Publications

Found 296 results
Author Title [ Type(Desc)] Year
Filters: First Letter Of Title is P  [Clear All Filters]
Journal Article
Karp, R. M. (1994).  Probabilistic recurrence relations. Journal of the Association for Computing Machinery. 41(6), 1136-1150.
Feldman, J. (1979).  Programming Languages. Scientific American. 241,
Floyd, S., & Fall K. (1999).  Promoting the Use of End-to-End Congestion Control in the Internet. IEEE/ACM Transactions on Networking.
Friedland, G., Vinyals O., Huang Y., & Müller C. (2009).  Prosodic and Other Long-Term Features for Speaker Diarization. IEEE Transactions on Audio. 17(5), 985-993.
Shriberg, E., Stolcke A., Hakkani-Tür D., & Tur G. (2000).  Prosody-Based Automatic Segmentation of Speech into Sentences and Topics. Speech Communication. 32(1-2), 127-154.
Ruiz, P. M., Botia J., & Gómez-Skarmeta A. (2004).  Providing QoS through Machine Learning-Driven Adaptive Multimedia Applications. IEEE Transactions on Systems. 34(3), 1398-1422.
Morgan, N., Zhu Q., Stolcke A., Sönmez K., Sivadas S., Shinozaki T., et al. (2005).  Pushing the Envelope - Aside. IEEE Signal Processing Magazine. 22(5), 81-88.
Ameloot, T. J., Van Den Bussche J., Marczak B., Alvaro P., & Hellerstein J. M. (2016).  Putting logic-based distributed systems on stable grounds. Theory and Practice of Logic Programming. 16(4), 378-417.
Miscellaneous
Ellsworth, M., Lee-Goldman R., & Rhodes R. (2008).  A Paradox of English Determination: The Construction of Complex Number Expressions.
Mani, D.. R., & Shastri L. (1999).  Parallel inference with very large knowledge bases. 2,
Marczak, B., Scott-Railton J., Senft A., Poetranto I., & McKune S. (2015).  Pay No Attention to the Server Behind the Proxy: Mapping FinFisher’s Continuing Proliferation. The Citizen Lab.
Ishac, J., & Allman M. (2001).  On the Performance of TCP Spoofing in Satellite Networks.
Sokol, J., & Tutsch D. (2001).  Petri Net Based Performance Evaluation of USAIA's Bandwidth Partitioning for the Wireless Cell Level.
Weaver, N., Markovskiy Y., Patel Y., & Wawrzynek J. (2003).  Post Placement C-Slow Retiming for the Xilinx Virtex FPGA.
Kim, Y.., Govindan R., Karp B., & Shenker S. J. (2004).  Practical and Robust Geographic Routing in Wireless Networks.
Kay, P. (2004).  Pragmatic Aspects of Grammatical Constructions.
Lee-Goldman, R., Ruppenhofer J., Ellsworth M., & Baker C. F. (2009).  Pragmatic Factors in Null Instantiation: Beyond Definiteness and Genre.
Tresp, V., Briegel T., & Moody J. (1999).  Predicting Blood Glucose Metabolism in Diabetics -- A Machine Learning Solution.
Bergen, B. K., & Chang N. (2000).  Prepositional semantics in embodied construction grammar.
Clark, D. D., Estrin D., Herzog S., & Shenker S. J. (1996).  Pricing in Computer Networks: Reshaping the Research Agenda. 97-126.
Moody, J., & Utans J. (1992).  Principled Architecture Selection for Neural Networks: Application to Corporate Bond Rating Prediction. 4,
Bregler, C., Omohundro S., Covell M., Slaney M., Ahmad S., Forsyth D.., et al. (1998).  Probabilistic Models of Verbal and Body Gestures.
Burglar, C.., Omohundro S., Covell M., Slaney M., Ahmad S., Forsyth D. A., et al. (1997).  Probabilistic Models of Verbal and Body Gestures.
Feldman, J. (1974).  A Problem-List of Issues Concerning Computers and Public Policy.
[Anonymous] (2010).  Proceedings of the 13th International Symposium on Recent Advances in Intrusion Detection (RAID 2010), Ottawa, Canada. (Jha, S., Sommer R., & Kreibich C., Ed.).

Pages