skip to main content
Skip header Section
Introduction to AlgorithmsJuly 2001
Publisher:
  • McGraw-Hill Higher Education
ISBN:978-0-07-013151-4
Published:01 July 2001
Skip Bibliometrics Section
Bibliometrics
Skip Abstract Section
Abstract

From the Publisher:

The updated new edition of the classic Introduction to Algorithms is intended primarily for use in undergraduate or graduate courses in algorithms or data structures. Like the first edition,this text can also be used for self-study by technical professionals since it discusses engineering issues in algorithm design as well as the mathematical aspects.

In its new edition,Introduction to Algorithms continues to provide a comprehensive introduction to the modern study of algorithms. The revision has been updated to reflect changes in the years since the book's original publication. New chapters on the role of algorithms in computing and on probabilistic analysis and randomized algorithms have been included. Sections throughout the book have been rewritten for increased clarity,and material has been added wherever a fuller explanation has seemed useful or new information warrants expanded coverage.

As in the classic first edition,this new edition of Introduction to Algorithms presents a rich variety of algorithms and covers them in considerable depth while making their design and analysis accessible to all levels of readers. Further,the algorithms are presented in pseudocode to make the book easily accessible to students from all programming language backgrounds.

Each chapter presents an algorithm,a design technique,an application area,or a related topic. The chapters are not dependent on one another,so the instructor can organize his or her use of the book in the way that best suits the course's needs. Additionally,the new edition offers a 25% increase over the first edition in the number of problems,giving the book 155 problems and over 900 exercises thatreinforcethe concepts the students are learning.

Cited By

  1. Deng Z, Chen S, Schreck T, Deng D, Tang T, Xu M, Weng D and Wu Y (2024). Visualizing Large-Scale Spatial Time Series with GeoChron, IEEE Transactions on Visualization and Computer Graphics, 30:1, (1194-1204), Online publication date: 1-Jan-2024.
  2. Candeias J, de Araújo D, Miranda P and Bastos-Filho C (2023). Memetic evolutionary algorithms to design optical networks with a local search that improves diversity, Expert Systems with Applications: An International Journal, 232:C, Online publication date: 1-Dec-2023.
  3. Kuang J, Wang M, Han J and Sheng Y (2023). Improved Milne-Hamming Method for Resolving High-Order Uncertain Differential Equations, Applied Mathematics and Computation, 457:C, Online publication date: 15-Nov-2023.
  4. Ganguly P and Mukherjee S (2023). A simulation‐based generalized framework to model vulnerability of interdependent critical infrastructure systems under incomplete information, Computer-Aided Civil and Infrastructure Engineering, 38:18, (2537-2559), Online publication date: 14-Nov-2023.
  5. Li X, Zhan Y, Zhao Y, Wu Y, Ding L, Li Y, Tao D and Jin H (2023). A perioperative risk assessment dataset with multi-view data based on online accelerated pairwise comparison, Information Fusion, 99:C, Online publication date: 1-Nov-2023.
  6. Tuncel K, Koutsopoulos H and Ma Z (2023). An integrated ride-matching and vehicle-rebalancing model for shared mobility on-demand services, Computers and Operations Research, 159:C, Online publication date: 1-Nov-2023.
  7. Yakut S, Öztemiz F and Karci A (2023). A new robust approach to solve minimum vertex cover problem: Malatya vertex-cover algorithm, The Journal of Supercomputing, 79:17, (19746-19769), Online publication date: 1-Nov-2023.
  8. ACM
    Feng S, Chen C and Xing Z Video2Action: Reducing Human Interactions in Action Annotation of App Tutorial Videos Proceedings of the 36th Annual ACM Symposium on User Interface Software and Technology, (1-15)
  9. De Meo P, Levene M and Provetti A (2023). Branching processes reveal influential nodes in social networks, Information Sciences: an International Journal, 644:C, Online publication date: 1-Oct-2023.
  10. Wang X, Wan L, Lin D and Feng W (2023). Phase-based fine-grained change detection, Expert Systems with Applications: An International Journal, 227:C, Online publication date: 1-Oct-2023.
  11. Lalou M and Kheddouci H (2023). Pseudo-polynomial algorithms for solving the Knapsack Problem with dependencies between items, Computers and Operations Research, 158:C, Online publication date: 1-Oct-2023.
  12. Han M and Lee J (2023). Graph-based density peak merging for identifying multi-peak clusters, Applied Soft Computing, 146:C, Online publication date: 1-Oct-2023.
  13. Yao H, Zhang Q, Fu X, Yang Y and Ungurean I (2023). Charger and receiver deployment for trajectory coverage with delay constraint in mobile wireless rechargeable sensor networks, Ad Hoc Networks, 149:C, Online publication date: 1-Oct-2023.
  14. ACM
    Timilsina A and Silvestri S (2023). P2P Energy Trading through Prospect Theory, Differential Evolution, and Reinforcement Learning, ACM Transactions on Evolutionary Learning and Optimization, 3:3, (1-22), Online publication date: 30-Sep-2023.
  15. Kondraciuk Ł String Covers of a Tree Revisited String Processing and Information Retrieval, (297-309)
  16. Balun J and Masopust T (2023). Verifying weak and strong k-step opacity in discrete-event systems, Automatica (Journal of IFAC), 155:C, Online publication date: 1-Sep-2023.
  17. ACM
    Lorenzen A, Leijen D and Swierstra W (2023). FP²: Fully in-Place Functional Programming, Proceedings of the ACM on Programming Languages, 7:ICFP, (275-304), Online publication date: 30-Aug-2023.
  18. Luo L and Dong C (2023). A linearity-preserving diamond scheme with extended least square interpolation for the heterogeneous and anisotropic diffusion problems on polyhedral meshes, Computers & Mathematics with Applications, 144:C, (182-197), Online publication date: 15-Aug-2023.
  19. Tinoco A, Gao S and Shi E ENIGMAP Proceedings of the 32nd USENIX Conference on Security Symposium, (4033-4050)
  20. ACM
    Guo B and Sekerinski E Parallel Order-Based Core Maintenance in Dynamic Graphs Proceedings of the 52nd International Conference on Parallel Processing, (122-131)
  21. ACM
    Advani R, Papotti P and Asudeh A Maximizing Neutrality in News Ordering Proceedings of the 29th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, (11-24)
  22. Tangwongsan K, Hirzel M and Schneider S (2023). Out-of-Order Sliding-Window Aggregation with Efficient Bulk Evictions and Insertions, Proceedings of the VLDB Endowment, 16:11, (3227-3239), Online publication date: 1-Jul-2023.
  23. Grenier A, Lohan E, Ometov A and Nurmi J (2023). A Survey on Low-Power GNSS, IEEE Communications Surveys & Tutorials, 25:3, (1482-1509), Online publication date: 1-Jul-2023.
  24. ACM
    Deng S, Lu S and Tao Y On Join Sampling and the Hardness of Combinatorial Output-Sensitive Join Algorithms Proceedings of the 42nd ACM SIGMOD-SIGACT-SIGAI Symposium on Principles of Database Systems, (99-111)
  25. Hartmann T and Muluk K Make a Graph Singly Connected by Edge Orientations Combinatorial Algorithms, (221-232)
  26. ACM
    Haffner I and Dittrich J (2023). Efficiently Computing Join Orders with Heuristic Search, Proceedings of the ACM on Management of Data, 1:1, (1-26), Online publication date: 26-May-2023.
  27. ACM
    Yang R and Tang J (2023). Efficient Estimation of Pairwise Effective Resistance, Proceedings of the ACM on Management of Data, 1:1, (1-27), Online publication date: 26-May-2023.
  28. ACM
    Chen Z, Zhang F, Guan J, Zhai J, Shen X, Zhang H, Shu W and Du X (2023). CompressGraph: Efficient Parallel Graph Analytics with Rule-Based Compression, Proceedings of the ACM on Management of Data, 1:1, (1-31), Online publication date: 26-May-2023.
  29. ACM
    Shebaro M and Tešić J Identifying Stable States of Large Signed Graphs Companion Proceedings of the ACM Web Conference 2023, (594-597)
  30. Khalil O, El-Sharkawy H, Youssef M and Baumann G (2023). Adaptive piecewise Poly-Sinc methods for function approximation, Applied Numerical Mathematics, 186:C, (1-18), Online publication date: 1-Apr-2023.
  31. Fränti P, Mariescu-Istodor R and Akram A (2023). Web-tool for optimizing locations of health centers, Procedia Computer Science, 219:C, (1120-1127), Online publication date: 1-Jan-2023.
  32. Shahrabadi S, Gonzalez D, Sousa N, Adão T, Peres E and Magalhães L (2023). Benchmarking Deep Learning models and hyperparameters for Bridge Defects Classification, Procedia Computer Science, 219:C, (345-353), Online publication date: 1-Jan-2023.
  33. Taghibakhshi A, Nytko N, Zaman T, MacLachlan S, Olson L and West M Learning interface conditions in domain decomposition solvers Proceedings of the 36th International Conference on Neural Information Processing Systems, (7222-7235)
  34. de Brito J, Totte D, Silva F, Junior J, Henriques F, Tarrataca L, Haddad D and de Assis L (2022). Memetic algorithm applied to topology control optimization of a wireless sensor network, Wireless Networks, 28:8, (3677-3697), Online publication date: 1-Nov-2022.
  35. ACM
    Fu Z, Liu M, Qin Y, Zhang J, Zou Y, Yin Q, Li Q and Duan H Encrypted Malware Traffic Detection via Graph-based Network Analysis Proceedings of the 25th International Symposium on Research in Attacks, Intrusions and Defenses, (495-509)
  36. Tarsissi L, Kenmochi Y, Djerroumi H, Coeurjolly D, Romon P and Borel J Algorithms for Pixelwise Shape Deformations Preserving Digital Convexity Discrete Geometry and Mathematical Morphology, (84-97)
  37. ACM
    Patel D, Pandey S and Sharma A Efficient Vector Store System for Python using Shared Memory Proceedings of the Second International Conference on AI-ML Systems, (1-6)
  38. Khattab H, Mahafzah B and Sharieh A (2022). A hybrid algorithm based on modified chemical reaction optimization and best-first search algorithm for solving minimum vertex cover problem, Neural Computing and Applications, 34:18, (15513-15541), Online publication date: 1-Sep-2022.
  39. Ibrahim M, Zhong Z, Bhattacharya B and Chakrabarty K (2022). Efficient Regulation of Synthetic Biocircuits Using Droplet-Aliquot Operations on MEDA Biochips, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 41:8, (2490-2503), Online publication date: 1-Aug-2022.
  40. Meilă M, Wagner A and Meek C (2022). Recursive inversion models for permutations, Statistics and Computing, 32:4, Online publication date: 1-Aug-2022.
  41. Falahiazar A, Sharifi A and Seydi V (2022). An efficient spread-based evolutionary algorithm for solving dynamic multi-objective optimization problems, Journal of Combinatorial Optimization, 44:1, (794-849), Online publication date: 1-Aug-2022.
  42. Liang R, Anacleto E and Meneses C (2022). Data structures for speeding up Tabu Search when solving sparse quadratic unconstrained binary optimization problems, Journal of Heuristics, 28:4, (433-479), Online publication date: 1-Aug-2022.
  43. ACM
    Cao N, Fineman J and Russell K Parallel Shortest Paths with Negative Edge Weights Proceedings of the 34th ACM Symposium on Parallelism in Algorithms and Architectures, (177-190)
  44. ACM
    Rashed M, Awad A, Jha S and Ewetz R Towards resilient analog in-memory deep learning via data layout re-organization Proceedings of the 59th ACM/IEEE Design Automation Conference, (859-864)
  45. Khadiev K and Yagafarov M The Fast Algorithm for Online k-server Problem on Trees Computer Science – Theory and Applications, (190-208)
  46. ACM
    Golestani H, Sen R, Young V and Gupta G Calipers Proceedings of the 36th ACM International Conference on Supercomputing, (1-14)
  47. Pllaha T, Heikkilä E, Calderbank R and Tirkkonen O Low-Complexity Grassmannian Quantization Based on Binary Chirps 2022 IEEE Wireless Communications and Networking Conference (WCNC), (1105-1110)
  48. Chen Y, Chen Z, Lin G, Xu Y and Zhang A (2021). Approximation Algorithms for Maximally Balanced Connected Graph Partition, Algorithmica, 83:12, (3715-3740), Online publication date: 1-Dec-2021.
  49. ACM
    Hsu K and Tseng H Accelerating applications using edge tensor processing units Proceedings of the International Conference for High Performance Computing, Networking, Storage and Analysis, (1-14)
  50. ACM
    Perez-Salazar S, Torrico A and Verdugo V Preserving Diversity when Partitioning: A Geometric Approach Proceedings of the 1st ACM Conference on Equity and Access in Algorithms, Mechanisms, and Optimization, (1-11)
  51. Drozdowski M and Shakhlevich N (2021). Scheduling divisible loads with time and cost constraints, Journal of Scheduling, 24:5, (507-521), Online publication date: 1-Oct-2021.
  52. Shapoval A and Lee E (2021). Generalizing 0-1 conflict hypergraphs and mixed conflict graphs: mixed conflict hypergraphs in discrete optimization, Journal of Global Optimization, 80:4, (805-840), Online publication date: 1-Aug-2021.
  53. ACM
    Cao N, Fineman J and Russell K Brief Announcement Proceedings of the 2021 ACM Symposium on Principles of Distributed Computing, (493-496)
  54. Geiselhart M, Elkelesh A, Ebada M, Cammerer S and ten Brink S On the Automorphism Group of Polar Codes 2021 IEEE International Symposium on Information Theory (ISIT), (1230-1235)
  55. ACM
    Becker K and Gottschlich J AI programmer Proceedings of the Genetic and Evolutionary Computation Conference Companion, (1513-1521)
  56. ACM
    Lyu Q, Sha M, Gong B and Lyu K Accelerating Depth-First Traversal by Graph Ordering Proceedings of the 33rd International Conference on Scientific and Statistical Database Management, (13-24)
  57. Swat S and Kasprzak M A Heuristic Approach to the Treedepth Decomposition Problem for Large Graphs Graph-Theoretic Concepts in Computer Science, (169-181)
  58. Ruby R, Zhong S, ElHalawany B, Luo H and Wu K (2021). SDN-Enabled Energy-Aware Routing in Underwater Multi-Modal Communication Networks, IEEE/ACM Transactions on Networking, 29:3, (965-978), Online publication date: 1-Jun-2021.
  59. ACM
    Ghosh E, Kamara S and Tamassia R Efficient Graph Encryption Scheme for Shortest Path Queries Proceedings of the 2021 ACM Asia Conference on Computer and Communications Security, (516-525)
  60. Lehtonen E and Waldhauser T (2021). Associative spectra of graph algebras I, Journal of Algebraic Combinatorics: An International Journal, 53:3, (613-638), Online publication date: 1-May-2021.
  61. ACM
    Charalampopoulos P, Iliopoulos C, Liu C and Pissis S (2020). Property Suffix Array with Applications in Indexing Weighted Sequences, ACM Journal of Experimental Algorithmics, 25, (1-16), Online publication date: 6-Dec-2020.
  62. ACM
    Asai H Palmtrie Proceedings of the 16th International Conference on emerging Networking EXperiments and Technologies, (323-335)
  63. ACM
    Kelly T (2020). A penny in every fuse box, ACM Inroads, 11:4, (52-53), Online publication date: 12-Nov-2020.
  64. Haghir Chehreghani M (2020). Unsupervised representation learning with Minimax distance measures, Machine Language, 109:11, (2063-2097), Online publication date: 1-Nov-2020.
  65. Kravchenko D, Khadiev K, Serov D and Kapralov R Quantum-over-Classical Advantage in Solving Multiplayer Games Reachability Problems, (83-98)
  66. ACM
    Zhou J, Zhang X and Fan J Pipelined implementation of serial comparison based iterative sort on FPGA Proceedings of the 2nd International Conference on Artificial Intelligence and Advanced Manufacture, (26-30)
  67. Valmari A (2020). All congruences below stability-preserving fair testing or CFFD, Acta Informatica, 57:3-5, (353-383), Online publication date: 1-Oct-2020.
  68. ACM
    Zhang B, Uysal N, Fan D and Ewetz R Redundant Neurons and Shared Redundant Synapses for Robust Memristor-based DNNs with Reduced Overhead Proceedings of the 2020 on Great Lakes Symposium on VLSI, (339-344)
  69. Kalmukov Y (2020). An algorithm for automatic assignment of reviewers to papers, Scientometrics, 124:3, (1811-1850), Online publication date: 1-Sep-2020.
  70. Roy A and Chakraborty R (2020). Toward Optimal Prediction Error Expansion-Based Reversible Image Watermarking, IEEE Transactions on Circuits and Systems for Video Technology, 30:8, (2377-2390), Online publication date: 1-Aug-2020.
  71. ACM
    Cao N, Fineman J and Russell K Efficient construction of directed hopsets and parallel approximate shortest paths Proceedings of the 52nd Annual ACM SIGACT Symposium on Theory of Computing, (336-349)
  72. Braham Y, Elloumi Y, Akil M and Bedoui M (2018). Parallel computation of Watershed Transform in weighted graphs on shared memory machines, Journal of Real-Time Image Processing, 17:3, (527-542), Online publication date: 1-Jun-2020.
  73. Eberl M, Haslbeck M and Nipkow T (2020). Verified Analysis of Random Binary Tree Structures, Journal of Automated Reasoning, 64:5, (879-910), Online publication date: 1-Jun-2020.
  74. Talebian H, Gani A, Sookhak M, Abdelatif A, Yousafzai A, Vasilakos A and Yu F (2020). Optimizing virtual machine placement in IaaS data centers: taxonomy, review and open issues, Cluster Computing, 23:2, (837-878), Online publication date: 1-Jun-2020.
  75. Ruiz G, Chavez E, Ruiz U and Tellez E (2019). Extreme pivots: a pivot selection strategy for faster metric search, Knowledge and Information Systems, 62:6, (2349-2382), Online publication date: 1-Jun-2020.
  76. Gill G, Dathathri R, Hoang L, Peri R and Pingali K (2020). Single machine graph analytics on massive datasets using Intel optane DC persistent memory, Proceedings of the VLDB Endowment, 13:8, (1304-1318), Online publication date: 1-Apr-2020.
  77. Ofir N, Galun M, Alpert S, Brandt A, Nadler B and Basri R (2020). On Detection of Faint Edges in Noisy Images, IEEE Transactions on Pattern Analysis and Machine Intelligence, 42:4, (894-908), Online publication date: 1-Apr-2020.
  78. Juma N, Shahen J, Bijon K and Tripunitara M (2020). The Overhead from Combating Side-Channels in Cloud Systems Using VM-Scheduling, IEEE Transactions on Dependable and Secure Computing, 17:2, (422-435), Online publication date: 1-Mar-2020.
  79. Alam T, Rahman M, Carrillo P, Bobadilla L and Rapp B (2019). Stochastic Multi-Robot Patrolling with Limited Visibility, Journal of Intelligent and Robotic Systems, 97:2, (411-429), Online publication date: 1-Feb-2020.
  80. Schymura C and Kolossa D (2020). Audiovisual Speaker Tracking Using Nonlinear Dynamical Systems With Dynamic Stream Weights, IEEE/ACM Transactions on Audio, Speech and Language Processing, 28, (1065-1078), Online publication date: 1-Jan-2020.
  81. ACM
    Rahul S and Tao Y (2019). A Guide to Designing Top-k Indexes, ACM SIGMOD Record, 48:2, (6-17), Online publication date: 19-Dec-2019.
  82. Yuan Y, Lian X, Chen L, Wang G, Yu J, Wang Y and Ma Y (2019). GCache: Neighborhood-Guided Graph Caching in a Distributed Environment, IEEE Transactions on Parallel and Distributed Systems, 30:11, (2463-2477), Online publication date: 1-Nov-2019.
  83. Arockiaraj M, Abraham J and Shalini A (2019). Node set optimization problem for complete Josephus cubes, Journal of Combinatorial Optimization, 38:4, (1180-1195), Online publication date: 1-Nov-2019.
  84. Menelaou C, Timotheou S, Kolios P, Panayiotou C and Polycarpou M Scheduling Vehicles for On-Time Arrival using Route-Reservations 2019 IEEE Intelligent Transportation Systems Conference (ITSC), (1749-1754)
  85. Gupta N, Gupta T, Samaddar S and Roy S WebReLog: A Web-based Tool for Disaster Relief Logistics with Vehicle Route Planning 2019 IEEE International Conference on Systems, Man and Cybernetics (SMC), (1012-1017)
  86. Ivanov N (2019). Generalized Stochastic Networks with Non-Standard Events Execution Disciplines, Automation and Remote Control, 80:10, (1894-1900), Online publication date: 1-Oct-2019.
  87. Yim Y, Park S, Lee E, Nam K, Kim C and Kim S (2019). RECOD: reliable detection protocol for large-scale and dynamic continuous objects in wireless sensor networks, Wireless Networks, 25:7, (4193-4213), Online publication date: 1-Oct-2019.
  88. Socci D, Poplavko P, Bensalem S and Bozga M (2019). Priority-based scheduling of mixed-critical jobs, Real-Time Systems, 55:4, (709-773), Online publication date: 1-Oct-2019.
  89. Dasler P and Mount D (2019). Modular Circulation and Applications to Traffic Management, Algorithmica, 81:10, (4098-4117), Online publication date: 1-Oct-2019.
  90. ACM
    Kagaris D and Dutta S (2019). Scheduling Mutual Exclusion Accesses in Equal-Length Jobs, ACM Transactions on Parallel Computing, 6:2, (1-26), Online publication date: 10-Sep-2019.
  91. Nayebi M and Ruhe G (2019). Asymmetric Release Planning: Compromising Satisfaction against Dissatisfaction, IEEE Transactions on Software Engineering, 45:9, (839-857), Online publication date: 1-Sep-2019.
  92. ACM
    Li Y, Zhu D and Chen L Express Link Placement for NoC-Based Many-Core Platforms Proceedings of the 48th International Conference on Parallel Processing, (1-10)
  93. Qiu K, Zhao J, Wang X, Fu X and Secci S (2019). Efficient Recovery Path Computation for Fast Reroute in Large-Scale Software-Defined Networks, IEEE Journal on Selected Areas in Communications, 37:8, (1755-1768), Online publication date: 1-Aug-2019.
  94. ACM
    Li Y, Yilmaz E, Sarson P and Ozev S (2019). Adaptive Test for RF/Analog Circuit Using Higher Order Correlations among Measurements, ACM Transactions on Design Automation of Electronic Systems, 24:4, (1-16), Online publication date: 24-Jul-2019.
  95. ACM
    Batdalov R and Nikiforova O Elementary structural data composition patterns Proceedings of the 24th European Conference on Pattern Languages of Programs, (1-13)
  96. ACM
    Zhang Q, Zhang H, Sellam T and Wu E Mining Precision Interfaces From Query Logs Proceedings of the 2019 International Conference on Management of Data, (988-1005)
  97. Akshay S, Gastin P, Jugé V and Krishna S Timed systems through the lens of logic Proceedings of the 34th Annual ACM/IEEE Symposium on Logic in Computer Science, (1-13)
  98. ACM
    Pach J, Rubin N and Tardos G Planar point sets determine many pairwise crossing segments Proceedings of the 51st Annual ACM SIGACT Symposium on Theory of Computing, (1158-1166)
  99. Acampora L and Marra F Numerical Algorithms for the Parametric Continuation of Stiff ODEs Deriving from the Modeling of Combustion with Detailed Chemical Mechanisms Numerical Computations: Theory and Algorithms, (3-16)
  100. Khadiev K and Safina L Quantum Algorithm for Dynamic Programming Approach for DAGs. Applications for Zhegalkin Polynomial Evaluation and Some Problems on DAGs Unconventional Computation and Natural Computation, (150-163)
  101. Liu F, Lu H, Yu C and Liu Y An Energy-balanced Data Collection Framework with Wireless Charging for Rechargeable Sensor Networks 2019 IEEE Wireless Communications and Networking Conference (WCNC), (1-6)
  102. Do T, Carrillo-Arce L and Roumeliotis S (2020). High-speed autonomous quadrotor navigation through visual and inertial paths, International Journal of Robotics Research, 38:4, (486-504), Online publication date: 1-Apr-2019.
  103. Cicotti P, Shantharam M and Carrington L (2020). Reducing communication in parallel graph search algorithms with software caches, International Journal of High Performance Computing Applications, 33:2, (384-396), Online publication date: 1-Mar-2019.
  104. ACM
    Athanasopoulos D and Zarras A (2018). Mining Abstract XML Data-Types, ACM Transactions on the Web, 13:1, (1-37), Online publication date: 28-Feb-2019.
  105. Wang P, Wang X, Tao J, Zhang P and Guan X (2019). Continuously Distinct Sampling over Centralized and Distributed High Speed Data Streams, IEEE Transactions on Parallel and Distributed Systems, 30:2, (300-314), Online publication date: 1-Feb-2019.
  106. ACM
    Edwards S, Townsend R, Barker M and Kim M (2019). Compositional Dataflow Circuits, ACM Transactions on Embedded Computing Systems, 18:1, (1-27), Online publication date: 31-Jan-2019.
  107. Jerew O, Al Bassam N and Darsena D (2019). Delay Tolerance and Energy Saving in Wireless Sensor Networks with a Mobile Base Station, Wireless Communications & Mobile Computing, 2019, Online publication date: 1-Jan-2019.
  108. Achleitner S, Bartolini N, He T, La Porta T and Zad Tootaghaj D (2018). Fast Network Configuration in Software Defined Networking, IEEE Transactions on Network and Service Management, 15:4, (1249-1263), Online publication date: 1-Dec-2018.
  109. ACM
    Yin X and Ma Y Aggregation Service Function Chain Mapping Plan based on Beetle Antennae Search Algorithm Proceedings of the 2nd International Conference on Telecommunications and Communication Engineering, (225-230)
  110. Anselma L, Mazzei A, Piovesan L and Terenziani P Temporal Reasoning with Layered Preferences Foundations of Intelligent Systems, (367-376)
  111. Jain T and Schneider K Optimal self-routing split modules for radix-based interconnection networks Proceedings of the 16th ACM-IEEE International Conference on Formal Methods and Models for System Design, (99-108)
  112. ACM
    Mohammady M, Wang L, Hong Y, Louafi H, Pourzandi M and Debbabi M Preserving Both Privacy and Utility in Network Trace Anonymization Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, (459-474)
  113. ACM
    Chen L and Liu J EasyGO Proceedings of the 24th Annual International Conference on Mobile Computing and Networking, (835-837)
  114. ACM
    Xiao M, Wang S, Zhou C, Liu L, Li Z, Liu Y and Chen S MiniView Layout for Bandwidth-Efficient 360-Degree Video Proceedings of the 26th ACM international conference on Multimedia, (914-922)
  115. Subotić P, Jordan H, Chang L, Fekete A and Scholz B (2018). Automatic index selection for large-scale datalog computation, Proceedings of the VLDB Endowment, 12:2, (141-153), Online publication date: 1-Oct-2018.
  116. Guo C, Sartipi K, DuToit R, Georgiou G, Li R, O’Leary J, Nerurkar E, Hesch J and Roumeliotis S (2018). Resource-Aware Large-Scale Cooperative Three-Dimensional Mapping Using Multiple Mobile Devices, IEEE Transactions on Robotics, 34:5, (1349-1369), Online publication date: 1-Oct-2018.
  117. Wang L and Horn B (2018). Machine Vision to Alert Roadside Personnel of Night Traffic Threats, IEEE Transactions on Intelligent Transportation Systems, 19:10, (3245-3254), Online publication date: 1-Oct-2018.
  118. ACM
    Barczyszyn G, Camenar L, Nascimento D, Kozievitch N, Silva R, Almeida L, Santi J and Minetto R (2018). A Collaborative System for Suitable Wheelchair Route Planning, ACM Transactions on Accessible Computing, 11:3, (1-26), Online publication date: 30-Sep-2018.
  119. Tarkowski M, Szczepański P, Michalak T, Harrenstein P and Wooldridge M (2019). Efficient computation of semivalues for game-theoretic network centrality, Journal of Artificial Intelligence Research, 63:1, (145-189), Online publication date: 1-Sep-2018.
  120. Feng X, Chang L, Lin X, Qin L, Zhang W and Yuan L (2018). Distributed computing connected components with linear communication cost, Distributed and Parallel Databases, 36:3, (555-592), Online publication date: 1-Sep-2018.
  121. Abul O and Bayrak C (2018). From location to location pattern privacy in location-based services, Knowledge and Information Systems, 56:3, (533-557), Online publication date: 1-Sep-2018.
  122. ACM
    Gabow H (2018). Data Structures for Weighted Matching and Extensions to b-matching and f-factors, ACM Transactions on Algorithms, 14:3, (1-80), Online publication date: 16-Jul-2018.
  123. Fahimi H, Ouellet Y and Quimper C (2018). Linear-time filtering algorithms for the disjunctive constraint and a quadratic filtering algorithm for the cumulative not-first not-last, Constraints, 23:3, (272-293), Online publication date: 1-Jul-2018.
  124. ACM
    Karsin B, Weichert V, Casanova H, Iacono J and Sitchinava N Analysis-driven Engineering of Comparison-based Sorting Algorithms on GPUs Proceedings of the 2018 International Conference on Supercomputing, (86-95)
  125. ACM
    Athanasopoulos D Digital ecclesia Proceedings of the 40th International Conference on Software Engineering: Software Engineering in Society, (91-94)
  126. Ren Y, Huang T, Lin K and Tseng Y On Scalable Service Function Chaining with $\mathcal{O}(1)$ Flowtable Entries IEEE INFOCOM 2018 - IEEE Conference on Computer Communications, (702-710)
  127. Ji K, Quan G and Tan J Asymptotic Miss Ratio of LRU Caching with Consistent Hashing IEEE INFOCOM 2018 - IEEE Conference on Computer Communications, (450-458)
  128. Stpiczyński P (2018). Language-based vectorization and parallelization using intrinsics, OpenMP, TBB and Cilk Plus, The Journal of Supercomputing, 74:4, (1461-1472), Online publication date: 1-Apr-2018.
  129. Lanna A, Castro T, Alves V, Rodrigues G, Schobbens P and Apel S (2018). Feature-family-based reliability analysis of software product lines, Information and Software Technology, 94:C, (59-81), Online publication date: 1-Feb-2018.
  130. Riad K, Ke L and Qi L (2018). RoughDroid, Security and Communication Networks, 2018, Online publication date: 1-Jan-2018.
  131. ACM
    Gabow H (2017). A Data Structure for Nearest Common Ancestors with Linking, ACM Transactions on Algorithms, 13:4, (1-28), Online publication date: 21-Dec-2017.
  132. ACM
    Solomonik E, Besta M, Vella F and Hoefler T Scaling betweenness centrality using communication-efficient sparse matrix multiplication Proceedings of the International Conference for High Performance Computing, Networking, Storage and Analysis, (1-14)
  133. Jia Z, Kwon Y, Shipman G, McCormick P, Erez M and Aiken A (2017). A distributed multi-GPU system for fast graph processing, Proceedings of the VLDB Endowment, 11:3, (297-310), Online publication date: 1-Nov-2017.
  134. Jiang R, Zhu Y and Yang Y (2017). Improving Throughput and Fairness of Convergecast in Vehicular Networks, IEEE Transactions on Mobile Computing, 16:11, (3070-3083), Online publication date: 1-Nov-2017.
  135. ACM
    Moreira R, Collange C and Quintão Pereira F (2017). Function Call Re-Vectorization, ACM SIGPLAN Notices, 52:8, (313-326), Online publication date: 26-Oct-2017.
  136. Sanyal R, Jaiswal M and Chaudhury K (2017). On a Registration-Based Approach to Sensor Network Localization, IEEE Transactions on Signal Processing, 65:20, (5357-5367), Online publication date: 15-Oct-2017.
  137. Yin S, Li L and Qu Z Power control in ARQ transmission with wireless energy replenishment 2017 IEEE 28th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC), (1-5)
  138. Mokhasunavisu D and Mitra U Non-parametric active target localization: Exploiting unimodality and separability 2017 55th Annual Allerton Conference on Communication, Control, and Computing (Allerton), (346-353)
  139. ACM
    Lloyd S and Gokhale M Near memory key/value lookup acceleration Proceedings of the International Symposium on Memory Systems, (26-33)
  140. Wang P, Qi Y, Sun Y, Zhang X, Tao J and Guan X (2017). Approximately counting triangles in large graph streams including edge duplicates with a fixed memory usage, Proceedings of the VLDB Endowment, 11:2, (162-175), Online publication date: 1-Oct-2017.
  141. Gao C, Li Y, Zhao Y and Chen S (2017). A Two-Level Game Theory Approach for Joint Relay Selection and Resource Allocation in Network Coding Assisted D2D Communications, IEEE Transactions on Mobile Computing, 16:10, (2697-2711), Online publication date: 1-Oct-2017.
  142. Zhang S, Qian Z, Wu J, Kong F and Lu S (2017). Optimizing Itinerary Selection and Charging Association for Mobile Chargers, IEEE Transactions on Mobile Computing, 16:10, (2833-2846), Online publication date: 1-Oct-2017.
  143. ACM
    Edwards S, Townsend R and Kim M Compositional dataflow circuits Proceedings of the 15th ACM-IEEE International Conference on Formal Methods and Models for System Design, (175-184)
  144. ACM
    Monteiro F, Januário F, Cordeiro L and de Lima Filho E (2017). BMCLua, ACM SIGSOFT Software Engineering Notes, 42:3, (1-10), Online publication date: 5-Sep-2017.
  145. Terenziani P, Andolina A and Piovesan L (2017). Managing Temporal Constraints with Preferences: Representation, Reasoning, and Querying, IEEE Transactions on Knowledge and Data Engineering, 29:9, (2067-2071), Online publication date: 1-Sep-2017.
  146. Chen L and Chung J (2017). Mobility-Aware and Congestion-Relieved Dedicated Path Planning for Group-Based Emergency Guiding Based on Internet of Things Technologies, IEEE Transactions on Intelligent Transportation Systems, 18:9, (2453-2466), Online publication date: 1-Sep-2017.
  147. Bonami P, Mazauric D and Vaxs Y (2017). Maximum flow under proportional delay constraint, Theoretical Computer Science, 689:C, (58-66), Online publication date: 15-Aug-2017.
  148. Tonini F, Fiorani M, Furdek M, Raffaelli C, Wosinska L and Monti P (2017). Radio and Transport Planning of Centralized Radio Architectures in 5G Indoor Scenarios, IEEE Journal on Selected Areas in Communications, 35:8, (1837-1848), Online publication date: 1-Aug-2017.
  149. ACM
    Panagopoulos A, Maleki S, Rogers A, Venanzi M and Jennings N (2017). Advanced Economic Control of Electricity-Based Space Heating Systems in Domestic Coalitions with Shared Intermittent Energy Resources, ACM Transactions on Intelligent Systems and Technology, 8:4, (1-27), Online publication date: 31-Jul-2017.
  150. Martínez-Cruz C, Serrano J and Vila A A tool to perform semantic and imprecise queries on non-scalar data 2017 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE), (1-6)
  151. Ghozzi Y, Baklouti N and Alimi A A beta-fuzzy-near-sets approach to research for visually similar content images 2017 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE), (1-6)
  152. Kim D, Wang W, Son J, Wu W, Lee W and Tokuta A (2017). Maximum Lifetime Combined Barrier-Coverage of Weak Static Sensors and Strong Mobile Sensors, IEEE Transactions on Mobile Computing, 16:7, (1956-1966), Online publication date: 1-Jul-2017.
  153. Thangaraj A, Kramer G and Böcherer G (2017). Capacity Bounds for Discrete-Time, Amplitude-Constrained, Additive White Gaussian Noise Channels, IEEE Transactions on Information Theory, 63:7, (4172-4182), Online publication date: 1-Jul-2017.
  154. Chu D, Zhang C and Tao Q (2017). A faster cutting plane algorithm with accelerated line search for linear SVM, Pattern Recognition, 67:C, (127-138), Online publication date: 1-Jul-2017.
  155. Swain R, Mishra S, Samal T and Kabat M (2017). An Energy Efficient Advertisement Based Multichannel Distributed MAC Protocol for Wireless Sensor Networks (Adv-MMAC), Wireless Personal Communications: An International Journal, 95:2, (655-682), Online publication date: 1-Jul-2017.
  156. ACM
    Besta M, Podstawski M, Groner L, Solomonik E and Hoefler T To Push or To Pull Proceedings of the 26th International Symposium on High-Performance Parallel and Distributed Computing, (93-104)
  157. ACM
    Jiang P and Agrawal G Efficient SIMD and MIMD parallelization of hash-based aggregation by conflict mitigation Proceedings of the International Conference on Supercomputing, (1-11)
  158. Sydow M, Baraniak K and Teisseyre P (2017). Diversity of editors and teams versus quality of cooperative work, Journal of Intelligent Information Systems, 48:3, (601-632), Online publication date: 1-Jun-2017.
  159. ACM
    Madhavan R, Kulal S and Kuncak V (2017). Contract-based resource verification for higher-order functions with memoization, ACM SIGPLAN Notices, 52:1, (330-343), Online publication date: 11-May-2017.
  160. ACM
    Gan E and Bailis P Scalable Kernel Density Classification via Threshold-Based Pruning Proceedings of the 2017 ACM International Conference on Management of Data, (945-959)
  161. ACM
    Chang L, Li W and Zhang W Computing A Near-Maximum Independent Set in Linear Time by Reducing-Peeling Proceedings of the 2017 ACM International Conference on Management of Data, (1181-1196)
  162. Ma F, Hao J and Wang Y (2017). An effective iterated tabu search for the maximum bisection problem, Computers and Operations Research, 81:C, (78-89), Online publication date: 1-May-2017.
  163. Villar S, Torcida S and Acosta G (2017). Median Filtering, Journal of Mathematical Imaging and Vision, 58:1, (130-146), Online publication date: 1-May-2017.
  164. ACM
    Cook B, Khlaaf H and Piterman N (2017). Verifying Increasingly Expressive Temporal Logics for Infinite-State Systems, Journal of the ACM, 64:2, (1-39), Online publication date: 30-Apr-2017.
  165. Vintescu A, Dupont F, Lavoue G, Memari P and Tierny J Conformal factor persistence for fast hierarchical cone extraction Proceedings of the European Association for Computer Graphics: Short Papers, (57-60)
  166. Cai S, Jahangoshahi M, Bakshi M and Jaggi S (2017). Efficient Algorithms for Noisy Group Testing, IEEE Transactions on Information Theory, 63:4, (2113-2136), Online publication date: 1-Apr-2017.
  167. Carvalho J, Pequito S, Aguiar A, Kar S and Johansson K (2017). Composability and controllability of structural linear time-invariant systems, Automatica (Journal of IFAC), 78:C, (123-134), Online publication date: 1-Apr-2017.
  168. Chang Y, Rao S and Tawarmalani M Robust validation of network designs under uncertain demands and failures Proceedings of the 14th USENIX Conference on Networked Systems Design and Implementation, (347-362)
  169. ACM
    Lin Z and Tripunitara M Graph Automorphism-Based, Semantics-Preserving Security for the Resource Description Framework (RDF) Proceedings of the Seventh ACM on Conference on Data and Application Security and Privacy, (337-348)
  170. Wu C, Deng C, Liu L, Han J, Chen J, Yin S and Wei S (2017). A Multi-Objective Model Oriented Mapping Approach for NoC-based Computing Systems, IEEE Transactions on Parallel and Distributed Systems, 28:3, (662-676), Online publication date: 1-Mar-2017.
  171. Omar Y, Osama H and Badr A (2017). Double Hashing Sort Algorithm, Computing in Science and Engineering, 19:2, (63-69), Online publication date: 1-Mar-2017.
  172. ACM
    Argyros G, Petsios T, Sivakorn S, Keromytis A and Polakis J (2017). Evaluating the Privacy Guarantees of Location Proximity Services, ACM Transactions on Privacy and Security, 19:4, (1-31), Online publication date: 3-Feb-2017.
  173. Jose V (2016). Percentage and Relative Error Measures in Forecast Evaluation, Operations Research, 65:1, (200-211), Online publication date: 1-Feb-2017.
  174. Joroughi V, Vazquez M and Perez-Neira A (2017). Generalized Multicast Multibeam Precoding for Satellite Communications, IEEE Transactions on Wireless Communications, 16:2, (952-966), Online publication date: 1-Feb-2017.
  175. Chang L, Li W, Qin L, Zhang W and Yang S (2017). $\mathsf {pSCAN}$, IEEE Transactions on Knowledge and Data Engineering, 29:2, (387-401), Online publication date: 1-Feb-2017.
  176. N. S, B. A and Bhattacharya S (2017). Social network pruning for building optimal social network, Knowledge-Based Systems, 117:C, (101-110), Online publication date: 1-Feb-2017.
  177. ACM
    Moreira R, Collange C and Quintão Pereira F Function Call Re-Vectorization Proceedings of the 22nd ACM SIGPLAN Symposium on Principles and Practice of Parallel Programming, (313-326)
  178. Padilla O, Sharpnack J and Scott J (2017). The DFS fused lasso, The Journal of Machine Learning Research, 18:1, (6410-6445), Online publication date: 1-Jan-2017.
  179. ACM
    Madhavan R, Kulal S and Kuncak V Contract-based resource verification for higher-order functions with memoization Proceedings of the 44th ACM SIGPLAN Symposium on Principles of Programming Languages, (330-343)
  180. ACM
    Bourge A, Muller O and Rousseau F (2016). Generating Efficient Context-Switch Capable Circuits through Autonomous Design Flow, ACM Transactions on Reconfigurable Technology and Systems, 10:1, (1-23), Online publication date: 28-Dec-2016.
  181. Namkoong H and Duchi J Stochastic gradient methods for distributionally robust optimization with f-divergences Proceedings of the 30th International Conference on Neural Information Processing Systems, (2216-2224)
  182. ACM
    Pai S and Pingali K (2016). A compiler for throughput optimization of graph algorithms on GPUs, ACM SIGPLAN Notices, 51:10, (1-19), Online publication date: 5-Dec-2016.
  183. Bash B, Goeckel D and Towsley D (2016). Covert Communication Gains From Adversary’s Ignorance of Transmission Time, IEEE Transactions on Wireless Communications, 15:12, (8394-8405), Online publication date: 1-Dec-2016.
  184. Chiang Y and Liao W (2016). Green Multicell Cooperation in Heterogeneous Networks With Hybrid Energy Sources, IEEE Transactions on Wireless Communications, 15:12, (7911-7925), Online publication date: 1-Dec-2016.
  185. Rahat A, Everson R and Fieldsend J (2016). Evolutionary multi-path routing for network lifetime and robustness in wireless sensor networks, Ad Hoc Networks, 52:C, (130-145), Online publication date: 1-Dec-2016.
  186. Benabdeslem K, Elghazel H and Hindawi M (2016). Ensemble constrained Laplacian score for efficient and robust semi-supervised feature selection, Knowledge and Information Systems, 49:3, (1161-1185), Online publication date: 1-Dec-2016.
  187. Martins P and Sousa L Enhancing Data Parallelism of Fully Homomorphic Encryption Proceedings of the 19th International Conference on Information Security and Cryptology - Volume 10157, (194-207)
  188. Latham R, Dorier M and Ross R Get out of the way! Proceedings of the 1st Joint International Workshop on Parallel Data Storage & Data Intensive Scalable Computing Systems, (37-42)
  189. Wallace S, Yang X, Vishwanath V, Allcock W, Coghlan S, Papka M and Lan Z A data driven scheduling approach for power management on HPC systems Proceedings of the International Conference for High Performance Computing, Networking, Storage and Analysis, (1-11)
  190. Sariyüce A and Pinar A (2016). Fast hierarchy construction for dense subgraphs, Proceedings of the VLDB Endowment, 10:3, (97-108), Online publication date: 1-Nov-2016.
  191. Cheng Y, Todri-Sanial A, Yang J and Zhao W (2016). Alleviating Through-Silicon-Via Electromigration for 3-D Integrated Circuits Taking Advantage of Self-Healing Effect, IEEE Transactions on Very Large Scale Integration (VLSI) Systems, 24:11, (3310-3322), Online publication date: 1-Nov-2016.
  192. Sathya Narayanan N, Patnaik M and Kamakoti V (2016). ProMAC, Computer Communications, 93:C, (27-38), Online publication date: 1-Nov-2016.
  193. ACM
    Danelutto M, De Matteis T, Mencagli G and Torquati M A divide-and-conquer parallel pattern implementation for multicores Proceedings of the 3rd International Workshop on Software Engineering for Parallel Systems, (10-19)
  194. ACM
    Pai S and Pingali K A compiler for throughput optimization of graph algorithms on GPUs Proceedings of the 2016 ACM SIGPLAN International Conference on Object-Oriented Programming, Systems, Languages, and Applications, (1-19)
  195. Karathanasopoulos N and Kress G (2016). Two dimensional modeling of helical structures, an application to simple strands, Computers and Structures, 174:C, (79-84), Online publication date: 1-Oct-2016.
  196. ACM
    Ewetz R and Koh C (2016). Construction of Reconfigurable Clock Trees for MCMM Designs Using Mode Separation and Scenario Compression, ACM Transactions on Design Automation of Electronic Systems, 21:4, (1-27), Online publication date: 22-Sep-2016.
  197. ACM
    Olaechea R, Fahrenberg U, Atlee J and Legay A Long-term average cost in featured transition systems Proceedings of the 20th International Systems and Software Product Line Conference, (109-118)
  198. ACM
    Bhandari K and Sarkar V Tree-based Read-only Data Chunks for NVRAM Programming Proceedings of the Sixth Workshop on Data-Flow Execution Models for Extreme Scale Computing, (1-8)
  199. ACM
    Swoboda T, Hemmje M, Dascalu M and Trausan-Matu S Combining Taxonomies using Word2vec Proceedings of the 2016 ACM Symposium on Document Engineering, (131-134)
  200. Sevenich M, Hong S, van Rest O, Wu Z, Banerjee J and Chafi H (2016). Using domain-specific languages for analytic graph databases, Proceedings of the VLDB Endowment, 9:13, (1257-1268), Online publication date: 1-Sep-2016.
  201. Yuan B, Li B, Chen H and Yao X (2016). Defect- and Variation-Tolerant Logic Mapping in Nanocrossbar Using Bipartite Matching and Memetic Algorithm, IEEE Transactions on Very Large Scale Integration (VLSI) Systems, 24:9, (2813-2826), Online publication date: 1-Sep-2016.
  202. Zhan X, Qian X and Ukkusuri S (2016). A Graph-Based Approach to Measuring the Efficiency of an Urban Taxi Service System, IEEE Transactions on Intelligent Transportation Systems, 17:9, (2479-2489), Online publication date: 1-Sep-2016.
  203. Khachay M and Neznakhina K (2016). Approximability of the minimum-weight k-size cycle cover problem, Journal of Global Optimization, 66:1, (65-82), Online publication date: 1-Sep-2016.
  204. Tamassia M, Zambetta F, Raffe W, Mueller F and Li X Dynamic choice of state abstraction in Q-learning Proceedings of the Twenty-second European Conference on Artificial Intelligence, (46-54)
  205. ACM
    Hossain A, Sreenan C and Alberola R (2016). Neighbour-Disjoint Multipath for Low-Power and Lossy Networks, ACM Transactions on Sensor Networks, 12:3, (1-25), Online publication date: 29-Aug-2016.
  206. ACM
    Grabocka J, Schilling N and Schmidt-Thieme L (2016). Latent Time-Series Motifs, ACM Transactions on Knowledge Discovery from Data, 11:1, (1-20), Online publication date: 27-Aug-2016.
  207. Kaddour M (2016). Optimizing the throughput-lifetime tradeoff in wireless sensor networks with link scheduling, rate adaptation, and power control, Wireless Communications & Mobile Computing, 16:12, (1510-1525), Online publication date: 25-Aug-2016.
  208. Garg S, Mohassel P and Papamanthou C TWORAM Proceedings, Part III, of the 36th Annual International Cryptology Conference on Advances in Cryptology --- CRYPTO 2016 - Volume 9816, (563-592)
  209. ACM
    Chen W, Wilson J, Tyree S, Weinberger K and Chen Y Compressing Convolutional Neural Networks in the Frequency Domain Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, (1475-1484)
  210. Xhafa F and Loia V (2016). Guest Editorial for Special Section on Advanced Techniques for Efficient and Reliable Cloud Storage, IEEE Transactions on Computers, 65:8, (2346-2347), Online publication date: 1-Aug-2016.
  211. Wang C, Li J, Ye F and Yang Y (2016). A Mobile Data Gathering Framework for Wireless Rechargeable Sensor Networks with Vehicle Movement Costs and Capacity Constraints, IEEE Transactions on Computers, 65:8, (2411-2427), Online publication date: 1-Aug-2016.
  212. Tumova J and Dimarogonas D (2016). Multi-agent planning under local LTL specifications and event-based synchronization, Automatica (Journal of IFAC), 70:C, (239-248), Online publication date: 1-Aug-2016.
  213. Kanza Y and Yaari H (2016). External sorting on flash storage, The VLDB Journal — The International Journal on Very Large Data Bases, 25:4, (495-518), Online publication date: 1-Aug-2016.
  214. ACM
    Sui X, Lenharth A, Fussell D and Pingali K (2016). Proactive Control of Approximate Programs, ACM SIGARCH Computer Architecture News, 44:2, (607-621), Online publication date: 29-Jul-2016.
  215. ACM
    Bender M, Demaine E, Ebrahimi R, Fineman J, Johnson R, Lincoln A, Lynch J and McCauley S Cache-Adaptive Analysis Proceedings of the 28th ACM Symposium on Parallelism in Algorithms and Architectures, (135-144)
  216. ACM
    Tripathi P, Debnath M and Elmasri R A Direction Based Framework for Trajectory Data Analysis Proceedings of the 9th ACM International Conference on PErvasive Technologies Related to Assistive Environments, (1-8)
  217. Dourado M and Sampaio R (2016). Complexity aspects of the triangle path convexity, Discrete Applied Mathematics, 206:C, (39-47), Online publication date: 19-Jun-2016.
  218. ACM
    Rahul S and Tao Y Efficient Top-k Indexing via General Reductions Proceedings of the 35th ACM SIGMOD-SIGACT-SIGAI Symposium on Principles of Database Systems, (277-288)
  219. ACM
    Elkin M and Solomon S (2016). Fast Constructions of Lightweight Spanners for General Graphs, ACM Transactions on Algorithms, 12:3, (1-21), Online publication date: 15-Jun-2016.
  220. Gonzalez-Lorenzo A, Juda M, Bac A, Mari J and Real P Fast, Simple and Separable Computation of Betti Numbers on Three-Dimensional Cubical Complexes Proceedings of the 6th International Workshop on Computational Topology in Image Context - Volume 9667, (130-139)
  221. ACM
    Sui X, Lenharth A, Fussell D and Pingali K (2016). Proactive Control of Approximate Programs, ACM SIGPLAN Notices, 51:4, (607-621), Online publication date: 9-Jun-2016.
  222. Hu X, Wang M, Leeson M, Di Paolo E and Liu H (2016). Deterministic agent-based path optimization by mimicking the spreading of ripples, Evolutionary Computation, 24:2, (319-346), Online publication date: 1-Jun-2016.
  223. He L, Zhu H and Jarvis S (2016). Developing Graph-Based Co-Scheduling Algorithms on Multicore Computers, IEEE Transactions on Parallel and Distributed Systems, 27:6, (1617-1632), Online publication date: 1-Jun-2016.
  224. Pequito S, Kar S and Aguiar A (2016). Minimum cost input/output design for large-scale linear structural systems, Automatica (Journal of IFAC), 68:C, (384-391), Online publication date: 1-Jun-2016.
  225. ACM
    Salinas S, Luo C, Liao W and Li P Efficient Secure Outsourcing of Large-scale Quadratic Programs Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, (281-292)
  226. ACM
    Zheng H, Yang J and Zhao W (2016). Probabilistic QoS Aggregations for Service Composition, ACM Transactions on the Web, 10:2, (1-36), Online publication date: 25-May-2016.
  227. Averbuch-Elor H, Cohen-Or D and Kopf J Smooth image sequences for data-driven morphing Proceedings of the 37th Annual Conference of the European Association for Computer Graphics, (203-213)
  228. ACM
    Mitra B, Sural S, Vaidya J and Atluri V (2016). A Survey of Role Mining, ACM Computing Surveys, 48:4, (1-37), Online publication date: 2-May-2016.
  229. Ndoye M, Anderson J and Greene D (2016). An MM-Based Algorithm for ${\ell }_{1}$ -Regularized Least-Squares Estimation With an Application to Ground Penetrating Radar Image Reconstruction, IEEE Transactions on Image Processing, 25:5, (2206-2221), Online publication date: 1-May-2016.
  230. Fang S, Liu Y and Ning P (2016). Wireless Communications under Broadband Reactive Jamming Attacks, IEEE Transactions on Dependable and Secure Computing, 13:3, (394-408), Online publication date: 1-May-2016.
  231. Al-Dalky R, Taha K, Homouz D and Qasaimeh M (2016). Applying Monte Carlo simulation to biomedical literature to approximate genetic network, IEEE/ACM Transactions on Computational Biology and Bioinformatics, 13:3, (494-504), Online publication date: 1-May-2016.
  232. Wang H, Li Y, Jin D, Hui P and Wu J (2016). Saving Energy in Partially Deployed Software Defined Networks, IEEE Transactions on Computers, 65:5, (1578-1592), Online publication date: 1-May-2016.
  233. Sigtia S, Benetos E and Dixon S (2016). An end-to-end neural network for polyphonic piano music transcription, IEEE/ACM Transactions on Audio, Speech and Language Processing, 24:5, (927-939), Online publication date: 1-May-2016.
  234. Taheri K, Moradi H, Asadpour M and Parhami P (2016). MVGS, Robotics and Autonomous Systems, 79:C, (72-86), Online publication date: 1-May-2016.
  235. Hu Y and Nie L (2016). An aerial image recognition framework using discrimination and redundancy quality measure, Journal of Visual Communication and Image Representation, 37:C, (53-62), Online publication date: 1-May-2016.
  236. Wen Y (2016). Energy-aware dynamical hosts and tasks assignment for cloud computing, Journal of Systems and Software, 115:C, (144-156), Online publication date: 1-May-2016.
  237. ACM
    Lenharth A, Nguyen D and Pingali K (2016). Parallel graph analytics, Communications of the ACM, 59:5, (78-87), Online publication date: 26-Apr-2016.
  238. Pezoa F, Reutter J, Suarez F, Ugarte M and Vrgoč D Foundations of JSON Schema Proceedings of the 25th International Conference on World Wide Web, (263-273)
  239. Zhang A, Goyal A, Baeza-Yates R, Chang Y, Han J, Gunter C and Deng H Towards Mobile Query Auto-Completion Proceedings of the 25th International Conference on World Wide Web, (579-590)
  240. ACM
    Wu R, Xiao X, Cheung S, Zhang H and Zhang C (2016). Casper: an efficient approach to call trace collection, ACM SIGPLAN Notices, 51:1, (678-690), Online publication date: 8-Apr-2016.
  241. Maugey T, Petrazzuoli G, Frossard P, Cagnazzo M and Pesquet-Popescu B (2016). Reference View Selection in DIBR-Based Multiview Coding, IEEE Transactions on Image Processing, 25:4, (1808-1819), Online publication date: 1-Apr-2016.
