Publications

Found 529 results
Author Title [ Type(Desc)] Year
Filters: First Letter Of Last Name is W  [Clear All Filters]
Technical Report
Floyd, S., Handley M., Padhye J., & Widmer J. (2000).  Equation-Based Congestion Control for Unicast Applications: the Extended Version.
Pfoser, D., Efentakis A., Voisard A., & Wenk C. (2009).  Exploiting Road Network Properties in Efficient Shortest‐Path Computation.
Ostrovsky, R., & Wilkerson D. (1994).  Faster Computation On Directed Networks of Automata.
Morgan, N., Cohen J., Parthasarathi S. Hari Krish, Chang S-Y., & Wegmann S. (2013).  Final Report: OUCH Project (Outing Unfortunate Characteristics of HMMs).
Schwarz, C., Teich J., Welzl E., & Evans B. (1994).  On Finding a Minimal Enclosing Parallelgram.
Johnson, C. R., Fillmore C. J., Petruck M. R. L., Baker C. F., Ellsworth M., Ruppenhofer J., et al. (2002).  FrameNet: Theory and Practice.
Knightly, E. W., Wrege D. E., Liebeherr J., & Zhang H. (1994).  Fundamental Limits and Tradeoffs of Providing Deterministic Guarantees to VBR Video Traffic.
Werther, T. (1993).  Generalized Vandermonde Determinants Over the Chebyshev Basis.
Kreibich, C., Weaver N., Kanich C., Cui W., & Paxson V. (2011).  GQ: Practical Containment for Measuring Modern Malware Systems.
Alon, N., Karp R. M., Peleg D., & West D. (1991).  A Graph-Theoretic Game and its Application to the k-Server Problem.
Sommer, R., Weaver N., & Paxson V. (2010).  HILTI: An Abstract Execution Environment for High-Performance Network Traffic Analysis.
Asanović, K., Kingsbury B., Morgan N., & Wawrzynek J. (1991).  HiPNeT-1: A Highly Pipelined Architecture for Neural Network Training.
Scott, C., Wundsam A., Whitlock S., Or A., Huang E., Zarifis K., et al. (2013).  How Did We Get Into This Mess? Isolating Fault-Inducing Inputs to SDN Control Software.
Scott, C., Wundsam A., Whitlock S., Or A., Huang E., Zarifis K., et al. (2013).  How Did We Get Into This Mess? Isolating Fault-Inducing Inputs to SDN Control Software.
Wermter, S. (1997).  Hybrid Approaches to Neural Network-based Language Processing.
Waterman, A. (2011).  Improving Energy Efficiency and Reducing Code Size with RISC-V Compressed.
Wu, S-L. (1998).  Incorporating Information From Syllable-Length Time Scales into Automatic Speech Recognition.
Traub, J. F., & Wozniakowski H. (1990).  Information-Based Complexity: New Questions for Mathematicians.
Milanese, R., Wechsler H., Gil S., Bost J-M., & Pun T. (1994).  Integration of Bottom-Up and Top-Down Cues for Visual Attention Using Non-Linear Relaxation.
Wikarski, D. (1996).  An Introduction to Modular Process Nets.
Weber, S. Hollbach, & Stolcke A. (1990).  L0: A Testbed for Miniature Language Acquisition;.
Weaver, N., Paxson V., Staniford S., & Cunningham R. (2003).  Large Scale Malicious Code: A Research Agenda.
Wooters, C. (1993).  Lexical Modeling in a Speaker Independent Speech Understanding System.
Bourlard, H., & Wellekens C. (1988).  Links Between Markov Models and Multilayer Perceptrons.
Wrede, B., Bhagat S., Dhillon R., & Shriberg E. (2005).  Meeting Recorder Project: Hot Spot Labeling Guide.

Pages