Publications

Found 4258 results
Author Title [ Type(Desc)] Year
Technical Report
Yoshida, M., Ikeda C., & Suzuki H. (1994).  An Evaluation of Burst-level Bandwidth Reservation Methods in WANEnvironments.
Verma, D. C., & Ferrari D. (1991).  Evaluation of Overflow Probabilities in Resource Management.
Gupta, A., Howe W., Moran M., & Nguyen Q. (1994).  Evaluation of Resource Sharing Benefits.
Bretones, C., Cristóbal M., & Ibarretxe-Antuñano I. (2001).  Exiting Events in Spanish: Boundary I-Schema and Move X-Schema.
Asanović, K., & Morgan N. (1991).  Experimental Determination of Precision Requirements for Back-Propagation Training of Artificial Neural Networks.
Crestani, F. (1999).  An Experimental Study of the Effects of Word Recognition Errors in Spoken Queries on the Effectiveness of an Information Retrieval System.
Trompf, M. (1992).  Experiments with Noise Reduction Neural Networks for Robust Speech Recognition.
Banerjea, A., Knightly E. W., Templin F. L., & Zhang H. (1994).  Experiments with the Tenet Real-Time Protocol Suite on the Sequoia 2000 Wide Area Network.
Diederich, J. (1989).  Explanation and Connectionist Systems.
Bornscheuer, S-E., & Thielscher M. (1996).  Explicit and Implicit Indeterminism: Reasoning About Uncertain and Contradictory Specifications of Dynamic Systems.
Krishnan, R., Allman M., Partridge C., & Sterbenz J. P. G. (2002).  Explicit Transport Error Notification (ETEN) for Error-Prone Wireless and Satellite Networks.
Sperduti, A. (1993).  Exploitation of Structured Gating Connections for the Normalization of a Visual Pattern.
Sommer, R., & Paxson V. (2004).  Exploiting Independent State For Network Intrusion Detection.
Goga, O., Lei H., Parthasarathi S. Hari Krish, Friedland G., Sommer R., & Teixeira R. (2012).  On Exploiting Innocuous User Activity for Correlating Accounts Across Social Network Sites.
Harchol-Balter, M., & Downey A. B. (1995).  Exploiting Process Lifetime Distributions for Dynamic Load Balancing.
Pfoser, D., Efentakis A., Voisard A., & Wenk C. (2009).  Exploiting Road Network Properties in Efficient Shortest‐Path Computation.
Shastri, L. (1997).  Exploiting Temporal Binding to Learn Relational Rules Within a Connectionist Network.
Shastri, L. (1997).  Exploiting Temporal Binding to Learn Relational Rules Within a Connectionist Network.
Radoslavov, P., Estrin D., & Govindan R. (1999).  Exploiting the Bandwidth-Memory Tradeoff in Multicast State Aggregation.
Afroz, S., Tschantz M. Carl, Sajid S., Qazi S. Asif, Javed M., & Paxson V. (2018).  Exploring Server-side Blocking of Regions.
Grigoriev, D. Yu., Karpinski M., & Yao A. C. (1995).  An Exponential Lower Bound on the Size of Algebraic Decision Trees for MAX.
Amann, J., Vallentin M., Hall S., & Sommer R. (2012).  Extracting Certificates from Live Traffic: A Near Real Time SSL Notary Service.
Fromherz, T. (1998).  Face Recognition: a Summary of 1995 - 1997.
Codenotti, B., Datta B. N., Datta K., & Leoncini M. (1994).  Fast and Efficient Parallel Algorithms for Problems in Control Theory.
Luby, M., & Vigoda E. (1999).  Fast Convergence of the Glauber Dynamics for Sampling Independent Sets: Part I.

Pages