  242. ACM
    Sui X, Lenharth A, Fussell D and Pingali K Proactive Control of Approximate Programs Proceedings of the Twenty-First International Conference on Architectural Support for Programming Languages and Operating Systems, (607-621)
  243. ACM
    Hong D, Ma Y, Banerjee S and Mao Z Incremental Deployment of SDN in Hybrid Enterprise and ISP Networks Proceedings of the Symposium on SDN Research, (1-7)
  244. ACM
    Lacassagne L, Cabaret L, Etiemble D, Hebache F and Petreto A A new SIMD iterative connected component labeling algorithm Proceedings of the 3rd Workshop on Programming Models for SIMD/Vector Processing, (1-8)
  245. Liu X, Cao J, Tang S and Wen J (2016). Enabling Reliable and Network-Wide Wakeup in Wireless Sensor Networks, IEEE Transactions on Wireless Communications, 15:3, (2262-2275), Online publication date: 1-Mar-2016.
  246. Colombo F, Cordone R and Lulli G (2016). The multimode covering location problem, Computers and Operations Research, 67:C, (25-33), Online publication date: 1-Mar-2016.
  247. ACM
    Gabow H (2016). The Minset-Poset Approach to Representations of Graph Connectivity, ACM Transactions on Algorithms, 12:2, (1-73), Online publication date: 12-Feb-2016.
  248. Avci M and Najm F (2016). Verification of the Power and Ground Grids Under General and Hierarchical Constraints, IEEE Transactions on Very Large Scale Integration (VLSI) Systems, 24:2, (729-742), Online publication date: 1-Feb-2016.
  249. Bienkowski M, Gąsieniec L, Klonowski M, Korzeniowski M, Mans B, Schmid S and Wattenhofer R (2016). Distributed alarming in the on-duty and off-duty models, IEEE/ACM Transactions on Networking, 24:1, (218-230), Online publication date: 1-Feb-2016.
  250. Iyengar A, Siegel P and Wolf J (2016). On the Capacity of Channels With Timing Synchronization Errors, IEEE Transactions on Information Theory, 62:2, (793-810), Online publication date: 1-Feb-2016.
  251. ACM
    Jakobsen S, Sørensen T and Conitzer V Timeability of Extensive-Form Games Proceedings of the 2016 ACM Conference on Innovations in Theoretical Computer Science, (191-199)
  252. ACM
    Wu R, Xiao X, Cheung S, Zhang H and Zhang C Casper: an efficient approach to call trace collection Proceedings of the 43rd Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, (678-690)
  253. Parter M, Peleg D and Solomon S Local-on-average distributed tasks Proceedings of the twenty-seventh annual ACM-SIAM symposium on Discrete algorithms, (220-239)
  254. ACM
    Yoon J An efficient geometric shape coding and representation approach to obtain both skeleton and contours Proceedings of the 10th International Conference on Ubiquitous Information Management and Communication, (1-8)
  255. Abeywickrama T, Cheema M and Taniar D (2016). k-nearest neighbors on road networks, Proceedings of the VLDB Endowment, 9:6, (492-503), Online publication date: 1-Jan-2016.
  256. Faisal M, Mathkour H and Alsulaiman M (2016). AntStar, Scientific Programming, 2016, (2-2), Online publication date: 1-Jan-2016.
  257. ACM
    Newton R, Fogg P and Varamesh A (2015). Adaptive lock-free maps: purely-functional to scalable, ACM SIGPLAN Notices, 50:9, (218-229), Online publication date: 18-Dec-2015.
  258. ACM
    Chang Y and Garg V (2015). A parallel algorithm for global states enumeration in concurrent systems, ACM SIGPLAN Notices, 50:8, (140-149), Online publication date: 18-Dec-2015.
  259. ACM
    Zhang K, Chen R and Chen H (2015). NUMA-aware graph-structured analytics, ACM SIGPLAN Notices, 50:8, (183-193), Online publication date: 18-Dec-2015.
  260. Korman M, Poon S and Roeloffzen M Line Segment Covering of Cells in Arrangements Proceedings of the 9th International Conference on Combinatorial Optimization and Applications - Volume 9486, (152-162)
  261. Shuai Ma , Liang Duan , Wenfei Fan , Chunming Hu and Wenguang Chen (2015). Extending Conditional Dependencies with Built-in Predicates, IEEE Transactions on Knowledge and Data Engineering, 27:12, (3274-3288), Online publication date: 1-Dec-2015.
  262. Ashlock D and McEachern A (2015). Evolutionary Nonlinear Projection, IEEE Transactions on Evolutionary Computation, 19:6, (857-869), Online publication date: 1-Dec-2015.
  263. Pequito S, Kar S and Aguiar A (2015). On the complexity of the constrained input selection problem for structural linear systems, Automatica (Journal of IFAC), 62:C, (193-199), Online publication date: 1-Dec-2015.
  264. Renugadevi N and Mala C (2015). Pruned nodes in ternary key tree during batch rekeying in group key agreement for cognitive radio ad hoc networks, Security and Communication Networks, 8:18, (4289-4307), Online publication date: 1-Dec-2015.
  265. ACM
    Civit-Flores O and Susín A Fast contact determination for intersecting deformable solids Proceedings of the 8th ACM SIGGRAPH Conference on Motion in Games, (205-214)
  266. ACM
    Yu C, Huang J, Austin W, Xiao B and Biros G Performance optimization for the k-nearest neighbors kernel on x86 architectures Proceedings of the International Conference for High Performance Computing, Networking, Storage and Analysis, (1-12)
  267. ACM
    Elkin M and Solomon S (2015). Optimal Euclidean Spanners, Journal of the ACM, 62:5, (1-45), Online publication date: 2-Nov-2015.
  268. ACM
    Sanders P, Speck J and Steffen R (2015). Work-Efficient Matrix Inversion in Polylogarithmic Time, ACM Transactions on Parallel Computing, 2:3, (1-29), Online publication date: 2-Nov-2015.
  269. Gay G, Staats M, Whalen M and Heimdahl M (2015). Automated Oracle Data Selection Support, IEEE Transactions on Software Engineering, 41:11, (1119-1137), Online publication date: 1-Nov-2015.
  270. Heckel R and Bolcskei H (2015). Robust Subspace Clustering via Thresholding, IEEE Transactions on Information Theory, 61:11, (6320-6342), Online publication date: 1-Nov-2015.
  271. ACM
    Stevens J, Tschirhart P and Jacob B The Semantic Gap Between Software and the Memory System Proceedings of the 2015 International Symposium on Memory Systems, (43-46)
  272. Yun Liang , Xiaolong Xie , Guangyu Sun and Deming Chen (2015). An Efficient Compiler Framework for Cache Bypassing on GPUs, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 34:10, (1677-1690), Online publication date: 1-Oct-2015.
  273. ACM
    Hartert R, Vissicchio S, Schaus P, Bonaventure O, Filsfils C, Telkamp T and Francois P (2015). A Declarative and Expressive Approach to Control Forwarding Paths in Carrier-Grade Networks, ACM SIGCOMM Computer Communication Review, 45:4, (15-28), Online publication date: 22-Sep-2015.
  274. ACM
    Asai H and Ohara Y (2015). Poptrie, ACM SIGCOMM Computer Communication Review, 45:4, (57-70), Online publication date: 22-Sep-2015.
  275. Wang J, Ding X, Lahijanian M, Paschalidis I and Belta C (2015). Temporal logic motion control using actor–critic methods, International Journal of Robotics Research, 34:10, (1329-1344), Online publication date: 1-Sep-2015.
  276. Toni L, Maugey T and Frossard P (2015). Optimized Packet Scheduling in Multiview Video Navigation Systems, IEEE Transactions on Multimedia, 17:9, (1604-1616), Online publication date: 1-Sep-2015.
  277. Hegde C, Indyk P and Schmidt L (2015). Approximation Algorithms for Model-Based Compressive Sensing, IEEE Transactions on Information Theory, 61:9, (5129-5147), Online publication date: 1-Sep-2015.
  278. Boucheron S, Gassiat E and Ohannessian M (2015). About Adaptive Coding on Countable Alphabets: Max-Stable Envelope Classes, IEEE Transactions on Information Theory, 61:9, (4948-4967), Online publication date: 1-Sep-2015.
  279. Seshadri K, Mercy Shalinie S and Kollengode C (2015). Design and evaluation of a parallel algorithm for inferring topic hierarchies, Information Processing and Management: an International Journal, 51:5, (662-676), Online publication date: 1-Sep-2015.
  280. Yu J (2015). A model for tracing cross-referenced statement validity, Computer Standards & Interfaces, 41:C, (10-16), Online publication date: 1-Sep-2015.
  281. ACM
    Newton R, Fogg P and Varamesh A Adaptive lock-free maps: purely-functional to scalable Proceedings of the 20th ACM SIGPLAN International Conference on Functional Programming, (218-229)
  282. ACM
    Hartert R, Vissicchio S, Schaus P, Bonaventure O, Filsfils C, Telkamp T and Francois P A Declarative and Expressive Approach to Control Forwarding Paths in Carrier-Grade Networks Proceedings of the 2015 ACM Conference on Special Interest Group on Data Communication, (15-28)
  283. ACM
    Asai H and Ohara Y Poptrie Proceedings of the 2015 ACM Conference on Special Interest Group on Data Communication, (57-70)
  284. ACM
    Qin L, Li R, Chang L and Zhang C Locally Densest Subgraph Discovery Proceedings of the 21th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, (965-974)
  285. ACM
    Zhang A, Goyal A, Kong W, Deng H, Dong A, Chang Y, Gunter C and Han J adaQAC Proceedings of the 38th International ACM SIGIR Conference on Research and Development in Information Retrieval, (143-152)
  286. ACM
    Prountzos D, Manevich R and Pingali K (2015). Synthesizing parallel graph programs via automated planning, ACM SIGPLAN Notices, 50:6, (533-544), Online publication date: 7-Aug-2015.
  287. Dong Li , Huiling Zhou and Kin-Man Lam (2015). High-resolution face verification using pore-scale facial features, IEEE Transactions on Image Processing, 24:8, (2317-2327), Online publication date: 1-Aug-2015.
  288. Kyungmin Lim , Jaeho Lee , Seongwan Kim and Sangyoun Lee (2015). Fast PU Skip and Split Termination Algorithm for HEVC Intra Prediction, IEEE Transactions on Circuits and Systems for Video Technology, 25:8, (1335-1346), Online publication date: 1-Aug-2015.
  289. Asemani M and Esnaashari M (2015). Learning automata based energy efficient data aggregation in wireless sensor networks, Wireless Networks, 21:6, (2035-2053), Online publication date: 1-Aug-2015.
  290. Werth T, Büttner S and Krumke S (2015). Robust bottleneck routing games, Networks, 66:1, (57-66), Online publication date: 1-Aug-2015.
  291. Qian C, Yu Y and Zhou Z On constrained boolean pareto optimization Proceedings of the 24th International Conference on Artificial Intelligence, (389-395)
  292. ACM
    Mironovich V and Buzdalov M Hard Test Generation for Maximum Flow Algorithms with the Fast Crossover-Based Evolutionary Algorithm Proceedings of the Companion Publication of the 2015 Annual Conference on Genetic and Evolutionary Computation, (1229-1232)
  293. ACM
    Corus D, He J, Jansen T, Oliveto P, Sudholt D and Zarges C On Easiest Functions for Somatic Contiguous Hypermutations And Standard Bit Mutations Proceedings of the 2015 Annual Conference on Genetic and Evolutionary Computation, (1399-1406)
  294. ACM
    Pourhassan M, Gao W and Neumann F Maintaining 2-Approximations for the Dynamic Vertex Cover Problem Using Evolutionary Algorithms Proceedings of the 2015 Annual Conference on Genetic and Evolutionary Computation, (903-910)
  295. ACM
    Schlottfeldt S, Walter M, Timmis J, Carvalho A, Telles M and Diniz-Filho J Using Multi-Objective Artificial Immune Systems to Find Core Collections Based on Molecular Markers Proceedings of the 2015 Annual Conference on Genetic and Evolutionary Computation, (1271-1278)
  296. Carrière M, Oudot S and Ovsjanikov M Stable topological signatures for points on 3D shapes Proceedings of the Eurographics Symposium on Geometry Processing, (1-12)
  297. Lam N, Nguyen T, An M and Huynh D (2015). Dual power assignment optimization and fault tolerance in WSNs, Journal of Combinatorial Optimization, 30:1, (120-138), Online publication date: 1-Jul-2015.
  298. ACM
    Ping D, Sun X and Mao B TextLogger Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks, (1-12)
  299. ACM
    Weissman S, Ayhan S, Bradley J and Lin J Identifying Duplicate and Contradictory Information in Wikipedia Proceedings of the 15th ACM/IEEE-CS Joint Conference on Digital Libraries, (57-60)
  300. ACM
    Green O, Dukhan M and Vuduc R Branch-Avoiding Graph Algorithms Proceedings of the 27th ACM symposium on Parallelism in Algorithms and Architectures, (212-223)
  301. ACM
    Tuncer O, Leung V and Coskun A PaCMap Proceedings of the 29th ACM on International Conference on Supercomputing, (37-46)
  302. ACM
    Prountzos D, Manevich R and Pingali K Synthesizing parallel graph programs via automated planning Proceedings of the 36th ACM SIGPLAN Conference on Programming Language Design and Implementation, (533-544)
  303. Bhattacharya S, Ghrist R and Kumar V (2015). Persistent Homology for Path Planning in Uncertain Environments, IEEE Transactions on Robotics, 31:3, (578-590), Online publication date: 1-Jun-2015.
  304. Bopardikar S, Englot B and Speranzon A (2015). Multiobjective Path Planning: Localization Constraints and Collision Probability, IEEE Transactions on Robotics, 31:3, (562-577), Online publication date: 1-Jun-2015.
  305. Perret B, Cousty J, Tankyevych O, Talbot H and Passat N (2015). Directed Connected Operators: Asymmetric Hierarchies for Image Filtering and Segmentation, IEEE Transactions on Pattern Analysis and Machine Intelligence, 37:6, (1162-1176), Online publication date: 1-Jun-2015.
  306. Yao Y, Cao Q and Vasilakos A (2015). EDAL, IEEE/ACM Transactions on Networking, 23:3, (810-823), Online publication date: 1-Jun-2015.
  307. Karbasi A, Ioannidis S and Massoulie L (2015). From Small-World Networks to Comparison-Based Search, IEEE Transactions on Information Theory, 61:6, (3056-3074), Online publication date: 1-Jun-2015.
  308. Van Britsom D, Bronselaer A and De Tre G (2015). Using Data Merging Techniques for Generating Multidocument Summarizations, IEEE Transactions on Fuzzy Systems, 23:3, (576-592), Online publication date: 1-Jun-2015.
  309. Aubry R, Dey S, Mestreau E, Karamete B and Gayman D (2015). A robust conforming NURBS tessellation for industrial applications based on a mesh generation approach, Computer-Aided Design, 63:C, (26-38), Online publication date: 1-Jun-2015.
  310. ACM
    Hassaan M, Nguyen D and Pingali K (2015). Kinetic Dependence Graphs, ACM SIGARCH Computer Architecture News, 43:1, (457-471), Online publication date: 29-May-2015.
  311. ACM
    Müller I, Sanders P, Lacurie A, Lehner W and Färber F Cache-Efficient Aggregation Proceedings of the 2015 ACM SIGMOD International Conference on Management of Data, (1123-1136)
  312. ACM
    Chang L, Lin X, Qin L, Yu J and Zhang W Index-based Optimal Algorithms for Computing Steiner Components with Maximum Connectivity Proceedings of the 2015 ACM SIGMOD International Conference on Management of Data, (459-474)
  313. ACM
    Zhang Z, Yu J, Qin L and Shang Z Divide & Conquer Proceedings of the 2015 ACM SIGMOD International Conference on Management of Data, (445-458)
  314. ACM
    Chu X, He Y, Chakrabarti K and Ganjam K TEGRA Proceedings of the 2015 ACM SIGMOD International Conference on Management of Data, (1713-1728)
  315. ACM
    Acharya J, Diakonikolas I, Hegde C, Li J and Schmidt L Fast and Near-Optimal Algorithms for Approximating Distributions by Histograms Proceedings of the 34th ACM SIGMOD-SIGACT-SIGAI Symposium on Principles of Database Systems, (249-263)
  316. ACM
    Liu W, Salman E, Sitik C and Taskin B Clock Skew Scheduling in the Presence of Heavily Gated Clock Networks Proceedings of the 25th edition on Great Lakes Symposium on VLSI, (283-288)
  317. ACM
    Hassaan M, Nguyen D and Pingali K (2015). Kinetic Dependence Graphs, ACM SIGPLAN Notices, 50:4, (457-471), Online publication date: 12-May-2015.
  318. ACM
    Chatterjee K, Ibsen-Jensen R, Pavlogiannis A and Goyal P (2015). Faster Algorithms for Algebraic Path Properties in Recursive State Machines with Constant Treewidth, ACM SIGPLAN Notices, 50:1, (97-109), Online publication date: 11-May-2015.
  319. Cogill R and Shrader B (2015). Delay Bounds for Random Linear Coding in Parallel Relay Networks, IEEE Transactions on Mobile Computing, 14:5, (964-974), Online publication date: 1-May-2015.
  320. Tal I and Vardy A (2015). List Decoding of Polar Codes, IEEE Transactions on Information Theory, 61:5, (2213-2226), Online publication date: 1-May-2015.
  321. ACM
    Amma C, Krings T, Böer J and Schultz T Advancing Muscle-Computer Interfaces with High-Density Electromyography Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems, (929-938)
  322. ACM
    Kosmalla F, Daiber F and Krüger A ClimbSense Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems, (2033-2042)
  323. ACM
    Goldner E, Vasconcelos C, Silva P and Gattass M A shortest path algorithm for 2D seismic horizon tracking Proceedings of the 30th Annual ACM Symposium on Applied Computing, (80-85)
  324. Janota M, Lynce I and Marques-Silva J (2015). Algorithms for computing backbones of propositional formulae, AI Communications, 28:2, (161-177), Online publication date: 1-Apr-2015.
  325. Keyu Wang , Xufei Mao and Yunhao Liu (2015). BlindDate: A Neighbor Discovery Protocol, IEEE Transactions on Parallel and Distributed Systems, 26:4, (949-959), Online publication date: 1-Apr-2015.
  326. Grandin M (2015). Data structures and algorithms for high-dimensional structured adaptive mesh refinement, Advances in Engineering Software, 82:C, (75-86), Online publication date: 1-Apr-2015.
  327. Zhang Z, Yu J, Qin L, Chang L and Lin X (2015). I/O efficient, The VLDB Journal — The International Journal on Very Large Data Bases, 24:2, (245-270), Online publication date: 1-Apr-2015.
  328. ACM
    Ewetz R and Koh C A Useful Skew Tree Framework for Inserting Large Safety Margins Proceedings of the 2015 Symposium on International Symposium on Physical Design, (85-92)
  329. ACM
    Wu P, Lin M, Li X and Ho T Common-Centroid FinFET Placement Considering the Impact of Gate Misalignment Proceedings of the 2015 Symposium on International Symposium on Physical Design, (25-31)
  330. ACM
    Hassaan M, Nguyen D and Pingali K Kinetic Dependence Graphs Proceedings of the Twentieth International Conference on Architectural Support for Programming Languages and Operating Systems, (457-471)
  331. Yanovich D (2015). Compact representation of polynomials for algorithms for computing Gröbner and involutive bases, Programming and Computing Software, 41:2, (126-130), Online publication date: 1-Mar-2015.
  332. Greco S, Spezzano F and Trubitsyna I (2015). Checking Chase Termination: Cyclicity Analysis and Rewriting Techniques, IEEE Transactions on Knowledge and Data Engineering, 27:3, (621-635), Online publication date: 1-Mar-2015.
  333. Xiongbin Rao and Lau V (2015). Minimization of CSI Feedback Dimension for Interference Alignment in MIMO Interference Multicast Networks, IEEE Transactions on Information Theory, 61:3, (1218-1246), Online publication date: 1-Mar-2015.
  334. Mozerov M and van de Weijer J (2015). Accurate Stereo Matching by Two-Step Energy Minimization, IEEE Transactions on Image Processing, 24:3, (1153-1163), Online publication date: 1-Mar-2015.
  335. Sheng Zhang , Jie Wu and Sanglu Lu (2015). Collaborative Mobile Charging, IEEE Transactions on Computers, 64:3, (654-667), Online publication date: 1-Mar-2015.
  336. Isaiah P and Shima T (2015). Motion planning algorithms for the Dubins Travelling Salesperson Problem, Automatica (Journal of IFAC), 53:C, (247-255), Online publication date: 1-Mar-2015.
  337. Kuhlman C, Anil Kumar V, Marathe M, Ravi S and Rosenkrantz D (2015). Inhibiting diffusion of complex contagions in social networks: theoretical and experimental results, Data Mining and Knowledge Discovery, 29:2, (423-465), Online publication date: 1-Mar-2015.
  338. Ruiz-Rivera A, Chin K and Soh S (2015). A novel framework to mitigate the negative impacts of green techniques on BGP, Journal of Network and Computer Applications, 48:C, (22-34), Online publication date: 1-Feb-2015.
  339. ACM
    Chang Y and Garg V A parallel algorithm for global states enumeration in concurrent systems Proceedings of the 20th ACM SIGPLAN Symposium on Principles and Practice of Parallel Programming, (140-149)
  340. ACM
    Zhang K, Chen R and Chen H NUMA-aware graph-structured analytics Proceedings of the 20th ACM SIGPLAN Symposium on Principles and Practice of Parallel Programming, (183-193)
  341. ACM
    Nair A, Eyerman S, Chen J, John L and Eeckhout L (2015). Mechanistic Modeling of Architectural Vulnerability Factor, ACM Transactions on Computer Systems, 32:4, (1-32), Online publication date: 20-Jan-2015.
  342. ACM
    Chatterjee K, Ibsen-Jensen R, Pavlogiannis A and Goyal P Faster Algorithms for Algebraic Path Properties in Recursive State Machines with Constant Treewidth Proceedings of the 42nd Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, (97-109)
  343. ACM
    Chilukuri S and Sahoo A Delay-aware TDMA Scheduling for Multi-Hop Wireless Networks Proceedings of the 2015 International Conference on Distributed Computing and Networking, (1-10)
  344. Chang L, Lin X, Zhang W, Yu J, Zhang Y and Qin L (2015). Optimal enumeration, Proceedings of the VLDB Endowment, 8:5, (533-544), Online publication date: 1-Jan-2015.
  345. Arellano-Vázquez M, Benítez-Pérez H and Ortega-Arjona J (2015). A consensus routing algorithm for mobile distributed systems, International Journal of Distributed Sensor Networks, 2015, (6-6), Online publication date: 1-Jan-2015.
  346. Junhui Hou , Lap-Pui Chau , Magnenat-Thalmann N and Ying He (2015). Compressing 3-D Human Motions via Keyframe-Based Geometry Videos, IEEE Transactions on Circuits and Systems for Video Technology, 25:1, (51-62), Online publication date: 1-Jan-2015.
  347. Chłopkowski M and Walkowiak R (2015). A general purpose lossless data compression method for GPU, Journal of Parallel and Distributed Computing, 75:C, (40-52), Online publication date: 1-Jan-2015.
  348. ACM
    Raravi G and Nélis V (2014). Task Assignment Algorithms for Heterogeneous Multiprocessors, ACM Transactions on Embedded Computing Systems, 13:5s, (1-26), Online publication date: 15-Dec-2014.
  349. Ding W, Guttman D and Kandemir M Compiler Support for Optimizing Memory Bank-Level Parallelism Proceedings of the 47th Annual IEEE/ACM International Symposium on Microarchitecture, (571-582)
  350. ACM
    Kim H, Han D, Hong S and Ha J (2014). Message blinding method requiring no multiplicative inversion for RSA, ACM Transactions on Embedded Computing Systems, 13:4, (1-10), Online publication date: 5-Dec-2014.
  351. ACM
    Bhattacharyya S and Mukhopadhyay J Couplet supertree by equivalence partitioning of taxa set and DAG formation Proceedings of the 5th ACM Conference on Bioinformatics, Computational Biology, and Health Informatics, (259-268)
  352. ACM
    Gardner A and Unger J Depends Proceedings of the Fourth Symposium on Digital Production, (19-24)
  353. ACM
    Li C, Amagasa T, Kitagawa H and Srivastava G Label-bag based Graph Anonymization via Edge Addition Proceedings of the 2014 International C* Conference on Computer Science & Software Engineering, (1-9)
  354. Wang G, Allen R, Andrade H and Sangiovanni-Vincentelli A (2014). Communication storage optimization for static dataflow with access patterns under periodic scheduling and throughput constraint, Computers and Electrical Engineering, 40:6, (1858-1873), Online publication date: 1-Aug-2014.
  355. Rafea Ahmed Z, Subramaniam S, Ahmad Zukarnain Z and Othman M (2014). Best Minimum Summation Scheduler for Long Term Evolution, Wireless Personal Communications: An International Journal, 77:3, (2271-2289), Online publication date: 1-Aug-2014.
  356. Fan X, Malone B and Yuan C Finding optimal Bayesian network structures with constraints learned from data Proceedings of the Thirtieth Conference on Uncertainty in Artificial Intelligence, (200-209)
  357. ACM
    Rahat A, Everson R and Fieldsend J Multi-objective routing optimisation for battery-powered wireless sensor mesh networks Proceedings of the 2014 Annual Conference on Genetic and Evolutionary Computation, (1175-1182)
  358. Sampath P (2014). An elementary theory of product-line variations, Formal Aspects of Computing, 26:4, (695-727), Online publication date: 1-Jul-2014.
  359. ACM
    Nilakant K, Dalibard V, Roy A and Yoneki E PrefEdge Proceedings of International Conference on Systems and Storage, (1-12)
  360. Respondek J Dynamic Data Structures in the Incremental Algorithms Operating on a Certain Class of Special Matrices Proceedings of the 14th International Conference on Computational Science and Its Applications — ICCSA 2014 - Volume 8584, (171-185)
  361. ACM
    Tao Y A dynamic I/O-efficient structure for one-dimensional top-k range reporting Proceedings of the 33rd ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems, (256-265)
  362. ACM
    Istvan Z, Woods L and Alonso G Histograms as a side effect of data movement for big data Proceedings of the 2014 ACM SIGMOD International Conference on Management of Data, (1567-1578)
  363. Günther D, Salmon J and Tierny J Mandatory critical points of 2D uncertain scalar fields Proceedings of the 16th Eurographics Conference on Visualization, (31-40)
  364. ACM
    Wang S, Wang Y and Wenger R The JS-graphs of Join and Split Trees Proceedings of the thirtieth annual symposium on Computational geometry, (539-548)
  365. ACM
    Huang P, Chang Y, Lam K, Wang J and Huang C (2014). Garbage Collection for Multiversion Index in Flash-Based Embedded Databases, ACM Transactions on Design Automation of Electronic Systems, 19:3, (1-27), Online publication date: 1-Jun-2014.
  366. ACM
    Kozhikkottu V, Pan A, Pai V, Dey S and Raghunathan A Variation Aware Cache Partitioning for Multithreaded Programs Proceedings of the 51st Annual Design Automation Conference, (1-6)
  367. ACM
    Lin C, Liu C, Chen I, Lee D and Ho T An Efficient Bi-criteria Flow Channel Routing Algorithm For Flow-based Microfluidic Biochips Proceedings of the 51st Annual Design Automation Conference, (1-6)
  368. ACM
    Ottenwälder B, Koldehofe B, Rothermel K, Hong K and Ramachandran U RECEP Proceedings of the 8th ACM International Conference on Distributed Event-Based Systems, (59-70)
  369. ACM
    Javed M and Zdun U A systematic literature review of traceability approaches between software architecture and source code Proceedings of the 18th International Conference on Evaluation and Assessment in Software Engineering, (1-10)
  370. ACM
    Behjati R, Nejati S and Briand L (2014). Architecture-Level Configuration of Large-Scale Embedded Software Systems, ACM Transactions on Software Engineering and Methodology, 23:3, (1-43), Online publication date: 1-May-2014.
  371. He L, Kong L, Lin S, Ying S, Gu Y, He T and Liu C Reconfiguration-Assisted Charging in Large-Scale Lithium-Ion Battery Systems ICCPS '14: ACM/IEEE 5th International Conference on Cyber-Physical Systems (with CPS Week 2014), (60-71)
  372. ACM
    Zhou J, Tewari M, Zhu M, Kabbani A, Poutievski L, Singh A and Vahdat A WCMP Proceedings of the Ninth European Conference on Computer Systems, (1-14)
  373. Baranowski K, Koszałka L, Poźniak-Koszałka I and Kasprzak A Ant Colony Optimization Algorithm for Solving the Provider - Modified Traveling Salesman Problem Proceedings, Part I, of the 6th Asian Conference on Intelligent Information and Database Systems - Volume 8397, (493-502)
  374. Nilsson M, Kvarnström J and Doherty P Revisiting Classical Dynamic Controllability Revised Selected Papers of the 6th International Conference on Agents and Artificial Intelligence - Volume 8946, (243-261)
  375. ACM
    Arshad M, Kundu A, Bertino E, Madhavan K and Ghafoor A Security of graph data Proceedings of the 4th ACM conference on Data and application security and privacy, (223-234)
  376. ACM
    Francès G, Bai X, Cambazoglu B and Baeza-Yates R Improving the efficiency of multi-site web search engines Proceedings of the 7th ACM international conference on Web search and data mining, (3-12)
  377. Healy P and Ju A An Experimental Analysis of Vertex Coloring Algorithms on Sparse Random Graphs Proceedings of the First International Conference on Applied Algorithms - Volume 8321, (174-186)
  378. Ma L, Agrawal K and Chamberlain R (2014). A memory access model for highly-threaded many-core architectures, Future Generation Computer Systems, 30:C, (202-215), Online publication date: 1-Jan-2014.
  379. Abdallaha H, Amer A and Mathkour H (2014). Performance optimality enhancement algorithm in DDBS (POEA), Computers in Human Behavior, 30, (419-426), Online publication date: 1-Jan-2014.
  380. ACM
    Huang P, Chang Y, Tsao C, Yang M and Hsieh C (2013). Migration-based hybrid cache design for file systems over flash storage devices, ACM SIGAPP Applied Computing Review, 13:4, (8-16), Online publication date: 1-Dec-2013.
  381. Yuan K, Kuo C, Jiang J and Li M Encoding multi-valued functions for symmetry Proceedings of the International Conference on Computer-Aided Design, (771-778)
  382. Xie X, Liang Y, Sun G and Chen D An efficient compiler framework for cache bypassing on GPUs Proceedings of the International Conference on Computer-Aided Design, (516-523)
  383. Cho M, Xiang H, Ren H, Ziegler M and Puri R LatchPlanner Proceedings of the International Conference on Computer-Aided Design, (342-348)
  384. ACM
    Yang X, Zhou Z, Wallace S, Lan Z, Tang W, Coghlan S and Papka M Integrating dynamic pricing of electricity into energy aware scheduling for HPC systems Proceedings of the International Conference on High Performance Computing, Networking, Storage and Analysis, (1-11)
  385. ACM
    Wende F and Steinke T Swendsen-Wang multi-cluster algorithm for the 2D/3D Ising model on Xeon Phi and GPU Proceedings of the International Conference on High Performance Computing, Networking, Storage and Analysis, (1-12)
  386. ACM
    Nakamura L, Cunha A, Estrella J, Santana M and Santana R A comparative analysis of algorithms for dynamic web services composition with quality of service Proceedings of the 19th Brazilian symposium on Multimedia and the web, (217-224)
  387. ACM
    Gudmundsson J, van Kreveld M and Staals F Algorithms for hotspot computation on trajectory data Proceedings of the 21st ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems, (134-143)
  388. ACM
    Nguyen D, Lenharth A and Pingali K A lightweight infrastructure for graph analytics Proceedings of the Twenty-Fourth ACM Symposium on Operating Systems Principles, (456-471)
  389. Yeh S, Su M, Chen H and Lin C (2013). An efficient and secure approach for a cloud collaborative editing, Journal of Network and Computer Applications, 36:6, (1632-1641), Online publication date: 1-Nov-2013.
  390. ACM
    Porter J and Szabó C Partition configuration for real-time systems with dependencies Proceedings of the 21st International conference on Real-Time Networks and Systems, (87-96)
  391. ACM
    Hammar M, Karlsson R and Nilsson B Using maximum coverage to optimize recommendation systems in e-commerce Proceedings of the 7th ACM conference on Recommender systems, (265-272)
  392. Graff D, Richling J and Werner M (2013). Modeling Group Scheduling Problems in Space and Time by Timed Petri Nets, Fundamenta Informaticae, 122:4, (297-313), Online publication date: 1-Oct-2013.
  393. Clemons J, Pellegrini A, Savarese S and Austin T EVA Proceedings of the 2013 International Conference on Compilers, Architectures and Synthesis for Embedded Systems, (1-10)
  394. Schor L, Yang H, Bacivarov I and Thiele L Expandable process networks to efficiently specify and explore task, data, and pipeline parallelism Proceedings of the 2013 International Conference on Compilers, Architectures and Synthesis for Embedded Systems, (1-10)
  395. ACM
    Sharma M, Saha P, Sarcar S and Samanta D Error quantifying metrics for text entry systems augmented with word prediction Proceedings of the 11th Asia Pacific Conference on Computer Human Interaction, (45-54)
  396. ACM
    Beal R, Adjeroh D and Abbasi A The Forward Stem Matrix Proceedings of the International Conference on Bioinformatics, Computational Biology and Biomedical Informatics, (575-584)
  397. ACM
    Piccoli R and Oliveira J Balancing font sizes for flexibility in automated document layout Proceedings of the 2013 ACM symposium on Document engineering, (151-160)
  398. ACM
    Doerr C and Blenn N Metric convergence in social network sampling Proceedings of the 5th ACM workshop on HotPlanet, (45-50)
  399. ACM
    Bai X, Junqueira F and Sengamedu S Exploiting user clicks for automatic seed set generation for entity matching Proceedings of the 19th ACM SIGKDD international conference on Knowledge discovery and data mining, (980-988)
  400. ACM
    Sanders P, Speck J and Steffen R Work-efficient matrix inversion in polylogarithmic time Proceedings of the twenty-fifth annual ACM symposium on Parallelism in algorithms and architectures, (214-221)
  401. ACM
    Corus D, Lehre P and Neumann F The generalized minimum spanning tree problem Proceedings of the 15th annual conference on Genetic and evolutionary computation, (519-526)
  402. Malakar P, George T, Kumar S, Mittal R, Natarajan V, Sabharwal Y, Saxena V and Vadhiyar S (2013). A divide and conquer strategy for scaling weather simulations with multiple regions of interest, Scientific Programming, 21:3-4, (93-107), Online publication date: 1-Jul-2013.
  403. ACM
    Forte D and Srivastava A (2013). Thermal-aware sensor scheduling for distributed estimation, ACM Transactions on Sensor Networks, 9:4, (1-31), Online publication date: 1-Jul-2013.
  404. Gordon K, Ford E and St. John K (2013). Hamiltonian Walks of Phylogenetic Treespaces, IEEE/ACM Transactions on Computational Biology and Bioinformatics, 10:4, (1076-1079), Online publication date: 1-Jul-2013.
  405. ACM
    Deri J, Kar S, Pequito S and Moura J Identifying small subsets of agents for behavior tracking and abnormal event detection in dynamic networks Proceedings of the Workshop on Dynamic Networks Management and Mining, (9-16)
  406. ACM
    Cai Z, Vagena Z, Perez L, Arumugam S, Haas P and Jermaine C Simulation of database-valued markov chains using SimSQL Proceedings of the 2013 ACM SIGMOD International Conference on Management of Data, (637-648)
  407. ACM
    Zhu A, Ma H, Xiao X, Luo S, Tang Y and Zhou S Shortest path and distance queries on road networks Proceedings of the 2013 ACM SIGMOD International Conference on Management of Data, (857-868)
  408. ACM
    Tao Y, Lin W and Xiao X Minimal MapReduce algorithms Proceedings of the 2013 ACM SIGMOD International Conference on Management of Data, (529-540)
  409. ACM
    Zhang Z, Yu J, Qin L, Chang L and Lin X I/O efficient Proceedings of the 2013 ACM SIGMOD International Conference on Management of Data, (181-192)
  410. Thiyagalingam J, Walton S, Duffy B, Trefethen A and Chen M Complexity plots Proceedings of the 15th Eurographics Conference on Visualization, (111-120)
  411. ACM
    Hu J, Kim M and Markov I Taming the complexity of coordinated place and route Proceedings of the 50th Annual Design Automation Conference, (1-7)
  412. ACM
    Zhu X, Huang Z, Cheng H, Cui J and Shen H (2013). Sparse hashing for fast multimedia search, ACM Transactions on Information Systems, 31:2, (1-24), Online publication date: 1-May-2013.
  413. ACM
    Serfass D and Tang P parallel_dp Proceedings of the 51st ACM Southeast Conference, (1-6)
  414. ACM
    Freydenberger D and Kötzing T Fast learning of restricted regular expressions and DTDs Proceedings of the 16th International Conference on Database Theory, (45-56)
  415. ACM
    Nasre R, Burtscher M and Pingali K Atomic-free irregular computations on GPUs Proceedings of the 6th Workshop on General Purpose Processor Using Graphics Processing Units, (96-107)
  416. Swenson B and Riley G Simulating large topologies in ns-3 using BRITE and CUDA driven global routing Proceedings of the 6th International ICST Conference on Simulation Tools and Techniques, (159-166)
  417. Thanh V and Zunino R Splitting for rare event simulation in biochemical systems Proceedings of the 6th International ICST Conference on Simulation Tools and Techniques, (109-118)
  418. Kolesnikov V, Sadeghi A and Schneider T (2013). A systematic approach to practically efficient general two-party secure function evaluation protocols and their modular design, Journal of Computer Security, 21:2, (283-315), Online publication date: 1-Mar-2013.
  419. ACM
    Vasilikos V, Smaragdos G, Strydis C and Sourdis I (2013). Heuristic search for adaptive, defect-tolerant multiprocessor arrays, ACM Transactions on Embedded Computing Systems, 12:1s, (1-23), Online publication date: 1-Mar-2013.
  420. Li Z, Li F, Feng X, Chen C, Huo W and Zhong L Effective fault localization based on minimum debugging frontier set Proceedings of the 2013 IEEE/ACM International Symposium on Code Generation and Optimization (CGO), (1-10)
  421. Pfingsthorn M and Birk A (2013). Simultaneous localization and mapping with multimodal probability distributions, International Journal of Robotics Research, 32:2, (143-171), Online publication date: 1-Feb-2013.
  422. ACM
    Lehre P and Özcan E A runtime analysis of simple hyper-heuristics Proceedings of the twelfth workshop on Foundations of genetic algorithms XII, (97-104)
  423. ACM
    Lacki J and Sankowski P Reachability in graph timelines Proceedings of the 4th conference on Innovations in Theoretical Computer Science, (257-268)
  424. Elkin M and Solomon S Fast constructions of light-weight spanners for general graphs Proceedings of the twenty-fourth annual ACM-SIAM symposium on Discrete algorithms, (513-525)
  425. Karrels D, Peterson G and Mullins B (2013). Large-scale cooperative task distribution on peer-to-peer networks, Web Intelligence and Agent Systems, 11:1, (67-79), Online publication date: 1-Jan-2013.
  426. Turki M, Marrakchi Z, Mehrez H and Abid M (2013). Frequency optimization objective during system prototyping on multi-FPGA platform, International Journal of Reconfigurable Computing, 2013, (9-9), Online publication date: 1-Jan-2013.
  427. Ovaska K, Lyly L, Sahu B, Janne O and Hautaniemi S (2013). Genomic Region Operation Kit for Flexible Processing of Deep Sequencing Data, IEEE/ACM Transactions on Computational Biology and Bioinformatics, 10:1, (200-206), Online publication date: 1-Jan-2013.
  428. Dąbrowski R On architecture warehouses and software intelligence Proceedings of the 4th international conference on Future Generation Information Technology, (251-262)
  429. Petrov T, Feret J and Koeppl H Reconstructing species-based dynamics from reduced stochastic rule-based models Proceedings of the Winter Simulation Conference, (1-15)
  430. Takada M, Inada H, Nakazawa K, Tani S, Iwata M, Sugimoto Y and Nagata S (2012). A High-Speed Drug Interaction Search System for Ease of Use in the Clinical Environment, Journal of Medical Systems, 36:6, (3533-3541), Online publication date: 1-Dec-2012.
  431. ACM
    Prountzos D, Manevich R and Pingali K (2012). Elixir, ACM SIGPLAN Notices, 47:10, (375-394), Online publication date: 15-Nov-2012.
  432. ACM
    Magno G, Comarela G, Saez-Trumper D, Cha M and Almeida V New kid on the block Proceedings of the 2012 Internet Measurement Conference, (159-170)
  433. Matveeva N and Suvorova E Methodology of searching for all shortest routes in NoC Proceedings of the 12th Conference of Open Innovations Association FRUCT, (72-79)
  434. ACM
    Visser W, Geldenhuys J and Dwyer M Green Proceedings of the ACM SIGSOFT 20th International Symposium on the Foundations of Software Engineering, (1-11)
  435. LaFon J, Misra S and Bringhurst J On distributed file tree walk of parallel file systems Proceedings of the International Conference on High Performance Computing, Networking, Storage and Analysis, (1-11)
  436. Malakar P, George T, Kumar S, Mittal R, Natarajan V, Sabharwal Y, Saxena V and Vadhiyar S A divide and conquer strategy for scaling weather simulations with multiple regions of interest Proceedings of the International Conference on High Performance Computing, Networking, Storage and Analysis, (1-11)
  437. Hashemikhabir S, Ayaz E, Kavurucu Y, Can T and Kahveci T (2012). Large-Scale Signaling Network Reconstruction, IEEE/ACM Transactions on Computational Biology and Bioinformatics, 9:6, (1696-1708), Online publication date: 1-Nov-2012.
  438. Nouri M and Ghodsi M (2012). Scheduling tasks with exponential duration on unrelated parallel machines, Discrete Applied Mathematics, 160:16-17, (2462-2473), Online publication date: 1-Nov-2012.
  439. Babenko M (2012). Improved Algorithms for Even Factors and Square-Free Simple b-Matchings, Algorithmica, 64:3, (362-383), Online publication date: 1-Nov-2012.
  440. ACM
    Vatavu R, Anthony L and Wobbrock J Gestures as point clouds Proceedings of the 14th ACM international conference on Multimodal interaction, (273-280)
  441. ACM
    Prountzos D, Manevich R and Pingali K Elixir Proceedings of the ACM international conference on Object oriented programming systems languages and applications, (375-394)
  442. ACM
    Liu Y and Spear M (2012). A lock-free, array-based priority queue, ACM SIGPLAN Notices, 47:8, (323-324), Online publication date: 11-Sep-2012.
  443. ACM
    Blelloch G, Fineman J, Gibbons P and Shun J (2012). Internally deterministic parallel algorithms can be fast, ACM SIGPLAN Notices, 47:8, (181-192), Online publication date: 11-Sep-2012.
  444. ACM
    Prokopec A, Bronson N, Bagwell P and Odersky M (2012). Concurrent tries with efficient non-blocking snapshots, ACM SIGPLAN Notices, 47:8, (151-160), Online publication date: 11-Sep-2012.
  445. ACM
    Merrill D, Garland M and Grimshaw A (2012). Scalable GPU graph traversal, ACM SIGPLAN Notices, 47:8, (117-128), Online publication date: 11-Sep-2012.
  446. Ozgul F and Erdem Z Detecting Criminal Networks Using Social Similarity Proceedings of the 2012 International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2012), (581-585)
  447. ACM
    Yuan Q, Cong G, Sun A, Lin C and Thalmann N Category hierarchy maintenance Proceedings of the 35th international ACM SIGIR conference on Research and development in information retrieval, (791-800)
  448. ACM
    de Kruijf M, Sankaralingam K and Jha S (2012). Static analysis and compiler design for idempotent processing, ACM SIGPLAN Notices, 47:6, (475-486), Online publication date: 6-Aug-2012.
  449. Pradhan P and Panda G (2012). Connectivity constrained wireless sensor deployment using multiobjective evolutionary algorithms and fuzzy decision making, Ad Hoc Networks, 10:6, (1134-1145), Online publication date: 1-Aug-2012.
  450. Cheng J, Shang Z, Cheng H, Wang H and Yu J (2012). K-reach, Proceedings of the VLDB Endowment, 5:11, (1292-1303), Online publication date: 1-Jul-2012.
  451. Avallone S and Ventre G (2012). Energy efficient online routing of flows with additive constraints, Computer Networks: The International Journal of Computer and Telecommunications Networking, 56:10, (2368-2382), Online publication date: 1-Jul-2012.
  452. ACM
    Green O, McColl R and Bader D GPU merge path Proceedings of the 26th ACM international conference on Supercomputing, (331-340)
  453. Chatterjee K and Velner Y Mean-Payoff Pushdown Games Proceedings of the 2012 27th Annual IEEE/ACM Symposium on Logic in Computer Science, (195-204)
  454. Sergey I, Midtgaard J and Clarke D Calculating graph algorithms for dominance and shortest path Proceedings of the 11th international conference on Mathematics of Program Construction, (132-156)
  455. ACM
    Chroni M and Nikolopoulos S Multiple encoding of a watermark number into reducible permutation graphs using cotrees Proceedings of the 13th International Conference on Computer Systems and Technologies, (118-125)
  456. ACM
    Wang T, Srivatsa M and Liu L Fine-grained access control of personal data Proceedings of the 17th ACM symposium on Access Control Models and Technologies, (145-156)
  457. ACM
    de Kruijf M, Sankaralingam K and Jha S Static analysis and compiler design for idempotent processing Proceedings of the 33rd ACM SIGPLAN Conference on Programming Language Design and Implementation, (475-486)
  458. Obraztsova S and Elkind E Optimal manipulation of voting rules Proceedings of the 11th International Conference on Autonomous Agents and Multiagent Systems - Volume 2, (619-626)
  459. Szczepański P, Michalak T and Rahwan T A new approach to betweenness centrality based on the Shapley Value Proceedings of the 11th International Conference on Autonomous Agents and Multiagent Systems - Volume 1, (239-246)
  460. Keidar M and Kaminka G Robot exploration with fast frontier detection Proceedings of the 11th International Conference on Autonomous Agents and Multiagent Systems - Volume 1, (113-120)
  461. ACM
    Ghosal A, Limaye R, Ravindran K, Tripakis S, Prasad A, Wang G, Tran T and Andrade H Static dataflow with access patterns Proceedings of the 49th Annual Design Automation Conference, (656-663)
  462. ACM
    Liu C, Chen I and Lee D An efficient algorithm for multi-layer obstacle-avoiding rectilinear Steiner tree construction Proceedings of the 49th Annual Design Automation Conference, (613-622)
  463. Staats M, Gay G and Heimdahl M Automated oracle creation support, or: how I learned to stop worrying about fault propagation and love mutation testing Proceedings of the 34th International Conference on Software Engineering, (870-880)
  464. ACM
    Martínez-Prieto M, Fernández J and Cánovas R (2012). Querying RDF dictionaries in compressed space, ACM SIGAPP Applied Computing Review, 12:2, (64-77), Online publication date: 1-Jun-2012.
  465. ACM
    Hong S, Chafi H, Sedlar E and Olukotun K (2012). Green-Marl, ACM SIGPLAN Notices, 47:4, (349-362), Online publication date: 1-Jun-2012.
  466. ACM
    Shekhar S, Gunturi V, Evans M and Yang K Spatial big-data challenges intersecting mobility and cloud computing Proceedings of the Eleventh ACM International Workshop on Data Engineering for Wireless and Mobile Access, (1-6)
  467. ACM
    Cheng J, Ke Y, Chu S and Cheng C Efficient processing of distance queries in large graphs Proceedings of the 2012 ACM SIGMOD International Conference on Management of Data, (457-468)
  468. Lee C, Lo S, Chen N, Chung Y and Chung I GPU Performance Enhancement via Communication Cost Reduction Proceedings of the 2012 12th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (ccgrid 2012), (132-139)
  469. ACM
    Li W and Hammond T Using scribble gestures to enhance editing behaviors of sketch recognition systems CHI '12 Extended Abstracts on Human Factors in Computing Systems, (2213-2218)
  470. Sun Z, Wang H, Wang H, Shao B and Li J (2012). Efficient subgraph matching on billion node graphs, Proceedings of the VLDB Endowment, 5:9, (788-799), Online publication date: 1-May-2012.
  471. Dürr C, Queyranne M, Spieksma F, Nobibon F and Woeginger G (2012). The interval ordering problem, Discrete Applied Mathematics, 160:7-8, (1094-1103), Online publication date: 1-May-2012.
  472. Ausiello G, Firmani D and Laura a (2012). Real-time monitoring of undirected networks: Articulation points, bridges, and connected and biconnected components, Networks, 59:3, (275-288), Online publication date: 1-May-2012.
  473. ACM
    Hong S, Chafi H, Sedlar E and Olukotun K (2012). Green-Marl, ACM SIGARCH Computer Architecture News, 40:1, (349-362), Online publication date: 18-Apr-2012.
  474. ACM
    Chang J, Venkatasubramanian K, Enyioha C, Sundaram S, Pappas G and Lee I HMM-based characterization of channel behavior for networked control systems Proceedings of the 1st international conference on High Confidence Networked Systems, (11-20)
  475. ACM
    Ma S, Cao Y, Huai J and Wo T Distributed graph pattern matching Proceedings of the 21st international conference on World Wide Web, (949-958)
  476. Chauhan N, Awasthi L and Chand N (2012). Cache Replacement in Mobile Adhoc Networks, International Journal of Distributed Systems and Technologies, 3:2, (22-38), Online publication date: 1-Apr-2012.
  477. Delling D and Nannicini G (2012). Core Routing on Dynamic Time-Dependent Road Networks, INFORMS Journal on Computing, 24:2, (187-201), Online publication date: 1-Apr-2012.
  478. ACM
    Serfass D and Tang P Comparing parallel performance of Go and C++ TBB on a direct acyclic task graph using a dynamic programming problem Proceedings of the 50th Annual Southeast Regional Conference, (268-273)
  479. ACM
    Zhang Z, Yu J, Qin L, Zhu Q and Zhou X I/O cost minimization Proceedings of the 15th International Conference on Extending Database Technology, (468-479)
  480. ACM
    Su Z, Tung A and Zhang Z Supporting top-K item exchange recommendations in large online communities Proceedings of the 15th International Conference on Extending Database Technology, (97-108)
  481. Higa D and Stefanes M A coarse-grained parallel algorithm for the matrix chain order problem Proceedings of the 2012 Symposium on High Performance Computing, (1-8)
  482. ACM
    Martínez-Prieto M, Fernández J and Cánovas R Compression of RDF dictionaries Proceedings of the 27th Annual ACM Symposium on Applied Computing, (340-347)
  483. ACM
    Cunha T, de Souza F, de A. Araújo A and Pappa G Rushes video summarization based on spatio-temporal features Proceedings of the 27th Annual ACM Symposium on Applied Computing, (45-50)
  484. Liu S, Lee C and Chen H Agglomerative-based flip-flop merging with signal wirelength optimization Proceedings of the Conference on Design, Automation and Test in Europe, (1391-1396)
  485. She D, He Y, Mesman B and Corporaal H Scheduling for register file energy minimization in explicit datapath architectures Proceedings of the Conference on Design, Automation and Test in Europe, (388-393)
  486. ACM
    Hong S, Chafi H, Sedlar E and Olukotun K Green-Marl Proceedings of the seventeenth international conference on Architectural Support for Programming Languages and Operating Systems, (349-362)
  487. Wang B (2012). Output-Sensitive Algorithms for Finding the Nested Common Intervals of Two General Sequences, IEEE/ACM Transactions on Computational Biology and Bioinformatics, 9:2, (548-559), Online publication date: 1-Mar-2012.
  488. ACM
    Ilyas M and Radha H (2012). A dynamic programming approach to maximizing a statistical measure of the lifetime of sensor networks, ACM Transactions on Sensor Networks, 8:2, (1-21), Online publication date: 1-Mar-2012.
  489. ACM
    Ayday E, Delgosha F and Fekri F (2012). Data authenticity and availability in multihop wireless sensor networks, ACM Transactions on Sensor Networks, 8:2, (1-26), Online publication date: 1-Mar-2012.
  490. Andreotti S, Klau G and Reinert K (2012). Antilope—A Lagrangian Relaxation Approach to the de novo Peptide Sequencing Problem, IEEE/ACM Transactions on Computational Biology and Bioinformatics, 9:2, (385-394), Online publication date: 1-Mar-2012.
  491. You B and Yamada T (2012). Shift-and-merge technique for the DP solution of the time-constrained backpacker problem, Computers and Operations Research, 39:3, (664-670), Online publication date: 1-Mar-2012.
  492. Jaho E, Koukoutsidis I, Stavrakakis I and Jaho I (2012). Cooperative content replication in networks with autonomous nodes, Computer Communications, 35:5, (637-647), Online publication date: 1-Mar-2012.
  493. ACM
    Danielsiek H, Paul W and Vahrenhold J Detecting and understanding students' misconceptions related to algorithms and data structures Proceedings of the 43rd ACM technical symposium on Computer Science Education, (21-26)
  494. ACM
    Liu Y and Spear M A lock-free, array-based priority queue Proceedings of the 17th ACM SIGPLAN symposium on Principles and Practice of Parallel Programming, (323-324)
  495. ACM
    Blelloch G, Fineman J, Gibbons P and Shun J Internally deterministic parallel algorithms can be fast Proceedings of the 17th ACM SIGPLAN symposium on Principles and Practice of Parallel Programming, (181-192)
  496. ACM
    Prokopec A, Bronson N, Bagwell P and Odersky M Concurrent tries with efficient non-blocking snapshots Proceedings of the 17th ACM SIGPLAN symposium on Principles and Practice of Parallel Programming, (151-160)
  497. ACM
    Merrill D, Garland M and Grimshaw A Scalable GPU graph traversal Proceedings of the 17th ACM SIGPLAN symposium on Principles and Practice of Parallel Programming, (117-128)
  498. ACM
    Chin S and Chow P OpenCL memory infrastructure for FPGAs (abstract only) Proceedings of the ACM/SIGDA international symposium on Field Programmable Gate Arrays, (269-270)
  499. ACM
    Myung J and Lee S Matrix chain multiplication via multi-way join algorithms in MapReduce Proceedings of the 6th International Conference on Ubiquitous Information Management and Communication, (1-5)
  500. Wang B, Ye J and Chen P On the round-trip 1-center and 1-median problems Proceedings of the 6th international conference on Algorithms and computation, (100-111)
  501. ACM
    Najork M, Fetterly D, Halverson A, Kenthapadi K and Gollapudi S Of hammers and nails Proceedings of the fifth ACM international conference on Web search and data mining, (103-112)
  502. Steinbrecher J and Shang W On supernode transformations and multithreading for the longest common subsequence problem Proceedings of the Tenth Australasian Symposium on Parallel and Distributed Computing - Volume 127, (3-12)
  503. ACM
    Raghavan P, Fosler-Lussier E, Brew C and Lai A Medical event coreference resolution using the UMLS metathesaurus and temporal reasoning Proceedings of the 2nd ACM SIGHIT International Health Informatics Symposium, (465-472)
  504. Goodrich M, Mitzenmacher M, Ohrimenko O and Tamassia R Privacy-preserving group data access via stateless oblivious RAM simulation Proceedings of the twenty-third annual ACM-SIAM symposium on Discrete algorithms, (157-167)
  505. De Cristofaro E and Di Pietro R Preserving query privacy in urban sensing systems Proceedings of the 13th international conference on Distributed Computing and Networking, (218-233)
  506. Afek Y, Avni H and Shavit N Towards consistency oblivious programming Proceedings of the 15th international conference on Principles of Distributed Systems, (65-79)
  507. Mozgovoy M Behavior capture with acting graph Proceedings of the 7th international conference on Databases in Networked Information Systems, (68-77)
  508. Leea H and Shimb J (2011). Indexing method for transitive relationships of product information, Web Intelligence and Agent Systems, 9:4, (351-362), Online publication date: 1-Dec-2011.
