This list is generated from documents currently in the ResearchIndex database. This list does
not include citations where one or more authors of the citing and cited
articles match. This list excludes books and technical reports. This list is
automatically generated (and then deleting all books and technical reports) and
may contain errors.
1. Doc Context 1025
A.P. Dempster, N.M. Laird, and D.B. Rubin. Maximum Likelihood from
Incomplete Data via the EM Algorithm. Journal of the Royal Statistical
Society, Series B (Methodological) , 39(1):1--38, 1977.
2. Doc Context 878
Brooks, R.A. A robust layered control system for a mobile robot.
IEEE Journal of Robotics and Automation, 1986. RA-2(1): p. 14-23.
3. Doc Context 865
R. Bryant. Graph-based algorithms for boolean function manipulation.
IEEE Transactions on Computers, C-35, 8:677-691, 1986.
4. Doc Context 838
C. Liu and J. Layland. Scheduling Algorithms for Multiprogramming in
a Hard Real-time Environment. Journal of the ACM, 20(1):46--61, Jan. 1973.
5. Doc Context 654
J. F. Allen. Maintaining knowledge about temporal intervals.
Communications of the ACM, 26:832--843, 1983.
6. Doc Context 651
D. Harel. Statecharts: A visual formalism for complex systems.
Science of Computer Programming, 8:231--274, 1987.
7. Doc Context 644
C.E. Shannon. A mathematical theory of communication. Bell System
Technical Journal, 27:379--423,623--656, 1948.
8. Doc Context 639
A. Parekh and R. Gallager. A generalized processor sharing approach
to flow control - the single node case. In Proceedings of the INFOCOM'92,
1992.
9. Doc Context 638
F. Thomson Leighton. Introduction to Parallel Algorithms and
Architectures: Arrays ffl Trees ffl Hypercubes, volume I. Morgan Kaufmann,
San Mateo, CA 94403, 1992.
10. Doc Context 628
M. Kass, A. Witkin, and D. Terzopoulos. Snakes: active contour models.
In First International Conference on Computer Vision, pages 259--268, 1987.
11. Doc Context 623
S G Mallat. A theory for multiresolution signal decomposition: The
wavelet representation. IEEE Trans Pat Anal Mach Intell, 11:674--693, July
1989.
12. Doc
Context
615 Rivest, R. L., Shamir, A., Adleman, L. A.: A method
for obtaining digital signatures and public-key cryptosystems; Communications
of the ACM, Vol.21, Nr.2, 1978, S.120-126.
13. Doc Context 589
E. M. Clarke, E. A. Emerson, and A. P. Sistla. Automatic Verification
of Finite-State Concurrent Systems Using Temporal Logic Specifications. ACM
Transactions on Programming Languages and Systems, 8(2):244--263, 1986.
14. Doc Context 576
Richard Fikes and Nils Nilsson. STRIPS: A new approach to the
application of theorem proving to problem solving. In James Allen, James Hendler,
and Austin Tate, editors, Readings in Planning. Morgan Kaufmann, 1990.
15. Doc
Context
566 V. Jacobson. Congestion avoidance and control.
In ACM SIGCOMM '88, 1988.
16. Doc Context 551
Kai Li and Paul Hudak. Memory Coherence in Shared Virtual Memory
Systems. ACM Transactions on Computer Systems, 7(4):321--359, November
1989.
17. Doc Context 544
Reiter, R. 1980. A Logic for Default Reasoning. Artificial
Intelligence 13:81--132.
18. Doc Context 524
I. Daubechies. Orthonormal bases of compactly supported wavelets.
Comm. Pure and Appl. Math., 41:909--996, 1988.
19. Doc Context 520
L. R. Rabiner, "A Tutorial on Hidden Markov Models and Selected
Applications in Speech Recognition," Proc. of the IEEE, Vol.77, No.2,
pp.257--286, 1989.
20. Doc Context 518
T. von Eicken, D.E. Culler, S.C. Goldstein, and K.E. Schauser. Active
Messages: a Mechanism for Integrated Communication and Computation. In The
19th Annual International Symposium on Computer Architecture, pages 256--266,
Gold Coast, Australia, May 1992.
21. Doc
Context
513 N. Dershowitz and J.-P. Jouannaud. Rewrite systems.
In J. van Leeuwen, editor, Handbook of Theoretical Computer Science, volume B,
pages 243--320. Elsevier, 1990.
22. Doc Context 508
J. Canny, "A computational approach to edge detection,
" IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 8,
pp. 679--698, 1986. 18 Weber and Malik
23. Doc Context 490
L. Lamport. Times, clocks, and the ordering of events in a
distributed system. CACM, 21(7):558-- 565, July 1978.
24. Doc Context 465
Cousot, P. and Cousot, R. 1977. Abstract interpretation: a unified
lattice model for static analysis of programs by construction or approximation
of fixpoints. In Conference Record of the 4th ACM Symposium on Principles
of Programming Languages (POPL '77 ). ACM Press, New York, 238--252.
25. Doc Context 449
J. Jaffar, J.-L. Lassez. "Constraint Logic Programming."
in Proc. of the 14th ACM Symposium on Principles of Programming Languages,
Munich, pp. 111 - 119, 1987.
26. Doc Context 446
K. L. Clark. Negation as Failure. In H. Gallaire and J. Minker,
editors, Logic and Databases, pages 293--322. Plenum, New York, NY, 1978.
27. Doc Context 443
Robin Milner. A theory of type polymorphism in programming. Journal
of Computer and System Sciences, 17:348--375, Dec 1978.
28. Doc Context 438
A. K. Mackworth. Consistency in networks of relations. Artificial
Intelligence, 8:99--118, 1977.
29. Doc Context 435
Leslie Lamport. How to Make a Multiprocessor Computer That Correctly
Executes Multiprocess Programs. IEEE Transactions on Computers, C-28(9),
September 1979.
30. Doc Context 434
L. G. Valiant. A bridging model for parallel computation.
Communications of the ACM, 33(8):103--111, Aug. 1990.
31. Doc Context 434
J. McCarthy and P. J. Hayes. Some philosophical problems from the
standpoint of Artificial Intelligence. In B. Meltzer and D. Michie,
editors, Machine Intelligence 4, pages 463 -- 502. Edinburgh University Press,
1969.
32. Doc Context 431
B. Horn and B. Schunck, "Determining optical flow,"
Artif. Intell., vol. 17, pp. 185--203, 1981.
33. Doc
Context
431 J.L. Elman. Finding structure in time.
Cognitive Science, 14:179--211, 1990.
34. Doc Context 430
P.P-S. Chen, `The Entity Relationship Model - Towards a Unified View
of Data', ACM Transactions on Database Systems, Vol. 1, No. 1, March 1976,
pp. 9-36.