Publications

Found 214 results
[ Author(Asc)] Title Type Year
Filters: First Letter Of Last Name is H  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
H
Handley, M., Floyd S., Padhye J., & Widmer J. (2003).  RFC 3448: TCP Friendly Rate Control (TFRC): Protocol Specification.
Handley, M., & Floyd S. (1998).  Strawman Specification for TCP Friendly (Reliable) Multicast Congestion Control (TFMCC).
Handley, M., Kreibich C., & Paxson V. (2001).  Network Intrusion Detection: Evasion, Traffic Normalization, and End-to-End Protocol Semantics (HTML). Proceedings of USENIX Security Symposium 2001.
Handley, M., Floyd S., Whetten B., Kermode R., Vicisano L., & Luby M. (2000).  The Reliable Multicast Design Space for Bulk Data Transfer.
Handley, M., Crowcroft J., Bormann C.., & Ott J.. (1998).  Very Large Conferences on the Internet: the Internet Multimedia Conferencing Architecture.
Handley, M., Padhye J., & Floyd S. (1999).  TCP Congestion Window Validation.
Handley, M., & Crowcroft J. (1997).  Network Text Editor (NTE): A scalable shared text editor for the MBone. Proceedings of the Annual Conference of the Association for Computing Machinery's Special Interest Group on Data Communication (ACM SIGCOMM '97).
Handley, M., Floyd S., & Padhye J. (2000).  TCP Congestion Window Validation.
Handley, M. (1998).  Session Directories and Scalable Internet Multicast Address Allocation. Proceedings of the Annual Conference of the Association for Computing Machinery's Special Interest Group on Data Communication (ACM SIGCOMM 98).
Han, C., Reyes I., Bar On A. Elazari, Reardon J., Feal Á., Bamberger K. A., et al. (2019).  Do You Get What You Pay For? Comparing The Privacy Behaviors of Free vs. Paid Apps. Proceedings of the Workshop on Technology and Consumer Protection (ConPro 2019).
Hampton, M.., & Asanović K. (2008).  Compiling for Vector-Thread Architectures. 205-215.
Hambrusch, S. E., & Luby M. (1989).  Parallel Asynchronous Connected Components in a Mesh.
Hambrusch, S. E., & TeWinkel L. (1989).  Parallel Heuristics for the Steiner Tree Problem in Images without Sorting or Routing.
Hamann, C. M., & Chtcherbanski L. (1997).  Positional Logic Algebra - PLA - A Fascinating Alternative Approach.
Halvorson, T., Szurdi J., Maier G., Felegyhazi M., Kreibich C., Weaver N., et al. (2012).  The BIZ Top-Level Domain: Ten Years Later.
Halperin, E., Kimmel G., & Shamir R. (2005).  Tag SNP Selection in Genotype Data for Maximizing SNP Prediction Accuracy. Proceedings of the 13th Annual International Conference on Intelligent Systems for Molecular Biology (ISMB 2005). 195-203.
Halperin, E., & Eskin E. (2002).  Large-Scale Recovery of Haplotypes from Genotype Data Using Imperfect Phylogeny.
Halperin, E., & Karp R. M. (2004).  Perfect Phylogeny and Haplotype Assignment. Proceedings of RECOMB.
Halperin, E., & Stephan D. A. (2009).  Maximizing Power in Association Studies. Nature Biotechnology. 27(3), 255-256.
Halperin, E., Buhler J., Karp R. M., Krauthgamer R., & Westover B. P. (2003).  Detecting Protein Sequences via Metric Embeddings. Proceedings of the 11th International Conference on Intelligent Systems for Molecular Biology (ISMB). 122-129.
Halperin, E., & Hazan E. (2005).  Estimating Haplotype Frequencies Efficiently. Proceedings of the 9th Annual International Conference on Research in Computational Molecular Biology (RECOMB'05). 553-568.
Halperin, E., & Karp R. M. (2005).  The Minimum-Entropy Set Cover Problem. Theoretical Computer Science. 348(2), 240-250.
Halperin, E., & Eskin E. (2004).  Haplotype Reconstruction from Genotype Data Using Imperfect Phylogeny. Bioinformatics.
Halperin, E. (2010).  Deciphering the Genetic Components of Human Diseases.
Halperin, E., & Krauthgamer R. (2003).  Polylogarithmic Inapproximability. Proceedings of the 35th Annual ACM Symposium on Theory of Computing (STOC).

Pages