologies and Tools, (1-7)
  1107. ACM
    Plonka D and Barford P Context-aware clustering of DNS query traffic Proceedings of the 8th ACM SIGCOMM conference on Internet measurement, (217-230)
  1108. ACM
    Huang C, Sheldon D and Vahid F Dynamic tuning of configurable architectures Proceedings of the 6th IEEE/ACM/IFIP international conference on Hardware/Software codesign and system synthesis, (97-102)
  1109. Csűrös M Ancestral Reconstruction by Asymmetric Wagner Parsimony over Continuous Characters and Squared Parsimony over Distributions Comparative Genomics, (72-86)
  1110. Case J and Kötzing T Dynamic Modeling in Inductive Inference Algorithmic Learning Theory, (404-418)
  1111. Dechev D, Rouquette N, Pirkelbauer P and Stroustrup B Verification and semantic parallelization of goal-driven autonomous software Proceedings of the 2nd International Conference on Autonomic Computing and Communication Systems, (1-8)
  1112. Furrow B (2008). A panoply of quantum algorithms, Quantum Information & Computation, 8:8, (834-859), Online publication date: 1-Sep-2008.
  1113. Volegov D and Yurin D (2008). Preliminary coarse image registration by using straight lines found on them for constructing super resolution mosaics and 3D scene recovery, Programming and Computing Software, 34:5, (279-293), Online publication date: 1-Sep-2008.
  1114. Vanzine Y and Vrajitoru D Pseudorandom noise for real-time volumetric rendering of fire in a production system Proceedings of the Fifth Eurographics / IEEE VGTC conference on Point-Based Graphics, (129-136)
  1115. Ke Y, Cheng J and Ng W (2008). An information-theoretic approach to quantitative association rule mining, Knowledge and Information Systems, 16:2, (213-244), Online publication date: 1-Aug-2008.
  1116. Cheng R, Chen J and Xie X (2008). Cleaning uncertain data with quality guarantees, Proceedings of the VLDB Endowment, 1:1, (722-735), Online publication date: 1-Aug-2008.
  1117. Oltean M and Muntean O (2008). Exact Cover with Light, New Generation Computing, 26:4, (329-346), Online publication date: 1-Aug-2008.
  1118. ACM
    Dor N, Lev-Ami T, Litvak S, Sagiv M and Weiss D Customization change impact analysis for erp professionals via program slicing Proceedings of the 2008 international symposium on Software testing and analysis, (97-108)
  1119. ACM
    Weyland D Simulated annealing, its parameter settings and the longest common subsequence problem Proceedings of the 10th annual conference on Genetic and evolutionary computation, (803-810)
  1120. Chan J, Bailey J and Leckie C (2008). Discovering correlated spatio-temporal changes in evolving graphs, Knowledge and Information Systems, 16:1, (53-96), Online publication date: 1-Jul-2008.
  1121. Lagae A and Dutré P Compact, fast and robust grids for ray tracing Proceedings of the Nineteenth Eurographics conference on Rendering, (1235-1244)
  1122. Bleiweiss A GPU accelerated pathfinding Proceedings of the 23rd ACM SIGGRAPH/EUROGRAPHICS symposium on Graphics hardware, (65-74)
  1123. Katz G and Kider J All-pairs shortest-paths for large graphs on the GPU Proceedings of the 23rd ACM SIGGRAPH/EUROGRAPHICS symposium on Graphics hardware, (47-55)
  1124. ACM
    Qi Y, Candan K, Tatemura J, Chen S and Liao F Supporting OLAP operations over imperfectly integrated taxonomies Proceedings of the 2008 ACM SIGMOD international conference on Management of data, (875-888)
  1125. ACM
    Liu B, Dousse O, Wang J and Saipulla A Strong barrier coverage of wireless sensor networks Proceedings of the 9th ACM international symposium on Mobile ad hoc networking and computing, (411-420)
  1126. ACM
    Liu C and Wu J Routing in a cyclic mobispace Proceedings of the 9th ACM international symposium on Mobile ad hoc networking and computing, (351-360)
  1127. Lu S and Yang X A clustering model for multicast on hypercube network Proceedings of the 3rd international conference on Advances in grid and pervasive computing, (211-221)
  1128. Tseng V, Chen L and Kao C Constrained clustering for gene expression data mining Proceedings of the 12th Pacific-Asia conference on Advances in knowledge discovery and data mining, (759-766)
  1129. Giovannucci A, Vinyals M, Rodriguez-Aguilar J and Cerquides J Computationally-efficient winner determination for mixed multi-unit combinatorial auctions Proceedings of the 7th international joint conference on Autonomous agents and multiagent systems - Volume 2, (1071-1078)
  1130. Goto H (2008). Efficient Calculation of the Transition Matrix in a Max-Plus Linear State-Space Representation, IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, E91-A:5, (1278-1282), Online publication date: 1-May-2008.
  1131. ACM
    Cai R, Yang J, Lai W, Wang Y and Zhang L iRobot Proceedings of the 17th international conference on World Wide Web, (447-456)
  1132. Cousty J, Bertrand G, Najman L and Couprie M On watershed cuts and thinnings Proceedings of the 14th IAPR international conference on Discrete geometry for computer imagery, (434-445)
  1133. Zhuang L, Dunagan J, Simon D, Wang H and Tygar J Characterizing botnets from email spam records Proceedings of the 1st Usenix Workshop on Large-Scale Exploits and Emergent Threats, (1-9)
  1134. Baran I, Demaine E and PźTraşcu M (2008). Subquadratic Algorithms for 3SUM, Algorithmica, 50:4, (584-596), Online publication date: 1-Apr-2008.
  1135. Håkansson A and Hartung R An approach to event-driven algorithm for intelligent agents in multi-agent systems Proceedings of the 2nd KES International conference on Agent and multi-agent systems: technologies and applications, (411-420)
  1136. ACM
    Kulkarni M, Pingali K, Ramanarayanan G, Walter B, Bala K and Chew L (2008). Optimistic parallelism benefits from data partitioning, ACM SIGPLAN Notices, 43:3, (233-243), Online publication date: 25-Mar-2008.
  1137. ACM
    Tuck J, Ahn W, Ceze L and Torrellas J (2008). SoftSig, ACM SIGPLAN Notices, 43:3, (145-156), Online publication date: 25-Mar-2008.
  1138. ACM
    Kulkarni M, Pingali K, Ramanarayanan G, Walter B, Bala K and Chew L (2008). Optimistic parallelism benefits from data partitioning, ACM SIGOPS Operating Systems Review, 42:2, (233-243), Online publication date: 25-Mar-2008.
  1139. ACM
    Tuck J, Ahn W, Ceze L and Torrellas J (2008). SoftSig, ACM SIGOPS Operating Systems Review, 42:2, (145-156), Online publication date: 25-Mar-2008.
  1140. ACM
    Kulkarni M, Pingali K, Ramanarayanan G, Walter B, Bala K and Chew L (2008). Optimistic parallelism benefits from data partitioning, ACM SIGARCH Computer Architecture News, 36:1, (233-243), Online publication date: 25-Mar-2008.
