Found 96 results
Author Title [ Type(Desc)] Year
Filters: First Letter Of Title is O  [Clear All Filters]
Conference Paper
Maire, M., Yu S. X., & Perona P. (2011).  Object Detection and Segmentation from Joint Embedding of Parts and Pixels. Proceedings of International Conference on Computer Vision.
Chu, M., Weaver N., Sulimma K., DeHon A., & Wawrzynek J. (1998).  Object Oriented Circuit Generators in Java. Proceedings of the IEEE Symposium on Field Programmable Custom Computing Machines (FCCM).
Shriberg, E., Stolcke A., & Baron D. (2001).  Observations on Overlap: Findings and Implications for Automatic Processing of Multi-Party Conversation. Proceedings of the 7th European Conference on Speech Communication and Technology (Eurospeech 2001).
Zhang, L., Shenker S. J., & Clark D. D. (1991).  Observations on the Dynamics of a Congestion Control Algorithm: The Effects of Two-Way Traffic. Proceedings of the ACM SIGCOMM '91 Conference on Communications Architecture & Protocols. 133-147.
Kohler, E., Li J., Paxson V., & Shenker S. J. (2002).  Observed Structure of Addresses in IP Traffic. Proceedings of the 2nd ACM SIGCOMM Internet Measurement Workshop (IMW). 253-266.
Joseph, D.., Kannan J., Kubota A.., Lakshminarayanan K., Stoica I., & Wehrle K.. (2006).  OCALA: An Architecture for Supporting Legacy Applications Over Overlays. Proceedings of the Third Symposium on Networked Systems Design and Implementation (NSDI 2006). 267-280.
Ballani, H., Chawathe Y., Ratnasamy S., Roscoe T., & Shenker S. J. (2005).  Off by Default. Proceedings of the Fourth Workshop on Hot Topics in Networks (Hotnets-IV).
Koponen, T., Casado M., Gude N. S., Stribling J., Poutievski L., Zhu M., et al. (2010).  Onix: A Distributed Control Platform for Large-scale Production Networks. 351-364.
Karp, R. M. (1992).  On-line algorithms versus off-line algorithms: how much is it worth to know the future?. Proceedings of the IFIP 12th World Computer Congress on Algorithms, Software, Architecture - Information Processing '92. 416-429.
Oliva, J., Feldman J., Giraldi L., & Dodge E. (2012).  Ontology Driven Contextual Reference Resolution in Embodied Construction Grammar.
Scheffczyk, J., Baker C. F., & Narayanan S. (2006).  Ontology-Based Reasoning about Lexical Resources. Proceedings of the Workshop on Interfacing Ontologies and Lexical Resources for Semantic Web Technologies (OntoLex 2006). 1-8.
Koerner, M., Runge T., Panda A., Ratnasamy S., & Shenker S. J. (2018).  Open Carrier Interface: An Open Source Edge Computing Framework. Proceedings of the 2018 Workshop on Networking for Emerging Applications and Technologies NEAT '18.
Schryen, G., & Kadura R.. (2009).  Open Source vs. Closed Source Software: Towards Measuring Security. 2016-2023.
Rhea, S., P. Godfrey B., Karp B., Kubiatowicz J. D., Ratnasamy S., Shenker S. J., et al. (2005).  OpenDHT: A Public DHT Service and Its Uses. Proceedings of ACM Special Interest Group on Data Communications Conference (SIGCOMM 2005). 73-84.
Shenker, S. J., McKeown N., Anderson T., Balakrishnan H., Parulkar G., Peterson L., et al. (2008).  OpenFlow: enabling innovation in campus networks. ACM SIGCOMM Computer Communication Review . 38(2), 71.
Guadarrama, S., Rodner E., Saenko K., Zhang N., Farrell R., Donahue J., et al. (2014).  Open-Vocabulary Object Retrieval.
Dreger, H., Feldmann A., Paxson V., & Sommer R. (2004).  Operational Experiences with High-Volume Network Intrusion Detection. Proceedings of the 11th ACM Conference on Computer Communications Security (CCS 2004). 11, 2.
Casado, M., Garfinkel T., Cui W., Paxson V., & Savage S. (2005).  Opportunistic Measurement: Extracting Insight from Spurious Traffic. Proceedings of the Fourth Workshop on Hot Topics in Networks (Hotnets-IV).
Callejo, P., Kelton C., Vallina-Rodriguez N., Cuevas R., Gasser O., Kreibich C., et al. (2017).  Opportunities and Challenges of Ad-based Measurements from the Edge of the Network. Proceedings of HotNets 2017.
Chong, J., Friedland G., Janin A., & Morgan N. (2010).  Opportunities and Challenges of Parallelizing Speech Recognition.
Dagum, P., Karp R. M., Luby M., & Ross S. (1995).  An optimal algorithm for Monte Carlo estimation. Proceedings of the 36th Annual Symposium on Foundations of Computer Science (FOCS'95). 142-149.
Karp, R. M., Vazirani U. V., & Vazirani V. V. (1990).  An optimal algorithm for on-line bipartite matching. Proceedings of the 22nd Annual ACM Symposium on Theory of Computing.
Karp, R. M., Nierhoff T., & Tantau T. (2005).  Optimal Flow Distribution Among Multiple Channels with Unknown Capacities. Proceedings of the Second Brazilian Symposium of Graphs, Algorithms, and Combinatorics (GRACO 2005). 225-231.
Boehme, R., & Felegyhazi M. (2010).  Optimal Information Security Investment with Penetration Testing.