Search
Add filters:
Use filters to refine the search results.
Item hits:
Publication Date | Article Title | Author(s) |
---|---|---|
2016 | Modular Verification for Computer Security | Appel, Andrew W |
2019 | Loop Summarization with Rational Vector Addition Systems | Silverman, Jake; Kincaid, Zachary |
9-May-2012 | Separating multilinear branching programs and formulas | Dvir, Zeev; Malod, G; Perifel, S; Yehudayoff, A |
2019 | Reconstructing Neuronal Anatomy from Whole-Brain Images | Gornet, James; Venkataraju, Kannan U; Narasimhan, Arun; Turner, Nicholas; Lee, Kisuk, et al |
2013 | Matching-vector families and LDCs over large modulo | Dvir, Zeev; Hu, G |
2020 | Synaptic Partner Assignment Using Attentional Voxel Association Networks | Turner, Nicholas L; Lee, Kisuk; Lu, Ran; Wu, Jingpeng; Ih, Dodam, et al |
Apr-2004 | A/58/755 - S/2004/227 (The Situation in Afghanistan and Its Implications for International Peace and Security) | United Nations General Assembly/Security Council; Liechtenstein Institute on Self-Determination; Permanent Mission of Liechtenstein to the United Nations |
2014 | Open Problem: Tensor Decompositions: Algorithms up to the Uniqueness Threshold? | Bhaskara, Aditya; Charikar, Moses; Moitra, Ankur; Vijayaraghavan, Aravindan |
2015 | Predicting genome-wide DNA methylation using methylation marks, genomic position, and DNA regulatory elements | Zhang, Weiwei; Spector, Tim D; Deloukas, Panos; Bell, Jordana T; Engelhardt, Barbara E |
18-Dec-2018 | Social decision-making driven by artistic explore-exploit tension | Trueman, Daniel |