  1141. ACM
    Tuck J, Ahn W, Ceze L and Torrellas J (2008). SoftSig, ACM SIGARCH Computer Architecture News, 36:1, (145-156), Online publication date: 25-Mar-2008.
  1142. ACM
    Cheng J, Yu J, Lin X, Wang H and Yu P Fast computing reachability labelings for large graphs with high compression rate Proceedings of the 11th international conference on Extending database technology: Advances in database technology, (193-204)
  1143. Li J, Liu C, Yu J and Zhou R Efficient top-k search across heterogeneous XML data sources Proceedings of the 13th international conference on Database systems for advanced applications, (314-329)
  1144. Hershberger J (2008). Improved Output-Sensitive Snap Rounding, Discrete & Computational Geometry, 39:1-3, (298-318), Online publication date: 1-Mar-2008.
  1145. ACM
    Kulkarni M, Pingali K, Ramanarayanan G, Walter B, Bala K and Chew L Optimistic parallelism benefits from data partitioning Proceedings of the 13th international conference on Architectural support for programming languages and operating systems, (233-243)
  1146. ACM
    Tuck J, Ahn W, Ceze L and Torrellas J SoftSig Proceedings of the 13th international conference on Architectural support for programming languages and operating systems, (145-156)
  1147. Yanhaona M, Hossain K and Rahman M Pairwise compatibility graphs Proceedings of the 2nd international conference on Algorithms and computation, (222-233)
  1148. Koukopoulos D, Nikolopoulos S, Palios L and Spirakis P Optimal algorithms for detecting network stability Proceedings of the 2nd international conference on Algorithms and computation, (188-199)
  1149. Razzaque M, Hong C, Abdullah-Al-Wadud M and Chae O A fast algorithm to calculate powers of a Boolean matrix for diameter computation of random graphs Proceedings of the 2nd international conference on Algorithms and computation, (58-69)
  1150. Xie M and Kinoshita Y GA search method for multiple evacuation routes using the information of hazard map Proceedings of the 26th IASTED International Conference on Artificial Intelligence and Applications, (296-300)
  1151. Janowska A and Penczek W (2007). Path Compression in Timed Automata, Fundamenta Informaticae, 79:3-4, (379-399), Online publication date: 1-Feb-2008.
  1152. Bailer W, Lee F and Thallinger G Detecting and clustering multiple takes of one scene Proceedings of the 14th international conference on Advances in multimedia modeling, (80-89)
  1153. Hoffman M, Shalev O and Shavit N The baskets queue Proceedings of the 11th international conference on Principles of distributed systems, (401-414)
  1154. de Berg M, Haverkort H, Thite S and Toma L I/O-Efficient Map Overlay and Point Location in Low-Density Subdivisions Algorithms and Computation, (500-511)
  1155. Chen H, Goldberg M, Magdon-Ismail M and Wallace W Reverse Engineering an Agent-Based Hidden Markov Model for Complex Social Systems Intelligent Data Engineering and Automated Learning - IDEAL 2007, (940-949)
  1156. Fotakis D and Spirakis P Cost-Balancing Tolls for Atomic Network Congestion Games Internet and Network Economics, (179-190)
  1157. Zhou Y, Leung H and Winoto P (2007). MNav, IEEE Transactions on Software Engineering, 33:12, (869-890), Online publication date: 1-Dec-2007.
  1158. Bang-Jensen J, GonçAlves D and Li GøRtz I (2007). Finding well-balanced pairs of edge-disjoint trees in edge-weighted graphs, Discrete Optimization, 4:3-4, (334-348), Online publication date: 1-Dec-2007.
  1159. Finocchi I, Grandoni F and Italiano G (2007). Designing reliable algorithms in unreliable memories, Computer Science Review, 1:2, (77-87), Online publication date: 1-Dec-2007.
  1160. Ardaiz O, Chao I and Sangüesa R Social networking to support collaboration in computational grids Proceedings of the 2007 OTM confederated international conference on On the move to meaningful internet systems: CoopIS, DOA, ODBASE, GADA, and IS - Volume Part II, (1288-1295)
  1161. Rao I, Harwood A and Karunasekera S Adaptive Expression Based Routing Protocol for P2P Systems On the Move to Meaningful Internet Systems 2007: OTM 2007 Workshops, (941-949)
  1162. Ardaiz O, Chao I and Sangüesa R Social Networking to Support Collaboration in Computational Grids On the Move to Meaningful Internet Systems 2007: CoopIS, DOA, ODBASE, GADA, and IS, (1288-1295)
  1163. Zhang L, Liu Q, Zhang J, Wang H, Pan Y and Yu Y Semplore: An IR Approach to Scalable Hybrid Query of Semantic Web Data The Semantic Web, (652-665)
  1164. Yu P and Pan D TIP-OPC Proceedings of the 2007 IEEE/ACM international conference on Computer-aided design, (847-853)
  1165. Roy J and Markov I High-performance routing at the nanometer scale Proceedings of the 2007 IEEE/ACM international conference on Computer-aided design, (496-502)
  1166. Ni M and Memik S Early planning for clock skew scheduling during register binding Proceedings of the 2007 IEEE/ACM international conference on Computer-aided design, (429-434)
  1167. Rusakov D (2007). Scheme inclusion verification algorithm in algebraic model of programs with constants, Programming and Computing Software, 33:6, (299-306), Online publication date: 1-Nov-2007.
  1168. Shibuya T Prefix-shuffled geometric suffix tree Proceedings of the 14th international conference on String processing and information retrieval, (300-309)
  1169. ACM
    Pan M and Tseng Y The orphan problem in zigbee-based wireless sensor networks Proceedings of the 10th ACM Symposium on Modeling, analysis, and simulation of wireless and mobile systems, (95-98)
  1170. ACM
    Yang Y and Cardei M Movement-assisted sensor redeployment scheme for network lifetime increase Proceedings of the 10th ACM Symposium on Modeling, analysis, and simulation of wireless and mobile systems, (13-20)
  1171. ACM
    Tang X and Järvi J Concept-based optimization Proceedings of the 2007 Symposium on Library-Centric Software Design, (97-108)
  1172. Morimoto Y Geometrical Information Fusion from WWW and Its Related Information Databases in Networked Information Systems, (16-32)
  1173. ACM
    Jayant C, Renzelmann M, Wen D, Krisnandi S, Ladner R and Comden D Automated tactile graphics translation Proceedings of the 9th international ACM SIGACCESS conference on Computers and accessibility, (75-82)
  1174. Tran N and Hong C Scheduling management in wireless mesh networks Proceedings of the 10th Asia-Pacific conference on Network Operations and Management Symposium: managing next generation networks and services, (507-510)
  1175. Larsen K, Nyman U and Wasowski A (2007). Modeling software product lines using color-blind transition systems, International Journal on Software Tools for Technology Transfer (STTT), 9:5-6, (471-487), Online publication date: 1-Oct-2007.
