Filter
Chapter

Search results

  • 2018

    Model checking concurrent programs

    Gupta, A., Kahlon, V., Qadeer, S. & Touili, T., May 18 2018, Handbook of Model Checking. Springer International Publishing, p. 573-611 39 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

    3 Scopus citations
  • Optimizing N-dimensional, winograd-based convolution for manycore CPUs

    Jia, Z., Zlateski, A., Durand, F. & Li, K., Feb 10 2018, ACM SIGPLAN Notices. 1 ed. Association for Computing Machinery, Vol. 53. p. 109-123 15 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

    9 Scopus citations
  • 2017

    Computer graphics

    Dobkin, D. P. & Teller, S. J., Jan 1 2017, Handbook of Discrete and Computational Geometry, Third Edition. CRC Press, p. 1377-1399 23 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  • The Princeton Web Transparency and Accountability Project

    Narayanan, A. & Reisman, D., 2017, Studies in Big Data. Springer Science and Business Media Deutschland GmbH, p. 45-67 23 p. (Studies in Big Data; vol. 32).

    Research output: Chapter in Book/Report/Conference proceedingChapter

    11 Scopus citations
  • 2014

    Comparative gene expression between two yeast species

    Guan, Y., Dunham, M. J., Troyanskaya, O. G. & Caudy, A. A., Jan 1 2014, Investigations in Yeast Functional Genomics and Molecular Biology. Apple Academic Press, p. 311-338 28 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  • Power-efficient computer architectures: Recent advances

    Själander, M., Martonosi, M. R. & Kaxiras, S., Dec 1 2014, Power-Efficient Computer Architectures: Recent Advances. Martonosi, M. & Hill, M. D. (eds.). Morgan and Claypool Publishers, p. 1-96 96 p. (Synthesis Lectures on Computer Architecture; vol. 30).

    Research output: Chapter in Book/Report/Conference proceedingChapter

    14 Scopus citations
  • 2013

    Explaining adaboost

    Schapire, R. E., Jan 1 2013, Empirical Inference: Festschrift in Honor of Vladimir N. Vapnik. Springer Berlin Heidelberg, p. 37-52 16 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

    514 Scopus citations
  • 2012

    Robust and Scientifically Reliable Rock Art Documentation from Digital Photographs

    Mudge, M., Schroer, C., Noble, T., Matthews, N., Rusinkiewicz, S. & Toler-Franklin, C., Jul 23 2012, A Companion to Rock Art. John Wiley and Sons, p. 644-659 16 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

    30 Scopus citations
  • 2010

    Structural simulation for architecture exploration

    August, D. I., Desmet, V., Girbal, S., Pérez, D. G. & Temam, O., Dec 1 2010, Processor and System-on-Chip Simulation. Springer US, p. 85-104 20 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  • 2009

    A Large Margin Algorithm for Forced Alignment

    Keshet, J., Shalev-Shwartz, S., Singer, Y. & Chazan, D., Jan 14 2009, Automatic Speech and Speaker Recognition: Large Margin and Kernel Methods. John Wiley & Sons, Ltd, p. 51-68 18 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  • Birdsong Learning

    Fiete, I. R. & Seung, H. S., Jan 1 2009, Encyclopedia of Neuroscience. Elsevier Ltd, p. 227-239 13 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

    2 Scopus citations
  • Computational analysis of the yeast proteome: Understanding and exploiting functional specificity in genomic data

    Huttenhower, C., Myers, C. L., Hibbs, M. A. & Troyanskaya, O. G., Dec 1 2009, Yeast Functional Genomics and Proteomics: Methods and Protocols. Stagljar, I. (ed.). p. 273-293 21 p. (Methods in Molecular Biology; vol. 548).

    Research output: Chapter in Book/Report/Conference proceedingChapter

    1 Scopus citations
  • 2008

    Boolean Satisfiability. Creating Solvers Optimized for Specific Problem Instances.

    Zhong, P., Martonosi, M. R. & Malik, S., 2008, Reconfigurable Computing. Elsevier Inc., p. 613-636 24 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

    1 Scopus citations
  • Computer architecture techniques for power-efficiency

    Kaxiras, S. & Martonosi, M. R., Jan 1 2008, Synthesis Lectures on Computer Architecture. p. 1-218 218 p. (Synthesis Lectures on Computer Architecture; vol. 4).

    Research output: Chapter in Book/Report/Conference proceedingChapter

    43 Scopus citations
  • Detecting Botnet membership with DNSBL counterintelligence

    Ramachandran, A., Feamster, N. & Dagon, D., 2008, Botnet Detection: Countering the Largest Security Threat. Springer New York LLC, p. 131-142 12 p. (Advances in Information Security; vol. 36).

    Research output: Chapter in Book/Report/Conference proceedingChapter

    8 Scopus citations
  • Protein Function Prediction via Analysis of Interactomes

    Nabieva, E. & Singh, M., Dec 18 2008, Prediction of Protein Structures, Functions, and Interactions. John Wiley & Sons, Ltd, p. 231-258 28 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

    2 Scopus citations
  • 2005

    Predicting protein secondary and supersecondary structure

    Singh, M., Dec 21 2005, Handbook of Computational Molecular Biology. CRC Press, p. 29.1-29.29

    Research output: Chapter in Book/Report/Conference proceedingChapter

    4 Scopus citations
  • Unsupervised Machine Learning to Support Functional Characterization of Genes: Emphasis on Cluster Description and Class Discovery

    Troyanskaya, O. G., Jun 15 2005, Data Analysis and Visualization in Genomics and Proteomics. John Wiley & Sons, Ltd, p. 175-192 18 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

    1 Scopus citations
  • Verification languages

    Gupta, A., Bayazit, A. A. & Mahajan, Y., Jan 1 2005, Embedded Systems: Handbook. CRC Press, p. 10-1-10-20

    Research output: Chapter in Book/Report/Conference proceedingChapter

  • 2004

    A comparison of text and shape matching for retrieval of online 3D models

    Min, P., Kazhdan, M. & Funkhouser, T., 2004, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Heery, R. & Lyon, L. (eds.). Springer Verlag, p. 209-220 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3232).

