Found 4220 results
Author [ Title(Asc)] Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
Allman, M., Barford P., Krishnamurty B., & Wang J. (2006).  Tracking the Role of Adversaries in Measuring Unwanted Traffic. Proceedings of the Second Conference on Steps to Reduce Unwanted Traffic in the Internet (SRUTI). 6.
Holz, R., Hiller J., Amann J., Razaghpanah A., Hohleld O., Vallina-Rodriguez N., et al. (2020).  Tracking the deployment of TLS 1.3 on the web: a story of experimentation and centralization. ACM SIGCOMM Computer Communication Review. 50(3), 3-15.
Bonzon, P. E. (1995).  A Tower Architecture for Meta-Level Inference Systems Based on Omega-OrderedHorn Theories.
Baumbach, J., Rahmann S., & Tauch A. (2009).  Towards the Integrated Analysis, Visualization, and Reconstruction of Microbial Gene Regulatory Networks. Briefings in Bioinformatics. 10(1), 75-83.
Feldman, J. (1978).  Towards Symbolic Models of Neural Nets.
Bourlard, H., Dupont S., Hermansky H., & Morgan N. (1996).  Towards Subband-Based Speech Recognition. Proceedings of the VIII European Signal Processing Conference (EUSIPCO '96). 1579-1582.
Lei, H. (2009).  Towards Structured Approaches to Arbitrary Data Selection and Performance Prediction for Speaker Recognition.
Li, Z., Goyal A., Chen Y., & Paxson V. (2011).  Towards Situational Awareness of Large-Scale Botnet Probing Events. IEEE Transactions on Information Forensics and Security. 6(1), 175-188.
Vinyals, O., & Friedland G. (2008).  Towards Semantic Analysis of Conversations: A System for the Live Identification of Speakers in Meetings. 426-431.
Mirghafori, N., Fosler-Lussier E., & Morgan N. (1996).  Towards Robustness to Fast Speech in ASR. Proceedings of the International Conference on Acoustics, Speech, and Signal Processing (ICASSP-96).
Wooters, C., Fung J., Peskin B., & Anguera X. (2004).  Towards Robust Speaker Segmentation: The ICSI-SRI Fall 2004 Diarization System. Proceedings of Fall 2004 Rich Transcription Workshop (RT-04F).
Marzo, J. L., Maryni P.., & Vilà P. (2001).  Towards QoS in IP-Based Core Networks: A Survey on Performance Management, MPLS Case. Proceedings of the International Symposium on Performance Evaluation of Computer and Telecommunication Systems (SPECTS'2001).
Ermolinskiy, A., Katti S., Shenker S. J., Fowler L. L., & McCauley M. (2010).  Towards Practical Taint Tracking.
Ben-Dor, A., Hartman T., Schwikowski B., Sharan R., & Yakhini Z. (2003).  Towards Optimally Multiplexed Applications of Universal DNA Tag Systems. Proceedings of the Seventh Annual International Conference on Research in Computational Molecular Biology (RECOMB'03).
Ben-Dor, A., Hartman T., Karp R. M., Schwikowski B., Sharan R., & Yakhini Z. (2004).  Towards Optimally Multiplexed Applications of Universal Arrays. Journal of Computational Biology. 11, 477-493.
Cleve, R. (1990).  Towards Optimal Simulations of Formulas by Bounded-Width Programs.
Sander, T., & Tschudin C. F. (1997).  Towards Mobile Cryptography.
Jain, S., Javed M., & Paxson V. (2016).  Towards Mining Latent Client Identifiers from Network Traffic. Proceedings of Privacy Enhancing Technologies Symposium.
Nechaev, B., Paxson V., Allman M., Bennett M., & Gurtov A. (2013).  Towards Methodical Calibration: A Case Study of Enterprise Switch Measurements.
Satzger, B., Bagci F., Kluge F., & Ungerer T. (2010).  Towards Lightweight Self-Configuration in Wireless Sensor Networks. 791-792.
Fritz, M., & Schiele B. (2009).  Towards Integration of Different Paradigms in Modeling, Representation and Learning of Visual Categories. 324-347.
Boehme, R. (2010).  Towards Insurable Network Architectures. Journal of Information Technology. 52(5), 290-293.
Bourlard, H., Hermansky H., & Morgan N. (1996).  Towards Increasing Speech Recognition Error Rates. Speech Communication. 205-231.
Khattak, S., Javed M., Anderson P. D., & Paxson V. (2013).  Towards Illuminating a Censorship Monitor's Model to Facilitate Evasion.
Petruck, M. R. L. (2005).  Towards Hebrew FrameNet.