#### Filter Results:

- Full text PDF available (10)

#### Publication Year

1980

2008

- This year (0)
- Last 5 years (0)
- Last 10 years (5)

#### Publication Type

#### Co-author

#### Journals and Conferences

#### Key Phrases

Learn More

- David Harel, Amir Pnueli, Jeanette P. Schmidt, Rivi Sherman
- LICS
- 1987

- Jeanette P. Schmidt
- SIAM J. Comput.
- 1998

- Jeanette P. Schmidt, Alan Siegel, Aravind Srinivasan
- SIAM J. Discrete Math.
- 1993

Chernoff-Hoeffding bounds are fundamental tools used in bounding the tail probabilities of the sums of bounded and independent random variables. We present a simple technique which gives slightly better bounds than these, and which more importantly requires only limited independence among the random variables, thereby importing a variety of standard results… (More)

- Jeanette P. Schmidt, Alan Siegel
- SIAM J. Comput.
- 1990

- Susan Flynn Hummel, Jeanette P. Schmidt, R. N. Uma, Joel Wein
- SPAA
- 1996

Jeanette Schmidt~ R. N. Uma$ Joel Wein~ We consider the problem of scheduling a parallel loop with independent iterations on a network of heterogeneous workstations, and demonstrate the effectiveness of a variant of fa.toring, a scheduling policy originating in the context of shared address-space homogeneous multiprocessors. In the new scheme, weighted… (More)

- Gad M. Landau, Eugene W. Myers, Jeanette P. Schmidt
- SIAM J. Comput.
- 1998

The problem of comparing two sequences A and B to determine their longest common subsequence (LCS) or the edit distance between them has been much studied. In this paper we consider the following incremental version of these problems: given an appropriate encoding of a comparison between A and B, can one incrementally compute the answer for A and bB, and… (More)

- Vincent A. Fischetti, Gad M. Landau, Peter H. Sellers, Jeanette P. Schmidt
- Inf. Process. Lett.
- 1993

- Jeanette P. Schmidt, Alan Siegel
- STOC
- 1990

This paper gives the first optimal bounds for classical closed hashing schemes in the case of limited randomness. We thereby establish the first proof of optimality for hashing arbitrarily selected data, by virtually any classical closed scheme, with hash functions that are programmable and initialized by a small number of random bits. Let D = (xl , x 2 , .… (More)

- Jeanette P. Schmidt, Eli Shamir
- Discrete Mathematics
- 1983

- Susan Tang, Jung-Chi Liao, Alexander R Dunn, Russ B Altman, James A Spudich, Jeanette P Schmidt
- Journal of molecular biology
- 2007

We present a computational method that predicts a pathway of residues that mediate protein allosteric communication. The pathway is predicted using only a combination of distance constraints between contiguous residues and evolutionary data. We applied this analysis to find pathways of conserved residues connecting the myosin ATP binding site to the lever… (More)