Publications

Found 297 results
Author Title Type [ Year(Asc)]
Filters: First Letter Of Title is R  [Clear All Filters]
2005
Gómez-Skarmeta, A., & Ruiz P. M. (2005).  Redes Ad hoc, Comunicaciones Multimedia y Control de Acceso en el Marco del Proyecto SAM. Proceedings of the V Jornadas de Ingenieria Telematica.
Subramanian, L., Katz R. H., Roth V., Shenker S. J., & Stoica I. (2005).  Reliable Broadcast in Unknown Fixed-Identity Networks. Proceedings of the 24th ACM Symposium on Principles of Distributed Computing (PODC 2005). 342-351.
Karp, R. M. (2005).  Report of the SIGACT Committee on funding for Theoretical Computer Science.
Anguera, X., Wooters C., Peskin B., & Aguilo M. (2005).  Robust Speaker Segmentation for Meetings: The ICSI-SRI Spring 2005 Diarization System. Proceedings of the Second Joint Workshop on Multimodal Interaction and Related Machine Learning Algorithms (MLMI 2005). 402-414.
Dharmapurikar, S., & Paxson V. (2005).  Robust TCP Reassembly in the Presence of Adversaries. Proceedings of the 14th Conference on USENIX Security Symposium (Security '05). 65-80.
Boulis, C., Kahn J. G., & Ostendorf M. (2005).  The Role of Disfluencies on Topic Classification of Human-Human Conversations. Proceedings of the Spoken Language Understanding Workshop Program at the 20th National Conference on Artificial Intelligence (AAAI-05).
2004
Gat-Viks, I., Shamir R., Karp R. M., & Sharan R. (2004).  Reconstructing Chain Functions in Genetic Networks. Proceedings of the Ninth Pacific Symposium on Biocomputing (PSB'04). 498-509.
Bryant, J. (2004).  Recovering Coherent Interpretations Using Semantic Integration of Partial Parses.
Gummadi, R., Kothari N., Kim Y-J., Govindan R., Karp B., & Shenker S. J. (2004).  Reduced State Routing in the Internet. Proceedings of the Third ACM Workshop on Hot Topics in Networks (HotNets-III).
Ogihara, M.., & Tantau T. (2004).  On the Reducibility of Sets Inside with Low Information Content.
Ruiz, P. M., & Gómez-Skarmeta A. (2004).  Reducing Data-Overhead of Mesh-Based Ad Hoc Multicast Routing Protocols by Steiner Tree Meshes. Proceedings of the First IEEE International Conference on Sensor and Ad Hoc Communications and Networks (SECON 2004).
Weaver, N., & Ellis D. (2004).  Reflections on Witty: Analyzing the Attacker. ;login: The USENIX Magazine. 29(3), 34-37.
Petruck, M. R. L., Fillmore C. J., Baker C. F., Ellsworth M., & Ruppenhofer J. (2004).  Reframing FrameNet Data. Proceedings of the 11th EURALEX International Congress (EURALEX 2004). 405-416.
Tanay, A., Sharan R., Kupiec M., & Shamir R. (2004).  Revealing Modularity and Organization in the Yeast Molecular Network by Integrated Analysis of Highly Heterogeneous Genome-Wide Data. Proceedings of the National Academy of Sciences of the United States of America. 101(9), 2981-2986.
Blanton, E., & Allman M. (2004).  RFC 3708: Using TCP DSACKs and SCTP Duplicate TSNs to Detect Spurious Retransmissions.
[Anonymous] (2004).  RFC 3714: IAB Concerns Regarding Congestion Control for Voice Traffic in the Internet. (Floyd, S., & Kempf J.., Ed.).
Floyd, S. (2004).  RFC 3742: Limited Slow-Start for TCP with Large Congestion Windows.

Pages