[1]
J.
Czyzowicz, K. Giorgiou, E. Kranakis, D. Krizanc, L. Narayanan, J.
Opatrny, and S. Shende, “Search on a line by byzantine
robots,” International Journal of Foundations of Computer
Science, vol. 32, no. 4, pp. 369–387, 2021, Available: https://doi.org/10.1142/S0129054121500209
[2]
J.
Czyzowicz, K. Georgiou, R. Killick, E. Kranakis, D. Krizanc, M. Lafond,
L. Narayanan, J. Opatrny, and S. Shende, “Time-energy tradeoffs
for evacuation by two robots in the wireless model,”
Theoretical Computer Science, vol. 852, pp. 61–72, 2021,
Available: https://doi.org/10.1016/j.tcs.2020.11.014
[3]
J.
Czyzowicz, K. Georgiou, R. Killick, E. Kranakis, D. Krizanc, L.
Narayanan, J. Opatrny, and S. Shende, “Priority evacuation from a
disk: The case of n ≥ 4,” Theoretical
Computer Science, vol. 846, pp. 91–102, 2020, Available: https://doi.org/10.1016/j.tcs.2020.09.023
[4]
D.
P. Russo, X. Yan, S. Shende, H. Huang, B. Yan, and H. Zhu,
“Virtual molecular projections and convolutional neural networks
for the end-to-end modeling of nanoparticle activities and
properties,” Analytical Chemistry, vol. 92, no. 20, pp.
13971–13979, 2020, Available: https://pubs.acs.org/doi/abs/10.1021/acs.analchem.0c02878
[5]
B.
S. C. Koritala et al., “Habitat-specific clock variation
and its consequence on reproductive fitness,” Journal of
Biological Rhythms, 2019, Available: https://doi.org/10.1177/0748730419896486
[6]
J.
Czyzowicz, K. Georgiou, R. Killick, E. Kranakis, D. Krizanc, L.
Narayanan, J. Opatrny, and S. Shende, “Priority evacuation from a
disk: The case of n = 1, 2, 3,” Theoretical
Computer Science, vol. 806, pp. 595–616, 2020, Available: https://doi.org/10.1016/j.tcs.2019.09.026
[7]
D.
P. Russo, J. Strickland, A. L. Karmaus, W. Wang, S. Shende, T. Hartung,
L. M. Aleksunes, and H. Zhu, “Non-animal models for acute toxicity
evaluations: Applying data-driven profiling and read-across,”
Environmental Health Perspectives, vol. 127, no. 4, pp. 1–14,
2019, Available: https://doi.org/10.1289/EHP3614
[8]
D.
P. Russo, W. Wang, M. T. Kim, D. Pinolini, S. Shende, J. Strickland, T.
Hartung, and H. Zhu, “CIIPro: A new read-across portal to fill
data gaps using public large scale chemical and biological data,”
Bioinformatics, vol. 33, no. 3, pp. 464–466, 2017, Available:
https://doi.org/10.1093/bioinformatics/btw640
[9]
M.
Eftekhari, E. Kranakis, D. Krizanc, O. Morales-Ponce, L. Narayanan, J.
Opatrny, and S. Shende, “Distributed algorithms for barrier
coverage using relocatable sensors,” Distributed
Computing, vol. 29, no. 5, pp. 361–376, 2016, Available: http://dx.doi.org/10.1007/s00446-016-0267-x
[10]
M.
Golin, J. Iacono, D. Krizanc, R. Raman, S. R. Satti, and S. Shende,
“Encoding 2D range maximum queries,” Theor. Comput.
Sci., vol. 609, pp. 316–327, 2016, Available: http://dx.doi.org/10.1016/j.tcs.2015.10.012
[11]
S.
Dobrev et al., “Complexity of barrier coverage with
relocatable sensors in the plane,” Theor. Comput. Sci.,
vol. 579, pp. 64–73, 2015, Available: http://dx.doi.org/10.1016/j.tcs.2015.02.006
[12]
A.
Ganchev, L. Narayanan, and S. Shende, “A tight characterization of
strategic games with a unique equilibrium,” Theor. Comput.
Sci., vol. 481, pp. 37–50, 2013, Available: http://dx.doi.org/10.1016/j.tcs.2013.02.008
[13]
E.
Kranakis, D. Krizanc, and S. Shende, “Tracking mobile users in
cellular networks using timing information,” Nordic J.
Comput., vol. 14, no. 3, pp. 202–215, 2008.
[14]
A.
Ganchev, L. Narayanan, and S. Shende, “Games to induce specified
equilibria,” Theor. Comput. Sci., vol. 409, no. 3, pp.
