Publications

Found 101 results
Author Title [ Type(Desc)] Year
Filters: First Letter Of Title is B  [Clear All Filters]
Conference Paper
Heidemann, J., Silva F., Intanagonwiwat C., Govindan R., Estrin D., & Ganesan D. (2001).  Building Efficient Wireless Sensor Networks With Low-Level Naming. Proceedings of the Symposium on Operating Systems Principles.
Popa, L., Egi N.., Ratnasamy S., & Stoica I. (2010).  Building Extensible Networks with Rule-Based Forwarding. 379-391.
Batten, C., Joshi A., Orcutt J., Khilo A., Moss B., Holzwarth C., et al. (2008).  Building Manycore Processor-to-DRAM Networks with Monolithic Silicon Photonics. 21-30.
Tajchman, G., Fosler-Lussier E., & Jurafsky D. (1995).  Building Multiple Pronunication Models for Novel Words using Exploratory Computational Phonology. Proceedings of the Fourth European Conference on Speech Communication and Technology (Eurospeech '95).
Bilmes, J. A. (1999).  Buried Markov Models for Speech Recognition. Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP 1999).
Conference Proceedings
Feldman, J. (1975).  Bad-Mouthing Frames.
Journal Article
Miller, B., Kantchelian A., Tschantz M. Carl, Afroz S., Bachwani R., Faizullabhoy R., et al. (2015).  Back to the Future: Malware Detection with Temporally Consistent Labels. CoRR. abs/1510.07338,
Fillmore, C. J., Johnson C. R., & Petruck M. R. L. (2003).  Background to Framenet. International Journal of Lexicography. 235-250.
Kadanoff, L. P., & Shenker S. (1981).  Band to Band Hopping in One-Dimensional Maps. Journal of Physics A: Mathematical and General. 14(2), L23-26.
Buttyan, L.., Dora L.., Felegyhazi M., & Vajda I.. (2010).  Barter Trade Improves Message Delivery in Opportunistic Networks. Ad Hoc Networks. 8(1), 1-14.
[Anonymous] (2009).  Best Papers from the 10th IEEE International Symposium on Multimedia. (Friedland, G., & Chen S-C., Ed.).International Journal of Semantic Computing. 3,
[Anonymous] (2008).  Best Papers from the Second IEEE International Conference on Semantic Computing (IJSC). (Friedland, G., & Martell C.., Ed.).International Journal of Semantic Computing. 2,
Breslau, L., & Shenker S. (1998).  Best-Effort versus Reservations: A Simple Comparative Analysis. ACM Computer Communication Review. 28, 3-16.
Ziem, A. (2013).  Beyond the Sentence: Towards a Cognitive-Linguistic Approach to Textual Reference. In Yearbook of the Cognitive Linguistic Association. 39-58.
Feigenbaum, J., Papadimitriou C. H., Sami R., & Shenker S. (2005).  A BGP-Based Mechanism for Lowest-Cost Routing. Distributed Computing. 18(1), 61-72.
Karp, R. M., & Zhang Y. (1995).  Bounded branching process and AND/OR tree evaluation. Random Structures and Algorithms. 7(2), 97-116.
Fornasa, M., Stecca M., Maresca M., & Baglietto P. (2015).  Bounded Latency Spanning Tree Reconfiguration. Computer Networks. 76, 259-274.
Bockmayr, A.., & Kasper T.. (1998).  Branch and Infer: A Unifying Framework for Integer and Nite Domain Constraint Programming.
Shue, C., Kalafut A., Allman M., & Taylor C. (2012).  On Building Inexpensive Network Capabilities. ACM SIGCOMM Computer Communication Review. 42(2), 72-79.
Batten, C., Joshi A., Orcutt J., Khilo A., Moss B., Holzwarth C., et al. (2009).  Building Many-Core Processor-to-DRAM Networks with Monolithic CMOS Silicon Photonics. IEEE Micro. 29(4), 8-21.
Allman, M. (2010).  On Building Special-Purpose Social Networks for Emergency Communication. ACM Computer Communication Review. 40,

Pages