  1176. ACM
    Pirkelbauer P, Solodkyy Y and Stroustrup B Open multi-methods for c++ Proceedings of the 6th international conference on Generative programming and component engineering, (123-134)
  1177. Chellappan S, Gu W, Bai X, Xuan D, Ma B and Zhang K (2007). Deploying Wireless Sensor Networks under Limited Mobility Constraints, IEEE Transactions on Mobile Computing, 6:10, (1142-1157), Online publication date: 1-Oct-2007.
  1178. ACM
    Xu R, Melhem R and Mossé D A unified practical approach to stochastic DVS scheduling Proceedings of the 7th ACM & IEEE international conference on Embedded software, (37-46)
  1179. ACM
    Xiang S, Lim H, Tan K and Zhou Y Similarity-aware query allocation in sensor networks with multiple base stations Proceedings of the 4th workshop on Data management for sensor networks: in conjunction with 33rd International Conference on Very Large Data Bases, (1-6)
  1180. Tatikonda S, Parthasarathy S and Goyder M LCS-TRIM Proceedings of the 33rd international conference on Very large data bases, (63-74)
  1181. Frank J and Morris P Bounding the resource availability of activities with linear resource impact Proceedings of the Seventeenth International Conference on International Conference on Automated Planning and Scheduling, (136-143)
  1182. Dai P and Hansen E Prioritizing bellman backups without a priority queue Proceedings of the Seventeenth International Conference on International Conference on Automated Planning and Scheduling, (113-119)
  1183. Schaffernicht E, Stephan V and Groß H An efficient search strategy for feature selection using Chow-Liu trees Proceedings of the 17th international conference on Artificial neural networks, (190-199)
  1184. Albert R, DasGupta B, Dondi R, Kachalo S, Sontag E, Zelikovsky A and Westbrooks K A novel method for signal transduction network inference from indirect experimental evidence Proceedings of the 7th international conference on Algorithms in Bioinformatics, (407-419)
  1185. Wu Y, Bhat P, Close T and Lonardi S Efficient and accurate construction of genetic linkage maps from noisy and missing genotyping data Proceedings of the 7th international conference on Algorithms in Bioinformatics, (395-406)
  1186. Liu P, Chuang C and Wu J Block-based allocation algorithms for FLASH memory in embedded systems Proceedings of the 9th international conference on Parallel Computing Technologies, (569-578)
  1187. Nasser N and Chen Y (2007). SEEM, Computer Communications, 30:11-12, (2401-2412), Online publication date: 1-Sep-2007.
  1188. Tran N and Hong C Channel assignment and spatial reuse scheduling to improve throughput and enhance fairness in wireless mesh networks Proceedings of the 5th international conference on Parallel and Distributed Processing and Applications, (762-773)
  1189. Natchetoi Y, Wu H and Babin G A context-dependent XML compression approach to enable business applications on mobile devices Proceedings of the 13th international Euro-Par conference on Parallel Processing, (911-920)
  1190. Sperotto A and Pelillo M Szemerédi's regularity lemma and its applications to pairwise clustering and segmentation Proceedings of the 6th international conference on Energy minimization methods in computer vision and pattern recognition, (13-27)
  1191. Stibor T Phase transition and the computational complexity of generating r-contiguous detectors Proceedings of the 6th international conference on Artificial immune systems, (142-155)
  1192. Wei T, Mao J, Zou W and Chen Y A new algorithm for identifying loops in decompilation Proceedings of the 14th international conference on Static Analysis, (170-183)
  1193. Chen J, Fomin F, Liu Y, Lu S and Villanger Y Improved algorithms for the feedback vertex set problems Proceedings of the 10th international conference on Algorithms and Data Structures, (422-433)
  1194. ACM
    Chang X and Yang X An efficient regularization approach for underdetermined MIMO system decoding Proceedings of the 2007 international conference on Wireless communications and mobile computing, (349-353)
  1195. Janowska A and Penczek W (2007). Path Compression in Timed Automata, Fundamenta Informaticae, 79:3-4, (379-399), Online publication date: 1-Aug-2007.
  1196. Gutman P and Ioslovich I (2007). On the generalized Wolf problem, Automation and Remote Control, 68:8, (1401-1409), Online publication date: 1-Aug-2007.
  1197. Schaeffer S (2007). Survey, Computer Science Review, 1:1, (27-64), Online publication date: 1-Aug-2007.
  1198. Šeda M An implementation view on job shop scheduling based on CPM Proceedings of the 11th WSEAS International Conference on Computers, (542-547)
  1199. Zarrabi-Zadeh H and Chan T An improved algorithm for online unit clustering Proceedings of the 13th annual international conference on Computing and Combinatorics, (383-393)
  1200. Bauer D, Seer S and Brändle N Macroscopic pedestrian flow simulation for designing crowd control measures in public transport after special events Proceedings of the 2007 Summer Computer Simulation Conference, (1035-1042)
  1201. Bouvel M, Rossin D and Vialette S Longest common separable pattern among permutations Proceedings of the 18th annual conference on Combinatorial Pattern Matching, (316-327)
  1202. ACM
    Banerjee N and Kumar R Multiobjective network design for realistic traffic models Proceedings of the 9th annual conference on Genetic and evolutionary computation, (1904-1911)
  1203. ACM
    Jansen T and Weyland D Analysis of evolutionary algorithms for the longest common subsequence problem Proceedings of the 9th annual conference on Genetic and evolutionary computation, (939-946)
  1204. ACM
    Chen Y, Fortnow L, Nikolova E and Pennock D Betting on permutations Proceedings of the 8th ACM conference on Electronic commerce, (326-335)
  1205. ACM
    Trißl S and Leser U Fast and practical indexing and querying of very large graphs Proceedings of the 2007 ACM SIGMOD international conference on Management of data, (845-856)
  1206. Manna Z, Sipma H and Zhang T Verifying Balanced Trees Proceedings of the international symposium on Logical Foundations of Computer Science, (363-378)
  1207. Zhao L and Jarvis S (2007). Predictive performance modelling of parallel component compositions, Cluster Computing, 10:2, (155-166), Online publication date: 1-Jun-2007.
  1208. Bachmaier C (2007). A Radial Adaptation of the Sugiyama Framework for Visualizing Hierarchical Information, IEEE Transactions on Visualization and Computer Graphics, 13:3, (583-594), Online publication date: 1-May-2007.
  1209. Hwang S and Chang K (2007). Probe Minimization by Schedule Optimization, IEEE Transactions on Knowledge and Data Engineering, 19:5, (646-662), Online publication date: 1-May-2007.
