Publications

Found 412 results
Author Title [ Type(Desc)] Year
Filters: First Letter Of Title is C  [Clear All Filters]
Miscellaneous
Krauss, L.., Moody J., Wilczek F., & Morris D.. (1985).  Calculations for Cosmic Axion Detection. 55(17), 1797-1800.
Lv, Q., Ratnasamy S., & Shenker S. J. (2002).  Can Heterogeneity Make Gnutella Scalable?. 94-103.
Feldman, J., Hayhoe M.., & Lachter J.. (1991).  Capacity Limitations in the Integration of Information Across Saccades.
Hopfgartner, F. (2011).  Capturing Long-Term User Interests in Online Television News Program.
Oliner, A. J., Iyer A. P., Lagerspetz E., Stoica I., & Tarkoma S. (2012).  Carat: Collaborative Energy Bug Detection.
Fillmore, C. J. (1968).  The Case for Case. 1-88.
Batten, C., Aoki H.., & Asanović K. (2008).  The Case for Malleable Stream Architectures.
Shastri, L., & Grannes D. Jeffrey (1996).  A case study of SHRUTI. 2,
Marczak, B., Weaver N., Dalek J., Fifield D., McKune S., Rey A., et al. (2015).  China’s Great Cannon. The Citizen Report.
Fillmore, C. J. (1971).  Coming and Going. 50-69.
Feldman, J., & Low J.. R. (1973).  Comment on Brent's Scatter Storage Algorithm. 16(11), 703.
Breslau, L., Jamin S., & Shenker S. J. (2000).  Comments on the Performance of Measurement-Based Admission Control Algorithms.
Medina, A., Taft N., Salamatian K., Bhattacharyya S., & Diot C. (2002).  Comparative Analysis of Traffic Matrix Estimation Methods.
Hockey, B. Ann, & Rayner M. (2005).  Comparison of Grammar Based and Statistical Language Models Trained on the Same Data.
Aziz-Zadeh, L., Wilson S.. M., & Iacoboni M. (2005).  A Comparison of Premotor Areas Activated by Action Observation and Action Phrases.
Eddy, W. M., & Allman M. (2003).  A Comparison of RED's Byte and Packet Modes.
Eddy, W. M., & Allman M. (2002).  A Comparison of RED's Byte and Packet Modes.

Pages