151. Any Iteration for Polynomial Equations Using Linear Information Has Infinite Complexity Wasilkowski, Grzegorz W. 1979 Reports Computer scienceLamé polynomialsIterative methods (Mathematics)
152. A Paradigm for Decentralized Process Modeling and Its Realization in the Oz Environment Ben-Shaul, Israel Z. 1995 Reports Computer science
153. Aperture Evaluation for Defocus Deblurring and Extended Depth of Field Zhou, Changyin; Nayar, Shree K. 2012 Reports Computer science
154. Apiary: Easy-to-use Desktop Application Fault Containment on Commodity Operating Systems Potter, Shaya; Nieh, Jason 2009 Reports Computer science
155. A Platform for Multilingual News Summarization Evans, David Kirk; Klavans, Judith L. 2003 Reports Computer science
156. Application Layer Feedback-based SIP Server Overload Control Shen, Charles; Schulzrinne, Henning G.; Nahum, Erich 2008 Reports Computer science
157. Applying Reliability Metrics to Co-Reference Annotation Passonneau, Rebecca 1997 Reports Computer science
159. Approximate String Joins in a Database (Almost) for Free -- Erratum Gravano, Luis; Jagadish, H. V.; Ipeirotis, Panagiotis G.; Srivastava, Divesh; Koudas, Nick; Muthukrishnan, S. 2003 Reports Computer science
160. Approximate String Matching on the DADO2 Parallel Computer Mori, Toshikatsu; Stolfo, Salvatore 1988 Reports Computer science
161. Approximate Theory Formation: An Explanation-Based Approach Ellman, Thomas 1988 Reports Computer science
162. Approximating a Global Passive Adversary Against Tor Chakravarty, Sambuddho; Stavrou, Angelos; Keromytis, Angelos D. 2008 Reports Computer scienceComputer networksComputer networks--Security measures
163. Approximating the Bethe partition function Weller, Adrian; Jebara, Tony 2013 Reports Computer science
164. Approximating the Reflection Integral as a Summation: Where Did the dωi Go? Ben-Artzi, Aner 2005 Reports Computer science
167. A Precomputed Polynomial Representation for Interactive BRDF Editing with Global Illumination Ben-Artzi, Aner; Egan, Kevin; Durand, Fredo; Ramamoorthi, Ravi 2007 Reports Computer science
168. A Private Interactive Test of a Boolean Predicate and Minimum-Knowledge Public-Key Cryptosystems Galil, Zvi; Haber, Stuart; Yung, Moti 1985 Reports Computer science
169. A Procedure for the Selection of Connectives: How Deep Is the Surface? Elhadad, Michael; McKeown, Kathleen 1989 Reports Computer science
170. Architecture and Applications of DADO: A Large-Scale Parallel Computer for Artificial Intelligence Stolfo, Salvatore; Miranker, Daniel P.; Shaw, David Elliot 1983 Reports Computer scienceParallel computersArtificial intelligence
171. Architectures for Federation of Process-Centered Environments Ben-Shaul, Israel Z.; Kaiser, Gail E. 1996 Reports Computer science
173. A Real World Identity Management System with Master Secret Revocation Androulaki, Elli; Vo, Binh D.; Bellovin, Steven Michael 2010 Reports Computer science
174. A Recursive Data-Driven Approach to Programming Multicore Systems Collins, Rebecca L.; Carloni, Luca 2007 Reports Computer science
175. A Red Team/Blue Team Assessment of Functional Analysis Methods for Malicious Circuit Identification Waksman, Adam; Rajendran, Jeyavijayan; Suozzo, Matthew Robert; Sethumadhavan, Simha 2014 Reports Computer science
176. A regularized solution of shape from shadows Hatzitheodorou, Michael; Jackowski, Tomasz; Papageorgiou, Anargyros 1989 Reports Computer science
177. A Relational Database Machine Architecture Shaw, David Elliot 1979 Reports Computer scienceAlgorithms--Mathematical models
178. Are maintenance expert systems practical now? Waldes, Peter; Lustgarten, Janet; Stolfo, Salvatore 1985 Reports Computer science
180. A Retrospective on DOSE: An Interpretive Approach to Structure Editor Generation Kaiser, Gail E.; Feiler, Peter H.; Jalili, Fahimeh; Schlichter, Johann H. 1988 Reports Computer science
181. A Risk-Reward Framework for the Competitive Analysis of Adaptive Trading Strategies Al-Binali, Sabah 1997 Reports Computer science
182. Arrays in SHIM: A Proposal Thapar, Smridh; Tardieu, Olivier; Edwards, Stephen A. 2006 Reports Computer science
183. A Runtime Adaptation Framework for Native C and Bytecode Applications Griffith, Rean; Kaiser, Gail E. 2006 Reports Computer science
184. A Secure and Privacy-Preserving Targeted Ad-System Androulaki, Elli; Bellovin, Steven Michael 2009 Reports Computer science
186. A simple preprocessing scheme to extract and balance implicit parallelism in the concurrent match of production rules Stolfo, Salvatore; Miranker, Daniel P.; Mills, Russell C. 1985 Reports Computer science
187. A Simple Scheme for a Fault Tolerant DADO Machine Stolfo, Salvatore 1985 Reports Computer scienceArtificial intelligence
188. A Software Checking Framework Using Distributed Model Checking and Checkpoint/Resume of Virtualized PrOcess Domains Keetha, Nageswar; Wu, Leon Li; Kaiser, Gail E.; Yang, Junfeng 2009 Reports Computer science
189. A Statistical Mechanics of Some Interconnection Networks Pinsky, Eugene; Yemini, Yechiam 1984 Reports Computer science
190. A Survey of Automated Consulting in Interactive Programming Environments Wolz, Ursula 1987 Reports Computer science
193. A Survey of Interfaces to Data Base and Expert Systems. Moerdler, Galina Datskovsky 1987 Reports Computer science
194. A Survey of Machine Learning Systems Integrating Explanation-Based and Similarity-Based Methods Danyluk, Andrea Pohoreckyj 1989 Reports Computer science
197. A Survey of Security Issues and Solutions in Presence Singh, Vishal; Schulzrinne, Henning G. 2006 Reports Computer science
198. A Survey of Software Fault Tolerance Techniques Smith, Jonathan M. 1988 Reports Computer science
199. A Survey of Tree-Walk Evaluation Strategies for Attribute Grammars Yellin, Daniel 1984 Reports Computer science
200. A Survey on Service Creation by End Users Wu, Xiaotao; Schulzrinne, Henning G. 2006 Reports Computer science