  1210. Banerjee N, Corner M and Levine B An Energy-Efficient Architecture for DTN Throwboxes Proceedings of the IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications, (776-784)
  1211. Bhatia R, Kashyap A and Li Li The Power Balancing Problem in Energy Constrained Multi-Hop Wireless Networks Proceedings of the IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications, (553-561)
  1212. Eryilmaz A, Asuman O and Modiano E Polynomial Complexity Algorithms for Full Utilization of Multi-Hop Wireless Networks Proceedings of the IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications, (499-507)
  1213. Sertac Artan N and Chao H TriBiCa Proceedings of the IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications, (125-133)
  1214. Yunfeng Lin , Ben Liang and Baochun Li Data Persistence in Large-Scale Sensor Networks with Decentralized Fountain Codes Proceedings of the IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications, (1658-1666)
  1215. Weiyi Zhang , Guoliang Xue and Misra S Fault-Tolerant Relay Node Placement in Wireless Sensor Networks Proceedings of the IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications, (1649-1657)
  1216. Kar K, Xiang Luo and Sarkar S Throughput-Optimal Scheduling in Multichannel Access Point Networks Under Infrequent Channel Measurements Proceedings of the IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications, (1640-1648)
  1217. Lee P, Misra V and Rubenstein D Toward Optimal Network Fault Correction via End-to-End Inference Proceedings of the IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications, (1343-1351)
  1218. Momcilovic P Scalability of Routing Tables in Wireless Networks Proceedings of the IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications, (1262-1270)
  1219. Ayday E, Delgosha F and Fekri F Location-Aware Security Services for Wireless Sensor Networks Using Network Coding Proceedings of the IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications, (1226-1234)
  1220. Djukic P and Valaee S Link Scheduling for Minimum Delay in Spatial Re-Use TDMA Proceedings of the IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications, (28-36)
  1221. Starobinski D, Weiyao Xiao , Xiangping Qin and Trachtenberg A Near-Optimal Data Dissemination Policies for Multi-Channel, Single Radio Wireless Sensor Networks Proceedings of the IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications, (955-963)
  1222. Zhu H, Zeng X, Cai W, Xue J and Zhou D A sparse grid based spectral stochastic collocation method for variations-aware capacitance extraction of interconnects under nanometer process technology Proceedings of the conference on Design, automation and test in Europe, (1514-1519)
  1223. Jayaputera G, Loke S and Zaslavsky A (2007). Design, implementation and run-time evolution of a mission-based multiagent system, Web Intelligence and Agent Systems, 5:2, (139-159), Online publication date: 1-Apr-2007.
  1224. Darbon J A note on the discrete binary Mumford-Shah model Proceedings of the 3rd international conference on Computer vision/computer graphics collaboration techniques, (283-294)
  1225. ACM
    Lin C, Chen S, Li C, Chang Y and Yang C Efficient obstacle-avoiding rectilinear steiner tree construction Proceedings of the 2007 international symposium on Physical design, (127-134)
  1226. ACM
    Hu S and Hu J Pattern sensitive placement for manufacturability Proceedings of the 2007 international symposium on Physical design, (27-34)
  1227. ACM
    Farmahini-Farahani A, Kamal M, Fakhraie S and Safari S HW/SW partitioning using discrete particle swarm Proceedings of the 17th ACM Great Lakes symposium on VLSI, (359-364)
  1228. Kit-Yee Chow , King-Shan Lui and Lam E Achieving 360° Angle Coverage with Minimum Transmission Cost in Visual Sensor Networks Proceedings of the 2007 IEEE Wireless Communications and Networking Conference, (4112-4116)
  1229. Ngai E Delay-Minimized Route Design for Wireless Sensor-Actuator Networks Proceedings of the 2007 IEEE Wireless Communications and Networking Conference, (3675-3680)
  1230. Jang-Ping Sheu , Ming-Lung Ding and Kun-Ying Hsieh Routing with Hexagonal Virtual Coordinates in Wireless Sensor Networks Proceedings of the 2007 IEEE Wireless Communications and Networking Conference, (2929-2934)
  1231. Jang-Ping Sheu and Huang-Fu Lin Probabilistic Coverage Preserving Protocol with Energy Efficiency in Wireless Sensor Networks Proceedings of the 2007 IEEE Wireless Communications and Networking Conference, (2631-2636)
  1232. Rashid M, Hossain E and Bhargava V HCCA Scheduler Design for Guaranteed QoS in IEEE 802.11e Based WLANs Proceedings of the 2007 IEEE Wireless Communications and Networking Conference, (1538-1543)
  1233. Chellappan S, Bai X, Ma B, Xuan D and Xu C (2007). Mobility Limited Flip-Based Sensor Networks Deployment, IEEE Transactions on Parallel and Distributed Systems, 18:2, (199-211), Online publication date: 1-Feb-2007.
  1234. Lloyd E and Xue G (2007). Relay Node Placement in Wireless Sensor Networks, IEEE Transactions on Computers, 56:1, (134-138), Online publication date: 1-Jan-2007.
  1235. Gupta R, Bagchi A and Sarkar S (2007). Improving Linkage of Web Pages, INFORMS Journal on Computing, 19:1, (127-136), Online publication date: 1-Jan-2007.
  1236. Ramanarayanan G and Bala K (2007). Constrained Texture Synthesis via Energy Minimization, IEEE Transactions on Visualization and Computer Graphics, 13:1, (167-178), Online publication date: 1-Jan-2007.
  1237. Dechev D, Pirkelbauer P and Stroustrup B Lock-free dynamically resizable arrays Proceedings of the 10th international conference on Principles of Distributed Systems, (142-156)
  1238. Seegyoung Seol E and Shephard M (2006). Efficient distributed mesh data structure for parallel automated adaptive analysis, Engineering with Computers, 22:3-4, (197-213), Online publication date: 1-Dec-2006.
  1239. Mei A and Rizzi R (2006). Online Permutation Routing in Partitioned Optical Passive Star Networks, IEEE Transactions on Computers, 55:12, (1557-1571), Online publication date: 1-Dec-2006.
  1240. Darbon J and Sigelle M (2006). Image Restoration with Discrete Constrained Total Variation Part I, Journal of Mathematical Imaging and Vision, 26:3, (261-276), Online publication date: 1-Dec-2006.
  1241. ACM
    Desai R, Yang Q, Wu Z, Meng W and Yu C Identifying redundant search engines in a very large scale metasearch engine context Proceedings of the 8th annual ACM international workshop on Web information and data management, (51-58)
  1242. ACM
    Geerts F, Revesz P and Van den Bussche J On-line maintenance of simplified weighted graphs for efficient distance queries Proceedings of the 14th annual ACM international symposium on Advances in geographic information systems, (203-210)
  1243. ACM
    Lo D and Khoo S SMArTIC Proceedings of the 14th ACM SIGSOFT international symposium on Foundations of software engineering, (265-275)
  1244. Yen C and Jou J (2006). An Optimum Algorithm for Compacting Error Traces for Efficient Design Error Debugging, IEEE Transactions on Computers, 55:11, (1356-1366), Online publication date: 1-Nov-2006.
