default search action
Ernst L. Leiss
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [c39]Mohammad Javadi, Rishabh Sharma, Panagiotis Tsiamyrtzis, Shishir Shah, Ernst L. Leiss, Nikolaos V. Tsekos:
From Perception to Precision: Navigating Perceptual Loss in MRI Super-Resolution. BIBE 2023: 57-61 - 2021
- [j48]Jose D. Velazco Garcia, Dipan J. Shah, Ernst L. Leiss, Nikolaos V. Tsekos:
A modular and scalable computational framework for interactive immersion into imaging data with a holographic augmented reality interface. Comput. Methods Programs Biomed. 198: 105779 (2021) - [j47]Cristina Marie Morales Mojica, Jose D. Velazco Garcia, Eleftherios P. Pappas, Theodosios Birbilis, Aaron T. Becker, Ernst L. Leiss, Andrew G. Webb, Ioannis Seimenis, Nikolaos V. Tsekos:
A Holographic Augmented Reality Interface for Visualizing of MRI Data and Planning of Neurosurgical Procedures. J. Digit. Imaging 34(4): 1014-1025 (2021) - 2020
- [c38]Jose D. Velazco Garcia, Nikhil V. Navkar, Shidin Balakrishnan, Julien Abinahed, Abdulla Al-Ansari, Adham Darweesh, Khalid Al-Rumaihi, Eftychios G. Christoforou, Ernst L. Leiss, Mansour A. Karkoub, Panagiotis Tsiamyrtzis, Nikolaos V. Tsekos:
Evaluation of Interventional Planning Software Features for MR-guided Transrectal Prostate Biopsies. BIBE 2020: 951-954
2010 – 2019
- 2019
- [c37]Jose D. Velazco Garcia, Ernst L. Leiss, Mansour A. Karkoub, Panagiotis Tsiamyrtzis, Nikolaos V. Tsekos, Nikhil V. Navkar, Shidin Balakrishnan, Julien Abinahed, Abdulla Al-Ansari, Georges Younes, Adham Darweesh, Khalid Al-Rumaihi, Eftychios G. Christoforou:
Preliminary Evaluation of Robotic Transrectal Biopsy System on an Interventional Planning Software. BIBE 2019: 357-362 - [c36]Cristina Marie Morales Mojica, Nikolaos V. Tsekos, Jose Daniel Velazco Garcia, Haoran Zhao, Ioannis Seimenis, Ernst L. Leiss, Dipan J. Shah, Andrew G. Webb, Aaron T. Becker, Panagiotis Tsiamyrtzis:
Interactive and Immersive Image-Guided Control of Interventional Manipulators with a Prototype Holographic Interface. BIBE 2019: 1002-1005 - [c35]Mohammed Awad, Khouloud Salameh, Ernst L. Leiss:
Evaluating Learning Management System Usage at a Small University. ICISDM 2019: 98-102 - 2018
- [j46]Jose Daniel Velazco Garcia, Mohammed Awad, Ernst L. Leiss:
Randomization of Statistical Queries of Type Median: A Simulation Approach. J. Comput. Sci. 14(1): 67-80 (2018) - [j45]Ernst L. Leiss, Isaac Mackey:
The worst parallel Hanoi graphs. Theor. Comput. Sci. 705: 1-8 (2018) - [c34]Mohammed Awad, Ernst L. Leiss:
Did Technology Fail Us?: Security Concerns in Safeguarding Democracy. ICEGOV 2018: 626-630 - [c33]Cristina Marie Morales Mojica, Jose D. Velazco Garcia, Nikhil V. Navkar, Shidin Balakrishnan, Julien Abinahed, Walid El Ansari, Khalid Al-Rumaihi, Adham Darweesh, Abdulla Al-Ansari, Mohamed Gharib, Mansour A. Karkoub, Ernst L. Leiss, Ioannis Seimenis, Nikolaos V. Tsekos:
A Prototype Holographic Augmented Reality Interface for Image-Guided Prostate Cancer Interventions. VCBM@MICCAI 2018: 17-21 - 2017
