Found 4214 results
Author [ Title(Desc)] Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
Moulin, H., & Shenker S. J. (1994).  Average Cost Pricing Versus Serial Cost Sharing: An Axiomatic Comparison. Journal of Economic Theory. 64(1), 178-201.
Friedrich, T., & Hebbinghaus N. (2008).  Average Update Times for Fully-Dynamic All-Pairs Shortest Paths. 693-704.
Ajwani, D.., & Friedrich T. (2010).  Average-Case Analysis of Incremental Topological Ordering. Discrete Applied Mathematics. 158(4), 240-250.
Devarakonda, A., Fountoulakis K., Demmel J., & Mahoney M. W. (2016).  Avoiding communication in primal and dual block coordinate descent methods.
Yeom, S., & Tschantz M. (2021).  Avoiding Disparity Amplification under Different Worldviews. FAccT '21: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency. 273-283.
Wernicke, S., Alber J., Gramm J., Guo J., & Niedermeier R. (2004).  Avoiding Forbidden Submatrices by Row Deletions. 2832, 349-360.
Zarchy, D., Mittal R., Schapira M., & Shenker S. J. (2019).   Axiomatizing Congestion Control. Proceedings of the ACM on Measurement and Analysis of Computing Systems. 3(2), 
Miller, B., Kantchelian A., Tschantz M. Carl, Afroz S., Bachwani R., Faizullabhoy R., et al. (2015).  Back to the Future: Malware Detection with Temporally Consistent Labels. CoRR. abs/1510.07338,
Fillmore, C. J., Johnson C. R., & Petruck M. R. L. (2003).  Background to Framenet. International Journal of Lexicography. 235-250.
Ji, G., & Bilmes J. A. (2006).  Backoff Model Training Using Partially Observed Data: Application to Dialog Act Tagging. Proceedings of the Human Language Technology Conference of the North American Chapter of the Association for Computational Linguistics (HLT-NAACL 2006). 280-287.
Portnoff, R. S., Huang D. Yuxing, Doerfler P., Afroz S., & McCoy D. (2017).  Backpage and Bitcoin: Uncovering Human Traffickers. Proceedings of KDD 2017.
Seidel, R.. (1992).  Backwards Analysis of Randomized Geometric Algorithms.
Feldman, J. (1975).  Bad-Mouthing Frames.
Popa, L., Rostami A.., Karp R. M., Papadimitriou C. H., & Stoica I. (2007).  Balancing the Traffic Load in Wireless Networks with Curveball Routing. Proceedings of the 8th ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc 2007).
Kadanoff, L. P., & Shenker S. J. (1981).  Band to Band Hopping in One-Dimensional Maps. Journal of Physics A: Mathematical and General. 14(2), L23-26.
Buttyan, L.., Dora L.., Felegyhazi M., & Vajda I.. (2010).  Barter Trade Improves Message Delivery in Opportunistic Networks. Ad Hoc Networks. 8(1), 1-14.
Zimmermann, M., Liu Y., Shriberg E., & Stolcke A. (2005).  A* Based Joint Segmentation and Classification of Dialog Acts in Multi-Party Meetings. Proceedings of IEEE Workshop on Automatic Speech Recognition and Understanding (ASRU 2005). 215-219.
Xing, E. P., Sharan R., & Jordan M. I. (2004).  Bayesian Haplotype Inference via the Dirichlet Process. Proceedings of the Second RECOMB Satellite Workshop on Computational Methods for SNP and Haplotypes. 99-112.
Xing, E. P., Sharan R., & Jordan M. I. (2004).  Bayesian Haplotype Inference via the Dirichlet Process. Proceedings of ICML 2004.
Fonseca, R., Ratnasamy S., Zhao J., Ee C. Tien, Culler D. E., Shenker S. J., et al. (2005).  Beacon Vector Routing: Scalable Point-to-Point Routing in Wireless Sensornets. Proceedings of the Second USENIX Symposium on Networked Systems Design and Implementation (NSDI 2005). 329-342.
Peters, N., & Schmeder A. W. (2011).  Beamforming using a spherical microphone array based on legacy microphone characteristics.
Haban, D., & Wybranietz D. (1989).  Behavior and Performance Analysis of Distributed Systems Using a Hybrid.
Egelman, S., Harbach M., & Peer E. (2016).  Behavior Ever Follows Intention? A Validation of the Security Behavior Intentions Scale (SeBIS). Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI ’16).
Torrent, T. Timponi, & Ellsworth M. (2013).  Behind the Labels: Criteria for Defining Analytical Categories in FrameNet Brazil. 17(1), 44-65.
Lässig, J., & Sudholt D. (2010).  The Benefit of Migration in Parallel Evolutionary Algorithms. 1105-1112.