Ernst L. Leiss

According to our database1, Ernst L. Leiss authored at least 82 papers between 1980 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.



In proceedings 
PhD thesis 




Evaluating Learning Management System Usage at a Small University.
Proceedings of the 3rd International Conference on Information System and Data Mining, 2019

Interactive and Immersive Image-Guided Control of Interventional Manipulators with a Prototype Holographic Interface.
Proceedings of the 19th IEEE International Conference on Bioinformatics and Bioengineering, 2019

Preliminary Evaluation of Robotic Transrectal Biopsy System on an Interventional Planning Software.
Proceedings of the 19th IEEE International Conference on Bioinformatics and Bioengineering, 2019

The worst parallel Hanoi graphs.
Theor. Comput. Sci., 2018

Randomization of Statistical Queries of Type Median: A Simulation Approach.
J. Comput. Sci., 2018

A Prototype Holographic Augmented Reality Interface for Image-Guided Prostate Cancer Interventions.
Proceedings of the 8th Eurographics Workshop on Visual Computing for Biology and Medicine, 2018

Did Technology Fail Us?: Security Concerns in Safeguarding Democracy.
Proceedings of the 11th International Conference on Theory and Practice of Electronic Governance, 2018

Is Complementation Evil?
Proceedings of the Role of Theory in Computer Science, 2017

Security Analytics: Essential Data Analytics Knowledge for Cybersecurity Professionals and Students.
IEEE Secur. Priv., 2015

Panel: Essential Data Analytics Knowledge forCyber-security Professionals and Students.
Proceedings of the 2015 ACM International Workshop on International Workshop on Security and Privacy Analytics, 2015

User-Friendly and Secure Architecture (UFSA) for Authentication of Cloud Services.
Proceedings of the 8th IEEE International Conference on Cloud Computing, 2015

On the role of complementation in implicit language equations and relations.
J. Comput. Syst. Sci., 2014

Privacy between technological capabilities and society's expectations (abstract only).
Proceedings of the 45th ACM Technical Symposium on Computer Science Education, 2014

The worst Hanoi graphs.
Theor. Comput. Sci., 2013

End-to-End cryptographic voting: Potentials and limitations.
Proceedings of the 8th International Conference for Internet Technology and Secured Transactions, 2013

Co-design of Compiler and Hardware Techniques to Reduce Program Code Size on a VLIW Processor.
CLEI Electron. J., 2012

Preface to CLEI 2011 Special Issue.
CLEI Electron. J., 2012

Proceedings of the XXXVII Latin American Computer Conference - Selected Papers, 2011

Prototyping and Programming Tightly Coupled Accelerators.
Proceedings of the Parallel Computing: From Multicores and GPU's to Petascale, 2009

Modulo scheduling without overlapped lifetimes.
Proceedings of the 2009 ACM SIGPLAN/SIGBED conference on Languages, 2009

Optimizing Compilers.
Proceedings of the Wiley Encyclopedia of Computer Science and Engineering, 2008

Middleware for Improving Security in a Component Based Software Architecture.
Proceedings of the NCM 2008, The Fourth International Conference on Networked Computing and Advanced Information Management, Gyeongju, Korea, September 2-4, 2008, 2008

Best Papers from the 2006 CLEI Conference, Santiago, Chile, August, 2006.
CLEI Electron. J., 2007

A programmer's companion to algorithm analysis.
Chapman&Hall/CRC Press, ISBN: 978-1-58488-673-0, 2007

Safeguarding the Transmission of Biometric Measurements Used for Authenticating Individuals.
Proceedings of the Network Control and Engineering for Qos, Security and Mobility, V, 2006

Applying Genetic Algorithms to Convoy Scheduling.
Proceedings of the Artificial Intelligence in Theory and Practice, 2006

Parallel Loop Scheduling Approaches for Distributed and Shared Memory Systems.
Parallel Process. Lett., 2005

Time-Variant Watermarking of MPEG-Compressed Digital Videos.
CLEI Electron. J., 2005

Compiler Techniques for Data Driven Languages with Superlinear Speed-up.
Proceedings of the 17th International Conference on Software Engineering and Knowledge Engineering (SEKE'2005), 2005

Data dependent loop scheduling based on genetic algorithms for distributed and shared memory systems.
J. Parallel Distributed Comput., 2004

An Adaptive Coherence Replacement Protocol for Web Proxy Cache System.
Computación y Sistemas, 2004

A Cache Memory System based on a Dynamic/Adaptive Replacement Approach.
Rev. Colomb. de Computación, 2003

Optimal scheduling of loops with dependence cycles on parallel platforms.
Comput. Syst. Sci. Eng., 2003

Interacting with Visible Human Data Using an ImmersaDesk.
Proceedings of the IEEE Virtual Reality Conference 2002, 2002

Kinesthetic and Visual Force Display for Telerobotics.
Proceedings of the 2002 IEEE International Conference on Robotics and Automation, 2002

A Web Proxy Cache Coherency and Replacement Approach.
Proceedings of the Web Intelligence: Research and Development, 2001

A General Adaptive Cache Coherency-Replacement Scheme for Distributed Systems.
Proceedings of the Innovative Internet Computing Systems, 2001

