Publications

Found 296 results
Author Title Type [ Year(Asc)]
Filters: First Letter Of Title is P  [Clear All Filters]
2010
Lei, H., Choi J., Janin A., & Friedland G. (2010).  Persona Linking: Matching Uploaders of Videos Across Accounts.
Friedrich, T., Hebbinghaus N., & Neumann F. (2010).  Plateaus Can Be Harder in Multi-Objective Optimization. Theoretical Computer Science. 411(6), 854-864.
Felegyhazi, M., Kreibich C., & Paxson V. (2010).  On the Potential of Proactive Domain Blacklisting.
Baumbach, J. (2010).  On the Power and Limits of Evolutionary Conservation -- Unraveling Bacterial Gene Regulatory Networks. Nucleic Acids Research. 38(22), 7877-7884.
Kramer, O., Satzger B., & Lässig J. (2010).  Power Prediction in Smart Grids with Evolutionary Local Kernel Regression. 262-269.
Pietzowski, A., Satzger B., Trumler W.., & Ungerer T. (2010).  A Practical Computer Immunology Approach for Self-Protection Enhanced by Optimization Techniques.
Martin, E., Vinyals O., Friedland G., & Bajcsy R.. (2010).  Precise Indoor Localization Using Smart Phones. 787-790.
Yosef, N.., Gramm J., Wang Q.-F.., Noble W.. S., Karp R. M., & Sharan R. (2010).  Prediction of Phenotype Information from Genotype Data. Communications in Information and Systems. 10(2), 99-114.
Nechaev, B., Allman M., Paxson V., & Gurtov A. (2010).  A Preliminary Analysis of TCP Performance in an Enterprise Network.
Padhukasahasram, B.., Halperin E., Wessel J.., Thomas D.. J., Silver E.., Trumbower H.., et al. (2010).  Presymptomatic Risk Assessment for Chronic Non-Communicable Diseases. PLoS ONE. 5,
Boehme, R., & Pötzsch S. (2010).  Privacy in Online Social Lending. 23-28.
[Anonymous] (2010).  Proceedings of the 13th International Symposium on Recent Advances in Intrusion Detection (RAID 2010), Ottawa, Canada. (Jha, S., Sommer R., & Kreibich C., Ed.).
Kreibich, C., & Jahnke M. (2010).  Proceedings of the 7th International Conference on Detection of Intrusions and Malware (DIMVA 2010), Bonn, Germany.
2009
Oei, C., Friedland G., & Janin A. (2009).  Parallel Training of a Multi-Layer Perceptron on a GPU.
Jones, C.. G., Liu R., Meyerovich L.., Asanović K., & Bodik R. (2009).  Parallelizing the Web Browser.
P. Godfrey, B., Ganichev I., Shenker S. J., & Stoica I. (2009).  Pathlet Routing. 111-122.
Weaver, N. (2009).  Peer to Peer Edge Caches Should Be Free.
Favre, B., & Hakkani-Tür D. (2009).  Phrase and Word Level Strategies for Detecting Appositions in Speech. 2711-2714.
Seehra, A.., Naous J.., Walfish M., Mazieres D.., Nicolosi A.., & Shenker S. J. (2009).  A Policy Framework for the Future Internet. 1-6.
Hinrichs, T. L., Gude N. S., Casado M., Mitchell J. C., & Shenker S. J. (2009).  Practical Declarative Network Management. 1-10.
Lee-Goldman, R., Ruppenhofer J., Ellsworth M., & Baker C. F. (2009).  Pragmatic Factors in Null Instantiation: Beyond Definiteness and Genre.
P. Godfrey, B., & Karp R. M. (2009).  On the Price of Heterogeneity in Parallel Systems. Theory of Computing Systems. 45(2), 280-301.
[Anonymous] (2009).  Proceedings of the 7th International Conference on Computer Vision Systems (ICVS 2009), Liege, Belgium. (Fritz, M., Schiele B., & Piater J.. H., Ed.).
Friedland, G., Vinyals O., Huang Y., & Müller C. (2009).  Prosodic and Other Long-Term Features for Speaker Diarization. IEEE Transactions on Audio. 17(5), 985-993.
Shriberg, E., Favre B., Fung J., Hakkani-Tür D., & Cuendet S. (2009).  Prosodic Similarities of Dialog Act Boundaries Across Speaking Styles. 213-239.

Pages