Publications

Found 361 results
[ Author(Asc)] Title Type Year
Filters: First Letter Of Last Name is K  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
K
Krishnan, R., Sterbenz J. P. G., Eddy W. M., Partridge C., & Allman M. (2004).  Explicit Transport Error Notification (ETEN) for Error-Prone Wireless and Satellite Networks. 46(3), 343-362.
Krishnan, R., Allman M., Partridge C., Sterbenz J. P. G., & Ivancic W.. (2002).  Explicit Transport Error Notification (ETEN) for Error-Prone Wireless and Satellite Networks - Summary.
Krishnamoorthy, N., Malkarnenkar G., Mooney R., Saenko K., & Guadarrama S. (2013).  Generating Natural-Language Video Descriptions Using Text-Mined Knowledge.
Krieger, R., Becker B., & Keim M. (1994).  A Hybrid Fault Simulator for Synchronous Sequential Circuits.
Krick, C., Räcke H., & Westermann M. (2001).  Approximation Algorithms for Data Management in Networks.
Krick, C., Räcke H., & Westermann M. (2001).  Approximation Algorithms for Data Management in Networks. Proceedings of the Thirteenth ACM Symposium on Parallel Algorithms and Architectures (SPAA). 237-246.
Krell, M. Michael, Bernd J., Li Y., Ma D., Choi J., Ellsworth M., et al. (2017).  Field Studies with Multimedia Big Data: Opportunities and Challenges.
Kreibich, C., Weaver N., Nechaev B., & Paxson V. (2010).  Netalyzr: Illuminating The Edge Network. 246-259.
Kreibich, C., Kanich C., Levchenko K., Enright B., Voelker G. M., Paxson V., et al. (2008).  On the Spam Campaign Trail.
Kreibich, C., & Jahnke M. (2010).  Proceedings of the 7th International Conference on Detection of Intrusions and Malware (DIMVA 2010), Bonn, Germany.
Kreibich, C., Weaver N., Kanich C., Cui W., & Paxson V. (2011).  GQ: Practical Containment for Measuring Modern Malware Systems.
Kreibich, C., Weaver N., Kanich C., Cui W., & Paxson V. (2011).  GQ: Practical Containment for Measuring Modern Malware Systems.
Kreibich, C., & Sommer R. (2005).  Policy-Controlled Event Management for Distributed Intrusion Detection. Proceedings of the Fourth International Workshop on Distributed Event-Based Systems (DEBS) (ICDCSW'05). 4, 385-391.
Kreibich, C., Weaver N., Maier G., Nechaev B., & Paxson V. (2011).  Experiences from Netalyzr with Engaging Users in End-System Measurement. 25-30.
Kreibich, C. (2005).  Brooery: A Graphical Environment for Analysis of Security-Relevant Network Activity. Proceedings of the USENIX Annual Technical Conference, FREENIX Track (USENIX '05 FREENIX). 109-118.
Kreibich, C., Weaver N., Nechaev B., & Paxson V. (2010).  Netalyzr: Illuminating Edge Network Neutrality, Security, and Performance.
Kreibich, C., Kanich C., Levchenko K., Enright B., Voelker G. M., Paxson V., et al. (2009).  Spamcraft: An Inside Look At Spam Campaign Orchestration.
Krawczyk, J.., Kohl T. A., Goesmann A.., Kalinowski J.., & Baumbach J. (2009).  From Corynebacterium Glutamicum to Mycobacterium Tuberculosis - Towards Transfers of Gene Regulatory Networks and Integrated Data Analyses with MycoRegNet. Nucleic Acids Research. 37(14), 
Krauthgamer, R., & Lee J. R. (2002).  The Intrinsic Dimensionality of Graphs.
Krauss, L.. M., Moody J., & Wilczek F. (1984).  A Stellar Energy Loss Mechanism Involving Axions. 144B,
Krauss, L.., Moody J., Wilczek F., & Morris D.. (1985).  Calculations for Cosmic Axion Detection. 55(17), 1797-1800.
Krause, M., & Kulkarni A. (2015).  Predicting Sales E-Mail Responders using a Natural Language Model. Communications of the ACM. 38(11), 39-41.
Krause, M., Hall M., Williams J. Jay, Paritosh P., Prip J., & Caton S. (2016).  Connecting Online Work and Online Education at Scale. Proceedings of the 2016 CHI Conference Extended Abstracts on Human Factors in Computing Systems. 3536-3541.
Krasnova, H., Kolesnikova E.., & Günther O. (2009).  "It Wont't Happen to Me!": Self-Disclosure in Online Social Networks.
Krashinsky, R., Batten C., & Asanović K. (2008).  Implementing the Scale Vector-Thread Processor. ACM Transactions on Design Automation of Electronic Systems. 13(3), 

Pages