341–350, 2008, Available: http://dx.doi.org/10.1016/j.tcs.2008.06.011
[15]
G.
Kortsarz and S. Shende, “An improved approximation of the
achromatic number on bipartite graphs,” SIAM J.
Discrete Math., vol. 21, no. 2, pp. 361–373, 2007, Available: https://dx.doi.org/10.1137/S0895480104442947
[16]
E.
Kranakis, D. Krizanc, and S. Shende, “Approximate hotlink
assignment,” Inf. Process. Lett., vol. 90, no. 3, pp.
121–128, 2004, Available: http://dx.doi.org/10.1016/j.ipl.2004.01.012
[17]
L.
Narayanan and S. M. Shende, “Static frequency assignment in
cellular networks,” Algorithmica, vol. 29, no. 3, pp.
396–409, 2001, Available: http://dx.doi.org/10.1007/s004530010067
[18]
J.
Janssen, D. Krizanc, L. Narayanan, and S. Shende, “Distributed
online frequency assignment in cellular networks,” J.
Algorithms, vol. 36, no. 2, pp. 119–151, 2000, Available: http://dx.doi.org/10.1006/jagm.1999.1068
[19]
N.
Memon, D. L. Neuhoff, and S. Shende, “An analysis of some common
scanning techniques for lossless image coding,”
IEEE Transactions on Image Processing, vol. 9, no.
11, pp. 1837–1848, 2000, Available: http://dx.doi.org/10.1109/83.877207
[20]
B.
Narahari, S. Shende, R. Simha, and S. R. Subramanya, “Routing and
scheduling I/O transfers on wormhole-routed mesh
networks,” J. Parallel Distrib. Comput., vol. 57, no. 1,
pp. 1–13, 1999, Available: http://dx.doi.org/10.1006/jpdc.1998.1506
[21]
T.
Feder and S. M. Shende, “Online channel allocation in
FDMA networks with reuse constraints,” Inf.
Process. Lett., vol. 67, no. 6, pp. 295–302, 1998, Available: http://dx.doi.org/10.1016/S0020-0190(98)00126-4
[22]
L.
Narayanan and S. Shende, “Partial characterizations of networks
supporting shortest path interval labeling schemes,”
Networks, vol. 32, no. 2, pp. 103–113, 1998, Available: https://doi.org/10.1002/(SICI)1097-0037(199809)32:2<103::AID-NET3>3.0.CO;2-F
[23]
B.
Narahari, S. Shende, and R. Simha, “Efficient algorithms for
erasure node placement on slotted dual bus networks,”
IEEE/ACM Transactions on Networking, vol. 4, no.
5, pp. 779–784, 1996, Available: http://dx.doi.org/10.1109/90.541325
[24]
M.
A. Palis and S. M. Shende, “Pumping lemmas for the control
language hierarchy,” Mathematical Systems Theory, vol.
28, no. 3, pp. 199–213, 1995, Available: http://dx.doi.org/10.1007/BF01303055
[25]
M.
A. Palis, J.-C. Liou, S. Rajasekaran, S. Shende, and D. S. L. Wei,
“Online scheduling of dynamic trees,” Parallel
Processing Letters, vol. 5, pp. 635–646, 1995, Available: http://dx.doi.org/10.1142/S0129626495000564
[26]
J.
Y.-T. Leung and S. M. Shende, “On multidimensional packet routing
for meshes with buses,” J. Parallel Distrib. Comput.,
vol. 20, no. 2, pp. 187–197, 1994, Available: http://dx.doi.org/10.1006/jpdc.1994.1018
[27]
D.
Krizanc, S. Rajasekaran, and S. M. Shende, “A comparison of meshes
with static buses and half-duplex wrap-arounds,” Parallel
Processing Letters, vol. 3, pp. 109–114, 1993, Available: https://dx.doi.org/10.1142/S0129626493000149
[28]
M.
A. Palis and S. M. Shende, “An NC algorithm for
recognizing tree adjoining languages,” International Journal
of Parallel Programming, vol. 21, no. 2, pp. 151–167, 1992,
Available: http://dx.doi.org/10.1007/BF01408291
[29]
M.
A. Palis and S. M. Shende, “Upper bounds on recognition of a
hierarchy of non-context-free languages,” Theor. Comput.
Sci., vol. 98, no. 2, pp. 289–319, 1992, Available: http://dx.doi.org/10.1016/0304-3975(92)90005-Z
[30]
M.
A. Palis, S. Shende, and D. S. L. Wei, “An optimal linear-time
parallel parser for tree adjoining languages,”
SIAM J. Comput., vol. 19, no. 1, pp. 1–31, 1990,
Available: http://dx.doi.org/10.1137/0219001