Filter
Chapter

Search results

  • 2022

    Ten simple rules for responsible big data research

    Zook, M., Barocas, S., Boyd, D., Crawford, K., Keller, E., Gangadharan, S. P., Goodman, A., Hollander, R., Koenig, B. A., Metcalf, J., Narayanan, A., Nelson, A. & Pasquale, F., May 27 2022, Machine Learning and the City: Applications in Architecture and Urban Design. Wiley-Blackwell, p. 523-534 12 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  • 2018

    Model checking concurrent programs

    Gupta, A., Kahlon, V., Qadeer, S. & Touili, T., May 18 2018, Handbook of Model Checking. Springer International Publishing, p. 573-611 39 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

    4 Scopus citations
  • Optimizing N-dimensional, winograd-based convolution for manycore CPUs

    Jia, Z., Zlateski, A., Durand, F. & Li, K., Feb 10 2018, ACM SIGPLAN Notices. 1 ed. Association for Computing Machinery, Vol. 53. p. 109-123 15 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

    10 Scopus citations
  • 2017

    Computer graphics

    Dobkin, D. P. & Teller, S. J., Jan 1 2017, Handbook of Discrete and Computational Geometry, Third Edition. CRC Press, p. 1377-1399 23 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  • The Princeton Web Transparency and Accountability Project

    Narayanan, A. & Reisman, D., 2017, Studies in Big Data. Springer Science and Business Media Deutschland GmbH, p. 45-67 23 p. (Studies in Big Data; vol. 32).

    Research output: Chapter in Book/Report/Conference proceedingChapter

    12 Scopus citations
  • 2014

    Comparative gene expression between two yeast species

    Guan, Y., Dunham, M. J., Troyanskaya, O. G. & Caudy, A. A., Jan 1 2014, Investigations in Yeast Functional Genomics and Molecular Biology. Apple Academic Press, p. 311-338 28 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  • Power-efficient computer architectures: Recent advances

    Själander, M., Martonosi, M. R. & Kaxiras, S., Dec 1 2014, Power-Efficient Computer Architectures: Recent Advances. Martonosi, M. & Hill, M. D. (eds.). Morgan and Claypool Publishers, p. 1-96 96 p. (Synthesis Lectures on Computer Architecture; vol. 30).

    Research output: Chapter in Book/Report/Conference proceedingChapter

    14 Scopus citations
  • 2013

    Explaining adaboost

    Schapire, R. E., Jan 1 2013, Empirical Inference: Festschrift in Honor of Vladimir N. Vapnik. Springer Berlin Heidelberg, p. 37-52 16 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

    698 Scopus citations
  • 2012

    Robust and Scientifically Reliable Rock Art Documentation from Digital Photographs

    Mudge, M., Schroer, C., Noble, T., Matthews, N., Rusinkiewicz, S. & Toler-Franklin, C., Jul 23 2012, A Companion to Rock Art. John Wiley and Sons, p. 644-659 16 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

    32 Scopus citations
  • 2010

    Structural simulation for architecture exploration

    August, D. I., Desmet, V., Girbal, S., Pérez, D. G. & Temam, O., Dec 1 2010, Processor and System-on-Chip Simulation. Springer US, p. 85-104 20 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  • 2009

    A Large Margin Algorithm for Forced Alignment

    Keshet, J., Shalev-Shwartz, S., Singer, Y. & Chazan, D., Jan 14 2009, Automatic Speech and Speaker Recognition: Large Margin and Kernel Methods. John Wiley & Sons, Ltd, p. 51-68 18 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  • Birdsong Learning

    Fiete, I. R. & Seung, H. S., Jan 1 2009, Encyclopedia of Neuroscience. Elsevier Ltd, p. 227-239 13 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

    2 Scopus citations
  • Computational analysis of the yeast proteome: Understanding and exploiting functional specificity in genomic data

    Huttenhower, C., Myers, C. L., Hibbs, M. A. & Troyanskaya, O. G., 2009, Yeast Functional Genomics and Proteomics: Methods and Protocols. Stagljar, I. (ed.). p. 273-293 21 p. (Methods in Molecular Biology; vol. 548).

