Publication Search Results

TitleAuthorBibliographicsort descendingDateGroupLinks
A formal semantics for computer languages and its application in a compiler-compilerJ.A. FeldmanCommunications of the ACM, Vol. 9, Issue 1, pp. 3-9 1966AI
Security Challenges of the EPC NetworkB. Fabian and O. GüntherCommunications of the ACM, Volume 52, Issue 7, pp. 121-125July 2009Other
Midlevel Representations for Computational Auditory Scene Analysis: The Weft ElementD. Ellis and D. RosenthalComputational Auditory Scene Analysis, D.F. Rosenthal & H.G. Okuno, eds., Lawrence Erlbaum, pp. 257-272 1998Speech
Term Structure of Interactions of Foreign Exchange RatesJ. Moody and H. YangComputational Finance 1999, edited by Y. S. Abu-Mostafa, B. LeBaron, A. W. Lo, and A. S. Weigend, MIT Press, Cambridge, MA, 2000. 2000Algorithms
Minimizing Downside Risk via Stochastic Dynamic ProgrammingJ. Moody and M. SaffellComputational Finance 1999, edited by Y. S. Abu-Mostafa, B. LeBaron, A. W. Lo, and A. S. Weigend, MIT Press, Cambridge, MA, 2000. 2000Algorithms
Approximating the Volume of Unions and Intersections of High-Dimensional Geometric ObjectsK. Bringmann and T. FriedrichComputational Geometry, Vol. 43, Issues 6-7, pp. 601-610August 2010Algorithms[PDF]

Neural Network Modeling of Physiological ProcessesV. Tresp, J. Moody, and W.R. DelongComputational Learning Theory and Natural Learning Systems, Vol. 2, T. Petsche, M. Kearns, S. Hanson, R. Rivest (eds), MIT Press, pp. 363-378 1993Algorithms
Book Review, Crangle and Suppes, “Language Learning"J. FeldmanComputational Linguistics 1996AI
Automatic Labeling of Semantic RolesD. Gildea and D. JurafskyComputational Linguistics, Vol. 28, No. 3, pp. 245-288September 2002AI[PDF]

Encounters with LanguageC. J. FillmoreComputational Linguistics, Vol. 38, No. 4, pg.701-718December 2012AI[PDF]

Modeling Embodied Lexical DevelopmentD. Bailey, J. Feldman, S. Narayanan, and G. LakoffComputational Models of Language Understanding 1997AI
An Analysis of Using Reflectors for Distributed Denial-of-Service AttacksV. PaxsonComputer Communication Review 31(3), July 2001.July 2001Networking
Controlling High Bandwidth Aggregates in the NetworkR. Mahajan, S. Bellovin, S. Floyd, J. Ioannidis, V. Paxson, and S. ShenkerComputer Communication Review 32(3), July 2002.July 2002Networking
Connections with Multiple Congested Gateways in Packet-Switched Networks Part 1: One-way TrafficS. FloydComputer Communication Review, Vol. 21, No. 5, pp. 30-47October 1991Networking[PDF]

Simulation-based Comparisons of Tahoe, Reno, and SACK TCPK. Fall and S. FloydComputer Communication Review, Vol. 26, No. 3, pp. 5-21July 1996Networking[PDF]

Approximate fairness through differential droppingR. Pan, L. Breslau, B. Prabhakar, and S. ShenkerComputer Communication Review, Vol. 33, Issue 2, pp. 23-39 2003Networking
The Devil and Packet Trace AnonymizationR. Pang, M. Allman, V. Paxson, and J. LeeComputer Communication Review, Vol. 36, Issue 1, pp. 29-38January 2006Networking
A Data-oriented (and Beyond) Network ArchitectureT. Koponen, M. Chawla, B.-G. Chun, A. Ermolinskiy, K.H. Kim, S. Shenker, and I. StoicaComputer Communication Review, Vol. 37, Issue 4, ACM, pp. 181-192October 2007Networking[PDF]

Dynamic Route Recomputation Considered HarmfulM. Caesar, M. Casado, T. Koponen, J. Rexford, and S. ShenkerComputer Communication Review, Vol. 40, Issue 2April 2010Networking[PDF]

Fast, Approximate Synthesis of Fractional Gaussian Noise for Generating Self-Similar Network TrafficV. PaxsonComputer Communications Review, Vol. 27, No. 5, pp. 5-18. This paper is a minor revision of Fast Approximation of Self-Similar Network Traffic, an April 1995 technical report.October 1997Networking
An Investigation of the Internet’s IP-Layer ConnectivityL. Tang, J. Li, Y. Li, and S. ShenkerComputer Communications, Vol. 32, No. 5, pp. 913-926March 2009Networking
Analysis and Simulation of Web ServicesS. Narayanan and S. McIlraithComputer Networks (accepted for publication). 2003AI
Very Large Conferences on the Internet: the Internet Multimedia Conferencing ArchitectureM. Handley, J. Crowcroft, C. Bormann, and J. OttComputer Networks and ISDN Systems, Special Issue on Internet Telephony 1998Networking
Bro: A System for Detecting Network Intruders in Real-TimeV. PaxsonComputer Networks, 31(23-24), pp. 2435-2463, 14 Dec. 1999.December 14 1999Networking
A Comparison of RED's Byte and Packet ModesW. Eddy and M. AllmanComputer Networks, 42(2)June 2003Networking
Analysis and Simulation of Web ServicesS. Narayanan and S. McIllraithComputer Networks, Vol. 42, pp. 675-693, Elsevier Science B.V. 2003AI[PDF]

