Publication Search Results

TitleAuthorsort ascendingBibliographicDateGroupLinks
Design Principles of Parallel Operating Systems: ―A PEACE Case Study―W. Schröder-PreikschatICSI Technical Report TR-93-020April 1993ICSI Technical Reports[PDF]

Information Theory and Noisy ComputationW. S. EvansICSI Technical Report TR-94-057November 1994ICSI Technical Reports[PDF]

How Fast Can A Threshold Gate Learn?W. Maass and G. TuranICSI Technical Report TR-90-056October 1990ICSI Technical Reports[PDF]

On-Line Learning with an Oblivious Environment and the Power of RandomizationW. MaassICSI Technical Report TR-91-003January 1991ICSI Technical Reports[PDF]

Integrating a Relational Database System into VODAK Using Its Metaclass ConceptW. Klas, G. Fischer, and K. AbererICSI Technical Report TR-92-067August 1992ICSI Technical Reports[PDF]

Persistence in the Object-Oriented Database Programming Language VMLW. Klas and V. TurauICSI Technical Report TR-92-045July 1992ICSI Technical Reports[PDF]

Proposal of an External Processor Scheduling in Micro-Kernel Based Operating SystemsW. KalfaICSI Technical Report TR-92-028May 1992ICSI Technical Reports[PDF]

Auditory-Based Automatic Speech RecognitionW. Hemmert, M. Holmberg, and D. GelbartProceedings of ISCA Tutorial and Research Workshop on Statistical and Perceptual Audio Processing, Jeju, Korea, October 2004.October 2004Speech[PDF]

Scaling Issues in the Design and Implementation of the Tenet RCAP2 Signaling ProtocolW. HeffnerICSI Technical Report TR-95-022May 1995ICSI Technical Reports[PDF]

Reservoir-based ABR Servive in ATM NetworksW. Frohberg and R. UlrichICSI Technical Report TR-96-024July 1996ICSI Technical Reports[PDF]

Fractal Behavior of Video and Data TrafficW. FrohbergICSI Technical Report TR-96-027July 1996ICSI Technical Reports[PDF]

Polynomial Time Approximation of Dense Weighted Instances of MAX-CUTW. Fernandez de la Vega and M. KarpinskiICSI Technical Report TR-97-059December 1997ICSI Technical Reports[PDF]

On the Definition of SpeedupW. ErtelICSI Technical Report TR-93-069November 1993ICSI Technical Reports[PDF]

Dynamic Join and Leave for Real-Time MulticastW. Effelsberg and E. Müller-MenradICSI Technical Report TR-93-056October 1993ICSI Technical Reports[PDF]

New Techniques for Making Transport Protocols Robust to Corruption-Based LossW. Eddy, S. Ostermann, and M. AllmanACM SIGCOMM Computer Communication Review, Vol. 34, Issue 5, pp. 75-88October 2004Networking[PDF]

A Comparison of RED's Byte and Packet ModesW. Eddy and M. AllmanComputer Networks, 42(2)June 2003Networking
A Comparison of RED's Byte and Packet ModesW. Eddy and M. AllmanACM SIGCOMM Student Poster Session, August 2002.August 2002Networking
Advantages of Parallel Processing and the Effects of Communications TimeW. Eddy and M. AllmanTechnical Report CR-209455, NASA Glenn Research Center, February 2000.February 2000Networking
Protocol-Independent Adaptive Replay of Application DialogW. Cui, V. Paxson, N. Weaver, and R.H. KatzProceedings of the 13th Annual Symposium on Network and Distributed System Security (NDSS'06), San Diego, CaliforniaFebruary 2006Networking[PDF]

Source-to-Source Code Generation Based on Pattern Matching and Dynamic ProgrammingW. Chen and V. TurauICSI Technical Report TR-93-047August 1993ICSI Technical Reports[PDF]

Secure Mobile Agent Systems Using Java - Where Are We Heading?W. Binder and V. RothProceedings, 17th ACM Symposium on Applied Computing, Special Track on Agents, Interactions, Mobility, and Systems (SAC/AIMS), Madrid, Spain, March 2002.March 2002Networking
Macroscopic T Nonconservation: Prospects for a New ExperimentW. Bialek, J. Moody, and F. WilczekPhysical Review Letters, Vol. 56, pp. 1623 1986Algorithms
Survey on Tools for Content Management in TV Post-ProductionW. Bailer, K. Schoeffmann, and F. HopfgartnerIn TV Content Analysis: Techniques and Applications, Chapter 18, CRC Press 2011AI
A Characterization of Rational Amalgamation OperationsV.Cutello and J. MonteroICSI Technical Report TR-92-033May 1992ICSI Technical Reports[PDF]

Using Honeynets for Internet Situational AwarenessV. Yegneswaran, P. Barford, and V. PaxsonProceedings of the Fourth Workshop on Hot Topics in Networks (Hotnets-IV), College Park, MarylandNovember 2005Networking[PDF]

Efficient Implementation of Multi-Methods for Statically Typed LanguagesV. Turau and W. ChenICSI Technical Report TR-95-053September 1995ICSI Technical Reports[PDF]