  1245. Edelkamp S, Jabbar S and Lafuente A Heuristic search for the analysis of graph transition systems Proceedings of the Third international conference on Graph Transformations, (414-429)
  1246. Podorozhny R, Ngu A and Georgakopoulos D Business process learning for real time enterprises Proceedings of the 1st international conference on Business intelligence for the real-time enterprises, (118-132)
  1247. Chen H, Samavati F, Sousa M and Mitchell J Sketch-based volumetric seeded region growing Proceedings of the Third Eurographics conference on Sketch-Based Interfaces and Modeling, (123-130)
  1248. Moerkotte G and Neumann T Analysis of two existing and one new dynamic programming algorithm for the generation of optimal bushy join trees without cross products Proceedings of the 32nd international conference on Very large data bases, (930-941)
  1249. Xin D, Chen C and Han J Towards robust indexing for ranked queries Proceedings of the 32nd international conference on Very large data bases, (235-246)
  1250. Rahtu E, Salo M and Heikkila J (2006). A New Convexity Measure Based on a Probabilistic Interpretation of Images, IEEE Transactions on Pattern Analysis and Machine Intelligence, 28:9, (1501-1512), Online publication date: 1-Sep-2006.
  1251. Kang B, Kelarev A, Sale A and Williams R A new model for classifying DNA code inspired by neural networks and FSA Proceedings of the 9th Pacific Rim Knowledge Acquisition international conference on Advances in Knowledge Acquisition and Management, (187-198)
  1252. Abedin M, Nessa S, Khan L and Thuraisingham B Detection and Resolution of Anomalies in Firewall Policy Rules 20th Annual IFIP WG 11.3 Working Conference on Data and Applications Security on Data and Applications Security XX - Volume 4127, (15-29)
  1253. Carlson J and Eppstein D The weighted maximum-mean subtree and other bicriterion subtree problems Proceedings of the 10th Scandinavian conference on Algorithm Theory, (400-410)
  1254. Dom M, Guo J, Niedermeier R and Wernicke S Minimum membership set covering and the consecutive ones property Proceedings of the 10th Scandinavian conference on Algorithm Theory, (339-350)
  1255. Kolpakov R and Raffinot M New algorithms for text fingerprinting Proceedings of the 17th Annual conference on Combinatorial Pattern Matching, (342-353)
  1256. ACM
    Govindaraju N, Gray J, Kumar R and Manocha D GPUTeraSort Proceedings of the 2006 ACM SIGMOD international conference on Management of data, (325-336)
  1257. ACM
    Hanneke S An analysis of graph cut size for transductive learning Proceedings of the 23rd international conference on Machine learning, (393-399)
  1258. Kerschbaum F and Terzidis O Filtering for private collaborative benchmarking Proceedings of the 2006 international conference on Emerging Trends in Information and Communication Security, (409-422)
  1259. Lobo A and Baliga G (2006). NP-completeness for all computer science undergraduates, Journal of Computing Sciences in Colleges, 21:6, (53-63), Online publication date: 1-Jun-2006.
  1260. Rizzi R (2006). Acyclically pushable bipartite permutation digraphs, Discrete Mathematics, 306:12, (1177-1188), Online publication date: 1-Jun-2006.
  1261. Corsaro S and Marino M (2006). Interval linear systems: the state of the art, Computational Statistics, 21:2, (365-384), Online publication date: 1-Jun-2006.
  1262. ACM
    Zheng J, Robinson B, Williams L and Smiley K Applying regression test selection for COTS-based applications Proceedings of the 28th international conference on Software engineering, (512-522)
  1263. Lenkiewicz P, Hajduczenia M, Freire M, da Silva H and Monteiro P Estimating network offered load for optical burst switching networks Proceedings of the 5th international IFIP-TC6 conference on Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communications Systems, (1062-1073)
  1264. Chen D, Chiang Y, Memon N and Wu X Lossless geometry compression for steady-state and time-varying irregular grids Proceedings of the Eighth Joint Eurographics / IEEE VGTC conference on Visualization, (275-282)
  1265. Lin X, Xu J, Zhang Q, Lu H, Yu J, Zhou X and Yuan Y (2006). Approximate Processing of Massive Continuous Quantile Queries over High-Speed Data Streams, IEEE Transactions on Knowledge and Data Engineering, 18:5, (683-698), Online publication date: 1-May-2006.
  1266. Ma C, Zhang Z and Yang Y Battery-aware router scheduling in wireless mesh networks Proceedings of the 20th international conference on Parallel and distributed processing, (81-81)
  1267. Wu G, Zhang K, Liu C and Li J Adapting prime number labeling scheme for directed acyclic graphs Proceedings of the 11th international conference on Database Systems for Advanced Applications, (787-796)
  1268. ACM
    Saeedi M, Zamani M and Jahanian A Prediction and reduction of routing congestion Proceedings of the 2006 international symposium on Physical design, (72-77)
  1269. ACM
    Ayala-Rincón M, Llanos C, Jacobi R and Hartenstein R (2006). Prototyping time- and space-efficient computations of algebraic operations over dynamically reconfigurable systems modeled by rewriting-logic, ACM Transactions on Design Automation of Electronic Systems, 11:2, (251-281), Online publication date: 1-Apr-2006.
  1270. ACM
    Manassiev K, Mihailescu M and Amza C Exploiting distributed version concurrency in a transactional memory cluster Proceedings of the eleventh ACM SIGPLAN symposium on Principles and practice of parallel programming, (198-208)
  1271. Cheng J, Yu J, Lin X, Wang H and Yu P Fast computation of reachability labeling for large graphs Proceedings of the 10th international conference on Advances in Database Technology, (961-979)
  1272. Subramani K and Desovski D (2006). On contrasting vertex contraction with relaxation-based approaches for negative cost cycle detection, Applied Mathematics and Computation, 173:1, (273-305), Online publication date: 1-Feb-2006.
  1273. Deng L and Wong M An exact algorithm for the statistical shortest path problem Proceedings of the 2006 Asia and South Pacific Design Automation Conference, (965-970)
  1274. Paredes R and Navarro G Optimal incremental sorting Proceedings of the Meeting on Algorithm Engineering & Expermiments, (171-182)
  1275. Malewicz G Implementation and experiments with an algorithm for parallel scheduling of complex dags under uncertainty Proceedings of the Meeting on Algorithm Engineering & Expermiments, (66-74)
  1276. Kelarev A A polynomial algorithm for codes based on directed graphs Proceedings of the Twelfth Computing: The Australasian Theory Symposium - Volume 51, (87-92)
  1277. Logozzo F and Cortesi A Semantic hierarchy refactoring by abstract interpretation Proceedings of the 7th international conference on Verification, Model Checking, and Abstract Interpretation, (313-331)
  1278. Bhunre P, Murthy C, Bishnu A, Bhattacharya B and Kundu M A hybrid data and space partitioning technique for similarity queries on bounded clusters Proceedings of the First international conference on Pattern Recognition and Machine Intelligence, (544-550)
  1279. Patney R, Baton S and Filer N Server supported routing Proceedings of the First international conference on Mobile Ad-hoc and Sensor Networks, (21-30)
  1280. Maximov A and Johansson T Fast computation of large distributions and its cryptographic applications Proceedings of the 11th international conference on Theory and Application of Cryptology and Information Security, (313-332)
  1281. ACM
    Ávila B and Lins R A fast orientation and skew detection algorithm for monochromatic document images Proceedings of the 2005 ACM symposium on Document engineering, (118-126)
  1282. Manassiev K and Amza C Scalable database replication through dynamic multiversioning Proceedings of the 2005 conference of the Centre for Advanced Studies on Collaborative research, (141-154)
  1283. ACM
    Tseng Y, Wang Y and Cheng K An integrated mobile surveillance and wireless sensor (iMouse) system and its detection delay analysis Proceedings of the 8th ACM international symposium on Modeling, analysis and simulation of wireless and mobile systems, (178-181)
  1284. Ausiello G, Franciosa P and Italiano G Small stretch spanners on dynamic graphs Proceedings of the 13th annual European conference on Algorithms, (532-543)
  1285. Ahmad S, Jayakumar N, Balasubramanian V, Hursey E, Khatri S and Mahapatra R X-Routing using Two Manhattan Route Instances Proceedings of the 2005 International Conference on Computer Design, (45-52)
  1286. Jea T and Govindaraju V (2005). A minutia-based partial fingerprint recognition system, Pattern Recognition, 38:10, (1672-1684), Online publication date: 1-Oct-2005.
