Publications

Found 714 results
Author [ Title(Asc)] Type Year
Filters: First Letter Of Last Name is G  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
M
P. Godfrey, B., Shenker S. J., & Stoica I. (2005).  Minimizing Churn in Distributed Systems.
P. Godfrey, B., Shenker S. J., & Stoica I. (2006).  Minimizing Churn in Distributed Systems. Proceedings of ACM Special Interest Group on Data Communications Conference (SIGCOMM 2006). 147-158.
Yago, C.. M., Ruiz P. M., & Gómez-Skarmeta A. (2005).  Metodo de Eliminacion de Reenvios Basado en Contador y Adaptable a la Movilidad para Reducir la Sobrecarga de Datos al Encaminar. Proceedings of the V Jornadas de Ingenieria Telematica.
Alt, H., Guibas L. J., Mehlhorn K., Karp R. M., & Wigderson A. (1991).  A Method for Obtaining Randomized Algorithms with Small Tail Probabilities.
Alt, H., Guibas L. J., Mehlhorn K., & Karp R. M. (1996).  A Method for Obtaining Randomized Algorithms with Small Tail Probabilities. Algorithmica. 16(4-5), 543-547.
Günther, O., & Voisard A. (1996).  Metadata in Geographic and Environmental Data Management.
Hindman, B., Konwinski A., Zaharia M., Ghodsi A., Joseph A. D., Katz R. H., et al. (2011).  Mesos: Flexible Resource Sharing for the Cloud. USENIX ;login:. 36(4), 37-45.
Hindman, B., Konwinski A., Zaharia M., Ghodsi A., Joseph A. D., Katz R. H., et al. (2010).  Mesos: A Platform for Fine-Grained Resource Sharing in the Data Center.
Hindman, B., Konwinski A., Zaharia M., Ghodsi A., Joseph A. D., Katz R. H., et al. (2011).  Mesos: A Platform for Fine-Grained Resource Sharing in the Data Center. 1-14.
Morgan, N., Baron D., Bhagat S., Carvey H., Dhillon R., Edwards J., et al. (2003).  Meetings About Meetings: Research at ICSI on Speech in Multiparty Conversations. Proceedings of ICASSP-2003.
Morgan, N., Baron D., Edwards J., Ellis D. P. W., Gelbart D., Janin A., et al. (2001).  The Meeting Project at ICSI. Proceedings of the Human Language Technologies Conference.
Rizk, R., Marx D.., Schrepfer M.., Zimmermann J.., & Günther O. (2009).  Media Coverage of Online Social Network Privacy Issues in Germany - A Thematic Analysis.
Cabellero, J.., Grier C., Kreibich C., & Paxson V. (2011).  Measuring Pay-per-Install: The Commoditization of Malware Distribution.
Anguita, D., & Gomes B. (1994).  MBP on TO: Mixing Floating- and Fixed-Point Formats in BP Learning.
Ruiz, P. M., & Gómez-Skarmeta A. (2004).  Maximal Source Coverage Adaptive Gateway Discovery for Hybrid Ad Hoc Networks. Lecture Notes in Computer Science. 3158, 28-41.
Gittens, A., Devarakonda A., Racah E., Ringenburg M., Gerhardt L., Kottalam J., et al. (2016).  Matrix Factorization at Scale: a Comparison of Scientific Data Analytics in Spark and C+MPI Using Three Case Studies.
Gittens, A., Devarakonda A., Racah E., Ringenburg M., Gerhardt L., Kottalam J., et al. (2016).  Matrix Factorization at Scale: a Comparison of Scientific Data Analytics in Spark and C+MPI Using Three Case Studies.
Mahoney, M., Duchi J. C., & Gilbert A. C. (2018).  The Mathematics of Data. 25,
Marczak, B., Guarnieri C., Marquis-Boire M., & Scott-Railton J. (2014).  Mapping Hacking Team's "Untraceable" Spyware. The Citizen Lab.
Grier, C., Ballard L., Caballero J., Chachra N., Dietrich C. J., Levchenko K., et al. (2012).  Manufacturing Compromise: The Emergence of Exploit-as-a-Service. 821-832.
Gairing, M. (2008).  Malicious Bayesian Congestion Games. 119-132.
Raghavan, B., Koponen T., Ghodsi A., Brajkovic V., & Shenker S. J. (2012).  Making the Internet More Evolvable.

Pages