Publications

Found 359 results
[ Author(Asc)] Title Type Year
Filters: First Letter Of Last Name is K  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
K
Krishnan, R., Sterbenz J. P. G., Eddy W. M., Partridge C., & Allman M. (2004).  Explicit Transport Error Notification (ETEN) for Error-Prone Wireless and Satellite Networks. 46(3), 343-362.
Krishnan, R., Allman M., Partridge C., Sterbenz J. P. G., & Ivancic W.. (2002).  Explicit Transport Error Notification (ETEN) for Error-Prone Wireless and Satellite Networks - Summary.
Krishnamoorthy, N., Malkarnenkar G., Mooney R., Saenko K., & Guadarrama S. (2013).  Generating Natural-Language Video Descriptions Using Text-Mined Knowledge.
Krieger, R., Becker B., & Keim M. (1994).  A Hybrid Fault Simulator for Synchronous Sequential Circuits.
Krick, C., Räcke H., & Westermann M. (2001).  Approximation Algorithms for Data Management in Networks.
Krick, C., Räcke H., & Westermann M. (2001).  Approximation Algorithms for Data Management in Networks. Proceedings of the Thirteenth ACM Symposium on Parallel Algorithms and Architectures (SPAA). 237-246.
Krell, M. Michael, Bernd J., Li Y., Ma D., Choi J., Ellsworth M., et al. (2017).  Field Studies with Multimedia Big Data: Opportunities and Challenges.
Kreibich, C., Weaver N., Nechaev B., & Paxson V. (2010).  Netalyzr: Illuminating The Edge Network. 246-259.
Kreibich, C., Weaver N., Nechaev B., & Paxson V. (2010).  Netalyzr: Illuminating Edge Network Neutrality, Security, and Performance.
Kreibich, C., Kanich C., Levchenko K., Enright B., Voelker G. M., Paxson V., et al. (2009).  Spamcraft: An Inside Look At Spam Campaign Orchestration.
Kreibich, C., & Jahnke M. (2010).  Proceedings of the 7th International Conference on Detection of Intrusions and Malware (DIMVA 2010), Bonn, Germany.
Kreibich, C., Kanich C., Levchenko K., Enright B., Voelker G. M., Paxson V., et al. (2008).  On the Spam Campaign Trail.
Kreibich, C., Weaver N., Kanich C., Cui W., & Paxson V. (2011).  GQ: Practical Containment for Measuring Modern Malware Systems.
Kreibich, C., Weaver N., Kanich C., Cui W., & Paxson V. (2011).  GQ: Practical Containment for Measuring Modern Malware Systems.
Kreibich, C., & Sommer R. (2005).  Policy-Controlled Event Management for Distributed Intrusion Detection. Proceedings of the Fourth International Workshop on Distributed Event-Based Systems (DEBS) (ICDCSW'05). 4, 385-391.
Kreibich, C., Weaver N., Maier G., Nechaev B., & Paxson V. (2011).  Experiences from Netalyzr with Engaging Users in End-System Measurement. 25-30.
Kreibich, C. (2005).  Brooery: A Graphical Environment for Analysis of Security-Relevant Network Activity. Proceedings of the USENIX Annual Technical Conference, FREENIX Track (USENIX '05 FREENIX). 109-118.
Krawczyk, J.., Kohl T. A., Goesmann A.., Kalinowski J.., & Baumbach J. (2009).  From Corynebacterium Glutamicum to Mycobacterium Tuberculosis - Towards Transfers of Gene Regulatory Networks and Integrated Data Analyses with MycoRegNet. Nucleic Acids Research. 37(14), 
Krauthgamer, R., & Lee J. R. (2002).  The Intrinsic Dimensionality of Graphs.
Krauss, L.. M., Moody J., & Wilczek F. (1984).  A Stellar Energy Loss Mechanism Involving Axions. 144B,
Krauss, L.., Moody J., Wilczek F., & Morris D.. (1985).  Calculations for Cosmic Axion Detection. 55(17), 1797-1800.
Krause, M., & Kulkarni A. (2015).  Predicting Sales E-Mail Responders using a Natural Language Model. Communications of the ACM. 38(11), 39-41.
Krause, M., Hall M., Williams J. Jay, Paritosh P., Prip J., & Caton S. (2016).  Connecting Online Work and Online Education at Scale. Proceedings of the 2016 CHI Conference Extended Abstracts on Human Factors in Computing Systems. 3536-3541.
Krasnova, H., Kolesnikova E.., & Günther O. (2009).  "It Wont't Happen to Me!": Self-Disclosure in Online Social Networks.
Krashinsky, R., Batten C., & Asanović K. (2007).  The Scale Vector-Thread Processor.

Pages