Publications

Found 4258 results
Author [ Title(Desc)] Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
P
Schmidt, H. W. (1990).  Prototyping and Analysis of Non-Sequential Systems Using Predicate-Event.
Amann, J., & Sommer R. (2015).  Providing Dynamic Control to Passive Network Security Monitoring. Proceedings of 18th International Symposium on Research in Attacks, Intrusions and Defenses (RAID).
Argyraki, K., Maniatis P., Cheriton D., & Shenker S. J. (2004).  Providing Packet Obituaries. Proceedings of the Third Workshop on Hot Topics in Networks (HotNets-III).
Ruiz, P. M., Botia J., & Gómez-Skarmeta A. (2004).  Providing QoS through Machine Learning-Driven Adaptive Multimedia Applications. IEEE Transactions on Systems. 34(3), 1398-1422.
Bergbauer, J., Nieuwenhuis C., Souiai M., & Cremers D. (2013).  Proximity Priors for Variational Semantic Segmentation and Recognition.
Rejaie, R., Handley M., Yu H., & Estrin D. (1999).  Proxy Caching Mechanism for Multimedia Playback Streams in the Internet. Proceedings of the Fourth International Web Caching Workshop.
Rossow, C., Dietrich C. J., Kreibich C., Grier C., Paxson V., Pohlmann N., et al. (2012).  Prudent Practices for Designing Malware Experiments: Status Quo and Outlook. 65-79.
Stoutamire, D. (1995).  The pSather 1.0 Manual.
Murer, S., Feldman J., Lim C-C., & Seidel M-M. (1993).  pSather: Layered Extensions to an Object-Oriented Language for Efficient Parallel Computation.
Feldman, J., Lim C-C., & Murer S. (1993).  pSather: Layered Extensions to an Object-Oriented Language for Efficient Parallel Computation.
Feldman, J., Lim C-C., & Mazzanti F. (1991).  pSather Monitors: Design, Tutorial, Rationale and Implementation.
Feldman, J., Lim C-C., & Mazzanti F. (1989).  pSather monitors: Design, Tutorial, Rationale and Implementation.
Impagliazzo, R., & Luby M. (1989).  Pseudo-Random Number Generator From ANY One-Way Function.
Callahan, T., Allman M., & Rabinovich M. (2012).  Psst, Over Here: Communicating Without Fixed Infrastructure.
Callahan, T., Allman M., & Rabinovich M. (2012).  Psst, Over Here: Communicating Without Fixed Infrastructure.
Harchol, Y., Bergemann D., Feamster N., Friedman E., Krishnamurthy A., Panda A., et al. (2020).  A Public Option for the Core. SIGCOMM '20: Proceedings of the Annual conference of the ACM Special Interest Group on Data Communication on the applications, technologies, architectures, and protocols for computer communication. 377-39.
Herzberg, A., & Luby M. (1992).  Public Randomness in Cryptography.
Favre, B., Grishman R., Hillard D., Ji H., Hakkani-Tür D., & Ostendorf M. (2008).  Punctuating Speech For Information Extraction. 5013-5016.
Anguera, X., Wooters C., & Hernando J. (2006).  Purity Algorithms for Speaker Diarization of Meetings Data. Proceedings of IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2006).
Morgan, N., Zhu Q., Stolcke A., Sönmez K., Sivadas S., Shinozaki T., et al. (2005).  Pushing the Envelope - Aside. IEEE Signal Processing Magazine. 22(5), 81-88.
Gottlieb, L., Choi J., Kelm P., Sikora T., & Friedland G. (2012).  Pushing the Limits of Mechanical Turk: Qualifying the Crowd for Video Geo-Location. 23-28.
Chang, N., & Mok E. (2006).  Putting Context in Constructions.
Narayanan, S., Petruck M. R. L., Baker C. F., & Fillmore C. J. (2003).  Putting FrameNet Data into the ISO Linguistic Annotation FrameWork. Proceedings of the ACL 2003 Workshop on Linguistic Annotation: Getting the Model Right.
Chang, N., Narayanan S., & Petruck M. R. L. (2002).  Putting Frames in Perspective. Proceedings COLING 2002.
Rayner, M., Hockey B. Ann, & Bouillon P. (2006).  Putting Linguistics into Speech Recognition: The Regulus Grammar Compiler.

Pages