101. An Architectural Framework for Object Management Systems Popovich, Steven S. 1991 Reports Computer science
102. An Architecture for Dynamic Reconfiguration in a Distributed Object-Based Programming Language Hailpern, Brent; Kaiser, Gail E. 1991 Reports Computer science
103. An Architecture for Integrating Concurrency Control into Environment Frameworks Heineman, George T.; Kaiser, Gail E. 1994 Reports Computer science
104. An Architecture for Integrating OODBs with WWW Yang, Jack Jingshuang; Kaiser, Gail E. 1996 Reports Computer science
105. An Architecture for Multi-User Software Development Environments Ben-Shaul, Israel Z.; Kaiser, Gail E.; Heineman, George E. 1992 Reports Computer science
106. An Architecture for WWW-based Hypercode Environments Kaiser, Gail E.; Dossick, Stephen E.; Jiang, Wenyu; Yang, Jack Jingshuang 1996 Reports Computer science
107. An Automated Consultant for Interactive Environments Wolz, Ursula; Kaiser, Gail E. 1988 Reports Computer science
108. An Automated Performance Analysis of a Two Phase Locking Protocol Nounou, Nihal; Yemini, Yechiam 1985 Reports Computer science
109. An Autonomic Reliability Improvement System for Cyber-Physical Systems Wu, Leon Li; Kaiser, Gail E. 2012 Reports Computer science
110. An Eight-Processor Chip for a Massively Parallel Machine Shaw, David Elliot; Sabety, Theodore M. 1984 Reports Computer science
111. An Estimation-Theoretic Framework for Image-Flow Computation Singh, Ajit 1989 Reports Computer science
112. An Event System Architecture for Scaling Scale-Resistant Services Gross, Philip N. 2005 Reports Computer science
113. A New Client-Server Architecture for Distributed Query Processing Li, Zhe; Ross, Kenneth A. 1994 Reports Computer science
114. A New Framework for Unsupervised Semantic Discovery Schiffman, Barry 2007 Reports Computer science
115. A New Paradigm for Parallel and Distributed Rule-Processing Wolfson, Ouri; Ozeri, Aya 1989 Reports Computer science
116. A New Randomized Algorithm to Approximate the Star Discrepancy Based on Threshold Accepting Gnewuch, Michael; Wahlstrom, Magnus; Winzen, Carola 2011 Reports Computer science
117. A New Routing Metric for High Throughput in Dense Ad Hoc Networks Chang, Hoon; Misra, Vishal; Rubenstein, Daniel Stuart 2005 Reports Computer science
118. An Experimental Hybrid User Interface for Collaboration Butz, Andreas; Hollerer, Tobias; Beshers, Clifford; Feiner, Steven K.; MacIntyre, Blair 1999 Reports Computer science
119. An Experimental System for the Integration of Information from Stereo and Multiple Shape From Texture Algorithms Boult, Terrance E.; Moerdler, Mark 1987 Reports Computer science
120. An Experiment in Intelligent Information Systems: RESEARCHER Lebowitz, Michael 1985 Reports Computer science
122. An Extensible Meta-Learning Approach for Scalable and Accurate Inductive Learning Chan, Philip K. 1996 Reports Computer science
123. An Implementation of a Renesas H8/300 Microprocessor with a Cycle-Level Timing Extension Huang, Chen-Chun; Coca, Javier; Gupta, Yashket; Edwards, Stephen A. 2006 Reports Computer science
124. An Improved Algorithm for Approximate String Matching Galil, Zvi; Park, Kunsoo 1989 Reports Computer science
126. An Information-Based Approach to III-Posed Problems Werschulz, Arthur G. 1986 Reports Computer science
127. An Information Retrieval Approach for Automatically Constructing Software Libraries Maarek, Yoelle S.; Berry, Daniel M.; Kaiser, Gail E. 1990 Reports Computer science
128. An integrated approach to stereo matching, surface reconstruction and depth segmentation using consistent smoothness assumptions Chen, Liang-Hua; Boult, Terrance E. 1988 Reports Computer science
129. An Integrated System for Dextrous Manipulation Allen, Peter K.; Michelman, Paul; Roberts, Kenneth S. 1988 Reports Computer scienceRobotics
130. An Interoperability Model for Process-Centered Software Engineering Environments and Its Implementation in Oz Ben-Shaul, Israel Z.; Kaiser, Gail E. 1995 Reports Computer science
