Ernst L. Leiss

According to our database1, Ernst L. Leiss authored at least 90 papers between 1980 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
From Perception to Precision: Navigating Perceptual Loss in MRI Super-Resolution.
Proceedings of the 23rd IEEE International Conference on Bioinformatics and Bioengineering, 2023

2021
A Holographic Augmented Reality Interface for Visualizing of MRI Data and Planning of Neurosurgical Procedures.
J. Digit. Imaging, 2021

A modular and scalable computational framework for interactive immersion into imaging data with a holographic augmented reality interface.
Comput. Methods Programs Biomed., 2021

2020
Evaluation of Interventional Planning Software Features for MR-guided Transrectal Prostate Biopsies.
Proceedings of the 20th IEEE International Conference on Bioinformatics and Bioengineering, 2020

2019
Evaluating Learning Management System Usage at a Small University.
Proceedings of the 3rd International Conference on Information System and Data Mining, 2019

Interactive and Immersive Image-Guided Control of Interventional Manipulators with a Prototype Holographic Interface.
Proceedings of the 19th IEEE International Conference on Bioinformatics and Bioengineering, 2019

Preliminary Evaluation of Robotic Transrectal Biopsy System on an Interventional Planning Software.
Proceedings of the 19th IEEE International Conference on Bioinformatics and Bioengineering, 2019

2018
The worst parallel Hanoi graphs.
Theor. Comput. Sci., 2018

Randomization of Statistical Queries of Type Median: A Simulation Approach.
J. Comput. Sci., 2018

A Prototype Holographic Augmented Reality Interface for Image-Guided Prostate Cancer Interventions.
Proceedings of the 8th Eurographics Workshop on Visual Computing for Biology and Medicine, 2018

Did Technology Fail Us?: Security Concerns in Safeguarding Democracy.
Proceedings of the 11th International Conference on Theory and Practice of Electronic Governance, 2018

2017
Is Complementation Evil?
Proceedings of the Role of Theory in Computer Science, 2017

2015
Security Analytics: Essential Data Analytics Knowledge for Cybersecurity Professionals and Students.
IEEE Secur. Priv., 2015

Panel: Essential Data Analytics Knowledge forCyber-security Professionals and Students.
Proceedings of the 2015 ACM International Workshop on International Workshop on Security and Privacy Analytics, 2015

User-Friendly and Secure Architecture (UFSA) for Authentication of Cloud Services.
Proceedings of the 8th IEEE International Conference on Cloud Computing, 2015

2014
On the role of complementation in implicit language equations and relations.
J. Comput. Syst. Sci., 2014

Privacy between technological capabilities and society's expectations (abstract only).
Proceedings of the 45th ACM Technical Symposium on Computer Science Education, 2014

2013
The worst Hanoi graphs.
Theor. Comput. Sci., 2013

Quality enhancement of low-resolution image by using natural images.
Proceedings of the Sixth International Conference on Machine Vision, 2013

Sparse representation based face recognition using weighted regions.
Proceedings of the Sixth International Conference on Machine Vision, 2013

Using motion correction to improve real-time cardiac MRI reconstruction.
Proceedings of the Sixth International Conference on Machine Vision, 2013

End-to-End cryptographic voting: Potentials and limitations.
Proceedings of the 8th International Conference for Internet Technology and Secured Transactions, 2013

2012
Co-design of Compiler and Hardware Techniques to Reduce Program Code Size on a VLIW Processor.
CLEI Electron. J., 2012

Preface to CLEI 2011 Special Issue.
CLEI Electron. J., 2012

2011
Preface.
Proceedings of the XXXVII Latin American Computer Conference - Selected Papers, 2011

2009
Prototyping and Programming Tightly Coupled Accelerators.
Proceedings of the Parallel Computing: From Multicores and GPU's to Petascale, 2009

Modulo scheduling without overlapped lifetimes.
Proceedings of the 2009 ACM SIGPLAN/SIGBED conference on Languages, 2009

