Computer Science
Items (Sorted by Submit Date in Descending order): 121 to 140 of 142
| Issue Date | Title | Author(s) |
| 2013 | Applications of Latent Variable Models for Modeling Influence and Decision Making | Gerrish, Sean Michael |
| 2012 | Beyond Worst Case Analysis in Approximation Algorithms | Vijayaraghavan, Aravindan |
| 2012 | Understanding Resource Usage and Performance in Wide-Area Distributed Systems | Kim, Wonho |
| 2012 | Finding Dense Structures in Graphs and Matrices | Bhaskara, Aditya |
| 2012 | Bridging the Memory-Storage Gap | Badam, Anirudh |
| 2012 | Approximability and Mathematical Relaxations | Manokaran, Rajsekar |
| 2012 | Designing Software to Shape Open Government Policy | Yu, Harlan |
| 2012 | Hierarchical Bayesian Modeling: Efficient Inference and Applications | Wang, Chong |
| 2012 | Content Conditioning and Distribution for Dynamic Virtual Worlds | Terrace, Jeff |
| 2012 | Operational Refinement for Compiler Correctness | Dockins, Robert William |
| 2012 | Runtime Speculative Software-Only Fault Tolerance | Zhang, Yun |
| 2012 | Control of Sensitive Data in Systems with Novel Functionality | Calandrino, Joseph Anthony |
| 2012 | Privacy and Integrity in the Untrusted Cloud | Feldman, Ariel Joseph |
| 2012 | Large Scale Visual Recognition | Deng, Jia |
| 2012 | Breaking Assumptions: Distinguishing Between Seemingly Identical Items Using Cheap Sensors | Clarkson, William Banks |
| 2012 | Wide-Area Traffic Management for Cloud Services | Jiang, Wenjie |
| 2012 | Similarity Search with Multimodal Data | Wang, Zhe |
| 2012 | Network-based analysis of protein function | Song, Jimin |
| 2011 | A Study of Privacy and Fairness in Sensitive Data Analysis | Hardt, Moritz |
| 2011 | Game theory and optimization in boosting | Mukherjee, Indraneel |
Items (Sorted by Submit Date in Descending order): 121 to 140 of 142