Publications

Found 118 results
Author Title Type [ Year(Asc)]
Filters: First Letter Of Title is H  [Clear All Filters]
2005
Aziz-Zadeh, L., Iacoboni M., & Zaidel E. (2005).  Hemispheric Sensitivity to Body Stimuli in Simple Reaction Time. Experimental Brain Research. 170(1), 116-121.
Ruiz, P. M., & Gómez-Skarmeta A. (2005).  Heuristic Algorithms for Minimum Bandwidth Consumption Multicast Trees in Wireless Mesh Networks. Lecture Notes in Computer Science. 3738,
Feldman, M., Chuang J., Stoica I., & Shenker S. J. (2005).  Hidden-Action in Multi-Hop Routing. Proceedings of the 6th ACM Conference on Electronic Commerce (EC'05). 117-126.
Subramanian, L., Caesar M., Ee C. Tien, Handley M., Mao M., Shenker S. J., et al. (2005).  HLP: A Next Generation Inter-domain Routing Protocol.
Subramanian, L., Caesar M., Ee C. Tien, Handley M., Mao M., Shenker S. J., et al. (2005).  HLP: A Next-Generation Interdomain Routing Protocol. Proceedings of ACM Special Interest Group on Data Communications Conference (SIGCOMM 2005). 13-24.
Zhuang, S., Lai K., Stoica I., Katz R. H., & Shenker S. J. (2005).  Host Mobility Using an Internet Indirection Infrastructure. Wireless Networks. 11(6), 741-756.
2003
Feigenbaum, J., Krishnamurthy A., Sami R., & Shenker S. J. (2003).  Hardness Results for Multicast Cost Sharing. Theoretical Computer Science. 304(1-3), 215-236.
Coja-Oghlan, A.., Krumke S.. O., & Nierhoff T. (2003).  A Heuristic for the Stacker Crane Problem on Trees Which is Almost Surely Exact. Algorithms and Computation, 14th International Symposium, ISAAC 2003, LNCS 2906. 605-614.
Pang, R., & Paxson V. (2003).  A High-level Programming Environment for Packet Trace Anonymization and Transformation. Proceedings of ACM Special Interest Group on Data Communications Conference (SIGCOMM 2003).
Zhuang, S., Lai K., Stoica I., Katz R. H., & Shenker S. J. (2003).  Host Mobility Using an Internet Indirection Infrastructure. Proceedings of the First International Conference on Mobile Systems, Applications, and Services (MobiSys 2003). 129-144.
Pal, J., Lyman P., Varian H. R., Charles P., Good N., Jordan L. Lamar, et al. (2003).  How Much Information.
2002
Himanen, P. (2002).  The Hacker Ethic and the Spirit of the Information Age.
Kortsarz, G., Krauthgamer R., & Lee J. R. (2002).  Hardness of Approximation for Vertex-Connectivity Network Design Problems.
Feigenbaum, J., Krishnamurthy A., Sami R., & Shenker S. J. (2002).  Hardness Results for Multicast Cost Sharing. Proceedings of the IARCS Annual Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS 2002). 133-144.
Dodge, E., & Wright A. (2002).  Herds of Wildebeest, Flasks of Vodka, Heaps of Trouble: An Embodied Construction Grammar Approach to English Measure Phrases. Proceedings of the 28th Annual Meeting of the Berkeley Linguistics Society.
Xing, E. P., Jordan M. I., Karp R. M., & Russell S. (2002).  A Hierarchical Bayesian Markovian Model for Motifs in Biopolymer Sequences.
Sivadas, S., & Hermansky H. (2002).  Hierarchical Tandem Feature Extraction. Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2002).
Zhuang, S., Lai K., Stoica I., Katz R. H., & Shenker S. J. (2002).  Host Mobility Using an Internet Indirection Infrastructure.
Staniford, S., Paxson V., & Weaver N. (2002).  How to Own the Internet in Your Spare Time. Proceedings of the Eleventh USENIX Security Symposium (Security '02).
2001
Ganesan, D., Govindan R., Shenker S. J., & Estrin D. (2001).  Highly Resilient, Energy Efficient Multipath Routing in Wireless Sensor Networks. ACM Mobile Computing and Communications Review. 5(4), 11-25.

Pages