2008
Optimizing Compilers.
Proceedings of the Wiley Encyclopedia of Computer Science and Engineering, 2008

Middleware for Improving Security in a Component Based Software Architecture.
Proceedings of the NCM 2008, The Fourth International Conference on Networked Computing and Advanced Information Management, Gyeongju, Korea, September 2-4, 2008, 2008

2007
Best Papers from the 2006 CLEI Conference, Santiago, Chile, August, 2006.
CLEI Electron. J., 2007

A programmer's companion to algorithm analysis.
Chapman&Hall/CRC Press, ISBN: 978-1-58488-673-0, 2007

2006
Safeguarding the Transmission of Biometric Measurements Used for Authenticating Individuals.
Proceedings of the Network Control and Engineering for Qos, Security and Mobility, V, 2006

Applying Genetic Algorithms to Convoy Scheduling.
Proceedings of the Artificial Intelligence in Theory and Practice, 2006

2005
Parallel Loop Scheduling Approaches for Distributed and Shared Memory Systems.
Parallel Process. Lett., 2005

Time-Variant Watermarking of MPEG-Compressed Digital Videos.
CLEI Electron. J., 2005

Compiler Techniques for Data Driven Languages with Superlinear Speed-up.
Proceedings of the 17th International Conference on Software Engineering and Knowledge Engineering (SEKE'2005), 2005

2004
Data dependent loop scheduling based on genetic algorithms for distributed and shared memory systems.
J. Parallel Distributed Comput., 2004

An Adaptive Coherence Replacement Protocol for Web Proxy Cache System.
Computación y Sistemas, 2004

2003
A Cache Memory System based on a Dynamic/Adaptive Replacement Approach.
Rev. Colomb. de Computación, 2003

Optimal scheduling of loops with dependence cycles on parallel platforms.
Comput. Syst. Sci. Eng., 2003

2002
Interacting with Visible Human Data Using an ImmersaDesk.
Proceedings of the IEEE Virtual Reality Conference 2002, 2002

Kinesthetic and Visual Force Display for Telerobotics.
Proceedings of the 2002 IEEE International Conference on Robotics and Automation, 2002

2001
A Web Proxy Cache Coherency and Replacement Approach.
Proceedings of the Web Intelligence: Research and Development, 2001

A General Adaptive Cache Coherency-Replacement Scheme for Distributed Systems.
Proceedings of the Innovative Internet Computing Systems, 2001

Bandwidth Reallocation Techniques for Admitting High Priority Real-Time Calls in ATM Networks.
Proceedings of the Networking, 2001

2000
Performance Evaluation of Load-Balanced Routing via Bounded Randomization.
CLEI Electron. J., 2000

Block Mapping - A Compiler Driven I/O Management Study.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 2000

Load-Balanced Routing and Scheduling for Real-Time Traffic in Packet-Switch Networks.
Proceedings of the Proceedings 27th Conference on Local Computer Networks, 2000

1999
Modulo Scheduling for the TMS320C6x VLIW DSP Architecture.
Proceedings of the ACM SIGPLAN 1999 Workshop on Languages, 1999

Hierarchical load-balanced routing via bounded randomization.
Proceedings of the International Conference On Computer Communications and Networks (ICCCN 1999), 1999

Language equations.
Monographs in Computer Science, Springer, ISBN: 978-1-4612-2156-2, 1999

1998
Firewall Monitoring.
CLEI Electron. J., 1998

User-Level Parallel File I/O.
CLEI Electron. J., 1998

1997
Authorization and Revocation in Object-Oriented Databases.
IEEE Trans. Knowl. Data Eng., 1997

Solving Systems of Explicit Language Relations.
Theor. Comput. Sci., 1997

I/O Minimization in a Genetic Sequencing Framework.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 1997

1996
Constructing stochastic networks via β-RBF networks.
Proceedings of International Conference on Neural Networks (ICNN'96), 1996

