| Bro: A System for Detecting Network Intruders in Real-Time | V. Paxson | Computer Networks, 31(23-24), pp. 2435-2463, 14 Dec. 1999. | December 14 1999 | Networking | |
| Very Large Conferences on the Internet: the Internet Multimedia Conferencing Architecture | M. Handley, J. Crowcroft, C. Bormann, and J. Ott | Computer Networks and ISDN Systems, Special Issue on Internet Telephony | 1998 | Networking | |
| Analysis and Simulation of Web Services | S. Narayanan and S. McIlraith | Computer Networks (accepted for publication). | 2003 | AI | |
| An Investigation of the Internet’s IP-Layer Connectivity | L. Tang, J. Li, Y. Li, and S. Shenker | Computer Communications, Vol. 32, No. 5, pp. 913-926 | March 2009 | Networking | |
| Fast, Approximate Synthesis of Fractional Gaussian Noise for Generating Self-Similar Network Traffic | V. Paxson | Computer Communications Review, Vol. 27, No. 5, pp. 5-18. This paper is a minor revision of Fast Approximation of Self-Similar Network Traffic, an April 1995 technical report. | October 1997 | Networking | |
| Dynamic Route Recomputation Considered Harmful | M. Caesar, M. Casado, T. Koponen, J. Rexford, and S. Shenker | Computer Communication Review, Vol. 40, Issue 2 | April 2010 | Networking | [PDF]
|
| A Data-oriented (and Beyond) Network Architecture | T. Koponen, M. Chawla, B.-G. Chun, A. Ermolinskiy, K.H. Kim, S. Shenker, and I. Stoica | Computer Communication Review, Vol. 37, Issue 4, ACM, pp. 181-192 | October 2007 | Networking | [PDF]
|
| The Devil and Packet Trace Anonymization | R. Pang, M. Allman, V. Paxson, and J. Lee | Computer Communication Review, Vol. 36, Issue 1, pp. 29-38 | January 2006 | Networking | |
| Approximate fairness through differential dropping | R. Pan, L. Breslau, B. Prabhakar, and S. Shenker | Computer Communication Review, Vol. 33, Issue 2, pp. 23-39 | 2003 | Networking | |
| Simulation-based Comparisons of Tahoe, Reno, and SACK TCP | K. Fall and S. Floyd | Computer Communication Review, Vol. 26, No. 3, pp. 5-21 | July 1996 | Networking | [PDF]
|
| Connections with Multiple Congested Gateways in Packet-Switched Networks Part 1: One-way Traffic | S. Floyd | Computer Communication Review, Vol. 21, No. 5, pp. 30-47 | October 1991 | Networking | [PDF]
|
| Controlling High Bandwidth Aggregates in the Network | R. Mahajan, S. Bellovin, S. Floyd, J. Ioannidis, V. Paxson, and S. Shenker | Computer Communication Review 32(3), July 2002. | July 2002 | Networking | |
| An Analysis of Using Reflectors for Distributed Denial-of-Service Attacks | V. Paxson | Computer Communication Review 31(3), July 2001. | July 2001 | Networking | |
| Modeling Embodied Lexical Development | D. Bailey, J. Feldman, S. Narayanan, and G. Lakoff | Computational Models of Language Understanding | 1997 | AI | |
| Encounters with Language | C. J. Fillmore | Computational Linguistics, Vol. 38, No. 4, pg.701-718 | December 2012 | AI | [PDF]
|
| Automatic Labeling of Semantic Roles | D. Gildea and D. Jurafsky | Computational Linguistics, Vol. 28, No. 3, pp. 245-288 | September 2002 | AI | [PDF]
|
| Book Review, Crangle and Suppes, “Language Learning" | J. Feldman | Computational Linguistics | 1996 | AI | |
