Publications

Found 283 results
Author [ Title(Desc)] Type Year
Filters: First Letter Of Title is M  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
M
Voisard, A., & Ziekow H. (2010).  Mātārere: A Layered Framework for Specifying Event-Based Systems.
Bharghavan, V., Demers A. J., Shenker S., & Zhang L. (1994).  MACAW: A Media Access Protocol for Wireless LAN's. Proceedings of the Conference on Communications Architectures, Protocols and Applications (SIGCOMM '94). 212-225.
Feldman, J. (1969).  Machine Intelligence. 14, 490-492.
Darrell, T., Kloft M., Pontil M., Rätsch G., & Rodner E. (2015).  Machine Learning with Interdependent and Non-identically Distributed Data (Dagstuhl Seminar 15152). Dagstuhl Reports. 5, 18–55.
Kramer, O. (2011).  Machine Symbol Grounding and Optimization.
Moody, J. (1995).  Macroeconomic Forecasting: Challenges and Neural Network Solutions. Proceedings of the International Symposium on Artificial Neural Networks.
Bialek, W.., Moody J., & Wilczek F. (1986).  Macroscopic T Nonconservation: Prospects for a New Experiment. 56,
Raghavan, B., & Hasan S. (2012).  Macroscopically Sustainable Networking: An Internet Quine.
Dagum, P. (1990).  On the Magnification of Exchange Graphs with Applications to Enumeration Problems (Thesis).
Mirghafori, N., Fosler-Lussier E., & Morgan N. (1995).  Making Automatic Speech Recognition More Robust to Fast Speech.
Chawathe, Y., Ratnasamy S., Breslau L., & Shenker S. (2003).  Making Gnutella-Like P2P Systems Scalable. Proceedings of ACM Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications (SIGCOMM). 407-418.
Shenker, S. (1995).  Making Greed Work in Networks: A Game-Theoretic Analysis of Switch Service Disciplines. IEEE/ACM Transactions on Networking. 3(6), 819-831.
Blanton, E., & Allman M. (2002).  On Making TCP More Robust to Packet Reordering.
Raghavan, B., Koponen T., Ghodsi A., Brajkovic V., & Shenker S. (2012).  Making the Internet More Evolvable.
Stolcke, A. (2011).  Making the Most from Multiple Microphones in Meeting Recognition. 4992-4995.
Gairing, M. (2008).  Malicious Bayesian Congestion Games. 119-132.
Ulrich, R. (1996).  A Management Platform for Global Area ATM Networks.
Ulrich, R., & Kritzinger P. (1996).  Managing ABR Capacity in Reservation-based Slotted Networks.
Kramer, O., Satzger B., & Lässig J. (2010).  Managing Energy in a Virtual Power Plant Using Learning Classifier Systems.
Shenker, S., Weinrib A., & Schooler E. (1994).  Managing Shared Ephemeral Teleconferencing State: Policy and Mechanism. Proceedings of the International COST 237 Workshop on Multimedia Transport and Teleservices. 69-88.
Livescu, K., Bezman A., Borges N., Yung L., etin Ö. Ç., Frankel J., et al. (2007).  Manual Transcription of Conversational Speech at the Articulatory Feature Level. 4, 953-956.
Grier, C., Ballard L., Caballero J., Chachra N., Dietrich C. J., Levchenko K., et al. (2012).  Manufacturing Compromise: The Emergence of Exploit-as-a-Service. 821-832.
Stojanovic, V., Joshi A., Batten C., Kwon Y-J., & Asanović K. (2009).  Manycore Processor Networks with Monolithic Integrated CMOS Photonics.
Shalf, J., Asanović K., Patterson D., Keutzer K., Mattson T.., & Yelick K. (2009).  The Manycore Revolution: Will HPC Lead or Follow?. 40-49.
Jiang, T., & Karp R. M. (1998).  Mapping Clones with a Given Ordering or Interleaving. 21,

Pages