Explicit Transport Error Notification (ETEN) for Error-Prone Wireless and Satellite NetworksR. Krishnan, J. Sterbenz, W. Eddy, C. Partridge, and M. AllmanComputer Networks: The International Journal of Computer and Telecommunications Networking, Vol. 46, Issue 3, pp. 343-362October 2004Networking[PDF]

Determining an Appropriate Sending Rate Over an Underutilized Network PathP. Sarolahti, M. Allman, and S. FloydComputer Networks: The International Journal of Computer and Telecommunications Networking, Vol. 51, Issue 7, pp. 1815-1832. DOI:10.1016/j.comnet.2006.11.006May 2007Networking[PDF]

Scale Control Processor Test-chipC. Batten, R. Krashinsky, and K. AsanovićComputer Science and Artificial Intelligence Laboratory, Massachusetts Institute of Technology Technical Report No. MIT-CSAIL-TR-2007-003, Cambridge, MassachusettsJanuary 2007Architecture[PDF]

The Internet Under Crisis Conditions: Learning From September 11C. Partridge, P. Barford, D. Clark, S. Donelan, V. Paxson, J. Rexford, M. Vernon, J. Eisenberg, M. Blumenthal, D. Padgham, K. Batch, D. Drake, and J. BriscoeComputer Science and Telecommunications Board, National Research Council, National Academy Press, Washington, DC 2002Networking[PDF]

Outline of a Query-Driven Vision SystemJ.A. Feldman, D. Ballard, and C. BrownComputer Science Department, University of RochesterOctober 1976AI
Overview of the Rochester Image Understanding ProgramJ.A. FeldmanComputer Science Department, University of Rochester. Presented to the DARPA Image Understanding WorkshopApril 1977AI
A Comparison of Incremental Deployment Strategies for Router-Assisted Reliable MulticastX. He, C. Papadopoulos, P. Radoslavov, and R. GovindanComputer Science Department, University of Southern California Technical Report No. 01-751, Los Angeles, CaliforniaJuly 2001Networking[PDF]

An Analysis of The Internal Structure of Large Autonomous SystemsR. Govindan and P. RadoslavovComputer Science Department, University of Southern California Technical Report No. 02-777, Los Angeles, CaliforniaNovember 2002Networking
A Study in Machine Learning from Imbalanced Data for Sentence Boundary Detection in SpeechY. Liu, N.V. Chawla, M.P. Harper, E. Shriberg, and A. StolckeComputer Speech and Language, Vol. 20, Issue 4, pp. 468-494October 2006Speech[PDF]

Tutor-Based Learning of Visual Categories Using Different Levels of SupervisionM. Fritz, G.-J. Kruijff, and B. SchieleComputer Vision and Image Understanding, Vol. 114, Issue 5, pp. 564-573May 2010Vision
Probabilistic Models of Verbal and Body GesturesC. Burglar, S. Omohundro, M.Covell, M. Slaney, S. Ahmad, D. A. Forsyth, and J. FeldmanComputer Vision in Man Machine Interfaces (R. Cippola and A. Pentland, eds.), Cambridge University Press 1997AI
Probabilistic Models of Verbal and Body GesturesC. Bregler, S. Omohundro, M. Covell, M. Slaney, S. Ahmad, D. Forsyth, and J. FeldmanComputer Vision in Man-Machine Interfaces , eds. R. Cipolla and A. Pentland, Cambridge University Press 1998AI
Rochester's Intelligent GatewayJ.A. Feldman, K. Lantz, K. Gradischnig, and R. RashidComputer, Vol. 15, Issue 10October 1982AI
Neural Networks, Artificial Intelligence and Computational RealityJ.A. FeldmanComputers in Industry, Vol. 14, pp. 145-148 1990AI
An Architecture for Exploiting Multi-Core Processors to Parallelize Network Intrusion PreventionR. Sommer, N. Weaver, and V. PaxsonConcurrency and Computation: Practice and Experience, Vol. 21, Issue 10, pp. 1255-1279July 2009Networking[PDF]

Reflexive Reasoning with Multiple-Instantiation in in a Connectionist Reasoning System with a Typed HierarchyD.R. Mani and L. ShastriConnection Science, Vol. 5, No. 3 & 4, pp. 205-242 1993AI
Connectionist Representation of ConceptsJ.A. FeldmanConnectionism in Perspective, pp. 25-45, R. Pfeifer (ed.), Elsevier Science Publishers B.V. 1989AI
Advances in Frame SemanticsM. R. L. PetruckConstructions and Frames, Special Issue on Advances in Frame Semantics, Vol. 3, Issue 1, pp. 1-8August 2011AI
FrameNet as a Resource for Paraphrase ResearchY. Hasegawa, R. Lee-Goldman, A. Kong, and K. AkitaConstructions and Frames, Special Issue on Advances in Frame Semantics, Vol. 3, Issue 1, pp. 104-127August 2011Networking
The Developmental Promise of Information and Communications Technology in IndiaJ. PalContemporary South Asia, Volume 12, Number 1, March 2003.March 2003BCIS (archived)
The Identification of Stages in Diachronic Data: Variability-Based Neighbor ClusteringM. Hilpert and S. GriesCorpora, Vol. 3, No. 1, pp. 59-81May 2008AI[PDF]

Grammatical Inference and Grammatical ComplexityJ.A. Feldman, et.alCS 125, Stanford University, Computer Science Department, Stanford, CaliforniaMay 1969AI
Automatic ProgrammingJ.A. FeldmanCS 255, Stanford University, Computer Science Department, Stanford, CaliforniaFebruary 1972AI
A Survey of Support for Implementing DebuggersV. PaxsonCS 262 class project, University of California, BerkeleyOctober 1990Networking[PDF]

Pages