| Neural Network Modeling of Physiological Processes | V. Tresp, J. Moody, and W.R. Delong | Computational Learning Theory and Natural Learning Systems, Vol. 2, T. Petsche, M. Kearns, S. Hanson, R. Rivest (eds), MIT Press, pp. 363-378 | 1993 | Algorithms | |
| Approximating the Volume of Unions and Intersections of High-Dimensional Geometric Objects | K. Bringmann and T. Friedrich | Computational Geometry, Vol. 43, Issues 6-7, pp. 601-610 | August 2010 | Algorithms | [PDF]
|
| Minimizing Downside Risk via Stochastic Dynamic Programming | J. Moody and M. Saffell | Computational Finance 1999, edited by Y. S. Abu-Mostafa, B. LeBaron, A. W. Lo, and A. S. Weigend, MIT Press, Cambridge, MA, 2000. | 2000 | Algorithms | |
| Term Structure of Interactions of Foreign Exchange Rates | J. Moody and H. Yang | Computational Finance 1999, edited by Y. S. Abu-Mostafa, B. LeBaron, A. W. Lo, and A. S. Weigend, MIT Press, Cambridge, MA, 2000. | 2000 | Algorithms | |
| Midlevel Representations for Computational Auditory Scene Analysis: The Weft Element | D. Ellis and D. Rosenthal | Computational Auditory Scene Analysis, D.F. Rosenthal & H.G. Okuno, eds., Lawrence Erlbaum, pp. 257-272 | 1998 | Speech | |
| Security Challenges of the EPC Network | B. Fabian and O. Günther | Communications of the ACM, Volume 52, Issue 7, pp. 121-125 | July 2009 | Other | |
| A formal semantics for computer languages and its application in a compiler-compiler | J.A. Feldman | Communications of the ACM, Vol. 9, Issue 1, pp. 3-9 | 1966 | AI | |
| A View of the Parallel Computing Landscape | K. Asanović, R. Bodik, J. Demmel, T. Keaveny, K. Keutzer, J. D. Kubiatowicz, N. Morgan, D. A. Patterson, K. Sen, J. Wawrzynek, D. Wessel, and K. A. Yelick | Communications of the ACM, Vol. 52, No. 10, pp. 56-67 | October 2009 | Architecture | [PDF]
|
| A View of the Parallel Computing Landscape | K. Asanović, R. Bodik, J. Demmel, T. Keaveny, K. Keutzer, J. D. Kubiatowicz, N. Morgan, D. A. Patterson, K. Sen, J. Wawrzynek, D. Wessel, and K. A. Yelick | Communications of the ACM, Vol. 52, No. 10, pp. 56-67 | October 2009 | Speech | [PDF]
|
| LogP: A Practical Model of Parallel Computation | D.E. Culler, R.M. Karp, D. Patterson, A. Sahay, and others | Communications of the ACM, Vol. 39, No. 11, pp. 78-85 | November 1996 | Algorithms | |
| Computing with Structured Connectionist Networks | J.A. Feldman, M.A. Fanty, N.H. Goddard, and K.J. Lynne | Communications of the ACM, Vol. 31, Issue 2, pp. 170-187 | 1988 | AI | |
| Combinatorics, Complexity, and Randomness | R. M. Karp | Communications of the ACM, Vol. 29, No. 2, pp. 98-109 | February 1986 | Algorithms | |
| Rejuvenating Experimental Computer Science | J.A. Feldman and W.R. Sutherland, eds | Communications of the ACM, Vol. 22, No. 9 | September 1979 | AI | |
| High Level Programming for Distributed Computing | J.A. Feldman | Communications of the ACM, Vol. 22, Issue 6, pp. 353-368. Reprinted in Distributed Computing: Concepts and Implementations, P. L. McEntire, J. G. O'Reilly and R. E. Larson (eds.), IEEE Press, New York | 1979 | AI | |
| Comment on Brent's Scatter Storage Algorithm | J.A. Feldman and J.R. Low | Communications of the ACM, Vol. 16, Issue 11, p. 703 | 1973 | AI | |