Predicting Blood Glucose Metabolism in Diabetics -- A Machine Learning SolutionV. Tresp, T. Briegel, and J. MoodyIEEE Transactions on Neural Networks, v. 10, n. 5, pp. 1204--1213, 1999. 1999Algorithms
Neural Network Modeling of Physiological ProcessesV. Tresp, J. Moody, and W.R. DelongComputational Learning Theory and Natural Learning Systems, Vol. 2, T. Petsche, M. Kearns, S. Hanson, R. Rivest (eds), MIT Press, pp. 363-378 1993Algorithms
A Design-Space Exploration for CMOS Photonic Processor NetworksV. Stojanović, A. Joshi, C. Batten, Y.-J. Kwon, S. Beamer, S. Chen, and K. AsanovićInvited talk at the Optical Fiber Communication Conference and Exposition and the National Fiber Optic Engineers Conference (OFC/NFOEC 2010), San Diego, CaliforniaMarch 2010Architecture
Manycore Processor Networks with Monolithic Integrated CMOS PhotonicsV. Stojanović, A. Joshi, C. Batten, Y.-J. Kwon, and K. AsanovićProceedings of the 29th Conference on Lasers and Electro-Optics (CLEO'09) (invited paper), Baltimore, MarylandMay 2009Architecture[PDF]

Parallel Balanced AllocationV. StemannICSI Technical Report TR-96-020June 1996ICSI Technical Reports[PDF]

Effects of Replication on Web Service Performance in WebSphereV. StantchevICSI Technical Report TR-08-003March 2008ICSI Technical Reports[PDF]

Finding a ‘Kneedle’ in a Haystack: Detecting Knee Points in System BehaviorV. Satopaa, J. Albrecht, D. Irwin, and B. RaghavanProceedings of the 30th International Conference on Distributed Computing Systems SIMPLEX Workshop (ICDCS 2010), Genoa, ItalyJune 2010Networking[PDF]

Improved Key Management for Digital Watermark MonitoringV. Roth and M. ArnoldProceedings of SPIE, San Jose, California, January 2002.January 2002Networking
Java Security Architecture and ExtensionsV. RothDr. Dobbs Journal, 2002(335), April 2002.April 2002Networking
Empowering mobile software agentsV. RothIn N. Suri, editor, Proceedings 6th IEEE Mobile Agents Conference, volume 2535 of Lecture Notes in Computer Science, pages 47-63. Springer Verlag, October 2002.October 2002Networking
A Minimax Arc Theorem for Reducible Flow GraphsV. RamachandranICSI Technical Report TR-87-001November 1987ICSI Technical Reports[PDF]

An Architecture for Exploiting Multi-Core Processors to Parallelize Network Intrusion PreventionV. Paxson, R. Sommer, and N. WeaverProceedings of IEEE Sarnoff Symposium, Princeton, New Jersey, pp. 1-7May 2007Networking[PDF]

Known TCP Implementation ProblemsV. Paxson, M. Allman, S. Dawson, W. Fenner, J. Griner, I. Heavens, K. Lahey, J. Semke, and B. VolzRequest for Comments 2525, Informational, March 1999.March 1999Networking
Computing TCP's Retransmission TimerV. Paxson, M. Allman, J. Chu, and M. SargentRFC 6298June 2011Networking[PDF]

Rethinking Hardware Support for Network Analysis and Intrusion PreventionV. Paxson, K. Asanovic, S. Dharmapurikar, J. Lockwood, R. Pang, R. Sommer, and N. WeaverProceedings of the First USENIX Workshop on Hot Topics in Security (HotSec '06), Vancouver, CanadaAugust 2006Networking[PDF]

An Architecture for Large-Scale Internet MeasurementV. Paxson, J. Mahdavi, A. Adams, and M. MathisIEEE Communications, Vol. 36, No. 8, pp. 48-54August 1998Networking
Framework for IP Performance MetricsV. Paxson, G. Almes, J. Mahdavi, and M. Mathis.RFC 2330, InformationalMay 1998Networking
Experiences with NIMIV. Paxson, A. Adams, and M. MathisProceedings of Passive & Active Measurement: PAM-2000. 2000Networking
Experiences with NIMIV. Paxson, A. Adams, and M. MathisProceedings of the Passive & Active Measurement (PAM 2000), Hamilton, New ZealandApril 2000Networking[PDF]

Why We Don't Know How To Simulate The InternetV. Paxson and S. FloydIn Proceedings of the 1997 Winter Simulation ConferenceDecember 1997Networking
Wide-Area Traffic: The Failure of Poisson ModelingV. Paxson and S. FloydIEEE/ACM Transactions on Networking, Vol. 3, No. 3, pp. 226-244June 1995Networking
Computing TCP's Retransmission TimerV. Paxson and M. AllmanRequest for Comments 2988, Proposed StandardNovember 2000Networking
Glish: A User-Level Software Bus for Loosely-Coupled Distributed SystemsV. Paxson and C. SaltmarshProceedings of the 1993 Winter USENIX Technical Conference, San Diego, CaliforniaJanuary 1993Networking
An Analysis of Using Reflectors for Distributed Denial-of-Service AttacksV. PaxsonComputer Communication Review 31(3), July 2001.July 2001Networking

Pages