  509. Ma S, Cao Y, Fan W, Huai J and Wo T (2011). Capturing topology in graph pattern matching, Proceedings of the VLDB Endowment, 5:4, (310-321), Online publication date: 1-Dec-2011.
  510. ACM
    Goodrich M (2011). Randomized Shellsort, Journal of the ACM, 58:6, (1-26), Online publication date: 1-Dec-2011.
  511. Kumar R and Banerjee N (2011). Multiobjective network topology design, Applied Soft Computing, 11:8, (5120-5128), Online publication date: 1-Dec-2011.
  512. Elalouf A, Levner E and Cheng T Computing mobile agent routes with node-wise constraints in distributed communication systems Proceedings of the 10th Mexican international conference on Advances in Artificial Intelligence - Volume Part I, (76-87)
  513. Ochoa-Luna J, Revoredo K and Cozman F Learning probabilistic description logics Proceedings of the 10th Mexican international conference on Advances in Artificial Intelligence - Volume Part I, (28-39)
  514. ACM
    Niederbrucker G and Gansterer W A fast solver for modeling the evolution of virus populations Proceedings of 2011 International Conference for High Performance Computing, Networking, Storage and Analysis, (1-11)
  515. ACM
    Wang Z, Nascimento M and MacGregor M Towards end-to-end routing for periodic mobile objects Proceedings of the first ACM international symposium on Design and analysis of intelligent vehicular networks and applications, (61-68)
  516. ACM
    Ghandeharizadeh S and Shayandeh S (2011). Domical cooperative caching for streaming media in wireless home networks, ACM Transactions on Multimedia Computing, Communications, and Applications, 7:4, (1-17), Online publication date: 1-Nov-2011.
  517. ACM
    Santini S (2011). Efficient computation of queries on feature streams, ACM Transactions on Multimedia Computing, Communications, and Applications, 7:4, (1-22), Online publication date: 1-Nov-2011.
  518. ACM
    Reichinger A, Maierhofer S and Purgathofer W (2011). High-quality tactile paintings, Journal on Computing and Cultural Heritage , 4:2, (1-13), Online publication date: 1-Nov-2011.
  519. Lu Y, Behar E, Donnelly S, Lien J, Camelli F and Wong D (2011). Fast and robust generation of city-scale seamless 3D urban models, Computer-Aided Design, 43:11, (1380-1390), Online publication date: 1-Nov-2011.
  520. Belohlavek R, Osička P and Vychodil V Factorizing three-way ordinal data using triadic formal concepts Proceedings of the 9th international conference on Flexible Query Answering Systems, (400-411)
  521. ACM
    Cao H, Candan K and Sapino M Skynets Proceedings of the 20th ACM international conference on Information and knowledge management, (1775-1784)
  522. ACM
    Bjørklund T, Götz M, Gehrke J and Grimsmo N Workload-aware indexing for keyword search in social networks Proceedings of the 20th ACM international conference on Information and knowledge management, (535-544)
  523. ACM
    Pu Y, Bodik R and Srivastava S Synthesis of first-order dynamic programming algorithms Proceedings of the 2011 ACM international conference on Object oriented programming systems languages and applications, (83-98)
  524. ACM
    Laoutaris N, Sirivianos M, Yang X and Rodriguez P (2011). Inter-datacenter bulk transfers with netstitcher, ACM SIGCOMM Computer Communication Review, 41:4, (74-85), Online publication date: 22-Oct-2011.
  525. Chakraborty R, Narasimhan S and Bhunia S Embedded software security through key-based control flow obfuscation Proceedings of the First international conference on Security aspects in information technology, (30-44)
  526. ACM
    Pu Y, Bodik R and Srivastava S (2011). Synthesis of first-order dynamic programming algorithms, ACM SIGPLAN Notices, 46:10, (83-98), Online publication date: 18-Oct-2011.
  527. Sacha K Trust management languages and complexity Proceedings of the 2011th Confederated international conference on On the move to meaningful internet systems - Volume Part II, (588-604)
  528. Wang H and Chen K Approximate point set pattern matching with Lp-norm Proceedings of the 18th international conference on String processing and information retrieval, (81-86)
  529. Klus$#225;ček D and Rudov$#225; H Efficient data representation of large job schedules Proceedings of the 7th international conference on Mathematical and Engineering Methods in Computer Science, (103-113)
  530. Zou L, Peng P and Zhao D Top-K possible shortest path query over a large uncertain graph Proceedings of the 12th international conference on Web information system engineering, (72-86)
  531. Kemmerich T and Büning H On the power of global reward signals in reinforcement learning Proceedings of the 9th German conference on Multiagent system technologies, (53-64)
  532. Chen X, Ge K, Chen Z and Li J AC-Suffix-Tree Proceedings of the 2011 ACM/IEEE Seventh Symposium on Architectures for Networking and Communications Systems, (36-44)
  533. ACM
    Jiang Y, Tian F, Zhang X, Dai G and Wang H (2011). Understanding, Manipulating and Searching Hand-Drawn Concept Maps, ACM Transactions on Intelligent Systems and Technology, 3:1, (1-21), Online publication date: 1-Oct-2011.
  534. ACM
    Shakarian P, Subrahmanian V and Sapino M (2011). GAPs, ACM Transactions on Intelligent Systems and Technology, 3:1, (1-27), Online publication date: 1-Oct-2011.
  535. ACM
    Yan J (2011). IO connection assignment and RDL routing for flip-chip designs, ACM Transactions on Design Automation of Electronic Systems, 16:4, (1-20), Online publication date: 1-Oct-2011.
  536. ACM
    Skopal T and Bustos B (2011). On nonmetric similarity search problems in complex domains, ACM Computing Surveys, 43:4, (1-50), Online publication date: 1-Oct-2011.
  537. ACM
    Wang B (2011). Coverage problems in sensor networks, ACM Computing Surveys, 43:4, (1-53), Online publication date: 1-Oct-2011.
  538. Wu S, Zhu Y and Pu Q (2010). A novel lightweight authentication scheme with anonymity for roaming service in global mobility networks, International Journal of Network Management, 21:5, (384-401), Online publication date: 1-Oct-2011.
  539. Wang X and Zhu D Efficient solutions for a problem in currency systems Proceedings of the Third international conference on Artificial intelligence and computational intelligence - Volume Part I, (171-178)
  540. ACM
    Li Y, Su G, Hui P, Jin D, Su L and Zeng L Multiple mobile data offloading through delay tolerant networks Proceedings of the 6th ACM workshop on Challenged networks, (43-48)
  541. Berral J, Gavalda R and Torres J Adaptive Scheduling on Power-Aware Managed Data-Centers Using Machine Learning Proceedings of the 2011 IEEE/ACM 12th International Conference on Grid Computing, (66-73)
  542. Haugland D, Eleyat M and Hetland M The maximum flow problem with minimum lot sizes Proceedings of the Second international conference on Computational logistics, (170-182)
  543. ACM
    Baldoni R, Di Luna G, Firmani D and Lodi G A model for continuous query latencies in data streams Proceedings of the First International Workshop on Algorithms and Models for Distributed Event Processing, (20-26)
  544. ACM
    Hassaan M, Burtscher M and Pingali K (2011). Ordered vs. unordered, ACM SIGPLAN Notices, 46:8, (3-12), Online publication date: 7-Sep-2011.
  545. Zhao M, Li J and Yang Y Joint mobile energy replenishment and data gathering in wireless rechargeable sensor networks Proceedings of the 23rd International Teletraffic Congress, (238-245)
  546. ACM
    Williams P, Sion R and Sotakova M (2011). Practical Oblivious Outsourced Storage, ACM Transactions on Information and System Security, 14:2, (1-28), Online publication date: 1-Sep-2011.
  547. ACM
    Moran S, Snir S and Sung W (2011). Partial convex recolorings of trees and galled networks, ACM Transactions on Algorithms, 7:4, (1-20), Online publication date: 1-Sep-2011.
  548. Tan G, Liu P, Bu D and Liu Y (2011). Revisiting multiple pattern matching algorithms for multi-core architecture, Journal of Computer Science and Technology, 26:5, (866-874), Online publication date: 1-Sep-2011.
  549. Cordasco G, De Chiara R and Rosenberg A Assessing the computational benefits of AREA-oriented DAG-scheduling Proceedings of the 17th international conference on Parallel processing - Volume Part I, (180-192)
  550. Oliver D and Steinberger D From geography to medicine Proceedings of the 12th international conference on Advances in spatial and temporal databases, (467-470)
  551. Zhang D, Chow C, Li Q, Zhang X and Xu Y Efficient evaluation of k-NN queries using spatial mashups Proceedings of the 12th international conference on Advances in spatial and temporal databases, (348-366)
  552. ACM
    Laoutaris N, Sirivianos M, Yang X and Rodriguez P Inter-datacenter bulk transfers with netstitcher Proceedings of the ACM SIGCOMM 2011 conference, (74-85)
  553. O'Neil S, Chaudhary A, Chen D and Wang H The topology aware file distribution problem Proceedings of the 17th annual international conference on Computing and combinatorics, (366-378)
  554. Cho C, Babić D, Poosankam P, Chen K, Wu E and Song D MACE Proceedings of the 20th USENIX conference on Security, (10-10)
  555. Lê D (2011). On Three Alternative Characterizations of Combined Traces, Fundamenta Informaticae, 113:3-4, (265-293), Online publication date: 1-Aug-2011.
  556. Mo D and Huang S (2011). Feature selection based on inference correlation, Intelligent Data Analysis, 15:3, (375-398), Online publication date: 1-Aug-2011.
  557. ACM
    Corless R, Postma E and Stoutemyer D (2011). Rounding coefficients and artificially underflowing terms in non-numeric expressions, ACM Communications in Computer Algebra, 45:1/2, (17-48), Online publication date: 25-Jul-2011.
  558. ACM
    Zhang D, Wang F and Si L Composite hashing with multiple information sources Proceedings of the 34th international ACM SIGIR conference on Research and development in Information Retrieval, (225-234)
  559. ACM
    Sauthoff G, Janssen S and Giegerich R Bellman's GAP Proceedings of the 13th international ACM SIGPLAN symposium on Principles and practices of declarative programming, (29-40)
  560. ACM
    Arcuri A and Briand L Adaptive random testing Proceedings of the 2011 International Symposium on Software Testing and Analysis, (265-275)
  561. Babić D, Reynaud D and Song D Malware analysis with tree automata inference Proceedings of the 23rd international conference on Computer aided verification, (116-131)
  562. ACM
    Lehre P Fitness-levels for non-elitist populations Proceedings of the 13th annual conference on Genetic and evolutionary computation, (2075-2082)
  563. ACM
    Neumann F, Oliveto P, Rudolph G and Sudholt D On the effectiveness of crossover for migration in parallel evolutionary algorithms Proceedings of the 13th annual conference on Genetic and evolutionary computation, (1587-1594)
  564. Nguyen P, Wu H and Wang H Improving the algorithm 2 in multidimensional linear cryptanalysis Proceedings of the 16th Australasian conference on Information security and privacy, (61-74)
  565. Ozgul F, Celik A, Atzenbeck C and Erdem Z Specific similarity measure for terrorist networks Proceedings of the 6th Pacific Asia conference on Intelligence and security informatics, (15-26)
  566. Lokshtanov D and Marx D Clustering with local restrictions Proceedings of the 38th international colloquim conference on Automata, languages and programming - Volume Part I, (785-797)
  567. Singh S, Janoos F, Pécot T, Caserta E, Leone G, Rittscher J and Machiraju R Identifying nuclear phenotypes using semi-supervised metric learning Proceedings of the 22nd international conference on Information processing in medical imaging, (398-410)
  568. ACM
    Khuller S, Malekian A and Mestre J (2011). To fill or not to fill, ACM Transactions on Algorithms, 7:3, (1-16), Online publication date: 1-Jul-2011.
  569. Chen L and Fu B (2011). Linear and sublinear time algorithms for the basis of abelian groups, Theoretical Computer Science, 412:32, (4110-4122), Online publication date: 1-Jul-2011.
  570. Danylenko A, Kessler C and Löwe W Comparing machine learning approaches for context-aware composition Proceedings of the 10th international conference on Software composition, (18-33)
  571. Cantone D, Cristofaro S and Faro S Efficient matching of biological sequences allowing for non-overlapping inversions Proceedings of the 22nd annual conference on Combinatorial pattern matching, (364-375)
  572. Liu H, Komandur R and Verspoor K From graphs to events Proceedings of the BioNLP Shared Task 2011 Workshop, (164-172)
  573. Quirk C, Choudhury P, Gamon M and Vanderwende L MSR-NLP entry in BioNLP Shared Task 2011 Proceedings of the BioNLP Shared Task 2011 Workshop, (155-163)
  574. Kunigami G, de Rezende P, de Souza C and Yunes T Optimizing the layout of proportional symbol maps Proceedings of the 2011 international conference on Computational science and its applications - Volume Part III, (1-16)
  575. Airola A, Pahikkala T and Salakoski T An improved training algorithm for the linear ranking support vector machine Proceedings of the 21th international conference on Artificial neural networks - Volume Part I, (134-141)
  576. Carrabs F, Cerulli R, Gentili M and Parlato G A Tabu search heuristic based on k-diamonds for the weighted feedback vertex set problem Proceedings of the 5th international conference on Network optimization, (589-602)
  577. ACM
    Abam M, Aronov B, De Berg M and Khosravi A Approximation algorithms for computing partitions with minimum stabbing number of rectilinear and simple polygons Proceedings of the twenty-seventh annual symposium on Computational geometry, (407-416)
  578. ACM
    Chen C and Kerber M An output-sensitive algorithm for persistent homology Proceedings of the twenty-seventh annual symposium on Computational geometry, (207-216)
  579. ACM
    Hershberger J Stable snap rounding Proceedings of the twenty-seventh annual symposium on Computational geometry, (197-206)
  580. ACM
    Fan W, Li J, Ma S, Tang N and Yu W Interaction between record matching and data repairing Proceedings of the 2011 ACM SIGMOD International Conference on Management of data, (469-480)
  581. ACM
    Tao Y, Sheng C and Pei J On k-skip shortest paths Proceedings of the 2011 ACM SIGMOD International Conference on Management of data, (421-432)
  582. ACM
    Basu Roy S and Chakrabarti K Location-aware type ahead search on spatial databases Proceedings of the 2011 ACM SIGMOD International Conference on Management of data, (361-372)
  583. ACM
    Herodotou H, Borisov N and Babu S Query optimization techniques for partitioned tables Proceedings of the 2011 ACM SIGMOD International Conference on Management of data, (49-60)
  584. ACM
    Sistla A, Wolfson O, Xu B and Rishe N Answer-pairs and processing of continuous nearest-neighbor queries Proceedings of the 7th ACM ACM SIGACT/SIGMOBILE International Workshop on Foundations of Mobile Computing, (16-24)
  585. Kurosawa K, Nojima R and Phong L Generic fully simulatable adaptive oblivious transfer Proceedings of the 9th international conference on Applied cryptography and network security, (274-291)
  586. Huang J and Tanaka Y QoS routing algorithms using fully polynomial time approximation scheme Proceedings of the Nineteenth International Workshop on Quality of Service, (1-3)
  587. Liang Y, Chang B and Lin Y Solve tree setup-break problem and minimize control overhead in delay-bounded distributed wireless multicast QoS routing Proceedings of the Nineteenth International Workshop on Quality of Service, (1-3)
  588. ACM
    Liu X, Zhang Y, Yeap G and Zeng X An integrated algorithm for 3D-IC TSV assignment Proceedings of the 48th Design Automation Conference, (652-657)
  589. ACM
    Pingali K, Nguyen D, Kulkarni M, Burtscher M, Hassaan M, Kaleem R, Lee T, Lenharth A, Manevich R, Méndez-Lojo M, Prountzos D and Sui X The tao of parallelism in algorithms Proceedings of the 32nd ACM SIGPLAN Conference on Programming Language Design and Implementation, (12-25)
  590. ACM
    Pingali K, Nguyen D, Kulkarni M, Burtscher M, Hassaan M, Kaleem R, Lee T, Lenharth A, Manevich R, Méndez-Lojo M, Prountzos D and Sui X (2011). The tao of parallelism in algorithms, ACM SIGPLAN Notices, 46:6, (12-25), Online publication date: 4-Jun-2011.
  591. ACM
    Blelloch G, Fineman J, Gibbons P and Simhadri H Scheduling irregular parallel computations on hierarchical caches Proceedings of the twenty-third annual ACM symposium on Parallelism in algorithms and architectures, (355-366)
  592. Broadie M, Du Y and Moallemi C (2011). Efficient Risk Estimation via Nested Sequential Simulation, Management Science, 57:6, (1172-1194), Online publication date: 1-Jun-2011.
  593. ACM
    Hsu C, Pino J and Bhattacharyya S (2011). Multithreaded Simulation for Synchronous Dataflow Graphs, ACM Transactions on Design Automation of Electronic Systems, 16:3, (1-23), Online publication date: 1-Jun-2011.
  594. ACM
    Tomazic S, Pavlovic V, Milovanovic J, Sodnik J, Kos A, Stancin S and Milutinovic V (2011). Fast file existence checking in archiving systems, ACM Transactions on Storage, 7:1, (1-21), Online publication date: 1-Jun-2011.
  595. ACM
    Chang Y, Hsu P, Lu Y and Kuo T (2011). A driver-layer caching policy for removable storage devices, ACM Transactions on Storage, 7:1, (1-23), Online publication date: 1-Jun-2011.
  596. Sung Y, Sun X, Rao S, Xie G and Maltz D (2011). Towards systematic design of enterprise networks, IEEE/ACM Transactions on Networking, 19:3, (695-708), Online publication date: 1-Jun-2011.
  597. Xian C, Gao S and Zhang T (2011). SMI 2011, Computers and Graphics, 35:3, (461-470), Online publication date: 1-Jun-2011.
  598. Máčajová E and Mazák J An algorithm for optimal acyclic edge-colouring of cubic graphs Proceedings of the 5th joint international frontiers in algorithmics, and 7th international conference on Algorithmic aspects in information and management, (136-146)
  599. Buza K, Nanopoulos A and Schmidt-Thieme L INSIGHT Proceedings of the 15th Pacific-Asia conference on Advances in knowledge discovery and data mining - Volume Part II, (149-160)
  600. Yoo J and Bow M Mining maximal co-located event sets Proceedings of the 15th Pacific-Asia conference on Advances in knowledge discovery and data mining - Volume Part I, (351-362)
  601. Subramani K and Worthington J A new algorithm for linear and integer feasibility in horn constraints Proceedings of the 8th international conference on Integration of AI and OR techniques in constraint programming for combinatorial optimization problems, (215-229)
  602. Lingas A and Di C Near approximation of maximum weight matching through efficient weight reduction Proceedings of the 8th annual conference on Theory and applications of models of computation, (48-57)
  603. Yap C A real elementary approach to the master recurrence and generalizations Proceedings of the 8th annual conference on Theory and applications of models of computation, (14-26)
  604. ACM
    Xiao X, Xie T, Tillmann N and de Halleux J Precise identification of problems for structural test generation Proceedings of the 33rd International Conference on Software Engineering, (611-620)
  605. ACM
    Cordeiro L and Fischer B Verifying multi-threaded software using smt-based context-bounded model checking Proceedings of the 33rd International Conference on Software Engineering, (331-340)
  606. ACM
    Li F, Luo J, Zhang C, Xin S and He Y UNFOLD Proceedings of the Twelfth ACM International Symposium on Mobile Ad Hoc Networking and Computing, (1-11)
  607. ACM
    Wang Y and Cao G Barrier coverage in camera sensor networks Proceedings of the Twelfth ACM International Symposium on Mobile Ad Hoc Networking and Computing, (1-10)
  608. Makaronidis M and Casale G Efficient parallelization of the Method of Moments for queueing networks using multi-modular algebra Proceedings of the 5th International ICST Conference on Performance Evaluation Methodologies and Tools, (176-185)
  609. Hanna M, Cho S and Melhem R A novel scalable IPv6 lookup scheme using compressed pipelined tries Proceedings of the 10th international IFIP TC 6 conference on Networking - Volume Part I, (406-419)
  610. Silva D, Silva R, Mateus G, Gonçalves J, Resende M and Festa P An iterative refinement algorithm for the minimum branch vertices problem Proceedings of the 10th international conference on Experimental algorithms, (421-433)
  611. Kaufmann M and Kottler S Beyond unit propagation in SAT solving Proceedings of the 10th international conference on Experimental algorithms, (267-279)
  612. Brisaboa N, Cánovas R, Claude F, Martínez-Prieto M and Navarro G Compressed string dictionaries Proceedings of the 10th international conference on Experimental algorithms, (136-147)
  613. ACM
    Cammarota R, Kejariwal A, D'Alberto P, Panigrahi S, Veidenbaum A and Nicolau A Pruning hardware evaluation space via correlation-driven application similarity analysis Proceedings of the 8th ACM International Conference on Computing Frontiers, (1-10)
  614. Caire P, Alcalde B, van der Torre L and Sombattheera C Conviviality measures The 10th International Conference on Autonomous Agents and Multiagent Systems - Volume 2, (895-902)
  615. ACM
    Yan J and Chen Z New optimal layer assignment for bus-oriented escape routing Proceedings of the 21st edition of the great lakes symposium on Great lakes symposium on VLSI, (205-210)
  616. Keidar M, Sadeh-Or E and Kaminka G Fast frontier detection for robot exploration Proceedings of the 10th international conference on Advanced Agent Technology, (281-294)
  617. Mosbech T, Pilgaard K, Vaag A and Larsen R Automatic segmentation of abdominal adipose tissue in MRI Proceedings of the 17th Scandinavian conference on Image analysis, (501-511)
  618. Zou L, Mo J, Chen L, Özsu M and Zhao D (2011). gStore, Proceedings of the VLDB Endowment, 4:8, (482-493), Online publication date: 1-May-2011.
  619. Kuliamin V and Petukhov A (2011). A survey of methods for constructing covering arrays, Programming and Computing Software, 37:3, (121-146), Online publication date: 1-May-2011.
  620. Anagnostopoulos A, Kumar R, Mahdian M and Upfal E (2011). Sorting and selection on dynamic data, Theoretical Computer Science, 412:24, (2564-2576), Online publication date: 1-May-2011.
  621. Tomás L, Caminero A, Carrión C and Caminero B (2011). Network-aware meta-scheduling in advance with autonomous self-tuning system, Future Generation Computer Systems, 27:5, (486-497), Online publication date: 1-May-2011.
  622. Rozier K (2011). Survey, Computer Science Review, 5:2, (163-203), Online publication date: 1-May-2011.
  623. Qu Q, Zhu F, Yan X, Han J, Yu P and Li H Efficient topological OLAP on information networks Proceedings of the 16th international conference on Database systems for advanced applications - Volume Part I, (389-403)
  624. Jin C, Gao M and Zhou A Handling ER-topk query on uncertain streams Proceedings of the 16th international conference on Database systems for advanced applications - Volume Part I, (326-340)
  625. Ye Z, Zhou X and Bouguettaya A Genetic algorithm based QoS-aware service compositions in cloud computing Proceedings of the 16th international conference on Database systems for advanced applications: Part II, (321-334)
  626. Chen D, Sun G and Gong N Efficient approximate top-k query algorithm using cube index Proceedings of the 13th Asia-Pacific web conference on Web technologies and applications, (155-167)
  627. Bocu R and Bocu D Optimizing protein importance assessment through a Dijkstra-based sequential optimization technique Proceedings of the 12th WSEAS international conference on Neural networks, fuzzy systems, evolutionary computing & automation, (207-212)
  628. Harrison C, Childs H and Gaither K Data-parallel mesh connected components labeling and analysis Proceedings of the 11th Eurographics conference on Parallel Graphics and Visualization, (131-140)
  629. Bezerra L, Goldbarg E, Buriol L and Goldbarg M GRACE Proceedings of the 6th international conference on Evolutionary multi-criterion optimization, (535-549)
  630. Carrano E, Moreira L and Takahashi R A new memory based variable-length encoding genetic algorithm for multiobjective optimization Proceedings of the 6th international conference on Evolutionary multi-criterion optimization, (328-342)
  631. Czekster R, Fernandes P, Sales A and Webber T Stationary solution approximation using a memory-efficient perfect sampling technique Proceedings of the 44th Annual Simulation Symposium, (119-126)
  632. Nieves J, Osorio M and Zepeda C (2011). A Schema for Generating Relevant Logic Programming Semantics and its Applications in Argumentation Theory, Fundamenta Informaticae, 106:2-4, (295-319), Online publication date: 1-Apr-2011.
  633. Pivkina I (2011). Original historical sources in data structures and algorithms courses, Journal of Computing Sciences in Colleges, 26:4, (204-210), Online publication date: 1-Apr-2011.
  634. Hadjieleftheriou M and Srivastava D (2011). Approximate String Processing, Foundations and Trends in Databases, 2:4, (267-402), Online publication date: 1-Apr-2011.
  635. Pantelidou A and Ephremides A (2011). Scheduling in Wireless Networks, Foundations and Trends® in Networking, 4:4, (421-511), Online publication date: 1-Apr-2011.
  636. Li J, Yang C and Chen J (2011). Star-block design in two-level survivable optical networks, IEEE/ACM Transactions on Networking, 19:2, (526-539), Online publication date: 1-Apr-2011.
  637. Tátrai A (2011). Parallel implementations of Brunotte's algorithm, Journal of Parallel and Distributed Computing, 71:4, (565-572), Online publication date: 1-Apr-2011.
  638. Mérindol P, Francois P, Bonaventure O, Cateloin S and Pansiot J (2011). An efficient algorithm to enable path diversity in link state routing networks, Computer Networks: The International Journal of Computer and Telecommunications Networking, 55:5, (1132-1149), Online publication date: 1-Apr-2011.
  639. Crespelle C and Tarissan F (2011). Evaluation of a new method for measuring the internet degree distribution, Computer Communications, 34:5, (635-648), Online publication date: 1-Apr-2011.
  640. Wang Q, Chen Z and Chen C Characterizing internet worm infection structure Proceedings of the 4th USENIX conference on Large-scale exploits and emergent threats, (6-6)
  641. ACM
    Lu J, Mao X and Taskin B Timing slack aware incremental register placement with non-uniform grid generation for clock mesh synthesis Proceedings of the 2011 international symposium on Physical design, (131-138)
  642. ACM
    Yan J and Chen Z Obstacle-aware length-matching bus routing Proceedings of the 2011 international symposium on Physical design, (61-68)
  643. Ma W, Krishnamoorthy S and Agrawal G Practical loop transformations for tensor contraction expressions on multi-level memory hierarchies Proceedings of the 20th international conference on Compiler construction: part of the joint European conferences on theory and practice of software, (266-285)
  644. Atkey R, Johann P and Ghani N When is a type refinement an inductive type? Proceedings of the 14th international conference on Foundations of software science and computational structures: part of the joint European conferences on theory and practice of software, (72-87)
  645. ACM
    Atici M Graph coloring Proceedings of the 49th Annual Southeast Regional Conference, (150-154)
  646. ACM
    Tang P and Serfass D Parallelizing the merge sorting network algorithm on a multi-core computer using Go and Cilk Proceedings of the 49th Annual Southeast Regional Conference, (144-149)
  647. ACM
    Kazerouni A, Shrewsbury B and Padgett C Using the NXT as an educational tool in computer science classes Proceedings of the 49th Annual Southeast Regional Conference, (67-69)
  648. Dallmeyer J, Lattner A and Timm I From GIS to mixed traffic simulation in urban scenarios Proceedings of the 4th International ICST Conference on Simulation Tools and Techniques, (134-143)
  649. Thulasidasan S Heuristic acceleration of routing in transportation simulations using GPUs Proceedings of the 4th International ICST Conference on Simulation Tools and Techniques, (90-92)
  650. ACM
    Liu S, Chen L and Chen G Voronoi-based range query for trajectory data in spatial networks Proceedings of the 2011 ACM Symposium on Applied Computing, (1022-1026)
  651. ACM
    Ban T, Zhang C, Abe S, Takahashi T and Kadobayashi Y Mining interlacing manifolds in high dimensional spaces Proceedings of the 2011 ACM Symposium on Applied Computing, (942-949)
  652. ACM
    Lyritsis A, Papadopoulos A and Manolopoulos Y TAGs Proceedings of the 14th International Conference on Extending Database Technology, (295-306)
  653. ACM
    Yang D, Shastri A, Rundensteiner E and Ward M An optimal strategy for monitoring top-k queries in streaming windows Proceedings of the 14th International Conference on Extending Database Technology, (57-68)
  654. ACM
    Nguyen D and Pingali K (2011). Synthesizing concurrent schedulers for irregular algorithms, ACM SIGPLAN Notices, 46:3, (333-344), Online publication date: 17-Mar-2011.
  655. ACM
    Nguyen D and Pingali K (2011). Synthesizing concurrent schedulers for irregular algorithms, ACM SIGARCH Computer Architecture News, 39:1, (333-344), Online publication date: 17-Mar-2011.
  656. ACM
    Nguyen D and Pingali K Synthesizing concurrent schedulers for irregular algorithms Proceedings of the sixteenth international conference on Architectural support for programming languages and operating systems, (333-344)
  657. ACM
    Jin R, Ruan N, Xiang Y and Wang H (2011). Path-tree, ACM Transactions on Database Systems, 36:1, (1-44), Online publication date: 1-Mar-2011.
  658. ACM
    Cautis B, Deutsch A, Onose N and Vassalos V (2011). Querying XML data sources that export very large sets of views, ACM Transactions on Database Systems, 36:1, (1-42), Online publication date: 1-Mar-2011.
  659. ACM
    Elkin M (2011). Streaming and fully dynamic centralized algorithms for constructing and maintaining sparse spanners, ACM Transactions on Algorithms, 7:2, (1-17), Online publication date: 1-Mar-2011.
  660. Todri A and Marek-Sadowska M (2011). Reliability analysis and optimization of power-gated ICs, IEEE Transactions on Very Large Scale Integration (VLSI) Systems, 19:3, (457-468), Online publication date: 1-Mar-2011.
  661. Houidi I, Louati W, Ben Ameur W and Zeghlache D (2011). Virtual network provisioning across multiple substrate networks, Computer Networks: The International Journal of Computer and Telecommunications Networking, 55:4, (1011-1023), Online publication date: 1-Mar-2011.
  662. Kniesburges S and Scheideler C Hashed patricia trie Proceedings of the 5th international conference on WALCOM: algorithms and computation, (170-181)
  663. Gupta N, Pancholi A and Sabharwal Y Clustering with internal connectedness Proceedings of the 5th international conference on WALCOM: algorithms and computation, (158-169)
  664. Rahul S, Gupta P, Janardan R and Rajan K Efficient top-k queries for orthogonal ranges Proceedings of the 5th international conference on WALCOM: algorithms and computation, (110-121)
  665. ACM
    Hassaan M, Burtscher M and Pingali K Ordered vs. unordered Proceedings of the 16th ACM symposium on Principles and practice of parallel programming, (3-12)
  666. ACM
    Lang K, Delgado J, Jiang D, Ghosh B, Das S, Gajewar A, Jagadish S, Seshan A, Botev C, Bindeberger-Ortega M, Nagaraj S and Stata R Efficient online ad serving in a display advertising exchange Proceedings of the fourth ACM international conference on Web search and data mining, (307-316)
  667. Bianco A, Hay D and Neri F (2011). Crosstalk-preventing scheduling in single-and two-stage AWG-based cell switches, IEEE/ACM Transactions on Networking, 19:1, (142-155), Online publication date: 1-Feb-2011.
  668. Lin C, King C and Chen T (2011). Constrained multiple deployment problem in wireless sensor networks with guaranteed lifetimes, Wireless Networks, 17:2, (385-396), Online publication date: 1-Feb-2011.
  669. ACM
    Prountzos D, Manevich R, Pingali K and McKinley K A shape analysis for optimizing parallel graph programs Proceedings of the 38th annual ACM SIGPLAN-SIGACT symposium on Principles of programming languages, (159-172)
  670. ACM
    Prountzos D, Manevich R, Pingali K and McKinley K (2011). A shape analysis for optimizing parallel graph programs, ACM SIGPLAN Notices, 46:1, (159-172), Online publication date: 26-Jan-2011.
  671. Lee C, Shih C, Huang J and Jou J Equivalence checking of scheduling with speculative code transformations in high-level synthesis Proceedings of the 16th Asia and South Pacific Design Automation Conference, (497-502)
  672. Beidas R, Mong W and Zhu J Register pressure aware scheduling for high level synthesis Proceedings of the 16th Asia and South Pacific Design Automation Conference, (461-466)
  673. Łącki J Improved deterministic algorithms for decremental transitive closure and strongly connected components Proceedings of the twenty-second annual ACM-SIAM symposium on Discrete algorithms, (1438-1445)
  674. Cheung H, Lau L and Leung K Algebraic algorithms for linear matroid parity problems Proceedings of the twenty-second annual ACM-SIAM symposium on Discrete algorithms, (1366-1382)
  675. Panigrahi D Survivable network design problems in wireless networks Proceedings of the twenty-second annual ACM-SIAM symposium on Discrete algorithms, (1014-1027)
  676. Afshani P, Brodal G and Zeh N Ordered and unordered top-K range reporting in large data sets Proceedings of the twenty-second annual ACM-SIAM symposium on Discrete algorithms, (390-400)
  677. Foschini L, Hershberger J and Suri S On the complexity of time-dependent shortest paths Proceedings of the twenty-second annual ACM-SIAM symposium on Discrete algorithms, (327-341)
  678. Chikalov I, Hussain S and Moshkov M Sequential optimization of matrix chain multiplication relative to different cost functions Proceedings of the 37th international conference on Current trends in theory and practice of computer science, (157-165)
  679. ACM
    Lässig J and Sudholt D Adaptive population models for offspring populations and parallel evolutionary algorithms Proceedings of the 11th workshop proceedings on Foundations of genetic algorithms, (181-192)
  680. ACM
    Doerr B, Johannsen D, Kötzing T, Lehre P, Wagner M and Winzen C Faster black-box algorithms through higher arity operators Proceedings of the 11th workshop proceedings on Foundations of genetic algorithms, (163-172)
  681. ACM
    Jansen T and Zarges C Analysis of evolutionary algorithms Proceedings of the 11th workshop proceedings on Foundations of genetic algorithms, (1-14)
  682. Carmona J, Júlvez J, Cortadella J and Kishinevsky M (2011). A Scheduling Strategy for Synchronous Elastic Designs, Fundamenta Informaticae, 108:1-2, (1-21), Online publication date: 1-Jan-2011.
  683. Dickerson M, Goodrich M, Dickerson T and Zhuo Y Round-trip voronoi diagrams and doubling density in geographic networks Transactions on Computational Science XIV, (211-238)
  684. Ren S, Yu Y and Song M Model feasible interactions in distributed real-time systems Formal modeling, (144-168)
  685. Yang X, Parthasarathy S and Sadayappan P (2011). Fast sparse matrix-vector multiplication on GPUs, Proceedings of the VLDB Endowment, 4:4, (231-242), Online publication date: 1-Jan-2011.
  686. Meruvia-Pastor O, Soh J, Schmidt E, Boughner J, Xiao M, Jamniczky H, Hallgrímsson B and Sensen C (2011). Estimating cell count and distribution in labeled histological samples using incremental cell search, Journal of Biomedical Imaging, 2011, (1-16), Online publication date: 1-Jan-2011.
  687. Mauch S and Stalzer M (2011). Efficient Formulations for Exact Stochastic Simulation of Chemical Systems, IEEE/ACM Transactions on Computational Biology and Bioinformatics, 8:1, (27-35), Online publication date: 1-Jan-2011.
  688. Hung C and Peng W (2011). A regression-based approach for mining user movement patterns from random sample data, Data & Knowledge Engineering, 70:1, (1-20), Online publication date: 1-Jan-2011.
  689. Wu B A simpler and more efficient algorithm for the next-to-shortest path problem Proceedings of the 4th international conference on Combinatorial optimization and applications - Volume Part II, (219-227)
  690. Liu J A randomized algorithm for weighted approximation of points by a step function Proceedings of the 4th international conference on Combinatorial optimization and applications - Volume Part I, (300-308)
  691. Chen D and Misiołek E Computing toolpaths for 5-axis NC machines Proceedings of the 4th international conference on Combinatorial optimization and applications - Volume Part I, (270-284)
  692. Harutyunyan A A fast algorithm for powerful alliances in trees Proceedings of the 4th international conference on Combinatorial optimization and applications - Volume Part I, (31-40)
  693. Vivaldi J, Da Cunha I and Ramírez J The REG summarization system with question reformulation at QA@INEX track 2010 Proceedings of the 9th international conference on Initiative for the evaluation of XML retrieval: comparative evaluation of focused retrieval, (295-302)
  694. Aadithya K, Ravindran B, Michalak T and Jennings N Efficient computation of the shapley value for centrality in networks Proceedings of the 6th international conference on Internet and network economics, (1-13)
  695. ACM
    Perumal R and Chandra Mouli P An efficient color image segmentation algorithm using hybrid approaches Proceedings of the Seventh Indian Conference on Computer Vision, Graphics and Image Processing, (435-439)
  696. Kim M, Kim H and Luk C SD3 Proceedings of the 2010 43rd Annual IEEE/ACM International Symposium on Microarchitecture, (535-546)
  697. Friedrich T, He J, Hebbinghaus N, Neumann F and Witt C (2010). Approximating covering problems by randomized search heuristics using multi-objective models*, Evolutionary Computation, 18:4, (617-633), Online publication date: 1-Dec-2010.
  698. ACM
    Cabodi G, Murciano M and Violante M (2011). Boosting software fault injection for dependability analysis of real-time embedded applications, ACM Transactions on Embedded Computing Systems, 10:2, (1-32), Online publication date: 1-Dec-2010.
  699. ACM
    Wiggers M, Bekooij M and Smit G (2011). Buffer capacity computation for throughput-constrained modal task graphs, ACM Transactions on Embedded Computing Systems, 10:2, (1-59), Online publication date: 1-Dec-2010.
  700. ACM
    Needell D and Tropp J (2010). CoSaMP, Communications of the ACM, 53:12, (93-100), Online publication date: 1-Dec-2010.
  701. Kini S, Ramasubramanian S, Kvalbein A and Hansen A (2010). Fast recovery from dual-link or single-node failures in IP networks using tunneling, IEEE/ACM Transactions on Networking, 18:6, (1988-1999), Online publication date: 1-Dec-2010.
  702. Kasbekar G and Sarkar S (2010). Spectrum auction framework for access allocation in cognitive radio networks, IEEE/ACM Transactions on Networking, 18:6, (1841-1854), Online publication date: 1-Dec-2010.
  703. Saleh M and Kamal A (2010). Design and provisioning of WDM networks with many-to-many traffic grooming, IEEE/ACM Transactions on Networking, 18:6, (1869-1882), Online publication date: 1-Dec-2010.
  704. Mak T, Lam K, Ng H, Rachmuth G and Poon C (2010). A CMOS current-mode dynamic programming circuit, IEEE Transactions on Circuits and Systems Part I: Regular Papers, 57:12, (3112-3123), Online publication date: 1-Dec-2010.
  705. Shieh S, Chen P, Han Y and Wu T (2010). Early-elimination modification for priority-first search decoding, IEEE Transactions on Communications, 58:12, (3459-3469), Online publication date: 1-Dec-2010.
  706. Zheng L and Zhang X (2010). Cooperative beamforming with mobile wireless sensor nodes, IEEE Transactions on Communications, 58:12, (3375-3380), Online publication date: 1-Dec-2010.
  707. Zhang G (2010). Closures in Binary Partial Algebras, Electronic Notes in Theoretical Computer Science (ENTCS), 257, (3-18), Online publication date: 1-Dec-2010.
  708. Chen C, Chen Z and Li Y (2010). Characterizing and defending against divide-conquer-scanning worms, Computer Networks: The International Journal of Computer and Telecommunications Networking, 54:18, (3210-3222), Online publication date: 1-Dec-2010.
  709. ACM
    Kolucheh G and Han Q SUSTAIN Proceedings of the 9th International Workshop on Adaptive and Reflective Middleware, (4-9)
  710. Alpern S, Fokkink R, Kelder J and Lidbetter T Disperse or unite? a mathematical model of coordinated attack Proceedings of the First international conference on Decision and game theory for security, (220-233)
  711. Eriksson J and Back R Applying PVS background theories and proof strategies in invariant based programming Proceedings of the 12th international conference on Formal engineering methods and software engineering, (24-39)
  712. Nanjanath M, Erlandson A, Andrist S, Ragipindi A, Mohammed A, Sharma A and Gini M Decision and coordination strategies for robocup rescue agents Proceedings of the Second international conference on Simulation, modeling, and programming for autonomous robots, (473-484)
  713. Magid E and Tsubouchi T Static balance for rescue robot navigation Proceedings of the Second international conference on Simulation, modeling, and programming for autonomous robots, (423-435)
  714. Pearce R, Gokhale M and Amato N Multithreaded Asynchronous Graph Traversal for In-Memory and Semi-External Memory Proceedings of the 2010 ACM/IEEE International Conference for High Performance Computing, Networking, Storage and Analysis, (1-11)
  715. Ruepp O and Burschka D Fast recovery of weakly textured surfaces from monocular image sequences Proceedings of the 10th Asian conference on Computer vision - Volume Part IV, (474-485)
  716. Mukherjee S, Biswas S and Mukherjee D Modeling sense disambiguation of human pose Proceedings of the 10th Asian conference on Computer vision - Volume Part I, (244-255)
  717. Luna J, Revoredo K and Cozman F Learning sentences and assessments in probabilistic description logics Proceedings of the 6th International Conference on Uncertainty Reasoning for the Semantic Web - Volume 654, (85-96)
  718. Lee H, Chang Y and Lee P Recent research development in flip-chip routing Proceedings of the International Conference on Computer-Aided Design, (404-410)
  719. Safta D and Gorgan D LDS Proceedings of the 6th international conference on HCI in work and learning, life and leisure: workgroup human-computer interaction and usability engineering, (228-243)
  720. ACM
    Zhang S, Qian Z, Lu S and Chen D A binary graph reduction algorithm for multi-constrained QoS routing Proceedings of the Second Asia-Pacific Symposium on Internetware, (1-8)
  721. ACM
    Agarwal P, Arge L and Yi K (2010). I/O-efficient batched union-find and its applications to terrain analysis, ACM Transactions on Algorithms, 7:1, (1-21), Online publication date: 1-Nov-2010.
  722. Pham T, Nguyen H and Tuan H (2010). Power allocation in MMSE relaying over frequency-selective Rayleigh fading channels, IEEE Transactions on Communications, 58:11, (3330-3343), Online publication date: 1-Nov-2010.
  723. Javaid H, Ignjatovic A and Parameswaran S (2010). Rapid design space exploration of application specific heterogeneous pipelined multiprocessor systems, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 29:11, (1777-1789), Online publication date: 1-Nov-2010.
  724. Aparna R and Amberker B (2010). A key management scheme for secure group communication using binomial key trees, International Journal of Network Management, 20:6, (383-418), Online publication date: 1-Nov-2010.
  725. ACM
    Das M, Loui A and Datta S Collaborative content synchronization through an event-based framework Proceedings of the 1st ACM international workshop on Connected multimedia, (15-20)
  726. ACM
    Tienkouw S, Niraswan R, Tanwanont P, Charoenporn T and Tuchinda R Planning a day trip on mobile phones with Pi-Pe Proceedings of the International Conference on Management of Emergent Digital EcoSystems, (211-212)
  727. Stakhanova N, Ren H and Ghorbani A Selective regular expression matching Proceedings of the 13th international conference on Information security, (226-240)
  728. ACM
    Zhao G and Yuan J Mining and cropping common objects from images Proceedings of the 18th ACM international conference on Multimedia, (975-978)
  729. ACM
    Liu X, Shi Z, Li Z, Wang X and Shi Z Sorted label classifier chains for learning images with multi-label Proceedings of the 18th ACM international conference on Multimedia, (951-954)
  730. ACM
    Shrestha P, de With P, Weda H, Barbieri M and Aarts E Automatic mashup generation from multiple-camera concert recordings Proceedings of the 18th ACM international conference on Multimedia, (541-550)
  731. ACM
    Liu L and Yang Y Energy-aware routing in hybrid optical network-on-chip for future multi-processor system-on-chip Proceedings of the 6th ACM/IEEE Symposium on Architectures for Networking and Communications Systems, (1-9)
  732. ACM
    Chang Y and Kuo T A reliable MTD design for MLC flash-memory storage systems Proceedings of the tenth ACM international conference on Embedded software, (179-188)
  733. ACM
    Leary G and Chatha K A holistic approach to network-on-chip synthesis Proceedings of the eighth IEEE/ACM/IFIP international conference on Hardware/software codesign and system synthesis, (213-222)
  734. Hassanpour S, O'Connor M and Das A Visualizing logical dependencies in SWRL rule bases Proceedings of the 2010 international conference on Semantic web rules, (259-272)
  735. Farhana E, Ferdous J, Moosa T and Rahman M Finite automata based algorithms for the generalized constrained longest common subsequence problems Proceedings of the 17th international conference on String processing and information retrieval, (243-249)
  736. Uricaru R, Mancheron A and Rivals E Novel definition and algorithm for chaining fragments with proportional overlaps Proceedings of the 2010 international conference on Comparative genomics, (161-172)
  737. ACM
    Henecka W, K ögl S, Sadeghi A, Schneider T and Wehrenberg I TASTY Proceedings of the 17th ACM conference on Computer and communications security, (451-462)
  738. ACM
    Cho C, Babi ć D, Shin E and Song D Inference and analysis of formal models of botnet command and control protocols Proceedings of the 17th ACM conference on Computer and communications security, (426-439)
  739. ACM
    Islam M, Borodin Y and Ramakrishnan I Mixture model based label association techniques for web accessibility Proceedings of the 23nd annual ACM symposium on User interface software and technology, (67-76)
  740. Tarabalka Y, Chanussot J and Benediktsson J (2010). Segmentation and classification of hyperspectral images using minimum spanning forest grown from automatically selected markers, IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics, 40:5, (1267-1279), Online publication date: 1-Oct-2010.
  741. Wu Y, Mao Z, Fahmy S and Shroff N (2010). Constructing maximum-lifetime data gathering forests in sensor networks, IEEE/ACM Transactions on Networking, 18:5, (1571-1584), Online publication date: 1-Oct-2010.
  742. Fashandi S, Gharan S and Khandani A (2010). Path diversity over packet switched networks, IEEE/ACM Transactions on Networking, 18:5, (1373-1386), Online publication date: 1-Oct-2010.
  743. Conti P, De Giovanni L and Naldi M (2010). Blind maximum likelihood estimation of traffic matrices under long-range dependent traffic, Computer Networks: The International Journal of Computer and Telecommunications Networking, 54:15, (2626-2639), Online publication date: 1-Oct-2010.
  744. Philippidis C and Shang W (2010). On minimizing register usage of linearly scheduled algorithms with uniform dependencies, Computer Languages, Systems and Structures, 36:3, (250-267), Online publication date: 1-Oct-2010.
  745. Lin R, Zhong W, Bose S and Zukerman M (2010). Light-tree configuration for multicast traffic grooming in WDM mesh networks, Photonic Network Communications, 20:2, (151-164), Online publication date: 1-Oct-2010.
  746. ACM
    Symeonidis P, Tiakas E and Manolopoulos Y Transitive node similarity for link prediction in social networks with positive and negative links Proceedings of the fourth ACM conference on Recommender systems, (183-190)
  747. Amparore E and Donatelli S A component-based solution method for non-ergodic Markov regenerative processes Proceedings of the 7th European performance engineering conference on Computer performance engineering, (236-251)
  748. Rodríguez R and Júlvez J Accurate performance estimation for stochastic marked graphs by bottleneck regrowing Proceedings of the 7th European performance engineering conference on Computer performance engineering, (175-190)
  749. Gallup D, Pollefeys M and Frahm J 3D reconstruction using an n-layer heightmap Proceedings of the 32nd DAGM conference on Pattern recognition, (1-10)
  750. Lin J and Kuo C Frame based redundant-macro-block error resilient in scalable video coding Proceedings of the Advances in multimedia information processing, and 11th Pacific Rim conference on Multimedia: Part II, (372-381)
  751. Wang P, Liao W, Chen T, Zhou S and Comaniciu D Graph based interactive detection of curve structures in 2D fluoroscopy Proceedings of the 13th international conference on Medical image computing and computer-assisted intervention: Part III, (269-277)
  752. ACM
    Saipulla A, Liu B, Xing G, Fu X and Wang J Barrier coverage with sensors of limited mobility Proceedings of the eleventh ACM international symposium on Mobile ad hoc networking and computing, (201-210)
  753. ACM
    Duley A, Spandikow C and Kim M A program differencing algorithm for verilog HDL Proceedings of the 25th IEEE/ACM International Conference on Automated Software Engineering, (477-486)
  754. ACM
    Bustos B and Morales N On the asymptotic behavior of nearest neighbor search using pivot-based indexes Proceedings of the Third International Conference on SImilarity Search and APplications, (33-39)
  755. ACM
    Ramani B and Sivanandam S An intelligent numerical algorithm for solving system of linear algebraic equations Proceedings of the 1st Amrita ACM-W Celebration on Women in Computing in India, (1-4)
  756. Jaziri R, Benabdeslem K and Elghazel H A graph based framework for clustering and characterization of SOM Proceedings of the 20th international conference on Artificial neural networks: Part III, (387-396)
  757. ACM
    Merrill D and Grimshaw A Revisiting sorting for GPGPU stream architectures Proceedings of the 19th international conference on Parallel architectures and compilation techniques, (545-546)
  758. ACM
    Hassaan M, Burtscher M and Pingali K Ordered and unordered algorithms for parallel breadth first search Proceedings of the 19th international conference on Parallel architectures and compilation techniques, (539-540)
  759. ACM
    Kraetzer C, Merkel R, Altschaffel R, Clausing E, Schott M and Dittmann J Modelling watermark communication protocols using the CASPER modelling language Proceedings of the 12th ACM workshop on Multimedia and security, (107-116)
  760. Belohlavek R and Vychodil V Factorizing three-way binary data with triadic formal concepts Proceedings of the 14th international conference on Knowledge-based and intelligent information and engineering systems: Part I, (471-480)
  761. Buchin K and Schulz A On the number of spanning trees a planar graph can have Proceedings of the 18th annual European conference on Algorithms: Part I, (110-121)
  762. Gent I, Jefferson C, Miguel I and Nightingale P Generating special-purpose stateless propagators for arbitrary constraints Proceedings of the 16th international conference on Principles and practice of constraint programming, (206-220)
  763. Doan D and Evans P Fixed-parameter algorithm for haplotype inferences on general pedigrees with small number of sites Proceedings of the 10th international conference on Algorithms in bioinformatics, (124-135)
  764. De Verdière É Shortest cut graph of a surface with prescribed vertex set Proceedings of the 18th annual European conference on Algorithms: Part II, (100-111)
  765. Mu Y, Sun J, Han T, Cheong L and Yan S Randomized locality sensitive vocabularies for bag-of-features model Proceedings of the 11th European conference on computer vision conference on Computer vision: Part III, (748-761)
  766. Yuan J, Bae E, Tai X and Boykov Y A continuous max-flow approach to potts model Proceedings of the 11th European conference on Computer vision: Part VI, (379-392)
  767. Zitnick C Binary coherent edge descriptors Proceedings of the 11th European conference on Computer vision: Part II, (170-182)
  768. Li Y, Chen F, Sun X, Zhou M, Jiao W, Cao D and Mei H (2010). Self-adaptive resource management for large-scale shared clusters, Journal of Computer Science and Technology, 25:5, (945-957), Online publication date: 1-Sep-2010.
  769. Tournaire R, Petit J, Rousset M and Termier A Combining logic and probabilities for discovering mappings between taxonomies Proceedings of the 4th international conference on Knowledge science, engineering and management, (530-542)
  770. Nedunuri S, Smith D and Cook W A class of Greedy algorithms and its relation to greedoids Proceedings of the 7th International colloquium conference on Theoretical aspects of computing, (352-366)
  771. So-In C, Jain R, Paul S and Pan J (2010). Virtual ID: ID/locator split in a mobile IP environment for mobility, multihoming and location privacy for the next generation wireless networks, International Journal of Internet Protocol Technology, 5:3, (142-153), Online publication date: 1-Sep-2010.
  772. Fan W, Li J, Ma S, Wang H and Wu Y (2010). Graph homomorphism revisited for graph matching, Proceedings of the VLDB Endowment, 3:1-2, (1161-1172), Online publication date: 1-Sep-2010.
  773. Mathioudakis M, Bansal N and Koudas N (2010). Identifying, attributing and describing spatial bursts, Proceedings of the VLDB Endowment, 3:1-2, (1091-1102), Online publication date: 1-Sep-2010.
  774. Ge T and Zdonik S (2010). A*-tree, Proceedings of the VLDB Endowment, 3:1-2, (964-974), Online publication date: 1-Sep-2010.
  775. Zhang M, Hadjieleftheriou M, Ooi B, Procopiuc C and Srivastava D (2010). On multi-column foreign key discovery, Proceedings of the VLDB Endowment, 3:1-2, (805-814), Online publication date: 1-Sep-2010.
  776. Zhao P and Han J (2010). On graph query optimization in large networks, Proceedings of the VLDB Endowment, 3:1-2, (340-351), Online publication date: 1-Sep-2010.
  777. Yildirim H, Chaoji V and Zaki M (2010). GRAIL, Proceedings of the VLDB Endowment, 3:1-2, (276-284), Online publication date: 1-Sep-2010.
  778. Neumann T and Weikum G (2010). x-RDF-3X, Proceedings of the VLDB Endowment, 3:1-2, (256-263), Online publication date: 1-Sep-2010.
  779. Giel O and Lehre P (2010). On the effect of populations in evolutionary multi-objective optimisation**, Evolutionary Computation, 18:3, (335-356), Online publication date: 1-Sep-2010.
  780. ACM
    Claude F and Navarro G (2010). Fast and Compact Web Graph Representations, ACM Transactions on the Web, 4:4, (1-31), Online publication date: 1-Sep-2010.
