Publications

Found 18 results
Author [ Title(Desc)] Type Year
Filters: First Letter Of Title is K  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
K
Zhang, W., Fang V., Panda A., & Shenker S. J. (2020).  Kappa: a programming framework for serverless computing. SoCC '20: Proceedings of the 11th ACM Symposium on Cloud Computing. 328-343.
Narayanan, S. (1997).  KARMA: Knowledge-Based Active Representations For Metaphor and Aspect.
Marczak, B., & Scott-Railton J. (2016).  Keep Calm and (Don’t) Enable Macros: A New Threat Actor Targets UAE Dissidents. The Citizen Lab.
Harbach, M., De Luca A., Malkin N., & Egelman S. (2016).  Keep on Lockin’ in the Free World: A Multi-National Comparison of Smartphone Locking. Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI ’16).
Hatch, A. (2006).  Kernel Optimization for Support Vector Machines: Application to Speaker Verification.
Kulis, B., & Grauman K. (2009).  Kernelized Locality-Sensitive Hashing for Scalable Image Search.
Sankararaman, S., Chun B-G., Yatin C.., & Shenker S. J. (2005).  Key Consistency in DHTs.
Egelman, S., & Pe'er E. (2021).  The Key to Getting People to Be Safer Online: Make the Appeals More Personal. Wall Street Journal.
Riedhammer, K., Favre B., & Hakkani-Tür D. (2008).  A Keyphrase Based Approach to Interactive Meeting Summarization. 153-156.
Bernd, J., Borth D., Carrano C., Choi J., Elizalde B. Martinez, Friedland G., et al. (2015).  Kickstarting the Commons: The YFCC100M and the YLI Corpora. 1-6.
Fleiner, C., Feldman J., & Stoutamire D. (1996).  Killing Threads Considered Dangerous. Proceedings of the Conference on Parallel and Object Oriented Methods and Applications (POOMA).
Saffell, M. (2005).  Knowledge Discovery for Time Series.
Shastri, L., & Wendelken C. (1999).  Knowledge fusion in the large - taking a cue from the brain. Proceedings of the Second International Conference on Information Fusion (FUSION'99).
Karagiannis, D., Kurfess F., & Schmidt H. W. (1991).  Knowledge Selection with ANNs.
Diederich, J. (1988).  Knowledge-Intensive Recruitment Learning.
Paxson, V., Allman M., Dawson S.., Fenner W.., Griner J., Heavens I.., et al. (1999).  Known TCP Implementation Problems.
Fritzke, B. (1993).  Kohonen Feature Maps and Growing Cell Structures - a Performance Comparison.
Feldman, J. (1991).  Konventionelle und konnektionische Parallelverbarbeitung. 58-61.