| Design Principles of Parallel Operating Systems: ―A PEACE Case Study― | W. Schröder-Preikschat | ICSI Technical Report TR-93-020 | April 1993 | ICSI Technical Reports | [PDF]
|
| Information Theory and Noisy Computation | W. S. Evans | ICSI Technical Report TR-94-057 | November 1994 | ICSI Technical Reports | [PDF]
|
| How Fast Can A Threshold Gate Learn? | W. Maass and G. Turan | ICSI Technical Report TR-90-056 | October 1990 | ICSI Technical Reports | [PDF]
|
| On-Line Learning with an Oblivious Environment and the Power of Randomization | W. Maass | ICSI Technical Report TR-91-003 | January 1991 | ICSI Technical Reports | [PDF]
|
| Integrating a Relational Database System into VODAK Using Its Metaclass Concept | W. Klas, G. Fischer, and K. Aberer | ICSI Technical Report TR-92-067 | August 1992 | ICSI Technical Reports | [PDF]
|
| Persistence in the Object-Oriented Database Programming Language VML | W. Klas and V. Turau | ICSI Technical Report TR-92-045 | July 1992 | ICSI Technical Reports | [PDF]
|
| Proposal of an External Processor Scheduling in Micro-Kernel Based Operating Systems | W. Kalfa | ICSI Technical Report TR-92-028 | May 1992 | ICSI Technical Reports | [PDF]
|
| Auditory-Based Automatic Speech Recognition | W. Hemmert, M. Holmberg, and D. Gelbart | Proceedings of ISCA Tutorial and Research Workshop on Statistical and Perceptual Audio Processing, Jeju, Korea, October 2004. | October 2004 | Speech | [PDF]
|
| Scaling Issues in the Design and Implementation of the Tenet RCAP2 Signaling Protocol | W. Heffner | ICSI Technical Report TR-95-022 | May 1995 | ICSI Technical Reports | [PDF]
|
| Reservoir-based ABR Servive in ATM Networks | W. Frohberg and R. Ulrich | ICSI Technical Report TR-96-024 | July 1996 | ICSI Technical Reports | [PDF]
|
| Fractal Behavior of Video and Data Traffic | W. Frohberg | ICSI Technical Report TR-96-027 | July 1996 | ICSI Technical Reports | [PDF]
|
| Polynomial Time Approximation of Dense Weighted Instances of MAX-CUT | W. Fernandez de la Vega and M. Karpinski | ICSI Technical Report TR-97-059 | December 1997 | ICSI Technical Reports | [PDF]
|
| On the Definition of Speedup | W. Ertel | ICSI Technical Report TR-93-069 | November 1993 | ICSI Technical Reports | [PDF]
|
| Dynamic Join and Leave for Real-Time Multicast | W. Effelsberg and E. Müller-Menrad | ICSI Technical Report TR-93-056 | October 1993 | ICSI Technical Reports | [PDF]
|
| New Techniques for Making Transport Protocols Robust to Corruption-Based Loss | W. Eddy, S. Ostermann, and M. Allman | ACM SIGCOMM Computer Communication Review, Vol. 34, Issue 5, pp. 75-88 | October 2004 | Networking | [PDF]
|
| A Comparison of RED's Byte and Packet Modes | W. Eddy and M. Allman | Computer Networks, 42(2) | June 2003 | Networking | |
| A Comparison of RED's Byte and Packet Modes | W. Eddy and M. Allman | ACM SIGCOMM Student Poster Session, August 2002. | August 2002 | Networking | |
| Advantages of Parallel Processing and the Effects of Communications Time | W. Eddy and M. Allman | Technical Report CR-209455, NASA Glenn Research Center, February 2000. | February 2000 | Networking | |
| Protocol-Independent Adaptive Replay of Application Dialog | W. Cui, V. Paxson, N. Weaver, and R.H. Katz | Proceedings of the 13th Annual Symposium on Network and Distributed System Security (NDSS'06), San Diego, California | February 2006 | Networking | [PDF]
|
| Source-to-Source Code Generation Based on Pattern Matching and Dynamic Programming | W. Chen and V. Turau | ICSI Technical Report TR-93-047 | August 1993 | ICSI Technical Reports | [PDF]
|
| Secure Mobile Agent Systems Using Java - Where Are We Heading? | W. Binder and V. Roth | Proceedings, 17th ACM Symposium on Applied Computing, Special Track on Agents, Interactions, Mobility, and Systems (SAC/AIMS), Madrid, Spain, March 2002. | March 2002 | Networking | |
| Macroscopic T Nonconservation: Prospects for a New Experiment | W. Bialek, J. Moody, and F. Wilczek | Physical Review Letters, Vol. 56, pp. 1623 | 1986 | Algorithms | |
| Survey on Tools for Content Management in TV Post-Production | W. Bailer, K. Schoeffmann, and F. Hopfgartner | In TV Content Analysis: Techniques and Applications, Chapter 18, CRC Press | 2011 | AI | |
| A Characterization of Rational Amalgamation Operations | V.Cutello and J. Montero | ICSI Technical Report TR-92-033 | May 1992 | ICSI Technical Reports | [PDF]
|
| Using Honeynets for Internet Situational Awareness | V. Yegneswaran, P. Barford, and V. Paxson | Proceedings of the Fourth Workshop on Hot Topics in Networks (Hotnets-IV), College Park, Maryland | November 2005 | Networking | [PDF]
|
| Efficient Implementation of Multi-Methods for Statically Typed Languages | V. Turau and W. Chen | ICSI Technical Report TR-95-053 | September 1995 | ICSI Technical Reports | [PDF]
