| A formal semantics for computer languages and its application in a compiler-compiler | J.A. Feldman | Communications of the ACM, Vol. 9, Issue 1, pp. 3-9 | 1966 | AI | |
| Security Challenges of the EPC Network | B. Fabian and O. Günther | Communications of the ACM, Volume 52, Issue 7, pp. 121-125 | July 2009 | Other | |
| Midlevel Representations for Computational Auditory Scene Analysis: The Weft Element | D. Ellis and D. Rosenthal | Computational Auditory Scene Analysis, D.F. Rosenthal & H.G. Okuno, eds., Lawrence Erlbaum, pp. 257-272 | 1998 | Speech | |
| Term Structure of Interactions of Foreign Exchange Rates | J. Moody and H. Yang | Computational Finance 1999, edited by Y. S. Abu-Mostafa, B. LeBaron, A. W. Lo, and A. S. Weigend, MIT Press, Cambridge, MA, 2000. | 2000 | Algorithms | |
| Minimizing Downside Risk via Stochastic Dynamic Programming | J. Moody and M. Saffell | Computational Finance 1999, edited by Y. S. Abu-Mostafa, B. LeBaron, A. W. Lo, and A. S. Weigend, MIT Press, Cambridge, MA, 2000. | 2000 | Algorithms | |
| Approximating the Volume of Unions and Intersections of High-Dimensional Geometric Objects | K. Bringmann and T. Friedrich | Computational Geometry, Vol. 43, Issues 6-7, pp. 601-610 | August 2010 | Algorithms | [PDF]
|
| Neural Network Modeling of Physiological Processes | V. Tresp, J. Moody, and W.R. Delong | Computational Learning Theory and Natural Learning Systems, Vol. 2, T. Petsche, M. Kearns, S. Hanson, R. Rivest (eds), MIT Press, pp. 363-378 | 1993 | Algorithms | |
| Book Review, Crangle and Suppes, “Language Learning" | J. Feldman | Computational Linguistics | 1996 | AI | |
| Automatic Labeling of Semantic Roles | D. Gildea and D. Jurafsky | Computational Linguistics, Vol. 28, No. 3, pp. 245-288 | September 2002 | AI | [PDF]
|
| Encounters with Language | C. J. Fillmore | Computational Linguistics, Vol. 38, No. 4, pg.701-718 | December 2012 | AI | [PDF]
|
| Modeling Embodied Lexical Development | D. Bailey, J. Feldman, S. Narayanan, and G. Lakoff | Computational Models of Language Understanding | 1997 | AI | |
| An Analysis of Using Reflectors for Distributed Denial-of-Service Attacks | V. Paxson | Computer Communication Review 31(3), July 2001. | July 2001 | Networking | |
| Controlling High Bandwidth Aggregates in the Network | R. Mahajan, S. Bellovin, S. Floyd, J. Ioannidis, V. Paxson, and S. Shenker | Computer Communication Review 32(3), July 2002. | July 2002 | Networking | |
| Connections with Multiple Congested Gateways in Packet-Switched Networks Part 1: One-way Traffic | S. Floyd | Computer Communication Review, Vol. 21, No. 5, pp. 30-47 | October 1991 | Networking | [PDF]
|
| Simulation-based Comparisons of Tahoe, Reno, and SACK TCP | K. Fall and S. Floyd | Computer Communication Review, Vol. 26, No. 3, pp. 5-21 | July 1996 | Networking | [PDF]
|
| Approximate fairness through differential dropping | R. Pan, L. Breslau, B. Prabhakar, and S. Shenker | Computer Communication Review, Vol. 33, Issue 2, pp. 23-39 | 2003 | Networking | |
| The Devil and Packet Trace Anonymization | R. Pang, M. Allman, V. Paxson, and J. Lee | Computer Communication Review, Vol. 36, Issue 1, pp. 29-38 | January 2006 | Networking | |
| A Data-oriented (and Beyond) Network Architecture | T. Koponen, M. Chawla, B.-G. Chun, A. Ermolinskiy, K.H. Kim, S. Shenker, and I. Stoica | Computer Communication Review, Vol. 37, Issue 4, ACM, pp. 181-192 | October 2007 | Networking | [PDF]