131. An intractability result for multiple integration Wozniakowski, Henryk; Sloan, I. H. 1995 Reports Computer science
132. An Investigation Into the Detection of New Information Schiffman, Barry; McKeown, Kathleen 2004 Reports Computer science
133. An Object-Based Approach to Implementing Distributed Concurrency Control Popovich, Steven S.; Kaiser, Gail E.; Wu, Shyhtsun Felix 1990 Reports Computer science
135. An Object Oriented Approach to Content Planning for Text Generation Wolz, Ursula 1990 Reports Computer science
136. An Object-Oriented Model for Network Management Sengupta, Soumitra; Dupuy, Alexander; Schwartz, Jed; Yemini, Yechiam 1988 Reports Computer science
137. An O(EV log V) Algorithm for Finding a Maximal Weighted Matching in General Graphs Galil, Zvi; Micali, Silvio; Gabow, Harold 1984 Reports Computer science
138. An O(n2(m+n Log N)log N) Min-cost Flow Algorithm Galil, Zvi; Tardos, Eva 1987 Reports Computer science
140. A Non-Deterministic Approach to Restructuring Flow Graphs Bunter, Toni A. 1993 Reports Computer science
141. An Optimal Algorithm for Scheduling Reservations in a Bandwidth Market Olshefski, David; Zhang, Li; Florissi, Danilo; Yemini, Yechiam 1999 Reports Computer science
142. An Optimal Complexity Algorithm for Computing Topological Degree in Two Dimensions Boult, Terrance E.; Sikorski, Krzysztof 1985 Reports Computer science
143. An Optimal O (log log n) Time Parallel String Matching Algorithm Breslauer, Dany; Galil, Zvi 1989 Reports Computer science
146. A Note on Implementing OPS5 Production Systems on DADO Stolfo, Salvatore 1984 Reports Computer science
148. An Overview of the DADO Parallel Computer Lerner, Mark D.; Maguire, Gerald Q.; Stolfo, Salvatore 1984 Reports Computer science
149. An Overview of the Isochronets Architecture for High Speed Networks Yemini, Yechiam; Florissi, Danilo 1995 Reports Computer science
150. An Overview of the Synthesis Operating System Pu, Calton; Massalin, Henry 1989 Reports Computer science
151. Any Iteration for Polynomial Equations Using Linear Information Has Infinite Complexity Wasilkowski, Grzegorz W. 1979 Reports Computer scienceLamé polynomialsIterative methods (Mathematics)
152. A Paradigm for Decentralized Process Modeling and Its Realization in the Oz Environment Ben-Shaul, Israel Z. 1995 Reports Computer science
153. Aperture Evaluation for Defocus Deblurring and Extended Depth of Field Zhou, Changyin; Nayar, Shree K. 2012 Reports Computer science
154. Apiary: Easy-to-use Desktop Application Fault Containment on Commodity Operating Systems Potter, Shaya; Nieh, Jason 2009 Reports Computer science
155. A Platform for Multilingual News Summarization Evans, David Kirk; Klavans, Judith L. 2003 Reports Computer science
156. Application Layer Feedback-based SIP Server Overload Control Shen, Charles; Schulzrinne, Henning G.; Nahum, Erich 2008 Reports Computer science
157. Applying Reliability Metrics to Co-Reference Annotation Passonneau, Rebecca 1997 Reports Computer science
159. Approximate String Joins in a Database (Almost) for Free -- Erratum Gravano, Luis; Jagadish, H. V.; Ipeirotis, Panagiotis G.; Srivastava, Divesh; Koudas, Nick; Muthukrishnan, S. 2003 Reports Computer science
160. Approximate String Matching on the DADO2 Parallel Computer Mori, Toshikatsu; Stolfo, Salvatore 1988 Reports Computer science
161. Approximate Theory Formation: An Explanation-Based Approach Ellman, Thomas 1988 Reports Computer science
162. Approximating a Global Passive Adversary Against Tor Chakravarty, Sambuddho; Stavrou, Angelos; Keromytis, Angelos D. 2008 Reports Computer scienceComputer networksComputer networks--Security measures
163. Approximating the Bethe partition function Weller, Adrian; Jebara, Tony 2013 Reports Computer science
164. Approximating the Reflection Integral as a Summation: Where Did the dωi Go? Ben-Artzi, Aner 2005 Reports Computer science