- [c32]Ernst L. Leiss:
Is Complementation Evil? The Role of Theory in Computer Science 2017: 121-134 - 2015
- [j44]Rakesh M. Verma, Murat Kantarcioglu, David J. Marchette, Ernst L. Leiss, Thamar Solorio:
Security Analytics: Essential Data Analytics Knowledge for Cybersecurity Professionals and Students. IEEE Secur. Priv. 13(6): 60-65 (2015) - [c31]Reza Fathi, Mohsen Amini Salehi, Ernst L. Leiss:
User-Friendly and Secure Architecture (UFSA) for Authentication of Cloud Services. CLOUD 2015: 516-523 - [c30]Wenyaw Chan, George Cybenko, Murat Kantarcioglu, Ernst L. Leiss, Thamar Solorio, Bhavani Thuraisingham, Rakesh M. Verma:
Panel: Essential Data Analytics Knowledge forCyber-security Professionals and Students. IWSPA@CODASPY 2015: 55-57 - 2014
- [j43]Adrian Ionescu, Ernst L. Leiss:
On the role of complementation in implicit language equations and relations. J. Comput. Syst. Sci. 80(2): 457-467 (2014) - [c29]Ernst L. Leiss, Lila Ghemri:
Privacy between technological capabilities and society's expectations (abstract only). SIGCSE 2014: 727 - 2013
- [j42]Ernst L. Leiss:
The worst Hanoi graphs. Theor. Comput. Sci. 498: 100-106 (2013) - [c28]Mohammed Awad, Ernst L. Leiss:
End-to-End cryptographic voting: Potentials and limitations. ICITST 2013: 113-118 - [c27]Emil Bilgazyev, Ilyas Uyanik, Mahmut Unan, Dipan J. Shah, Nikolaos V. Tsekos, Ernst L. Leiss:
Using motion correction to improve real-time cardiac MRI reconstruction. ICMV 2013: 90671I - [c26]Emil Bilgazyev, Erol Yeniaras, Ilyas Uyanik, Mahmut Unan, Ernst L. Leiss:
Sparse representation based face recognition using weighted regions. ICMV 2013: 90671K - [c25]Emil Bilgazyev, Erol Yeniaras, Ilyas Uyanik, Mahmut Unan, Ernst L. Leiss:
Quality enhancement of low-resolution image by using natural images. ICMV 2013: 90671L - 2012
- [j41]José Aguilar, John Atkinson, Yezid Donoso, David Fernández-Baca, Ernst L. Leiss, Gabriela Marín, Luciana Porcher Nedel, Oscar Pastor:
Preface to CLEI 2011 Special Issue. CLEI Electron. J. 15(2) (2012) - [j40]Eric J. Stotzer, Ernst L. Leiss:
Co-design of Compiler and Hardware Techniques to Reduce Program Code Size on a VLIW Processor. CLEI Electron. J. 15(2) (2012) - 2011
- [c24]Ernst L. Leiss, Rodrigo M. Santos:
Preface. CLEI Selected Papers 2011: 1-4 - [e3]Ernst L. Leiss, Rodrigo M. Santos:
XXXVII Latin American Computer Conference - Selected Papers, CLEI 2011 Selected Papers, Quito, Ecuador, October 10-14, 2011. Electronic Notes in Theoretical Computer Science 281, Elsevier 2011 [contents]
2000 – 2009
- 2009
- [c23]Eric Stotzer, Ernst L. Leiss:
Modulo scheduling without overlapped lifetimes. LCTES 2009: 1-10 - [c22]Eric Stotzer, Ernst L. Leiss, Elana D. Granston, David Hoyle:
Prototyping and Programming Tightly Coupled Accelerators. PARCO 2009: 720-727 - 2008
- [c21]Blanca Z. Abraham, José Aguilar, Ernst L. Leiss:
Middleware for Improving Security in a Component Based Software Architecture. NCM (1) 2008: 502-509 - [p1]Barbara M. Chapman, Ernst L. Leiss:
Optimizing Compilers. Wiley Encyclopedia of Computer Science and Engineering 2008 - 2007
