Publications

Found 245 results
[ Author(Asc)] Title Type Year
Filters: First Letter Of Last Name is G  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
G
Gordo, B. (2015).  Guidelines for Socially Responsible, Inclusive Privacy Education. IEEE MultiMedia. 22(1), 13.
Gopalacharyulu, P. V., Velagapudi V.. R., Lindfors E., Halperin E., & Orešič M. (2009).  Dynamic Network Topology Changes in Functional Modules Predict Responses to Oxidative Stress in Yeast. Molecular BioSystems. 5(3), 276-287.
Good, N., Grossklags J.., Dhamija R.., & Thaw D. (2005).  Stopping Spyware at the Gate: A User Study of Privacy, Notice, and Spyware. Proceedings of the Symposium On Usable Privacy and Security (SOUPS 2005). 43-52.
Gonzalez, J. Maria, & Paxson V. (2006).  Enhancing Network Intrusion Detection With Integrated Sampling and Filtering. Proceedings of the 9th International Syposium on Recent Advances in Intrusion Detection (RAID 2006). 272-289.
Gonzalez, J. Maria, Paxson V., & Weaver N. (2007).  Shunting: A Hardware/Software Architecture for Flexible, High-Performance Network Intrusion Prevention. Proceedings of 14th Annual ACM Computer and Communication Security Conference (ACM CCS 2008). 139-149.
Gonzalez, J. Maria, & Paxson V. (2003).  Pktd: A Packet Capture and Injection Daemon. Proceedings of Passive and Active Measurement Workshop (PAM-2003). 87-96.
Gonina, E., Friedland G., Battenberg E., Koanantakool P., Driscoll M., Georganas E., et al. (2014).  Scalable Multimedia Content Analysis on Parallel Platforms Using Python. ACM Transactions on Multimedia Computing. 10(2), 
Gonina, E., Friedland G., Cook H., & Keutzer K. (2011).  Fast Speaker Diarization Using a High-Level Scripting Language.
Gomila, A., & Amengual A. (2009).  Moral Emotions for Autonomous Agents. 166-179.
Gómez-Skarmeta, A., & Ruiz P. M. (2005).  Redes Ad hoc, Comunicaciones Multimedia y Control de Acceso en el Marco del Proyecto SAM. Proceedings of the V Jornadas de Ingenieria Telematica.
Gomes, B., Weissman B., & Feldman J. (1998).  Parallelizing Connectionist Networks for Pattern Recognition: A Library Approach. Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications (PDPTA ’98).
Gomes, B., Weissman B., & Feldman J. (1998).  Active Threads: Enabling Fine-Grained Parallelism in Object-Oriented Languages. Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications (PDPTA ’98).
Gomes, B., Stoutamire D., Weissman B., & Feldman J. (1997).  Using Value Semantic Abstractions to Guide Strongly Typed Library Design.
Gomes, B., Stoutamire D., & Weissman B. (1997).  Type-Safety and Overloading in Sather.
Gomes, B., Löwe W., Quittek J. W., & Weissman B. (1997).  Sather 2: A Language Design for Safe, High-Performance Computing.
Goldwasser, S., & Ostrovsky R. (1992).  Invariant Signatures and Non-Interactive Zero-Knowledge Proofs Are Equivalent.
Goldreich, O., Ostrovsky R., & Petrank E. (1994).  Computational Complexity and Knowledge Complexity.
Goldreich, O. (1989).  A Note on Computational Indistinguishability.
Goldreich, O., & Ostrovsky R. (1993).  Software Protection and Simulation on Oblivious RAMs.
Goldmann, M., & Karpinski M. (1992).  Simulating Threshold Circuits by Majority Circuits.
Goldmann, M., & Karpinski M. (1994).  Simulating Threshold Circuits by Majority Circuits (Extended Version).
Gold, B., Morgan N., & Ellis D. P. W. (2011).  Speech and Audio Signal Processing: Processing and Perception of Speech and Music, 2nd Edition.
Gold, B., & Morgan N. (1999).  Speech and Audio Signal Processing.
Göhring, D., Latotzky D., Wang M., & Rojas R. (2012).  Semi-Autonomous Car Control Using Brain Computer Interfaces. 393-408.
Göhring, D., Hoffman J., Rodner E., Saenko K., & Darrell T. (2014).  Interactive Adaptation of Real-Time Object Detectors.

Pages