Found 273 results
Author [ Title(Desc)] Type Year
Filters: First Letter Of Title is I  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
Pasaniuc, B., Sankararaman S., Kimmel G., & Halperin E. (2009).  Inference of Locus-Specific Ancestry in Closely Related Populations. 25(12), 213-221.
Duffield, N., Presti F. Lo, Paxson V., & Towsley D. (2001).  Inferring Link Loss Using Striped Unicast Probes. Proceedings of IEEE INFOCOM.
Lee-Goldman, R. (2009).  Infinitives in Comparatives: Canonical Syntax Meets Quirky Semantics.
Nurgalieva, L., Frik A., Ceschel F., Egelman S., & Marchese M. (2019).  Information Design in An Aged Care Context. Proceedings of Pervasive Health ’19.
Lee, L., Lee JH., Egelman S., & Wagner D. (2016).  Information Disclosure Concerns in The Age of Wearable Computing. Proceedings of the NDSS Workshop on Usable Security (USEC ’16).
Ronen, B.., & Karp R. M. (1994).  An information entropy approach to the small-lot concept. IEEE Transactions on Engineering Management. 41(1), 89-92.
Kirchner, M., & Ghosal D. (2012).  Information Hiding.
Hopfgartner, F., Ren R., Urruty T., & Jose J. M. (2011).  Information Organisation Issues in Multimedia Retrieval using Low-Level Features. 241-260.
Himanen, P., & Castells M. (2002).  The Information Society and the Welfare State: The Finnish Model.
Evans, W. S. (1994).  Information Theory and Noisy Computation.
Traub, J. F., & Wozniakowski H. (1990).  Information-Based Complexity: New Questions for Mathematicians.
Ghodsi, A., Koponen T., Raghavan B., Shenker S. J., Singla A., & Wilcox J. (2011).  Information-Centric Networking: Seeing the Forest for the Trees. 1-6.
Tsai, T.. J., Friedland G., & Anguera X. (2015).  An Information-Theoretic Metric of Fingerprint Effectiveness.
Chang, S-Y., & Morgan N. (2013).  Informative Spectro-Temporal Bottleneck Features for Noise-Robust Speech Recognition.
Wang, J., Geesman G. J., Hostikka S. Liisa, Atallah M., Blackwell B., Lee E., et al. (2011).  Inhibition of Activated Pericentromeric SINE/Alu Repeat Transcription in Senescent Human Adult Stem Cells Reinstates Self-Renewal. Cell Cycle. 10(17), 3016-3030.
Fillmore, C. J. (1979).  Innocence: A Second Idealization for Linguistics. Proceedings of the Fifth Annual Meeting of the Berkeley Linguistics Society (BLS 5). 63-76.
Franklin, J.., Paxson V., Perrig A., & Savage S. (2007).  An Inquiry into the Nature and Causes of the Wealth of Internet Miscreants. 375-388.
Moore, D., Paxson V., Savage S., Shannon C., Staniford S., & Weaver N. (2003).  Inside the Slammer Worm. IEEE Magazine of Security and Privacy. 1(4), 33-39.
Cho, C.. Y., Caballero J., Grier C., Paxson V., & Song D. (2010).  Insights from the Inside: A View of Botnet Management from Infiltration.
Ravanelli, M., Elizalde B. Martinez, Bernd J., & Friedland G. (2015).  Insights into Audio-Based Multimedia Event Classification with Neural Networks. 19-23.
Greenberg, S., Hollenback J., & Ellis D. P. W. (1996).  Insights Into Spoken Language Gleaned from Phonetic Transcriptions of the Switchboard Corpus. Proceedings of the Fourth International Conference on Spoken Language Processing (CSLP-96).
Halperin, E., Kortsarz G., Krauthgamer R., Srinivasan A., & Wang N.. (2003).  Integrality Ratio for Group Steiner Trees and Directed Steiner Trees. Proceedings of the Twelfth Symposium on Discrete Algorithms (SODA).
Baumbach, J., Wittkop T., Kleindt C. Katja, & Tauch A. (2009).  Integrated Analysis and Reconstruction of Microbial Transcriptional Gene Regulatory Networks Using CoryneRegNet. Nature Protocols. 4(6), 992-1005.
Ruiz, P. M., & Gómez-Skarmeta A. (2004).  Integrated IP Multicast in Mobile Ad Hoc Networks with Multiple Attachments to Wired IP Networks. Proceedings of the 15th IEEE Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC 2004).
Braden, R., Clark D. D., & Shenker S. J. (1994).  Integrated Services in the Internet Architecture: An Overview.