Publications

Found 416 results
Author Title Type [ Year(Desc)]
Filters: First Letter Of Title is C  [Clear All Filters]
2009
Nechaev, B., Paxson V., Allman M., & Gurtov A. (2009).  On Calibrating Enterprise Switch Measurements. 143-155.
Friedland, G., Knipping L., Hürst W., & Muhlhauser M.. (2009).  Can We Escape the Trough of Disillusionment?--A Perspective on E-learning Technology Research from the ACM Workshop on Educational Multimedia and Multimedia Education. ACM E-Learn Journal.
Rückert, U. (2009).  Capacity Control for Partially Ordered Feature Sets. 318-333.
Yaman, S., Hakkani-Tür D., Tur G., Grishman R., Harper M. P., McKeown K. R., et al. (2009).  Classification-Based Strategies for Combining Multiple 5-W Question Answering Systems. 2703-2706.
Garg, N. P., Favre B., Riedhammer K., & Hakkani-Tür D. (2009).  ClusterRank: A Graph Based Method for Meeting Summarization. 1499-1502.
Caballé, S., Feldman J., & Thaw D. (2009).  CoLPE: Support for Communities of Learning Practice by the Effective Embedding of Information and Knowledge About Group Activity. 113-127.
Lecouteux, B.., Linarès G.., & Favre B. (2009).  Combined Low Level and High Level Features for Out-of-Vocabulary Word Detection. 1187-1190.
Yaman, S., Hakkani-Tür D., & Tur G. (2009).  Combining Semantic and Syntactic Information Sources for 5-W Question Answering. 2707-2710.
Allman, M. (2009).  Comments on Selecting Ephemeral Ports. ACM SIGCOMM Computer Communication Review. 39(2), 13-19.
Thaw, D., Feldman J., Li J., & Caballé S. (2009).  Communities of Practice Environment (CoPE): Democratic CSCW for Group Production and e-Learning. 65-81.
Shetty, N., Schwartz G., Felegyhazi M., & Walrand J. (2009).  Competitive Cyber-Insurance and Internet Security.
Schryen, G. (2009).  A Comprehensive and Comparative Analysis of the Patching Behavior of Open Source and Closed Source Software Vendors. 153-168.
Amengual, A. (2009).  A computational model of attachment secure responses in the Strange Situation.
Baswana, S., Biswas S., Doerr B., Friedrich T., Kurur P., & Neumann F. (2009).  Computing Single Source Shortest Paths Using Single-Objective Fitness Functions. 59-66.
Pauls, A., DeNero J., & Klein D. (2009).  Consensus Training for Consensus Decoding in Machine Translation. 1418-1427.
Weaver, N., & Allman M. (2009).  On Constructing a Trusted Path to the User.
Chang, N. (2009).  Constructing Grammar: A Computational Model of the Emergence of Early Constructions.
Mok, E. (2009).  Contextual Bootstrapping for Grammar Learning.
Kulis, B., Sra S., & Dhillon I. (2009).  Convex Perturbations for Scalable Semidefinite Programming. 296-303.
Lee-Goldman, R., & Rhodes R. (2009).  Corpus-Based Analysis and Annotation of Constructions.
C. Christoudias, M., Urtasun R., Kapoor A., & Darrell T. (2009).  Co-Training with Noisy Perceptual Observations. 2844-2851.
C. Christoudias, M., Urtasun R., Kapoor A., & Darrell T. (2009).  Co-Training with Noisy Perceptual Observations.

Pages