|
| Predicting Blood Glucose Metabolism in Diabetics -- A Machine Learning Solution | V. Tresp, T. Briegel, and J. Moody | IEEE Transactions on Neural Networks, v. 10, n. 5, pp. 1204--1213, 1999. | 1999 | Algorithms | |
| Neural Network Modeling of Physiological Processes | V. Tresp, J. Moody, and W.R. Delong | Computational Learning Theory and Natural Learning Systems, Vol. 2, T. Petsche, M. Kearns, S. Hanson, R. Rivest (eds), MIT Press, pp. 363-378 | 1993 | Algorithms | |
| A Design-Space Exploration for CMOS Photonic Processor Networks | V. Stojanović, A. Joshi, C. Batten, Y.-J. Kwon, S. Beamer, S. Chen, and K. Asanović | Invited talk at the Optical Fiber Communication Conference and Exposition and the National Fiber Optic Engineers Conference (OFC/NFOEC 2010), San Diego, California | March 2010 | Architecture | |
| Manycore Processor Networks with Monolithic Integrated CMOS Photonics | V. Stojanović, A. Joshi, C. Batten, Y.-J. Kwon, and K. Asanović | Proceedings of the 29th Conference on Lasers and Electro-Optics (CLEO'09) (invited paper), Baltimore, Maryland | May 2009 | Architecture | [PDF]
|
| Parallel Balanced Allocation | V. Stemann | ICSI Technical Report TR-96-020 | June 1996 | ICSI Technical Reports | [PDF]
|
| Effects of Replication on Web Service Performance in WebSphere | V. Stantchev | ICSI Technical Report TR-08-003 | March 2008 | ICSI Technical Reports | [PDF]
|
| Finding a ‘Kneedle’ in a Haystack: Detecting Knee Points in System Behavior | V. Satopaa, J. Albrecht, D. Irwin, and B. Raghavan | Proceedings of the 30th International Conference on Distributed Computing Systems SIMPLEX Workshop (ICDCS 2010), Genoa, Italy | June 2010 | Networking | [PDF]
|
| Improved Key Management for Digital Watermark Monitoring | V. Roth and M. Arnold | Proceedings of SPIE, San Jose, California, January 2002. | January 2002 | Networking | |
| Java Security Architecture and Extensions | V. Roth | Dr. Dobbs Journal, 2002(335), April 2002. | April 2002 | Networking | |
| Empowering mobile software agents | V. Roth | In N. Suri, editor, Proceedings 6th IEEE Mobile Agents Conference, volume 2535 of Lecture Notes in Computer Science, pages 47-63. Springer Verlag, October 2002. | October 2002 | Networking | |
| A Minimax Arc Theorem for Reducible Flow Graphs | V. Ramachandran | ICSI Technical Report TR-87-001 | November 1987 | ICSI Technical Reports | [PDF]
|
| An Architecture for Exploiting Multi-Core Processors to Parallelize Network Intrusion Prevention | V. Paxson, R. Sommer, and N. Weaver | Proceedings of IEEE Sarnoff Symposium, Princeton, New Jersey, pp. 1-7 | May 2007 | Networking | [PDF]
|
| Known TCP Implementation Problems | V. Paxson, M. Allman, S. Dawson, W. Fenner, J. Griner, I. Heavens, K. Lahey, J. Semke, and B. Volz | Request for Comments 2525, Informational, March 1999. | March 1999 | Networking | |
| Computing TCP's Retransmission Timer | V. Paxson, M. Allman, J. Chu, and M. Sargent | RFC 6298 | June 2011 | Networking | [PDF]
|
| Rethinking Hardware Support for Network Analysis and Intrusion Prevention | V. Paxson, K. Asanovic, S. Dharmapurikar, J. Lockwood, R. Pang, R. Sommer, and N. Weaver | Proceedings of the First USENIX Workshop on Hot Topics in Security (HotSec '06), Vancouver, Canada | August 2006 | Networking | [PDF]
|
| An Architecture for Large-Scale Internet Measurement | V. Paxson, J. Mahdavi, A. Adams, and M. Mathis | IEEE Communications, Vol. 36, No. 8, pp. 48-54 | August 1998 | Networking | |
| Framework for IP Performance Metrics | V. Paxson, G. Almes, J. Mahdavi, and M. Mathis. | RFC 2330, Informational | May 1998 | Networking | |
| Experiences with NIMI | V. Paxson, A. Adams, and M. Mathis | Proceedings of Passive & Active Measurement: PAM-2000. | 2000 | Networking | |
| Experiences with NIMI | V. Paxson, A. Adams, and M. Mathis | Proceedings of the Passive & Active Measurement (PAM 2000), Hamilton, New Zealand | April 2000 | Networking | [PDF]
|
| Why We Don't Know How To Simulate The Internet | V. Paxson and S. Floyd | In Proceedings of the 1997 Winter Simulation Conference | December 1997 | Networking | |
| Wide-Area Traffic: The Failure of Poisson Modeling | V. Paxson and S. Floyd | IEEE/ACM Transactions on Networking, Vol. 3, No. 3, pp. 226-244 | June 1995 | Networking | |
| Computing TCP's Retransmission Timer | V. Paxson and M. Allman | Request for Comments 2988, Proposed Standard | November 2000 | Networking | |
| Glish: A User-Level Software Bus for Loosely-Coupled Distributed Systems | V. Paxson and C. Saltmarsh | Proceedings of the 1993 Winter USENIX Technical Conference, San Diego, California | January 1993 | Networking | |
| An Analysis of Using Reflectors for Distributed Denial-of-Service Attacks | V. Paxson | Computer Communication Review 31(3), July 2001. | July 2001 | Networking | |