  1287. Guo H Mode-directed fixed point computation Proceedings of the 8th international conference on Logic Programming and Nonmonotonic Reasoning, (253-265)
  1288. Tao Y, Cheng R, Xiao X, Ngai W, Kao B and Prabhakar S Indexing multi-dimensional uncertain data with arbitrary probability density functions Proceedings of the 31st international conference on Very large data bases, (922-933)
  1289. Hoel E, Heng W and Honeycutt D High performance multimodal networks Proceedings of the 9th international conference on Advances in Spatial and Temporal Databases, (308-327)
  1290. Ono A and Nakano S Constant time generation of linear extensions Proceedings of the 15th international conference on Fundamentals of Computation Theory, (445-453)
  1291. Bereg S and Zhu B RNA Multiple Structural Alignment with Longest Common Subsequences Proceedings of the 11th Annual International Conference on Computing and Combinatorics - Volume 3595, (32-41)
  1292. Guo J, Niedermeier R and Wernicke S Parameterized complexity of generalized vertex cover problems Proceedings of the 9th international conference on Algorithms and Data Structures, (36-48)
  1293. Brodal G and Moruz G Tradeoffs between branch mispredictions and comparisons for sorting algorithms Proceedings of the 9th international conference on Algorithms and Data Structures, (385-395)
  1294. Franceschini G and Grossi R Optimal in-place sorting of vectors and records Proceedings of the 32nd international conference on Automata, Languages and Programming, (90-102)
  1295. Brodal G, Fagerberg R and Moruz G Cache-aware and cache-oblivious adaptive sorting Proceedings of the 32nd international conference on Automata, Languages and Programming, (576-588)
  1296. Meir O and Strichman O Yet another decision procedure for equality logic Proceedings of the 17th international conference on Computer Aided Verification, (307-320)
  1297. Awerbuch B and Kleinberg R Competitive collaborative learning Proceedings of the 18th annual conference on Learning Theory, (233-248)
  1298. ACM
    Jansen T and Schellbach U Theoretical analysis of a mutation-based evolutionary algorithm for a tracking problem in the lattice Proceedings of the 7th annual conference on Genetic and evolutionary computation, (841-848)
  1299. Korach E and Razgon M Optimal hypergraph tree-realization Proceedings of the 31st international conference on Graph-Theoretic Concepts in Computer Science, (261-270)
  1300. ACM
    Cohen-Steiner D, Edelsbrunner H and Harer J Stability of persistence diagrams Proceedings of the twenty-first annual symposium on Computational geometry, (263-271)
  1301. Fang J, Lin I, Yuh P, Chang Y and Wang J A routing algorithm for flip-chip design Proceedings of the 2005 IEEE/ACM International conference on Computer-aided design, (753-758)
  1302. Gupta A and Selvidge C Acyclic modeling of combinational loops Proceedings of the 2005 IEEE/ACM International conference on Computer-aided design, (343-347)
  1303. Zhu X, Wu X, Elmagarmid A, Feng Z and Wu L (2005). Video Data Mining, IEEE Transactions on Knowledge and Data Engineering, 17:5, (665-677), Online publication date: 1-May-2005.
  1304. Rosenkrantz D, Goel S, Ravi S and Gangolly J Structure-Based resilience metrics for service-oriented networks Proceedings of the 5th European conference on Dependable Computing, (345-362)
  1305. Lin X, Yuan Y, Wang W and Lu H Stabbing the Sky Proceedings of the 21st International Conference on Data Engineering, (502-513)
  1306. ACM
    Morimoto Y Optimized transitive association rule Proceedings of the 2005 ACM symposium on Applied computing, (543-544)
  1307. Ghosh A and Givargis T LORD Proceedings of the conference on Design, Automation and Test in Europe - Volume 1, (190-195)
  1308. Medjahed B and Bouguettaya A (2005). A dynamic foundational architecture for semantic web services, Distributed and Parallel Databases, 17:2, (179-206), Online publication date: 1-Mar-2005.
  1309. ACM
    Okasaki C Alternatives to two classic data structures Proceedings of the 36th SIGCSE technical symposium on Computer science education, (162-165)
  1310. ACM
    Okasaki C (2005). Alternatives to two classic data structures, ACM SIGCSE Bulletin, 37:1, (162-165), Online publication date: 23-Feb-2005.
  1311. Palbom A (2005). Complexity of the directed spanning cactus problem, Discrete Applied Mathematics, 146:1, (81-91), Online publication date: 15-Feb-2005.
  1312. Kundu S A modern graphic flowchart layout tool Proceedings of the First international conference on Distributed Computing and Internet Technology, (329-335)
  1313. Krone J (2004). Keeping pointers or references under control, Journal of Computing Sciences in Colleges, 20:1, (42-53), Online publication date: 1-Oct-2004.
  1314. Wu-Hen-Chang A, Le Viet D, Batori G, Gecse R and Csopaki G High-level restructuring of TTCN-3 test data Proceedings of the 4th international conference on Formal Approaches to Software Testing, (180-194)
  1315. Theobald M, Weikum G and Schenkel R Top-k query evaluation with probabilistic guarantees Proceedings of the Thirtieth international conference on Very large data bases - Volume 30, (648-659)
  1316. ACM
    Valente P (2004). Exact GPS simulation with logarithmic complexity, and its application to an optimally fair scheduler, ACM SIGCOMM Computer Communication Review, 34:4, (269-280), Online publication date: 30-Aug-2004.