| Translator writing systems | J.A. Feldman and D. Gries | Communications of the ACM, Vol. 11, Issue 2, pp. 77-113 | 1968 | AI | |
| Increasing the Power of Association Studies by Imputation-Based Sparse Tag SNP Selection | O. Davidovich, G. Kimmel, E. Halperin, and R. M. Shamir | Communications in information and Systems, Vol. 9, No. 3, pp. 269-282 | September 2009 | Algorithms | [PDF]
|
| Prediction of Phenotype Information from Genotype Data | N. Yosef, J. Gramm, Q.-F. Wang, W. S. Noble, R. M. Karp, and R. Sharan | Communications in Information and Systems, Vol. 10, No. 2, pp. 99-114 | May 2010 | Algorithms | |
| The Science of Artificial Intelligence | J.A. Feldman | Commentary on a paper by Duda, Nilsson, and Raphael, Research Directions in Software Technology | 1977 | AI | |
| Graph Traversals, Genes, and Matroids: An Efficient Case of the Travelling Salesman Problem | D. Gusfield, R.M. Karp, W. Lusheng, and P. Stelling | Combinatorial Pattern Matching. 7th Annual Symposium, CPM 96. Proceedings. 10-12 June 1996. Berlin, Germany: Springer-Verlag, 1996. p. 304-19. | June 1996 | Algorithms | |
| Inductive Rule Learning on the Knowledge Level | U. Schmid and E. Kitzelmann | Cognitive Systems Research, Special Issue on Complex Cognition , Vol. 12, Issues 3-4, pp. 237-248 | September 2011 | AI | [PDF]
|
| Connectionist Models and Their Properties | J.A. Feldman and D.H. Ballard | Cognitive Science, Vol. 6, pp. 205-254 | 1982 | AI | |
| Indirect Evidence and the Poverty of the Stimulus: The Case of Anaphoric One | S. Foraker, T. Regier, N. Khetarpal, A. Perfors, and J. Tenenbaum | Cognitive Science, Vol. 33, No. 2, pp. 287-300 | March 2009 | AI | [PDF]
|
| Spatial and Linguistic Aspects of Visual Imagery in Sentence Processing | B. Bergen, T. S. Lindsay, T. Matlock, and S. Narayanan | Cognitive Science, Vol. 31, Issue 5, pp. 733-764 | September 2007 | AI | |
| Attention to Endpoints: A Cross-Linguistic Constraint on Spatial Meaning | T. Regier and M. Zheng | Cognitive Science, Vol. 31, Issue 4, pp. 705-719 | July 2007 | AI | |
| The Emergence of Words: Attentional Learning in Form and Meaning | T. Regier | Cognitive Science, Vol. 29, Issue 6, pp. 819-865 | January 2005 | AI | |
| The Neural Binding Problem(s) | J. Feldman | Cognitive Neurodynamics, Vol. 7, Issue 1, pp. 1-11 | February 2013 | AI | [PDF]
|
| Ecological Expected Utility and the Mythical Neural Code | J. Feldman | Cognitive Neurodynamics, Vol. 4, No. 1, pp. 25-35 | March 2010 | AI | [PDF]
|
| Learning the Unlearnable: The Role of Missing Evidence | T. Regier and S. Gahl | Cognition, Vol. 93, No. 2, pp. 147-155 | September 2004 | AI | |
| Linguistic and Non-Linguistic Spatial Categorization | L. E. Crawford, T. Regier, and J. Huttenlocher | Cognition, Vol. 75, No. 3, pp. 209-235 | June 2000 | AI | |
| Color Naming Universals: The Case of Berinmo | P. Kay and T. Regier | Cognition, Vol. 102, No. 2, pp. 289-298 | February 2007 | AI | |
| Review of The Architecture of Cognition, by John R. Anderson | J.A. Feldman | Cognition and Brain Theory | 1984 | AI | |
| FrameNet español. Una red semántica de marcos conceptuales | C. Subirats-Rüggeberg | Cognición y percepción lingüística, Universidad de Valencia and Leipzig University, 182-196 | 2005 | AI | [PDF]
|