Search
Add filters:
Use filters to refine the search results.
Item hits:
Publication Date | Article Title | Author(s) |
---|---|---|
Jan-2015 | Relax, no need to round: Integrality of clustering formulations | Awasthi, Pranjal; Bandeira, Afonso S; Charikar, Moses; Krishnaswamy, Ravishankar; Villar, Soledad, et al |
2014 | Routes for breaching and protecting genetic privacy | Erlich, Yaniv; Narayanan, Arvind |
10-Sep-2013 | Revisiting a summer vacation: digital restoration and typesetter forensics | Bagley, Steven R; Brailsford, David F; Kernighan, Brian W |
2020 | Deep-inverse correlography: towards real-time high-resolution non-line-of-sight imaging | Metzler, CA; Heide, F; Rangarajan, P; Balaji, MM; Viswanath, A, et al |
Mar-2012 | Automatic speculative DOALL for clusters | Kim, Hanjun; Johnson, Nick P; Lee, Jae W; Mahlke, Scott A; August, David I |
2016 | Modular Verification for Computer Security | Appel, Andrew W |
2016 | Materials perspective on Casimir and van der Waals interactions | Woods, LM; Dalvit, DAR; Tkatchenko, A; Rodriguez-Lopez, P; Rodriguez, Alejandro W, et al |
17-Oct-2020 | Rats optimally accumulate and discount evidence in a dynamic environment | Piet, Alex; Hady, Ahmed El; Brody, Carlos D |
18-May-2015 | Secure Degrees of Freedom of Wireless X Networks Using Artificial Noise Alignment | Wang, Zhao; Xiao, Ming; Skoglund, Mikael; Poor, H Vincent |
2020 | Fundamental limits to attractive and repulsive Casimir-Polder forces | Venkataram, PS; Molesky, S; Chao, P; Rodriguez, Alejandro W |