  1317. ACM
    Valente P Exact GPS simulation with logarithmic complexity, and its application to an optimally fair scheduler Proceedings of the 2004 conference on Applications, technologies, architectures, and protocols for computer communications, (269-280)
  1318. Reitsma P and Pollard N Evaluating motion graphs for character navigation Proceedings of the 2004 ACM SIGGRAPH/Eurographics symposium on Computer animation, (89-98)
  1319. Avijit K, Gupta P and Gupta D TIED, LibsafePlus Proceedings of the 13th conference on USENIX Security Symposium - Volume 13, (4-4)
  1320. Mittal N and Garg V (2004). Finding missing synchronization in a distributed computation using controlled re-execution, Distributed Computing, 17:2, (107-130), Online publication date: 1-Aug-2004.
  1321. Gal Y and Pfeffer A Reasoning about Rationality and Beliefs Proceedings of the Third International Joint Conference on Autonomous Agents and Multiagent Systems - Volume 2, (774-781)
  1322. ACM
    Carlsson G, Zomorodian A, Collins A and Guibas L Persistence barcodes for shapes Proceedings of the 2004 Eurographics/ACM SIGGRAPH symposium on Geometry processing, (124-135)
  1323. Sivignon I, Dupont F and Chassery J (2004). Digital intersections, Graphical Models, 66:4, (226-244), Online publication date: 1-Jul-2004.
  1324. ACM
    Beaver J, Morsillo N, Pruhs K, Chrysanthis P and Liberatore V Scalable dissemination Proceedings of the 7th International Workshop on the Web and Databases: colocated with ACM SIGMOD/PODS 2004, (31-36)
  1325. ACM
    Cohen M and Gudes E Diagonally Subgraphs Pattern Mining Proceedings of the 9th ACM SIGMOD workshop on Research issues in data mining and knowledge discovery, (51-58)
  1326. ACM
    Huang L and Wong M Optical proximity correction (OPC) Proceedings of the 41st annual Design Automation Conference, (186-191)
  1327. ACM
    Bhattacharya S, Jangkrajarng N, Hartono R and Shi C Correct-by-construction layout-centric retargeting of large analog designs Proceedings of the 41st annual Design Automation Conference, (139-144)
  1328. Collins A, Zomorodian A, Carlsson G and Guibas L A barcode shape descriptor for curve point cloud data Proceedings of the First Eurographics conference on Point-Based Graphics, (181-191)
  1329. Dziurzanskii P, Shmerko V and Yanushkevich S (2004). Representation of Logical Circuits by Linear Decision Diagrams with Extension to Nanostructures, Automation and Remote Control, 65:6, (920-937), Online publication date: 1-Jun-2004.
  1330. ACM
    Friedman R, Gradinariu M and Simon G Locating cache proxies in manets Proceedings of the 5th ACM international symposium on Mobile ad hoc networking and computing, (175-186)
  1331. ACM
    Buchholz S and Buchholz T Replica placement in adaptive content distribution networks Proceedings of the 2004 ACM symposium on Applied computing, (1705-1710)
  1332. ACM
    Ding Y and Li Z A Compiler Analysis of Interprocedural Data Communication Proceedings of the 2003 ACM/IEEE conference on Supercomputing
  1333. ACM
    Jespersen S, Pedersen T and Thorhauge J Evaluating the markov assumption for web usage mining Proceedings of the 5th ACM international workshop on Web information and data management, (82-89)
  1334. ACM
    Onizuka M Light-weight xPath processing of XML stream with deterministic automata Proceedings of the twelfth international conference on Information and knowledge management, (342-349)
  1335. ACM
    Ganapathy V, Jha S, Chandler D, Melski D and Vitek D Buffer overrun detection using linear programming and static analysis Proceedings of the 10th ACM conference on Computer and communications security, (345-354)
  1336. Young A and Yung M Backdoor attacks on black-box ciphers exploiting low-entropy plaintexts Proceedings of the 8th Australasian conference on Information security and privacy, (297-311)
  1337. ACM
    Klauck H Quantum time-space tradeoffs for sorting Proceedings of the thirty-fifth annual ACM symposium on Theory of computing, (69-76)
  1338. Abrial J, Cansell D and Méry D Formal derivation of spanning trees algorithms Proceedings of the 3rd international conference on Formal specification and development in Z and B, (457-476)
  1339. Jiménez V and Marzal A A lazy version of Eppstein's K shortest paths algorithm Proceedings of the 2nd international conference on Experimental and efficient algorithms, (179-191)
  1340. Min R and Chandrakasan A Energy-efficient communication for high density networks Ambient intelligence, (295-314)
  1341. ACM
    Boyapati C, Lee R and Rinard M (2002). Ownership types for safe programming, ACM SIGPLAN Notices, 37:11, (211-230), Online publication date: 17-Nov-2002.
  1342. ACM
    Boyapati C, Lee R and Rinard M Ownership types for safe programming Proceedings of the 17th ACM SIGPLAN conference on Object-oriented programming, systems, languages, and applications, (211-230)
  1343. Sheffer A and Hart J Seamster Proceedings of the conference on Visualization '02, (291-298)
  1344. ACM
    Čagalj M, Hubaux J and Enz C Minimum-energy broadcast in all-wireless networks Proceedings of the 8th annual international conference on Mobile computing and networking, (172-182)
  1345. Jha S, Sheyner O and Wing J Two Formal Analys s of Attack Graphs Proceedings of the 15th IEEE workshop on Computer Security Foundations
  1346. ACM
    Lloyd E, Liu R, Marathe M, Ramanathan R and Ravi S Algorithmic aspects of topology control problems for ad hoc networks Proceedings of the 3rd ACM international symposium on Mobile ad hoc networking & computing, (123-134)
  1347. ACM
    Chang K and Hwang S Minimal probing Proceedings of the 2002 ACM SIGMOD international conference on Management of data, (346-357)
  1348. ACM
    Kahng A, Mantik S and Markov I Min-max placement for large-scale timing optimization Proceedings of the 2002 international symposium on Physical design, (143-148)
  1349. ACM
    Bucci P, Heym W, Long T and Weide B (2002). Algorithms and object-oriented programming, ACM SIGCSE Bulletin, 34:1, (302-306), Online publication date: 1-Mar-2002.
  1350. ACM
    Bucci P, Heym W, Long T and Weide B Algorithms and object-oriented programming Proceedings of the 33rd SIGCSE technical symposium on Computer science education, (302-306)
  1351. ACM
    Bachmann E, McGhee R, Yun X and Zyda M Inertial and magnetic posture tracking for inserting humans into networked virtual environments Proceedings of the ACM symposium on Virtual reality software and technology, (9-16)
  1352. ACM
    Dutta K, VanderMeer D, Datta A and Ramamritham K Discovering critical edge sequences in E-commerce catalogs Proceedings of the 3rd ACM conference on Electronic Commerce, (65-74)
  1353. Jha S, Tan K and Maxion R Markov Chains, Classifiers, and Intrusion Detection Proceedings of the 14th IEEE workshop on Computer Security Foundations
  1354. Jung J, Yoo S and Choi K Performance improvement of multi-processor systems cosimulation based on SW analysis Proceedings of the conference on Design, automation and test in Europe, (749-753)
  1355. ACM
    Ginat D (2001). Misleading intuition in algorithmic problem solving, ACM SIGCSE Bulletin, 33:1, (21-25), Online publication date: 1-Mar-2001.
