Publications

Found 529 results
Author Title [ Type(Desc)] Year
Filters: First Letter Of Last Name is W  [Clear All Filters]
Technical Report
Heller, B., Erickson D., McKeown N., Griffith R., Ganichev I., Whyte S., et al. (2010).  Ripcord: A Modular Platform for Data Center Networking.
Waterman, A., Lee Y., Patterson D., & Asanović K. (2011).  The RISC-V Instruction Set Manual, Volume I: Base User-Level ISA.
Gomes, B., Löwe W., Quittek J. W., & Weissman B. (1997).  Sather 2: A Language Design for Safe, High-Performance Computing.
Blum, M. E., & Wasserman H. (1994).  Software Reliability via Run-Time Result-Checking.
Feldman, J., & Williams G. (1978).  Some Remarks on Data Types.
Wachsmann, A., & Wanka R. (1997).  Sorting on a Massively Parallel System Using a Library of Basic Primitives: Modeling and Experimental Results.
Wachsmann, A., & Wanka R. (1997).  Sorting on a Massively Parallel System Using a Library of Basic Primitives: Modeling and Experimental Results.
Werther, T. (1993).  Sparse Interpolation from Multiple Derivatives.
Wooters, C., & Morgan N. (1990).  Speech Segmentation and Labeling on the NeXT Machine.
Asanović, K., Beck J., Kingsbury B., Kohn P., Morgan N., & Wawrzynek J. (1991).  SPERT: A VLIW/SIMD Microprocessor for Artificial Neural Network Computations.
Morgan, N., Hermansky H., & Wooters C. (1990).  SPOONS '90: The SPeech recOgnition frOnt eNd workShop.
Moore, D., Paxson V., Savage S., Shannon C., Staniford S., & Weaver N. (2003).  The Spread of the Sapphire/Slammer Worm.
Sturmfels, B., & Wiegelmann M. (1996).  Structural Gröbner Basis Detection.
Jähnichen, S., Gabriel R., Weber M., & Anlauff M. (1989).  Supporting Formal Program Developments: the DEVA Environment.
Stolcke, A., & Wu D. (1992).  Tree Matching with Recursive Distributed Representations.
Gomes, B., Stoutamire D., & Weissman B. (1997).  Type-Safety and Overloading in Sather.
Weaver, N. (2010).  Unencumbered by Success: The Usenix Security Grand Challenge Competition.
Sokol, J., & Widmer J. (2001).  USAIA: Ubiquitous Service Access Internet Architecture.
Gomes, B., Stoutamire D., Weissman B., & Feldman J. (1997).  Using Value Semantic Abstractions to Guide Strongly Typed Library Design.
Karpinski, M., & Werther T. (1989).  VC Dimension and Learnability of Sparse Polynomials and Rational Functions.
Karpinski, M., & Werther T. (1991).  VC Dimension and Sampling Complexity of Learning Sparse Polynomials and Rational Functions.
Scott, C., Wundsam A., Zarifis K., & Shenker S. J. (2012).  What, Where, and When: Software Fault Localization for SDN.
Bernd, J., Borth D., Elizalde B. Martinez, Friedland G., Gallagher H., Gottlieb L., et al. (2015).  The YLI?MED Corpus: Characteristics, Procedures, and Plans.

Pages