Publications

Found 332 results
Author Title Type [ Year(Desc)]
Filters: First Letter Of Last Name is E  [Clear All Filters]
2009
Lee-Goldman, R., Rhodes R., & Ellsworth M. (2009).  Determination and Modification: Interaction and Interpretation.
Pfoser, D., Efentakis A., Voisard A., & Wenk C. (2009).  Exploiting Road Network Properties in Efficient Shortest‐Path Computation.
Cotton, C.., & Ellis D. P. W. (2009).  Finding Similar Acoustic Events Using Matching Pursuit and Locality-Sensitive Hashing. 125-128.
Mandel, M. I., & Ellis D. P. W. (2009).  The Ideal Interaural Parameter Mask: A Bound on Binaural Separation Systems. 85-88.
Zaharia, M., Borthakur D., Sarma J. Sen, Elmeleegy K., Shenker S. J., & Stoica I. (2009).  Job Scheduling for Multi-User MapReduce Clusters.
Ermolinskiy, A., Moon D., Chun B-G., & Shenker S. J. (2009).  Minuet: Rethinking Concurrency Control in Storage Area Networks. 311-324.
Pfoser, D., Efentakis A., Voisard A., & Wenk C. (2009).  A New Perspective on Efficient and Dependable Vehicle Routing. 388-391.
Lee-Goldman, R., Ruppenhofer J., Ellsworth M., & Baker C. F. (2009).  Pragmatic Factors in Null Instantiation: Beyond Definiteness and Genre.
Elsässer, R., & Sauerwald T. (2009).  On the Runtime and Robustness of Randomized Broadcasting. Theoretical Computer Science. 410(36), 3414-3427.
Kanich, C., Kreibich C., Levchenko K., Enright B., Voelker G. M., Paxson V., et al. (2009).  Spamalytics: An Empirical Analysis of Spam Marketing Conversion. 52(9), 99-107.
Kreibich, C., Kanich C., Levchenko K., Enright B., Voelker G. M., Paxson V., et al. (2009).  Spamcraft: An Inside Look At Spam Campaign Orchestration.
Elsässer, R., & Sauerwald T. (2009).  Tight Bounds for the Cover Time of Multiple Random Walks. 415-426.
Frampton, M., Fernández R.., Ehlen P.., C. Christoudias M., Darrell T., & Peters S. (2009).  Who is "You"? Combining Linguistic and Gaze Features to Resolve Second-Person References in Dialogue. 273-281.

Pages