  1356. ACM
    Ginat D Misleading intuition in algorithmic problem solving Proceedings of the thirty-second SIGCSE technical symposium on Computer Science Education, (21-25)
  1357. ACM
    Cho J, Shivakumar N and Garcia-Molina H (2000). Finding replicated Web collections, ACM SIGMOD Record, 29:2, (355-366), Online publication date: 1-Jun-2000.
  1358. ACM
    Cho J, Shivakumar N and Garcia-Molina H Finding replicated Web collections Proceedings of the 2000 ACM SIGMOD international conference on Management of data, (355-366)
  1359. ACM
    Tien T and Lin Y Performance-optimal clustering with retiming for sequential circuits Proceedings of the 2000 Asia and South Pacific Design Automation Conference, (409-414)
  1360. Tang C and Medioni G (1998). Inference of Integrated Surface, Curve, and Junction Descriptions From Sparse 3D Data, IEEE Transactions on Pattern Analysis and Machine Intelligence, 20:11, (1206-1223), Online publication date: 1-Nov-1998.
  1361. Chen Y and Wong D An Algorithm for Zero-Skew Clock Tree Routing with Buffer Insertion Proceedings of the 1996 European conference on Design and Test
  1362. Li J (1994). Multiscattering on the cube-connected cycles, Parallel Computing, 20:3, (313-324), Online publication date: 1-Mar-1994.
  1363. Moser W and Adlassnig K (1992). Consistency checking of binary categorical relationships in a medical knowledge base, Artificial Intelligence in Medicine, 4:5, (389-407), Online publication date: 1-Oct-1992.
  1364. ACM
    Paun I, Moshfeghi Y and Ntarmos N White-Box: On the Prediction of Collaborative Filtering Recommendation Systems’ Performance, ACM Transactions on Internet Technology, 0:0
  1365. ACM
    Di K, Zhou Y, Yan F, Jiang J, Yang S and Jiang Y A Foraging Strategy with Risk Response for Individual Robots in Adversarial Environments, ACM Transactions on Intelligent Systems and Technology, 0:0
  1366. Sarubbi J, Vieira D, Wanner E and Silva C A GRASP-based heuristic for allocating the roadside infrastructure maximizing the number of distinct vehicles experiencing contact opportunities NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium, (1187-1192)
  1367. Tabib W, Corah M, Michael N and Whittaker R Computationally efficient information-theoretic exploration of pits and caves 2016 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS), (3722-3727)
  1368. Wang C, Li J, Yang Y and Ye F A hybrid framework combining solar energy harvesting and wireless charging for wireless sensor networks IEEE INFOCOM 2016 - The 35th Annual IEEE International Conference on Computer Communications, (1-9)
  1369. Tang Y, Cheung M and Lok T Trajectory Design for UAV Assisted Wireless Networks 2019 IEEE Global Communications Conference (GLOBECOM), (1-6)
  1370. Hu X and Liao J Co-evolutionary path optimization by ripple-spreading algorithm 2016 IEEE Congress on Evolutionary Computation (CEC), (4535-4542)
Contributors
  • Dartmouth College
  • Massachusetts Institute of Technology
  • MIT Computer Science & Artificial Intelligence Laboratory
  • Columbia University

Recommendations

Reviews

Michael Gr. Vassilakopoulos

This is an excellent introduction to a fundamental area of computer science: algorithms. It covers a significant number of algorithms rigorously, including techniques for their design and analysis. This is the second edition of this excellent and very successful book. A new author has contributed, and three new chapters have been added, while two chapters and some sections have been removed. Many new problems and exercises appear in this edition, and many parts of the book have been revised and rewritten. The book is very well written. The description of the algorithms, in English or pseudocode, is easily understandable. The book can be read by anyone who has limited programming experience and basic familiarity with mathematics, since all the mathematical and algorithmic techniques needed are included. Numerous problems, and exercises that range from simple to advanced, are also included; more advanced material is marked with a star. Extensive references and a bibliography are provided. It should be noted that the authors chose not to provide answers to problems and exercises. The content is divided into eight parts. The first part provides “Foundations” for the design and analysis of algorithms. It consists of five chapters where algorithms and their role are introduced, and simple algorithms for sorting (insertion and merge sort) are presented and analyzed. In addition, asymptotic notations, and methods for solving recurrences and probabilistic analysis, are introduced alongside randomized algorithms. The next part consists of four chapters and deals with “Sorting and Order Statistics.” It includes the presentation and analysis of heapsort and quicksort, and the proof of a performance lower bound of comparison sorting methods, as well as the presentation and analysis of non-comparison sorting methods. This part also presents algorithms and bounds for the problem of finding the i th smallest element. The third part is on “Data Structures,” and consists of five chapters. It presents essential data structures: stacks, queues, linked lists and rooted trees. Moreover, it introduces and analyzes the use of hash tables and binary search trees for dynamic-set operations. It also presents red-black trees for dynamic-set operations, and augmented forms of red-black trees for order statistics and interval maintenance operations. The next part deals with “Advanced Design and Analysis Techniques.” It consists of three chapters that cover two methods for dealing with optimization problems (dynamic programming and greedy algorithms) and amortized analysis, a technique for analyzing algorithms performing a sequence of similar operations. The fifth part is on “Advanced Data Structures that support dynamic set operations. It consists of four chapters that present B-trees (disk resident structures), mergeable heaps, binomial heaps and structures for disjoint sets. Amortized analysis is among the analytical tools used in this part. The next part is an introduction to the topic of “Graph Algorithms.” In its five chapters, the representation of graphs, applications of depth-first search (topological sort and decomposition to strongly connected components), and the computation of minimum-weight spanning trees of shortest paths and of maximum flow, are examined. The seventh part presents a collection of “Selected Topics” that extend topics appearing in the previous parts. It consists of nine chapters. These chapters deal with several algorithmic issues. Specifically, they present a parallel model of computation along with a suitable sorting method, efficient algorithms for operations on matrices, linear programming, the Fast Fourier Transform, number-theoretic algorithms, string-matching techniques, some computational geometry topics, an introduction to NP-completeness, and approximation algorithms for NP-complete problems. The last part is an appendix entitled “Mathematical Background.” It consists of three sub appendices, where material on the evaluation and bounding of summations, definitions and properties of sets, relations, functions, graphs and trees and principles of combinatorics and probability theory are presented. This complements Part 1, and is useful as reference material. This could be recommended as a textbook for undergraduate or graduate courses in algorithms and/or data structures. Due to its extended size, only selected chapters or sections would be included in a one-term course. It can also serve the computer science professional very well as a handbook on algorithms and their design and analysis. Potential readers of this excellent book should keep in mind that due to its inevitably large size, it is rather difficult to physically handle (for example, to carry in a briefcase).

Access critical reviews of Computing literature here

Become a reviewer for Computing Reviews.