default search action
CoRR, August 1999
- Zvika Marx, Ido Dagan, Eli Shamir:
Detecting Sub-Topic Correspondence through Bipartite Term Clustering. - Burkhard D. Burow:
After Compilers and Operating Systems : The Third Advance in Application Support. - Marshall W. Bern, Erik D. Demaine, David Eppstein, Eric Kuo, Andrea Mantler, Jack Snoeyink:
Ununfoldable Polyhedra with Convex Faces. - Patrik Simons:
Extending the Stable Model Semantics with More Expressive Rules. - Roxana Cocan, Joseph O'Rourke:
Polygonal Chains Cannot Lock in 4D. - Joseph O'Rourke:
Computational Geometry Column 36. - Erik D. Demaine, Joseph O'Rourke:
Computational Geometry Column 37. - Dahlia Malkhi, Michael Merritt, Ohad Rodeh:
Secure Multicast in a WAN. - Dahlia Malkhi, Michael K. Reiter:
Secure Execution of Java Applets using a Remote Playground. - Dahlia Malkhi, Yishay Mansour, Michael K. Reiter:
On Propagating Updates in a Byzantine Environment. - Dahlia Malkhi, Michael K. Reiter, Avishai Wool:
The Load and Availability of Byzantine Quorum Systems. - Henry M. Gladney:
Safe Deals Between Strangers. - David H. Wolpert, Kevin R. Wheeler, Kagan Tumer:
Collective Intelligence for Control of Distributed Dynamical Systems. - David H. Wolpert, Kagan Tumer:
An Introduction to Collective Intelligence. - Simon Buckingham Shum, Enrico Motta, John Domingue:
Representing Scholarly Claims in Internet Digital Libraries: A Knowledge Modelling Approach. - Marshall W. Bern, David Eppstein:
Quadrilateral Meshing by Circle Packing. - Andreas Siebert:
A Differential Invariant for Zooming. - Michel Rigo:
Construction of regular languages and recognizability of polynomials.
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.