Bandwidth Reallocation Techniques for Admitting High Priority Real-Time Calls in ATM Networks.
Proceedings of the Networking, 2001

Performance Evaluation of Load-Balanced Routing via Bounded Randomization.
CLEI Electron. J., 2000

Block Mapping - A Compiler Driven I/O Management Study.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 2000

Load-Balanced Routing and Scheduling for Real-Time Traffic in Packet-Switch Networks.
Proceedings of the Proceedings 27th Conference on Local Computer Networks, 2000

Modulo Scheduling for the TMS320C6x VLIW DSP Architecture.
Proceedings of the ACM SIGPLAN 1999 Workshop on Languages, 1999

Hierarchical load-balanced routing via bounded randomization.
Proceedings of the International Conference On Computer Communications and Networks (ICCCN 1999), 1999

Language equations.
Monographs in Computer Science, Springer, ISBN: 978-1-4612-2156-2, 1999

Firewall Monitoring.
CLEI Electron. J., 1998

User-Level Parallel File I/O.
CLEI Electron. J., 1998

Authorization and Revocation in Object-Oriented Databases.
IEEE Trans. Knowl. Data Eng., 1997

Solving Systems of Explicit Language Relations.
Theor. Comput. Sci., 1997

I/O Minimization in a Genetic Sequencing Framework.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 1997

Constructing stochastic networks via /spl beta/-RBF networks.
Proceedings of International Conference on Neural Networks (ICNN'96), 1996

Implicit Language Equations: Existence and Uniqueness of Solutions.
Theor. Comput. Sci., 1995

A Heuristic Scheduling of Independent Tasks with Bottleneck Resource Constraints.
SIAM J. Comput., 1995

Comparing Inference Control Mechanisms for Statistical Databases with Emphasis on Randomizing.
Informatica (Slovenia), 1995

Towards positive-breakdown radial basis function networks.
Proceedings of the Seventh International Conference on Tools with Artificial Intelligence, 1995

Unrestricted Complementation in Language Equations Over a One-Letter Alphabet.
Theor. Comput. Sci., 1994

Language Equations Over a One-Letter Alphabet with Union, Concatenation and Star: A Complete Solution.
Theor. Comput. Sci., 1994

An O(log N) Algorithm to Solve Linear Recurrences on Hypercubes.
Inf. Process. Lett., 1994

Exploiting redundancy to speed up parallel systems.
IEEE Parallel Distributed Technol. Syst. Appl., 1993

Autotasking on the CRAY Y-MP: a performance evaluation on seismic codes.
Proceedings of the 1992 ACM/SIGAPP Symposium on Applied Computing: Technological Challenges of the 1990's, 1992

Some comments on a recent note by Ravikumar.
SIGACT News, 1991

Evaluation of timestamp-based concurrency control mechanisms incorporating livelock avoidance.
Inf. Sci., 1991

Embedding Complete Binary Trees Into Hypercubes.
Inf. Process. Lett., 1991

An Inherently Fault Tolerant Sorting Algorithm.
Proceedings of the Fifth International Parallel Processing Symposium, Proceedings, Anaheim, California, USA, April 30, 1991

Three-Dimensional Dip Moveout On the Sx-2: an XMU Implementation.
Int. J. High Perform. Comput. Appl., 1990

High performance massively parallel abstract data type components.
Proceedings of the Fourteenth Annual International Computer Software and Applications Conference, 1990

More on minimal finite automata.
Bull. EATCS, 1989

On the Degree of Dominator Trees.
Inf. Process. Lett., 1988

On testing for immutability of codes.
IEEE Trans. Inf. Theory, 1987

On the overall reliability of hardware/software systems.
Proceedings of the 1987 Fall Joint Computer Conference on Exploring technology: today and tomorrow, 1987

Generalized Language Equations with Multiple Solutions.
Theor. Comput. Sci., 1986

Horizontally and Vertically Bounded Propagation of Privileges.
Inf. Process. Lett., 1986

The Inaccessible Set: A Classification by Query Type of Security Risks in Statistical Database.
Inf. Process. Lett., 1986

On Solving Star Equations.
Theor. Comput. Sci., 1985

Succinct Representation of Regular Languages by Boolean Automata II.
Theor. Comput. Sci., 1985

On Classes of Tractable Unrestricted Regular Expressions.
Theor. Comput. Sci., 1985

Data Integrity in Digital Optical Disks.
IEEE Trans. Computers, 1984

Randomizing, A Practical Method for Protecting Statistical Databases Against Compromise.
Proceedings of the Eigth International Conference on Very Large Data Bases, 1982

On Generalized Language Equations.
Theor. Comput. Sci., 1981

Succint Representation of Regular Languages by Boolean Automata.
Theor. Comput. Sci., 1981

The Complexity of Restricted Regular Expressions and the Synthesis Problem for Finite Automata.
J. Comput. Syst. Sci., 1981

On Equations for Regular Languages, Finite Automata, and Sequential Networks.
Theor. Comput. Sci., 1980

A Note on a Signature System Based on Probabilistic Logic.
Inf. Process. Lett., 1980