    Research output: Chapter in Book/Report/Conference proceedingChapter

    5 Scopus citations
  • A concurrent logical framework: The propositional fragment

    Watkins, K., Cervesato, I., Pfenning, F. & Walker, D., Jan 1 2004, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Berardi, S., Coppo, M. & Damiani, F. (eds.). Springer Verlag, p. 355-377 23 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3085).

    Research output: Chapter in Book/Report/Conference proceedingChapter

    51 Scopus citations
  • Efficient modeling of embedded memories in bounded model checking

    Ganai, M. K., Gupta, A. & Ashar, P., 2004, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Alur, R. & Peled, D. A. (eds.). Springer Verlag, p. 440-452 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3114).

    Research output: Chapter in Book/Report/Conference proceedingChapter

    Open Access
  • Estimating the distance to a monotone function

    Ailon, N., Chazelle, B., Comandur, S. & Liu, D., 2004, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Jansen, K., Khanna, S., Rolim, J. D. P. & Ron, D. (eds.). Springer Verlag, p. 229-236 8 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3122).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  • Finding dominators in practice

    Georgiadis, L., Werneck, R. F., Tarjan, R. E., Triantafyllis, S. & August, D. I., 2004, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Albers, S. & Radzik, T. (eds.). Springer Verlag, p. 677-688 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3221).

    Research output: Chapter in Book/Report/Conference proceedingChapter

    4 Scopus citations
  • Melding priority queues

    Mendelson, R., Tarjan, R. E., Thorup, M. & Zwick, U., Jan 1 2004, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Hagerup, T. & Katajainen, J. (eds.). Springer Verlag, p. 223-235 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3111).

    Research output: Chapter in Book/Report/Conference proceedingChapter

    1 Scopus citations
  • Modal proofs as distributed programs

    Jia, I. & Walker, D., 2004, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Schmidt, D. (ed.). Springer Verlag, p. 219-233 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2986).

    Research output: Chapter in Book/Report/Conference proceedingChapter

    Open Access
    29 Scopus citations
  • 2003

    Abstraction and BDDs complement SAT-based BMC in DiVer

    Gupta, A., Ganai, M., Wang, C., Yang, Z. & Ashar, P., 2003, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Hunt, W. A. & Somenzi, F. (eds.). Springer Verlag, p. 206-209 4 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2725).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  • Attacking an obfuscated cipher by injecting faults

    Jacob, M., Boneh, D. & Felten, E., 2003, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Feigenbaum, J. (ed.). Springer Verlag, p. 16-31 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2696).

    Research output: Chapter in Book/Report/Conference proceedingChapter

    15 Scopus citations
  • Efficient distributed SAT and SAT-based distributed bounded model checking

    Ganai, M. K., Gupta, A., Yang, Z. & Ashar, P., 2003, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Geist, D. & Tronci, E. (eds.). Springer Verlag, p. 334-347 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2860).

    Research output: Chapter in Book/Report/Conference proceedingChapter

    Open Access
  • Proving integrality gaps without knowing the linear program

    Arora, S., 2003, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Lingas, A. & Nilsson, B. J. (eds.). Springer Verlag, p. 1 1 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2751).

    Research output: Chapter in Book/Report/Conference proceedingChapter

    1 Scopus citations
  • Thwarting web censorship with untrusted messenger discovery

    Feamster, N., Balazinska, M., Wang, W., Balakrishnan, H. & Karger, D., 2003, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Dingledine, R. (ed.). Springer Verlag, p. 125-140 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2760).

    Research output: Chapter in Book/Report/Conference proceedingChapter

    1 Scopus citations
  • Types and effects for non-interfering program monitors

    Bauer, L., Ligatti, J. & Walker, D., 2003, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Okada, M., Pierce, B. C., Scedrov, A., Tokuda, H. & Yonezawa, A. (eds.). Springer Verlag, p. 154-171 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2609).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  • 2000

    Efficient commerce protocols based on one-time pads

    Schneider, M. A. & Felten, E. W., 2000, Proceedings - Annual Computer Security Applications Conference, ACSAC. p. 317-326 10 p. 898886

    Research output: Chapter in Book/Report/Conference proceedingChapter

    2 Scopus citations
  • 1985

    Optimal Convex Decompositions

    Chazelle, B. & Dobkin, D. P., Jan 1 1985, Machine Intelligence and Pattern Recognition. C ed. p. 63-133 71 p. (Machine Intelligence and Pattern Recognition; vol. 2, no. C).

    Research output: Chapter in Book/Report/Conference proceedingChapter

    15 Scopus citations
  • 1983

    APPLIED CRYPTOLOGY, CRYPTOGRAPHIC PROTOCOLS, AND COMPUTER SECURITY MODELS.

    DeMillo, R., Davida, G. I., Dobkin, D. P., Harrison, M. A. & Lipton, R. J., 1983, Proceedings of Symposia in Applied Mathematics. American Mathematical Soc, Vol. 29.

    Research output: Chapter in Book/Report/Conference proceedingChapter

    1 Scopus citations