Publications

Found 416 results
Author [ Title(Desc)] Type Year
Filters: First Letter Of Title is C  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
C
Lei, H., Choi J., & Friedland G. (2011).  City-Identification on Flickr Videos Using Acoustic Features.
Lesser, N.., & Ellis D. P. W. (2005).  Clap Detection and Discrimination for Rhythm Therapy. Proceedings of IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2005). 37-40.
Yaman, S., Hakkani-Tür D., Tur G., Grishman R., Harper M. P., McKeown K. R., et al. (2009).  Classification-Based Strategies for Combining Multiple 5-W Question Answering Systems. 2703-2706.
Caputo, B., Hayman E., Fritz M., & Eklundh J-O. (2010).  Classifying Materials in the Real World. Image and Vision Computing. 28(1), 150-163.
Kay, P., & Sag I. A. (2012).  Cleaning up the Big Mess: Discontinuous Dependencies and Complex Determiners.
Sharan, R., Maron-Katz A., & Shamir R. (2003).  CLICK and EXPANDER: A System for Clustering and Visualizing Gene Expression Data. Bioinformatics. 1787-1799.
Kohler, E. (2000).  The Click Modular Router.
Kohler, E., Morris R., Chen B., Jannotti J., & M. Kaashoek F. (2000).  The Click Modular Router. ACM Transactions on Computer Systems. 18(3), 
Morris, R., Kohler E., Jannotti J., & M. Kaashoek F. (1999).  The Click Modular Router.
Levchenko, K., Pitsillidis A., Chachra N., Enright B., Felegyhazi M., Grier C., et al. (2011).  Click Trajectories: End-to-End Analysis of the Spam Value Chain. 431-446.
Ferrari, D. (1990).  Client Requirements for Real-Time Communication Services.
Xing, E. P., & Karp R. M. (2001).  CLIFF: Clustering of High-Dimensional Microarray Data via Iterative Feature Filtering Using Normalized Cuts. 17, S306-S315.
Schmidt, H. W., & Omohundro S. (1991).  CLOS, Eiffel, and Sather: A Comparison.
McGillivary, A.., Fornasa M., Baglietto P., Stecca M., Caprino G., & Maresca M. (2014).  Cloud Computing Goes To Sea: Ship Design Around Software Defined Networking (SDN) Systems. Ocean News and Technology.
Martignoni, L., Poosankam P., Zaharia M., Han J., McCamant S., Song D., et al. (2012).  Cloud Terminal: Secure Access to Sensitive Applications from Untrusted Systems. 165-176.
Popa, L., Yu M., Ko S.. Y., Ratnasamy S., & Stoica I. (2010).  CloudPolice: Taking Access Control out of the Network.
Shamir, R., Sharan R., & Tsur D.. (2004).  Cluster Graph Modification Problems.
Garg, N. P., Favre B., Riedhammer K., & Hakkani-Tür D. (2009).  ClusterRank: A Graph Based Method for Meeting Summarization. 1499-1502.
Asanović, K., Beck J., Callahan T. J., Feldman J., Irissou B., Kingsbury B., et al. (1993).  CNS-1 Architecture Specification: A Connectionist Network Supercomputer.
Feldman, J. (1993).  CNS-1 Architecture Specification: A Connectionist Network Supercomputer.
Wang, Z., Hormozdiari F., Yang W-Y., Halperin E., & Eskin E. (2012).  CNVeM: Copy Number Variation Detection Using Uncertainty of Read Mapping. 326-340.
Adler, I., Ahn H.. S., Karp R. M., & Ross S. M. (2003).  Coalescing Times for IID Random Variables.
Hellerstein, L., Gibson G. A., Karp R. M., Katz R.. M., & Patterson D. (1994).  Coding techniques for handling failures in large disk arrays. Algorithmica. 12(2-3), 182-208.
Seredynski, F. (1996).  Coevolutionary Game-Theoretic Multi-Agent Systems: the Application to Mapping and Scheduling Problems.
Feldman, J. (1991).  Cognition as Search: review of Unified Theories of Cognition, (by Allen Newell, Harvard University Press, Cambridge, MA, 1990). Science. 251(2), 575.

Pages