Publications

Found 595 results
Author Title [ Type(Asc)] Year
Filters: First Letter Of Last Name is A  [Clear All Filters]
Technical Report
Allman, M. (1997).  Fixing Two BSD TCP Bugs.
Sargent, M., Stack B., Dooner T., & Allman M. (2012).  A First Look at 1 Gbps Fiber-To-The-Home Traffic.
Alaou, A. El, & Mahoney M. (2014).  Fast Randomized Kernel Methods With Statistical Guarantees.
Amann, J., Vallentin M., Hall S., & Sommer R. (2012).  Extracting Certificates from Live Traffic: A Near Real Time SSL Notary Service.
Afroz, S., Tschantz M. Carl, Sajid S., Qazi S. Asif, Javed M., & Paxson V. (2018).  Exploring Server-side Blocking of Regions.
Krishnan, R., Allman M., Partridge C., & Sterbenz J. P. G. (2002).  Explicit Transport Error Notification (ETEN) for Error-Prone Wireless and Satellite Networks.
Asanović, K., & Morgan N. (1991).  Experimental Determination of Precision Requirements for Back-Propagation Training of Artificial Neural Networks.
Ananthanarayanan, G., Heimerl K., Zaharia M., Demmer M., Koponen T., Tavakoli A., et al. (2009).  Enabling Innovation Below the Communication API.
Domingo-Pascual, J., Albanese A., & Holfelder W. (1995).  Emulation of Traffic Congestion on ATM Gigabit Networks.
Ahmad, S., & Omohundro S. (1991).  Efficient Visual Search: A Connectionist Solution.
Morgan, N., Asanović K., Kingsbury B., & Wawrzynek J. (1990).  Developments in Digital VLSI Design for Artificial Neural Networks.
Adamo, J-M. (1994).  Development of Parallel BLAS with ARCH Object-Oriented Parallel Library, Implementation on CM-5.
Choi, J., Akkus I. Ekin, Egelman S., Friedland G., Sommer R., Tschantz M. Carl, et al. (2018).  Cybercasing 2.0: You Get What You Pay For.
Attardi, G., & Flagella T. (1994).  A Customisable Memory Management Framework.
Alfano, M., & Radouniklis N. (1996).  A Cooperative Multimedia Environment with QOS Control: Architectural and Implementation Issues.
Weaver, N., & Allman M. (2009).  On Constructing a Trusted Path to the User.
Amengual, A. (2009).  A computational model of attachment secure responses in the Strange Situation.
Albers, S., von Stengel B., & Werchner R. (1995).  A Combined BIT and TIMESTAMP Algorithm for the List Update Problem.
Aberer, K. (1991).  Combinatory Differential Fields: An Algebraic Approach to Approximate Computation and Constructive Analysis.
Asanović, K., Beck J., Callahan T. J., Feldman J., Irissou B., Kingsbury B., et al. (1993).  CNS-1 Architecture Specification: A Connectionist Network Supercomputer.
Ar, S., Blum M. E., Codenotti B., & Gemmell P. (1992).  Checking Approximate Computations Over the Reals.
Ausiello, G., Protasi M., & Angelaccio M. (1991).  A Characterization of Space Complexity Cases and Subexponential Time Classesas Limiting Polynomially Decidable Sets.
Ausiello, G., Protasi M., & Angelaccio M. (1991).  A Characterization of Space Complexity Cases and Subexponential Time Classesas Limiting Polynomially Decidable Sets.
Althoff, K-D., Richter M. M., & Wilke W. (1997).  Cased-Based Reasoning: A New Technology for Experience Based Construction of Knowledge Systems.
Bell, O., Allman M., & Kuperman B. (2012).  On Browser-Level Event Logging.

Pages