|
| Dynamic Route Recomputation Considered Harmful | M. Caesar, M. Casado, T. Koponen, J. Rexford, and S. Shenker | Computer Communication Review, Vol. 40, Issue 2 | April 2010 | Networking | [PDF]
|
| Fast, Approximate Synthesis of Fractional Gaussian Noise for Generating Self-Similar Network Traffic | V. Paxson | Computer Communications Review, Vol. 27, No. 5, pp. 5-18. This paper is a minor revision of Fast Approximation of Self-Similar Network Traffic, an April 1995 technical report. | October 1997 | Networking | |
| An Investigation of the Internet’s IP-Layer Connectivity | L. Tang, J. Li, Y. Li, and S. Shenker | Computer Communications, Vol. 32, No. 5, pp. 913-926 | March 2009 | Networking | |
| Analysis and Simulation of Web Services | S. Narayanan and S. McIlraith | Computer Networks (accepted for publication). | 2003 | AI | |
| Very Large Conferences on the Internet: the Internet Multimedia Conferencing Architecture | M. Handley, J. Crowcroft, C. Bormann, and J. Ott | Computer Networks and ISDN Systems, Special Issue on Internet Telephony | 1998 | Networking | |
| Bro: A System for Detecting Network Intruders in Real-Time | V. Paxson | Computer Networks, 31(23-24), pp. 2435-2463, 14 Dec. 1999. | December 14 1999 | Networking | |
| A Comparison of RED's Byte and Packet Modes | W. Eddy and M. Allman | Computer Networks, 42(2) | June 2003 | Networking | |
| Analysis and Simulation of Web Services | S. Narayanan and S. McIllraith | Computer Networks, Vol. 42, pp. 675-693, Elsevier Science B.V. | 2003 | AI | [PDF]
|
| Explicit Transport Error Notification (ETEN) for Error-Prone Wireless and Satellite Networks | R. Krishnan, J. Sterbenz, W. Eddy, C. Partridge, and M. Allman | Computer Networks: The International Journal of Computer and Telecommunications Networking, Vol. 46, Issue 3, pp. 343-362 | October 2004 | Networking | [PDF]
|
| Determining an Appropriate Sending Rate Over an Underutilized Network Path | P. Sarolahti, M. Allman, and S. Floyd | Computer Networks: The International Journal of Computer and Telecommunications Networking, Vol. 51, Issue 7, pp. 1815-1832. DOI:10.1016/j.comnet.2006.11.006 | May 2007 | Networking | [PDF]
|
| Scale Control Processor Test-chip | C. Batten, R. Krashinsky, and K. Asanović | Computer Science and Artificial Intelligence Laboratory, Massachusetts Institute of Technology Technical Report No. MIT-CSAIL-TR-2007-003, Cambridge, Massachusetts | January 2007 | Architecture | [PDF]
|
| The Internet Under Crisis Conditions: Learning From September 11 | C. Partridge, P. Barford, D. Clark, S. Donelan, V. Paxson, J. Rexford, M. Vernon, J. Eisenberg, M. Blumenthal, D. Padgham, K. Batch, D. Drake, and J. Briscoe | Computer Science and Telecommunications Board, National Research Council, National Academy Press, Washington, DC | 2002 | Networking | [PDF]
|
| Outline of a Query-Driven Vision System | J.A. Feldman, D. Ballard, and C. Brown | Computer Science Department, University of Rochester | October 1976 | AI | |
| Overview of the Rochester Image Understanding Program | J.A. Feldman | Computer Science Department, University of Rochester. Presented to the DARPA Image Understanding Workshop | April 1977 | AI | |
| A Comparison of Incremental Deployment Strategies for Router-Assisted Reliable Multicast | X. He, C. Papadopoulos, P. Radoslavov, and R. Govindan | Computer Science Department, University of Southern California Technical Report No. 01-751, Los Angeles, California | July 2001 | Networking | [PDF]