  781. Cordasco G and Rosenberg A Area-maximizing schedules for series-parallel DAGs Proceedings of the 16th international Euro-Par conference on Parallel processing: Part II, (380-392)
  782. Garcia E, Venetis I, Khan R and Gao G Optimized dense matrix multiplication on a many-core architecture Proceedings of the 16th international Euro-Par conference on Parallel processing: Part II, (316-327)
  783. Patel D, Hsu W, Li Lee M and Parthasarathy S Lag patterns in time series databases Proceedings of the 21st international conference on Database and expert systems applications: Part II, (209-224)
  784. Gunturi V, Shekhar S and Bhattacharya A Minimum spanning tree on spatio-temporal networks Proceedings of the 21st international conference on Database and expert systems applications: Part II, (149-158)
  785. ACM
    Hajjat M, Sun X, Sung Y, Maltz D, Rao S, Sripanidkulchai K and Tawarmalani M Cloudward bound Proceedings of the ACM SIGCOMM 2010 conference, (243-254)
  786. Misra N, Narayanaswamy N, Raman V and Shankar B Solving MINONES-2-SAT as fast as VERTEX COVER Proceedings of the 35th international conference on Mathematical foundations of computer science, (549-555)
  787. Bezáková I and Friedlander A Counting minimum (s, t)-cuts in weighted planar graphs in polynomial time Proceedings of the 35th international conference on Mathematical foundations of computer science, (126-137)
  788. Zhang W, Su J, Tan C and Wang W Entity linking leveraging Proceedings of the 23rd International Conference on Computational Linguistics, (1290-1298)
  789. ACM
    Hajjat M, Sun X, Sung Y, Maltz D, Rao S, Sripanidkulchai K and Tawarmalani M (2010). Cloudward bound, ACM SIGCOMM Computer Communication Review, 40:4, (243-254), Online publication date: 16-Aug-2010.
  790. Almeida M, Moreira N and Reis R Incremental DFA minimisation Proceedings of the 15th international conference on Implementation and application of automata, (39-48)
  791. Ding L, Fu B, Fu Y, Lu Z and Zhao Z O((log n)2) time online approximation schemes for bin packing and subset sum problems Proceedings of the 4th international conference on Frontiers in algorithmics, (250-261)
  792. Ding L, Fu B and Fu Y Improved sublinear time algorithm for width-bounded separators Proceedings of the 4th international conference on Frontiers in algorithmics, (101-112)
  793. Marques-Silva J, Janota M and Lynce I On Computing Backbones of Propositional Theories Proceedings of the 2010 conference on ECAI 2010: 19th European Conference on Artificial Intelligence, (15-20)
  794. ACM
    Ma F and Deogun J The solution space of genome sequence alignment and LIS graph decomposition Proceedings of the First ACM International Conference on Bioinformatics and Computational Biology, (302-311)
  795. ACM
    Li Y, Tyson G and Zhang J Effect of sequences on the shape of protein energy landscapes Proceedings of the First ACM International Conference on Bioinformatics and Computational Biology, (35-42)
  796. ACM
    Russell I, Markov Z, Neller T and Coleman S (2010). MLeXAI, ACM Transactions on Computing Education, 10:3, (1-36), Online publication date: 1-Aug-2010.
  797. Kang J, Lee Y, Kim C and Lee S (2010). Coding order decision of b frames for rate-distortion performance improvement in single-view video and multiview video coding, IEEE Transactions on Image Processing, 19:8, (2029-2041), Online publication date: 1-Aug-2010.
  798. Ong L and Motani M (2010). Optimal routing for decode-forward in cooperative wireless networks, IEEE Transactions on Communications, 58:8, (2345-2355), Online publication date: 1-Aug-2010.
  799. Chung K, Huang Y, Wang J, Chang T and Mark Liao H (2010). Fast randomized algorithm for center-detection, Pattern Recognition, 43:8, (2659-2665), Online publication date: 1-Aug-2010.
  800. Friedler S and Mount D (2010). Approximation algorithm for the kinetic robust K-center problem, Computational Geometry: Theory and Applications, 43:6-7, (572-586), Online publication date: 1-Aug-2010.
  801. Crochemore M, Giambruno L, Langiu A, Mignosi F and Restivo A Dictionary-symbolwise flexible parsing Proceedings of the 21st international conference on Combinatorial algorithms, (390-403)
  802. Dvořák T, Fink J, Gregor P, Koubek V and Radzik T Efficient connectivity testing of hypercubic networks with faults Proceedings of the 21st international conference on Combinatorial algorithms, (181-191)
  803. ACM
    Maserrat H and Pei J Neighbor query friendly compression of social networks Proceedings of the 16th ACM SIGKDD international conference on Knowledge discovery and data mining, (533-542)
  804. Mouratidis C, Majchrowska G, Zissopoulos D and Asimopoulos N Modified Floyd-Warshall algorithm for risk arbitrage Proceedings of the 14th WSEAS international conference on Systems: part of the 14th WSEAS CSCC multiconference - Volume I, (292-296)
  805. ACM
    Haque S, Hossain S and Moreno Maza M Cache friendly sparse matrix-vector multiplication Proceedings of the 4th International Workshop on Parallel and Symbolic Computation, (175-176)
  806. Tsai M, Wang D, Liau C and Hsu T Heterogeneous subset sampling Proceedings of the 16th annual international conference on Computing and combinatorics, (500-509)
  807. Elmasry A The violation heap Proceedings of the 16th annual international conference on Computing and combinatorics, (479-488)
  808. Yanhaona M, Bayzid M and Rahman M Discovering pairwise compatibility graphs Proceedings of the 16th annual international conference on Computing and combinatorics, (399-408)
  809. Elmasry A The longest almost-increasing subsequence Proceedings of the 16th annual international conference on Computing and combinatorics, (338-347)
  810. Fernau H, Fomin F, Philip G and Saurabh S The curse of connectivity Proceedings of the 16th annual international conference on Computing and combinatorics, (34-43)
  811. Adiga A, Bhowmick D and Chandran L Boxicity and poset dimension Proceedings of the 16th annual international conference on Computing and combinatorics, (3-12)
  812. Nobibon F, Hurkens C, Leus R and Spieksma F Exact algorithms for coloring graphs while avoiding monochromatic cycles Proceedings of the 6th international conference on Algorithmic aspects in information and management, (229-242)
  813. ACM
    Zhang D, Wang J, Cai D and Lu J Self-taught hashing for fast similarity search Proceedings of the 33rd international ACM SIGIR conference on Research and development in information retrieval, (18-25)
  814. Liu C, Dahlmeier D and Ng H TESLA Proceedings of the Joint Fifth Workshop on Statistical Machine Translation and MetricsMATR, (354-359)
  815. ACM
    Rabinovich E, Etzion O, Ruah S and Archushin S Analyzing the behavior of event processing applications Proceedings of the Fourth ACM International Conference on Distributed Event-Based Systems, (223-234)
  816. ACM
    Kim K, McKay R and Moon B Multiobjective evolutionary algorithms for dynamic social network clustering Proceedings of the 12th annual conference on Genetic and evolutionary computation, (1179-1186)
  817. ACM
    Lässig J and Sudholt D The benefit of migration in parallel evolutionary algorithms Proceedings of the 12th annual conference on Genetic and evolutionary computation, (1105-1112)
  818. Georgiadis L Testing 2-vertex connectivity and computing pairs of vertex-disjoint s-t paths in digraphs Proceedings of the 37th international colloquium conference on Automata, languages and programming, (738-749)
  819. Woodruff D Additive spanners in nearly quadratic time Proceedings of the 37th international colloquium conference on Automata, languages and programming, (463-474)
  820. Nguyen P, Wei L, Wang H and Ling S On multidimensional linear cryptanalysis Proceedings of the 15th Australasian conference on Information security and privacy, (37-52)
  821. Krüger B, Tautges J, Weber A and Zinke A Fast local and global similarity searches in large motion capture databases Proceedings of the 2010 ACM SIGGRAPH/Eurographics Symposium on Computer Animation, (1-10)
  822. Cominetti R, Correa J, Rothvoß T and Martín J (2010). Optimal Selection of Customers for a Last-Minute Offer, Operations Research, 58:4-Part-1, (878-888), Online publication date: 1-Jul-2010.
  823. Chowdhury R, Le H and Ramachandran V (2010). Cache-Oblivious Dynamic Programming for Bioinformatics, IEEE/ACM Transactions on Computational Biology and Bioinformatics, 7:3, (495-510), Online publication date: 1-Jul-2010.
  824. Ni Y, Xie L and Liu Z (2010). Minimizing the expected complete influence time of a social network, Information Sciences: an International Journal, 180:13, (2514-2527), Online publication date: 1-Jul-2010.
  825. de Berg M, Haverkort H, Thite S and Toma L (2010). Star-quadtrees and guard-quadtrees, Computational Geometry: Theory and Applications, 43:5, (493-513), Online publication date: 1-Jul-2010.
  826. Bhattacharya A, Bhowmick A and Singh A Finding top-k similar pairs of objects annotated with terms from an ontology Proceedings of the 22nd international conference on Scientific and statistical database management, (214-232)
  827. ACM
    Krifa A, Lassoued I and Barakat C Emulation platform for network wide traffic sampling and monitoring Proceedings of the 6th International Wireless Communications and Mobile Computing Conference, (468-472)
  828. Yao C, Wang B, Chan B, Yong J and Paul J Multi-image based photon tracing for interactive global illumination of dynamic scenes Proceedings of the 21st Eurographics conference on Rendering, (1315-1324)
  829. De Haas W, Robine M, Hanna P, Veltkamp R and Wiering F Comparing approaches to the similarity of musical chord sequences Proceedings of the 7th international conference on Exploring music contents, (242-258)
  830. Lee T, Na J, Park H, Park K and Sim J Finding optimal alignment and consensus of circular strings Proceedings of the 21st annual conference on Combinatorial pattern matching, (310-322)
  831. ACM
    Bangay S, de Bruyn D and Glass K Minimum spanning trees for valley and ridge characterization in digital elevation maps Proceedings of the 7th International Conference on Computer Graphics, Virtual Reality, Visualisation and Interaction in Africa, (73-82)
  832. Chen D, Wang C and Wang H Representing a functional curve by curves with fewer peaks Proceedings of the 12th Scandinavian conference on Algorithm Theory, (200-211)
  833. Cao Y, Chen J and Liu Y On feedback vertex set new measure and new structures Proceedings of the 12th Scandinavian conference on Algorithm Theory, (93-104)
  834. Lê D A characterization of combined traces using labeled stratified order structures Proceedings of the 31st international conference on Applications and Theory of Petri Nets, (104-124)
  835. Vinh N and Houle M A set correlation model for partitional clustering Proceedings of the 14th Pacific-Asia conference on Advances in Knowledge Discovery and Data Mining - Volume Part I, (4-15)
  836. Ozgul F, Erdem Z, Bowerman C and Bondy J Combined detection model for criminal network detection Proceedings of the 2010 Pacific Asia conference on Intelligence and Security Informatics, (1-14)
  837. Mantzaflaris A and Mourrain B A subdivision approach to planar semi-algebraic sets Proceedings of the 6th international conference on Advances in Geometric Modeling and Processing, (104-123)
  838. Kasiviswanathan S and Pan F Matrix interdiction problem Proceedings of the 7th international conference on Integration of AI and OR Techniques in Constraint Programming for Combinatorial Optimization Problems, (219-231)
  839. ACM
    Cho M, Ren H, Xiang H and Puri R History-based VLSI legalization using network flow Proceedings of the 47th Design Automation Conference, (286-291)
  840. ACM
    Luo L, Wong M and Hwu W An effective GPU implementation of breadth-first search Proceedings of the 47th Design Automation Conference, (52-55)
  841. ACM
    Attali D and Lieutier A Optimal reconstruction might be hard Proceedings of the twenty-sixth annual symposium on Computational geometry, (334-343)
  842. ACM
    Harvey W, Wang Y and Wenger R A randomized O(m log m) time algorithm for computing Reeb graphs of arbitrary simplicial complexes Proceedings of the twenty-sixth annual symposium on Computational geometry, (267-276)
  843. ACM
    Dice D and Shavit N TLRW Proceedings of the twenty-second annual ACM symposium on Parallelism in algorithms and architectures, (284-293)
  844. ACM
    Fischer M, Su X and Yin Y Assigning tasks for efficiency in Hadoop Proceedings of the twenty-second annual ACM symposium on Parallelism in algorithms and architectures, (30-39)
  845. ACM
    Kuncak V, Mayer M, Piskac R and Suter P (2010). Complete functional synthesis, ACM SIGPLAN Notices, 45:6, (316-329), Online publication date: 12-Jun-2010.
  846. ACM
    Kumar J, Abd-Almageed W, Kang L and Doermann D Handwritten Arabic text line segmentation using affinity propagation Proceedings of the 9th IAPR International Workshop on Document Analysis Systems, (135-142)
  847. ACM
    Zhang Z, Hadjieleftheriou M, Ooi B and Srivastava D Bed-tree Proceedings of the 2010 ACM SIGMOD International Conference on Management of data, (915-926)
  848. ACM
    Tao Y, Sheng C and Li J Finding maximum degrees in hidden bipartite graphs Proceedings of the 2010 ACM SIGMOD International Conference on Management of data, (891-902)
  849. ACM
    Das Sarma A, Jain A and Srivastava D I4E Proceedings of the 2010 ACM SIGMOD International Conference on Management of data, (795-806)
  850. ACM
    Kanagal B and Deshpande A Lineage processing over correlated probabilistic databases Proceedings of the 2010 ACM SIGMOD International Conference on Management of data, (675-686)
  851. ACM
    Onak K and Rubinfeld R Maintaining a large matching and a small vertex cover Proceedings of the forty-second ACM symposium on Theory of computing, (457-464)
  852. ACM
    Lokshtanov D and Nederlof J Saving space by algebraization Proceedings of the forty-second ACM symposium on Theory of computing, (321-330)
  853. ACM
    Narayanappa H, Bansal M and Rajan H Property-aware program sampling Proceedings of the 9th ACM SIGPLAN-SIGSOFT workshop on Program analysis for software tools and engineering, (45-52)
  854. ACM
    Kuncak V, Mayer M, Piskac R and Suter P Complete functional synthesis Proceedings of the 31st ACM SIGPLAN Conference on Programming Language Design and Implementation, (316-329)
  855. ACM
    Shen C, Plishker W, Ko D, Bhattacharyya S and Goldsman N (2010). Energy-driven distribution of signal processing applications across wireless sensor networks, ACM Transactions on Sensor Networks, 6:3, (1-32), Online publication date: 1-Jun-2010.
  856. Zhou N, Zhu X, Huang Y and Lin H (2010). Low complexity cross-layer design with packet dependent scheduling for heterogeneous traffic in multiuser OFDM systems, IEEE Transactions on Wireless Communications, 9:6, (1912-1923), Online publication date: 1-Jun-2010.
  857. Starobinski D and Xiao W (2010). Asymptotically optimal data dissemination in multichannel wireless sensor networks, IEEE/ACM Transactions on Networking, 18:3, (695-707), Online publication date: 1-Jun-2010.
  858. Armon A, Avidor A and Schwartz O (2010). Cooperative TSP, Theoretical Computer Science, 411:31-33, (2847-2863), Online publication date: 1-Jun-2010.
  859. Helli B and Moghaddam M (2010). A text-independent Persian writer identification based on feature relation graph (FRG), Pattern Recognition, 43:6, (2199-2209), Online publication date: 1-Jun-2010.
  860. González J and Arévalo V (2010). Mesh Topological Optimization for Improving Piecewise-Linear Image Registration, Journal of Mathematical Imaging and Vision, 37:2, (166-182), Online publication date: 1-Jun-2010.
  861. Sallaberry A, Zaidi F, Pich C and Melançon G Interactive visualization and navigation of web search results revealing community structures and bridges Proceedings of Graphics Interface 2010, (105-112)
  862. Costa A and Melucci M An information retrieval model based on discrete fourier transform Proceedings of the First international Information Retrieval Facility conference on Adbances in Multidisciplinary Retrieval, (84-99)
  863. Policriti A, Tomescu A and Vezzi F A randomized numerical aligner (rNA) Proceedings of the 4th international conference on Language and Automata Theory and Applications, (512-523)
  864. Chatterjee S, Connor M and Kumar P Geometric minimum spanning trees with GEOFILTERKRUSKAL* Proceedings of the 9th international conference on Experimental Algorithms, (486-500)
  865. Katz B, Krug M, Lochbihler A, Rutter I, Snelting G and Wagner D Gateway decompositions for constrained reachability problems Proceedings of the 9th international conference on Experimental Algorithms, (449-461)
  866. Ta D, Suiping Zhou , Wentong Cai , Xueyan Tang and Ayani R QoS-Aware Server Provisioning for Large-Scale Distributed Virtual Environments Proceedings of the 2010 IEEE Workshop on Principles of Advanced and Distributed Simulation, (23-30)
  867. Bouabache F, Herault T, Peyronnet S and Cappello F Planning Large Data Transfers in Institutional Grids Proceedings of the 2010 10th IEEE/ACM International Conference on Cluster, Cloud and Grid Computing, (547-552)
  868. ACM
    Wu B and Ho T Bus-pin-aware bus-driven floorplanning Proceedings of the 20th symposium on Great lakes symposium on VLSI, (27-32)
  869. Othman A, Sandholm T and Budish E Finding approximate competitive equilibria Proceedings of the 9th International Conference on Autonomous Agents and Multiagent Systems: volume 1 - Volume 1, (873-880)
  870. Dickerson J, Simari G, Subrahmanian V and Kraus S A graph-theoretic approach to protect static and moving targets from adversaries Proceedings of the 9th International Conference on Autonomous Agents and Multiagent Systems: volume 1 - Volume 1, (299-306)
  871. Sedaghat N, Tabatabaee-Yazdi H and Akbarzadeh-T M Pareto front based realistic soft real-time task scheduling with multi-objective genetic algorithm in unstructured heterogeneous distributed system Proceedings of the 5th international conference on Advances in Grid and Pervasive Computing, (268-279)
  872. Wang W, Varela C, Hsu F and Tang C Actor garbage collection using vertex-preserving actor-to-object graph transformations Proceedings of the 5th international conference on Advances in Grid and Pervasive Computing, (244-255)
  873. ACM
    Lavoie T, Eilers-Smith M and Merlo E Challenging cloning related problems with GPU-based algorithms Proceedings of the 4th International Workshop on Software Clones, (25-32)
  874. ACM
    Maman I and Botterweck G SPLGraph Proceedings of the 2010 ICSE Workshop on Product Line Approaches in Software Engineering, (40-47)
  875. ACM
    Méndez-Lojo M, Nguyen D, Prountzos D, Sui X, Hassaan M, Kulkarni M, Burtscher M and Pingali K (2010). Structure-driven optimizations for amorphous data-parallel programs, ACM SIGPLAN Notices, 45:5, (3-14), Online publication date: 1-May-2010.
  876. ACM
    Schaefer C, Pankratius V and Tichy W Engineering parallel applications with tunable architectures Proceedings of the 32nd ACM/IEEE International Conference on Software Engineering - Volume 1, (405-414)
  877. ACM
    Albers S (2010). Energy-efficient algorithms, Communications of the ACM, 53:5, (86-96), Online publication date: 1-May-2010.
  878. Sudholt D and Witt C (2010). Runtime analysis of a binary particle swarm optimizer, Theoretical Computer Science, 411:21, (2084-2100), Online publication date: 1-May-2010.
  879. ACM
    Bhatia S, Mitra P and Giles C Finding algorithms in scientific articles Proceedings of the 19th international conference on World wide web, (1061-1062)
  880. ACM
    Roy A, Kim D and Trivedi K Cyber security analysis using attack countermeasure trees Proceedings of the Sixth Annual Workshop on Cyber Security and Information Intelligence Research, (1-4)
  881. Bose P, Douïeb K, Dujmović V and Howat J Layered working-set trees Proceedings of the 9th Latin American conference on Theoretical Informatics, (686-696)
  882. ACM
    Fischmeister S and Ba Y (2010). Sampling-based program execution monitoring, ACM SIGPLAN Notices, 45:4, (133-142), Online publication date: 13-Apr-2010.
  883. ACM
    Fischmeister S and Ba Y Sampling-based program execution monitoring Proceedings of the ACM SIGPLAN/SIGBED 2010 conference on Languages, compilers, and tools for embedded systems, (133-142)
  884. ACM
    Wang G, Luo T, Goodrich M, Du W and Zhu Z Bureaucratic protocols for secure two-party sorting, selection, and permuting Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, (226-237)
  885. Moser S, Martin J, Westall J and Dean B The role of max-min fairness in DOCSIS 3.0 downstream channel bonding Proceedings of the 33rd IEEE conference on Sarnoff, (221-225)
  886. ACM
    Kandhalu A, Lakshmanan K and Rajkumar R U-connect Proceedings of the 9th ACM/IEEE International Conference on Information Processing in Sensor Networks, (350-361)
  887. Zhou M, Pan Y and Chen Z Modeling and simulation of storage space allocation at TPL systems Proceedings of the 2010 Spring Simulation Multiconference, (1-8)
  888. Farsiniamarj N and Haarslev V (2010). Practical reasoning with qualified number restrictions: A hybrid Abox calculus for the description logic 𝒮ℋ𝒬, AI Communications, 23:2-3, (205-240), Online publication date: 1-Apr-2010.
  889. Adapa R and Tragoudas S (2010). Techniques to prioritize paths for diagnosis, IEEE Transactions on Very Large Scale Integration (VLSI) Systems, 18:4, (658-661), Online publication date: 1-Apr-2010.
  890. Liu Y, Zhang T and Parhi K (2010). Computation error analysis in digital signal processing systems with overscaled supply voltage, IEEE Transactions on Very Large Scale Integration (VLSI) Systems, 18:4, (517-526), Online publication date: 1-Apr-2010.
  891. Dieudonné Y, Labbani-Igbida O and Petit F (2010). Deterministic robot-network localization is hard, IEEE Transactions on Robotics, 26:2, (331-339), Online publication date: 1-Apr-2010.
  892. Banerjee N, Corner M and Levine B (2010). Design and field experimentation of an energy-efficient architecture for DTN throwboxes, IEEE/ACM Transactions on Networking, 18:2, (554-567), Online publication date: 1-Apr-2010.
  893. Misra S, Hong S, Xue G and Tang J (2010). Constrained relay node placement in wireless sensor networks, IEEE/ACM Transactions on Networking, 18:2, (434-447), Online publication date: 1-Apr-2010.
  894. Eryilmaz A, Ozdaglar A, Shah D and Modiano E (2010). Distributed cross-layer algorithms for the optimal control of multihop wireless networks, IEEE/ACM Transactions on Networking, 18:2, (638-651), Online publication date: 1-Apr-2010.
  895. Ilić A (2010). Trees with minimal Laplacian coefficients, Computers & Mathematics with Applications, 59:8, (2776-2783), Online publication date: 1-Apr-2010.
  896. Zhang W, Lin X, Zhang Y, Pei J and Wang W (2010). Threshold-based probabilistic top-k dominating queries, The VLDB Journal — The International Journal on Very Large Data Bases, 19:2, (283-305), Online publication date: 1-Apr-2010.
  897. U L, Mouratidis K and Mamoulis N (2010). Continuous spatial assignment of moving users, The VLDB Journal — The International Journal on Very Large Data Bases, 19:2, (141-160), Online publication date: 1-Apr-2010.
  898. Zou L, Chen L, Özsu M and Zhao D Dynamic skyline queries in large graphs Proceedings of the 15th international conference on Database Systems for Advanced Applications - Volume Part II, (62-78)
  899. Kwasnicka H and Gruszczyk W Coalition formation using combined deterministic and evolutionary approach Proceedings of the Second international conference on Intelligent information and database systems: Part I, (282-293)
  900. Baba K String matching with mismatches by real-valued FFT Proceedings of the 2010 international conference on Computational Science and Its Applications - Volume Part IV, (273-283)
  901. Wang Y, Han Y and Lu T Estimating the influence of documents in IR systems Proceedings of the 2010 international conference on Computational Science and Its Applications - Volume Part IV, (263-272)
  902. ACM
    Kundu A and Bertino E How to authenticate graphs without leaking Proceedings of the 13th International Conference on Extending Database Technology, (609-620)
  903. ACM
    Xiao X, Yi K and Tao Y The hardness and approximation algorithms for l-diversity Proceedings of the 13th International Conference on Extending Database Technology, (135-146)
  904. Yu J, Roh H, Lee W, Pack S and Du D Cooperative bridges Proceedings of the 29th conference on Information communications, (2928-2936)
  905. Yang H, Ren F, Lin C and Zhang J Frequency-domain packet scheduling for 3GPP LTE uplink Proceedings of the 29th conference on Information communications, (2597-2605)
  906. Li P and Fang Y The capacity of heterogeneous wireless networks Proceedings of the 29th conference on Information communications, (2444-2452)
  907. Zhang W, Tang J, Wang C and de Soysa S Reliable adaptive multipath provisioning with bandwidth and differential delay constraints Proceedings of the 29th conference on Information communications, (2178-2186)
  908. ACM
    Jiang I, Chang H and Chang C Optimal wiring topology for electromigration avoidance considering multiple layers and obstacles Proceedings of the 19th international symposium on Physical design, (177-184)
  909. ACM
    Moiseev K, Kolodny A and Wimer S Interconnect power and delay optimization by dynamic programming in gridded design rules Proceedings of the 19th international symposium on Physical design, (153-160)
  910. ACM
    Pelley S, Meisner D, Zandevakili P, Wenisch T and Underwood J Power routing Proceedings of the fifteenth International Conference on Architectural support for programming languages and operating systems, (231-242)
  911. ACM
    Zhang Y, Zhao J and Cao G (2010). Roadcast, ACM SIGMOBILE Mobile Computing and Communications Review, 13:4, (1-14), Online publication date: 12-Mar-2010.
  912. ACM
    Ginat D The baffling CS notions of "as-if" and "don't-care" Proceedings of the 41st ACM technical symposium on Computer science education, (385-389)
  913. ACM
    del Vado Vírseda R A visualization tool for tutoring the interactive learning of data structures and algorithmic schemes. Proceedings of the 41st ACM technical symposium on Computer science education, (187-191)
  914. Yu H A memory- and time-efficient on-chip TCAM minimizer for IP lookup Proceedings of the Conference on Design, Automation and Test in Europe, (926-931)
  915. Collins R, Vellore B and Carloni L Recursion-driven parallel code generation for multi-core platforms Proceedings of the Conference on Design, Automation and Test in Europe, (190-195)
  916. ACM
    Pelley S, Meisner D, Zandevakili P, Wenisch T and Underwood J (2010). Power routing, ACM SIGPLAN Notices, 45:3, (231-242), Online publication date: 5-Mar-2010.
  917. ACM
    Pelley S, Meisner D, Zandevakili P, Wenisch T and Underwood J (2010). Power routing, ACM SIGARCH Computer Architecture News, 38:1, (231-242), Online publication date: 5-Mar-2010.
  918. Li J, Zhang S, Li C and Yan J (2010). Composite lightweight traffic classification system for network management, International Journal of Network Management, 20:2, (85-105), Online publication date: 1-Mar-2010.
  919. ACM
    Yu Y, Ren S and Frieder O (2010). Feasibility of semiring-based timing constraints, ACM Transactions on Embedded Computing Systems, 9:4, (1-24), Online publication date: 1-Mar-2010.
  920. ACM
    Jin X and Chan S (2010). Detecting malicious nodes in peer-to-peer streaming by peer-based monitoring, ACM Transactions on Multimedia Computing, Communications, and Applications, 6:2, (1-18), Online publication date: 1-Mar-2010.
  921. McKilliam R, Smith W and Clarkson I (2010). Linear-time nearest point algorithms for coxeter lattices, IEEE Transactions on Information Theory, 56:3, (1015-1022), Online publication date: 1-Mar-2010.
  922. Zhong C, Miao D and Wang R (2010). A graph-theoretical clustering method based on two rounds of minimum spanning trees, Pattern Recognition, 43:3, (752-766), Online publication date: 1-Mar-2010.
  923. Gładysz B and Kasperski A (2010). Computing mean absolute deviation under uncertainty, Applied Soft Computing, 10:2, (361-366), Online publication date: 1-Mar-2010.
  924. ACM
    Huang C and Vahid F Server-side coprocessor updating for mobile devices with FPGAs Proceedings of the 18th annual ACM/SIGDA international symposium on Field programmable gate arrays, (125-134)
  925. ACM
    Yang Y and Prasanna V High throughput and large capacity pipelined dynamic search tree on FPGA Proceedings of the 18th annual ACM/SIGDA international symposium on Field programmable gate arrays, (83-92)
  926. ACM
    Jiang Y, Tian F, Wang H, Zhang X, Wang X and Dai G Intelligent understanding of handwritten geometry theorem proving Proceedings of the 15th international conference on Intelligent user interfaces, (119-128)
  927. ACM
    Cambazoglu B, Zaragoza H, Chapelle O, Chen J, Liao C, Zheng Z and Degenhardt J Early exit optimizations for additive machine learned ranking systems Proceedings of the third ACM international conference on Web search and data mining, (411-420)
  928. ACM
    Das Sarma A, Gollapudi S, Najork M and Panigrahy R A sketch-based distance oracle for web-scale graphs Proceedings of the third ACM international conference on Web search and data mining, (401-410)
  929. Pantazopoulos P, Stavrakakis I, Passarella A and Conti M Efficient social-aware content placement in opportunistic networks Proceedings of the 7th international conference on Wireless on-demand network systems and services, (17-24)
  930. Demetrescu C, Eppstein D, Galil Z and Italiano G Dynamic graph algorithms Algorithms and theory of computation handbook, (9-9)
  931. Reingold E Algorithm design and analysis techniques Algorithms and theory of computation handbook, (1-1)
  932. Jamieson C and Fair I (2010). Construction of constrained codes for state-independent decoding, IEEE Journal on Selected Areas in Communications, 28:2, (193-199), Online publication date: 1-Feb-2010.
  933. Hu S (2010). A secure partition-based document image watermarking scheme, International Journal of Information and Computer Security, 4:1, (9-23), Online publication date: 1-Feb-2010.
  934. Lin C, Hsu F and Lin W (2010). Recognizing human actions using NWFE-based histogram vectors, EURASIP Journal on Advances in Signal Processing, 2010, (1-10), Online publication date: 1-Feb-2010.
  935. Juan D, Chen Y, Lee M and Chang S (2010). An efficient wake-up strategy considering spurious glitches phenomenon for power gating designs, IEEE Transactions on Very Large Scale Integration (VLSI) Systems, 18:2, (246-255), Online publication date: 1-Feb-2010.
  936. Kolling A and Carpin S (2010). Pursuit-evasion on trees by robot teams, IEEE Transactions on Robotics, 26:1, (32-47), Online publication date: 1-Feb-2010.
  937. Chen T, Tang K, Chen G and Yao X (2010). Analysis of computational time of simple estimation of distribution algorithms, IEEE Transactions on Evolutionary Computation, 14:1, (1-22), Online publication date: 1-Feb-2010.
  938. Rahbar A and Yang O (2010). Agile bandwidth management techniques in slotted all-optical packet switched networks, Computer Networks: The International Journal of Computer and Telecommunications Networking, 54:3, (387-403), Online publication date: 1-Feb-2010.
  939. Chen C and Freedman D (2010). Measuring and computing natural generators for homology groups, Computational Geometry: Theory and Applications, 43:2, (169-181), Online publication date: 1-Feb-2010.
  940. ACM
    Breh R and Kumar V Making mathematical problem solving exploratory and social-synergizing computer algebra systems with semantic and web-2.0 technology Proceedings of the Third Annual ACM Bangalore Conference, (1-7)
  941. Kim T and Liu X A global interconnect reduction technique during high level synthesis Proceedings of the 2010 Asia and South Pacific Design Automation Conference, (695-700)
  942. Yuan X and Wang J Statistical timing verification for transparently latched circuits through structural graph traversal Proceedings of the 2010 Asia and South Pacific Design Automation Conference, (663-668)
  943. Yan J, Jhong M and Chen Z Obstacle-aware longest path using rectangular pattern detouring in routing grids Proceedings of the 2010 Asia and South Pacific Design Automation Conference, (287-292)
  944. Das D, Wang J and Zhou H iRetILP Proceedings of the 2010 Asia and South Pacific Design Automation Conference, (61-67)
  945. Goodrich M Randomized Shellsort Proceedings of the twenty-first annual ACM-SIAM symposium on Discrete algorithms, (1262-1277)
  946. Pătraşcu M and Williams R On the possibility of faster SAT algorithms Proceedings of the twenty-first annual ACM-SIAM symposium on Discrete algorithms, (1065-1075)
  947. Edmonds J and Chakraborty S Bounding variance and expectation of longest path lengths in DAGs Proceedings of the twenty-first annual ACM-SIAM symposium on Discrete algorithms, (766-781)
  948. ACM
    Srivastava S, Gulwani S and Foster J From program verification to program synthesis Proceedings of the 37th annual ACM SIGPLAN-SIGACT symposium on Principles of programming languages, (313-326)
  949. ACM
    Méndez-Lojo M, Nguyen D, Prountzos D, Sui X, Hassaan M, Kulkarni M, Burtscher M and Pingali K Structure-driven optimizations for amorphous data-parallel programs Proceedings of the 15th ACM SIGPLAN Symposium on Principles and Practice of Parallel Programming, (3-14)
  950. ACM
    Tang J, Musolesi M, Mascolo C and Latora V (2010). Characterising temporal distance and reachability in mobile and online social networks, ACM SIGCOMM Computer Communication Review, 40:1, (118-124), Online publication date: 7-Jan-2010.
  951. Griffin T The stratified shortest-paths problem Proceedings of the 2nd international conference on COMmunication systems and NETworks, (268-277)
  952. ACM
    Srivastava S, Gulwani S and Foster J (2010). From program verification to program synthesis, ACM SIGPLAN Notices, 45:1, (313-326), Online publication date: 2-Jan-2010.
  953. Ukkonen A The support vector tree Algorithms and Applications, (244-259)
  954. Andoni A, Krauthgamer R and Onak K Polylogarithmic approximation for edit distance and the asymmetric query complexity Property testing, (244-252)
  955. Andoni A, Krauthgamer R and Onak K Polylogarithmic approximation for edit distance and the asymmetric query complexity Property testing, (244-252)
  956. Wichern G, Mechtley B, Fink A, Thornburg H and Spanias A (2010). An ontological framework for retrieving environmental sounds using semantics and acoustic content, EURASIP Journal on Audio, Speech, and Music Processing, 2010, (1-11), Online publication date: 1-Jan-2010.
  957. Pandurangan G and Khan M Theory of communication networks Algorithms and theory of computation handbook, (27-27)
  958. LaPaugh A VLSI layout algorithms Algorithms and theory of computation handbook, (8-8)
  959. Zomorodian A Computational topology Algorithms and theory of computation handbook, (3-3)
  960. Akeila L, Sinnen O and Humadi W Object oriented parallelisation of graph algorithms using parallel iterator Proceedings of the Eighth Australasian Symposium on Parallel and Distributed Computing - Volume 107, (41-50)
  961. Zhang W, Zhang Y, Cheema M and Lin X Counting distinct objects over sliding windows Proceedings of the Twenty-First Australasian Conference on Database Technologies - Volume 104, (75-84)
  962. Shang S, Deng K and Zheng K Efficient best path monitoring in road networks for instant local traffic information Proceedings of the Twenty-First Australasian Conference on Database Technologies - Volume 104, (47-56)
  963. Mukherjee A, Tari Z and Bertok P Memory efficient state-space analysis in software model-checking Proceedings of the Thirty-Third Australasian Conferenc on Computer Science - Volume 102, (23-32)
  964. Savic V, Población A, Zazo S and García M (2010). Indoor positioning using nonparametric belief propagation based on spanning trees, EURASIP Journal on Wireless Communications and Networking, 2010, (1-12), Online publication date: 1-Jan-2010.
  965. Lu J and Taskin B (2010). Post-CTS delay insertion, VLSI Design, 2010, (1-9), Online publication date: 1-Jan-2010.
  966. Maia C, do Carmo R, de Freitas F, de Campos G and de Souza J (2010). Automated test case prioritization with reactive GRASP, Advances in Software Engineering, 2010, (1-13), Online publication date: 1-Jan-2010.
  967. Antonini G, Frigioni D and Miscione G (2010). Hybrid formulation of the equation systems of the 3-D PEEC model based on graph algorithms, IEEE Transactions on Circuits and Systems Part I: Regular Papers, 57:1, (249-261), Online publication date: 1-Jan-2010.
  968. Ranzato F and Tapparo F (2010). An efficient simulation algorithm based on abstract interpretation, Information and Computation, 208:1, (1-22), Online publication date: 1-Jan-2010.
  969. Kijsipongse E and Ngamsuriyaroj S (2010). Placing pipeline stages on a Grid, Future Generation Computer Systems, 26:1, (50-62), Online publication date: 1-Jan-2010.
  970. Dunne P, Kraus S, Manisterski E and Wooldridge M (2010). Solving coalitional resource games, Artificial Intelligence, 174:1, (20-50), Online publication date: 1-Jan-2010.
  971. Son J, Lee J and Seo S (2010). Topological Key Hierarchy for Energy-Efficient Group Key Management in Wireless Sensor Networks, Wireless Personal Communications: An International Journal, 52:2, (359-382), Online publication date: 1-Jan-2010.
  972. ACM
    Ismail M, Mirza S and Altaf T Design of a cache hierarchy for LogN and LogN+1 model for multi-level cache system for multi-core processors Proceedings of the 7th International Conference on Frontiers of Information Technology, (1-6)
  973. ACM
    Kandemir M, Muralidhara S, Narayanan S, Zhang Y and Ozturk O Optimizing shared cache behavior of chip multiprocessors Proceedings of the 42nd Annual IEEE/ACM International Symposium on Microarchitecture, (505-516)
  974. Chen D and Wang H Locating an Obnoxious Line among Planar Objects Proceedings of the 20th International Symposium on Algorithms and Computation, (740-749)
  975. Chen L and Fu B Linear and Sublinear Time Algorithms for Basis of Abelian Groups Proceedings of the 20th International Symposium on Algorithms and Computation, (493-502)
  976. Chen D and Wang H Approximating Points by a Piecewise Linear Function Proceedings of the 20th International Symposium on Algorithms and Computation, (234-243)
  977. Nuida K A general conversion method of fingerprint codes to (more) robust fingerprint codes against bit erasure Proceedings of the 4th international conference on Information theoretic security, (194-212)
  978. Zhang L, He F, Zhang Y and Zhao S (2009). A New Algorithm for Optimal Path Finding in Complex Networks Based on the Quotient Space, Fundamenta Informaticae, 93:4, (459-469), Online publication date: 1-Dec-2009.
  979. Mahdi K, Safar M and Farahat H (2009). Analysis of temporal evolution of social networks, Journal of Mobile Multimedia, 5:4, (333-350), Online publication date: 1-Dec-2009.
  980. Zhang L, He F, Zhang Y and Zhao S (2009). A New Algorithm for Optimal Path Finding in Complex Networks Based on the Quotient Space, Fundamenta Informaticae, 93:4, (459-469), Online publication date: 1-Dec-2009.
  981. Chen J, Fang H and Saad Y (2009). Fast Approximate kNN Graph Construction for High Dimensional Data via Recursive Lanczos Bisection, The Journal of Machine Learning Research, 10, (1989-2012), Online publication date: 1-Dec-2009.
  982. ACM
    Demetrescu C, Finocchi I and Ribichini A (2009). Trading off space for passes in graph streaming problems, ACM Transactions on Algorithms, 6:1, (1-17), Online publication date: 1-Dec-2009.
  983. ACM
    Finocchi I, Grandoni F and Italiano G (2009). Resilient dictionaries, ACM Transactions on Algorithms, 6:1, (1-19), Online publication date: 1-Dec-2009.
  984. Rai S, Su C and Mukherjee B (2009). On provisioning in all-optical networks, IEEE/ACM Transactions on Networking, 17:6, (1989-2001), Online publication date: 1-Dec-2009.
  985. Braun M and Winter S (2009). Ad hoc solution of the multicommodity-flow-over-time problem, IEEE Transactions on Intelligent Transportation Systems, 10:4, (658-667), Online publication date: 1-Dec-2009.
  986. GüleşIr G, Berg K, Bergmans L and Akşit M (2009). Experimental evaluation of a tool for the verification and transformation of source code in event-driven systems, Empirical Software Engineering, 14:6, (720-777), Online publication date: 1-Dec-2009.
  987. Pantelidou A and Ephremides A Minimum-length scheduling for multicast traffic under channel uncertainty Proceedings of the 28th IEEE conference on Global telecommunications, (5437-5442)
  988. Farrag O, Younis M and D'Amico W MAC support for wireless multimedia sensor networks Proceedings of the 28th IEEE conference on Global telecommunications, (3781-3786)
  989. Kumar U and Helmy A Human behavior and challenges of anonymizing WLAN traces Proceedings of the 28th IEEE conference on Global telecommunications, (3733-3738)
  990. Andrei D, Tornatore M, Martel C and Mukherjee B Flexible scheduling of multicast sessions with different granularities for large data distribution over WDM networks Proceedings of the 28th IEEE conference on Global telecommunications, (2576-2581)
  991. Zhang L, Tang J and Zhang W Strong barrier coverage with directional sensors Proceedings of the 28th IEEE conference on Global telecommunications, (1816-1821)
  992. Han C, Li Y and Yang Y Compatibility between optimal tree-based broadcast routing and metric design Proceedings of the 28th IEEE conference on Global telecommunications, (1517-1522)
  993. Wang W, Cai J and Alfa A Greedy sub-channel redistribution routing scheme in multi-hop wireless OFDMA networks Proceedings of the 28th IEEE conference on Global telecommunications, (680-684)
  994. ACM
    Babaoğlu I, Findik O and Ülker E Effects of discretization on determination of coronary artery disease using support vector machine Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, Culture and Human, (726-729)
  995. Song L, Ma J, Lei J, Zhang D and Wang Z Semantic Structural Similarity Measure for Clustering XML Documents Proceedings of the International Conference on Web Information Systems and Mining, (232-241)
  996. ACM
    Jeschke S, Lach G, Luce R, Pfeiffer O and Zorn E Management and optimal distribution of large student numbers Proceedings of the First Kuwait Conference on e-Services and e-Systems, (1-6)
  997. ACM
    Szebenyi Z, Wolf F and Wylie B Space-efficient time-series call-path profiling of parallel applications Proceedings of the Conference on High Performance Computing Networking, Storage and Analysis, (1-12)
  998. ACM
    Barkstrom B (2009). On using Ada to solve problems in computational economics and related disciplines with concurrent, multiagent algorithms, ACM SIGAda Ada Letters, 29:3, (61-72), Online publication date: 9-Nov-2009.
  999. Dimiccoli M and Salembier P Hierarchical region-based representation for segmentation and filtering with depth in single images Proceedings of the 16th IEEE international conference on Image processing, (3497-3500)
  1000. Li Q, Xia Z and Tao D A global-to-local scheme for imbalanced point matching Proceedings of the 16th IEEE international conference on Image processing, (2093-2096)
  1001. ACM
    Fishman J, Haverkort H and Toma L Improved visibility computation on massive grid terrains Proceedings of the 17th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems, (121-130)
  1002. ACM
    Lee P, Lin C, Chang Y, Shen C and Tseng W An efficient pre-assignment routing algorithm for flip-chip designs Proceedings of the 2009 International Conference on Computer-Aided Design, (239-244)
  1003. ACM
    Liu C, Yuan S, Kuo S and Weng J Obstacle-avoiding rectilinear Steiner tree construction based on Steiner point selection Proceedings of the 2009 International Conference on Computer-Aided Design, (26-32)
  1004. ACM
    Potamias M, Bonchi F, Castillo C and Gionis A Fast shortest path distance estimation in large networks Proceedings of the 18th ACM conference on Information and knowledge management, (867-876)
  1005. Bhamidipaty A, Narendra N, Nagar S, Varshneya V, Vasa M and Deshwal C (2009). Indra, IBM Journal of Research and Development, 53:6, (844-855), Online publication date: 1-Nov-2009.
  1006. Crichigno J, Xie C, Shu W, Wu M and Ghani N A multi-objective approach for throughput optimization and traffic engineering in WDM networks Proceedings of the 43rd Asilomar conference on Signals, systems and computers, (1043-1047)
  1007. Kern W and Paulusma D (2009). On the Core and f-Nucleolus of Flow Games, Mathematics of Operations Research, 34:4, (981-991), Online publication date: 1-Nov-2009.
  1008. ACM
    Barkstrom B On using Ada to solve problems in computational economics and related disciplines with concurrent, multiagent algorithms Proceedings of the ACM SIGAda annual international conference on Ada and related technologies, (61-72)
  1009. Li Q (2009). Interest points of general imbalance, IEEE Transactions on Image Processing, 18:11, (2536-2546), Online publication date: 1-Nov-2009.
  1010. da Costa Cordeiro W, Machado G, Andreis F, dos Santos A, Both C, Gaspary L, Granville L, Bartolini C and Trastour D (2009). ChangeLedge, Computer Networks: The International Journal of Computer and Telecommunications Networking, 53:16, (2782-2799), Online publication date: 1-Nov-2009.
  1011. ACM
    Blagojevic M, Nabi M, Hendriks T, Basten T and Geilen M Fast simulation methods to predict wireless sensor network performance Proceedings of the 6th ACM symposium on Performance evaluation of wireless ad hoc, sensor, and ubiquitous networks, (41-48)
  1012. Arcuri A Theoretical analysis of local search in software testing Proceedings of the 5th international conference on Stochastic algorithms: foundations and applications, (156-168)
  1013. Klamler C, Pferschy U and Ruzika S Committee Selection with a Weight Constraint Based on Lexicographic Rankings of Individuals Algorithmic Decision Theory, (50-61)
  1014. ACM
    Hanna M, Demetriades S, Cho S and Melhem R Progressive hashing for packet processing using set associative memory Proceedings of the 5th ACM/IEEE Symposium on Architectures for Networking and Communications Systems, (153-162)
  1015. ACM
    Song T and Wang D A path combinational method for multiple pattern matching Proceedings of the 5th ACM/IEEE Symposium on Architectures for Networking and Communications Systems, (76-77)
  1016. Sawada K A generalized model for obtaining an optimal level of forming relations between multi-members in a pyramid organization structure Proceedings of the 8th WSEAS international conference on System science and simulation in engineering, (215-218)
  1017. Da B and Ko C Utility-based dynamic resource allocation in multi-user MIMO-OFDMA cellular systems Proceedings of the 15th Asia-Pacific conference on Communications, (106-110)
  1018. ACM
    Dekkers E, Kobbelt L, Pawlicki R and Smith R A sketching interface for feature curve recovery of free-form surfaces 2009 SIAM/ACM Joint Conference on Geometric and Physical Modeling, (235-245)
  1019. Oliveto P, He J and Yao X (2009). Analysis of the (1 + 1)-EA for finding approximate solutions to vertex cover problems, IEEE Transactions on Evolutionary Computation, 13:5, (1006-1029), Online publication date: 1-Oct-2009.
  1020. Marta M and Cardei M (2009). Fast track article, Pervasive and Mobile Computing, 5:5, (542-555), Online publication date: 1-Oct-2009.
  1021. Jia Y and Harman M (2009). Higher Order Mutation Testing, Information and Software Technology, 51:10, (1379-1393), Online publication date: 1-Oct-2009.
  1022. Li X, Hong S and Fang K A heuristic routing protocol for wireless sensor networks in home automation Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing, (3597-3604)
  1023. Su X, Yuan C and Shen S A new mechanism of dynamic spectrum allocation in the cognitive network Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing, (1710-1713)
  1024. Giacometti A, Miyaneh E, Marcel P and Soulet A A framework for pattern-based global models Proceedings of the 10th international conference on Intelligent data engineering and automated learning, (433-440)
  1025. Sarkis M, Zia W and Diepold K Fast depth map compression and meshing with compressed tritree Proceedings of the 9th Asian conference on Computer Vision - Volume Part II, (44-55)
  1026. Buchin K, van Kreveld M, Meijer H, Speckmann B and Verbeek K On planar supports for hypergraphs Proceedings of the 17th international conference on Graph Drawing, (345-356)
  1027. Dumitrescu A, Pach J and Tóth G Drawing hamiltonian cycles with no large angles Proceedings of the 17th international conference on Graph Drawing, (3-14)
  1028. Swaminathan A, Mathew C and Kirovski D Essential Pages Proceedings of the 2009 IEEE/WIC/ACM International Joint Conference on Web Intelligence and Intelligent Agent Technology - Volume 01, (173-182)
  1029. Leeuwen P and Witteveen C Temporal Decoupling and Determining Resource Needs of Autonomous Agents in the Airport Turnaround Process Proceedings of the 2009 IEEE/WIC/ACM International Joint Conference on Web Intelligence and Intelligent Agent Technology - Volume 02, (185-192)
  1030. Bouyioukos C and Kim J Gene regulatory network properties linked to gene expression dynamics in spatially extended systems Proceedings of the 10th European conference on Advances in artificial life: Darwin meets von Neumann - Volume Part I, (321-328)
  1031. Misra J Algorithmic feasibility of entity recognition in artificial life Proceedings of the 10th European conference on Advances in artificial life: Darwin meets von Neumann - Volume Part II, (246-253)
  1032. Richardson S, Olson B, Dymond J, Burns R, Chandrasegaran S, Boeke J, Shehu A and Bader J Automated design of assemblable, modular, synthetic chromosomes Proceedings of the 8th international conference on Parallel processing and applied mathematics: Part II, (280-289)
  1033. Manne F and Patwary M A scalable parallel union-find algorithm for distributed memory computers Proceedings of the 8th international conference on Parallel processing and applied mathematics: Part I, (186-195)
  1034. Wheeler T Large-scale neighbor-joining with NINJA Proceedings of the 9th international conference on Algorithms in bioinformatics, (375-389)
  1035. Zhang D, Lu J, Mao R and Nie J Time-Sensitive Language Modelling for Online Term Recurrence Prediction Proceedings of the 2nd International Conference on Theory of Information Retrieval: Advances in Information Retrieval Theory, (128-138)
  1036. Krahnstoever N, Tu P, Yu T, Patwardhan K, Hamilton D, Yu B, Greco C and Doretto G Intelligent Video for Protecting Crowded Sports Venues Proceedings of the 2009 Sixth IEEE International Conference on Advanced Video and Signal Based Surveillance, (116-121)
  1037. Biberstein M, Dori-Hacohen S, Harel Y, Heilper A, Mendelson B, Shvadron U, Treister E, Turek J and Chang M (2009). Cell broadband engine processor performance optimization, IBM Journal of Research and Development, 53:5, (707-720), Online publication date: 1-Sep-2009.
  1038. Flanagan M, Skachek V, Byrne E and Greferath M (2009). Linear-programming decoding of nonbinary linear codes, IEEE Transactions on Information Theory, 55:9, (4134-4154), Online publication date: 1-Sep-2009.
  1039. Wu C, Chen P, Han Y and Kuo M (2009). Maximum-likelihood priority-first search decodable codes for combined channel estimation and error correction, IEEE Transactions on Information Theory, 55:9, (4191-4203), Online publication date: 1-Sep-2009.
  1040. Chen H and Chang Y (2009). Routing for manufacturability and reliability, IEEE Circuits and Systems Magazine, 09:3, (20-31), Online publication date: 1-Sep-2009.
  1041. De Meo P, Quattrone G and Ursino D (2009). Exploitation of semantic relationships and hierarchical data structures to support a user in his annotation and browsing activities in folksonomies, Information Systems, 34:6, (511-535), Online publication date: 1-Sep-2009.
  1042. Moltó G, Hernández V and Alonso J (2009). Automatic replication of WSRF-based Grid services via operation providers, Future Generation Computer Systems, 25:8, (876-883), Online publication date: 1-Sep-2009.
  1043. Doğan A (2009). A study on performance of dynamic file replication algorithms for real-time file access in Data Grids, Future Generation Computer Systems, 25:8, (829-839), Online publication date: 1-Sep-2009.
  1044. Artishchev-Zapolotsky M (2009). Improved layout of the odd-even sorting network, Computer Networks: The International Journal of Computer and Telecommunications Networking, 53:14, (2387-2395), Online publication date: 1-Sep-2009.
  1045. Chambolle A and Darbon J (2009). On Total Variation Minimization and Surface Evolution Using Parametric Maximum Flows, International Journal of Computer Vision, 84:3, (288-307), Online publication date: 1-Sep-2009.
  1046. Phan V and Garzon M (2009). On codeword design in metric DNA spaces, Natural Computing: an international journal, 8:3, (571-588), Online publication date: 1-Sep-2009.
  1047. ACM
    Katajainen J and Simonsen B Adaptable component frameworks Proceedings of the 2009 ACM SIGPLAN workshop on Generic programming, (13-24)
  1048. ACM
    Thummalapenta S, Xie T, Tillmann N, de Halleux J and Schulte W MSeqGen Proceedings of the 7th joint meeting of the European software engineering conference and the ACM SIGSOFT symposium on The foundations of software engineering, (193-202)
  1049. ACM
    Jeong G, Kim S and Zimmermann T Improving bug triage with bug tossing graphs Proceedings of the 7th joint meeting of the European software engineering conference and the ACM SIGSOFT symposium on The foundations of software engineering, (111-120)
  1050. Liu J, Zhang W and Wang L Model and application of optimal coalition structure Proceedings of the 6th international conference on Fuzzy systems and knowledge discovery - Volume 4, (326-330)
  1051. Amin M and Jamil H FastWrap Proceedings of the 10th IEEE international conference on Information Reuse & Integration, (354-359)
  1052. ACM
    Galčík F, Gąsieniec L and Lingas A Efficient broadcasting in known topology radio networks with long-range interference Proceedings of the 28th ACM symposium on Principles of distributed computing, (230-239)
  1053. Gao W, Blitzer J, Zhou M and Wong K Exploiting bilingual information to improve web search Proceedings of the Joint Conference of the 47th Annual Meeting of the ACL and the 4th International Joint Conference on Natural Language Processing of the AFNLP: Volume 2 - Volume 2, (1075-1083)
  1054. Sauper C and Barzilay R Automatically generating Wikipedia articles Proceedings of the Joint Conference of the 47th Annual Meeting of the ACL and the 4th International Joint Conference on Natural Language Processing of the AFNLP: Volume 1 - Volume 1, (208-216)
  1055. U L, Mamoulis N and Mouratidis K (2009). A fair assignment algorithm for multiple preference queries, Proceedings of the VLDB Endowment, 2:1, (1054-1065), Online publication date: 1-Aug-2009.
  1056. Canim M, Mihaila G, Bhattacharjee B, Ross K and Lang C (2009). An object placement advisor for DB2 using solid state storage, Proceedings of the VLDB Endowment, 2:2, (1318-1329), Online publication date: 1-Aug-2009.
  1057. Kramer K, Hall L, Goldgof D, Remsen A and Luo T (2009). Fast support vector machines for continuous data, IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics, 39:4, (989-1001), Online publication date: 1-Aug-2009.
  1058. Stasse O, Verrelst B, Vanderborght B and Yokoi K (2009). Strategies for humanoid robots to dynamically walkover large obstacles, IEEE Transactions on Robotics, 25:4, (960-967), Online publication date: 1-Aug-2009.
  1059. Ahuja S, Ramasubramanian S and Krunz M (2009). Single-link failure detection in all-optical networks using monitoring cycles and paths, IEEE/ACM Transactions on Networking, 17:4, (1080-1093), Online publication date: 1-Aug-2009.
  1060. Sivaraman V, Elgindy H, Moreland D and Ostry D (2009). Packet pacing in small buffer optical packet switched networks, IEEE/ACM Transactions on Networking, 17:4, (1066-1079), Online publication date: 1-Aug-2009.
  1061. Tal I, Etzion T and Roth R (2009). On row-by-row coding for 2-D constraints, IEEE Transactions on Information Theory, 55:8, (3565-3576), Online publication date: 1-Aug-2009.
