Publications

Found 412 results
Author [ Title(Desc)] Type Year
Filters: First Letter Of Title is C  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
C
Allman, M. (2013).  On Changing the Culture of Empirical Internet Assessment. ACM SIGCOMM Computer Communication Review. 43(3), 78-83.
Gupta, A., & Moran M. (1993).  Channel Groups: A Unifying Abstraction for Specifying Inter-stream Relationships.
Edwards, J. (2001).  Chapter 17: The Transcription of Discourse. 321-348.
Zhang, Y., Breslau L., Paxson V., & Shenker S. J. (2002).  On the Characteristics and Origins of Internet Flow Rates. ACM SIGCOMM Computer Communication Review. 32(4), 309-322.
Zhang, Y., Breslau L., Paxson V., & Shenker S. J. (2002).  On the Characteristics and Origins of Internet Flow Rates. Proceedings of the ACM SIGCOMM Conference. 309-322.
Pang, R., Yegneswaran V., Barford P., Paxson V., & Peterson L. (2004).  Characteristics of Internet Background Radiation. Proceedings of the 2004 Internet Measurement Conference (IMC 2004).
Szyperski, C., & Ventre G. (1993).  A Characterization of Multi-Party Interactive Multimedia Applications.
Cutello, V., & Montero J. (1992).  A Characterization of Rational Amalgamation Operations.
Ausiello, G., Protasi M., & Angelaccio M. (1991).  A Characterization of Space Complexity Cases and Subexponential Time Classesas Limiting Polynomially Decidable Sets.
Karp, R. M. (1978).  A Characterization of the Minimum Cycle Mean in a Digraph. Discrete Mathematics (Netherlands). 23(3), 309-311.
Garg, R. (1995).  Characterization of Video Traffic.
Pearce, P., Dave V., Grier C., Levchenko K., Guha S., McCoy D., et al. (2014).  Characterizing Large-Scale Click Fraud in ZeroAccess.
Radoslavov, P., Tangmunarunkit H., Yu H., Govindan R., Shenker S. J., & Estrin D. (2000).  On Characterizing Network Topologies and Analyzing Their Impact on Protocol Design.
Singh, R., Nithyanand R., Afroz S., Tschantz M. Carl, Gill P., & Paxson V. (2017).  Characterizing the Nature and Dynamics of Tor Exit Blocking.. Proceedings of USENIX Security 2017.
Gusella, R. (1990).  Characterizing the Variability of Arrival Processes with Indices of Dispersion.
Vinyals, O., & Wegmann S. (2014).  Chasing the Metric: Smoothing Learning Algorithms for Keyword Detection.
Hölldobler, S. (1990).  CHCL - A Connectionist Inference System for Horn Logic Based on the Connection Method and using Limited Resources.
Hölldobler, S., & Kurfess F. (1991).  CHCL--A Connectionist Inference System.
Ar, S., Blum M. E., Codenotti B., & Gemmell P. (1992).  Checking Approximate Computations Over the Reals.
Bracci, P. M., Skibola C. F., Conde L., Halperin E., Lightfoot T., Smith A., et al. (2010).  Chemokine Polymorphisms and Lymphoma: A Pooled Analysis. Leukemia and Lymphoma. 51(3), 497-506.
Marczak, B., Weaver N., Dalek J., Fifield D., McKune S., Rey A., et al. (2015).  China’s Great Cannon. The Citizen Report.
Bachrach, J., Vo H., Richards B., Lee Y., Waterman A., Avižienis R., et al. (2012).  Chisel: Constructing Hardware in a Scala Embedded Language.
Ghodsi, A., Zaharia M., Shenker S. J., & Stoica I. (2013).  Choosy: Max-Min Fair Sharing for Datacenter Jobs with Constraints. 365-378.
Frankle, J.., & Karp R. M. (1986).  Circuit placements and costs bounds by eigenvector decomposition. Proceedings of the IEEE International Conference on Computer-Aided Design (ICCAD-86), A Conference for the EE CAD Professional. 414-417.
Lei, H., Choi J., & Friedland G. (2011).  City-Identification on Flickr Videos Using Acoustic Features.

Pages