    Research output: Chapter in Book/Report/Conference proceedingChapter

    1 Scopus citations
  • 2008

    Boolean Satisfiability. Creating Solvers Optimized for Specific Problem Instances.

    Zhong, P., Martonosi, M. R. & Malik, S., 2008, Reconfigurable Computing. Elsevier Inc., p. 613-636 24 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

    1 Scopus citations
  • Computer architecture techniques for power-efficiency

    Kaxiras, S. & Martonosi, M. R., Jan 1 2008, Synthesis Lectures on Computer Architecture. p. 1-218 218 p. (Synthesis Lectures on Computer Architecture; vol. 4).

    Research output: Chapter in Book/Report/Conference proceedingChapter

    50 Scopus citations
  • Detecting Botnet membership with DNSBL counterintelligence

    Ramachandran, A., Feamster, N. & Dagon, D., 2008, Botnet Detection: Countering the Largest Security Threat. Springer New York LLC, p. 131-142 12 p. (Advances in Information Security; vol. 36).

    Research output: Chapter in Book/Report/Conference proceedingChapter

    8 Scopus citations
  • Protein Function Prediction via Analysis of Interactomes

    Nabieva, E. & Singh, M., Dec 18 2008, Prediction of Protein Structures, Functions, and Interactions. John Wiley & Sons, Ltd, p. 231-258 28 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

    Open Access
    2 Scopus citations
  • 2005

    Predicting protein secondary and supersecondary structure

    Singh, M., Dec 21 2005, Handbook of Computational Molecular Biology. CRC Press, p. 29.1-29.29

    Research output: Chapter in Book/Report/Conference proceedingChapter

    4 Scopus citations
  • Unsupervised Machine Learning to Support Functional Characterization of Genes: Emphasis on Cluster Description and Class Discovery

    Troyanskaya, O. G., Jun 15 2005, Data Analysis and Visualization in Genomics and Proteomics. John Wiley & Sons, Ltd, p. 175-192 18 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

    1 Scopus citations
  • Verification languages

    Gupta, A., Bayazit, A. A. & Mahajan, Y., Jan 1 2005, Embedded Systems: Handbook. CRC Press, p. 10-1-10-20

    Research output: Chapter in Book/Report/Conference proceedingChapter

  • 2004

    A comparison of text and shape matching for retrieval of online 3D models

    Min, P., Kazhdan, M. & Funkhouser, T., 2004, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Heery, R. & Lyon, L. (eds.). Springer Verlag, p. 209-220 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3232).

    Research output: Chapter in Book/Report/Conference proceedingChapter

    54 Scopus citations
  • A concurrent logical framework: The propositional fragment

    Watkins, K., Cervesato, I., Pfenning, F. & Walker, D., Jan 1 2004, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Berardi, S., Coppo, M. & Damiani, F. (eds.). Springer Verlag, p. 355-377 23 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3085).

    Research output: Chapter in Book/Report/Conference proceedingChapter

    54 Scopus citations
  • Efficient modeling of embedded memories in bounded model checking

    Ganai, M. K., Gupta, A. & Ashar, P., 2004, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Alur, R. & Peled, D. A. (eds.). Springer Verlag, p. 440-452 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3114).

    Research output: Chapter in Book/Report/Conference proceedingChapter

    Open Access
    6 Scopus citations
  • Estimating the distance to a monotone function

    Ailon, N., Chazelle, B., Comandur, S. & Liu, D., 2004, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Jansen, K., Khanna, S., Rolim, J. D. P. & Ron, D. (eds.). Springer Verlag, p. 229-236 8 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3122).

    Research output: Chapter in Book/Report/Conference proceedingChapter

    8 Scopus citations
  • Finding dominators in practice

    Georgiadis, L., Werneck, R. F., Tarjan, R. E., Triantafyllis, S. & August, D. I., 2004, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Albers, S. & Radzik, T. (eds.). Springer Verlag, p. 677-688 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3221).

