Publications

Found 104 results
[ Author(Asc)] Title Type Year
Filters: First Letter Of Last Name is D  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
D
Dolev, D., Even S., & Karp R. M. (1982).  On the security of ping-pong protocols. 55(1-3), 57-68.
Dolev, D., Even S., & Karp R. M. (1982).  On the security of ping-pong protocols.
Dokas, P., Jones K., Kasza A., Nadji Y., & Paxson V. (2021).  Corelight Sensors detect the ChaChi RAT. Security Boulevard.
Doerr, B., Friedrich T., Künneman M.., & Sauerwald T. (2009).  Quasirandom Rumor Spreading: An Experimental Analysis. 145-153.
Doerr, B., Friedrich T., & Sauerwald T. (2009).  Quasirandom Rumor Spreading: Expanders, Push vs. Pull, and Robustness. 366-377.
Doerr, B., Jansen T., Sudholt D., Winzen C., & Zarges C. (2010).  Optimizing Monotone Functions Can Be Difficult. 42-51.
Dodge, E., Trott S., Gilardi L., & Stickles E. (2017).  Grammar Scaling: Leveraging FrameNet Data to Increase Embodied Construction Grammar Coverage. Proceedings of the AAAI 2017 Spring Symposium on Computational Construction Grammar and Natural Language Understanding.
Dodge, E., & Wright A. (2002).  Herds of Wildebeest, Flasks of Vodka, Heaps of Trouble: An Embodied Construction Grammar Approach to English Measure Phrases. Proceedings of the 28th Annual Meeting of the Berkeley Linguistics Society.
Dodge, E., Sweetser E., David O., Hong J., & Stickles E. (2014).  Constructions and Metaphor: Integrating MetaNet and Embodied Construction Grammar.
Dodge, E. (2016).  A deep semantic corpus-based approach to metaphor analysis: A case study of metaphoric conceptualizations of poverty. MetaNet, Special Issue of Constructions and Frames. 8(2), 
Dodge, E. (2014).  Argument Structure Constructions in Embodied Construction Grammar.
Dodge, E., & Petruck M. R. L. (2014).  Representing Caused Motion in Embodied Construction Grammar. 39-44.
Docio, L.., Gelbart D., & Morgan N. (2003).  Far-Field ASR on Inexpensive Microphones. Proceedings of Eighth European Conference on Speech Communication and Technology (EUROSPEECH 2003). 2141-2144.
Diederich, J. (1988).  Knowledge-Intensive Recruitment Learning.
Diederich, J. (1989).  Explanation and Connectionist Systems.
Diederich, J. (1989).  Spreading Activation and Connectionist Models for Natural Language Processing.
DiCioccio, L., Teixeira R., May M., & Kreibich C. (2012).  Probe and Pray: Using UPnP for Home Network Measurements. 96-105.
Di Gesu, V., & Isgro F. (1995).  Context and Vision.
di Genova, P., & Ventre G. (1995).  Efficiency Comparison of Real-Time Transport Protocols.
Dhillon, R., Bhagat S., Carvey H., & Shriberg E. (2004).  Meeting Recorder Project: Dialog Act Labeling Guide.
Dhawan, M.., Samuel J.., Teixeira R., Kreibich C., Allman M., Weaver N., et al. (2012).  Fathom: A Browser-based Network Measurement Platform.
Dharmar, M., Simon A., Sadorra C., Friedland G., Sherwood J., Morrow H., et al. (2016).  Reducing Loss to Follow-Up with Tele-audiology Diagnostic Evaluations. 22,
Dharmapurikar, S., & Paxson V. (2005).  Robust TCP Reassembly in the Presence of Adversaries. Proceedings of the 14th Conference on USENIX Security Symposium (Security '05). 65-80.
Devarakonda, A., Fountoulakis K., Demmel J., & Mahoney M. (2016).  Avoiding communication in primal and dual block coordinate descent methods.
Desutter, R.., Evain J.. P., Friedland G., Messina A.., & Sano M.. (2011).  Automated Information Extraction in Production.

Pages