Publications

Found 327 results
[ Author(Desc)] Title Type Year
Filters: First Letter Of Last Name is B  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
B
Braden, R., Clark D. D., Crowcroft J., Davie B., Deering S., Estrin D., et al. (1998).  Recommendations on Queue Management and Congestion Avoidance in the Internet.
Bradner, S.., & Paxson V. (2000).  IANA Allocation Guidelines For Values In the Internet Protocol and Related Headers.
Bradonjic, M.., Elsässer R., Friedrich T., Sauerwald T., & Stauffer A. (2010).  Efficient Broadcast on Random Geometric Graphs. 1412-1421.
Bregler, C., Omohundro S., Covell M., Slaney M., Ahmad S., Forsyth D.., et al. (1998).  Probabilistic Models of Verbal and Body Gestures.
Bregler, C., & Konig Y. (1994).  "Eigenlips" for Robust Speech Recognition.
Bregler, C., & Omohundro S. (1994).  Surface Learning with Applications to Lip-Reading.
Breslau, L. (2000).  Advances in Network Simulation. IEEE Computer. 59-67.
Breslau, L., Cao P., Fan L., Phillips G., & Shenker S. J. (1999).  Web Caching and Zipf-Like Distributions: Evidence and Implications. Proceedings of the Eighteenth Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM '99). 1, 126-134.
Breslau, L., & Shenker S. J. (1998).  Best-Effort versus Reservations: A Simple Comparative Analysis. ACM Computer Communication Review. 28, 3-16.
Breslau, L., Knightly E. W., Shenker S. J., Stoica I., & Zhang H. (2000).  Endpoint Admission Control: Architectural Issues and Performance. Proceedings of the ACM SIGCOMM Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication.
Breslau, L., Jamin S., & Shenker S. J. (2000).  Comments on the Performance of Measurement-Based Admission Control Algorithms. Proceedings of the Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM 2000). 3, 1233-1242.
Breslau, L. (1999).  Advances in Network Simulation.
Breslau, L., Jamin S., & Shenker S. J. (2000).  Comments on the Performance of Measurement-Based Admission Control Algorithms.
Bretones, C. (2001).  Synaesthetic Metaphors in English.
Bretones, C., Cristóbal M., & Ibarretxe-Antuñano I. (2001).  Exiting Events in Spanish: Boundary I-Schema and Move X-Schema.
Breuer, P.. T., A. Lopez M., & A. Ares G. (2000).  The Network Block Device. Linux Journal.
Brewer, E., Demmer M., Ho M., Honicky R.. J., Pal J., Plauché M., et al. (2006).  The challenges of IT research in developing regions. IEEE Pervasive Computing. 5(2), 15-23.
Brewka, G. (1992).  An Abductive Framework for Generalized Logic Programs: Preliminary Report.
Brewka, G., Guesgen H. Werner, & Hertzberg J. (1992).  Constraint Relaxation and Nonmonotonic Reasoning.
Brewka, G. (1992).  A Framework for Cumulative Default Logics.
Brickson, L., Vollrath F., & Titus A. J. (2023).  Elephants and Algorithms: A Review of the Current and Future Role of AI in Elephant Monitoring. arXiv.
Bringmann, K., & Friedrich T. (2009).  Approximating the Least Hypervolume Contributor : NP-Hard in General, but Fast in Practice. 6-20.
Bringmann, K., & Friedrich T. (2010).  Approximating the Volume of Unions and Intersections of High-Dimensional Geometric Objects. Computational Geometry. 43(6-7), 601-610.
Bringmann, K., & Friedrich T. (2008).  Approximating the Volume of Unions and Intersections of High-Dimensional Geometric Objects. 436-447.
Bringmann, K., & Friedrich T. (2009).  Don’t Be Greedy When Calculating Hypervolume Contributions.. 103-112.

Pages