Reports for Authors (Last name "L")
-
Lahiri, Shuvendu K.
- TR-884-10 - Linear Maps (2010)
-
Lai, Junwen
- TR-842-08 - Virtualizing Network File Systems (thesis) (2008)
- TR-705-04 - Networking Going Postal (2004)
- TR-691-04 - Postmanet: Turning the Postal System into a Generic Digital Communication Mechanism (2004)
- TR-672-03 - Coherent and Network-Aware Tracking of Objects (2003)
- TR-664-02 - A Peer-to-Peer Mobile Storage System (2002)
-
Lai, Kevin
- TR-992-15 - Label Optimal Regret Bounds for Online Local Learning (2015)
-
Lalis, Spyros
- TR-794-07 - Counteracting Discrimination against Network Traffic (2007)
- TR-769-06 - Secure Availability Monitoring Using Stealth Probes (2006)
-
LaPaugh, Andrea S.
- TR-643-02 - Measuring the Web Using a Versatile Meta Information Crawler (2002)
- TR-384-92 - Finding All Minimal Shapes in a Routing Channel (1992)
- TR-345-91 - CLOVER: A User Guide (1991)
- TR-274-90 - CLOVER: A Timing Constraints Verification System (1990)
- TR-240-89 - How to Store a Triangular Matrix (1989)
- TR-218-89 - Decreasing Channel Width Bounds by Channel Widening (1989)
- TR-149-88 - Algorithms for Finding a Maximum Bipartite Subgraph for Special Classes of Graphs (1988)
- TR-128-87 - Analysis of Algorithms for the Configuration of Wafer Scale Linear Arrays in the Presence of Defects (1987)
- TR-068-86 - Optimal Compaction of Multiple Two-Component Channels under River Routing (1986)
- TR-023-86 - A Weinberger Array Generator (1986)
-
Larmore, Lawrence L.
- TR-539-96 - Correctness of Constructing Optimal Alphabetic Trees Revisited (1996)
-
Larus, James R.
- TR-488-95 - Efficient Support for Irregular Applications on Distributed--Memory Machines (1995)
- TR-464-94 - Application-Specific Protocols for User-Level Shared Memory (1994)
- TR-463-94 - Where is Time Spent in Message-Passing and Shared-Memory Programs? (1994)
-
Laszlo, Michael J.
- TR-125-87 - A Data Structure for Manipulating Three-Dimensional Subdivisions (thesis) (1987)
- TR-089-87 - Primitives for the Manipulation of Three-Dimensional Subdivisions (1987)
- Lawrence, Jason
-
Lebeck, Alvin
- TR-464-94 - Application-Specific Protocols for User-Level Shared Memory (1994)
-
Lee, Eunyoung
- TR-687-03 - Secure Linking: A Logical Framework for Policy-Enforced Component Composition (2003)
- TR-663-02 - Secure Linking: a Framework for Trusted Software Components (Extended Version) (2002)
- TR-662-02 - Secure Linking: a Framework for Trusted Software Components (2002)
-
Lee, Young-Suk
- TR-978-16 - Targeted analyses of very large genome-wide data collections (2016)
-
Leighton, Tom
- TR-585-98 - Resistance of Digital Watermarks to Collusive Attacks (1998)
- TR-385-92 - On the Fault Tolerance of Some Popular Bounded-Degree Networks (1992)
- Leven, Daniel
-
Levy, Silvio V.F.
- TR-054-86 - Robust Contour Tracing (1986)
-
Li, Hao
- TR-907-11 - Dynamic Hair Capture (2011)
- Li, Kai
-
Li, Li Erran
- TR-950-13 - SoftCell: Taking control of Cellular Core Networks (2013)
- TR-922-12 - CellSDN: Software-Defined Cellular Networks (2012)
-
Li, Shi
- TR-969-14 - Approximation Algorithms for Network Routing and Facility Location Problems (2014)
-
Li, Wilmot
- TR-970-14 - Composition-Aware Scene Optimization for Product Images (2014)
- Li, Xiaozhou
-
Liao, Cheng
- TR-579-98 - Network Interface Support for Shared Virtual Memory on Clusters (1998)
-
Ligatti, Jarred A.
- TR-752-06 - Policy Enforcement via Program Monitoring (thesis) (2006)
-
Ligatti, Jay
- TR-776-07 - Fault-tolerant Typed Assembly Language (2007)
- TR-720-05 - Enforcing Non-safety Security Policies with Program Monitors (2005)
- TR-699-04 - A Language and System for Composing Security Policies (2004)
- TR-681-03 - Edit Automata: Enforcement Mechanisms for Run-time Security Policies (2003)
- TR-655-02 - A Calculus for Composing Security Policies (2002)
- TR-649-02 - More Enforceable Security Policies (2002)
-
Lin, William W.
- TR-218-89 - Decreasing Channel Width Bounds by Channel Widening (1989)
- TR-201-89 - Placement Problems Arising From Automatic Logic Compilation (thesis) (1989)
- TR-023-86 - A Weinberger Array Generator (1986)
-
Lipton, Richard J.