  1062. Cresp G, Dam H and Zepernick H (2009). Design of sequence family subsets using a branch and bound technique, IEEE Transactions on Information Theory, 55:8, (3847-3857), Online publication date: 1-Aug-2009.
  1063. Doraiswamy H and Natarajan V (2009). Efficient algorithms for computing Reeb graphs, Computational Geometry: Theory and Applications, 42:6-7, (606-616), Online publication date: 1-Aug-2009.
  1064. Subramani K (2009). Optimal Length Resolution Refutations of Difference Constraint Systems, Journal of Automated Reasoning, 43:2, (121-137), Online publication date: 1-Aug-2009.
  1065. Homan C and Hemaspaandra L (2009). Guarantees for the success frequency of an algorithm for finding Dodgson-election winners, Journal of Heuristics, 15:4, (403-423), Online publication date: 1-Aug-2009.
  1066. ACM
    Yilmaz E and Ozev S Adaptive test elimination for analog/RF circuits Proceedings of the 46th Annual Design Automation Conference, (720-725)
  1067. ACM
    Liu C, Yuan S, Kuo S and Chou Y An O(n log n) path-based obstacle-avoiding algorithm for rectilinear Steiner tree construction Proceedings of the 46th Annual Design Automation Conference, (314-319)
  1068. ACM
    Javaid H and Parameswaran S A design flow for application specific heterogeneous pipelined multiprocessor systems Proceedings of the 46th Annual Design Automation Conference, (250-253)
  1069. Bubenzer J and Würzner K Joining composition and trimming of finite-state transducers Proceedings of the 8th international conference on Finite-state methods and natural language processing, (93-104)
  1070. ACM
    Kumaran G and Carvalho V Reducing long queries using query quality predictors Proceedings of the 32nd international ACM SIGIR conference on Research and development in information retrieval, (564-571)
  1071. Filippoupolitis A and Gelenbe E A decision support system for disaster management in buildings Proceedings of the 2009 Summer Computer Simulation Conference, (141-147)
  1072. Nugmanov Y, Panda B and Hu Y Analysis of Data Dependency Based Intrusion Detection System Proceedings of the 23rd Annual IFIP WG 11.3 Working Conference on Data and Applications Security XXIII, (111-125)
  1073. Hanneforth T A Memory-efficient ε-Removal Algorithm for Weighted Acyclic Finite-State Automata Proceedings of the 2009 conference on Finite-State Methods and Natural Language Processing: Post-proceedings of the 7th International Workshop FSMNLP 2008, (72-81)
  1074. Chen Y A Fast Approximation Algorithm for the k Partition-Distance Problem Proceedings of the International Conference on Computational Science and Its Applications: Part II, (537-546)
  1075. ACM
    Arcuri A Insight knowledge in search based software testing Proceedings of the 11th Annual conference on Genetic and evolutionary computation, (1649-1656)
  1076. ACM
    Jafarpour H, Mehrotra S, Venkatasubramanian N and Montanari M MICS Proceedings of the Third ACM International Conference on Distributed Event-Based Systems, (1-12)
  1077. ACM
    Schultz-Møller N, Migliavacca M and Pietzuch P Distributed complex event processing with query rewriting Proceedings of the Third ACM International Conference on Distributed Event-Based Systems, (1-12)
  1078. Benkoczi R, Bhattacharya B, Das S and Sember J (2009). Single facility collection depots location problem in the plane, Computational Geometry: Theory and Applications, 42:5, (403-418), Online publication date: 1-Jul-2009.
  1079. Abbott T, Burr M, Chan T, Demaine E, Demaine M, Hugg J, Kane D, Langerman S, Nelson J, Rafalin E, Seyboth K and Yeung V (2009). Dynamic ham-sandwich cuts in the plane, Computational Geometry: Theory and Applications, 42:5, (419-428), Online publication date: 1-Jul-2009.
  1080. ACM
    Zhou B and Pei J (2009). Link spam target detection using page farms, ACM Transactions on Knowledge Discovery from Data, 3:3, (1-38), Online publication date: 1-Jul-2009.
  1081. Liao W, Ji Q and Wallace W (2009). Approximate nonmyopic sensor selection via submodularity and partitioning, IEEE Transactions on Systems, Man, and Cybernetics, Part A: Systems and Humans, 39:4, (782-794), Online publication date: 1-Jul-2009.
  1082. Wang J, Das D and Zhou H (2009). Gate sizing by Lagrangian relaxation revisited, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 28:7, (1071-1084), Online publication date: 1-Jul-2009.
  1083. Demaine E, Gomez-Martin F, Meijer H, Rappaport D, Taslakian P, Toussaint G, Winograd T and Wood D (2009). The distance geometry of music, Computational Geometry: Theory and Applications, 42:5, (429-454), Online publication date: 1-Jul-2009.
  1084. Liu D, Cao Y and Li C (2009). Liana, The Journal of Supercomputing, 49:1, (127-156), Online publication date: 1-Jul-2009.
  1085. ACM
    Miranskyy A, Cialini E and Godwin D Selection of customers for operational and usage profiling Proceedings of the Second International Workshop on Testing Database Systems, (1-6)
  1086. ACM
    Arasu A and Kaushik R A grammar-based entity representation framework for data cleaning Proceedings of the 2009 ACM SIGMOD International Conference on Management of data, (233-244)
  1087. ACM
    Han W and Lee J Dependency-aware reordering for parallelizing query optimization in multi-core CPUs Proceedings of the 2009 ACM SIGMOD International Conference on Management of data, (45-58)
  1088. ACM
    Kešelj V, Liu H, Zeh N, Blouin C and Whidden C Finding optimal parameters for edit distance based sequence classification is NP-hard Proceedings of the KDD-09 Workshop on Statistical and Relational Learning in Bioinformatics, (17-21)
  1089. ACM
    Tantipathananandh C and Berger-Wolf T Constant-factor approximation algorithms for identifying dynamic communities Proceedings of the 15th ACM SIGKDD international conference on Knowledge discovery and data mining, (827-836)
  1090. ACM
    Lappas T, Arai B, Platakis M, Kotsakos D and Gunopulos D On burstiness-aware search for document sequences Proceedings of the 15th ACM SIGKDD international conference on Knowledge discovery and data mining, (477-486)
  1091. ACM
    Armoni M and Ben-Ari M (2009). The concept of nondeterminism, ACM SIGCSE Bulletin, 41:2, (141-160), Online publication date: 25-Jun-2009.
  1092. Han S and Xia Y (2009). Optimal node-selection algorithm for parallel download in overlay content-distribution networks, Computer Networks: The International Journal of Computer and Telecommunications Networking, 53:9, (1480-1496), Online publication date: 25-Jun-2009.
  1093. Ehrenfeucht A, Mcconnell R and Woo S Contracted Suffix Trees Proceedings of the 20th Annual Symposium on Combinatorial Pattern Matching - Volume 5577, (41-53)
  1094. Antichi G, Di Pietro A, Ficara D, Giordano S, Procissi G and Vitucci F A heuristic and hybrid hash-based approach to fast lookup Proceedings of the 15th international conference on High Performance Switching and Routing, (178-183)
  1095. Sen A, Murthy S and Banerjee S Region-based connectivity Proceedings of the 15th international conference on High Performance Switching and Routing, (94-100)
  1096. Fusco G and Gupta H Selection and orientation of directional sensors for coverage maximization Proceedings of the 6th Annual IEEE communications society conference on Sensor, Mesh and Ad Hoc Communications and Networks, (556-564)
  1097. Xu Y, Wan S, Tang J and Wolff R Interference aware routing and scheduling in wireless backhaul networks with smart antennas Proceedings of the 6th Annual IEEE communications society conference on Sensor, Mesh and Ad Hoc Communications and Networks, (117-125)
  1098. Bauer Jr. D, Carothers C and Holder A Scalable Time Warp on Blue Gene Supercomputers Proceedings of the 2009 ACM/IEEE/SCS 23rd Workshop on Principles of Advanced and Distributed Simulation, (35-44)
  1099. ACM
    Kinsy M, Cho M, Wen T, Suh E, van Dijk M and Devadas S Application-aware deadlock-free oblivious routing Proceedings of the 36th annual international symposium on Computer architecture, (208-219)
  1100. ACM
    Mitev M, Racheva E and Marinova G Algorithm for defining of initial package of notions for purpose of e-learning Proceedings of the International Conference on Computer Systems and Technologies and Workshop for PhD Students in Computing, (1-5)
  1101. ACM
    Kinsy M, Cho M, Wen T, Suh E, van Dijk M and Devadas S (2009). Application-aware deadlock-free oblivious routing, ACM SIGARCH Computer Architecture News, 37:3, (208-219), Online publication date: 15-Jun-2009.
  1102. Zhou N, Zhu X, Huang Y and Lin H Adaptive resource allocation for multi-destination relay systems based on OFDM modulation Proceedings of the 2009 IEEE international conference on Communications, (3760-3764)
  1103. Shi L, Fu J and Fu X Loop-free forwarding table updates with minimal link overflow Proceedings of the 2009 IEEE international conference on Communications, (2091-2096)
  1104. Uludag S, Uludag Z, Nahrstedt K, Lui K and Baker F A laplace transform-based method to stochastic path finding Proceedings of the 2009 IEEE international conference on Communications, (1319-1323)
  1105. Guo H, Qian Y, Lu K and Moayeri N Backbone construction for heterogeneous wireless ad hoc networks Proceedings of the 2009 IEEE international conference on Communications, (184-188)
  1106. ACM
    Liu J and Ye J Efficient Euclidean projections in linear time Proceedings of the 26th Annual International Conference on Machine Learning, (657-664)
  1107. ACM
    de Assuncao M, di Costanzo A and Buyya R Evaluating the cost-benefit of using cloud computing to extend the capacity of clusters Proceedings of the 18th ACM international symposium on High performance distributed computing, (141-150)
  1108. Cortés J Global formation-shape stabilization of relative sensing networks Proceedings of the 2009 conference on American Control Conference, (1460-1465)
  1109. Cowlagi R and Tsiotras P Shortest distance problems in graphs using history-dependent transition costs with application to kinodynamic path planning Proceedings of the 2009 conference on American Control Conference, (414-419)
  1110. Van Long T and Linsen L Multiclustertree Proceedings of the 11th Eurographics / IEEE - VGTC conference on Visualization, (823-830)
  1111. Leão R and Barbosa V Approximate Conditional Distributions of Distances between Nodes in a Two-Dimensional Sensor Network Proceedings of the 16th International Conference on Analytical and Stochastic Modeling Techniques and Applications, (324-338)
  1112. Ozgul F, Erdem Z and Bowerman C Prediction of past unsolved terrorist attacks Proceedings of the 2009 IEEE international conference on Intelligence and security informatics, (37-42)
  1113. ACM
    Afshani P, Hamilton C and Zeh N A general approach for cache-oblivious range reporting and approximate range counting Proceedings of the twenty-fifth annual symposium on Computational geometry, (287-295)
  1114. ACM
    Agarwal P, Ezra E and Shair M Near-linear approximation algorithms for geometric hitting sets Proceedings of the twenty-fifth annual symposium on Computational geometry, (23-32)
  1115. Groover T (2009). Using games to introduce middle school girls to computer science, Journal of Computing Sciences in Colleges, 24:6, (132-138), Online publication date: 1-Jun-2009.
  1116. Li M and Kotz D (2009). Towards collaborative data reduction in stream-processing systems, International Journal of Communication Networks and Distributed Systems, 2:4, (375-400), Online publication date: 1-Jun-2009.
  1117. ACM
    Fung W, Sham I, Yuan G and Aamodt T (2009). Dynamic warp formation, ACM Transactions on Architecture and Code Optimization, 6:2, (1-37), Online publication date: 1-Jun-2009.
  1118. Samanta R, Venkataraman G and Hu J (2009). Clock buffer polarity assignment for power noise reduction, IEEE Transactions on Very Large Scale Integration (VLSI) Systems, 17:6, (770-780), Online publication date: 1-Jun-2009.
  1119. Djukic P and Valaee S (2009). Delay aware link scheduling for multi-hop TDMA wireless networks, IEEE/ACM Transactions on Networking, 17:3, (870-883), Online publication date: 1-Jun-2009.
  1120. Carrabs F, Cerulli R and Gentili M (2009). The labeled maximum matching problem, Computers and Operations Research, 36:6, (1859-1871), Online publication date: 1-Jun-2009.
  1121. ACM
    Aronov B, Ezra E and Shair M Small-size ε-nets for axis-parallel rectangles and boxes Proceedings of the forty-first annual ACM symposium on Theory of computing, (639-648)
  1122. ACM
    Andersen R and Peres Y Finding sparse cuts locally using evolving sets Proceedings of the forty-first annual ACM symposium on Theory of computing, (235-244)
  1123. ACM
    Andoni A and Onak K Approximating edit distance in near-linear time Proceedings of the forty-first annual ACM symposium on Theory of computing, (199-204)
  1124. Frias L and Petit J Combining digital access and parallel partition for quicksort and quickselect Proceedings of the 2009 ICSE Workshop on Multicore Software Engineering, (33-40)
  1125. Ogasawara E, Rangel P, Murta L, Werner C and Mattoso M Comparison and versioning of scientific workflows Proceedings of the 2009 ICSE Workshop on Comparison and Versioning of Software Models, (25-30)
  1126. Hsu H and Orso A MINTS Proceedings of the 31st International Conference on Software Engineering, (419-429)
  1127. Matysik S and Walter J Using a pocket-filling strategy for distributed reconfiguration of a system of hexagonal metamorphic robots in an obstacle-cluttered environment Proceedings of the 2009 IEEE international conference on Robotics and Automation, (3266-3273)
  1128. Witt C Greedy Local Search and Vertex Cover in Sparse Random Graphs Proceedings of the 6th Annual Conference on Theory and Applications of Models of Computation, (410-419)
  1129. Zhu B Approximability and Fixed-Parameter Tractability for the Exemplar Genomic Distance Problems Proceedings of the 6th Annual Conference on Theory and Applications of Models of Computation, (71-80)
  1130. Hanna M, Demetriades S, Cho S and Melhem R CHAP Proceedings of the 8th International IFIP-TC 6 Networking Conference, (756-769)
  1131. Li Z, Yu Y, Hei X and Tsang D A Unified Framework for Sub-stream Scheduling in P2P Hybrid Streaming Systems and How to Do Better? Proceedings of the 8th International IFIP-TC 6 Networking Conference, (728-741)
  1132. Šišlák D, Volf P and Pěchouček M Accelerated A* path planning Proceedings of The 8th International Conference on Autonomous Agents and Multiagent Systems - Volume 2, (1133-1134)
  1133. ACM
    Yan J and Chen Z RDL pre-assignment routing for flip-chip designs Proceedings of the 19th ACM Great Lakes symposium on VLSI, (401-404)
  1134. ACM
    Srinivasan R and Carter H A taylor series methodology for analyzing the effects of process variation on circuit operation Proceedings of the 19th ACM Great Lakes symposium on VLSI, (203-208)
  1135. ACM
    Wang R and Cheng C Octilinear redistributive routing in bump arrays Proceedings of the 19th ACM Great Lakes symposium on VLSI, (191-196)
  1136. Faliszewski P, Hemaspaandra E, Hemaspaandra L and Rothe J (2009). Llull and Copeland voting computationally resist bribery and constructive control, Journal of Artificial Intelligence Research, 35:1, (275-341), Online publication date: 1-May-2009.
  1137. ACM
    Yan T and Wong M (2009). Theories and algorithms on single-detour routing for untangling twisted bus, ACM Transactions on Design Automation of Electronic Systems, 14:3, (1-21), Online publication date: 1-May-2009.
  1138. ACM
    Liu C, Yuan S, Kuo S and Wang S (2009). High-performance obstacle-avoiding rectilinear steiner tree construction, ACM Transactions on Design Automation of Electronic Systems, 14:3, (1-29), Online publication date: 1-May-2009.
  1139. Lee W, Liu H and Chang Y (2009). Voltage-Island partitioning and floorplanning under timing constraints, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 28:5, (690-702), Online publication date: 1-May-2009.
  1140. Iyer K and Prasanna S (2009). A linear time algorithm for finding an optimal degree-bounded subtree of an edge-weighted tree, Information Processing Letters, 109:11, (560-562), Online publication date: 1-May-2009.
  1141. Dimitroulakos G, Kostaras N, Galanis M and Goutis C (2009). Compiler assisted architectural exploration framework for coarse grained reconfigurable arrays, The Journal of Supercomputing, 48:2, (115-151), Online publication date: 1-May-2009.
  1142. Yuan S Maximum reliable path under multiple failures Proceedings of the international conference on Computational and information science 2009, (333-337)
  1143. Franklin M, Gondree M and Mohassel P Communication-Efficient Private Protocols for Longest Common Subsequence Proceedings of the The Cryptographers' Track at the RSA Conference 2009 on Topics in Cryptology, (265-278)
  1144. Yang C and Orailoglu A Towards no-cost adaptive MPSoC static schedules through exploitation of logical-to-physical core mapping latitude Proceedings of the Conference on Design, Automation and Test in Europe, (63-68)
  1145. Mérindol P, Pansiot J and Cateloin S Low complexity link state multipath routing Proceedings of the 28th IEEE international conference on Computer Communications Workshops, (55-60)
  1146. Arora A and Sang L Dialog codes for secure wireless communications Proceedings of the 2009 International Conference on Information Processing in Sensor Networks, (13-24)
  1147. Boyer J, Falconer D and Yanikomeroglu H Diversity-multiplexing tradeoff bounds for wireless relay networks Proceedings of the 2009 IEEE conference on Wireless Communications & Networking Conference, (604-609)
  1148. ACM
    Krämer J and Seeger B (2009). Semantics and implementation of continuous sliding window queries over data streams, ACM Transactions on Database Systems, 34:1, (1-49), Online publication date: 1-Apr-2009.
  1149. ACM
    Arvestad L, Lagergren J and Sennblad B (2009). The gene evolution model and computing its associated probabilities, Journal of the ACM, 56:2, (1-44), Online publication date: 1-Apr-2009.
  1150. ACM
    Lee C (2009). Ranking functions for size-change termination, ACM Transactions on Programming Languages and Systems, 31:3, (1-42), Online publication date: 1-Apr-2009.
  1151. Lázaro M, Sánchez-Fernández M and Artés-Rodríguez A (2009). Optimal sensor selection in binary heterogeneous sensor networks, IEEE Transactions on Signal Processing, 57:4, (1577-1587), Online publication date: 1-Apr-2009.
  1152. Park Y, Shackney S and Schwartz R (2009). Network-Based Inference of Cancer Progression from Microarray Data, IEEE/ACM Transactions on Computational Biology and Bioinformatics, 6:2, (200-212), Online publication date: 1-Apr-2009.
  1153. Sanyal A, Ganeshpure K and Kundu S (2009). An improved soft-error rate measurement technique, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 28:4, (596-600), Online publication date: 1-Apr-2009.
  1154. Schmidt M, Samatova N, Thomas K and Park B (2009). A scalable, parallel algorithm for maximal clique enumeration, Journal of Parallel and Distributed Computing, 69:4, (417-428), Online publication date: 1-Apr-2009.
  1155. Gkoulalas-Divanis A, Verykios V and Bozanis P (2009). A network aware privacy model for online requests in trajectory data, Data & Knowledge Engineering, 68:4, (431-452), Online publication date: 1-Apr-2009.
  1156. Cornelsen S and Di Stefano G (2009). Treelike comparability graphs, Discrete Applied Mathematics, 157:8, (1711-1722), Online publication date: 1-Apr-2009.
  1157. Gudmundsson J, van Kreveld M and Narasimhan G (2009). Region-restricted clustering for geographic data mining, Computational Geometry: Theory and Applications, 42:3, (231-240), Online publication date: 1-Apr-2009.
  1158. Davidson I and Ravi S (2009). Using instance-level constraints in agglomerative hierarchical clustering, Data Mining and Knowledge Discovery, 18:2, (257-282), Online publication date: 1-Apr-2009.
  1159. ACM
    Lee T and Wang T Robust layer assignment for via optimization in multi-layer global routing Proceedings of the 2009 international symposium on Physical design, (159-166)
  1160. ACM
    Lee K, Lin S and Wang T Redundant via insertion with wire bending Proceedings of the 2009 international symposium on Physical design, (123-130)
  1161. ACM
    Lee W, Marculescu D and Chang Y Post-floorplanning power/ground ring synthesis for multiple-supply-voltage designs Proceedings of the 2009 international symposium on Physical design, (5-12)
  1162. ACM
    Xiao Y, Wu W, Pei J, Wang W and He Z Efficiently indexing shortest paths by exploiting symmetry in graphs Proceedings of the 12th International Conference on Extending Database Technology: Advances in Database Technology, (493-504)
  1163. ACM
    Cheng J and Yu J On-line exact shortest distance query processing Proceedings of the 12th International Conference on Extending Database Technology: Advances in Database Technology, (481-492)
  1164. ACM
    Zhou B and Pei J Answering aggregate keyword queries on relational databases using minimal group-bys Proceedings of the 12th International Conference on Extending Database Technology: Advances in Database Technology, (108-119)
  1165. ACM
    Selçuk Candan K, Cao H, Qi Y and Sapino M AlphaSum Proceedings of the 12th International Conference on Extending Database Technology: Advances in Database Technology, (96-107)
  1166. ACM
    Biton O, Davidson S, Khanna S and Roy S Optimizing user views for workflows Proceedings of the 12th International Conference on Database Theory, (310-323)
  1167. Bronevetsky G Communication-Sensitive Static Dataflow for Parallel Message Passing Applications Proceedings of the 7th annual IEEE/ACM International Symposium on Code Generation and Optimization, (1-12)
  1168. Bova S and Montagna F (2009). The consequence relation in the logic of commutative GBL-algebras is PSPACE-complete, Theoretical Computer Science, 410:12-13, (1143-1158), Online publication date: 20-Mar-2009.
  1169. ACM
    Harsh P and Newman R Using geo-spatial session tagging for smart multicast session discovery Proceedings of the 2009 ACM symposium on Applied Computing, (22-27)
  1170. ACM
    Bond M and McKinley K Leak pruning Proceedings of the 14th international conference on Architectural support for programming languages and operating systems, (277-288)
  1171. ACM
    Hansen S (2009). Analyzing programming projects, ACM SIGCSE Bulletin, 41:1, (377-381), Online publication date: 4-Mar-2009.
  1172. ACM
    Hansen S Analyzing programming projects Proceedings of the 40th ACM technical symposium on Computer science education, (377-381)
  1173. Lichte H and Weide J Modeling obstacles in INET/Mobility framework Proceedings of the 2nd International Conference on Simulation Tools and Techniques, (1-7)
  1174. Hui S, Fader P and Bradlow E (2009). Path Data in Marketing, Marketing Science, 28:2, (320-335), Online publication date: 1-Mar-2009.
  1175. ACM
    Bond M and McKinley K (2009). Leak pruning, ACM SIGARCH Computer Architecture News, 37:1, (277-288), Online publication date: 1-Mar-2009.
  1176. ACM
    Majzoobi M, Koushanfar F and Potkonjak M (2009). Techniques for Design and Implementation of Secure Reconfigurable PUFs, ACM Transactions on Reconfigurable Technology and Systems, 2:1, (1-33), Online publication date: 1-Mar-2009.
  1177. Levin M (2009). Combinatorial optimization in system configuration design, Automation and Remote Control, 70:3, (519-561), Online publication date: 1-Mar-2009.
  1178. Wang X, Xie S and Hu X (2009). Recursive analysis for soft handoff schemes in CDMA cellular systems, IEEE Transactions on Wireless Communications, 8:3, (1499-1507), Online publication date: 1-Mar-2009.
  1179. Hruschka E, Campello R, Freitas A and De Carvalho A (2009). A survey of evolutionary algorithms for clustering, IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews, 39:2, (133-155), Online publication date: 1-Mar-2009.
  1180. Zhu H and Zhou M (2009). M-M role-transfer problems and their solutions, IEEE Transactions on Systems, Man, and Cybernetics, Part A: Systems and Humans, 39:2, (448-459), Online publication date: 1-Mar-2009.
  1181. Chen J, Kanj I, Meng J, Xia G and Zhang F (2009). On the pseudo-achromatic number problem, Theoretical Computer Science, 410:8-10, (818-829), Online publication date: 1-Mar-2009.
  1182. Zhang Z, Gao X and Wu W (2009). Algorithms for connected set cover problem and fault-tolerant connected set cover problem, Theoretical Computer Science, 410:8-10, (812-817), Online publication date: 1-Mar-2009.
  1183. Bhowmick P and Bhattacharya B (2009). Removal of digitization errors in fingerprint ridgelines using B-splines, Pattern Recognition, 42:3, (465-474), Online publication date: 1-Mar-2009.
  1184. Zheng Q and Veeravalli B (2009). On the design of communication-aware fault-tolerant scheduling algorithms for precedence constrained tasks in grid computing systems with dedicated communication devices, Journal of Parallel and Distributed Computing, 69:3, (282-294), Online publication date: 1-Mar-2009.
  1185. Hoffmann G and Areces C (2009). HTab, Electronic Notes in Theoretical Computer Science (ENTCS), 231, (3-19), Online publication date: 1-Mar-2009.
  1186. Guha R, Bagherzadeh N and Chou P (2009). Resource management and task partitioning and scheduling on a run-time reconfigurable embedded system, Computers and Electrical Engineering, 35:2, (258-285), Online publication date: 1-Mar-2009.
  1187. Chang C, Lee C and Chiu Y (2009). Enhanced authentication scheme with anonymity for roaming service in global mobility networks, Computer Communications, 32:4, (611-618), Online publication date: 1-Mar-2009.
  1188. Rostami H, Habibi J and Livani E (2009). Semantic partitioning of peer-to-peer search space, Computer Communications, 32:4, (619-633), Online publication date: 1-Mar-2009.
  1189. Wu B, Chi C, Xu S, Gu M and Sun J (2009). QoS requirement generation and algorithm selection for composite service based on reference vector, Journal of Computer Science and Technology, 24:2, (357-372), Online publication date: 1-Mar-2009.
  1190. ACM
    Bond M and McKinley K (2009). Leak pruning, ACM SIGPLAN Notices, 44:3, (277-288), Online publication date: 28-Feb-2009.
  1191. Agrawal N, Arpaci-Dusseau A and Arpaci-Dusseau R Generating realistic impressions for file-system benchmarking Proccedings of the 7th conference on File and storage technologies, (125-138)
  1192. ACM
    Yu J and Lai J A novel minloop SB design to improve FPGA routability Proceedings of the ACM/SIGDA international symposium on Field programmable gate arrays, (286-286)
  1193. Ibarra L A Fully Dynamic Graph Algorithm for Recognizing Proper Interval Graphs Proceedings of the 3rd International Workshop on Algorithms and Computation, (190-201)
  1194. Chung E, Wang J and Lee Y Korean POI word segmentation and tagging for speech interfac in-vehicle navigation system Proceedings of the 11th international conference on Advanced Communication Technology - Volume 3, (2125-2128)
  1195. ACM
    Chen K, Lee C and Chang C Embedding secret messages based on chaotic map and Huffman coding Proceedings of the 3rd International Conference on Ubiquitous Information Management and Communication, (336-341)
  1196. ACM
    Kulkarni M, Burtscher M, Inkulu R, Pingali K and Casçaval C (2009). How much parallelism is there in irregular applications?, ACM SIGPLAN Notices, 44:4, (3-14), Online publication date: 14-Feb-2009.
  1197. ACM
    Kulkarni M, Burtscher M, Inkulu R, Pingali K and Casçaval C How much parallelism is there in irregular applications? Proceedings of the 14th ACM SIGPLAN symposium on Principles and practice of parallel programming, (3-14)
  1198. Bouras C and Primpas D (2009). Architectures and performance evaluation of bandwidth brokers, International Journal of Network Management, 19:2, (101-117), Online publication date: 3-Feb-2009.
  1199. Luo H, Li L and Yu H (2009). Routing connections with differentiated reliability requirements in WDM mesh networks, IEEE/ACM Transactions on Networking, 17:1, (253-266), Online publication date: 1-Feb-2009.
  1200. Li P, Zhang C and Fang Y (2009). Capacity and delay of hybrid wireless broadband access networks, IEEE Journal on Selected Areas in Communications, 27:2, (117-125), Online publication date: 1-Feb-2009.
  1201. Sarma M and Mall R (2009). Automatic generation of test specifications for coverage of system state transitions, Information and Software Technology, 51:2, (418-432), Online publication date: 1-Feb-2009.
  1202. Sivignon I and Coeurjolly D (2009). Minimum decomposition of a digital surface into digital plane segments is NP-hard, Discrete Applied Mathematics, 157:3, (558-570), Online publication date: 1-Feb-2009.
  1203. Bouveret S and Lemaître M (2009). Computing leximin-optimal solutions in constraint networks, Artificial Intelligence, 173:2, (343-364), Online publication date: 1-Feb-2009.
  1204. Wang J, Zhang Y, Zhou L, Karypis G and Aggarwal C (2009). CONTOUR, Data Mining and Knowledge Discovery, 18:1, (1-29), Online publication date: 1-Feb-2009.
  1205. Lee S, Okamura K and Yang E Tele-conference using advanced tool on future IP Proceedings of the 23rd international conference on Information Networking, (347-349)
  1206. Yan J and Chen Z IO connection assignment and RDL routing for flip-chip designs Proceedings of the 2009 Asia and South Pacific Design Automation Conference, (588-593)
  1207. Lei C, Chiang P and Lee Y Post-routing redundant via insertion with wire spreading capability Proceedings of the 2009 Asia and South Pacific Design Automation Conference, (468-473)
  1208. Wang J and Zhou H Exploring adjacency in floorplanning Proceedings of the 2009 Asia and South Pacific Design Automation Conference, (367-372)
  1209. Chen C and Huang J CriAS Proceedings of the 2009 Asia and South Pacific Design Automation Conference, (67-72)
  1210. Chen Y, Chien S and Lin H True color image steganography using palette and minimum spanning tree Proceedings of the 3rd WSEAS international conference on Computer engineering and applications, (273-278)
  1211. Cohen E, Duffield N, Kaplan H, Lund C and Thorup M Stream sampling for variance-optimal estimation of subset sums Proceedings of the twentieth annual ACM-SIAM symposium on Discrete algorithms, (1255-1264)
  1212. Bender M, Fineman J and Gilbert S A new approach to incremental topological ordering Proceedings of the twentieth annual ACM-SIAM symposium on Discrete algorithms, (1108-1115)
  1213. Madani O, Thorup M and Zwick U Discounted deterministic Markov decision processes and discounted all-pairs shortest paths Proceedings of the twentieth annual ACM-SIAM symposium on Discrete algorithms, (958-967)
  1214. Ferragina P, Nitto I and Venturini R On the bit-complexity of Lempel-Ziv compression Proceedings of the twentieth annual ACM-SIAM symposium on Discrete algorithms, (768-777)
  1215. Kaplan H and Zwick U A simpler implementation and analysis of Chazelle's soft heaps Proceedings of the twentieth annual ACM-SIAM symposium on Discrete algorithms, (477-485)
  1216. Eppstein D, Goodrich M and Strash D Linear-time algorithms for geometric graphs with sublinearly many crossings Proceedings of the twentieth annual ACM-SIAM symposium on Discrete algorithms, (150-159)
  1217. Sun X, Wang H and Li J Microdata protection through approximate microaggregation Proceedings of the Thirty-Second Australasian Conference on Computer Science - Volume 91, (161-168)
  1218. Bacchus F, Dalmao S and Pitassi T (2009). Solving #SAT and Bayesian inference with backtracking search, Journal of Artificial Intelligence Research, 34:1, (391-442), Online publication date: 1-Jan-2009.
  1219. Chen C, Veldhuis R, Kevenaar T and Akkermans A (2009). Biometric quantization through detection rate optimized bit allocation, EURASIP Journal on Advances in Signal Processing, 2009, (1-16), Online publication date: 1-Jan-2009.
  1220. Guo W and Huang X (2009). On coverage and capacity for disaster area wireless networks using mobile relays, EURASIP Journal on Wireless Communications and Networking, 2009, (1-17), Online publication date: 1-Jan-2009.
  1221. ACM
    Armoni M (2009). Reduction in CS, Journal on Educational Resources in Computing, 8:4, (1-30), Online publication date: 1-Jan-2009.
  1222. ACM
    Hashemi M and Ghiasi S (2009). Throughput-driven synthesis of embedded software for pipelined execution on multicore architectures, ACM Transactions on Embedded Computing Systems, 8:2, (1-35), Online publication date: 1-Jan-2009.
  1223. Budalakoti S, Srivastava A and Otey M (2009). Anomaly detection and diagnosis algorithms for discrete symbol sequences with applications to airline safety, IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews, 39:1, (101-113), Online publication date: 1-Jan-2009.
  1224. Hong S and Kim Y (2009). A genetic algorithm for joint replenishment based on the exact inventory cost, Computers and Operations Research, 36:1, (167-175), Online publication date: 1-Jan-2009.
  1225. Chiew K and Li Y (2009). Multistage off-line permutation packet routing on a mesh, Journal of Computer Science and Technology, 24:1, (175-180), Online publication date: 1-Jan-2009.
  1226. ACM
    Sung Y, Rao S, Xie G and Maltz D Towards systematic design of enterprise networks Proceedings of the 2008 ACM CoNEXT Conference, (1-12)
  1227. Lee H and Shim J Indexing Method for Transitive Relationships of Product Information Proceedings of the 2008 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology - Volume 03, (521-524)
  1228. ACM
    Wang Y and Zheng J Edge based parameterization for tubular meshes Proceedings of The 7th ACM SIGGRAPH International Conference on Virtual-Reality Continuum and Its Applications in Industry, (1-6)
  1229. Liu Y and Mohamed Y Multi-agent resource allocation (MARA) for modeling construction processes Proceedings of the 40th Conference on Winter Simulation, (2361-2369)
  1230. ACM
    Cadar C, Ganesh V, Pawlowski P, Dill D and Engler D (2008). EXE, ACM Transactions on Information and System Security, 12:2, (1-38), Online publication date: 1-Dec-2008.
  1231. Kazemitabar S and Beigy H Automatic discovery of subgoals in reinforcement learning using strongly connected components Proceedings of the 15th international conference on Advances in neuro-information processing - Volume Part I, (829-834)
  1232. ACM
    Mahdi K, Farahat H and Safar M Temporal evolution of social networks in Paltalk™ Proceedings of the 10th International Conference on Information Integration and Web-based Applications & Services, (98-103)
  1233. ACM
    Schmidt T, Wählisch M and Christ O AuthoCast Proceedings of the 6th International Conference on Advances in Mobile Computing and Multimedia, (142-149)
  1234. Israeli A and Sharon O (2008). An approximation algorithm for sequential rectangle placement, Information Processing Letters, 108:6, (407-411), Online publication date: 20-Nov-2008.
  1235. Gagie T (2008). Sorting streamed multisets, Information Processing Letters, 108:6, (418-421), Online publication date: 20-Nov-2008.
  1236. Lee B, Park K and Elmasri R Reducing Energy Consumption through the Union of Disjoint Set Forests Algorithm in Sensor Networks Information Networking. Towards Ubiquitous Networking and Services, (594-603)
  1237. Kandemir M, Li F, Irwin M and Son S A novel migration-based NUCA design for chip multiprocessors Proceedings of the 2008 ACM/IEEE conference on Supercomputing, (1-12)
  1238. Cho M, Cheng C, Kinsy M, Suh G and Devadas S Diastolic arrays Proceedings of the 2008 IEEE/ACM International Conference on Computer-Aided Design, (457-464)
  1239. Wang J and Zhou H Linear constraint graph for floorplan optimization with soft blocks Proceedings of the 2008 IEEE/ACM International Conference on Computer-Aided Design, (9-15)
  1240. Liao Q, Blaich A, Striegel A and Thain D ENAVis Proceedings of the 22nd conference on Large installation system administration conference, (59-74)
  1241. ACM
    Luo Y, Xiang K and Li S Acceleration of decision tree searching for IP traffic classification Proceedings of the 4th ACM/IEEE Symposium on Architectures for Networking and Communications Systems, (40-49)
  1242. ACM
    Dickerson M and Goodrich M Two-site Voronoi diagrams in geographic networks Proceedings of the 16th ACM SIGSPATIAL international conference on Advances in geographic information systems, (1-4)
  1243. ACM
    Eppstein D and Goodrich M Studying (non-planar) road networks through an algorithmic lens Proceedings of the 16th ACM SIGSPATIAL international conference on Advances in geographic information systems, (1-10)
  1244. ACM
    Elmasry A, Jensen C and Katajainen J (2008). Multipartite priority queues, ACM Transactions on Algorithms, 5:1, (1-19), Online publication date: 1-Nov-2008.
  1245. ACM
    Chen X, Liu L, Liu Z and Jiang T (2008). On the minimum common integer partition problem, ACM Transactions on Algorithms, 5:1, (1-18), Online publication date: 1-Nov-2008.
  1246. Chen J, Fomin F, Liu Y, Lu S and Villanger Y (2008). Improved algorithms for feedback vertex set problems, Journal of Computer and System Sciences, 74:7, (1188-1198), Online publication date: 1-Nov-2008.
  1247. Amjad H (2008). Data Compression for Proof Replay, Journal of Automated Reasoning, 41:3-4, (193-218), Online publication date: 1-Nov-2008.
  1248. ACM
    Papamanthou C, Tamassia R and Triandopoulos N Authenticated hash tables Proceedings of the 15th ACM conference on Computer and communications security, (437-448)
  1249. ACM
    Yen C and Wang H Broadcast routing based on new link cost model for ad-hoc networks Proceedings of the 5th ACM symposium on Performance evaluation of wireless ad hoc, sensor, and ubiquitous networks, (27-32)
  1250. ACM
    Wang M and Hua X Study on the combination of video concept detectors Proceedings of the 16th ACM international conference on Multimedia, (647-650)
  1251. Bouillard A, Jouhet L and Thierry E Computation of a (min,+) multi-dimensional convolution for end-to-end performance analysis Proceedings of the 3rd International Conference on Performance Evaluation Methodologies and Tools, (1-7)
  1252. ACM
    Plonka D and Barford P Context-aware clustering of DNS query traffic Proceedings of the 8th ACM SIGCOMM conference on Internet measurement, (217-230)
  1253. ACM
    Huang C, Sheldon D and Vahid F Dynamic tuning of configurable architectures Proceedings of the 6th IEEE/ACM/IFIP international conference on Hardware/Software codesign and system synthesis, (97-102)
  1254. ACM
    Javaid H and Parameswaran S Synthesis of heterogeneous pipelined multiprocessor systems using ILP Proceedings of the 6th IEEE/ACM/IFIP international conference on Hardware/Software codesign and system synthesis, (1-6)
  1255. ACM
    Yao D, Frikken K, Atallah M and Tamassia R (2008). Private Information, ACM Transactions on Information and System Security, 12:1, (1-27), Online publication date: 1-Oct-2008.
  1256. Schliep A and Krause R (2008). Efficient Algorithms for the Computational Design of Optimal Tiling Arrays, IEEE/ACM Transactions on Computational Biology and Bioinformatics, 5:4, (557-567), Online publication date: 1-Oct-2008.
  1257. Künzi H and Kreinovich V (2008). Static space–times naturally lead to quasi-pseudometrics, Theoretical Computer Science, 405:1-2, (64-72), Online publication date: 1-Oct-2008.
  1258. Liao W and Ji Q (2008). Efficient non-myopic value-of-information computation for influence diagrams, International Journal of Approximate Reasoning, 49:2, (436-450), Online publication date: 1-Oct-2008.
  1259. Rafalin E and Souvaine D (2008). Topological sweep of the complete graph, Discrete Applied Mathematics, 156:17, (3276-3290), Online publication date: 1-Oct-2008.
  1260. Emamy-K M and Ziegler M (2008). On the coverings of the d-cube for d≤6, Discrete Applied Mathematics, 156:17, (3156-3165), Online publication date: 1-Oct-2008.
  1261. Dechev D, Rouquette N, Pirkelbauer P and Stroustrup B Verification and semantic parallelization of goal-driven autonomous software Proceedings of the 2nd International Conference on Autonomic Computing and Communication Systems, (1-8)
  1262. Michelucci D and Fünfzig C Linear programming for Bernstein based solvers Proceedings of the 7th international conference on Automated deduction in geometry, (163-178)
  1263. ACM
    Ragde P The chilling descent Proceedings of the 2008 international workshop on Functional and declarative programming in education, (13-20)
  1264. Gawrychowski P, Krieger D, Rampersad N and Shallit J Finding the Growth Rate of a Regular of Context-Free Language in Polynomial Time Proceedings of the 12th international conference on Developments in Language Theory, (339-358)
  1265. Menolascina F, Bevilacqua V, Ciminelli C, Armenise M and Mastronardi G A Multi-objective Genetic Algorithm Based Approach to the Optimization of Oligonucleotide Microarray Production Process Proceedings of the 4th international conference on Intelligent Computing: Advanced Intelligent Computing Theories and Applications - with Aspects of Artificial Intelligence, (1039-1046)
  1266. Lu Y, Wang H and Ling S Cryptanalysis of Rabbit Proceedings of the 11th international conference on Information Security, (204-214)
  1267. Furuse K, Sato K, Chen H and Ohbo N A materialized view selection technique for XPath queries Proceedings of the 2nd conference on European computing conference, (287-292)
  1268. Darties B, Durand S and Palaysi J Request Satisfaction Problem in Synchronous Radio Networks Proceedings of the 7th international conference on Ad-hoc, Mobile and Wireless Networks, (451-462)
  1269. Furrow B (2008). A panoply of quantum algorithms, Quantum Information & Computation, 8:8, (834-859), Online publication date: 1-Sep-2008.
  1270. Choros K and Kaczynski K (2008). Time and quality of 3D rendering process using programming code optimisation techniques, International Journal of Intelligent Information and Database Systems, 2:3, (309-319), Online publication date: 1-Sep-2008.
  1271. ACM
    Agrawal K, Leiserson C, He Y and Hsu W (2008). Adaptive work-stealing with parallelism feedback, ACM Transactions on Computer Systems, 26:3, (1-32), Online publication date: 1-Sep-2008.
  1272. ACM
    Panda S, Roy A, Chakrabarti P and Kumar R (2008). Simulation-based verification using Temporally Attributed Boolean Logic, ACM Transactions on Design Automation of Electronic Systems, 13:4, (1-52), Online publication date: 1-Sep-2008.
  1273. Volegov D and Yurin D (2008). Preliminary coarse image registration by using straight lines found on them for constructing super resolution mosaics and 3D scene recovery, Programming and Computing Software, 34:5, (279-293), Online publication date: 1-Sep-2008.
  1274. Lim H, Park H, Choi S and Han T (2008). Detecting Theft of Java Applications via a Static Birthmark Based on Weighted Stack Patterns, IEICE - Transactions on Information and Systems, E91-D:9, (2323-2332), Online publication date: 1-Sep-2008.
  1275. Wu Y, Lee Y and Yang J (2008). Robust and efficient multiclass SVM models for phrase pattern recognition, Pattern Recognition, 41:9, (2874-2889), Online publication date: 1-Sep-2008.
  1276. Huang J and Yao M (2008). On the coordination of maintenance scheduling for transportation fleets of many branches of a logistic service provider, Computers & Mathematics with Applications, 56:5, (1303-1313), Online publication date: 1-Sep-2008.
  1277. Chen H and Chen L Inclusion Test Algorithms for One-Unambiguous Regular Expressions Proceedings of the 5th international colloquium on Theoretical Aspects of Computing, (96-110)
  1278. Vyahhi N, Bakiras S, Kalnis P and Ghinita G Tracking Moving Objects in Anonymized Trajectories Proceedings of the 19th international conference on Database and Expert Systems Applications, (158-171)
  1279. Biberstein M, Harel Y and Heilper A Clock Synchronization in Cell BE Traces Proceedings of the 14th international Euro-Par conference on Parallel Processing, (3-12)
  1280. ACM
    Armoni M (2008). Reductive thinking in a quantitative perspective, ACM SIGCSE Bulletin, 40:3, (53-57), Online publication date: 25-Aug-2008.
  1281. ACM
    B.V A, Patra A, Choudhary A, Srinathan K and Pandu Rangan C On tradeoff between network connectivity, phase complexity and communication complexity of reliable communication tolerating mixed adversary Proceedings of the twenty-seventh ACM symposium on Principles of distributed computing, (115-124)
  1282. Dwork C and Yekhanin S New Efficient Attacks on Statistical Disclosure Control Mechanisms Proceedings of the 28th Annual conference on Cryptology: Advances in Cryptology, (469-480)
  1283. Koltsidas I, Müller H and Viglas S (2008). Sorting hierarchical data in external memory for archiving, Proceedings of the VLDB Endowment, 1:1, (1205-1216), Online publication date: 1-Aug-2008.
  1284. Cheng R, Chen J and Xie X (2008). Cleaning uncertain data with quality guarantees, Proceedings of the VLDB Endowment, 1:1, (722-735), Online publication date: 1-Aug-2008.
  1285. Shang H, Zhang Y, Lin X and Yu J (2008). Taming verification hardness, Proceedings of the VLDB Endowment, 1:1, (364-375), Online publication date: 1-Aug-2008.
  1286. ACM
    Ke Y, Cheng J and Ng W (2008). Correlated pattern mining in quantitative databases, ACM Transactions on Database Systems, 33:3, (1-45), Online publication date: 1-Aug-2008.
  1287. ACM
    Ko S, Gupta I and Jo Y (2008). A new class of nature-inspired algorithms for self-adaptive peer-to-peer computing, ACM Transactions on Autonomous and Adaptive Systems, 3:3, (1-34), Online publication date: 1-Aug-2008.
  1288. Zhao D and Wang Y (2008). MTNet, IEEE Transactions on Very Large Scale Integration (VLSI) Systems, 16:8, (1046-1057), Online publication date: 1-Aug-2008.
  1289. Giunchiglia E, Leone N and Maratea M (2008). On the relation among answer set solvers, Annals of Mathematics and Artificial Intelligence, 53:1-4, (169-204), Online publication date: 1-Aug-2008.
  1290. Yu R, Chen Q, Wang X and Das S Efficient data gathering in partially connected and delay-tolerant wireless sensor networks Proceedings of the 5th International ICST Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness, (1-7)
  1291. Chaum D, Carback R, Clark J, Essex A, Popoveniuc S, Rivest R, Ryan P, Shen E and Sherman A Scantegrity II Proceedings of the conference on Electronic voting technology, (1-13)
  1292. Sepehri M and Goodarzi M Leader election algorithm using heap structure Proceedings of the 12th WSEAS international conference on Computers, (668-672)
  1293. England B and Daniels K A partition-based heuristic for translational box covering Proceedings of the 12th WSEAS international conference on Computers, (542-550)
  1294. ACM
    Dor N, Lev-Ami T, Litvak S, Sagiv M and Weiss D Customization change impact analysis for erp professionals via program slicing Proceedings of the 2008 international symposium on Software testing and analysis, (97-108)
  1295. ACM
    Kumaran G and Allan J Effective and efficient user interaction for long queries Proceedings of the 31st annual international ACM SIGIR conference on Research and development in information retrieval, (11-18)
  1296. Silvestri F (2008). On the limits of cache-oblivious rational permutations, Theoretical Computer Science, 402:2-3, (221-233), Online publication date: 20-Jul-2008.
  1297. Schaus P and Deville Y A global constraint for bin-packing with precedences Proceedings of the 23rd national conference on Artificial intelligence - Volume 1, (369-374)
  1298. ACM
    de Lima T, Rothlauf F and Delbem A The node-depth encoding Proceedings of the 10th annual conference on Genetic and evolutionary computation, (969-976)
  1299. ACM
    Doerr B, Jansen T and Klein C Comparing global and local mutations on bit strings Proceedings of the 10th annual conference on Genetic and evolutionary computation, (929-936)
  1300. ACM
    Weyland D Simulated annealing, its parameter settings and the longest common subsequence problem Proceedings of the 10th annual conference on Genetic and evolutionary computation, (803-810)
  1301. ACM
    Sudholt D Memetic algorithms with variable-depth search to overcome local optima Proceedings of the 10th annual conference on Genetic and evolutionary computation, (787-794)
  1302. ACM
    Neumann F, Reichel J and Skutella M Computing minimum cuts by randomized search heuristics Proceedings of the 10th annual conference on Genetic and evolutionary computation, (779-786)
  1303. ACM
    Doerr B, Happ E and Klein C Crossover can provably be useful in evolutionary computation Proceedings of the 10th annual conference on Genetic and evolutionary computation, (539-546)
  1304. Wang F, Agrawal G and Jin R Query Planning for Searching Inter-dependent Deep-Web Databases Proceedings of the 20th international conference on Scientific and Statistical Database Management, (24-41)
  1305. Chen J and Cheng R Quality-Aware Probing of Uncertain Data with Resource Constraints Proceedings of the 20th international conference on Scientific and Statistical Database Management, (491-508)
  1306. Roditty L and Shapira A All-Pairs Shortest Paths with a Sublinear Additive Error Proceedings of the 35th international colloquium on Automata, Languages and Programming - Volume Part I, (622-633)
  1307. Plaxton C Fast Scheduling of Weighted Unit Jobs with Release Times and Deadlines Proceedings of the 35th international colloquium on Automata, Languages and Programming - Volume Part I, (222-233)
  1308. ACM
    Duchi J, Shalev-Shwartz S, Singer Y and Chandra T Efficient projections onto the l1-ball for learning in high dimensions Proceedings of the 25th international conference on Machine learning, (272-279)
  1309. Mans B, Schmid S and Wattenhofer R Distributed Disaster Disclosure Proceedings of the 11th Scandinavian workshop on Algorithm Theory, (246-257)
  1310. Kowaluk M, Lingas A and Nowak J A Path Cover Technique for LCAs in Dags Proceedings of the 11th Scandinavian workshop on Algorithm Theory, (222-233)
  1311. ACM
    S. D M and Bellur U Availability models for underlay aware overlay networks Proceedings of the second international conference on Distributed event-based systems, (169-180)
  1312. ACM
    Pripužić K, Žarko I and Aberer K Top-k/w publish/subscribe Proceedings of the second international conference on Distributed event-based systems, (127-138)
  1313. ACM
    Li M and Kotz D Event dissemination via group-aware stream filtering Proceedings of the second international conference on Distributed event-based systems, (59-70)
  1314. ACM
    Kumar A, Fernando S, Ha Y, Mesman B and Corporaal H (2008). Multiprocessor systems synthesis for multiple use-cases of multiple applications on FPGA, ACM Transactions on Design Automation of Electronic Systems, 13:3, (1-27), Online publication date: 1-Jul-2008.
  1315. Vassura M, Margara L, Di Lena P, Medri F, Fariselli P and Casadio R (2008). Reconstruction of 3D Structures From Protein Contact Maps, IEEE/ACM Transactions on Computational Biology and Bioinformatics, 5:3, (357-367), Online publication date: 1-Jul-2008.
  1316. Guo D (2008). Regionalization with dynamically constrained agglomerative clustering and partitioning (REDCAP), International Journal of Geographical Information Science, 22:7, (801-823), Online publication date: 1-Jul-2008.
  1317. Meghanathan N and Farago A (2008). On the stability of paths, Steiner trees and connected dominating sets in mobile ad hoc networks, Ad Hoc Networks, 6:5, (744-769), Online publication date: 1-Jul-2008.
  1318. Choi B, Cong G, Fan W and Viglas S (2008). Updating recursive XML views of relations, Journal of Computer Science and Technology, 23:4, (516-537), Online publication date: 1-Jul-2008.
  1319. ACM
    Armoni M Reductive thinking in a quantitative perspective Proceedings of the 13th annual conference on Innovation and technology in computer science education, (53-57)
  1320. Chen D and Wang C Optimal Field Splitting, with Applications in Intensity-Modulated Radiation Therapy Proceedings of the 2nd annual international workshop on Frontiers in Algorithmics, (4-15)
  1321. Chitturi B, Sudborough H, Voit W and Feng X Adjacent Swaps on Strings Proceedings of the 14th annual international conference on Computing and Combinatorics, (299-308)
  1322. Bleiweiss A GPU accelerated pathfinding Proceedings of the 23rd ACM SIGGRAPH/EUROGRAPHICS symposium on Graphics hardware, (65-74)
  1323. Katz G and Kider J All-pairs shortest-paths for large graphs on the GPU Proceedings of the 23rd ACM SIGGRAPH/EUROGRAPHICS symposium on Graphics hardware, (47-55)
  1324. Ozgul F, Erdem Z and Aksoy H Comparing Two Models for Terrorist Group Detection Proceedings of the IEEE ISI 2008 PAISI, PACCF, and SOCO international workshops on Intelligence and Security Informatics, (149-160)
  1325. ACM
    Zhang Y and Joshi J UAQ Proceedings of the 13th ACM symposium on Access control models and technologies, (83-92)
  1326. ACM
    Qi Y, Candan K, Tatemura J, Chen S and Liao F Supporting OLAP operations over imperfectly integrated taxonomies Proceedings of the 2008 ACM SIGMOD international conference on Management of data, (875-888)
  1327. ACM
    Gou G and Chirkova R Efficient algorithms for exact ranked twig-pattern matching over graphs Proceedings of the 2008 ACM SIGMOD international conference on Management of data, (581-594)
  1328. ACM
    He B, Yang K, Fang R, Lu M, Govindaraju N, Luo Q and Sander P Relational joins on graphics processors Proceedings of the 2008 ACM SIGMOD international conference on Management of data, (511-524)
  1329. ACM
    Xu T and Chakrabarty K Broadcast electrode-addressing for pin-constrained multi-functional digital microfluidic biochips Proceedings of the 45th annual Design Automation Conference, (173-178)
  1330. ACM
    Garland M Sparse matrix computations on manycore GPU's Proceedings of the 45th annual Design Automation Conference, (2-6)
  1331. ACM
    Li X, Gu X and Qin H Surface matching using consistent pants decomposition Proceedings of the 2008 ACM symposium on Solid and physical modeling, (125-136)
  1332. Han Y and Wood D (2007). Outfix-Free Regular Languages and Prime Outfix-Free Decomposition, Fundamenta Informaticae, 81:4, (441-457), Online publication date: 1-Jun-2008.
  1333. Lin S (2008). Finding optimal refueling policies, Journal of Computing Sciences in Colleges, 23:6, (272-279), Online publication date: 1-Jun-2008.
  1334. ACM
    Crutchfield C, Dzunic Z, Fineman J, Karger D and Scott J Improved approximations for multiprocessor scheduling under uncertainty Proceedings of the twentieth annual symposium on Parallelism in algorithms and architectures, (246-255)
  1335. ACM
    Chowdhury R and Ramachandran V Cache-efficient dynamic programming algorithms for multicores Proceedings of the twentieth annual symposium on Parallelism in algorithms and architectures, (207-216)
  1336. ACM
    Dorrigiv R, López-Ortiz A and Salinger A Optimal speedup on a low-degree multi-core parallel architecture (LoPRAM) Proceedings of the twentieth annual symposium on Parallelism in algorithms and architectures, (185-187)
  1337. ACM
    Jacox E and Samet H (2008). Metric space similarity joins, ACM Transactions on Database Systems, 33:2, (1-38), Online publication date: 1-Jun-2008.
  1338. ACM
    Bova S and Montagna F (2008). Proof search in Hájek's basic logic, ACM Transactions on Computational Logic, 9:3, (1-26), Online publication date: 1-Jun-2008.
