Publications

Found 4083 results
[ Author(Asc)] Title Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
A
Albers, S. (1994).  Improved Randomized On-Line Algorithms for the List Update Problem.
Alber, J., Gramm J., Guo J., & Niedermeier R. (2004).  Computing the Similarity of Two Sequences with Nested Arc Annotations. Theoretical Computer Science. 312(2-3), 337-358.
Albanese, A., & Fortino G. (1999).  Robust Transmission of MPEG Video Streams over Lossy Packet-Switching Networks by using PET.
Albanese, A., & Oppliger R. (1999).  Distributed registration and key distribution system and method.
Albanese, A., Blömer J., Edmonds J., & Luby M. (1994).  Priority Encoding Transmission.
Albanese, A., Luby M., Blömer J., & Edmonds J. (2007).  System for packetizing data encoded corresponding to priority levels where reconstructed data corresponds to fractionalized priority level and received franctionalized packets.
Alaou, A. El, & Mahoney M. W. (2014).  Fast Randomized Kernel Methods With Statistical Guarantees.
Al-Qudah, Z., Rabinovich M., & Allman M. (2010).  Web Timeouts and Their Implications.
Al-Qudah, Z., Alzoubi H. A., Allman M., Rabinovich M., & Liberatore V. (2009).  Efficient Application Placement in a Dynamic Hosting Platform. 281-290.
Al-Fares, M.., Radhakrishnan S., Raghavan B., Huang N.., & Vahdat A. (2010).  Hedera: Dynamic Flow Scheduling for Data Center Networks.
Akkus, I. Ekin, & Weaver N. (2015).  The Case for a General and Interaction-Based Third-Party Cookie Policy.
Akhawe, D., Amann J., Vallentin M., & Sommer R. (2013).  Here's My Cert, So Trust Me, Maybe? Understanding TLS Errors on the Web.
Akella, A., Karp R. M., Papadimitriou C. H., Seshan S., & Shenker S. (2002).  Selfish Behavior and Stability of the Internet: A Gamer-Theoretic Analysis of TCP. Proceedings of ACM Special Interest Group on Data Communications Conference (SIGCOMM 2002). 117-130.
Akella, A., Karp R. M., Papadimitriou C. H., Seshan S., & Shenker S. (2002).  Selfish Behavior and Stability of the Internet: A Gamer-Theoretic Analysis of TCP. ACM SIGCOMM Computer Communication Review. 32(4), 117-130.
Akbacak, M., Vergyri D., Stolcke A., Scheffer N., & Mandal A. (2011).  Effective Arabic Dialect Classification Using Diverse Phonotactic Models. 737-740.
Ajwani, D.., & Friedrich T. (2010).  Average-Case Analysis of Incremental Topological Ordering. Discrete Applied Mathematics. 158(4), 240-250.
Ajmera, J., Bourlard H., Lapidot I., & McCowan I. (2002).  Unknown-Multiple Speaker Clustering Using HMM. Proceedings of the 7th International Conference on Spoken Language Processing (ICSLP 2002).
Ajmera, J., & Wooters C. (2003).  A Robust Speaker Clustering Algorithm. Proceedings of IEEE Speech Recognition and Understanding Workshop.
Ajjanagadde, V., & Shastri L. (1991).  Rules and variables in neural nets. 3,
Aho, A. V., Johnson D. S., Karp R. M., & S. Kosaraju R. (1997).  Emerging Opportunities for Theoretical Computer Science. 28,
Ahmad, S., & Omohundro S. (1991).  Efficient Visual Search: A Connectionist Solution.
Ahmad, S. (1991).  VISIT: An Efficient Computational Model Of Human Visual Attention.
Ahmad, S., & Omohundro S. (1990).  A Network for Extracting the Locations of Point Clusters Using Selective Attention.
Agarwal, D.., & Floyd S. (1994).  A Tool for Debugging Internet Multicast Routing. Proceedings of the 22nd Annual ACM Computer Science Conference (CSC '94).
Afroz, S., Fifield D., Tschantz M. Carl, Paxson V., & Tygar J.D.. (2015).  Censorship Arms Race: Research vs. Practice. Proceedings of the Workshop on Hot Topics in Privacy Enhancing Technologies (HotPETs).

Pages