- [b2]Ernst L. Leiss:
A programmer's companion to algorithm analysis. Chapman&Hall/CRC Press 2007, ISBN 978-1-58488-673-0, pp. 1-255 - [j39]Ernst L. Leiss, José Carlos Maldonado:
Best Papers from the 2006 CLEI Conference, Santiago, Chile, August, 2006. CLEI Electron. J. 10(2) (2007) - [e2]Ernst L. Leiss:
Proceedings of the 4th International IFIP/ACM Latin American Networking Conference, LANC 2007, San José, Costa Rica, October 10-11, 2007. ACM 2007, ISBN 978-1-59593-907-4 [contents] - 2006
- [c20]Edward M. Robinson, Ernst L. Leiss:
Applying Genetic Algorithms to Convoy Scheduling. IFIP AI 2006: 315-323 - [c19]Ernst L. Leiss:
Safeguarding the Transmission of Biometric Measurements Used for Authenticating Individuals. Net-Con 2006: 19-26 - 2005
- [j38]Ernst L. Leiss:
Time-Variant Watermarking of MPEG-Compressed Digital Videos. CLEI Electron. J. 8(1) (2005) - [j37]José Aguilar, Ernst L. Leiss:
Parallel Loop Scheduling Approaches for Distributed and Shared Memory Systems. Parallel Process. Lett. 15(1-2): 131-152 (2005) - [c18]Ling-Hua Chang, Ernst L. Leiss:
Compiler Techniques for Data Driven Languages with Superlinear Speed-up. SEKE 2005: 543-549 - [e1]Ernst L. Leiss:
3rd International Latin American Networking Conference, LANC 2005, Sponsored by IFIP TC6 Communication Networks and ACM SIGCOMM, Organized by CLEI (Centro Latino-Americano de Estudios en Informática), Cali, Colombia, October 10-13, 2005. ACM 2005, ISBN 1-59593-008-6 [contents] - 2004
- [j36]José Aguilar, Ernst L. Leiss:
An Adaptive Coherence Replacement Protocol for Web Proxy Cache System. Computación y Sistemas 8(1) (2004) - [j35]José Aguilar, Ernst L. Leiss:
Data dependent loop scheduling based on genetic algorithms for distributed and shared memory systems. J. Parallel Distributed Comput. 64(5): 578-590 (2004) - 2003
- [j34]José Aguilar, Ernst L. Leiss:
Optimal scheduling of loops with dependence cycles on parallel platforms. Comput. Syst. Sci. Eng. 18(4): 201-208 (2003) - [j33]José Aguilar, Ernst L. Leiss:
A Cache Memory System based on a Dynamic/Adaptive Replacement Approach. Rev. Colomb. de Computación 4(1) (2003) - 2002
- [c17]Lorraine E. P. Williams, R. Bowen Loftin, Hal A. Aldridge, Ernst L. Leiss, William Bluethmann:
Kinesthetic and Visual Force Display for Telerobotics. ICRA 2002: 1249-1254 - [c16]Ching-Yao Lin, David T. Chen, R. Bowen Loftin, Jian Chen, Ernst L. Leiss:
Interacting with Visible Human Data Using an ImmersaDesk. VR 2002: 267-268 - 2001
- [c15]Lawrence K. Miller, Ernst L. Leiss:
Bandwidth Reallocation Techniques for Admitting High Priority Real-Time Calls in ATM Networks. ICN (1) 2001: 549-558 - [c14]José Aguilar, Ernst L. Leiss:
A General Adaptive Cache Coherency-Replacement Scheme for Distributed Systems. IICS 2001: 116-125 - [c13]José Aguilar, Ernst L. Leiss:
A Web Proxy Cache Coherency and Replacement Approach. Web Intelligence 2001: 75-84 - 2000
- [j32]Sangman Bak, Jorge Arturo Cobb, Ernst L. Leiss:
Performance Evaluation of Load-Balanced Routing via Bounded Randomization. CLEI Electron. J. 3(2) (2000) - [c12]Sangman Bak, Albert Mo Kim Cheng, Jorge Arturo Cobb, Ernst L. Leiss:
Load-Balanced Routing and Scheduling for Real-Time Traffic in Packet-Switch Networks. LCN 2000: 634-643 - [c11]Wendy Zhang, Ernst L. Leiss:
Block Mapping - A Compiler Driven I/O Management Study. PDPTA 2000
1990 – 1999
- 1999
- [b1]Ernst L. Leiss:
Language equations. Monographs in Computer Science, Springer 1999, ISBN 978-0-387-98626-5, pp. I-XVI, 1-216 - [c10]Sangman Bak, Jorge Arturo Cobb, Ernst L. Leiss:
Hierarchical load-balanced routing via bounded randomization. ICCCN 1999: 589-594 - [c9]Eric Stotzer, Ernst L. Leiss:
Modulo Scheduling for the TMS320C6x VLIW DSP Architecture. Workshop on Languages, Compilers, and Tools for Embedded Systems 1999: 28-34 - 1998
- [j31]Ernst L. Leiss, Yili Wang:
User-Level Parallel File I/O. CLEI Electron. J. 1(1) (1998) - [j30]Ernst L. Leiss, Jianyu You:
Firewall Monitoring. CLEI Electron. J. 1(1) (1998) - 1997
- [j29]Ernst L. Leiss:
Solving Systems of Explicit Language Relations. Theor. Comput. Sci. 186(1-2): 83-105 (1997) - [j28]Ivo Majetic, Ernst L. Leiss:
Authorization and Revocation in Object-Oriented Databases. IEEE Trans. Knowl. Data Eng. 9(4): 668-672 (1997) - [c8]Edward M. Robinson, Dan Davison, Ernst L. Leiss:
I/O Minimization in a Genetic Sequencing Framework. PDPTA 1997: 868-873 - 1996
- [c7]Shong-Tun Li, Ernst L. Leiss:
Constructing stochastic networks via β-RBF networks. ICNN 1996: 19-24 - 1995
- [j27]Ernst L. Leiss, Jurij Jaklic:
Comparing Inference Control Mechanisms for Statistical Databases with Emphasis on Randomizing. Informatica (Slovenia) 19(2) (1995) - [j26]Qingzhou Wang, Ernst L. Leiss:
A Heuristic Scheduling of Independent Tasks with Bottleneck Resource Constraints. SIAM J. Comput. 24(2): 235-241 (1995) - [j25]Ernst L. Leiss:
Implicit Language Equations: Existence and Uniqueness of Solutions. Theor. Comput. Sci. 145(1&2): 71-93 (1995) - [c6]Sheng-Tun Li, Ernst L. Leiss:
Towards positive-breakdown radial basis function networks. ICTAI 1995: 98-105 - 1994
- [j24]Hari N. Reddy, Ernst L. Leiss:
An O(log N) Algorithm to Solve Linear Recurrences on Hypercubes. Inf. Process. Lett. 49(6): 319-325 (1994) - [j23]Ernst L. Leiss:
Language Equations Over a One-Letter Alphabet with Union, Concatenation and Star: A Complete Solution. Theor. Comput. Sci. 131(2): 311-330 (1994) - [j22]Ernst L. Leiss:
Unrestricted Complementation in Language Equations Over a One-Letter Alphabet. Theor. Comput. Sci. 132(2): 71-84 (1994) - 1993
- [j21]I-Ling Yen, Ernst L. Leiss, Farokh B. Bastani:
Exploiting redundancy to speed up parallel systems. IEEE Parallel Distributed Technol. Syst. Appl. 1(3): 51-60 (1993) - 1992
- [c5]Ernst L. Leiss, L.-T. Shih:
Autotasking on the CRAY Y-MP: a performance evaluation on seismic codes. SAC 1992: 825-830 - 1991
- [j20]Ernst L. Leiss, Hari N. Reddy:
Embedding Complete Binary Trees Into Hypercubes. Inf. Process. Lett. 38(4): 197-199 (1991) - [j19]Marek Rusinkiewicz, Ernst L. Leiss:
