Böhringer, K-F. Sensorless manipulation using massively parallel actuator
arrays. IEEE International Conference on Robotics and Automation
(ICRA’94), San Diego, California, May 10, 1994.
Microactuators in single crystal silicon technology. Miura-Shimoyama Laboratory, University of Tokyo, Japan. May 30, 1995.
Sensorless manipulation using transverse vibrations of a plate. IEEE International Conference on Robotics and Automation (ICRA’95), Nagoya, Japan, May 25, 1995.
Micro actuator array architecture for sensorless manipulation. American Vacuum Society, 21st Annual Symposium, Rochester, New York. June 9, 1994.
Branch, M. A. Using trust region ideas in large-scale bound-constrained optimization. Second Annual Upstate Numerical Analysis Day, Cornell University, Ithaca, New York, November 29, 1994. Inexact reflective Newton methods for large-scale optimization. Department of Computer Science Special PhD Super-Colloquium, Cornell University, Ithaca, New York, March 9, 1995. Reflective Newton methods for large-scale optimization. Center for Computational Engineering, Sandia National Laboratories, Livermore, California, March 24, 1995. ___. Center for Research on Parallel Computation. Rice University, Houston, Texas, April 6, 1995. ___. The MathWorks, Natick, Massachusetts, April 14, 1995.
Cooper, D. A. The design and implementation of a private message service for mobile computers. Computer Science Laboratory, SRI International, Menlo Park, California, May 5, 1995. ___. Digital Equipment Corporation, Systems Research Center, Palo Alto, California, May 11, 1995. ___. Department of Computer Science, University of Maryland Baltimore County, Baltimore, Maryland, May 15, 1995. Preserving privacy in a network of mobile computers. 1995 IEEE Symposium on Security and Privacy, Oakland, California, May 8, 1995.
Guo, K. H. A scalable client-server protocol in Horus. INESC, Lisbon, Portugal, January 19, 1995.
Gupta, S. Compiled logic simulation by compiling circuit behavior. Viewlogic Inc., January 3, 1995.
Ho, P-H. Automatic analysis of hybrid systems. AT&T Bell Labs, Murray Hill, New Jersey, Feb. 8, 1995. ___. Stanford University, Palo Alto, California, March 14, 1995. ___. University of Pennsylvania, Philadelphia, Pennsylvania, April 10, 1995. ___. Texas Instruments, Dallas, Texas, April 20, 1995. Automatic verification of timed circuits. Odyssey Research Associates, Ithaca, New York, November 3, 1994. HyTech: the Cornell HYbrid TECHnology tool. Workshop on Tools and Algorithms for the Construction and Analysis of Systems, Aarhus, Denmark, May 19, 1995.
Hoppe, B. A polynomial-time algorithm for evacuation. ACM-SIAM Symposium on Discrete Algorithms, San Francisco, California, January 1995. ___. Fall Research Forum, Cornell Partnership for Computer Science Research, Cornell University, Ithaca, New York, October 1994. ___. International Symposium on Mathematical Programming, Ann Arbor, Michigan, August 1994.
Hunt, G. H. Multicast flow control on local area networks. ISIS Distributed Systems, Ithaca, New York, September 9, 1994. ___. Stratus, Marlborough, Massachusetts, October 7, 1994. ___. Martin Marietta Advanced Technology Lab, Moorestown, New Jersey, October 21, 1994. ___. Lawrence Livermore Laboratories, Livermore, California, November 4, 1994. ___. Sandia National Laboratories, Albuquerque, New Mexico, November 7, 1994. ___. IBM T.J. Watson Research Center, Hawthorne, New York, February 14-15, 1995.
Kodukula, I. Imperfectly nested loop transforms and applications. Hewlett-Packard, Chelmsford, Massachusetts, February 1995.
Kopke. P. Verification methods for the divergent runs of clock systems. The 3rd Symposium on Formal Techniques in Real-Time and Fault-Tolerant Systems, Lubeck, Germany, September 1994 (with T. Henzinger). Undecidability results for hybrid systems. The Workshop on Hybrid Systems and Autonomous Control, Ithaca, New York, October 1994 (with T. Henzinger). What’s decidable about hybrid automata? The 27th Symposium on Theory of Computing, Las Vegas, Nevada, May 1995. (with T. Henzinger, A. Puri, and P. Varaiya).
Kotlyar, V. The Bernouli project: from PDEs to gigaflops. Mid-Atlantic Programming Languages Conference, East Stroudsburg University, Pennsylvania, April 8, 1995.
Liu, Y. A. Deriving incremental programs. Kestrel Institute, Palo Alto, California, July 1, 1994. Caching intermediate results for program improvement. ACM SIGPLAN Symposium on Partial Evaluation and Semantics-Based Program Manipulation, La Jolla, California, June 23, 1995.
Scharstein, D. Stereo vision: perceiving depth with the computer. Middlebury College, Vermont, November 15, 1994. A hitchhikers guide to the information superhighway. Middlebury College, Vermont, January 5-31, 1995 (with Amy Briggs).
Singhal, A. Automatic information retrieval. A tutorial presented at the 5th Annual IEEE Dual-Use Technologies and Applications Conference, Utica, NY, May 22-25, 1995.
Stefansson, K. Systems of set constraints with negative constraints are NEXPTIME-complete. 9th Symposium Logic in Computer Science, Cornell University, Ithaca, New York, July 3-7 1994.
Stoller, S. Storage replication and layout in video-on-demand servers. 5th International Workshop on Network and Operating System Support for Digital Audio and Video (NOSSDAV ‘95), Durham, NH, USA, April 21, 1995.
Summers, K. M. Automatic derivation of logical document hierarchies. University of Western Ontario, Canada, October 27, 1994.
Weber, S. Vox populi: Consumer Reports meets the information highway. Xerox PARC, Palo Alto, California, August 24, 1994. A practical methodology for specification and verification. Sandia Research Laboratories, Albuquerque, New Mexico, April 7, 1995. ___. University of Kansas, Lawrence, Kansas. April 13, 1995. ___. University of Cincinnati, Cincinnati, Ohio. April 17, 1995.
If you have questions or comments please contact: email@example.com.