Publications

Found 595 results
Author Title [ Type(Desc)] Year
Filters: First Letter Of Last Name is A  [Clear All Filters]
Technical Report
Asanović, K., Beck J., Callahan T. J., Feldman J., Irissou B., Kingsbury B., et al. (1993).  CNS-1 Architecture Specification: A Connectionist Network Supercomputer.
Aberer, K. (1991).  Combinatory Differential Fields: An Algebraic Approach to Approximate Computation and Constructive Analysis.
Albers, S., von Stengel B., & Werchner R. (1995).  A Combined BIT and TIMESTAMP Algorithm for the List Update Problem.
Amengual, A. (2009).  A computational model of attachment secure responses in the Strange Situation.
Weaver, N., & Allman M. (2009).  On Constructing a Trusted Path to the User.
Alfano, M., & Radouniklis N. (1996).  A Cooperative Multimedia Environment with QOS Control: Architectural and Implementation Issues.
Attardi, G., & Flagella T. (1994).  A Customisable Memory Management Framework.
Choi, J., Akkus I. Ekin, Egelman S., Friedland G., Sommer R., Tschantz M. Carl, et al. (2018).  Cybercasing 2.0: You Get What You Pay For.
Adamo, J-M. (1994).  Development of Parallel BLAS with ARCH Object-Oriented Parallel Library, Implementation on CM-5.
Morgan, N., Asanović K., Kingsbury B., & Wawrzynek J. (1990).  Developments in Digital VLSI Design for Artificial Neural Networks.
Ahmad, S., & Omohundro S. (1991).  Efficient Visual Search: A Connectionist Solution.
Domingo-Pascual, J., Albanese A., & Holfelder W. (1995).  Emulation of Traffic Congestion on ATM Gigabit Networks.
Ananthanarayanan, G., Heimerl K., Zaharia M., Demmer M., Koponen T., Tavakoli A., et al. (2009).  Enabling Innovation Below the Communication API.
Asanović, K., & Morgan N. (1991).  Experimental Determination of Precision Requirements for Back-Propagation Training of Artificial Neural Networks.
Krishnan, R., Allman M., Partridge C., & Sterbenz J. P. G. (2002).  Explicit Transport Error Notification (ETEN) for Error-Prone Wireless and Satellite Networks.
Afroz, S., Tschantz M. Carl, Sajid S., Qazi S. Asif, Javed M., & Paxson V. (2018).  Exploring Server-side Blocking of Regions.
Amann, J., Vallentin M., Hall S., & Sommer R. (2012).  Extracting Certificates from Live Traffic: A Near Real Time SSL Notary Service.
Alaou, A. El, & Mahoney M. (2014).  Fast Randomized Kernel Methods With Statistical Guarantees.
Sargent, M., Stack B., Dooner T., & Allman M. (2012).  A First Look at 1 Gbps Fiber-To-The-Home Traffic.
Allman, M. (1997).  Fixing Two BSD TCP Bugs.
Attardi, G., & Simi M. (1993).  A Formalization of Viewpoints.
Allman, M., & Ostermann S. (2000).  FTP Extensions for Variable Protocol Specification.
Alpaydin, E. (1991).  GAL: Networks That Grow When They Learn and Shrink When They Forget.
Alon, N., Karp R. M., Peleg D., & West D. (1991).  A Graph-Theoretic Game and its Application to the k-Server Problem.
Asanović, K., Kingsbury B., Morgan N., & Wawrzynek J. (1991).  HiPNeT-1: A Highly Pipelined Architecture for Neural Network Training.

Pages