Publications

Found 595 results
Author [ Title(Asc)] Type Year
Filters: First Letter Of Last Name is A  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
C
Choi, J., Akkus I. Ekin, Egelman S., Friedland G., Sommer R., Tschantz M. Carl, et al. (2018).  Cybercasing 2.0: You Get What You Pay For.
Attardi, G., & Flagella T. (1994).  A Customisable Memory Management Framework.
Althaus, E. (2001).  Curve Reconstruction and the Traveling Salsman Problem..
Adams, A. K., Mahdavi J., Mathis M., & Paxson V. (1998).  Creating a Scalable Architecture for Internet Measurement. Proceedings of the Internet Summit (INET '98).
Amann, J., Hall S., & Sommer R. (2014).  Count Me In: Viable Distributed Summary Statistics for Securing High-Speed Networks.
Alfano, M., & Radouniklis N. (1996).  A Cooperative Multimedia Environment with QOS Control: Architectural and Implementation Issues.
Lee, Y., Krashinsky R., Grover V., Keckler S. W., & Asanović K. (2013).  Convergence and Scalarization for Data-Parallel Architectures.
Atkins, B.. T. S., Rundell M., & Sato H. (2003).  The Contribution of Framenet to Practical Lexicography. International Journal of Lexicography.
Lee, J. W., King M.., & Asanović K. (2007).  Continual Hashing for Efficient Fine-Grain State Inconsistency Checking. 33-40.
Frik, A., Bernd J., & Alomar N. (2019).  The Contextual Preferences of Older Adults on Information Sharing. Proceeding of the 2nd annual Symposium on Applications of Contextual Integrity.
Cohen, M., Franco H., Morgan N., Rumelhart D., & Abrash V. (1993).  Context-Dependent Multiple Distribution Phonetic Modeling. V, 649-657.
Franco, H., Cohen M., Morgan N., Rumelhart D., & Abrash V. (1992).  Context-Dependent Connectionist Probability Estimation in a Hybrid HMM-Neural Net Speech Recognition System. Proceedings of the International Joint Conference on Neural Networks.
Tiwari, M., Mohan P., Osheroff A., Alkaff H., Shi E., Love E., et al. (2012).  Context-Centric Security.
Tiwari, M., Mohan P., Osheroff A., Alkaff H., Shi E., Love E., et al. (2012).  Context-Centric Security.
Weaver, N., & Allman M. (2009).  On Constructing a Trusted Path to the User.
Amir, E., Krathgamer R., & Rao S. (2002).  Constant-Factor Approximation of Vertex-Cuts in Planar Graphs.
Blanton, E., Allman M., Fall K., & Wang L. (2003).  A Conservative Selective Acknowledgment (SACK)-Based Loss Recovery Algorithm for TCP.
Abrash, V., Cohen M., Franco H., Morgan N., & Konig Y. (1992).  Connectionist Gender Adaptation in a Hybrid Neural Network / Hidden Markov Model Speech Recognition System. Proceedings of the International Conference on Spoken Language Processing (ICSLP'92). 911-914.
Liu, D., Allman M., Jin S., & Wang L. (2007).  Congestion Control Without a Startup Phase.
Alber, J., Gramm J., Guo J., & Niedermeier R. (2004).  Computing the Similarity of Two Sequences with Nested Arc Annotations. Theoretical Computer Science. 312(2-3), 337-358.

Pages