  1339. Zhao C, Zhao Y and Dey S (2008). Intelligent robustness insertion for optimal transient error tolerance improvement in VLSI circuits, IEEE Transactions on Very Large Scale Integration (VLSI) Systems, 16:6, (714-724), Online publication date: 1-Jun-2008.
  1340. Kolpakov R and Raffinot M (2008). New algorithms for text fingerprinting, Journal of Discrete Algorithms, 6:2, (243-255), Online publication date: 1-Jun-2008.
  1341. Zhang Y, Sun W and Inoguchi Y (2008). Predict task running time in grid environments based on CPU load predictions, Future Generation Computer Systems, 24:6, (489-497), Online publication date: 1-Jun-2008.
  1342. Bar-Noy A, Feng Y, Johnson M and Liu O When to reap and when to sow - lowering peak usage with realistic batteries Proceedings of the 7th international conference on Experimental algorithms, (194-207)
  1343. Frias L and Petit J Parallel partition revisited Proceedings of the 7th international conference on Experimental algorithms, (142-153)
  1344. Packer E Computing multiple watchman routes Proceedings of the 7th international conference on Experimental algorithms, (114-128)
  1345. Nash N and Gregg D Comparing integer data structures for 32 and 64 bit keys Proceedings of the 7th international conference on Experimental algorithms, (28-42)
  1346. Sengupta S, Chatterjee M and Kwiat K Interference aware spectrum allocation in IEEE 802.22 wireless mesh networks Proceedings of the Eighth IASTED International Conference on Wireless and Optical Communications, (42-47)
  1347. ACM
    Berend D, Segal M and Shpungin H Power efficient resilience and lifetime in wireless ad-hoc networks Proceedings of the 1st ACM international workshop on Foundations of wireless ad hoc and sensor networking and computing, (17-24)
  1348. ACM
    Liu B, Dousse O, Wang J and Saipulla A Strong barrier coverage of wireless sensor networks Proceedings of the 9th ACM international symposium on Mobile ad hoc networking and computing, (411-420)
  1349. ACM
    Liu C and Wu J Routing in a cyclic mobispace Proceedings of the 9th ACM international symposium on Mobile ad hoc networking and computing, (351-360)
  1350. ACM
    Huang S, Du H and Park E Minimum-latency gossiping in multi-hop wireless networks Proceedings of the 9th ACM international symposium on Mobile ad hoc networking and computing, (323-330)
  1351. ACM
    Wu Y and Li Y Construction algorithms for k-connected m-dominating sets in wireless sensor networks Proceedings of the 9th ACM international symposium on Mobile ad hoc networking and computing, (83-90)
  1352. ACM
    Deissenboeck F, Hummel B, Jürgens E, Schätz B, Wagner S, Girard J and Teuchert S Clone detection in automotive model-based development Proceedings of the 30th international conference on Software engineering, (603-612)
  1353. Giovannucci A, Vinyals M, Rodriguez-Aguilar J and Cerquides J Computationally-efficient winner determination for mixed multi-unit combinatorial auctions Proceedings of the 7th international joint conference on Autonomous agents and multiagent systems - Volume 2, (1071-1078)
  1354. ACM
    Fritsch S, Senart A, Schmidt D and Clarke S Scheduling time-bounded dynamic software adaptation Proceedings of the 2008 international workshop on Software engineering for adaptive and self-managing systems, (89-96)
  1355. ACM
    Yokoyama T, Axelsen H and Glück R Principles of a reversible programming language Proceedings of the 5th conference on Computing frontiers, (43-54)
  1356. Daliri M and Torre V (2008). Robust symbolic representation for shape recognition and retrieval, Pattern Recognition, 41:5, (1782-1798), Online publication date: 1-May-2008.
  1357. Stetsyura G (2008). Combining computation and data transmission in the systems with switches, Automation and Remote Control, 69:5, (891-899), Online publication date: 1-May-2008.
  1358. Goto H (2008). Efficient Calculation of the Transition Matrix in a Max-Plus Linear State-Space Representation, IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, E91-A:5, (1278-1282), Online publication date: 1-May-2008.
  1359. He B, Xie B and Agrawal D (2008). Optimizing deployment of Internet gateway in Wireless Mesh Networks, Computer Communications, 31:7, (1259-1275), Online publication date: 1-May-2008.
  1360. Avallone S and Akyildiz I (2008). A channel assignment algorithm for multi-radio wireless mesh networks, Computer Communications, 31:7, (1343-1353), Online publication date: 1-May-2008.
  1361. Nguyen U (2008). On multicast routing in wireless mesh networks, Computer Communications, 31:7, (1385-1399), Online publication date: 1-May-2008.
  1362. Wu D, Fung G, Yu J and Liu Z Mining multiple time series co-movements Proceedings of the 10th Asia-Pacific web conference on Progress in WWW research and development, (572-583)
  1363. Santha M Quantum walk based search algorithms Proceedings of the 5th international conference on Theory and applications of models of computation, (31-46)
  1364. Shen G and Ortega A Joint Routing and 2D Transform Optimization for Irregular Sensor Network Grids Using Wavelet Lifting Proceedings of the 7th international conference on Information processing in sensor networks, (183-194)
  1365. ACM
    Garofalakis J and Stefanis V MokE Proceedings of the 2008 international cross-disciplinary conference on Web accessibility (W4A), (57-64)
  1366. ACM
    Cai R, Yang J, Lai W, Wang Y and Zhang L iRobot Proceedings of the 17th international conference on World Wide Web, (447-456)
  1367. Amir A, Chencinski E, Iliopoulos C, Kopelowitz T and Zhang H (2008). Property matching and weighted matching, Theoretical Computer Science, 395:2-3, (298-310), Online publication date: 20-Apr-2008.
  1368. Zhuang L, Dunagan J, Simon D, Wang H and Tygar J Characterizing botnets from email spam records Proceedings of the 1st Usenix Workshop on Large-Scale Exploits and Emergent Threats, (1-9)
  1369. ACM
    Lee K, Koh C, Wang T and Chao K Optimal post-routing redundant via insertion Proceedings of the 2008 international symposium on Physical design, (111-117)
  1370. ACM
    Wang R, Young E, Zhu Y, Graham F, Graham R and Cheng C 3-D floorplanning using labeled tree and dual sequences Proceedings of the 2008 international symposium on Physical design, (54-59)
  1371. He Q and Chu C A new image segmentation technique using maximum spanning tree Proceedings of the 12th international conference on Combinatorial image analysis, (197-204)
  1372. Biswas A, Bhowmick P, Sarkar M and Bhattacharya B Finding the orthogonal hull of a digital object Proceedings of the 12th international conference on Combinatorial image analysis, (124-135)
  1373. Fernandes C, Ferreira C, Tjandraatmadja C and Wakabayashi Y A polyhedral investigation of the LCS problem and a repetition-free variant Proceedings of the 8th Latin American conference on Theoretical informatics, (329-338)
  1374. ACM
    Hu J, Roy J and Markov I Sidewinder Proceedings of the 2008 international workshop on System level interconnect prediction, (73-80)
  1375. ACM
    Nicol D (2008). Efficient simulation of Internet worms, ACM Transactions on Modeling and Computer Simulation, 18:2, (1-32), Online publication date: 1-Apr-2008.
  1376. Hsieh Y, Yu C and Wang B (2008). Optimal Algorithms for the Interval Location Problem with Range Constraints on Length and Average, IEEE/ACM Transactions on Computational Biology and Bioinformatics, 5:2, (281-290), Online publication date: 1-Apr-2008.
  1377. Venugopal S and Buyya R (2008). An SCP-based heuristic approach for scheduling distributed data-intensive applications on global grids, Journal of Parallel and Distributed Computing, 68:4, (471-487), Online publication date: 1-Apr-2008.
  1378. Naderi H and Rumpler B Graph-based profile similarity calculation method and evaluation Proceedings of the IR research, 30th European conference on Advances in information retrieval, (637-641)
  1379. Legay A, Murawski A, Ouaknine J and Worrell J On automated verification of probabilistic programs Proceedings of the Theory and practice of software, 14th international conference on Tools and algorithms for the construction and analysis of systems, (173-187)
  1380. ACM
    Kulkarni M, Pingali K, Ramanarayanan G, Walter B, Bala K and Chew L (2008). Optimistic parallelism benefits from data partitioning, ACM SIGPLAN Notices, 43:3, (233-243), Online publication date: 25-Mar-2008.
  1381. ACM
    Tuck J, Ahn W, Ceze L and Torrellas J (2008). SoftSig, ACM SIGPLAN Notices, 43:3, (145-156), Online publication date: 25-Mar-2008.
  1382. ACM
    Kulkarni M, Pingali K, Ramanarayanan G, Walter B, Bala K and Chew L (2008). Optimistic parallelism benefits from data partitioning, ACM SIGOPS Operating Systems Review, 42:2, (233-243), Online publication date: 25-Mar-2008.
  1383. ACM
    Tuck J, Ahn W, Ceze L and Torrellas J (2008). SoftSig, ACM SIGOPS Operating Systems Review, 42:2, (145-156), Online publication date: 25-Mar-2008.
  1384. ACM
    Kulkarni M, Pingali K, Ramanarayanan G, Walter B, Bala K and Chew L (2008). Optimistic parallelism benefits from data partitioning, ACM SIGARCH Computer Architecture News, 36:1, (233-243), Online publication date: 25-Mar-2008.
  1385. ACM
    Tuck J, Ahn W, Ceze L and Torrellas J (2008). SoftSig, ACM SIGARCH Computer Architecture News, 36:1, (145-156), Online publication date: 25-Mar-2008.
  1386. ACM
    Cheng J, Yu J, Lin X, Wang H and Yu P Fast computing reachability labelings for large graphs with high compression rate Proceedings of the 11th international conference on Extending database technology: Advances in database technology, (193-204)
  1387. ACM
    Naderi H, Rumpler B and Pinon J A graph-based profile similarity calculation method for collaborative information retrieval Proceedings of the 2008 ACM symposium on Applied computing, (1127-1131)
  1388. ACM
    Ramanathan M, Koyuturk M, Grama A and Jagannathan S PHALANX Proceedings of the 2008 ACM symposium on Applied computing, (667-673)
  1389. ACM
    Jia X, Guo J and Fettweis G Integrated code generation by using fuzzy control system Proceedings of the 11th international workshop on Software & compilers for embedded systems, (1-10)
  1390. ACM
    Polycarpou I, Pasztor A and Adjouadi M A conceptual approach to teaching induction for computer science Proceedings of the 39th SIGCSE technical symposium on Computer science education, (9-13)
  1391. Sarma M and Mall R (2008). System state coverage through automatic test case generation, International Journal of Information and Communication Technology, 1:3/4, (347-372), Online publication date: 1-Mar-2008.
  1392. Gilpin K, Kotay K, Rus D and Vasilescu I (2008). Miche, International Journal of Robotics Research, 27:3-4, (345-372), Online publication date: 1-Mar-2008.
  1393. ACM
    Kulkarni M, Pingali K, Ramanarayanan G, Walter B, Bala K and Chew L Optimistic parallelism benefits from data partitioning Proceedings of the 13th international conference on Architectural support for programming languages and operating systems, (233-243)
  1394. ACM
    Tuck J, Ahn W, Ceze L and Torrellas J SoftSig Proceedings of the 13th international conference on Architectural support for programming languages and operating systems, (145-156)
  1395. ACM
    Shen C, Li K, Jaikaeo C and Sridhara V (2008). Ant-based distributed constrained steiner tree algorithm for jointly conserving energy and bounding delay in ad hoc multicast routing, ACM Transactions on Autonomous and Adaptive Systems, 3:1, (1-27), Online publication date: 1-Mar-2008.
  1396. ACM
    Roditty L (2008). A faster and simpler fully dynamic transitive closure, ACM Transactions on Algorithms, 4:1, (1-16), Online publication date: 1-Mar-2008.
  1397. ACM
    Kaplan H and Tarjan R (2008). Thin heaps, thick heaps, ACM Transactions on Algorithms, 4:1, (1-14), Online publication date: 1-Mar-2008.
  1398. Bouillard A and Thierry É (2008). An Algorithmic Toolbox for Network Calculus, Discrete Event Dynamic Systems, 18:1, (3-49), Online publication date: 1-Mar-2008.
  1399. ACM
    Polycarpou I, Pasztor A and Adjouadi M (2008). A conceptual approach to teaching induction for computer science, ACM SIGCSE Bulletin, 40:1, (9-13), Online publication date: 29-Feb-2008.
  1400. Kandemir M, Son S and Karakoy M Improving I/O performance of applications through compiler-directed code restructuring Proceedings of the 6th USENIX Conference on File and Storage Technologies, (1-16)
  1401. ACM
    Agrawal K, Fineman J and Sukha J Nested parallelism in transactional memory Proceedings of the 13th ACM SIGPLAN Symposium on Principles and practice of parallel programming, (163-174)
  1402. Lua E, Zhou X, Crowcroft J and Mieghem P (2008). Scalable multicasting with network-aware geometric overlay, Computer Communications, 31:3, (464-488), Online publication date: 15-Feb-2008.
  1403. Ghandeharizadeh S and Shayandeh S Cooperative caching techniques for continuous media in wireless home networks Proceedings of the 1st international conference on Ambient media and systems, (1-8)
  1404. Xie M and Kinoshita Y GA search method for multiple evacuation routes using the information of hazard map Proceedings of the 26th IASTED International Conference on Artificial Intelligence and Applications, (296-300)
  1405. Janowska A and Penczek W (2007). Path Compression in Timed Automata, Fundamenta Informaticae, 79:3-4, (379-399), Online publication date: 1-Feb-2008.
  1406. Porat E and Efremenko K Approximating general metric distances between a pattern and a text Proceedings of the nineteenth annual ACM-SIAM symposium on Discrete algorithms, (419-427)
  1407. Gronau I, Moran S and Snir S Fast and reliable reconstruction of phylogenetic trees with very short edges Proceedings of the nineteenth annual ACM-SIAM symposium on Discrete algorithms, (379-388)
  1408. ACM
    Hage J and Holdermans S Heap recycling for lazy languages Proceedings of the 2008 ACM SIGPLAN symposium on Partial evaluation and semantics-based program manipulation, (189-197)
  1409. Vu T, Ohn S and Kim C RISC Proceedings of the 1st international conference on Medical biometrics, (17-24)
  1410. Li S, Xu K, Liu Y and Wu J (2008). Edge overlay multicast to support comparable multi-class services, Journal of High Speed Networks, 17:1, (13-36), Online publication date: 1-Jan-2008.
  1411. Vitter J (2008). Algorithms and data structures for external memory, Foundations and Trends® in Theoretical Computer Science, 2:4, (305-474), Online publication date: 1-Jan-2008.
  1412. Gong T and Tuson A (2008). Forma analysis of particle swarm optimisation for permutation problems, Journal of Artificial Evolution and Applications, 2008:S1, (1-16), Online publication date: 1-Jan-2008.
  1413. ACM
    Gupta H, Navda V, Das S and Chowdhary V (2008). Efficient gathering of correlated data in sensor networks, ACM Transactions on Sensor Networks, 4:1, (1-31), Online publication date: 1-Jan-2008.
  1414. ACM
    Hefeeda M and Hsu C (2008). Rate-distortion optimized streaming of fine-grained scalable video sequences, ACM Transactions on Multimedia Computing, Communications, and Applications, 4:1, (1-28), Online publication date: 1-Jan-2008.
  1415. ACM
    Krishnaswamy S, Viamontes G, Markov I and Hayes J (2008). Probabilistic transfer matrices in symbolic reliability analysis of logic circuits, ACM Transactions on Design Automation of Electronic Systems, 13:1, (1-35), Online publication date: 1-Jan-2008.
  1416. Wang C (2008). Computing Length-Preserved Free Boundary for Quasi-Developable Mesh Segmentation, IEEE Transactions on Visualization and Computer Graphics, 14:1, (25-36), Online publication date: 1-Jan-2008.
  1417. Banerjee A, Feng W, Ghosal D and Mukherjee B (2008). Algorithms for Integrated Routing and Scheduling for Aggregating Data from Distributed Resources on a Lambda Grid, IEEE Transactions on Parallel and Distributed Systems, 19:1, (24-34), Online publication date: 1-Jan-2008.
  1418. Subramani K and Madduri K Accomplishing approximate FCFS fairness without queues Proceedings of the 14th international conference on High performance computing, (540-551)
  1419. Guo J Problem kernels for NP-complete edge deletion problems Proceedings of the 18th international conference on Algorithms and computation, (915-926)
  1420. de Berg M, Haverkort H, Thite S and Toma L I/O-efficient map overlay and point location in low-density subdivisions Proceedings of the 18th international conference on Algorithms and computation, (500-511)
  1421. Goodrich M and Sun J Checking value-sensitive data structures in sublinear space Proceedings of the 18th international conference on Algorithms and computation, (353-364)
  1422. Ajwani D and Friedrich T Average-Case Analysis of Online Topological Ordering Algorithms and Computation, (464-475)
  1423. Chen H, Goldberg M, Magdon-Ismail M and Wallace W Reverse engineering an agent-based hidden Markov model for complex social systems Proceedings of the 8th international conference on Intelligent data engineering and automated learning, (940-949)
  1424. Bradford P Quickest path distances on context-free labeled graphs Proceedings of the 6th WSEAS international conference on Information security and privacy, (22-29)
  1425. Fotakis D and Spirakis P Cost-balancing tolls for atomic network congestion games Proceedings of the 3rd international conference on Internet and network economics, (179-190)
  1426. ACM
    Wu J, Zhang Y, Mao Z and Shin K Internet routing resilience to failures Proceedings of the 2007 ACM CoNEXT conference, (1-12)
  1427. Halava V, Harju T and Kärki T (2007). Relational codes of words, Theoretical Computer Science, 389:1-2, (237-249), Online publication date: 10-Dec-2007.
  1428. Viegas R and Azevedo F GRASPER Proceedings of the aritficial intelligence 13th Portuguese conference on Progress in artificial intelligence, (633-644)
  1429. Hosseini M and Abolhassani H Hierarchical co-clustering for web queries and selected URLs Proceedings of the 8th international conference on Web information systems engineering, (653-662)
  1430. Han Y and Wood D (2007). Outfix-Free Regular Languages and Prime Outfix-Free Decomposition, Fundamenta Informaticae, 81:4, (441-457), Online publication date: 1-Dec-2007.
  1431. Fan X and Yen J (2007). Multi-party communication and information-need anticipation by experience, Web Intelligence and Agent Systems, 5:4, (357-373), Online publication date: 1-Dec-2007.
  1432. ACM
    Zaverucha G (2007). On the complexity of Katamari Damacy, XRDS: Crossroads, The ACM Magazine for Students, 14:2, (1), Online publication date: 1-Dec-2007.
  1433. ACM
    Duffield N, Lund C and Thorup M (2007). Priority sampling for estimation of arbitrary subset sums, Journal of the ACM, 54:6, (32-es), Online publication date: 1-Dec-2007.
  1434. ACM
    Thorup M (2007). Equivalence between priority queues and sorting, Journal of the ACM, 54:6, (28-es), Online publication date: 1-Dec-2007.
  1435. Navarro G, Paredes R and Chávez E (2007). t-Spanners for metric space searching, Data & Knowledge Engineering, 63:3, (820-854), Online publication date: 1-Dec-2007.
  1436. ACM
    Ucan E, Thompson N and Gupta I A piggybacking approach to reduce overhead in sensor network gossiping Proceedings of the 2nd international workshop on Middleware for sensor networks, (19-24)
  1437. Phan K, Bertok P, Fry A and Ryan C Minimal traffic-constrained similarity-based SOAP multicast routing protocol Proceedings of the 2007 OTM Confederated international conference on On the move to meaningful internet systems: CoopIS, DOA, ODBASE, GADA, and IS - Volume Part I, (558-576)
  1438. Kaplan H, Landau S and Verbin E (2007). A simpler analysis of Burrows–Wheeler-based compression, Theoretical Computer Science, 387:3, (220-235), Online publication date: 20-Nov-2007.
  1439. Keyder E and Geffner H Heuristics for Planning with Action Costs Current Topics in Artificial Intelligence, (140-149)
  1440. ACM
    Mesquita F, Barbosa D, Cortez E and da Silva A FleDEx Proceedings of the 9th annual ACM international workshop on Web information and data management, (25-32)
  1441. Hara A and Takada S Requirements analysis using similar sequence diagrams Proceedings of the 11th IASTED International Conference on Software Engineering and Applications, (66-71)
  1442. ACM
    Li M, Yan T, Ganesan D, Lyons E, Shenoy P, Venkataramani A and Zink M Multi-user data sharing in radar sensor networks Proceedings of the 5th international conference on Embedded networked sensor systems, (247-260)
  1443. Yu P and Pan D TIP-OPC Proceedings of the 2007 IEEE/ACM international conference on Computer-aided design, (847-853)
  1444. Roy J and Markov I High-performance routing at the nanometer scale Proceedings of the 2007 IEEE/ACM international conference on Computer-aided design, (496-502)
  1445. Kim T and Liu X Compatibility path based binding algorithm for interconnect reduction in high level synthesis Proceedings of the 2007 IEEE/ACM international conference on Computer-aided design, (435-441)
  1446. Ni M and Memik S Early planning for clock skew scheduling during register binding Proceedings of the 2007 IEEE/ACM international conference on Computer-aided design, (429-434)
  1447. ACM
    Zheng J, Williams L and Robinson B Pallino Proceedings of the 22nd IEEE/ACM International Conference on Automated Software Engineering, (224-233)
  1448. Gomez J, Peña-Kaltekis J, Romero-Leon N and Leon E INCRAIN Proceedings of the artificial intelligence 6th Mexican international conference on Advances in artificial intelligence, (462-471)
  1449. Rusakov D (2007). Scheme inclusion verification algorithm in algebraic model of programs with constants, Programming and Computing Software, 33:6, (299-306), Online publication date: 1-Nov-2007.
  1450. Scheidegger C, Vo H, Koop D, Freire J and Silva C (2007). Querying and Creating Visualizations by Analogy, IEEE Transactions on Visualization and Computer Graphics, 13:6, (1560-1567), Online publication date: 1-Nov-2007.
  1451. Dombb Y, Lipsky O, Porat B, Porat E and Tsur A Approximate swap and mismatch edit distance Proceedings of the 14th international conference on String processing and information retrieval, (149-163)
  1452. ACM
    Köpf B and Basin D An information-theoretic model for adaptive side-channel attacks Proceedings of the 14th ACM conference on Computer and communications security, (286-296)
  1453. ACM
    Hummel B and Kosub S Acyclic type-of-relationship problems on the internet Proceedings of the 7th ACM SIGCOMM conference on Internet measurement, (221-226)
  1454. ACM
    Pan M and Tseng Y The orphan problem in zigbee-based wireless sensor networks Proceedings of the 10th ACM Symposium on Modeling, analysis, and simulation of wireless and mobile systems, (95-98)
  1455. ACM
    Yang Y and Cardei M Movement-assisted sensor redeployment scheme for network lifetime increase Proceedings of the 10th ACM Symposium on Modeling, analysis, and simulation of wireless and mobile systems, (13-20)
  1456. Bouillard A, Gaujal B, Lagrange S and Thierry E Optimal routing for end-to-end guarantees Proceedings of the 2nd international conference on Performance evaluation methodologies and tools, (1-10)
  1457. Escuder V, Durán R and Rico R Quantifying ILP by means of graph theory Proceedings of the 2nd international conference on Performance evaluation methodologies and tools, (1-7)
  1458. ACM
    Tang X and Järvi J Concept-based optimization Proceedings of the 2007 Symposium on Library-Centric Software Design, (97-108)
  1459. ACM
    Mitchell N and Sevitsky G (2007). The causes of bloat, the limits of health, ACM SIGPLAN Notices, 42:10, (245-260), Online publication date: 21-Oct-2007.
  1460. ACM
    Mitchell N and Sevitsky G The causes of bloat, the limits of health Proceedings of the 22nd annual ACM SIGPLAN conference on Object-oriented programming systems, languages and applications, (245-260)
  1461. Yang C, Guo Y, Sawhney H and Kumar R Learning actions using robust string kernels Proceedings of the 2nd conference on Human motion: understanding, modeling, capture and animation, (313-327)
  1462. Shuchat A, Shull R and Trenk A (2007). The fractional weak discrepancy of a partially ordered set, Discrete Applied Mathematics, 155:17, (2227-2235), Online publication date: 20-Oct-2007.
  1463. ACM
    Jayant C, Renzelmann M, Wen D, Krisnandi S, Ladner R and Comden D Automated tactile graphics translation Proceedings of the 9th international ACM SIGACCESS conference on Computers and accessibility, (75-82)
  1464. Khuller S, Malekian A and Mestre J To fill or not to fill Proceedings of the 15th annual European conference on Algorithms, (534-545)
  1465. Brodal G, Fagerberg R, Finocchi I, Grandoni F, Italiano G, Jørgensen A, Moruz G and Mølhave T Optimal resilient dynamic dictionaries Proceedings of the 15th annual European conference on Algorithms, (347-358)
  1466. Kowaluk M and Lingas A Unique lowest common ancestors in dags are almost as easy as matrix multiplication Proceedings of the 15th annual European conference on Algorithms, (265-274)
  1467. ACM
    Kennedy A Compiling with continuations, continued Proceedings of the 12th ACM SIGPLAN international conference on Functional programming, (177-190)
  1468. ACM
    Kennedy A (2007). Compiling with continuations, continued, ACM SIGPLAN Notices, 42:9, (177-190), Online publication date: 1-Oct-2007.
  1469. ACM
    Pirkelbauer P, Solodkyy Y and Stroustrup B Open multi-methods for c++ Proceedings of the 6th international conference on Generative programming and component engineering, (123-134)
  1470. ACM
    Gilpin A and Sandholm T (2007). Lossless abstraction of imperfect information games, Journal of the ACM, 54:5, (25-es), Online publication date: 1-Oct-2007.
  1471. Zhuo L, Morris G and Prasanna V (2007). High-Performance Reduction Circuits Using Deeply Pipelined Operators on FPGAs, IEEE Transactions on Parallel and Distributed Systems, 18:10, (1377-1392), Online publication date: 1-Oct-2007.
  1472. Chellappan S, Gu W, Bai X, Xuan D, Ma B and Zhang K (2007). Deploying Wireless Sensor Networks under Limited Mobility Constraints, IEEE Transactions on Mobile Computing, 6:10, (1142-1157), Online publication date: 1-Oct-2007.
  1473. Bonizzoni P, Della Vedova G, Dondi R, Fertin G, Rizzi R and Vialette S (2007). Exemplar Longest Common Subsequence, IEEE/ACM Transactions on Computational Biology and Bioinformatics, 4:4, (535-543), Online publication date: 1-Oct-2007.
  1474. Caragiannis I, Fishkin A, Kaklamanis C and Papaioannou E (2007). A tight bound for online colouring of disk graphs, Theoretical Computer Science, 384:2-3, (152-160), Online publication date: 1-Oct-2007.
  1475. Schiavinotto T and Stützle T (2007). A review of metrics on permutations for search landscape analysis, Computers and Operations Research, 34:10, (3143-3153), Online publication date: 1-Oct-2007.
  1476. ACM
    Moreira O, Valente F and Bekooij M Scheduling multiple independent hard-real-time jobs on a heterogeneous multiprocessor Proceedings of the 7th ACM & IEEE international conference on Embedded software, (57-66)
  1477. ACM
    Xu R, Melhem R and Mossé D A unified practical approach to stochastic DVS scheduling Proceedings of the 7th ACM & IEEE international conference on Embedded software, (37-46)
  1478. ACM
    Guo Y, Wang Y, Hannuksela M and Li H Discardable data adaptation in scalable video coding Proceedings of the international workshop on Workshop on mobile video, (49-54)
  1479. ACM
    Bailer W, Lee F and Thallinger G Skimming rushes video using retake detection Proceedings of the international workshop on TRECVID video summarization, (60-64)
  1480. ACM
    Cheng W, Chuang Y, Chen B, Wu J, Fang S, Lin Y, Hsieh C, Pan C, Chu W and Tien M Semantic-event based analysis and segmentation of wedding ceremony videos Proceedings of the international workshop on Workshop on multimedia information retrieval, (95-104)
  1481. ACM
    Zeinalipour-Yazti D, Andreou P, Chrysanthis P and Samaras G SenseSwarm Proceedings of the 4th workshop on Data management for sensor networks: in conjunction with 33rd International Conference on Very Large Data Bases, (13-18)
  1482. ACM
    Xiang S, Lim H, Tan K and Zhou Y Similarity-aware query allocation in sensor networks with multiple base stations Proceedings of the 4th workshop on Data management for sensor networks: in conjunction with 33rd International Conference on Very Large Data Bases, (1-6)
  1483. Li C, Tung A, Jin W and Ester M On dominating your neighborhood profitably Proceedings of the 33rd international conference on Very large data bases, (818-829)
  1484. Tatikonda S, Parthasarathy S and Goyder M LCS-TRIM Proceedings of the 33rd international conference on Very large data bases, (63-74)
  1485. Tavazoei M and Haeri M (2007). An optimization algorithm based on chaotic behavior and fractal nature, Journal of Computational and Applied Mathematics, 206:2, (1070-1081), Online publication date: 20-Sep-2007.
  1486. Kang W, Huang H and Grimshaw A A highly available job execution service in computational service market Proceedings of the 8th IEEE/ACM International Conference on Grid Computing, (275-282)
  1487. Goodman D, Ollikainen N and Sholley C Baculovirus phylogeny based on genome rearrangements Proceedings of the 2007 international conference on Comparative genomics, (69-82)
  1488. Hosseini M, Abolhassani H and Harikandeh M Content free clustering for search engine query log Proceedings of the 7th WSEAS International Conference on Simulation, Modelling and Optimization, (201-206)
  1489. Gwak C and Wee K Construction of hypercycles in typogenetics with evolutionary algorithms Proceedings of the 9th European conference on Advances in artificial life, (1060-1068)
  1490. Toledo S and Uchitel A A supernodal out-of-core sparse Gaussian-elimination method Proceedings of the 7th international conference on Parallel processing and applied mathematics, (728-737)
  1491. ACM
    Srinivasan W and Chua K Trade-offs between mobility and density for coverage in wireless sensor networks Proceedings of the 13th annual ACM international conference on Mobile computing and networking, (39-50)
  1492. Bang-Jensen J, Chiarandini M, Goegebeur Y and Jørgensen B Mixed models for the analysis of local search components Proceedings of the 2007 international conference on Engineering stochastic local search algorithms: designing, implementing and analyzing effective heuristics, (91-105)
  1493. ACM
    Uludag S, Lui K, Nahrstedt K and Brewster G (2007). Analysis of Topology Aggregation techniques for QoS routing, ACM Computing Surveys, 39:3, (7-es), Online publication date: 3-Sep-2007.
  1494. Li C, Manyà F and Planes J (2007). New inference rules for Max-SAT, Journal of Artificial Intelligence Research, 30:1, (321-359), Online publication date: 1-Sep-2007.
  1495. ACM
    Funes P (2007). Buildable evolution, ACM SIGEVOlution, 2:3, (6-19), Online publication date: 1-Sep-2007.
  1496. ACM
    Amraii S (2007). Observations on teamwork strategies in the ACM international collegiate programming contest, XRDS: Crossroads, The ACM Magazine for Students, 14:1, (1-9), Online publication date: 1-Sep-2007.
  1497. Subramani K (2007). A Zero-Space algorithm for Negative Cost Cycle Detection in networks, Journal of Discrete Algorithms, 5:3, (408-421), Online publication date: 1-Sep-2007.
  1498. Nikolopoulos S and Palios L (2007). On the parallel computation of the biconnected and strongly connected co-components of graphs, Discrete Applied Mathematics, 155:14, (1858-1877), Online publication date: 1-Sep-2007.
  1499. Nasser N and Chen Y (2007). SEEM, Computer Communications, 30:11-12, (2401-2412), Online publication date: 1-Sep-2007.
  1500. Mudundi S and Ali H A robust scalable cluster-based multi-hop routing protocol for wireless sensor networks Proceedings of the 5th international conference on Parallel and Distributed Processing and Applications, (895-907)
  1501. Ommer B and Buhmann J Compositional object recognition, segmentation, and tracking in video Proceedings of the 6th international conference on Energy minimization methods in computer vision and pattern recognition, (318-333)
  1502. Gao D and Wang Y Decomposing document images by heuristic search Proceedings of the 6th international conference on Energy minimization methods in computer vision and pattern recognition, (97-111)
  1503. Mirzaei A, Zaboli H and Safabakhsh R A neural network string matcher Proceedings of the 12th international conference on Computer analysis of images and patterns, (784-791)
  1504. De Zutter S, Slowack J, De Neve W and Van de Walle R Efficient context management in context-aware environments Proceedings of the 3rd international conference on Mobile multimedia communications, (1-5)
  1505. ACM
    Kandemir M, Son S and Karakoy M Improving disk reuse for reducing power consumption Proceedings of the 2007 international symposium on Low power electronics and design, (129-134)
  1506. Chen Y, Liao G and Tang C Approximation algorithms for 2-source minimum routing cost k-tree problems Proceedings of the 2007 international conference on Computational science and its applications - Volume Part III, (520-533)
  1507. Kreinovich V, Nguyen H and Wu B (2007). On-line algorithms for computing mean and variance of interval data, and their use in intelligent systems, Information Sciences: an International Journal, 177:16, (3228-3238), Online publication date: 20-Aug-2007.
  1508. ACM
    Hsu C, Ko M, Bhattacharyya S, Ramasubbu S and Pino J (2008). Efficient simulation of critical synchronous dataflow graphs, ACM Transactions on Design Automation of Electronic Systems, 12:3, (1-28), Online publication date: 17-Aug-2007.
  1509. Ajwani D, Ray S, Seidel R and Tiwary H On computing the centroid of the vertices of an arrangement and related problems Proceedings of the 10th international conference on Algorithms and Data Structures, (519-528)
  1510. ACM
    Abbassi Z and Mirrokni V A recommender system based on local random walks and spectral methods Proceedings of the 9th WebKDD and 1st SNA-KDD 2007 workshop on Web mining and social network analysis, (102-108)
  1511. ACM
    Chen H, Magdon-Ismail M, Goldberg M and Wallace W Inferring agent dynamics from social communication network Proceedings of the 9th WebKDD and 1st SNA-KDD 2007 workshop on Web mining and social network analysis, (36-45)
  1512. ACM
    Chang X and Yang X An efficient regularization approach for underdetermined MIMO system decoding Proceedings of the 2007 international conference on Wireless communications and mobile computing, (349-353)
  1513. ACM
    Hall A, Pomm C and Widmayer P A combinatorial approach to multi-domain sketch recognition Proceedings of the 4th Eurographics workshop on Sketch-based interfaces and modeling, (7-14)
  1514. Janowska A and Penczek W (2007). Path Compression in Timed Automata, Fundamenta Informaticae, 79:3-4, (379-399), Online publication date: 1-Aug-2007.
  1515. Nikolopoulos S and Palios L An O(nm)-time certifying algorithm for recognizing HHD-free graphs Proceedings of the 1st annual international conference on Frontiers in algorithmics, (281-292)
  1516. Li Z, Zhou T, Li M and Chen H Constraints solution for time sensitive security protocols Proceedings of the 1st annual international conference on Frontiers in algorithmics, (191-203)
  1517. ACM
    Sinha R and Winslett M (2007). Multi-resolution bitmap indexes for scientific data, ACM Transactions on Database Systems, 32:3, (16-es), Online publication date: 1-Aug-2007.
  1518. Li Z and Garcia-Luna-Aceves J (2007). Loop-free constrained path computation for hop-by-hop QoS routing, Computer Networks: The International Journal of Computer and Telecommunications Networking, 51:11, (3278-3293), Online publication date: 1-Aug-2007.
  1519. Liu C and Lin K (2007). Disseminating dependent data in wireless broadcast environments, Distributed and Parallel Databases, 22:1, (1-25), Online publication date: 1-Aug-2007.
  1520. ACM
    Li X, Maza M and Schost É Fast arithmetic for triangular sets Proceedings of the 2007 international symposium on Symbolic and algebraic computation, (269-276)
  1521. Šeda M An implementation view on job shop scheduling based on CPM Proceedings of the 11th WSEAS International Conference on Computers, (542-547)
  1522. Lai Y, Huang P and Lin P An effective automated grading system for HCC in biopsy images Proceedings of the 11th WSEAS International Conference on Computers, (396-402)
  1523. ACM
    Ntoulas A and Cho J Pruning policies for two-tiered inverted index with correctness guarantee Proceedings of the 30th annual international ACM SIGIR conference on Research and development in information retrieval, (191-198)
  1524. Czumaj A, Kowaluk M and Lingas A (2007). Faster algorithms for finding lowest common ancestors in directed acyclic graphs, Theoretical Computer Science, 380:1-2, (37-46), Online publication date: 20-Jul-2007.
  1525. Chen D and Misiolek E Finding many optimal paths without growing any optimal path trees Proceedings of the 13th annual international conference on Computing and Combinatorics, (232-242)
  1526. Bauer D, Seer S and Brändle N Macroscopic pedestrian flow simulation for designing crowd control measures in public transport after special events Proceedings of the 2007 Summer Computer Simulation Conference, (1035-1042)
  1527. Vassura M, Margara L, Fariselli P and Casadio R A Graph Theoretic Approach to Protein Structure Selection Proceedings of the 7th international workshop on Fuzzy Logic and Applications: Applications of Fuzzy Sets Theory, (497-504)
  1528. ACM
    Banerjee N and Kumar R Multiobjective network design for realistic traffic models Proceedings of the 9th annual conference on Genetic and evolutionary computation, (1904-1911)
  1529. ACM
    Jansen T and Weyland D Analysis of evolutionary algorithms for the longest common subsequence problem Proceedings of the 9th annual conference on Genetic and evolutionary computation, (939-946)
  1530. ACM
    Gong T and Tuson A Enhanced forma analysis of permutation problems Proceedings of the 9th annual conference on Genetic and evolutionary computation, (923-930)
  1531. ACM
    Friedrich T, Hebbinghaus N, Neumann F, He J and Witt C Approximating covering problems by randomized search heuristics using multi-objective models Proceedings of the 9th annual conference on Genetic and evolutionary computation, (797-804)
  1532. ACM
    Pelikan M, Kalapala R and Hartmann A Hybrid evolutionary algorithms on minimum vertex cover for random graphs Proceedings of the 9th annual conference on Genetic and evolutionary computation, (547-554)
  1533. Gastin P and Moro P Minimal counterexample generation for SPIN Proceedings of the 14th international SPIN conference on Model checking software, (24-38)
  1534. Oommen B, Misra S and Granmo O (2007). Routing Bandwidth-Guaranteed Paths in MPLS Traffic Engineering, IEEE Transactions on Computers, 56:7, (959-976), Online publication date: 1-Jul-2007.
  1535. You W, Sabirin M and Kim M Moving object tracking in H.264/AVC bitstream Proceedings of the 2007 international conference on Multimedia content analysis and mining, (483-492)
  1536. Chen S, Huo L, Fu Q, Guo R and Gao W FBSA Proceedings of the 2007 international conference on Multimedia content analysis and mining, (325-333)
  1537. ACM
    Brandt F, Fischer F and Harrenstein P The computational complexity of choice sets Proceedings of the 11th conference on Theoretical aspects of rationality and knowledge, (82-91)
  1538. Park J and Lee B Roadmap-based collision-free motion planning for multiple moving agents in a smart home environment Proceedings of the 5th international conference on Smart homes and health telematics, (70-80)
  1539. Case J Resource Restricted Computability Theoretic Learning Proceedings of the 3rd conference on Computability in Europe: Computation and Logic in the Real World, (115-124)
  1540. Lam N, Dziong Z and Mason L Network capacity allocation in service overlay networks Proceedings of the 20th international teletraffic conference on Managing traffic performance in converged networks, (224-235)
  1541. ACM
    Atanassov I An improvement of an approach for representation of tree structures in relational tables Proceedings of the 2007 international conference on Computer systems and technologies, (1-6)
  1542. ACM
    Xu C, Li J, Bao T, Wang Y and Huang B Metadata driven memory optimizations in dynamic binary translator Proceedings of the 3rd international conference on Virtual execution environments, (148-157)
  1543. Lin C A dominant input stream for LUD incremental computing on a contention network Proceedings of the 7th international conference on Algorithms and architectures for parallel processing, (403-414)
  1544. ACM
    Chen Y, Fortnow L, Nikolova E and Pennock D Betting on permutations Proceedings of the 8th ACM conference on Electronic commerce, (326-335)
  1545. ACM
    Chan T More algorithms for all-pairs shortest paths in weighted graphs Proceedings of the thirty-ninth annual ACM symposium on Theory of computing, (590-598)
  1546. ACM
    Trißl S and Leser U Fast and practical indexing and querying of very large graphs Proceedings of the 2007 ACM SIGMOD international conference on Management of data, (845-856)
  1547. ACM
    Chaudhuri S, Das Sarma A, Ganti V and Kaushik R Leveraging aggregate constraints for deduplication Proceedings of the 2007 ACM SIGMOD international conference on Management of data, (437-448)
  1548. ACM
    Lin G and Rajaraman R Approximation algorithms for multiprocessor scheduling under uncertainty Proceedings of the nineteenth annual ACM symposium on Parallel algorithms and architectures, (25-34)
  1549. Chehreghani M, Abolhassani H and Chehreghani M Attaining higher quality for density based algorithms Proceedings of the 1st international conference on Web reasoning and rule systems, (329-338)
  1550. Deineko V and Tiskin A Fast minimum-weight double-tree shortcutting for metric TSP Proceedings of the 6th international conference on Experimental algorithms, (136-149)
  1551. Yang Y, Lin M, Xu J and Xie Y Minimum Spanning Tree with Neighborhoods Proceedings of the 3rd international conference on Algorithmic Aspects in Information and Management, (306-316)
  1552. ACM
    Liu H, Lee W and Chang Y A provably good approximation algorithm for power optimization using multiple supply voltages Proceedings of the 44th annual Design Automation Conference, (887-890)
  1553. ACM
    Yu J, Yao J, Bhuyan L and Yang J Program mapping onto network processors by recursive bipartitioning and refining Proceedings of the 44th annual Design Automation Conference, (805-810)
  1554. ACM
    Collins R and Carloni L Topology-based optimization of maximal sustainable throughput in a latency-insensitive system Proceedings of the 44th annual Design Automation Conference, (410-415)
  1555. Manna Z, Sipma H and Zhang T Verifying Balanced Trees Proceedings of the international symposium on Logical Foundations of Computer Science, (363-378)
  1556. Kortsarts Y (2007). Integrating a real-world scheduling problem into the basic algorithms course, Journal of Computing Sciences in Colleges, 22:6, (184-192), Online publication date: 1-Jun-2007.
  1557. Chang Y and Lin Y (2007). Dynamic Segment Trees for Ranges and Prefixes, IEEE Transactions on Computers, 56:6, (769-784), Online publication date: 1-Jun-2007.
  1558. Malewicz G, Foster I, Rosenberg A and Wilde M (2007). A Tool for Prioritizing DAGMan Jobs and its Evaluation, Journal of Grid Computing, 5:2, (197-212), Online publication date: 1-Jun-2007.
  1559. Gudmundsson J, van Kreveld M and Speckmann B (2007). Efficient Detection of Patterns in 2D Trajectories of Moving Points, Geoinformatica, 11:2, (195-215), Online publication date: 1-Jun-2007.
  1560. Dig D, Manzoor K, Johnson R and Nguyen T Refactoring-Aware Configuration Management for Object-Oriented Programs Proceedings of the 29th international conference on Software Engineering, (427-436)
  1561. Wang J, Xu X and Chen J An approximation algorithm based on chain implication for constrained minimum vertex covers in bipartite graphs Proceedings of the 4th international conference on Theory and applications of models of computation, (760-769)
  1562. Hsieh S, Gao H and Yang S On the internal steiner tree problem Proceedings of the 4th international conference on Theory and applications of models of computation, (274-283)
  1563. Cordone R (2007). A subexponential algorithm for the coloured tree partition problem, Discrete Applied Mathematics, 155:10, (1326-1335), Online publication date: 21-May-2007.
  1564. Shavitt Y and Singer Y Beyond centrality Proceedings of the 6th international IFIP-TC6 conference on Ad Hoc and sensor networks, wireless networks, next generation internet, (774-785)
  1565. Guo J and Jha S Construction of a proxy-based overlay skeleton tree for large-scale real-time group communications Proceedings of the 6th international IFIP-TC6 conference on Ad Hoc and sensor networks, wireless networks, next generation internet, (726-737)
  1566. ACM
    Pandit S and Olston C Navigationaided retrieval Proceedings of the 16th international conference on World Wide Web, (391-400)
  1567. Vassura M, Margara L, Medri F, di Lena P, Fariselli P and Casadio R Reconstruction of 3D structures from protein contact maps Proceedings of the 3rd international conference on Bioinformatics research and applications, (578-589)
  1568. ACM
    Dimitroulakos G, Galanis M, Kostaras N and Goutis C A unified evaluation framework for coarse grained reconfigurable array architectures Proceedings of the 4th international conference on Computing frontiers, (161-172)
  1569. ACM
    Demaine E, Iacono J and Langerman S (2007). Retroactive data structures, ACM Transactions on Algorithms, 3:2, (13-es), Online publication date: 1-May-2007.
  1570. Bachmaier C (2007). A Radial Adaptation of the Sugiyama Framework for Visualizing Hierarchical Information, IEEE Transactions on Visualization and Computer Graphics, 13:3, (583-594), Online publication date: 1-May-2007.
  1571. Hwang S and Chang K (2007). Probe Minimization by Schedule Optimization, IEEE Transactions on Knowledge and Data Engineering, 19:5, (646-662), Online publication date: 1-May-2007.
  1572. Imre S (2007). Quantum Existence Testing and Its Application for Finding Extreme Values in Unsorted Databases, IEEE Transactions on Computers, 56:5, (706-710), Online publication date: 1-May-2007.
  1573. Banerjee N, Corner M and Levine B An Energy-Efficient Architecture for DTN Throwboxes Proceedings of the IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications, (776-784)
  1574. Ahmed T, Coates M and Lakhina A Multivariate Online Anomaly Detection Using Kernel Recursive Least Squares Proceedings of the IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications, (625-633)
  1575. Qunfeng Dong , Shukla A, Shrivastava V, Agrawal D, Banerjee S and Kar K Load Balancing in Large-Scale RFID Systems Proceedings of the IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications, (2281-2285)
  1576. Sertac Artan N and Chao H TriBiCa Proceedings of the IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications, (125-133)
  1577. Yunfeng Lin , Ben Liang and Baochun Li Data Persistence in Large-Scale Sensor Networks with Decentralized Fountain Codes Proceedings of the IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications, (1658-1666)
  1578. Chengchen Hu , Yi Tang , Xuefei Chen and Bin Liu Per-Flow Queueing by Dynamic Queue Sharing Proceedings of the IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications, (1613-1621)
  1579. Yanli Cai , Wei Lou , Minglu Li and Xiang-Yang Li Target-Oriented Scheduling in Directional Sensor Networks Proceedings of the IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications, (1550-1558)
  1580. Momcilovic P Scalability of Routing Tables in Wireless Networks Proceedings of the IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications, (1262-1270)
  1581. Djukic P and Valaee S Link Scheduling for Minimum Delay in Spatial Re-Use TDMA Proceedings of the IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications, (28-36)
  1582. Starobinski D, Weiyao Xiao , Xiangping Qin and Trachtenberg A Near-Optimal Data Dissemination Policies for Multi-Channel, Single Radio Wireless Sensor Networks Proceedings of the IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications, (955-963)
  1583. Amador J (2007). Random projection and orthonormality for lossy image compression, Image and Vision Computing, 25:5, (754-766), Online publication date: 1-May-2007.
  1584. Church K, Thiesson B and Ragno R K-best suffix arrays Human Language Technologies 2007: The Conference of the North American Chapter of the Association for Computational Linguistics; Companion Volume, Short Papers, (17-20)
  1585. Zhu H, Zeng X, Cai W, Xue J and Zhou D A sparse grid based spectral stochastic collocation method for variations-aware capacitance extraction of interconnects under nanometer process technology Proceedings of the conference on Design, automation and test in Europe, (1514-1519)
  1586. Jayaputera G, Loke S and Zaslavsky A (2007). Design, implementation and run-time evolution of a mission-based multiagent system, Web Intelligence and Agent Systems, 5:2, (139-159), Online publication date: 1-Apr-2007.
  1587. Huang H, Hartman J and Hurst T (2007). Efficient and robust query processing for mobile wireless sensor networks, International Journal of Sensor Networks, 2:1/2, (99-107), Online publication date: 1-Apr-2007.
  1588. ACM
    Wozniak G, Daley M and Watt S Dynamic ADTs Proceedings of the 2007 International Lisp Conference, (1-12)
  1589. Darbon J A note on the discrete binary Mumford-Shah model Proceedings of the 3rd international conference on Computer vision/computer graphics collaboration techniques, (283-294)
  1590. Fireman L, Petrank E and Zaks A New algorithms for SIMD alignment Proceedings of the 16th international conference on Compiler construction, (1-15)
  1591. Al-Mansari M, Hanenberg S and Unland R Aspect-oriented programming Proceedings of the 6th international conference on Software composition, (184-199)
  1592. ACM
    Shelar R An efficent clustering algorithm for low power clock tree synthesis Proceedings of the 2007 international symposium on Physical design, (181-188)
  1593. ACM
    Lin C, Chen S, Li C, Chang Y and Yang C Efficient obstacle-avoiding rectilinear steiner tree construction Proceedings of the 2007 international symposium on Physical design, (127-134)
  1594. ACM
    Ramalingam A, Devarayanadurg G and Pan D Accurate power grid analysis with behavioral transistor network modeling Proceedings of the 2007 international symposium on Physical design, (43-50)
  1595. ACM
    Hu S and Hu J Pattern sensitive placement for manufacturability Proceedings of the 2007 international symposium on Physical design, (27-34)
  1596. ACM
    Lin I, Ling T and Chang Y Statistical circuit optimization considering device andinterconnect process variations Proceedings of the 2007 international workshop on System level interconnect prediction, (47-54)
  1597. ACM
    Agrawal K, He Y and Leiserson C Adaptive work stealing with parallelism feedback Proceedings of the 12th ACM SIGPLAN symposium on Principles and practice of parallel programming, (112-120)
  1598. ACM
    Wei X, Cai Y and Hong X Physical aware clock skew rescheduling Proceedings of the 17th ACM Great Lakes symposium on VLSI, (473-476)
  1599. ACM
    Farmahini-Farahani A, Kamal M, Fakhraie S and Safari S HW/SW partitioning using discrete particle swarm Proceedings of the 17th ACM Great Lakes symposium on VLSI, (359-364)
  1600. Dal Lago U, Montanari A and Puppis G (2007). Compact and tractable automaton-based representations of time granularities, Theoretical Computer Science, 373:1-2, (115-141), Online publication date: 10-Mar-2007.
  1601. ACM
    Bansal N, Kimbrel T and Pruhs K (2007). Speed scaling to manage energy and temperature, Journal of the ACM, 54:1, (1-39), Online publication date: 1-Mar-2007.
  1602. Banik S, Radhakrishnan S and Sekharan C (2007). Multicast Routing with Delay and Delay Variation Constraints for Collaborative Applications on Overlay Networks, IEEE Transactions on Parallel and Distributed Systems, 18:3, (421-431), Online publication date: 1-Mar-2007.
  1603. Rakshit S, Ghosh A and Uma Shankar B (2007). Fast mean filtering technique (FMFT), Pattern Recognition, 40:3, (890-897), Online publication date: 1-Mar-2007.
  1604. Hambrusch S, Liu C, Aref W and Prabhakar S (2007). Efficient query execution on broadcasted index tree structures, Data & Knowledge Engineering, 60:3, (511-529), Online publication date: 1-Mar-2007.
  1605. Zaker M (2007). Maximum transversal in partial Latin squares and rainbow matchings, Discrete Applied Mathematics, 155:4, (558-565), Online publication date: 20-Feb-2007.
  1606. Nikolopoulos S and Palios L (2007). Detecting Holes and Antiholes in Graphs, Algorithmica, 47:2, (119-138), Online publication date: 1-Feb-2007.
  1607. Han Y, Salomaa K and Wood D (2007). Intercode Regular Languages, Fundamenta Informaticae, 76:1-2, (113-128), Online publication date: 1-Feb-2007.
  1608. ACM
    Zhou J, Heckman M, Reynolds B, Carlson A and Bishop M (2007). Modeling network intrusion detection alerts for correlation, ACM Transactions on Information and System Security, 10:1, (4-es), Online publication date: 1-Feb-2007.
  1609. ACM
    Donato D, Laura L, Leonardi S and Millozzi S (2007). The Web as a graph, ACM Transactions on Internet Technology, 7:1, (4-es), Online publication date: 1-Feb-2007.
  1610. Jeffrey D and Gupta N (2007). Improving Fault Detection Capability by Selectively Retaining Test Cases during Test Suite Reduction, IEEE Transactions on Software Engineering, 33:2, (108-123), Online publication date: 1-Feb-2007.
  1611. Chellappan S, Bai X, Ma B, Xuan D and Xu C (2007). Mobility Limited Flip-Based Sensor Networks Deployment, IEEE Transactions on Parallel and Distributed Systems, 18:2, (199-211), Online publication date: 1-Feb-2007.
  1612. Ling H and Jacobs D (2007). Shape Classification Using the Inner-Distance, IEEE Transactions on Pattern Analysis and Machine Intelligence, 29:2, (286-299), Online publication date: 1-Feb-2007.
  1613. Chatterjee M, Lin H and Das S (2007). Rate Allocation and Admission Control for Differentiated Services in CDMA Data Networks, IEEE Transactions on Mobile Computing, 6:2, (179-191), Online publication date: 1-Feb-2007.
  1614. Almeida J and Zeitoun M (2007). An automata-theoretic approach to the word problem for ω -terms over R, Theoretical Computer Science, 370:1-3, (131-169), Online publication date: 1-Feb-2007.
  1615. Nicolas F and Rivals E (2007). Longest common subsequence problem for unoriented and cyclic strings, Theoretical Computer Science, 370:1-3, (1-18), Online publication date: 1-Feb-2007.
  1616. Han Y and Wood D (2007). Obtaining shorter regular expressions from finite-state automata, Theoretical Computer Science, 370:1-3, (110-120), Online publication date: 1-Feb-2007.
  1617. P V and Sudha N (2007). Robust Hausdorff distance measure for face recognition, Pattern Recognition, 40:2, (431-442), Online publication date: 1-Feb-2007.
  1618. Elmasry A, Jensen C and Katajainen J On the power of structural violations in priority queues Proceedings of the thirteenth Australasian symposium on Theory of computing - Volume 65, (45-53)
  1619. Kim P and Kutzner A A Simple Algorithm for Stable Minimum Storage Merging Proceedings of the 33rd conference on Current Trends in Theory and Practice of Computer Science, (347-356)
  1620. Wu C and Lai S Temporally integrated pedestrian detection from non-stationary video Proceedings of the 13th international conference on Multimedia Modeling - Volume Part I, (188-197)
  1621. Jansen T On the brittleness of evolutionary algorithms Proceedings of the 9th international conference on Foundations of genetic algorithms, (54-69)
  1622. Czumaj A and Lingas A Finding a heaviest triangle is not harder than matrix multiplication Proceedings of the eighteenth annual ACM-SIAM symposium on Discrete algorithms, (986-994)
  1623. Finocchi I, Grandoni F and Italiano G Resilient search trees Proceedings of the eighteenth annual ACM-SIAM symposium on Discrete algorithms, (547-553)
  1624. Dai P and Goldsmith J Topological value iteration algorithm for Markov decision processes Proceedings of the 20th international joint conference on Artifical intelligence, (1860-1865)
  1625. Han Y, Salomaa K and Wood D (2007). Intercode Regular Languages, Fundamenta Informaticae, 76:1-2, (113-128), Online publication date: 1-Jan-2007.