    Research output: Chapter in Book/Report/Conference proceedingChapter

    14 Scopus citations
  • Melding priority queues

    Mendelson, R., Tarjan, R. E., Thorup, M. & Zwick, U., 2004, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Hagerup, T. & Katajainen, J. (eds.). Springer Verlag, p. 223-235 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3111).

    Research output: Chapter in Book/Report/Conference proceedingChapter

    6 Scopus citations
  • Modal proofs as distributed programs

    Jia, I. & Walker, D., 2004, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Schmidt, D. (ed.). Springer Verlag, p. 219-233 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2986).

    Research output: Chapter in Book/Report/Conference proceedingChapter

    Open Access
    29 Scopus citations
  • 2003

    Abstraction and BDDs complement SAT-based BMC in DiVer

    Gupta, A., Ganai, M., Wang, C., Yang, Z. & Ashar, P., 2003, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Hunt, W. A. & Somenzi, F. (eds.). Springer Verlag, p. 206-209 4 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2725).

    Research output: Chapter in Book/Report/Conference proceedingChapter

    19 Scopus citations
  • Attacking an obfuscated cipher by injecting faults

    Jacob, M., Boneh, D. & Felten, E., 2003, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Feigenbaum, J. (ed.). Springer Verlag, p. 16-31 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2696).

    Research output: Chapter in Book/Report/Conference proceedingChapter

    51 Scopus citations
  • Efficient distributed SAT and SAT-based distributed bounded model checking

    Ganai, M. K., Gupta, A., Yang, Z. & Ashar, P., 2003, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Geist, D. & Tronci, E. (eds.). Springer Verlag, p. 334-347 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2860).

    Research output: Chapter in Book/Report/Conference proceedingChapter

    Open Access
    9 Scopus citations
  • Proving integrality gaps without knowing the linear program

    Arora, S., 2003, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Lingas, A. & Nilsson, B. J. (eds.). Springer Verlag, p. 1 1 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2751).

    Research output: Chapter in Book/Report/Conference proceedingChapter

    1 Scopus citations
  • Thwarting web censorship with untrusted messenger discovery

    Feamster, N., Balazinska, M., Wang, W., Balakrishnan, H. & Karger, D., 2003, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Dingledine, R. (ed.). Springer Verlag, p. 125-140 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2760).

    Research output: Chapter in Book/Report/Conference proceedingChapter

    18 Scopus citations
  • Types and effects for non-interfering program monitors

    Bauer, L., Ligatti, J. & Walker, D., 2003, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Okada, M., Pierce, B. C., Scedrov, A., Tokuda, H. & Yonezawa, A. (eds.). Springer Verlag, p. 154-171 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2609).

    Research output: Chapter in Book/Report/Conference proceedingChapter

    6 Scopus citations
  • 2000

    Efficient commerce protocols based on one-time pads

    Schneider, M. A. & Felten, E. W., 2000, Proceedings - Annual Computer Security Applications Conference, ACSAC. p. 317-326 10 p. 898886

    Research output: Chapter in Book/Report/Conference proceedingChapter

    2 Scopus citations
  • 1985

    Optimal Convex Decompositions

    Chazelle, B. & Dobkin, D. P., Jan 1 1985, Machine Intelligence and Pattern Recognition. C ed. p. 63-133 71 p. (Machine Intelligence and Pattern Recognition; vol. 2, no. C).

    Research output: Chapter in Book/Report/Conference proceedingChapter

    88 Scopus citations
  • 1983

    APPLIED CRYPTOLOGY, CRYPTOGRAPHIC PROTOCOLS, AND COMPUTER SECURITY MODELS.

    DeMillo, R., Davida, G. I., Dobkin, D. P., Harrison, M. A. & Lipton, R. J., 1983, Proceedings of Symposia in Applied Mathematics. American Mathematical Soc, Vol. 29.

    Research output: Chapter in Book/Report/Conference proceedingChapter

    8 Scopus citations