Publications

Found 541 results
Author Title [ Type(Desc)] Year
Filters: First Letter Of Last Name is W  [Clear All Filters]
Technical Report
Morgan, N., Asanović K., Kingsbury B., & Wawrzynek J. (1990).  Developments in Digital VLSI Design for Artificial Neural Networks.
Wöhlke, G. (1994).  Dextrous Object Manipulation with Robot Hands Including Rolling and Slipping: Improved Motion & Force Computation Method.
Wolfinger, B. (1997).  Efficiency of PET and MPEG Encoding for Video Streams: Analytical QoS Evaluations.
Brockmann, K., & Wanka R. (1996).  Efficient Oblivious Parallel Sorting on the MasPar MP-1.
Floyd, S., Handley M., Padhye J., & Widmer J. (2000).  Equation-Based Congestion Control for Unicast Applications: the Extended Version.
Pfoser, D., Efentakis A., Voisard A., & Wenk C. (2009).  Exploiting Road Network Properties in Efficient Shortest‐Path Computation.
Ostrovsky, R., & Wilkerson D. (1994).  Faster Computation On Directed Networks of Automata.
Morgan, N., Cohen J., Parthasarathi S. Hari Krish, Chang S-Y., & Wegmann S. (2013).  Final Report: OUCH Project (Outing Unfortunate Characteristics of HMMs).
Schwarz, C., Teich J., Welzl E., & Evans B. (1994).  On Finding a Minimal Enclosing Parallelgram.
Johnson, C. R., Fillmore C. J., Petruck M. R. L., Baker C. F., Ellsworth M., Ruppenhofer J., et al. (2002).  FrameNet: Theory and Practice.
Knightly, E. W., Wrege D. E., Liebeherr J., & Zhang H. (1994).  Fundamental Limits and Tradeoffs of Providing Deterministic Guarantees to VBR Video Traffic.
Werther, T. (1993).  Generalized Vandermonde Determinants Over the Chebyshev Basis.
Kreibich, C., Weaver N., Kanich C., Cui W., & Paxson V. (2011).  GQ: Practical Containment for Measuring Modern Malware Systems.
Alon, N., Karp R. M., Peleg D., & West D. (1991).  A Graph-Theoretic Game and its Application to the k-Server Problem.
Sommer, R., Weaver N., & Paxson V. (2010).  HILTI: An Abstract Execution Environment for High-Performance Network Traffic Analysis.
Asanović, K., Kingsbury B., Morgan N., & Wawrzynek J. (1991).  HiPNeT-1: A Highly Pipelined Architecture for Neural Network Training.
Scott, C., Wundsam A., Whitlock S., Or A., Huang E., Zarifis K., et al. (2013).  How Did We Get Into This Mess? Isolating Fault-Inducing Inputs to SDN Control Software.
Scott, C., Wundsam A., Whitlock S., Or A., Huang E., Zarifis K., et al. (2013).  How Did We Get Into This Mess? Isolating Fault-Inducing Inputs to SDN Control Software.
Wermter, S. (1997).  Hybrid Approaches to Neural Network-based Language Processing.
Waterman, A. (2011).  Improving Energy Efficiency and Reducing Code Size with RISC-V Compressed.
Wu, S-L. (1998).  Incorporating Information From Syllable-Length Time Scales into Automatic Speech Recognition.
Traub, J. F., & Wozniakowski H. (1990).  Information-Based Complexity: New Questions for Mathematicians.
Milanese, R., Wechsler H., Gil S., Bost J-M., & Pun T. (1994).  Integration of Bottom-Up and Top-Down Cues for Visual Attention Using Non-Linear Relaxation.
Wikarski, D. (1996).  An Introduction to Modular Process Nets.
Weber, S. Hollbach, & Stolcke A. (1990).  L0: A Testbed for Miniature Language Acquisition;.

Pages