  1626. Gupta R, Bagchi A and Sarkar S (2007). Improving Linkage of Web Pages, INFORMS Journal on Computing, 19:1, (127-136), Online publication date: 1-Jan-2007.
  1627. Jensen K (2007). Multiple scale music segmentation using rhythm, timbre, and harmony, EURASIP Journal on Advances in Signal Processing, 2007:1, (159-159), Online publication date: 1-Jan-2007.
  1628. Lentz T, Schröder D, Vorländer M and Assenmacher I (2007). Virtual reality system with integrated sound field simulation and reproduction, EURASIP Journal on Advances in Signal Processing, 2007:1, (187-187), Online publication date: 1-Jan-2007.
  1629. Lu R, Cao A and Koh C (2007). SAMBA-bus: A high performance bus architecture for system-on-chips, IEEE Transactions on Very Large Scale Integration (VLSI) Systems, 15:1, (69-79), Online publication date: 1-Jan-2007.
  1630. Ramanarayanan G and Bala K (2007). Constrained Texture Synthesis via Energy Minimization, IEEE Transactions on Visualization and Computer Graphics, 13:1, (167-178), Online publication date: 1-Jan-2007.
  1631. Vashist A, Kulikowski C and Muchnik I (2007). Ortholog Clustering on a Multipartite Graph, IEEE/ACM Transactions on Computational Biology and Bioinformatics, 4:1, (17-27), Online publication date: 1-Jan-2007.
  1632. Huang C, Morcos F, Kanaan S, Wuchty S, Chen D and Izaguirre J (2007). Predicting Protein-Protein Interactions from Protein Domains Using a Set Cover Approach, IEEE/ACM Transactions on Computational Biology and Bioinformatics, 4:1, (78-87), Online publication date: 1-Jan-2007.
  1633. Naiksatam S and Figueira S (2007). Elastic reservations for efficient bandwidth utilization in LambdaGrids, Future Generation Computer Systems, 23:1, (1-22), Online publication date: 1-Jan-2007.
  1634. Cohen-Steiner D, Edelsbrunner H and Harer J (2007). Stability of Persistence Diagrams, Discrete & Computational Geometry, 37:1, (103-120), Online publication date: 1-Jan-2007.
  1635. Bhattacharjee S and Das N Distributed node-based transmission power control for wireless ad hoc networks Proceedings of the Third international conference on Distributed Computing and Internet Technology, (49-62)
  1636. DuttaGupta A, Bishnu A and Sengupta I Optimisation problems based on the maximal breach path measure for wireless sensor network coverage Proceedings of the Third international conference on Distributed Computing and Internet Technology, (27-40)
  1637. Vadnala P and Mathuria A An efficient key assignment scheme for access control in a hierarchy Proceedings of the Second international conference on Information Systems Security, (205-219)
  1638. Wang M and Sarin V Parallel support graph preconditioners Proceedings of the 13th international conference on High Performance Computing, (387-398)
  1639. Elmasry A, Jensen C and Katajainen J Two-Tier relaxed heaps Proceedings of the 17th international conference on Algorithms and Computation, (308-317)
  1640. Kujala J and Elomaa T Poketree Proceedings of the 17th international conference on Algorithms and Computation, (277-288)
  1641. Gao W, Wong K, Xia Y and Xu R Clique percolation method for finding naturally cohesive and overlapping document clusters Proceedings of the 21st international conference on Computer Processing of Oriental Languages: beyond the orient: the research challenges ahead, (97-108)
  1642. Zhao W, Zhang P and Jiang T (2006). A network flow approach to the minimum common integer partition problem, Theoretical Computer Science, 369:1, (456-462), Online publication date: 15-Dec-2006.
  1643. Bhowmick P, Biswas A and Bhattacharya B PACE Proceedings of the 5th Indian conference on Computer Vision, Graphics and Image Processing, (299-310)
  1644. Dechev D, Pirkelbauer P and Stroustrup B Lock-free dynamically resizable arrays Proceedings of the 10th international conference on Principles of Distributed Systems, (142-156)
  1645. Bertoldo A, Bianco M and Pucci G A static parallel multifrontal solver for finite element meshes Proceedings of the 4th international conference on Parallel and Distributed Processing and Applications, (734-746)
  1646. Yao D, Frikken K, Atallah M and Tamassia R Point-based trust Proceedings of the 8th international conference on Information and Communications Security, (190-209)
  1647. Persson A, Grimm H, Ng A, Lezama T, Ekberg J, Falk S and Stablum P Simulation-based multi-objective optimization of a real-world scheduling problem Proceedings of the 38th conference on Winter simulation, (1757-1764)
  1648. Shendarkar A, Vasudevan K, Lee S and Son Y Crowd simulation for emergency response using BDI agent based on virtual reality Proceedings of the 38th conference on Winter simulation, (545-553)
  1649. Lemire D (2006). Streaming maximum-minimum filter using no more than three comparisons per element, Nordic Journal of Computing, 13:4, (328-339), Online publication date: 1-Dec-2006.
  1650. Subramani K and Argentieri J (2006). Chain programming over difference constraints, Nordic Journal of Computing, 13:4, (309-327), Online publication date: 1-Dec-2006.
  1651. Hadlock F, Fly R and Malone B (2006). A comprehensive problem for algorithm and paradigm visualization, Journal of Computing Sciences in Colleges, 22:2, (189-196), Online publication date: 1-Dec-2006.
  1652. Bruno N, Chaudhuri S and Thomas D (2006). Generating Queries with Cardinality Constraints for DBMS Testing, IEEE Transactions on Knowledge and Data Engineering, 18:12, (1721-1725), Online publication date: 1-Dec-2006.
  1653. Mei A and Rizzi R (2006). Online Permutation Routing in Partitioned Optical Passive Star Networks, IEEE Transactions on Computers, 55:12, (1557-1571), Online publication date: 1-Dec-2006.
  1654. Boyarshinov V and Magdon-Ismail M (2006). Linear time isotonic and unimodal regression in the L1 and L∞ norms, Journal of Discrete Algorithms, 4:4, (676-691), Online publication date: 1-Dec-2006.
  1655. Kennedy W, Lin G and Yan G (2006). Strictly chordal graphs are leaf powers, Journal of Discrete Algorithms, 4:4, (511-525), Online publication date: 1-Dec-2006.
  1656. Darbon J and Sigelle M (2006). Image Restoration with Discrete Constrained Total Variation Part I, Journal of Mathematical Imaging and Vision, 26:3, (261-276), Online publication date: 1-Dec-2006.
  1657. ACM
    Geerts F, Revesz P and Van den Bussche J On-line maintenance of simplified weighted graphs for efficient distance queries Proceedings of the 14th annual ACM international symposium on Advances in geographic information systems, (203-210)
  1658. ACM
    de Berg M, Mumford E and Speckmann B Optimal BSPs and rectilinear cartograms Proceedings of the 14th annual ACM international symposium on Advances in geographic information systems, (19-26)
  1659. ACM
    Kulczycki G and Vasudeo J Simplifying reasoning about objects with Tako Proceedings of the 2006 conference on Specification and verification of component-based systems, (57-64)
  1660. Ahrendt W, Beckert B, Hähnle R, Rümmer P and Schmitt P Verifying object-oriented programs with KeY Proceedings of the 5th international conference on Formal methods for components and objects, (70-101)
  1661. ACM
    Lee K, Wang T and Chao K Post-routing redundant via insertion and line end extension with via density consideration Proceedings of the 2006 IEEE/ACM international conference on Computer-aided design, (633-640)
  1662. ACM
    Wei T, Mishra P, Wu K and Liang H Online task-scheduling for fault-tolerant low-energy real-time systems Proceedings of the 2006 IEEE/ACM international conference on Computer-aided design, (522-527)
  1663. ACM
    Liu H, Lin C, Chou S, Tu W, Liu C, Chang Y and Kuo S Current path analysis for electrostatic discharge protection Proceedings of the 2006 IEEE/ACM international conference on Computer-aided design, (510-515)
  1664. ACM
    Lo D and Khoo S SMArTIC Proceedings of the 14th ACM SIGSOFT international symposium on Foundations of software engineering, (265-275)
  1665. ACM
    Pamula J, Ammann P, Jajodia S and Ritchey R A framework for establishing, assessing, and managing trust in inter-organizational relationships Proceedings of the 3rd ACM workshop on Secure web services, (23-32)
  1666. Kang X, Lan J, Liu L and Zhuang X SNR-based bit allocation in video quality smoothing Proceedings of the 7th Pacific Rim conference on Advances in Multimedia Information Processing, (989-998)
  1667. Lee B, Parr C, Plaisant C, Bederson B, Veksler V, Gray W and Kotfila C (2006). TreePlus, IEEE Transactions on Visualization and Computer Graphics, 12:6, (1414-1426), Online publication date: 1-Nov-2006.
  1668. Golfarelli M, Lechtenbörger J, Rizzi S and Vossen G (2006). Schema versioning in data warehouses, Data & Knowledge Engineering, 59:2, (435-459), Online publication date: 1-Nov-2006.
  1669. ACM
    Cadar C, Ganesh V, Pawlowski P, Dill D and Engler D EXE Proceedings of the 13th ACM conference on Computer and communications security, (322-335)
  1670. Zhang Y, Ge Q, Fleischer R, Jiang T and Zhu H (2006). Approximating the minimum weight weak vertex cover, Theoretical Computer Science, 363:1, (99-105), Online publication date: 25-Oct-2006.
  1671. Sivignon I and Coeurjolly D Minimal decomposition of a digital surface into digital plane segments is NP-Hard Proceedings of the 13th international conference on Discrete Geometry for Computer Imagery, (674-685)
  1672. Goncharenko V and Tuzikov A Watershed segmentation with chamfer metric Proceedings of the 13th international conference on Discrete Geometry for Computer Imagery, (518-529)
  1673. ACM
    Shrestha P, Weda H, Barbieri M and Sekulovski D Synchronization of multiple video recordings based on still camera flashes Proceedings of the 14th ACM international conference on Multimedia, (137-140)
  1674. Wang H, Li J and Wang H Clustered chain path index for XML document Proceedings of the 7th international conference on Web Information Systems, (474-486)
  1675. ACM
    Agrawal K, Leiserson C and Sukha J Memory models for open-nested transactions Proceedings of the 2006 workshop on Memory system performance and correctness, (70-81)
  1676. ACM
    Sánchez C, Sipma H, Manna Z and Gill C Efficient distributed deadlock avoidance with liveness guarantees Proceedings of the 6th ACM & IEEE International conference on Embedded software, (12-20)
  1677. ACM
    Wiggers M, Bekooij M, Jansen P and Smit G Efficient computation of buffer capacities for multi-rate real-time systems with back-pressure Proceedings of the 4th international conference on Hardware/software codesign and system synthesis, (10-15)
  1678. Gao W and Wong K Natural document clustering by clique percolation in random graphs Proceedings of the Third Asia conference on Information Retrieval Technology, (119-131)
  1679. Yang G (2006). Computational aspects of mining maximal frequent patterns, Theoretical Computer Science, 362:1, (63-85), Online publication date: 11-Oct-2006.
  1680. Russo L and Oliveira A A compressed self-index using a ziv-lempel dictionary Proceedings of the 13th international conference on String Processing and Information Retrieval, (163-180)
  1681. Miller B and Ranum D (2006). Freedom to succeed, Journal of Computing Sciences in Colleges, 22:1, (106-116), Online publication date: 1-Oct-2006.
  1682. ACM
    Mendelson R, Tarjan R, Thorup M and Zwick U (2006). Melding priority queues, ACM Transactions on Algorithms, 2:4, (535-556), Online publication date: 1-Oct-2006.
  1683. Lacroix V, Fernandes C and Sagot M (2006). Motif Search in Graphs, IEEE/ACM Transactions on Computational Biology and Bioinformatics, 3:4, (360-368), Online publication date: 1-Oct-2006.
  1684. ACM
    Graefe G (2006). Implementing sorting in database systems, ACM Computing Surveys, 38:3, (10-es), Online publication date: 30-Sep-2006.
  1685. ACM
    Lauer T (2006). Learner interaction with algorithm visualizations, ACM SIGCSE Bulletin, 38:3, (202-206), Online publication date: 26-Sep-2006.
  1686. Haque S, Kulik L and Klippel A Algorithms for reliable navigation and wayfinding Proceedings of the 2006 international conference on Spatial Cognition V: reasoning, action, interaction, (308-326)
  1687. ACM
    Mayer J and Schneckenburger C An empirical analysis and comparison of random testing techniques Proceedings of the 2006 ACM/IEEE international symposium on Empirical software engineering, (105-114)
  1688. Scheben C Simulation of d′-dimensional cellular automata on d-dimensional cellular automata Proceedings of the 7th international conference on Cellular Automata for Research and Industry, (131-140)
  1689. Kai Z, Yuzhou W and Guoping W Hierarchical stereo matching Proceedings of the 8th international conference on Advanced Concepts For Intelligent Vision Systems, (632-643)
  1690. Edelkamp S, Jabbar S and Lafuente A Heuristic search for the analysis of graph transition systems Proceedings of the Third international conference on Graph Transformations, (414-429)
  1691. ACM
    Ross K Towards an automatic complexity analysis for generic programs Proceedings of the 2006 ACM SIGPLAN workshop on Generic programming, (87-95)
  1692. Chan T and Zarrabi-Zadeh H A randomized algorithm for online unit clustering Proceedings of the 4th international conference on Approximation and Online Algorithms, (121-131)
  1693. Li S, Wu J, Xu K and Liu Y Heterogeneous qos multicast and its improvement on edge-based overlay networks Proceedings of the Second international conference on High Performance Computing and Communications, (436-446)
  1694. Tang A, Liu Z, Xia C and Zhang L Distributed resource allocation for stream data processing Proceedings of the Second international conference on High Performance Computing and Communications, (91-100)
  1695. Liu Y, Lu S, Chen J and Sze S Greedy localization and color-coding Proceedings of the Second international conference on Parameterized and Exact Computation, (84-95)
  1696. Chen J, Kanj I, Meng J, Xia G and Zhang F On the effective enumerability of NP problems Proceedings of the Second international conference on Parameterized and Exact Computation, (215-226)
  1697. Böttcher S and Steinmetz R Information disclosure by XPath queries Proceedings of the Third VLDB international conference on Secure Data Management, (160-174)
  1698. Chen H, Samavati F, Sousa M and Mitchell J Sketch-based volumetric seeded region growing Proceedings of the Third Eurographics conference on Sketch-Based Interfaces and Modeling, (123-130)
  1699. Wu X, Niu Y, Shu L, Cho J, Lee Y and Lee S Relay shift based self-deployment for mobility limited sensor networks Proceedings of the Third international conference on Ubiquitous Intelligence and Computing, (556-564)
  1700. Houkjær K, Torp K and Wind R Simple and realistic data generation Proceedings of the 32nd international conference on Very large data bases, (1243-1246)
  1701. Moerkotte G and Neumann T Analysis of two existing and one new dynamic programming algorithm for the generation of optimal bushy join trees without cross products Proceedings of the 32nd international conference on Very large data bases, (930-941)
  1702. Hu H, Lee D and Lee V Distance indexing on road networks Proceedings of the 32nd international conference on Very large data bases, (894-905)
  1703. Burdick D, Deshpande P, Jayram T, Ramakrishnan R and Vaithyanathan S Efficient allocation algorithms for OLAP over imprecise data Proceedings of the 32nd international conference on Very large data bases, (391-402)
  1704. Lin M, Lee J and Jan G (2006). A lossless data compression and decompression algorithm and its hardware architecture, IEEE Transactions on Very Large Scale Integration (VLSI) Systems, 14:9, (925-936), Online publication date: 1-Sep-2006.
  1705. Lin Z, Xia N, Li G, Mao B and Xie L Transparent run-time prevention of format-string attacks via dynamic taint and flexible validation Proceedings of the 9th international conference on Information Security, (17-31)
  1706. Motwani R, Panigrahy R and Xu Y Fractional matching via balls-and-bins Proceedings of the 9th international conference on Approximation Algorithms for Combinatorial Optimization Problems, and 10th international conference on Randomization and Computation, (487-498)
  1707. Homan C and Hemaspaandra L Guarantees for the success frequency of an algorithm for finding dodgson-election winners Proceedings of the 31st international conference on Mathematical Foundations of Computer Science, (528-539)
  1708. Hansen H and Valmari A Operational determinism and fast algorithms Proceedings of the 17th international conference on Concurrency Theory, (188-202)
  1709. Kang B, Kelarev A, Sale A and Williams R A new model for classifying DNA code inspired by neural networks and FSA Proceedings of the 9th Pacific Rim Knowledge Acquisition international conference on Advances in Knowledge Acquisition and Management, (187-198)
  1710. ACM
    Venugopal D An efficient signature representation and matching method for mobile devices Proceedings of the 2nd annual international workshop on Wireless internet, (16-es)
  1711. Chan T (2006). Faster core-set constructions and data-stream algorithms in fixed dimensions, Computational Geometry: Theory and Applications, 35:1-2, (20-35), Online publication date: 1-Aug-2006.
  1712. Zheng K, Hu C, Lu H and Liu B (2006). A TCAM-based distributed parallel IP lookup scheme and performance analysis, IEEE/ACM Transactions on Networking, 14:4, (863-875), Online publication date: 1-Aug-2006.
  1713. Zhang D, Kang Y and Deng A (2006). A new heuristic recursive algorithm for the strip rectangular packing problem, Computers and Operations Research, 33:8, (2209-2217), Online publication date: 1-Aug-2006.
  1714. Tan S, Waters G and Crawford J (2006). A performance comparison of self-organising application layer multicast overlay construction techniques, Computer Communications, 29:12, (2322-2347), Online publication date: 1-Aug-2006.
  1715. Rassadko N Policy Classes and Query Rewriting Algorithm for XML Security Views 20th Annual IFIP WG 11.3 Working Conference on Data and Applications Security on Data and Applications Security XX - Volume 4127, (104-118)
  1716. ACM
    Kopf J, Cohen-Or D, Deussen O and Lischinski D Recursive Wang tiles for real-time blue noise ACM SIGGRAPH 2006 Papers, (509-518)
  1717. ACM
    Matsuzaki K, Hu Z and Takeichi M Towards automatic parallelization of tree reductions in dynamic programming Proceedings of the eighteenth annual ACM symposium on Parallelism in algorithms and architectures, (39-48)
  1718. ACM
    Wang J and Zhou H Optimal jumper insertion for antenna avoidance under ratio upper-bound Proceedings of the 43rd annual Design Automation Conference, (761-766)
  1719. Diem C An index calculus algorithm for plane curves of small degree Proceedings of the 7th international conference on Algorithmic Number Theory, (543-557)
  1720. Loos B On2L Proceedings of the 21st International Conference on computational Linguistics and 44th Annual Meeting of the Association for Computational Linguistics: Student Research Workshop, (61-66)
  1721. Soricut R and Marcu D Stochastic language generation using WIDL-expressions and its application in machine translation and summarization Proceedings of the 21st International Conference on Computational Linguistics and the 44th annual meeting of the Association for Computational Linguistics, (1105-1112)
  1722. Hadzic T and Andersen H A BDD-based polytime algorithm for cost-bounded interactive configuration Proceedings of the 21st national conference on Artificial intelligence - Volume 1, (62-67)
  1723. Baltes J and Anderson J The keystone scavenger team proceedings of the 21st national conference on Artificial intelligence - Volume 2, (1958-1959)
  1724. Kuo C, Shih C and Kuo T Resource Allocation Framework for Distributed Real-Time End-To-End Tasks Proceedings of the 12th International Conference on Parallel and Distributed Systems - Volume 1, (115-122)
  1725. Bille P New algorithms for regular expression matching Proceedings of the 33rd international conference on Automata, Languages and Programming - Volume Part I, (643-654)
  1726. Cole R, Kopelowitz T and Lewenstein M Suffix trays and suffix trists Proceedings of the 33rd international conference on Automata, Languages and Programming - Volume Part I, (358-369)
  1727. ACM
    Filatei A, Li X, Maza M and Schost É Implementation techniques for fast polynomial arithmetic in a high-level programming environment Proceedings of the 2006 international symposium on Symbolic and algebraic computation, (93-100)
  1728. ACM
    Kumar R, Singh P and Bhattacharya B Biobjective evolutionary and heuristic algorithms for intersection of geometric graphs Proceedings of the 8th annual conference on Genetic and evolutionary computation, (1689-1696)
  1729. ACM
    Mierswa I and Wurst M Information preserving multi-objective feature selection for unsupervised learning Proceedings of the 8th annual conference on Genetic and evolutionary computation, (1545-1552)
  1730. ACM
    Harada K, Sakuma J and Kobayashi S Local search for multiobjective function optimization Proceedings of the 8th annual conference on Genetic and evolutionary computation, (659-666)
  1731. ACM
    Giel O and Lehre P On the effect of populations in evolutionary multi-objective optimization Proceedings of the 8th annual conference on Genetic and evolutionary computation, (651-658)
  1732. ACM
    Jansen T and Wegener I On the local performance of simulated annealing and the (1+1) evolutionary algorithm Proceedings of the 8th annual conference on Genetic and evolutionary computation, (469-476)
  1733. ACM
    Bui T and Zrncic C An ant-based algorithm for finding degree-constrained minimum spanning tree Proceedings of the 8th annual conference on Genetic and evolutionary computation, (11-18)
  1734. Carlson J and Eppstein D The weighted maximum-mean subtree and other bicriterion subtree problems Proceedings of the 10th Scandinavian conference on Algorithm Theory, (400-410)
  1735. Dom M, Guo J, Niedermeier R and Wernicke S Minimum membership set covering and the consecutive ones property Proceedings of the 10th Scandinavian conference on Algorithm Theory, (339-350)
  1736. Franceschini G Sorting by merging or merging by sorting? Proceedings of the 10th Scandinavian conference on Algorithm Theory, (77-89)
  1737. Kolpakov R and Raffinot M New algorithms for text fingerprinting Proceedings of the 17th Annual conference on Combinatorial Pattern Matching, (342-353)
  1738. Kaplan H, Landau S and Verbin E A simpler analysis of burrows-wheeler based compression Proceedings of the 17th Annual conference on Combinatorial Pattern Matching, (282-293)
  1739. Amir A, Chencinski E, Iliopoulos C, Kopelowitz T and Zhang H Property matching and weighted matching Proceedings of the 17th Annual conference on Combinatorial Pattern Matching, (188-199)
  1740. ACM
    Korkmaz T and Zhou W On finding optimal paths in multi-radio, multi-hop mesh networks using WCETT metric Proceedings of the 2006 international conference on Wireless communications and mobile computing, (1375-1380)
  1741. Bein D, Datta A and Larmore L Self-stabilizing space optimal synchronization algorithms on trees Proceedings of the 13th international conference on Structural Information and Communication Complexity, (334-348)
  1742. ACM
    Raman V, Saurabh S and Subramanian C (2006). Faster fixed parameter tractable algorithms for finding feedback vertex sets, ACM Transactions on Algorithms, 2:3, (403-415), Online publication date: 1-Jul-2006.
  1743. ACM
    Kopf J, Cohen-Or D, Deussen O and Lischinski D (2006). Recursive Wang tiles for real-time blue noise, ACM Transactions on Graphics, 25:3, (509-518), Online publication date: 1-Jul-2006.
  1744. Berry V and Nicolas F (2006). Improved Parameterized Complexity of the Maximum Agreement Subtree and Maximum Compatible Tree Problems, IEEE/ACM Transactions on Computational Biology and Bioinformatics, 3:3, (289-302), Online publication date: 1-Jul-2006.
  1745. Cambazoglu B and Aykanat C (2006). Performance of query processing implementations in ranking-based text retrieval systems using inverted indices, Information Processing and Management: an International Journal, 42:4, (875-898), Online publication date: 1-Jul-2006.
  1746. Fotakis D and Gritzalis S (2006). Efficient heuristic algorithms for correcting the Cascade Vulnerability Problem for interconnected networks, Computer Communications, 29:11, (2109-2122), Online publication date: 1-Jul-2006.
  1747. van Oorschot P, Robert J and Martin M (2006). A monitoring system for detecting repeated packets with applications to computer worms, International Journal of Information Security, 5:3, (186-199), Online publication date: 1-Jul-2006.
  1748. Musliu N Local search algorithm for unicost set covering problem Proceedings of the 19th international conference on Advances in Applied Artificial Intelligence: industrial, Engineering and Other Applications of Applied Intelligent Systems, (302-311)
  1749. ACM
    Silberstein A, Braynard R and Yang J Constraint chaining Proceedings of the 2006 ACM SIGMOD international conference on Management of data, (157-168)
  1750. ACM
    Lauer T Learner interaction with algorithm visualizations Proceedings of the 11th annual SIGCSE conference on Innovation and technology in computer science education, (202-206)
  1751. ACM
    Hanneke S An analysis of graph cut size for transductive learning Proceedings of the 23rd international conference on Machine learning, (393-399)
  1752. O'Brien W, Hammer J and Siddiqui M From SEEKing knowledge to making connections Proceedings of the 13th international conference on Intelligent Computing in Engineering and Architecture, (500-518)
  1753. Das G and Nandy S Weighted broadcast in linear radio networks Proceedings of the Second international conference on Algorithmic Aspects in Information and Management, (343-353)
  1754. Chen Z, Fu B and Zhu B The approximability of the exemplar breakpoint distance problem Proceedings of the Second international conference on Algorithmic Aspects in Information and Management, (291-302)
  1755. Borodin A Further reflections on a theory for basic algorithms Proceedings of the Second international conference on Algorithmic Aspects in Information and Management, (1-9)
  1756. ACM
    Wong W and Baciu G A randomized marking scheme for continuous collision detection in simulation of deformable surfaces Proceedings of the 2006 ACM international conference on Virtual reality continuum and its applications, (181-188)
  1757. Hummel O and Atkinson C Using the web as a reuse repository Proceedings of the 9th international conference on Reuse of Off-the-Shelf Components, (298-311)
  1758. Tillmann C Efficient dynamic programming search algorithms for phrase-based SMT Proceedings of the Workshop on Computationally Hard Problems and Joint Inference in Speech and Language Processing, (9-16)
  1759. Huang L, Knight K and Joshi A A syntax-directed translator with extended domain of locality Proceedings of the Workshop on Computationally Hard Problems and Joint Inference in Speech and Language Processing, (1-8)
  1760. Loos B Scaling natural language understanding via user-driven ontology learning Proceedings of the Third Workshop on Scalable Natural Language Understanding, (33-40)
  1761. Dong X and Pollak I Approximate methods for constrained total variation minimization Proceedings of the First international computer science conference on Theory and Applications, (403-414)
  1762. Haleem M, Mathur C, Chandramouli R and Subbalakshmi K On optimizing the security-throughput trade-off in wireless networks with adversaries Proceedings of the 4th international conference on Applied Cryptography and Network Security, (448-458)
  1763. Kerschbaum F and Terzidis O Filtering for private collaborative benchmarking Proceedings of the 2006 international conference on Emerging Trends in Information and Communication Security, (409-422)
  1764. ACM
    Hershberger J Improved output-sensitive snap rounding Proceedings of the twenty-second annual symposium on Computational geometry, (357-366)
  1765. ACM
    Agarwal P, Arge L and Yi K I/O-efficient batched union-find and its applications to terrain analysis Proceedings of the twenty-second annual symposium on Computational geometry, (167-176)
  1766. Garzon M, Phan V, Roy S and Neel A In search of optimal codes for DNA computing Proceedings of the 12th international conference on DNA Computing, (143-156)
  1767. Maurer W Using mathematics to improve ada compiled code Proceedings of the 11th Ada-Europe international conference on Reliable Software Technologies, (191-202)
  1768. Neller T, Presser C, Russell I and Markov Z (2006). Pedagogical possibilities for the dice game pig, Journal of Computing Sciences in Colleges, 21:6, (149-161), Online publication date: 1-Jun-2006.
  1769. Lobo A and Baliga G (2006). NP-completeness for all computer science undergraduates, Journal of Computing Sciences in Colleges, 21:6, (53-63), Online publication date: 1-Jun-2006.
  1770. ACM
    Kalashnikov D and Mehrotra S (2006). Domain-independent data cleaning via analysis of entity-relationship graph, ACM Transactions on Database Systems, 31:2, (716-767), Online publication date: 1-Jun-2006.
  1771. Cardei M, Wu J and Yang S (2006). Topology Control in Ad Hoc Wireless Networks Using Cooperative Communication, IEEE Transactions on Mobile Computing, 5:6, (711-724), Online publication date: 1-Jun-2006.
  1772. ACM
    Tse S Online solutions for scalable file server systems Proceedings of the 1st international conference on Scalable information systems, (45-es)
  1773. ACM
    Matsuzaki K, Iwasaki H, Emoto K and Hu Z A library of constructive skeletons for sequential style of parallel programming Proceedings of the 1st international conference on Scalable information systems, (13-es)
  1774. Chen X, Liu L, Liu Z and Jiang T On the minimum common integer partition problem Proceedings of the 6th Italian conference on Algorithms and Complexity, (236-247)
  1775. ACM
    Zheng J, Robinson B, Williams L and Smiley K Applying regression test selection for COTS-based applications Proceedings of the 28th international conference on Software engineering, (512-522)
  1776. Bonizzoni P, Della Vedova G, Dondi R, Fertin G and Vialette S Exemplar longest common subsequence Proceedings of the 6th international conference on Computational Science - Volume Part II, (622-629)
  1777. Chantzara M and Anagnostou M MVRC heuristic for solving the multi-choice multi-constraint knapsack problem Proceedings of the 6th international conference on Computational Science - Volume Part I, (579-587)
  1778. Li T, Guan X, Yu Z and Xue W Computation of si nanowire bandstructures on parallel machines through domain decomposition Proceedings of the 6th international conference on Computational Science - Volume Part I, (250-257)
  1779. ACM
    Liu X, Xiao L, Kreling A and Liu Y Optimizing overlay topology by reducing cut vertices Proceedings of the 2006 international workshop on Network and operating systems support for digital audio and video, (1-6)
  1780. Frias L, Petit J and Roura S Lists revisited Proceedings of the 5th international conference on Experimental Algorithms, (121-133)
  1781. ACM
    Bonifaci V, Demetrescu C, Finocchi I and Laura L Visual editing of animated algorithms Proceedings of the working conference on Advanced visual interfaces, (476-479)
  1782. Prosser P and Unsworth C A Connectivity Constraint using Bridges Proceedings of the 2006 conference on ECAI 2006: 17th European Conference on Artificial Intelligence August 29 -- September 1, 2006, Riva del Garda, Italy, (707-708)
  1783. ACM
    Rolando M, Rossi M, Sanarico N and Mandrioli D A formal approach to sensor placement and configuration in a network intrusion detection system Proceedings of the 2006 international workshop on Software engineering for secure systems, (65-71)
  1784. Uhlig S and Tandel S Quantifying the BGP routes diversity inside a tier-1 network Proceedings of the 5th international IFIP-TC6 conference on Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communications Systems, (1002-1013)
  1785. Chen D, Chiang Y, Memon N and Wu X Lossless geometry compression for steady-state and time-varying irregular grids Proceedings of the Eighth Joint Eurographics / IEEE VGTC conference on Visualization, (275-282)
  1786. Krusche P and Tiskin A Efficient longest common subsequence computation using bulk-synchronous parallelism Proceedings of the 2006 international conference on Computational Science and Its Applications - Volume Part V, (165-174)
  1787. Chen Y and Tang C The bottleneck tree alignment problems Proceedings of the 2006 international conference on Computational Science and Its Applications - Volume Part III, (631-637)
  1788. Lin T, Zha H and Lee S Riemannian manifold learning for nonlinear dimensionality reduction Proceedings of the 9th European conference on Computer Vision - Volume Part I, (44-55)
  1789. ACM
    Shalev O and Shavit N (2006). Split-ordered lists, Journal of the ACM, 53:3, (379-405), Online publication date: 1-May-2006.
  1790. Yang Q, Ling C, Chai X and Pan R (2006). Test-Cost Sensitive Classification on Data with Missing Values, IEEE Transactions on Knowledge and Data Engineering, 18:5, (626-638), Online publication date: 1-May-2006.
  1791. Lin X, Xu J, Zhang Q, Lu H, Yu J, Zhou X and Yuan Y (2006). Approximate Processing of Massive Continuous Quantile Queries over High-Speed Data Streams, IEEE Transactions on Knowledge and Data Engineering, 18:5, (683-698), Online publication date: 1-May-2006.
  1792. Chen J, Rajaraman R and Sundaram R (2006). Meet and merge, Journal of Computer and System Sciences, 72:3, (468-489), Online publication date: 1-May-2006.
  1793. ACM
    Li L, Thornton M and Matula D A digit serial algorithm for the integer power operation Proceedings of the 16th ACM Great Lakes symposium on VLSI, (302-307)
  1794. Bondhugula U, Devulapalli A, Fernando J, Wyckoff P and Sadayappan P Parallel FPGA-based all-pairs shortest-paths in a directed graph Proceedings of the 20th international conference on Parallel and distributed processing, (112-112)
  1795. Ma C, Zhang Z and Yang Y Battery-aware router scheduling in wireless mesh networks Proceedings of the 20th international conference on Parallel and distributed processing, (81-81)
  1796. ACM
    Ciancio A, Pattem S, Ortega A and Krishnamachari B Energy-efficient data representation and routing for wireless sensor networks based on a distributed wavelet compression algorithm Proceedings of the 5th international conference on Information processing in sensor networks, (309-316)
  1797. Wu G, Zhang K, Liu C and Li J Adapting prime number labeling scheme for directed acyclic graphs Proceedings of the 11th international conference on Database Systems for Advanced Applications, (787-796)
  1798. Kwon S, Lee S and Kim S A precise metric for measuring how much web pages change Proceedings of the 11th international conference on Database Systems for Advanced Applications, (557-571)
  1799. Logofatu D and Drechsler R Efficient evolutionary approaches for the data ordering problem with inversion Proceedings of the 2006 international conference on Applications of Evolutionary Computing, (320-331)
  1800. Kehden B and Neumann F A relation-algebraic view on evolutionary algorithms for some graph problems Proceedings of the 6th European conference on Evolutionary Computation in Combinatorial Optimization, (147-158)
  1801. ACM
    Saeedi M, Zamani M and Jahanian A Prediction and reduction of routing congestion Proceedings of the 2006 international symposium on Physical design, (72-77)
  1802. Vashist A, Kulikowski C and Muchnik I Protein function annotation based on ortholog clusters extracted from incomplete genomes using combinatorial optimization Proceedings of the 10th annual international conference on Research in Computational Molecular Biology, (99-113)
  1803. Joo K and Lee W (2006). An efficient query evaluation in a mediator based on implementation plan, Information Sciences: an International Journal, 176:7, (799-819), Online publication date: 1-Apr-2006.
  1804. ACM
    Kortsarts Y and Rufinus J (2006). Teaching the power of randomization using a simple game, ACM SIGCSE Bulletin, 38:1, (460-463), Online publication date: 31-Mar-2006.
  1805. ACM
    Manassiev K, Mihailescu M and Amza C Exploiting distributed version concurrency in a transactional memory cluster Proceedings of the eleventh ACM SIGPLAN symposium on Principles and practice of parallel programming, (198-208)
  1806. Wei X, Cai Y and Hong X Clock Skew Scheduling Under Process Variations Proceedings of the 7th International Symposium on Quality Electronic Design, (237-242)
  1807. Wang J, Zhou H and Wu P Processing Rate Optimization by Sequential System Floorplanning Proceedings of the 7th International Symposium on Quality Electronic Design, (340-345)
  1808. Ramanathan M, Jagannathan S and Grama A Trace-Based memory aliasing across program versions Proceedings of the 9th international conference on Fundamental Approaches to Software Engineering, (381-395)
  1809. Das A, Lu J and Hsu W Region Monitoring for Local Phase Detection in Dynamic Optimization Systems Proceedings of the International Symposium on Code Generation and Optimization, (124-134)
  1810. Cheng J, Yu J, Lin X, Wang H and Yu P Fast computation of reachability labeling for large graphs Proceedings of the 10th international conference on Advances in Database Technology, (961-979)
  1811. Luo G, Naughton J and Yu P Multi-query SQL progress indicators Proceedings of the 10th international conference on Advances in Database Technology, (921-941)
  1812. Hu H, Lee D and Xu J Fast nearest neighbor search on road networks Proceedings of the 10th international conference on Advances in Database Technology, (186-203)
  1813. ACM
    Polycarpou I Computer science students' difficulties with proofs by induction Proceedings of the 44th annual Southeast regional conference, (601-606)
  1814. ACM
    Smith G Inductive bases and their application to searches for minimal unary NFAs Proceedings of the 44th annual Southeast regional conference, (470-475)
  1815. Shyam S and Bertacco V Distance-guided hybrid verification with GUIDO Proceedings of the conference on Design, automation and test in Europe: Proceedings, (1211-1216)
  1816. ACM
    Kortsarts Y and Rufinus J Teaching the power of randomization using a simple game Proceedings of the 37th SIGCSE technical symposium on Computer science education, (460-463)
  1817. Hwang Y and Lee P Efficient broadcast encryption scheme with log-key storage Proceedings of the 10th international conference on Financial Cryptography and Data Security, (281-295)
  1818. Belal A and Elmasry A Distribution-Sensitive construction of minimum-redundancy prefix codes Proceedings of the 23rd Annual conference on Theoretical Aspects of Computer Science, (92-103)
  1819. Tao Y and Hadjieleftheriou M Processing ranked queries with the minimum space Proceedings of the 4th international conference on Foundations of Information and Knowledge Systems, (294-312)
  1820. Deng L and Wong M An exact algorithm for the statistical shortest path problem Proceedings of the 2006 Asia and South Pacific Design Automation Conference, (965-970)
  1821. Absar J and Catthoor F Analysis of scratch-pad and data-cache performance using statistical methods Proceedings of the 2006 Asia and South Pacific Design Automation Conference, (820-825)
  1822. Zhang T, Zhan Y and Sapatnekar S Temperature-aware routing in 3D ICs Proceedings of the 2006 Asia and South Pacific Design Automation Conference, (309-314)
  1823. Angelov S, Harb B, Kannan S and Wang L Weighted isotonic regression under the L1 norm Proceedings of the seventeenth annual ACM-SIAM symposium on Discrete algorithm, (783-791)
  1824. Demetrescu C, Finocchi I and Ribichini A Trading off space for passes in graph streaming problems Proceedings of the seventeenth annual ACM-SIAM symposium on Discrete algorithm, (714-723)
  1825. Chowdhury R and Ramachandran V Cache-oblivious dynamic programming Proceedings of the seventeenth annual ACM-SIAM symposium on Discrete algorithm, (591-600)
  1826. Kim P and Kutzner A On optimal and efficient in place merging Proceedings of the 32nd conference on Current Trends in Theory and Practice of Computer Science, (350-359)
  1827. Subramani K Totally clairvoyant scheduling with relative timing constraints Proceedings of the 7th international conference on Verification, Model Checking, and Abstract Interpretation, (398-411)
  1828. Logozzo F and Cortesi A Semantic hierarchy refactoring by abstract interpretation Proceedings of the 7th international conference on Verification, Model Checking, and Abstract Interpretation, (313-331)
  1829. Chikkerur S, Cartwright A and Govindaraju V K-plet and coupled BFS Proceedings of the 2006 international conference on Advances in Biometrics, (309-315)
  1830. Malewicz G and Rosenberg A A pebble game for internet-based computing Theoretical Computer Science, (291-312)
  1831. McKinnon B, Baltes J and Anderson J A region-based approach to stereo matching for USAR RoboCup 2005, (452-463)
  1832. Mailler R and Lesser V (2006). Asynchronous partial overlay, Journal of Artificial Intelligence Research, 25:1, (529-576), Online publication date: 1-Jan-2006.
  1833. Kelarev A A polynomial algorithm for codes based on directed graphs Proceedings of the 12th Computing: The Australasian Theroy Symposium - Volume 51, (87-92)
  1834. Fisher D, Lam F, Shui W and Wong R Dynamic labeling schemes for ordered XML based on type information Proceedings of the 17th Australasian Database Conference - Volume 49, (59-68)
  1835. Boufounos P and Oppenheim A (2006). Quantization noise shaping on arbitrary frame expansions, EURASIP Journal on Advances in Signal Processing, 2006, (104-104), Online publication date: 1-Jan-2006.
  1836. ACM
    Tallam S and Gupta N (2005). A concept analysis inspired greedy algorithm for test suite minimization, ACM SIGSOFT Software Engineering Notes, 31:1, (35-42), Online publication date: 1-Jan-2006.
  1837. Huang C, He X and Qian M (2006). Communication-optimal parallel parenthesis matching, Parallel Computing, 32:1, (14-23), Online publication date: 1-Jan-2006.
  1838. Bournez O, Ibănescu L and Kirchner H (2006). From Chemical Rules to Term Rewriting, Electronic Notes in Theoretical Computer Science (ENTCS), 147:1, (113-134), Online publication date: 1-Jan-2006.
  1839. Bhowmick P, Biswas A and Bhattacharya B Isothetic polygonal approximations of a 2d object on generalized grid Proceedings of the First international conference on Pattern Recognition and Machine Intelligence, (407-412)
  1840. Fragopoulou P, Nikolopoulos S and Palios L Multi-source trees Proceedings of the 16th international conference on Algorithms and Computation, (1080-1089)
  1841. Ngo V, Nguyen H and Choi H Designing on-chip network based on optimal latency criteria Proceedings of the Second international conference on Embedded Software and Systems, (287-298)
  1842. Wang B, Chua K, Wang W and Srinivasan V Worst and best information exposure paths in wireless sensor networks Proceedings of the First international conference on Mobile Ad-hoc and Sensor Networks, (52-62)
  1843. Patney R, Baton S and Filer N Server supported routing Proceedings of the First international conference on Mobile Ad-hoc and Sensor Networks, (21-30)
  1844. Buist E and L'Ecuyer P A java library for simulating contact centers Proceedings of the 37th conference on Winter simulation, (556-565)
  1845. Maximov A and Johansson T Fast computation of large distributions and its cryptographic applications Proceedings of the 11th international conference on Theory and Application of Cryptology and Information Security, (313-332)
  1846. DasGupta B and Hammer B (2005). On approximate learning by multi-layered feedforward circuits, Theoretical Computer Science, 348:1, (95-127), Online publication date: 2-Dec-2005.
  1847. Kortsarts Y and Rufinus J (2005). How (and why) to introduce Monte Carlo randomized algorithms into a basic algorithms course?, Journal of Computing Sciences in Colleges, 21:2, (195-203), Online publication date: 1-Dec-2005.
  1848. Jansen T, De Jong K and Wegener I (2005). On the Choice of the Offspring Population Size in Evolutionary Algorithms, Evolutionary Computation, 13:4, (413-440), Online publication date: 1-Dec-2005.
  1849. Chung K and Chen P (2005). An efficient algorithm for computing moments on a block representation of a grey-scale image, Pattern Recognition, 38:12, (2578-2586), Online publication date: 1-Dec-2005.
  1850. Seiferas J (2005). Research note, Journal of Parallel and Distributed Computing, 65:12, (1601-1606), Online publication date: 1-Dec-2005.
  1851. Wu D, Wang Z and Dai K Retargetable machine-description system Proceedings of the 4th international conference on Grid and Cooperative Computing, (1161-1166)
  1852. Luo T, Hall L, Goldgof D and Remsen A Bit Reduction Support Vector Machine Proceedings of the Fifth IEEE International Conference on Data Mining, (733-736)
  1853. Lluch-Lafuente A and Montanari U (2005). Quantitative μ-calculus and CTL defined over constraint semirings, Theoretical Computer Science, 346:1, (135-160), Online publication date: 23-Nov-2005.
  1854. de Alfaro L, Faella M, Henzinger T, Majumdar R and Stoelinga M (2005). Model checking discounted temporal properties, Theoretical Computer Science, 345:1, (139-170), Online publication date: 21-Nov-2005.
  1855. Nikolopoulos S and Palios L Maximum-Size subgraphs of p4-sparse graphs admitting a perfect matching Proceedings of the 10th Panhellenic conference on Advances in Informatics, (68-79)
  1856. ACM
    Ge J, Chaudhuri S and Tyagi A Control flow based obfuscation Proceedings of the 5th ACM workshop on Digital rights management, (83-92)
  1857. ACM
    Hwang S, Oh J, Lee J, Cao Y, Tavanapong W, Liu D, Wong J and de Groen P Automatic measurement of quality metrics for colonoscopy videos Proceedings of the 13th annual ACM international conference on Multimedia, (912-921)
  1858. ACM
    Lin Y, Liu T and Chen H Semantic manifold learning for image retrieval Proceedings of the 13th annual ACM international conference on Multimedia, (249-258)
  1859. ACM
    Gu N, Yang J and Zhang Q Consistency maintenance based on the mark & retrace technique in groupware systems Proceedings of the 2005 ACM International Conference on Supporting Group Work, (264-273)
  1860. ACM
    Desnoyers P, Ganesan D and Shenoy P TSAR Proceedings of the 3rd international conference on Embedded networked sensor systems, (39-50)
  1861. ACM
    Ávila B and Lins R A fast orientation and skew detection algorithm for monochromatic document images Proceedings of the 2005 ACM symposium on Document engineering, (118-126)
  1862. Kondrak G N-gram similarity and distance Proceedings of the 12th international conference on String Processing and Information Retrieval, (115-126)
  1863. ACM
    Dakka W, Ipeirotis P and Wood K Automatic construction of multifaceted browsing interfaces Proceedings of the 14th ACM international conference on Information and knowledge management, (768-775)
  1864. Paik W and Ham E Learning to generate an ontology-based nursing care plan by virtual collaboration Proceedings of the 2005 OTM Confederated international conference on On the Move to Meaningful Internet Systems, (1200-1204)
  1865. Carvalho C, Madeira E, Verdi F and Magalhães M Policy-Based fault management for integrating IP over optical networks Proceedings of the 5th IEEE international conference on Operations and Management in IP-Based Networks, (88-97)
  1866. Hussain T, Awais M and Shamail S A fuzzy based approach to measure completeness of an entity-relationship model Proceedings of the 24th international conference on Perspectives in Conceptual Modeling, (410-422)
  1867. Huang K and Yan M A local adaptive algorithm for microaneurysms detection in digital fundus images Proceedings of the First international conference on Computer Vision for Biomedical Image Applications, (103-113)
  1868. Manassiev K and Amza C Scalable database replication through dynamic multiversioning Proceedings of the 2005 conference of the Centre for Advanced Studies on Collaborative research, (141-154)
  1869. Li W, Wong K, Yuan C, Li W and Xia Y Improving text similarity measurement by critical sentence vector model Proceedings of the Second Asia conference on Asia Information Retrieval Technology, (522-527)
  1870. ACM
    Tseng Y, Wang Y and Cheng K An integrated mobile surveillance and wireless sensor (iMouse) system and its detection delay analysis Proceedings of the 8th ACM international symposium on Modeling, analysis and simulation of wireless and mobile systems, (178-181)
  1871. Huang L and Chiang D Better k-best parsing Proceedings of the Ninth International Workshop on Parsing Technology, (53-64)
  1872. ACM
    Ladner R, Ivory M, Rao R, Burgstahler S, Comden D, Hahn S, Renzelmann M, Krisnandi S, Ramasamy M, Slabosky B, Martin A, Lacenski A, Olsen S and Groce D Automating tactile graphics translation Proceedings of the 7th international ACM SIGACCESS conference on Computers and accessibility, (150-157)
  1873. Subramani K Stressing is better than relaxing for negative cost cycle detection in networks Proceedings of the 4th international conference on Ad-Hoc, Mobile, and Wireless Networks, (320-333)
  1874. Dubey A, Wu X, Su H and Koo T Computation platform for automatic analysis of embedded software systems using model based approach Proceedings of the Third international conference on Automated Technology for Verification and Analysis, (114-128)
  1875. Ausiello G, Franciosa P and Italiano G Small stretch spanners on dynamic graphs Proceedings of the 13th annual European conference on Algorithms, (532-543)
  1876. Fleischer R and Trippen G Exploring an unknown graph efficiently Proceedings of the 13th annual European conference on Algorithms, (11-22)
  1877. Chaudhry G and Cormen T Oblivious vs. distribution-based sorting Proceedings of the 13th annual European conference on Algorithms, (317-328)
  1878. Vashist A, Kulikowski C and Muchnik I Ortholog clustering on a multipartite graph Proceedings of the 5th International conference on Algorithms in Bioinformatics, (328-340)
  1879. Kiehn A and Arun-Kumar S Amortised bisimulations Proceedings of the 25th IFIP WG 6.1 international conference on Formal Techniques for Networked and Distributed Systems, (320-334)
  1880. Yoon S, Nardini C, Benini L and De Micheli G (2005). Discovering Coherent Biclusters from Gene Expression Data Using Zero-Suppressed Binary Decision Diagrams, IEEE/ACM Transactions on Computational Biology and Bioinformatics, 2:4, (339-354), Online publication date: 1-Oct-2005.
  1881. Heffernan M and Wilken K (2005). Data-Dependency Graph Transformations for Instruction Scheduling, Journal of Scheduling, 8:5, (427-451), Online publication date: 1-Oct-2005.
  1882. Osorio M, Zepeda C, Nieves J and Cortes U Inferring acceptable arguments with Answer Set Programming Proceedings of the Sixth Mexican International Conference on Computer Science, (198-205)
  1883. Bannert C and Stoye J Protein annotation by secondary structure based alignments (PASSTA) Proceedings of the First international conference on Computational Life Sciences, (79-90)
  1884. Dalpasso M, Lancia G and Rizzi R The string barcoding problem is NP-Hard Proceedings of the 2005 international conference on Comparative Genomics, (88-96)
  1885. ACM
    Tallam S and Gupta N A concept analysis inspired greedy algorithm for test suite minimization Proceedings of the 6th ACM SIGPLAN-SIGSOFT workshop on Program analysis for software tools and engineering, (35-42)
  1886. Wee K and Lee W Extensions and variations on construction of autoreplicators in typogenetics Proceedings of the 8th European conference on Advances in Artificial Life, (685-694)
  1887. Guo H Mode-directed fixed point computation Proceedings of the 8th international conference on Logic Programming and Nonmonotonic Reasoning, (253-265)
  1888. Ermedahl A, Stappert F and Engblom J (2005). Clustered Worst-Case Execution-Time Calculation, IEEE Transactions on Computers, 54:9, (1104-1122), Online publication date: 1-Sep-2005.
  1889. Dai F, Dai Q and Wu J (2005). Power efficient routing trees for ad hoc wireless networks using directional antenna, Ad Hoc Networks, 3:5, (621-628), Online publication date: 1-Sep-2005.
  1890. Tao Y, Cheng R, Xiao X, Ngai W, Kao B and Prabhakar S Indexing multi-dimensional uncertain data with arbitrary probability density functions Proceedings of the 31st international conference on Very large data bases, (922-933)
  1891. Xin D, Han J, Yan X and Cheng H Mining compressed frequent-pattern sets Proceedings of the 31st international conference on Very large data bases, (709-720)
  1892. May N and Moerkotte G Main memory implementations for binary grouping Proceedings of the Third international conference on Database and XML Technologies, (162-176)
  1893. Hou Y, Yao L and He P Robust nonlinear dimension reduction Proceedings of the Second international conference on Fuzzy Systems and Knowledge Discovery - Volume Part II, (67-72)
  1894. Ray I, Kim E, McConnell R and Massey D Reliably, securely and efficiently distributing electronic content using multicasting Proceedings of the 6th international conference on E-Commerce and Web Technologies, (327-336)
  1895. Nishioka S, Yaguchi Y, Hamada T, Onizuka M and Yamamuro M XML-based e-barter system for circular supply exchange Proceedings of the 16th international conference on Database and Expert Systems Applications, (461-470)
  1896. Hoel E, Heng W and Honeycutt D High performance multimodal networks Proceedings of the 9th international conference on Advances in Spatial and Temporal Databases, (308-327)
  1897. Lu Q, George B and Shekhar S Capacity constrained routing algorithms for evacuation planning Proceedings of the 9th international conference on Advances in Spatial and Temporal Databases, (291-307)
  1898. Ono A and Nakano S Constant time generation of linear extensions Proceedings of the 15th international conference on Fundamentals of Computation Theory, (445-453)
  1899. Liben-Nowell D, Vee E and Zhu A Finding Longest Increasing and Common Subsequences in Streaming Data Proceedings of the 11th Annual International Conference on Computing and Combinatorics - Volume 3595, (263-272)
  1900. Caminiti S and Petreschi R String Coding of Trees with Locality and Heritability Proceedings of the 11th Annual International Conference on Computing and Combinatorics - Volume 3595, (251-262)
  1901. Tan J, Chua K and Zhang L Algorithmic and Complexity Issues of Three Clustering Methods in Microarray Data Analysis Proceedings of the 11th Annual International Conference on Computing and Combinatorics - Volume 3595, (74-83)
  1902. Misiołek E and Chen D Efficient Algorithms for Simplifying Flow Networks Proceedings of the 11th Annual International Conference on Computing and Combinatorics - Volume 3595, (737-746)
  1903. Guo J, Niedermeier R and Wernicke S Parameterized complexity of generalized vertex cover problems Proceedings of the 9th international conference on Algorithms and Data Structures, (36-48)
  1904. Baran I, Demaine E and Pǎtraşcu M Subquadratic algorithms for 3SUM Proceedings of the 9th international conference on Algorithms and Data Structures, (409-421)
  1905. Brodal G and Moruz G Tradeoffs between branch mispredictions and comparisons for sorting algorithms Proceedings of the 9th international conference on Algorithms and Data Structures, (385-395)
  1906. Li Z and Reed B Heap building bounds Proceedings of the 9th international conference on Algorithms and Data Structures, (14-23)
  1907. Chan T All-pairs shortest paths with real weights in O(n3/ log n) time Proceedings of the 9th international conference on Algorithms and Data Structures, (318-324)
  1908. Carmi P, Katz M and Mitchell J The minimum-area spanning tree problem Proceedings of the 9th international conference on Algorithms and Data Structures, (195-204)
  1909. ACM
    Chaver D, Rojas M, Pinuel L, Prieto M, Tirado F and Huang M Energy-aware fetch mechanism Proceedings of the 2005 international symposium on Low power electronics and design, (42-47)
  1910. Lan J, Zeng W and Zhuang X (2005). Operational distortion-quantization curve-based bit allocation for smooth video quality, Journal of Visual Communication and Image Representation, 16:4-5, (527-543), Online publication date: 1-Aug-2005.
