Found 410 results
[ Author(Desc)] Title Type Year
Filters: First Letter Of Title is C  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
Aberer, K. (1991).  Combinatory Differential Fields: An Algebraic Approach to Approximate Computation and Constructive Analysis.
Abrash, V., Cohen M., Franco H., Morgan N., & Konig Y. (1992).  Connectionist Gender Adaptation in a Hybrid Neural Network / Hidden Markov Model Speech Recognition System. Proceedings of the International Conference on Spoken Language Processing (ICSLP'92). 911-914.
Adams, A. K., Mahdavi J., Mathis M., & Paxson V. (1998).  Creating a Scalable Architecture for Internet Measurement. Proceedings of the Internet Summit (INET '98).
Adler, I., Ahn H.. S., Karp R. M., & Ross S. M. (2003).  Coalescing Times for IID Random Variables.
Afroz, S., Fifield D., Tschantz M. Carl, Paxson V., & Tygar J.D.. (2015).  Censorship Arms Race: Research vs. Practice. Proceedings of the Workshop on Hot Topics in Privacy Enhancing Technologies (HotPETs).
Akkus, I. Ekin, & Weaver N. (2015).  The Case for a General and Interaction-Based Third-Party Cookie Policy.
Alber, J., Gramm J., Guo J., & Niedermeier R. (2004).  Computing the Similarity of Two Sequences with Nested Arc Annotations. Theoretical Computer Science. 312(2-3), 337-358.
Albers, S., von Stengel B., & Werchner R. (1995).  A Combined BIT and TIMESTAMP Algorithm for the List Update Problem.
Alfano, M., & Radouniklis N. (1996).  A Cooperative Multimedia Environment with QOS Control: Architectural and Implementation Issues.
Allman, M. (2013).  On Changing the Culture of Empirical Internet Assessment. ACM SIGCOMM Computer Communication Review. 43(3), 78-83.
Allman, M. (2009).  Comments on Selecting Ephemeral Ports. ACM SIGCOMM Computer Communication Review. 39(2), 13-19.
Allman, M. (2018).  Comments on DNS Robustness. ACM Internet Measurement Conference.
Allman, M., Martin L., Rabinovich M., & Atchinson K. (2008).  On Community-Oriented Internet Measurement. 112-121.
Allman, M. (2013).  Comments on Bufferbloat. ACM SIGCOMM Computer Communication Review. 3(1), 30-37.
Althaus, E., Kohlbacher O., Lenhof H-P., & Müller P. (2000).  A Combinatorial Approach to Protein Docking with Flexible Side-Chains. Proceedings of the Fourth Annual International conference on Computational Molecular Biology (RECOMB-00).
Althaus, E. (2001).  Curve Reconstruction and the Traveling Salsman Problem..
Althoff, K-D., Richter M. M., & Wilke W. (1997).  Cased-Based Reasoning: A New Technology for Experience Based Construction of Knowledge Systems.
Amann, J., Hall S., & Sommer R. (2014).  Count Me In: Viable Distributed Summary Statistics for Securing High-Speed Networks.
Amengual, A. (2009).  A computational model of attachment secure responses in the Strange Situation.
Amir, E., Krathgamer R., & Rao S. (2002).  Constant-Factor Approximation of Vertex-Cuts in Planar Graphs.
Ar, S., Blum M. E., Codenotti B., & Gemmell P. (1992).  Checking Approximate Computations Over the Reals.
Argyraki, K., Baset S., Chun B-G., Fall K., Iannaccone G., Knies A., et al. (2008).  Can Software Routers Scale?.
Asanović, K., Beck J., Callahan T. J., Feldman J., Irissou B., Kingsbury B., et al. (1993).  CNS-1 Architecture Specification: A Connectionist Network Supercomputer.
Atkins, B.. T. S., Rundell M., & Sato H. (2003).  The Contribution of Framenet to Practical Lexicography. International Journal of Lexicography.
Attardi, G., & Flagella T. (1994).  A Customisable Memory Management Framework.