Evaluation of timestamp-based concurrency control mechanisms incorporating livelock avoidance. Inf. Sci. 55(1-3): 1-26 (1991) - [j18]Ernst L. Leiss:
Some comments on a recent note by Ravikumar. SIGACT News 22(1): 64 (1991) - [c4]I-Ling Yen, Farokh B. Bastani, Ernst L. Leiss:
An Inherently Fault Tolerant Sorting Algorithm. IPPS 1991: 37-42 - 1990
- [j17]Ernst L. Leiss, Raj H. Thapar:
Three-Dimensional Dip Moveout On the Sx-2: an XMU Implementation. Int. J. High Perform. Comput. Appl. 4(1): 31-48 (1990) - [c3]I-Ling Yen, Farokh B. Bastani, T. Al-Marzooq, Ernst L. Leiss:
High performance massively parallel abstract data type components. COMPSAC 1990: 196-201
1980 – 1989
- 1989
- [j16]Ernst L. Leiss:
More on minimal finite automata. Bull. EATCS 37: 151 (1989) - 1988
- [j15]Ernst L. Leiss:
On the Degree of Dominator Trees. Inf. Process. Lett. 29(4): 199-200 (1988) - 1987
- [j14]Ernst L. Leiss:
On testing for immutability of codes. IEEE Trans. Inf. Theory 33(6): 934-938 (1987) - [c2]Farokh B. Bastani, Ernst L. Leiss:
On the overall reliability of hardware/software systems. FJCC 1987: 528-533 - 1986
- [j13]Ernst L. Leiss, C. Jitmedha:
Horizontally and Vertically Bounded Propagation of Privileges. Inf. Process. Lett. 22(6): 319-327 (1986) - [j12]Ernst L. Leiss:
The Inaccessible Set: A Classification by Query Type of Security Risks in Statistical Database. Inf. Process. Lett. 23(6): 275-279 (1986) - [j11]Ernst L. Leiss:
Generalized Language Equations with Multiple Solutions. Theor. Comput. Sci. 44: 155-174 (1986) - 1985
- [j10]Ernst L. Leiss:
On Classes of Tractable Unrestricted Regular Expressions. Theor. Comput. Sci. 35: 313-327 (1985) - [j9]Ernst L. Leiss:
Succinct Representation of Regular Languages by Boolean Automata II. Theor. Comput. Sci. 38: 133-136 (1985) - [j8]Ernst L. Leiss:
On Solving Star Equations. Theor. Comput. Sci. 39: 327-332 (1985) - 1984
- [j7]Ernst L. Leiss:
Data Integrity in Digital Optical Disks. IEEE Trans. Computers 33(9): 818-827 (1984) - 1982
- [c1]Ernst L. Leiss:
Randomizing, A Practical Method for Protecting Statistical Databases Against Compromise. VLDB 1982: 189-196 - 1981
- [j6]Ernst L. Leiss:
The Complexity of Restricted Regular Expressions and the Synthesis Problem for Finite Automata. J. Comput. Syst. Sci. 23(3): 348-354 (1981) - [j5]Ernst L. Leiss:
Succint Representation of Regular Languages by Boolean Automata. Theor. Comput. Sci. 13: 323-330 (1981) - [j4]Ernst L. Leiss:
On Generalized Language Equations. Theor. Comput. Sci. 14: 63-77 (1981) - 1980
- [j3]Ernst L. Leiss:
A Note on a Signature System Based on Probabilistic Logic. Inf. Process. Lett. 11(2): 110-113 (1980) - [j2]Ernst L. Leiss:
Constructing a finite automaton for a given regular expression. SIGACT News 12(3): 81-87 (1980) - [j1]Janusz A. Brzozowski, Ernst L. Leiss:
On Equations for Regular Languages, Finite Automata, and Sequential Networks. Theor. Comput. Sci. 10: 19-35 (1980)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-09 01:15 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint