Ernst L. Leiss

According to our database1, Ernst L. Leiss authored at least 77 papers between 1980 and 2018.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
The worst parallel Hanoi graphs.
Theor. Comput. Sci., 2018

Randomization of Statistical Queries of Type Median: A Simulation Approach.
JCS, 2018

A Prototype Holographic Augmented Reality Interface for Image-Guided Prostate Cancer Interventions.
Proceedings of the VCBM 18: Eurographics Workshop on Visual Computing for Biology and Medicine, 2018

Did Technology Fail Us?: Security Concerns in Safeguarding Democracy.
Proceedings of the 11th International Conference on Theory and Practice of Electronic Governance, 2018

2017
Is Complementation Evil?
Proceedings of the Role of Theory in Computer Science, 2017

2015
Security Analytics: Essential Data Analytics Knowledge for Cybersecurity Professionals and Students.
IEEE Security & Privacy, 2015

Panel: Essential Data Analytics Knowledge forCyber-security Professionals and Students.
Proceedings of the 2015 ACM International Workshop on International Workshop on Security and Privacy Analytics, 2015

User-Friendly and Secure Architecture (UFSA) for Authentication of Cloud Services.
Proceedings of the 8th IEEE International Conference on Cloud Computing, 2015

2014
On the role of complementation in implicit language equations and relations.
J. Comput. Syst. Sci., 2014

Privacy between technological capabilities and society's expectations (abstract only).
Proceedings of the 45th ACM Technical Symposium on Computer Science Education, 2014

2013
The worst Hanoi graphs.
Theor. Comput. Sci., 2013

End-to-End cryptographic voting: Potentials and limitations.
Proceedings of the 8th International Conference for Internet Technology and Secured Transactions, 2013

2012
Co-design of Compiler and Hardware Techniques to Reduce Program Code Size on a VLIW Processor.
CLEI Electron. J., 2012

Preface to CLEI 2011 Special Issue.
CLEI Electron. J., 2012

2011
Preface.
Electr. Notes Theor. Comput. Sci., 2011

2009
Prototyping and Programming Tightly Coupled Accelerators.
Proceedings of the Parallel Computing: From Multicores and GPU's to Petascale, 2009

Modulo scheduling without overlapped lifetimes.
Proceedings of the 2009 ACM SIGPLAN/SIGBED conference on Languages, 2009

2008
Optimizing Compilers.
Proceedings of the Wiley Encyclopedia of Computer Science and Engineering, 2008

Middleware for Improving Security in a Component Based Software Architecture.
Proceedings of the NCM 2008, The Fourth International Conference on Networked Computing and Advanced Information Management, Gyeongju, Korea, September 2-4, 2008, 2008

2007
Best Papers from the 2006 CLEI Conference, Santiago, Chile, August, 2006.
CLEI Electron. J., 2007

A programmer's companion to algorithm analysis.
Chapman&Hall/CRC Press, ISBN: 978-1-58488-673-0, 2007

2006
Safeguarding the Transmission of Biometric Measurements Used for Authenticating Individuals.
Proceedings of the Network Control and Engineering for Qos, Security and Mobility, V, 2006

Applying Genetic Algorithms to Convoy Scheduling.
Proceedings of the Artificial Intelligence in Theory and Practice, 2006

2005
Parallel Loop Scheduling Approaches for Distributed and Shared Memory Systems.
Parallel Processing Letters, 2005

Time-Variant Watermarking of MPEG-Compressed Digital Videos.
CLEI Electron. J., 2005

Compiler Techniques for Data Driven Languages with Superlinear Speed-up.
Proceedings of the 17th International Conference on Software Engineering and Knowledge Engineering (SEKE'2005), 2005

2004
Data dependent loop scheduling based on genetic algorithms for distributed and shared memory systems.
J. Parallel Distrib. Comput., 2004

An Adaptive Coherence Replacement Protocol for Web Proxy Cache System.
Computación y Sistemas, 2004

2003
A Cache Memory System based on a Dynamic/Adaptive Replacement Approach.
Revista Colombiana de Computación, 2003

Optimal scheduling of loops with dependence cycles on parallel platforms.
Comput. Syst. Sci. Eng., 2003

2002
Performance Evaluation of Load-Balanced Routing via Bounded Randomization.
CLEI Electron. J., 2002

Interacting with Visible Human Data Using an ImmersaDesk.
Proceedings of the IEEE Virtual Reality Conference 2002, 2002

Kinesthetic and Visual Force Display for Telerobotics.
Proceedings of the 2002 IEEE International Conference on Robotics and Automation, 2002

2001
A Web Proxy Cache Coherency and Replacement Approach.
Proceedings of the Web Intelligence: Research and Development, 2001

A General Adaptive Cache Coherency-Replacement Scheme for Distributed Systems.
Proceedings of the Innovative Internet Computing Systems, 2001

Bandwidth Reallocation Techniques for Admitting High Priority Real-Time Calls in ATM Networks.
Proceedings of the Networking, 2001

2000
Block Mapping - A Compiler Driven I/O Management Study.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 2000

Load-Balanced Routing and Scheduling for Real-Time Traffic in Packet-Switch Networks.
Proceedings of the Proceedings 27th Conference on Local Computer Networks, 2000

1999
Modulo Scheduling for the TMS320C6x VLIW DSP Architecture.
Proceedings of the ACM SIGPLAN 1999 Workshop on Languages, 1999

Hierarchical load-balanced routing via bounded randomization.
Proceedings of the International Conference On Computer Communications and Networks (ICCCN 1999), 1999

Language equations.
Monographs in Computer Science, Springer, ISBN: 978-1-4612-2156-2, 1999

1998
Firewall Monitoring.
CLEI Electron. J., 1998

User-Level Parallel File I/O.
CLEI Electron. J., 1998

1997
Authorization and Revocation in Object-Oriented Databases.
IEEE Trans. Knowl. Data Eng., 1997

Solving Systems of Explicit Language Relations.
Theor. Comput. Sci., 1997

I/O Minimization in a Genetic Sequencing Framework.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 1997

1995
Implicit Language Equations: Existence and Uniqueness of Solutions.
Theor. Comput. Sci., 1995

A Heuristic Scheduling of Independent Tasks with Bottleneck Resource Constraints.
SIAM J. Comput., 1995

Comparing Inference Control Mechanisms for Statistical Databases with Emphasis on Randomizing.
Informatica (Slovenia), 1995

Towards positive-breakdown radial basis function networks.
Proceedings of the Seventh International Conference on Tools with Artificial Intelligence, 1995

1994
Unrestricted Complementation in Language Equations Over a One-Letter Alphabet.
Theor. Comput. Sci., 1994

Language Equations Over a One-Letter Alphabet with Union, Concatenation and Star: A Complete Solution.
Theor. Comput. Sci., 1994

An O(log N) Algorithm to Solve Linear Recurrences on Hypercubes.
Inf. Process. Lett., 1994

1993
Exploiting redundancy to speed up parallel systems.
IEEE P&DT, 1993

1992
Autotasking on the CRAY Y-MP: a performance evaluation on seismic codes.
Proceedings of the 1992 ACM/SIGAPP Symposium on Applied Computing: Technological Challenges of the 1990's, 1992

1991
Evaluation of timestamp-based concurrency control mechanisms incorporating livelock avoidance.
Inf. Sci., 1991

Embedding Complete Binary Trees Into Hypercubes.
Inf. Process. Lett., 1991

An Inherently Fault Tolerant Sorting Algorithm.
Proceedings of the Fifth International Parallel Processing Symposium, Proceedings, Anaheim, California, USA, April 30, 1991

1990
Three-Dimensional Dip Moveout On the Sx-2: an XMU Implementation.
IJHPCA, 1990

High performance massively parallel abstract data type components.
Proceedings of the Fourteenth Annual International Computer Software and Applications Conference, 1990

1989
More on minimal finite automata.
Bulletin of the EATCS, 1989

1988
On the Degree of Dominator Trees.
Inf. Process. Lett., 1988

1987
On testing for immutability of codes.
IEEE Trans. Information Theory, 1987

On the overall reliability of hardware/software systems.
Proceedings of the 1987 Fall Joint Computer Conference on Exploring technology: today and tomorrow, 1987

1986
Generalized Language Equations with Multiple Solutions.
Theor. Comput. Sci., 1986

Horizontally and Vertically Bounded Propagation of Privileges.
Inf. Process. Lett., 1986

The Inaccessible Set: A Classification by Query Type of Security Risks in Statistical Database.
Inf. Process. Lett., 1986

1985
On Solving Star Equations.
Theor. Comput. Sci., 1985

Succinct Representation of Regular Languages by Boolean Automata II.
Theor. Comput. Sci., 1985

On Classes of Tractable Unrestricted Regular Expressions.
Theor. Comput. Sci., 1985

1984
Data Integrity in Digital Optical Disks.
IEEE Trans. Computers, 1984

1982
Randomizing, A Practical Method for Protecting Statistical Databases Against Compromise.
Proceedings of the Eigth International Conference on Very Large Data Bases, 1982

1981
On Generalized Language Equations.
Theor. Comput. Sci., 1981

Succint Representation of Regular Languages by Boolean Automata.
Theor. Comput. Sci., 1981

The Complexity of Restricted Regular Expressions and the Synthesis Problem for Finite Automata.
J. Comput. Syst. Sci., 1981

1980
On Equations for Regular Languages, Finite Automata, and Sequential Networks.
Theor. Comput. Sci., 1980

A Note on a Signature System Based on Probabilistic Logic.
Inf. Process. Lett., 1980


  Loading...