  1911. Dharmapurikar S and Paxson V Robust TCP stream reassembly in the presence of adversaries Proceedings of the 14th conference on USENIX Security Symposium - Volume 14, (5-5)
  1912. ACM
    Cox J and Durfee E An efficient algorithm for multiagent plan coordination Proceedings of the fourth international joint conference on Autonomous agents and multiagent systems, (828-835)
  1913. Ahmadi M and Stone P Multi-robot learning for continuous area sweeping Proceedings of the First international conference on Learning and Adaption in Multi-Agent Systems, (47-70)
  1914. ACM
    Litman A and Moran-Schein S On distributed smooth scheduling Proceedings of the seventeenth annual ACM symposium on Parallelism in algorithms and architectures, (76-85)
  1915. ACM
    Malewicz G Parallel scheduling of complex dags under uncertainty Proceedings of the seventeenth annual ACM symposium on Parallelism in algorithms and architectures, (66-75)
  1916. Vrontis S and Sykas E (2005). Extending differentiated services architecture for multicasting provisioning, Computer Networks: The International Journal of Computer and Telecommunications Networking, 48:4, (567-584), Online publication date: 15-Jul-2005.
  1917. ACM
    Najafzadeh H and Chaiken S Towards a framework for source code instrumentation measurement validation Proceedings of the 5th international workshop on Software and performance, (123-130)
  1918. Franceschini G and Grossi R Optimal in-place sorting of vectors and records Proceedings of the 32nd international conference on Automata, Languages and Programming, (90-102)
  1919. Alstrup S, Li Gørtz I, Rauhe T, Thorup M and Zwick U Union-find with constant time deletions Proceedings of the 32nd international conference on Automata, Languages and Programming, (78-89)
  1920. Brodal G, Fagerberg R and Moruz G Cache-aware and cache-oblivious adaptive sorting Proceedings of the 32nd international conference on Automata, Languages and Programming, (576-588)
  1921. Roditty L, Thorup M and Zwick U Deterministic constructions of approximate distance oracles and spanners Proceedings of the 32nd international conference on Automata, Languages and Programming, (261-272)
  1922. Kao M, Sanghi M and Schweller R Randomized fast design of short DNA words Proceedings of the 32nd international conference on Automata, Languages and Programming, (1275-1286)
  1923. Takigawa I, Kudo M and Nakamura A The convex subclass method Proceedings of the 4th international conference on Machine Learning and Data Mining in Pattern Recognition, (90-99)
  1924. ACM
    Yuster R and Zwick U (2005). Fast sparse matrix multiplication, ACM Transactions on Algorithms, 1:1, (2-13), Online publication date: 1-Jul-2005.
  1925. Laszlo M and Mukherjee S (2005). Minimum Spanning Tree Partitioning Algorithm for Microaggregation, IEEE Transactions on Knowledge and Data Engineering, 17:7, (902-911), Online publication date: 1-Jul-2005.
  1926. Jiang M and Fu A (2005). Integration and Efficient Lookup of Compressed XML Accessibility Maps, IEEE Transactions on Knowledge and Data Engineering, 17:7, (939-953), Online publication date: 1-Jul-2005.
  1927. Bradford P and Gavrylyako O (2005). Foundations of Security for Hash Chains in Ad Hoc Networks, Cluster Computing, 8:2-3, (189-195), Online publication date: 1-Jul-2005.
  1928. Chen D, Hu X, Luan S, Wu X and Yu C (2005). Optimal Terrain Construction Problems and Applications in Intensity-Modulated Radiation Therapy, Algorithmica, 42:3-4, (265-288), Online publication date: 1-Jul-2005.
  1929. Awerbuch B and Kleinberg R Competitive collaborative learning Proceedings of the 18th annual conference on Learning Theory, (233-248)
  1930. Soricut R and Marcu D Towards developing generation algorithms for text-to-text applications Proceedings of the 43rd Annual Meeting on Association for Computational Linguistics, (66-74)
  1931. ACM
    Jansen T and Schellbach U Theoretical analysis of a mutation-based evolutionary algorithm for a tracking problem in the lattice Proceedings of the 7th annual conference on Genetic and evolutionary computation, (841-848)
  1932. ACM
    Neumann F and Wegener I Minimum spanning trees made easier via multi-objective optimization Proceedings of the 7th annual conference on Genetic and evolutionary computation, (763-769)
  1933. Korach E and Razgon M Optimal hypergraph tree-realization Proceedings of the 31st international conference on Graph-Theoretic Concepts in Computer Science, (261-270)
  1934. ACM
    Amza C, Soundararajan G and Cecchet E Transparent caching with strong consistency in dynamic content web sites Proceedings of the 19th annual international conference on Supercomputing, (264-273)
  1935. Kim D and Park H A new compressed suffix tree supporting fast search and its construction algorithm using optimal working space Proceedings of the 16th annual conference on Combinatorial Pattern Matching, (33-44)
  1936. ACM
    Lee J, Oh J and Hwang S STRG-Index Proceedings of the 2005 ACM SIGMOD international conference on Management of data, (718-729)
  1937. ACM
    Goldfeder C Frequency-based code placement for embedded multiprocessors Proceedings of the 42nd annual Design Automation Conference, (696-699)
  1938. ACM
    Su B and Chang Y An exact jumper insertion algorithm for antenna effect avoidance/fixing Proceedings of the 42nd annual Design Automation Conference, (325-328)
  1939. ACM
    Zhao C, Zhao Y and Dey S Constraint-aware robustness insertion for optimal noise-tolerance enhancement in VLSI circuits Proceedings of the 42nd annual Design Automation Conference, (190-195)
  1940. ACM
    Abdollahi A, Fallah F and Pedram M An effective power mode transition technique in MTCMOS circuits Proceedings of the 42nd annual Design Automation Conference, (37-42)
  1941. Bille P (2005). A survey on tree edit distance and related problems, Theoretical Computer Science, 337:1-3, (217-239), Online publication date: 9-Jun-2005.
  1942. ACM
    Ntoulas A, Zerfos P and Cho J Downloading textual hidden web content through keyword queries Proceedings of the 5th ACM/IEEE-CS joint conference on Digital libraries, (100-109)
  1943. ACM
    Cohen-Steiner D, Edelsbrunner H and Harer J Stability of persistence diagrams Proceedings of the twenty-first annual symposium on Computational geometry, (263-271)
  1944. Yuan S and Jue J (2005). Dynamic lightpath protection in WDM mesh networks under wavelength-continuity and risk-disjoint constraints, Computer Networks: The International Journal of Computer and Telecommunications Networking, 48:2, (91-112), Online publication date: 1-Jun-2005.
  1945. Ko B and Rubenstein D (2005). Distributed self-stabilizing placement of replicated resources in emerging networks, IEEE/ACM Transactions on Networking, 13:3, (476-487), Online publication date: 1-Jun-2005.
  1946. Blum C and Blesa M (2005). New metaheuristic approaches for the edge-weighted k-cardinality tree problem, Computers and Operations Research, 32:6, (1355-1377), Online publication date: 1-Jun-2005.
  1947. Yoo J and Shekhar S (2005). In-Route Nearest Neighbor Queries, Geoinformatica, 9:2, (117-137), Online publication date: 1-Jun-2005.
  1948. Fang J, Lin I, Yuh P, Chang Y and Wang J A routing algorithm for flip-chip design Proceedings of the 2005 IEEE/ACM International conference on Computer-aided design, (753-758)
  1949. Gupta A and Selvidge C Acyclic modeling of combinational loops Proceedings of the 2005 IEEE/ACM International conference on Computer-aided design, (343-347)
  1950. Subbarayan S Integrating CSP decomposition techniques and BDDs for compiling configuration problems Proceedings of the Second international conference on Integration of AI and OR Techniques in Constraint Programming for Combinatorial Optimization Problems, (351-365)
  1951. ACM
    Dong Q, Banerjee S, Adler M and Misra A Minimum energy reliable paths using unreliable wireless links Proceedings of the 6th ACM international symposium on Mobile ad hoc networking and computing, (449-459)
  1952. ACM
    Gupta H, Navda V, Das S and Chowdhary V Efficient gathering of correlated data in sensor networks Proceedings of the 6th ACM international symposium on Mobile ad hoc networking and computing, (402-413)
  1953. Zhou B, Chen Y, Qiu W, Chen Y and Peng C Reduce SW/HW migration efforts by a RTOS in Multi-FPGA systems Proceedings of the 9th international conference on Computer Supported Cooperative Work in Design II, (636-645)
  1954. Zhang D, Deng A and Kang Y A hybrid heuristic algorithm for the rectangular packing problem Proceedings of the 5th international conference on Computational Science - Volume Part I, (783-791)
  1955. ACM
    Johannes D, Seidel R and Wilhelm R Algorithm animation using shape analysis Proceedings of the 2005 ACM symposium on Software visualization, (17-26)
  1956. Frank A, Tanner S and Pevzner P Peptide sequence tags for fast database search in mass-spectrometry Proceedings of the 9th Annual international conference on Research in Computational Molecular Biology, (326-341)
  1957. Sze S, Lu Y and Yang Q A polynomial time solvable formulation of multiple sequence alignment Proceedings of the 9th Annual international conference on Research in Computational Molecular Biology, (204-216)
  1958. Botelho F, Kohayakawa Y and Ziviani N A practical minimal perfect hashing method Proceedings of the 4th international conference on Experimental and Efficient Algorithms, (488-500)
  1959. Hüffner F Algorithm engineering for optimal graph bipartization Proceedings of the 4th international conference on Experimental and Efficient Algorithms, (240-252)
  1960. Möhring R, Schilling H, Schütz B, Wagner D and Willhalm T Partitioning graphs to speed up dijkstra's algorithm Proceedings of the 4th international conference on Experimental and Efficient Algorithms, (189-202)
  1961. Bernholt T Computing the least median of squares estimator in time O(n) Proceedings of the 2005 international conference on Computational Science and its Applications - Volume Part I, (697-706)
  1962. Banner R and Orda A Multipath routing algorithms for congestion minimization Proceedings of the 4th IFIP-TC6 international conference on Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communication Systems, (536-548)
  1963. ACM
    Barbosa M, Cunha A and Pinto J (2005). Recursion patterns and time-analysis, ACM SIGPLAN Notices, 40:5, (45-54), Online publication date: 1-May-2005.
  1964. Ho D and Valaee S (2005). Information Raining and Optimal Link-Layer Design for Mobile Hotspots, IEEE Transactions on Mobile Computing, 4:3, (271-284), Online publication date: 1-May-2005.
  1965. Zhu X, Wu X, Elmagarmid A, Feng Z and Wu L (2005). Video Data Mining, IEEE Transactions on Knowledge and Data Engineering, 17:5, (665-677), Online publication date: 1-May-2005.
  1966. Biedl T, Chan T, Ganjali Y, Hajiaghayi M and Wood D (2005). Balanced vertex-orderings of graphs, Discrete Applied Mathematics, 148:1, (27-48), Online publication date: 30-Apr-2005.
  1967. Sheng X, Hu Y and Ramanathan P Distributed particle filter with GMM approximation for multiple targets localization and tracking in wireless sensor network Proceedings of the 4th international symposium on Information processing in sensor networks, (24-es)
  1968. Dong Q Maximizing system lifetime in wireless sensor networks Proceedings of the 4th international symposium on Information processing in sensor networks, (3-es)
  1969. Rosenkrantz D, Goel S, Ravi S and Gangolly J Structure-Based resilience metrics for service-oriented networks Proceedings of the 5th European conference on Dependable Computing, (345-362)
  1970. Lin X, Yuan Y, Wang W and Lu H Stabbing the Sky Proceedings of the 21st International Conference on Data Engineering, (502-513)
  1971. Zhao L, Jarvis S, Spooner D and Nudd G Predictive Performance Modelling of Parallel Component Composition Proceedings of the 19th IEEE International Parallel and Distributed Processing Symposium (IPDPS'05) - Workshop 15 - Volume 16
  1972. Malewicz G, Rosenberg A and Yurkewych M On Scheduling Complex Dags for Internet-Based Computing Proceedings of the 19th IEEE International Parallel and Distributed Processing Symposium (IPDPS'05) - Papers - Volume 01
  1973. Lee O, Yang H and Yi K Automatic verification of pointer programs using grammar-based shape analysis Proceedings of the 14th European conference on Programming Languages and Systems, (124-140)
  1974. ACM
    Owada S, Nielsen F and Igarashi T Volume catcher Proceedings of the 2005 symposium on Interactive 3D graphics and games, (111-116)
  1975. Rosenberg A and Yurkewych M (2005). Guidelines for Scheduling Some Common Computation-Dags for Internet-Based Computing, IEEE Transactions on Computers, 54:4, (428-438), Online publication date: 1-Apr-2005.
  1976. O'Connell T and Stearns R (2005). Mechanism design for software agents with complete information, Decision Support Systems, 39:2, (197-217), Online publication date: 1-Apr-2005.
  1977. Sayed A and Unland R HID Proceedings of the 4th international conference on Databases in Networked Information Systems, (78-91)
  1978. ACM
    Yi X and Kochut K JCPNet tool and automated analysis of distributed systems Proceedings of the 43rd annual Southeast regional conference - Volume 2, (327-332)
  1979. ACM
    Hsieh J, Chang L and Kuo T Efficient on-line identification of hot data for flash-memory management Proceedings of the 2005 ACM symposium on Applied computing, (838-842)
  1980. ACM
    Xiao Z, Li W and Jenq J On unit task linear-nonlinear two-cluster scheduling problem Proceedings of the 2005 ACM symposium on Applied computing, (713-717)
  1981. ACM
    Morimoto Y Optimized transitive association rule Proceedings of the 2005 ACM symposium on Applied computing, (543-544)
  1982. Asadi G and Tahoori M An Accurate SER Estimation Method Based on Propagation Probability Proceedings of the conference on Design, Automation and Test in Europe - Volume 1, (306-307)
  1983. Ghosh A and Givargis T LORD Proceedings of the conference on Design, Automation and Test in Europe - Volume 1, (190-195)
  1984. Lin X, Kwok Y and Lau V (2005). A Quantitative Comparison of Ad Hoc Routing Protocols with and without Channel Adaptation, IEEE Transactions on Mobile Computing, 4:2, (111-128), Online publication date: 1-Mar-2005.
  1985. Fragouli M and Delis A (2005). Navigation and Multimodal Transportation with EasyTransport, IEEE Intelligent Systems, 20:2, (54-61), Online publication date: 1-Mar-2005.
  1986. Medjahed B and Bouguettaya A (2005). A dynamic foundational architecture for semantic web services, Distributed and Parallel Databases, 17:2, (179-206), Online publication date: 1-Mar-2005.
  1987. ACM
    Okasaki C Alternatives to two classic data structures Proceedings of the 36th SIGCSE technical symposium on Computer science education, (162-165)
  1988. ACM
    Okasaki C (2005). Alternatives to two classic data structures, ACM SIGCSE Bulletin, 37:1, (162-165), Online publication date: 23-Feb-2005.
  1989. Mohr J and Li X Optimized multiple wavetable interpolation Proceedings of the 4th WSEAS International Conference on Signal Processing, Robotics and Automation, (1-9)
  1990. Popova-Zeugmann L and Werner M (2005). Extreme Runtimes of Schedules Modelled by Time Petri Nets, Fundamenta Informaticae, 67:1-3, (163-174), Online publication date: 1-Feb-2005.
  1991. Felzenszwalb P (2005). Representation and Detection of Deformable Shapes, IEEE Transactions on Pattern Analysis and Machine Intelligence, 27:2, (208-220), Online publication date: 1-Feb-2005.
  1992. Norden S (2005). Analyzing the performance of deferred reservations, Computer Networks: The International Journal of Computer and Telecommunications Networking, 47:3, (327-349), Online publication date: 1-Feb-2005.
  1993. Amir E and McIlraith S (2005). Partition-based logical reasoning for first-order and propositional theories, Artificial Intelligence, 162:1-2, (49-88), Online publication date: 1-Feb-2005.
  1994. Duong M and Zhang Y LSDX Proceedings of the 16th Australasian database conference - Volume 39, (185-193)
  1995. Lehman A and Lehman E Network coding Proceedings of the sixteenth annual ACM-SIAM symposium on Discrete algorithms, (499-504)
  1996. Attie P and Chockler H Efficiently verifiable conditions for deadlock-freedom of large concurrent programs Proceedings of the 6th international conference on Verification, Model Checking, and Abstract Interpretation, (465-481)
  1997. Kumar N, Kumar V and Viswanathan M On the complexity of error explanation Proceedings of the 6th international conference on Verification, Model Checking, and Abstract Interpretation, (448-464)
  1998. ACM
    Ringenburg M and Grossman D Types for describing coordinated data structures Proceedings of the 2005 ACM SIGPLAN international workshop on Types in languages design and implementation, (25-36)
  1999. Jansen T A comparison of simulated annealing with a simple evolutionary algorithm Proceedings of the 8th international conference on Foundations of Genetic Algorithms, (37-57)
  2000. Popova-Zeugmann L and Werner M (2005). Extreme Runtimes of Schedules Modelled by Time Petri Nets, Fundamenta Informaticae, 67:1-3, (163-174), Online publication date: 1-Jan-2005.
  2001. ACM
    Thorup M and Zwick U (2005). Approximate distance oracles, Journal of the ACM, 52:1, (1-24), Online publication date: 1-Jan-2005.
  2002. Felzenszwalb P and Huttenlocher D (2005). Pictorial Structures for Object Recognition, International Journal of Computer Vision, 61:1, (55-79), Online publication date: 1-Jan-2005.
  2003. Wang B (2005). Linear time algorithms for the ring loading problem with demand splitting, Journal of Algorithms, 54:1, (45-57), Online publication date: 1-Jan-2005.
  2004. Van Gelder A (2005). Toward Leaner Binary-Clause Reasoning in a Satisfiability Solver, Annals of Mathematics and Artificial Intelligence, 43:1-4, (239-253), Online publication date: 1-Jan-2005.
  2005. Lin J and Liu H An efficient fault-tolerant approach for MPLS network systems Proceedings of the Second international conference on Parallel and Distributed Processing and Applications, (815-824)
  2006. Wang G, Luo J, Cao J and Chan K QoSRHMM Proceedings of the Second international conference on Parallel and Distributed Processing and Applications, (568-577)
  2007. Chen Y, Guo X, Zeng Q and Chen G An adaptive routing strategy based on dynamic cache in mobile ad hoc networks Proceedings of the Second international conference on Parallel and Distributed Processing and Applications, (357-366)
  2008. Subramani K Zero-Clairvoyant scheduling with inter-period constraints Proceedings of the 9th Asian Computing Science conference on Advances in Computer Science: dedicated to Jean-Louis Lassez on the Occasion of His 5th Cycle Birthday, (236-247)
  2009. Fox M, Brogan D and Reynolds P Approximating component selection Proceedings of the 36th conference on Winter simulation, (429-434)
  2010. Hadlock F, Balasubramanian D, Bittinger J, Davis C, Kesiraju S, Kolpack J, Northcutt J, Sudireddy S, Tyler M, Williams J and Wyatt J (2004). An internet based algorithm visualization system, Journal of Computing Sciences in Colleges, 20:2, (304-310), Online publication date: 1-Dec-2004.
  2011. Sung K and Shirley P (2004). Algorithm analysis for returning adult students, Journal of Computing Sciences in Colleges, 20:2, (62-69), Online publication date: 1-Dec-2004.
  2012. Vovk V (2004). A Universal Well-Calibrated Algorithm for On-line Classification, The Journal of Machine Learning Research, 5, (575-604), Online publication date: 1-Dec-2004.
  2013. ACM
    Shilova S and Shilov N (2004). Addendum to Etude on theme of Dijkstra, ACM SIGACT News, 35:4, (118-118), Online publication date: 1-Dec-2004.
  2014. Sehgal A, Iyengar V and Chakrabarty K (2004). SOC test planning using virtual test access architectures, IEEE Transactions on Very Large Scale Integration (VLSI) Systems, 12:12, (1263-1276), Online publication date: 1-Dec-2004.
  2015. Lu H and Sahni S (2004). Enhanced Interval Trees for Dynamic IP Router-Tables, IEEE Transactions on Computers, 53:12, (1615-1628), Online publication date: 1-Dec-2004.
  2016. ACM
    Gudmundsson J, van Kreveld M and Speckmann B Efficient detection of motion patterns in spatio-temporal data sets Proceedings of the 12th annual ACM international workshop on Geographic information systems, (250-257)
  2017. Bose P, Maheshwari A, Narasimhan G, Smid M and Zeh N (2004). Approximating geometric bottleneck shortest paths, Computational Geometry: Theory and Applications, 29:3, (233-249), Online publication date: 1-Nov-2004.
  2018. Huang X and Jensen C In-Route skyline querying for location-based services Proceedings of the 4th international conference on Web and Wireless Geographical Information Systems, (120-135)
  2019. ACM
    Kumar R and Kaur J Efficient beacon placement for network tomography Proceedings of the 4th ACM SIGCOMM conference on Internet measurement, (181-186)
  2020. ACM
    Zhou M and Aggarwal V An optimization-based approach to dynamic data content selection in intelligent multimedia interfaces Proceedings of the 17th annual ACM symposium on User interface software and technology, (227-236)
  2021. ACM
    Li Z and Mohapatra P (2004). QoS-aware multicasting in DiffServ domains, ACM SIGCOMM Computer Communication Review, 34:5, (47-57), Online publication date: 15-Oct-2004.
  2022. ACM
    Wang Y, Makedon F and Chakrabarti A R*-Histograms Proceedings of the 12th annual ACM international conference on Multimedia, (356-359)
  2023. Brönnimann H Towards faster linear-sized nets for axis-aligned boxes in the plane Proceedings of the 2004 Japanese conference on Discrete and Computational Geometry, (54-61)
  2024. Yu H and Weddell G Investigations in tree locking for compiled database applications Proceedings of the 2004 conference of the Centre for Advanced Studies on Collaborative research, (217-231)
  2025. Corwin E and Logar A (2004). Sorting in linear time - variations on the bucket sort, Journal of Computing Sciences in Colleges, 20:1, (197-202), Online publication date: 1-Oct-2004.
  2026. Krone J (2004). Keeping pointers or references under control, Journal of Computing Sciences in Colleges, 20:1, (42-53), Online publication date: 1-Oct-2004.
  2027. ACM
    Volbert K Experimental analysis of adjustable sectorized topologies for static ad hoc networks Proceedings of the 2004 joint workshop on Foundations of mobile computing, (102-111)
  2028. ACM
    Wan P, Li X and Frieder O OVSF-CDMA code assignment in wireless ad hoc networks Proceedings of the 2004 joint workshop on Foundations of mobile computing, (92-101)
  2029. Dai F and Wu J (2004). An Extended Localized Algorithm for Connected Dominating Set Formation in Ad Hoc Wireless Networks, IEEE Transactions on Parallel and Distributed Systems, 15:10, (908-920), Online publication date: 1-Oct-2004.
  2030. Wu-Hen-Chang A, Le Viet D, Batori G, Gecse R and Csopaki G High-level restructuring of TTCN-3 test data Proceedings of the 4th international conference on Formal Approaches to Software Testing, (180-194)
  2031. Dong L and Watters C Improving Efficiency and Relevance Ranking in Information Retrieval Proceedings of the 2004 IEEE/WIC/ACM International Conference on Web Intelligence, (648-651)
  2032. Marceau G, Cooper G, Krishnamurthi S and Reiss S A Dataflow Language for Scriptable Debugging Proceedings of the 19th IEEE international conference on Automated software engineering, (218-227)
  2033. Tran V, Qin S and Chin W An automatic mapping from statecharts to verilog Proceedings of the First international conference on Theoretical Aspects of Computing, (187-203)
  2034. Kortsarts Y, Kortsarz G and Nutov Z Approximation algorithm for directed multicuts Proceedings of the Second international conference on Approximation and Online Algorithms, (61-67)
  2035. Wang L, Cai W, Jie W and See S (2004). Models and heuristics for resource co-reservation in computational grids, Neural, Parallel & Scientific Computations, 12:3, (261-288), Online publication date: 1-Sep-2004.
  2036. Elmqvist N and Tsigas P (2004). Animated visualization of causal relations through growing 2D geometry, Information Visualization, 3:3, (154-172), Online publication date: 1-Sep-2004.
  2037. Markovskii A (2004). Solution of Fuzzy Equations with Max-Product Composition in Inverse Control and Decision Making Problems, Automation and Remote Control, 65:9, (1486-1495), Online publication date: 1-Sep-2004.
  2038. Guo M, Ho M and Chang W (2004). Fast parallel molecular solution to the dominating-set problem on massively parallel bio-computing, Parallel Computing, 30:9-10, (1109-1125), Online publication date: 1-Sep-2004.
  2039. Irony D, Toledo S and Tiskin A (2004). Communication lower bounds for distributed-memory matrix multiplication, Journal of Parallel and Distributed Computing, 64:9, (1017-1026), Online publication date: 1-Sep-2004.
  2040. Theobald M, Weikum G and Schenkel R Top-k query evaluation with probabilistic guarantees Proceedings of the Thirtieth international conference on Very large data bases - Volume 30, (648-659)
  2041. Reitsma P and Pollard N Evaluating motion graphs for character navigation Proceedings of the 2004 ACM SIGGRAPH/Eurographics symposium on Computer animation, (89-98)
  2042. ACM
    Wang C, Wang W, Pei J, Zhu Y and Shi B Scalable mining of large disk-based graph databases Proceedings of the tenth ACM SIGKDD international conference on Knowledge discovery and data mining, (316-325)
  2043. Yan B, Pan C, Olman V, Hettich R and Xu Y Separation of Ion Types in Tandem Mass Spectrometry Data Interpretation " A Graph-Theoretic Approach Proceedings of the 2004 IEEE Computational Systems Bioinformatics Conference, (236-244)
  2044. ACM
    Hellerstein J and Wang W Optimization of in-network data reduction Proceeedings of the 1st international workshop on Data management for sensor networks: in conjunction with VLDB 2004, (40-47)
  2045. Case J (2004). Off-Loading Memory to the Environment, Minds and Machines, 14:3, (387-389), Online publication date: 1-Aug-2004.
  2046. Bender M, Sethia S and Skiena S (2004). Data structures for maintaining set partitions, Random Structures & Algorithms, 25:1, (43-67), Online publication date: 1-Aug-2004.
  2047. Gal Y and Pfeffer A Reasoning about Rationality and Beliefs Proceedings of the Third International Joint Conference on Autonomous Agents and Multiagent Systems - Volume 2, (774-781)
  2048. ACM
    Zhuang X, Zhang T and Pande S (2004). Hardware-managed register allocation for embedded processors, ACM SIGPLAN Notices, 39:7, (192-201), Online publication date: 11-Jul-2004.
  2049. ACM
    Carlsson G, Zomorodian A, Collins A and Guibas L Persistence barcodes for shapes Proceedings of the 2004 Eurographics/ACM SIGGRAPH symposium on Geometry processing, (124-135)
  2050. ACM
    Saunders D and Wan Z Smith normal form of dense integer matrices fast algorithms into practice Proceedings of the 2004 international symposium on Symbolic and algebraic computation, (274-281)
  2051. Jacobson S and Yücesan E (2004). Analyzing the Performance of Generalized Hill Climbing Algorithms, Journal of Heuristics, 10:4, (387-405), Online publication date: 1-Jul-2004.
  2052. Sivignon I, Dupont F and Chassery J (2004). Digital intersections, Graphical Models, 66:4, (226-244), Online publication date: 1-Jul-2004.
  2053. ACM
    Hendler D, Shavit N and Yerushalmi L A scalable lock-free stack algorithm Proceedings of the sixteenth annual ACM symposium on Parallelism in algorithms and architectures, (206-215)
  2054. ACM
    Bender M, Fineman J, Gilbert S and Leiserson C On-the-fly maintenance of series-parallel relationships in fork-join multithreaded programs Proceedings of the sixteenth annual ACM symposium on Parallelism in algorithms and architectures, (133-144)
  2055. Nikolopoulos S and Palios L Recognizing HHD-free and welsh-powell opposition graphs Proceedings of the 30th international conference on Graph-Theoretic Concepts in Computer Science, (105-116)
  2056. Grandoni F and Italiano G Decremental clique problem Proceedings of the 30th international conference on Graph-Theoretic Concepts in Computer Science, (142-153)
  2057. Xiang G, Starks S, Kreinovich V and Longpré L New algorithms for statistical analysis of interval data Proceedings of the 7th international conference on Applied Parallel Computing: state of the Art in Scientific Computing, (189-196)
  2058. ACM
    Beaver J, Morsillo N, Pruhs K, Chrysanthis P and Liberatore V Scalable dissemination Proceedings of the 7th International Workshop on the Web and Databases: colocated with ACM SIGMOD/PODS 2004, (31-36)
  2059. ACM
    Lee K, Ko B and Calo S Adaptive server selection for large scale interactive online games Proceedings of the 14th international workshop on Network and operating systems support for digital audio and video, (152-157)
  2060. ACM
    Cohen M and Gudes E Diagonally Subgraphs Pattern Mining Proceedings of the 9th ACM SIGMOD workshop on Research issues in data mining and knowledge discovery, (51-58)
  2061. ACM
    Yiu M and Mamoulis N Clustering objects on a spatial network Proceedings of the 2004 ACM SIGMOD international conference on Management of data, (443-454)
  2062. ACM
    Gabow H Finding paths and cycles of superpolylogarithmic length Proceedings of the thirty-sixth annual ACM symposium on Theory of computing, (407-416)
  2063. ACM
    Roditty L and Zwick U A fully dynamic reachability algorithm for directed graphs with an almost linear update time Proceedings of the thirty-sixth annual ACM symposium on Theory of computing, (184-191)
  2064. ACM
    Zhuang X, Zhang T and Pande S Hardware-managed register allocation for embedded processors Proceedings of the 2004 ACM SIGPLAN/SIGBED conference on Languages, compilers, and tools for embedded systems, (192-201)
  2065. ACM
    Duffield N, Lund C and Thorup M Flow sampling under hard resource constraints Proceedings of the joint international conference on Measurement and modeling of computer systems, (85-96)
  2066. ACM
    Huang L and Wong M Optical proximity correction (OPC) Proceedings of the 41st annual Design Automation Conference, (186-191)
  2067. ACM
    Bhattacharya S, Jangkrajarng N, Hartono R and Shi C Correct-by-construction layout-centric retargeting of large analog designs Proceedings of the 41st annual Design Automation Conference, (139-144)
  2068. Collins A, Zomorodian A, Carlsson G and Guibas L A barcode shape descriptor for curve point cloud data Proceedings of the First Eurographics conference on Point-Based Graphics, (181-191)
  2069. ACM
    Liu H, Chang Y and Chao K (2004). An optimal algorithm for querying tree structures and its applications in bioinformatics, ACM SIGMOD Record, 33:2, (21-26), Online publication date: 1-Jun-2004.
  2070. ACM
    Duffield N, Lund C and Thorup M (2004). Flow sampling under hard resource constraints, ACM SIGMETRICS Performance Evaluation Review, 32:1, (85-96), Online publication date: 1-Jun-2004.
  2071. Wang W, Raghunathan A, Lakshminarayana G and Jha N (2004). Input space adaptive design, IEEE Transactions on Very Large Scale Integration (VLSI) Systems, 12:6, (590-602), Online publication date: 1-Jun-2004.
  2072. ACM
    Friedman R, Gradinariu M and Simon G Locating cache proxies in manets Proceedings of the 5th ACM international symposium on Mobile ad hoc networking and computing, (175-186)
  2073. Armando A, Castellini C, Giunchiglia E and Maratea M A SAT-based decision procedure for the boolean combination of difference constraints Proceedings of the 7th international conference on Theory and Applications of Satisfiability Testing, (16-29)
  2074. Tang X and Chanson S (2004). Minimal Cost Replication of Dynamic Web Contents under Flat Update Delivery, IEEE Transactions on Parallel and Distributed Systems, 15:5, (431-439), Online publication date: 1-May-2004.
  2075. Kozanidis G and Melachrinoudis E (2004). A branch & bound algorithm for the 0-1 mixed integer knapsack problem with linear multiple choice constraints, Computers and Operations Research, 31:5, (695-711), Online publication date: 20-Apr-2004.
  2076. ACM
    Alpert C, Hrkić M and Quay S A fast algorithm for identifying good buffer insertion candidate locations Proceedings of the 2004 international symposium on Physical design, (47-52)
  2077. ACM
    Oommen B, Zgierski J and Nussbaum D Deterministic Majority filters applied to stochastic sorting Proceedings of the 42nd annual Southeast regional conference, (228-233)
  2078. Abudiab M, Starek M, Lumampao R and Nguyen A (2004). Utilization of GIS and graph theory for determination of optimal mailing route, Journal of Computing Sciences in Colleges, 19:4, (273-278), Online publication date: 1-Apr-2004.
  2079. ACM
    Huan J, Wang W, Bandyopadhyay D, Snoeyink J, Prins J and Tropsha A Mining protein family specific residue packing patterns from protein structure graphs Proceedings of the eighth annual international conference on Research in computational molecular biology, (308-315)
  2080. ACM
    Li J and Jiang T An exact solution for finding minimum recombinant haplotype configurations on pedigrees with missing data by integer linear programming Proceedings of the eighth annual international conference on Research in computational molecular biology, (20-29)
  2081. Tsuruoka Y and Tsujii J Iterative CKY parsing for probabilistic context-free grammars Proceedings of the First international joint conference on Natural Language Processing, (52-60)
  2082. ACM
    Buchholz S and Buchholz T Replica placement in adaptive content distribution networks Proceedings of the 2004 ACM symposium on Applied computing, (1705-1710)
  2083. ACM
    Putthividhya W, Tran M, Tavanapong W and Wong J Core selection with end-to-end QoS support Proceedings of the 2004 ACM symposium on Applied computing, (328-333)
  2084. ACM
    Ceberio M and Kreinovich V (2004). Greedy algorithms for optimizing multivariate Horner schemes, ACM SIGSAM Bulletin, 38:1, (8-15), Online publication date: 1-Mar-2004.
  2085. Deng L and Wong M Optimal Algorithm for Minimizing the Number of Twists in an On-Chip Bus Proceedings of the conference on Design, automation and test in Europe - Volume 2
  2086. Huang J, Tahoori M and Lombardi F Fault Tolerance of Programmable Switch Blocks Proceedings of the conference on Design, automation and test in Europe - Volume 2
  2087. Wong S and Tsui C Re-Configurable Bus Encoding Scheme for Reducing Power Consumption of the Cross Coupling Capacitance for Deep Sub-Micron Instruction Bus Proceedings of the conference on Design, automation and test in Europe - Volume 1
  2088. Shen Z and Chu C Accurate and efficient flow based congestion estimation in floorplanning Proceedings of the 2004 Asia and South Pacific Design Automation Conference, (671-676)
  2089. Dechu S, Shen Z and Chu C An efficient routing tree construction algorithm with buffer insertion, wire sizing and obstacle considerations Proceedings of the 2004 Asia and South Pacific Design Automation Conference, (361-366)
  2090. Yang K, Cheng K and Wang L TranGen Proceedings of the 2004 Asia and South Pacific Design Automation Conference, (92-97)
  2091. Pettie S (2004). A new approach to all-pairs shortest paths on real-weighted graphs, Theoretical Computer Science, 312:1, (47-74), Online publication date: 26-Jan-2004.
  2092. ACM
    Najafzadeh H and Chaiken S Validated observation and reporting of microscopic performance using Pentium II counter facilities Proceedings of the 4th international workshop on Software and performance, (161-165)
  2093. Nikolopoulos S and Palios L Hole and antihole detection in graphs Proceedings of the fifteenth annual ACM-SIAM symposium on Discrete algorithms, (850-859)
  2094. McConnell R A certifying algorithm for the consecutive-ones property Proceedings of the fifteenth annual ACM-SIAM symposium on Discrete algorithms, (768-777)
  2095. Chan T An optimal randomized algorithm for maximum Tukey depth Proceedings of the fifteenth annual ACM-SIAM symposium on Discrete algorithms, (430-436)
  2096. Miller G A time efficient Delaunay refinement algorithm Proceedings of the fifteenth annual ACM-SIAM symposium on Discrete algorithms, (400-409)
  2097. Yuster R and Zwick U Detecting short directed cycles using rectangular matrix multiplication and dynamic programming Proceedings of the fifteenth annual ACM-SIAM symposium on Discrete algorithms, (254-260)
  2098. Mendelson R, Thorup M and Zwick U Meldable RAM priority queues and minimum directed spanning trees Proceedings of the fifteenth annual ACM-SIAM symposium on Discrete algorithms, (40-48)
  2099. ACM
    Najafzadeh H and Chaiken S (2004). Validated observation and reporting of microscopic performance using Pentium II counter facilities, ACM SIGSOFT Software Engineering Notes, 29:1, (161-165), Online publication date: 1-Jan-2004.
  2100. Madeira S and Oliveira A (2004). Biclustering Algorithms for Biological Data Analysis, IEEE/ACM Transactions on Computational Biology and Bioinformatics, 1:1, (24-45), Online publication date: 1-Jan-2004.
  2101. Goumopoulos C and Housos E (2004). Efficient trip generation with a rule modeling system for crew scheduling problems, Journal of Systems and Software, 69:1-2, (43-56), Online publication date: 1-Jan-2004.
  2102. Bosch P Process improvement Proceedings of the 35th conference on Winter simulation: driving innovation, (1852-1859)
  2103. Ramos J, Rego V and Sang J Simulation of large scale networks III Proceedings of the 35th conference on Winter simulation: driving innovation, (721-728)
  2104. Lee J, Sun Y and Chen M On Maximum Rate Control of Weighted Fair Scheduling for Transactional Systems Proceedings of the 24th IEEE International Real-Time Systems Symposium
  2105. De La Torre P (2003). How efficiently can room at the bottom be traded away for speed at the top?, Natural Computing: an international journal, 2:4, (349-389), Online publication date: 2-Dec-2003.
  2106. ACM
    Ding Y and Li Z A Compiler Analysis of Interprocedural Data Communication Proceedings of the 2003 ACM/IEEE conference on Supercomputing
  2107. Ho T, Chang Y, Chen S and Lee D A Fast Crosstalk- and Performance-Driven Multilevel Routing System Proceedings of the 2003 IEEE/ACM international conference on Computer-aided design
  2108. ACM
    Jespersen S, Pedersen T and Thorhauge J Evaluating the markov assumption for web usage mining Proceedings of the 5th ACM international workshop on Web information and data management, (82-89)
  2109. ACM
    Shekhar S and Yoo J Processing in-route nearest neighbor queries Proceedings of the 11th ACM international symposium on Advances in geographic information systems, (9-16)
  2110. ACM
    Fayzullin M, Subrahmanian V, Picariello A and Sapino M The CPR model for summarizing video Proceedings of the 1st ACM international workshop on Multimedia databases, (2-9)
  2111. ACM
    Drinic M, Kirovski D and Potkonjak M Model-based compression in wireless ad hoc networks Proceedings of the 1st international conference on Embedded networked sensor systems, (231-242)
  2112. ACM
    Ganapathy V, Jha S, Chandler D, Melski D and Vitek D Buffer overrun detection using linear programming and static analysis Proceedings of the 10th ACM conference on Computer and communications security, (345-354)
  2113. ACM
    Kaur H, Kalyanaraman S, Weiss A, Kanwar S and Gandhi A (2003). BANANAS, ACM SIGCOMM Computer Communication Review, 33:4, (277-288), Online publication date: 1-Oct-2003.
  2114. ACM
    Li L, Chakrabarty K and Touba N (2003). Test data compression using dictionaries with selective entries and fixed-length indices, ACM Transactions on Design Automation of Electronic Systems, 8:4, (470-490), Online publication date: 1-Oct-2003.
  2115. De Beijer N, Watson B and Kourie D Stretching and jamming of automata Proceedings of the 2003 annual research conference of the South African institute of computer scientists and information technologists on Enablement through technology, (198-207)
  2116. Marsden G and Cairns D Improving the usability of the hierarchical file system Proceedings of the 2003 annual research conference of the South African institute of computer scientists and information technologists on Enablement through technology, (122-129)
  2117. ACM
    Zhou N, Wu H and Abouzeid A Reactive routing overhead in networks with unreliable nodes Proceedings of the 9th annual international conference on Mobile computing and networking, (147-160)
  2118. ACM
    Bruce K, Drysdale R, Kelemen C and Tucker A (2003). Why math?, Communications of the ACM, 46:9, (40-44), Online publication date: 1-Sep-2003.
  2119. ACM
    Bird R and Hinze R Functional Pearl trouble shared is trouble halved Proceedings of the 2003 ACM SIGPLAN workshop on Haskell, (1-6)
  2120. ACM
    Kaur H, Kalyanaraman S, Weiss A, Kanwar S and Gandhi A BANANAS Proceedings of the ACM SIGCOMM workshop on Future directions in network architecture, (277-288)
  2121. ACM
    Yan X and Han J CloseGraph Proceedings of the ninth ACM SIGKDD international conference on Knowledge discovery and data mining, (286-295)
  2122. Tchourbanov A, Quest D, Ali H, Pauley M and Norgren R A New Approach for Gene Annotation Using Unambiguous Sequence Joining Proceedings of the IEEE Computer Society Conference on Bioinformatics
  2123. Thulasiram R and Thulasiraman P (2003). Performance Evaluation of a Multithreaded Fast Fourier Transform Algorithm for Derivative Pricing, The Journal of Supercomputing, 26:1, (43-58), Online publication date: 1-Aug-2003.
  2124. ACM
    Katz S and Tal A Hierarchical mesh decomposition using fuzzy clustering and cuts ACM SIGGRAPH 2003 Papers, (954-961)
  2125. Greenberg R Fast and space-efficient location of heavy or dense segments in run-length encoded sequences Proceedings of the 9th annual international conference on Computing and combinatorics, (528-536)
  2126. Chen Y, Lu C and Tang C On the full and bottleneck full Steiner tree problems Proceedings of the 9th annual international conference on Computing and combinatorics, (122-129)
  2127. ACM
    Shalev O and Shavit N Split-ordered lists Proceedings of the twenty-second annual symposium on Principles of distributed computing, (102-111)
  2128. Chang W, Guo M and Ho M Solving the set-splitting problem in sticker-based model and the lipton-adelmann model Proceedings of the 2003 international conference on Parallel and distributed processing and applications, (185-196)
  2129. ACM
    Katz S and Tal A (2003). Hierarchical mesh decomposition using fuzzy clustering and cuts, ACM Transactions on Graphics, 22:3, (954-961), Online publication date: 1-Jul-2003.
  2130. Cheng X, Narahari B, Simha R, Cheng M and Liu D (2003). Strong Minimum Energy Topology in Wireless Sensor Networks, IEEE Transactions on Mobile Computing, 2:3, (248-256), Online publication date: 1-Jul-2003.
  2131. ACM
    Elmqvist N and Tsigas P Growing squares Proceedings of the 2003 ACM symposium on Software visualization, (17-ff)
  2132. ACM
    He B and Chang K Statistical schema matching across web query interfaces Proceedings of the 2003 ACM SIGMOD international conference on Management of data, (217-228)
  2133. ACM
    Klauck H Quantum time-space tradeoffs for sorting Proceedings of the thirty-fifth annual ACM symposium on Theory of computing, (69-76)
  2134. Abrial J, Cansell D and Méry D Formal derivation of spanning trees algorithms Proceedings of the 3rd international conference on Formal specification and development in Z and B, (457-476)
  2135. Subramani K and Kovalchick L Contraction versus relaxation Proceedings of the 2003 international conference on Computational science: PartIII, (377-387)
  2136. Bang Y, Choo H and Mun Y Reliability problem on all pairs quickest paths Proceedings of the 2003 international conference on Computational science, (518-523)
  2137. ACM
    Sehgal A, Iyengar V, Krasniewski M and Chakrabarty K Test cost reduction for SOCs using virtual TAMs and lagrange multipliers Proceedings of the 40th annual Design Automation Conference, (738-743)
  2138. ACM
    Widjaja A (2003). Review of Algorithms sequential & parallel, ACM SIGACT News, 34:2, (3-5), Online publication date: 1-Jun-2003.
  2139. ACM
    Chaudhuri R (2003). Do the arithmetic operations really execute in constant time?, ACM SIGCSE Bulletin, 35:2, (43-44), Online publication date: 1-Jun-2003.
  2140. ACM
    Sadagopan N, Bai F, Krishnamachari B and Helmy A PATHS Proceedings of the 4th ACM international symposium on Mobile ad hoc networking & computing, (245-256)
  2141. ACM
    Gupta H, Das S and Gu Q Connected sensor cover Proceedings of the 4th ACM international symposium on Mobile ad hoc networking & computing, (189-200)
  2142. ACM
    Peraki C and Servetto S On the maximum stable throughput problem in random networks with directional antennas Proceedings of the 4th ACM international symposium on Mobile ad hoc networking & computing, (76-87)
  2143. Bonizzoni P, Vedova G and Dondi R Reconciling gene trees to a species tree Proceedings of the 5th Italian conference on Algorithms and complexity, (120-131)
  2144. Gu Z, Kodase S, Wang S and Shin K A Model-Based Approach to System-Level Dependency and Real-Time Analysis of Embedded Software Proceedings of the The 9th IEEE Real-Time and Embedded Technology and Applications Symposium
  2145. Ozev S and Orailoglu A (2003). Automated System-Level Test Development for Mixed-Signal Circuits, Analog Integrated Circuits and Signal Processing, 35:2-3, (169-178), Online publication date: 1-May-2003.
  2146. ACM
    Feng Y, Mehta D and Yang H Constrained "Modern" Floorplanning Proceedings of the 2003 international symposium on Physical design, (128-135)
  2147. Du H, Sanchez-Elez M, Tabrizi N, Bagherzadeh N, Anido M and Fernandez M Interactive Ray Tracing on Reconfigurable SIMD MorphoSys Proceedings of the conference on Design, Automation and Test in Europe: Designers' Forum - Volume 2
  2148. ACM
    Lee S, Xiang H, Wong D and Sun R Wire type assignment for FPGA routing Proceedings of the 2003 ACM/SIGDA eleventh international symposium on Field programmable gate arrays, (61-67)
  2149. Kim E, Yum K, Das C, Yousif M and Duato J Performance Enhancement Techniques for InfiniBand" Architecture Proceedings of the 9th International Symposium on High-Performance Computer Architecture
  2150. ACM
    Du H, Sanchez-Elez M, Tabrizi N, Bagherzadeh N, Anido M and Fernandez M Interactive ray tracing on reconfigurable SIMD MorphoSys Proceedings of the 2003 Asia and South Pacific Design Automation Conference, (471-476)
  2151. ACM
    Chen Y and Chen F Algorithms for compacting error traces Proceedings of the 2003 Asia and South Pacific Design Automation Conference, (99-103)
  2152. Roditty L A faster and simpler fully dynamic transitive closure Proceedings of the fourteenth annual ACM-SIAM symposium on Discrete algorithms, (404-412)
  2153. Fernau H (2003). Identification of function distinguishable languages, Theoretical Computer Science, 290:3, (1679-1711), Online publication date: 3-Jan-2003.
  2154. Min R and Chandrakasan A Energy-efficient communication for high density networks Ambient intelligence, (295-314)
  2155. Soisalon-Soininen E and Widmayer P Single and bulk updates in stratified trees Computer Science in Perspective, (278-292)
  2156. ACM
    Rosenfeld B, Feldman R and Aumann Y Structural extraction from visual layout of documents Proceedings of the eleventh international conference on Information and knowledge management, (203-210)
  2157. Sheffer A and Hart J Seamster Proceedings of the conference on Visualization '02, (291-298)
  2158. Prabhakar S, Xia Y, Kalashnikov D, Aref W and Hambrusch S (2002). Query Indexing and Velocity Constrained Indexing, IEEE Transactions on Computers, 51:10, (1124-1140), Online publication date: 1-Oct-2002.
  2159. ACM
    Čagalj M, Hubaux J and Enz C Minimum-energy broadcast in all-wireless networks Proceedings of the 8th annual international conference on Mobile computing and networking, (172-182)
  2160. Ma V and McCool M Low latency photon mapping using block hashing Proceedings of the ACM SIGGRAPH/EUROGRAPHICS conference on Graphics hardware, (89-99)
  2161. Shimohata M and Sumita E Identifying synonymous expressions from a bilingual corpus for example-based machine translation Proceedings of the 2002 COLING workshop on Machine translation in Asia - Volume 16, (1-6)
  2162. ACM
    Dugan R, Glinert E and Shokoufandeh A The Sisyphus database retrieval software performance antipattern Proceedings of the 3rd international workshop on Software and performance, (10-16)
  2163. ACM
    Ezzat T, Geiger G and Poggio T Trainable videorealistic speech animation Proceedings of the 29th annual conference on Computer graphics and interactive techniques, (388-398)
  2164. ACM
    Lloyd E, Liu R, Marathe M, Ramanathan R and Ravi S Algorithmic aspects of topology control problems for ad hoc networks Proceedings of the 3rd ACM international symposium on Mobile ad hoc networking & computing, (123-134)
  2165. ACM
    Asano T, Kirkpatrick D and Yap C Pseudo approximation algorithms, with applications to optimal motion planning Proceedings of the eighteenth annual symposium on Computational geometry, (170-178)
  2166. ACM
    Chang K and Hwang S Minimal probing Proceedings of the 2002 ACM SIGMOD international conference on Management of data, (346-357)
  2167. ACM
    Grattan B, Stitt G and Vahid F Codesign-extended applications Proceedings of the tenth international symposium on Hardware/software codesign, (1-6)
  2168. ACM
    Kahng A, Mantik S and Markov I Min-max placement for large-scale timing optimization Proceedings of the 2002 international symposium on Physical design, (143-148)
  2169. Maurer W (2002). The algorithms course, Journal of Computing Sciences in Colleges, 17:4, (96-111), Online publication date: 1-Mar-2002.
  2170. ACM
    Bucci P, Heym W, Long T and Weide B (2002). Algorithms and object-oriented programming, ACM SIGCSE Bulletin, 34:1, (302-306), Online publication date: 1-Mar-2002.
  2171. Aggarwal C, Wolf J and Yu P (2002). Adaptive Piggybacking Schemes for Video-On-Demand Systems, Multimedia Tools and Applications, 16:3, (231-250), Online publication date: 1-Mar-2002.
  2172. ACM
    Bucci P, Heym W, Long T and Weide B Algorithms and object-oriented programming Proceedings of the 33rd SIGCSE technical symposium on Computer science education, (302-306)
  2173. Gau R, Haas Z and Krishnamachari B (2002). On multicast flow control for heterogeneous receivers, IEEE/ACM Transactions on Networking, 10:1, (86-101), Online publication date: 1-Feb-2002.
  2174. Shelar R and Sapatnekar S An Efficient Algorithm for Low Power Pass Transistor Logic Synthesis Proceedings of the 2002 Asia and South Pacific Design Automation Conference
  2175. Young E, Ho M and Chu C A Unified Method to Handle Different Kinds of Placement Constraints in Floorplan Design Proceedings of the 2002 Asia and South Pacific Design Automation Conference
  2176. Shelar R and Sapatnekar S Recursive bipartitioning of BDDs for performance driven synthesis of pass transistor logic circuits Proceedings of the 2001 IEEE/ACM international conference on Computer-aided design, (449-452)
  2177. Lim J and Hurson A (2001). Transaction Processing in a Mobile, Multi-Database Environment, Multimedia Tools and Applications, 15:2, (161-185), Online publication date: 1-Nov-2001.
  2178. Jiang Y, Sapatnekar S and Bamji C (2001). Technology mapping for high-performance static CMOS and pass transistor logic designs, IEEE Transactions on Very Large Scale Integration (VLSI) Systems, 9:5, (577-589), Online publication date: 1-Oct-2001.
  2179. Prabhakaran B (2000). Adaptive Multimedia Presentation Strategies, Multimedia Tools and Applications, 12:2-3, (281-298), Online publication date: 1-Nov-2000.
  2180. ACM
    Zhao M, Panda R, Sapatnekar S, Edwards T, Chaudhry R and Blaauw D Hierarchical analysis of power distribution networks Proceedings of the 37th Annual Design Automation Conference, (150-155)
  2181. ACM
    Youngblood G (1999). Web hunting, XRDS: Crossroads, The ACM Magazine for Students, 5:4, (26-32), Online publication date: 1-Jun-1999.
  2182. Choi H, Kim J, Yoon C, Park I, Hwang S and Kyung C (1999). Synthesis of Application Specific Instructions for Embedded DSP Software, IEEE Transactions on Computers, 48:6, (603-614), Online publication date: 1-Jun-1999.
  2183. Oflazer K and Tür G Implementing voting constraints with finite state transducers Proceedings of the International Workshop on Finite State Methods in Natural Language Processing, (91-100)
  2184. Maheshwari N and Sapatnekar S (1998). Efficient retiming of large circuits, IEEE Transactions on Very Large Scale Integration (VLSI) Systems, 6:1, (74-83), Online publication date: 1-Mar-1998.
  2185. ACM
    Weihe K (1997). Reuse of algorithms, ACM SIGPLAN Notices, 32:10, (34-48), Online publication date: 9-Oct-1997.
  2186. ACM
    Weihe K Reuse of algorithms Proceedings of the 12th ACM SIGPLAN conference on Object-oriented programming, systems, languages, and applications, (34-48)
  2187. Marcoux Y and Sévigny M Querying hierarchical text and acyclic hypertext with generalized context-free grammars Computer-Assisted Information Searching on Internet, (546-561)
  2188. Bellare M and Micciancio D A new paradigm for collision-free hashing Proceedings of the 16th annual international conference on Theory and application of cryptographic techniques, (163-192)
  2189. Liu L and Sechen C Multi-layer chip-level global routing using an efficient graph-based Steiner tree heuristic Proceedings of the 1997 European conference on Design and Test
  2190. Heinkel U and Glauert W An Approach for a Dynamic Generation/Validation System for the Functional Simulation Considering Timing Constraints Proceedings of the 1996 European conference on Design and Test
  2191. Wilson D, Sullivan G and Masson G (1995). Certification of Computational Results, IEEE Transactions on Computers, 44:7, (833-847), Online publication date: 1-Jul-1995.
  2192. Chien M and Yavuz Oruc A (1994). Adaptive Binary Sorting Schemes and Associated Interconnection Networks, IEEE Transactions on Parallel and Distributed Systems, 5:6, (561-572), Online publication date: 1-Jun-1994.
  2193. Imielinska C and Kalantari B (1993). A generalized hypergreedy algorithm for weighted perfect matching, BIT, 33:2, (177-189), Online publication date: 1-Jun-1993.
  2194. ACM
    Herodotou H and Kakoulli E Cost-based Data Prefetching and Scheduling in Big Data Platforms over Tiered Storage Systems, ACM Transactions on Database Systems, 0:0
  2195. Olivier A, Bielsa G, Tejado I, Zorzi M, Widmer J and Casari P Lightweight Indoor Localization for 60-GHz Millimeter Wave Systems 2016 13th Annual IEEE International Conference on Sensing, Communication, and Networking (SECON), (1-9)
  2196. Sarubbi J, Vieira D, Wanner E and Silva C A GRASP-based heuristic for allocating the roadside infrastructure maximizing the number of distinct vehicles experiencing contact opportunities NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium, (1187-1192)
  2197. Tabib W, Corah M, Michael N and Whittaker R Computationally efficient information-theoretic exploration of pits and caves 2016 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS), (3722-3727)
  2198. Wang C, Li J, Yang Y and Ye F A hybrid framework combining solar energy harvesting and wireless charging for wireless sensor networks IEEE INFOCOM 2016 - The 35th Annual IEEE International Conference on Computer Communications, (1-9)
  2199. Hu X and Liao J Co-evolutionary path optimization by ripple-spreading algorithm 2016 IEEE Congress on Evolutionary Computation (CEC), (4535-4542)
Contributors
  • Dartmouth College
  • Columbia University
  • MIT Computer Science & Artificial Intelligence Laboratory
  • Massachusetts Institute of Technology

Recommendations