167. A Precomputed Polynomial Representation for Interactive BRDF Editing with Global Illumination Ben-Artzi, Aner; Egan, Kevin; Durand, Fredo; Ramamoorthi, Ravi 2007 Reports Computer science
168. A Private Interactive Test of a Boolean Predicate and Minimum-Knowledge Public-Key Cryptosystems Galil, Zvi; Haber, Stuart; Yung, Moti 1985 Reports Computer science
169. A Procedure for the Selection of Connectives: How Deep Is the Surface? Elhadad, Michael; McKeown, Kathleen 1989 Reports Computer science
170. Architecture and Applications of DADO: A Large-Scale Parallel Computer for Artificial Intelligence Stolfo, Salvatore; Miranker, Daniel P.; Shaw, David Elliot 1983 Reports Computer scienceParallel computersArtificial intelligence
171. Architectures for Federation of Process-Centered Environments Ben-Shaul, Israel Z.; Kaiser, Gail E. 1996 Reports Computer science
173. A Real World Identity Management System with Master Secret Revocation Androulaki, Elli; Vo, Binh D.; Bellovin, Steven Michael 2010 Reports Computer science
174. A Recursive Data-Driven Approach to Programming Multicore Systems Collins, Rebecca L.; Carloni, Luca 2007 Reports Computer science
175. A Red Team/Blue Team Assessment of Functional Analysis Methods for Malicious Circuit Identification Waksman, Adam; Rajendran, Jeyavijayan; Suozzo, Matthew Robert; Sethumadhavan, Simha 2014 Reports Computer science
176. A regularized solution of shape from shadows Hatzitheodorou, Michael; Jackowski, Tomasz; Papageorgiou, Anargyros 1989 Reports Computer science
177. A Relational Database Machine Architecture Shaw, David Elliot 1979 Reports Computer scienceAlgorithms--Mathematical models
178. Are maintenance expert systems practical now? Waldes, Peter; Lustgarten, Janet; Stolfo, Salvatore 1985 Reports Computer science
180. A Retrospective on DOSE: An Interpretive Approach to Structure Editor Generation Kaiser, Gail E.; Feiler, Peter H.; Jalili, Fahimeh; Schlichter, Johann H. 1988 Reports Computer science
181. A Risk-Reward Framework for the Competitive Analysis of Adaptive Trading Strategies Al-Binali, Sabah 1997 Reports Computer science
182. Arrays in SHIM: A Proposal Thapar, Smridh; Tardieu, Olivier; Edwards, Stephen A. 2006 Reports Computer science
183. A Runtime Adaptation Framework for Native C and Bytecode Applications Griffith, Rean; Kaiser, Gail E. 2006 Reports Computer science
184. A Secure and Privacy-Preserving Targeted Ad-System Androulaki, Elli; Bellovin, Steven Michael 2009 Reports Computer science
186. A simple preprocessing scheme to extract and balance implicit parallelism in the concurrent match of production rules Stolfo, Salvatore; Miranker, Daniel P.; Mills, Russell C. 1985 Reports Computer science
187. A Simple Scheme for a Fault Tolerant DADO Machine Stolfo, Salvatore 1985 Reports Computer scienceArtificial intelligence
188. A Software Checking Framework Using Distributed Model Checking and Checkpoint/Resume of Virtualized PrOcess Domains Keetha, Nageswar; Wu, Leon Li; Kaiser, Gail E.; Yang, Junfeng 2009 Reports Computer science
189. A Statistical Mechanics of Some Interconnection Networks Pinsky, Eugene; Yemini, Yechiam 1984 Reports Computer science
190. A Survey of Automated Consulting in Interactive Programming Environments Wolz, Ursula 1987 Reports Computer science
193. A Survey of Interfaces to Data Base and Expert Systems. Moerdler, Galina Datskovsky 1987 Reports Computer science
194. A Survey of Machine Learning Systems Integrating Explanation-Based and Similarity-Based Methods Danyluk, Andrea Pohoreckyj 1989 Reports Computer science
197. A Survey of Security Issues and Solutions in Presence Singh, Vishal; Schulzrinne, Henning G. 2006 Reports Computer science
198. A Survey of Software Fault Tolerance Techniques Smith, Jonathan M. 1988 Reports Computer science
199. A Survey of Tree-Walk Evaluation Strategies for Attribute Grammars Yellin, Daniel 1984 Reports Computer science
200. A Survey on Service Creation by End Users Wu, Xiaotao; Schulzrinne, Henning G. 2006 Reports Computer science