- TR-627-00 - Cheaper by the Dozen: Batched Algorithms (2000)
- TR-520-96 - A Revocable Backup System (1996)
- TR-499-95 - On The Computational Power of DNA (1995)
- TR-491-95 - Making DNA Computers Error Resistant (1995)
- TR-489-95 - Breaking DES Using a Molecular Computer (1995)
- TR-328-91 - Probabilistic Diagnosis of Hot Spots (1991)
- TR-298-90 - A Free-Market Exchange for Information (1990)
- TR-240-89 - How to Store a Triangular Matrix (1989)
- TR-238-89 - Playing Games of Incomplete Information (1989)
- TR-237-89 - On Bounded Round Multi-Prover Interactive Proof Systems (1989)
- TR-213-89 - Recursively Enumerable Languages Have Finite State Interactive Proofs (1989)
- TR-212-89 - Fingerprinting Sets (1989)
- TR-209-89 - Estimating the Size of Path Relations (1989)
- TR-203-89 - Clocked Adversaries for Hashing (1989)
- TR-180-88 - PRAM: A Scalable Shared Memory (1988)
- TR-176-88 - A Class of Randomized Strategies for Low-Cost Comparison of File Copies (1988)
- TR-088-87 - The Processor Identity Problem (1987)
- TR-074-87 - IOStone: A Synthetic File System Performance Benchmark (1987)
- TR-067-86 - Models and Measurements of File System Performance (1986)
- TR-042-86 - Array Access Bound for Block Storage Memory Systems (1986)
- TR-026-86 - Comparing Long Strings on a Short Systolic Array (1986)
- TR-022-86 - Using Residue Arithmetic to Simplify VLSI Processor Arrays for Dynamic Programming (1986)
- TR-020-86 - The Total DNA Homology Experiment (1986)
-
Liu, Bede
- TR-657-02 - Reading Between the Lines: Lessons from the SDMI Challenge (2002)
-
Liu, David
- TR-001-22 - A Serverless Architecture for Application-Level Orchestration (2022)
-
Liu, Ding
- TR-727-05 - Sublinear Geometric Algorithms and Geometric Lower Bounds (thesis) (2005)
-
Liu, Shao
- TR-833-08 - Performance Bounds for Peer-Assisted Live Streaming (2008)
-
Liu, Siyu
- TR-957-13 - Localization Using Feature Matching in Near-Random Textures (2013)
-
Liu, Tianqiang
- TR-970-14 - Composition-Aware Scene Optimization for Product Images (2014)
-
Liu, Ting
- TR-643-02 - Measuring the Web Using a Versatile Meta Information Crawler (2002)
-
Liu, Zhiyan
- TR-819-08 - Scalable Isosurface Visualization (thesis) (2008)
- Liu, Zicheng
-
Lloyd, Wyatt
- TR-948-13 - Stronger Consistency and Semantics for Low-Latency Geo-Replicated Storage (2013)
- TR-005-20 - Performance-Optimal Read-Only Transactions (Extended Version) (2022)
- TR-004-20 - Tolerating Slowdowns in Replicated State Machines using Copilots: Pseudocode and Proof of Correctness (2021)
-
Lloyd, Wyatt
- TR-977-15 - RIPQ: Advanced Photo Caching on Flash for Facebook (2015)
-
Loke, W. Tim
- TR-344-91 - A Theory for Deadlocks (1991)
-
Lopresti, Daniel
- TR-026-86 - Comparing Long Strings on a Short Systolic Array (1986)
- TR-022-86 - Using Residue Arithmetic to Simplify VLSI Processor Arrays for Dynamic Programming (1986)
- TR-020-86 - The Total DNA Homology Experiment (1986)
- TR-011-85 - A Suggested Architecture for the Massive Memory Machine (1985)
-
Lovasz, Laszlo
- TR-317-91 - Lecture Notes on Evasiveness of Graph Properties (1991)
- TR-251-90 - Algorithmic Discrete Mathematics (1990)
- TR-204-89 - Communication Complexity; A Survey (1989)
- TR-114-87 - Covering Minima and Lattice Point Free Convex Bodies (1987)
-
Low, Steven
- TR-628-00 - Understanding TCP Vegas: A Duality Model* (2000)
- TR-616-00 - Understanding TCP Vegas: Theory and Practice* (2000)
-
Lu, Haonan
- TR-005-20 - Performance-Optimal Read-Only Transactions (Extended Version) (2022)
-
Lu, Jingwan
- TR-978-14 - Data-driven Digital Drawing and Painting (2014)
-
Lucas, Joan M.
- TR-021-86 - The Rotation Graph of Binary Trees is Hamiltonian (1986)
-
Lund, Carsten
- TR-504-95 - Hardness of Approximations (1995)
-
Luo, Linjie
- TR-907-11 - Dynamic Hair Capture (2011)
- Lustig, Daniel
-
Lv, Qin
- TR-760-06 - Analysis of Filtering for Similarity Search Using Sketches (2006)
- TR-759-06 - A Time-Space Efficient Locality Sensitive Hashing Method for Similarity Search in High Dimensions (2006)
-
Lynch, Nancy
- TR-123-87 - Reliable Broadcast in Networks with Nonprogrammable Servers (1987)