Publications

Found 4228 results
[ Author(Asc)] Title Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
W
Wendelken, C., & Shastri L. (2004).  Connectionist Mechanisms for Cognitive Control.
Wendelken, C. (2003).  Shruti-agent: A structured connectionist architecture for reasoning and decision-making.
Wendelken, C. (2002).  The Role of Mid-Dorsolateral Prefrontal Cortex in Working Memory: A Connectionist Model. Neurocomputing. 44-46, 1009-1016.
Wendelken, C., & Shastri L. (2002).  Combining Belief and Utility in a Structured Connectionist Agent Architecture. Proceedings of the 24th Annual Conference of the Cognitive Science Society (CogSci 2002).
Weissman, B. (1997).  Active Threads: An Extensible and Portable Light-Weight Thread System.
Weissman, B., Gomes B., Quittek J. W., & Holtkamp M. (1997).  A Performance Evaluation of Fine Grain Thread Migration with Active Threads.
Weiss, R. J., Mandel M. I., & Ellis D. P. W. (2008).  Source Separation Based on Binaural Cues and Source Model Constraints. 419-422.
Weiser, M., Welch B., Demers A. J., & Shenker S. J. (1994).  Scheduling for Reduced CPU Energy. Proceedings of the First USENIX Symposium on Operating Systems Design and Implementation (OSDI). 13-23.
Weinrib, A., & Shenker S. J. (1988).  Greed is Not Enough: Adaptive Load Sharing in Large Heterogeneous Systems. Proceedings of the Seventh Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE INFOCOM '88). 986-994.
Weihrauch, K. (1992).  The Degrees of Discontinuity of Some Translators Between Representations ofthe Real Numbers.
Wegmann, S., Faria A., Janin A., Riedhammer K., & Morgan N. (2013).  The Tao of ATWV: Probing the Mysteries of Keyword Search Performance.
Wegmann, S., & Gillick L. (2010).  Why Has (Reasonably Accurate) Automatic Speech Recognition Been So Hard to Achieve?.
Webster, M. A., & Kay P. (2006).  Individual and Population Differences in Focal Colors. 29-54.
Weber, S. (2004).  The Success of Open Source.
Weber, F.., Manganaro L.., Peskin B., & Shriberg E. (2002).  Using Prosodic and Lexical Information for Speaker Identification. Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2002).
Weber, S. Hollbach, & Stolcke A. (1990).  L0: A Testbed for Miniature Language Acquisition;.
Weaver, N., Hamadeh I.., Kesidis G.., & Paxson V. (2004).  Preliminary Results Using ScaleDown to Explore Worm Dynamics. Proceedings of the ACM Workshop on Rapid Malcode (WORM 2004).
Weaver, N. (2020).  The SolarWinds Breach: Why Your Work Computers Are Down Today.
Weaver, N., Kreibich C., Nechaev B., & Paxson V. (2011).  Implications of Netalyzr's DNS Measurements.
Weaver, N., Kreibich C., & Paxson V. (2011).  Redirecting DNS for Ads and Profit.
Weaver, N. (2021).  What Happened in the Kaseya VSA Incident?. Lawfare.
Weaver, N., Paxson V., Staniford S., & Cunningham R. (2003).  A Taxonomy of Computer Worms. Proceedings of the ACM CCS First Workshop on Rapid Malcode (WORM 2003). 11-18.
Weaver, N., Staniford S., & Paxson V. (2004).  Very Fast Containment of Scanning Worms. Proceedings of the 13th USENIX Security Symposium. 29-44.
Weaver, N. (2021).  Disrupting Cryptocurrencies 2: Lessons From the Poly 'Hack'. Lawfare.
Weaver, N. (2021).  The Microsoft Exchange Hack and the Great Email Robbery.

Pages