Publications

Found 125 results
[ Author(Desc)] Title Type Year
Filters: First Letter Of Last Name is W  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
W
Wernicke, S., Alber J., Gramm J., Guo J., & Niedermeier R. (2004).  Avoiding Forbidden Submatrices by Row Deletions. 2832, 349-360.
Werther, T. (1993).  Sparse Interpolation from Multiple Derivatives.
Werther, T. (1993).  Generalized Vandermonde Determinants Over the Chebyshev Basis.
Wester, M., Greenberg S., & Chang S. (2001).  A Dutch Treatment of an Elitist Approach to Articulatory-Acoustic Feature Classification. Proceedings of the 7th European Conference on Speech Communication and Technology (Eurospeech 2001).
Wester, M., & Fosler-Lussier E. (2000).  A Comparison of Data-Derived and Knowledge-Based Modeling of Pronunciation Variation. Proceedings of the 6th International Conference on Spoken Language Processing (ICSLP 2000).
Westermann, M. (2002).  Distributed Caching Independent of the Network Size.
Whetten, B., Vicisano L., Kermode R., Handley M., Floyd S., & Luby M. (2001).  RFC 3048: Reliable Multicast Transport Building Blocks for One-to-Many Bulk-Data Transfer.
Whetton, B., Vicisano L., Kermode R., Handley M., Floyd S., & Luby M. (2000).  Reliable Multicast Transport Building Blocks for One-to-Many Bulk-Data Transfer.
Whitlock, S., Scott C., & Shenker S. J. (2013).  Brief Announcement: Techniques for Programmatically Troubleshooting Distributed Systems. 1-3.
Widmer, J., & Handley M. (2001).  Extending Equation-Based Congestion Control to Multicast Applications. Proceedings of ACM SIGCOMM 2001.
Widmer, J. (2000).  A Mobile Network Architecture for Vehicles.
Widom, M., & Shenker S. J. (1984).  Topological Phase Transitions. 46-51.
Widom, M., Bensimon D., Kadanoff L. P., & Shenker S. J. (1983).  Strange Objects in the Complex Plane. Journal of Statistical Physics. 443-454.
Widyono, R. (1994).  The Design and Evaluation of Routing Algorithms for Real-Time Channels.
Wijesekera, P., Reardon J., Reyes I., Tsai L., Chen J-W., Good N., et al. (2018).  Contextualizing Privacy Decisions for Better Prediction (and Protection). Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI ’18).
Wijesekera, P., Razaghpanah A., Reardon J., Reyes I., Vallina-Rodriguez N., Egelman S., et al. (2017).  “Is Our Children’s Apps Learning?” Automatically Detecting COPPA Violations. Proceedings of the Workshop on Technology and Consumer Protection (ConPro ’17).
Wijesekera, P., Baokar A., Hosseini A., Egelman S., Wagner D., & Beznosov K. (2015).  Android Permissions Remystified: A Field Study on Contextual Integrity. Proceedings of the 24th USENIX Security Symposium.
Wijesekera, P., Baokar A., Tsai L., Reardon J., Egelman S., Wagner D., et al. (2017).  The Feasibility of Dynamically Granted Permissions: Aligning Mobile Privacy with User Preferences . Proceedings of the 2017 IEEE Symposium on Security and Privacy (Oakland ’17).
Wikarski, D. (1996).  An Introduction to Modular Process Nets.
Williams, G., & Ellis D. P. W. (1999).  Speech/music Discrimination Based on Posterior Probability Features. Proceedings of the 6th European Conference on Speech Communication and Technology (Eurospeech '99).
Willinger, W., & Paxson V. (1997).  Discussion of ``Heavy Tail Modeling and Teletraffic Data'' by S.R. Resnick. 25(5), 1805-1869.
Willinger, W., Paxson V., & Taqqu M. S. (1998).  Self-similarity and Heavy Tails: Structural Modeling of Network Traffic.
Willinger, W., & Paxson V. (1998).  Where Mathematics Meets the Internet. Notices of the American Mathematical Society. 45(8), 961-970.
Willinger, W., Paxson V., Riedi R. H., & Taqqu M. S. (2002).  Long-Range Dependence and Data Network Traffic.
Willinger, W., Govindan R., Jamin S., Paxson V., & Shenker S. J. (2002).  Scaling Phenomena in the Internet: Critically Examining Criticality. Proceedings of National Academy of Science of the United States of America (PNAS). 99,

Pages