1995
Implicit Language Equations: Existence and Uniqueness of Solutions.
Theor. Comput. Sci., 1995

A Heuristic Scheduling of Independent Tasks with Bottleneck Resource Constraints.
SIAM J. Comput., 1995

Comparing Inference Control Mechanisms for Statistical Databases with Emphasis on Randomizing.
Informatica (Slovenia), 1995

Towards positive-breakdown radial basis function networks.
Proceedings of the Seventh International Conference on Tools with Artificial Intelligence, 1995

1994
Unrestricted Complementation in Language Equations Over a One-Letter Alphabet.
Theor. Comput. Sci., 1994

Language Equations Over a One-Letter Alphabet with Union, Concatenation and Star: A Complete Solution.
Theor. Comput. Sci., 1994

An O(log N) Algorithm to Solve Linear Recurrences on Hypercubes.
Inf. Process. Lett., 1994

1993
Exploiting redundancy to speed up parallel systems.
IEEE Parallel Distributed Technol. Syst. Appl., 1993

1992
Autotasking on the CRAY Y-MP: a performance evaluation on seismic codes.
Proceedings of the 1992 ACM/SIGAPP Symposium on Applied Computing: Technological Challenges of the 1990's, 1992

1991
Some comments on a recent note by Ravikumar.
SIGACT News, 1991

Evaluation of timestamp-based concurrency control mechanisms incorporating livelock avoidance.
Inf. Sci., 1991

Embedding Complete Binary Trees Into Hypercubes.
Inf. Process. Lett., 1991

An Inherently Fault Tolerant Sorting Algorithm.
Proceedings of the Fifth International Parallel Processing Symposium, Proceedings, Anaheim, California, USA, April 30, 1991

1990
Three-Dimensional Dip Moveout On the Sx-2: an XMU Implementation.
Int. J. High Perform. Comput. Appl., 1990

High performance massively parallel abstract data type components.
Proceedings of the Fourteenth Annual International Computer Software and Applications Conference, 1990

1989
More on minimal finite automata.
Bull. EATCS, 1989

1988
On the Degree of Dominator Trees.
Inf. Process. Lett., 1988

1987
On testing for immutability of codes.
IEEE Trans. Inf. Theory, 1987

On the overall reliability of hardware/software systems.
Proceedings of the 1987 Fall Joint Computer Conference on Exploring technology: today and tomorrow, 1987

1986
Generalized Language Equations with Multiple Solutions.
Theor. Comput. Sci., 1986

Horizontally and Vertically Bounded Propagation of Privileges.
Inf. Process. Lett., 1986

The Inaccessible Set: A Classification by Query Type of Security Risks in Statistical Database.
Inf. Process. Lett., 1986

1985
On Solving Star Equations.
Theor. Comput. Sci., 1985

Succinct Representation of Regular Languages by Boolean Automata II.
Theor. Comput. Sci., 1985

On Classes of Tractable Unrestricted Regular Expressions.
Theor. Comput. Sci., 1985

1984
Data Integrity in Digital Optical Disks.
IEEE Trans. Computers, 1984

1982
Randomizing, A Practical Method for Protecting Statistical Databases Against Compromise.
Proceedings of the Eigth International Conference on Very Large Data Bases, 1982

1981
On Generalized Language Equations.
Theor. Comput. Sci., 1981

Succint Representation of Regular Languages by Boolean Automata.
Theor. Comput. Sci., 1981

The Complexity of Restricted Regular Expressions and the Synthesis Problem for Finite Automata.
J. Comput. Syst. Sci., 1981

1980
On Equations for Regular Languages, Finite Automata, and Sequential Networks.
Theor. Comput. Sci., 1980

Constructing a finite automaton for a given regular expression.
SIGACT News, 1980

A Note on a Signature System Based on Probabilistic Logic.
Inf. Process. Lett., 1980


  Loading...