|
| An Analysis of The Internal Structure of Large Autonomous Systems | R. Govindan and P. Radoslavov | Computer Science Department, University of Southern California Technical Report No. 02-777, Los Angeles, California | November 2002 | Networking | |
| A Study in Machine Learning from Imbalanced Data for Sentence Boundary Detection in Speech | Y. Liu, N.V. Chawla, M.P. Harper, E. Shriberg, and A. Stolcke | Computer Speech and Language, Vol. 20, Issue 4, pp. 468-494 | October 2006 | Speech | [PDF]
|
| Tutor-Based Learning of Visual Categories Using Different Levels of Supervision | M. Fritz, G.-J. Kruijff, and B. Schiele | Computer Vision and Image Understanding, Vol. 114, Issue 5, pp. 564-573 | May 2010 | Vision | |
| Probabilistic Models of Verbal and Body Gestures | C. Burglar, S. Omohundro, M.Covell, M. Slaney, S. Ahmad, D. A. Forsyth, and J. Feldman | Computer Vision in Man Machine Interfaces (R. Cippola and A. Pentland, eds.), Cambridge University Press | 1997 | AI | |
| Probabilistic Models of Verbal and Body Gestures | C. Bregler, S. Omohundro, M. Covell, M. Slaney, S. Ahmad, D. Forsyth, and J. Feldman | Computer Vision in Man-Machine Interfaces , eds. R. Cipolla and A. Pentland, Cambridge University Press | 1998 | AI | |
| Rochester's Intelligent Gateway | J.A. Feldman, K. Lantz, K. Gradischnig, and R. Rashid | Computer, Vol. 15, Issue 10 | October 1982 | AI | |
| Neural Networks, Artificial Intelligence and Computational Reality | J.A. Feldman | Computers in Industry, Vol. 14, pp. 145-148 | 1990 | AI | |
| An Architecture for Exploiting Multi-Core Processors to Parallelize Network Intrusion Prevention | R. Sommer, N. Weaver, and V. Paxson | Concurrency and Computation: Practice and Experience, Vol. 21, Issue 10, pp. 1255-1279 | July 2009 | Networking | [PDF]
|
| Reflexive Reasoning with Multiple-Instantiation in in a Connectionist Reasoning System with a Typed Hierarchy | D.R. Mani and L. Shastri | Connection Science, Vol. 5, No. 3 & 4, pp. 205-242 | 1993 | AI | |
| Connectionist Representation of Concepts | J.A. Feldman | Connectionism in Perspective, pp. 25-45, R. Pfeifer (ed.), Elsevier Science Publishers B.V. | 1989 | AI | |
| Advances in Frame Semantics | M. R. L. Petruck | Constructions and Frames, Special Issue on Advances in Frame Semantics, Vol. 3, Issue 1, pp. 1-8 | August 2011 | AI | |
| FrameNet as a Resource for Paraphrase Research | Y. Hasegawa, R. Lee-Goldman, A. Kong, and K. Akita | Constructions and Frames, Special Issue on Advances in Frame Semantics, Vol. 3, Issue 1, pp. 104-127 | August 2011 | Networking | |
| The Developmental Promise of Information and Communications Technology in India | J. Pal | Contemporary South Asia, Volume 12, Number 1, March 2003. | March 2003 | BCIS (archived) | |
| The Identification of Stages in Diachronic Data: Variability-Based Neighbor Clustering | M. Hilpert and S. Gries | Corpora, Vol. 3, No. 1, pp. 59-81 | May 2008 | AI | [PDF]
|
| Grammatical Inference and Grammatical Complexity | J.A. Feldman, et.al | CS 125, Stanford University, Computer Science Department, Stanford, California | May 1969 | AI | |
| Automatic Programming | J.A. Feldman | CS 255, Stanford University, Computer Science Department, Stanford, California | February 1972 | AI | |
| A Survey of Support for Implementing Debuggers | V. Paxson | CS 262 class project, University of California, Berkeley | October 1990 | Networking | [PDF]
|