Publications

Found 4258 results
Author [ Title(Desc)] Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
B
Haban, D., & Wybranietz D. (1989).  Behavior and Performance Analysis of Distributed Systems Using a Hybrid.
Egelman, S., Harbach M., & Peer E. (2016).  Behavior Ever Follows Intention? A Validation of the Security Behavior Intentions Scale (SeBIS). Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI ’16).
Torrent, T. Timponi, & Ellsworth M. (2013).  Behind the Labels: Criteria for Defining Analytical Categories in FrameNet Brazil. 17(1), 44-65.
Lässig, J., & Sudholt D. (2010).  The Benefit of Migration in Parallel Evolutionary Algorithms. 1105-1112.
Fillmore, C. J. (2013).  Berkeley Construction Grammar.
Baker, C. F., Fillmore C. J., & Lowe J.. B. (1998).  The Berkeley FrameNet Project. Proceedings of the Joint Conference of the International Committee on Computational Linguistics and the Association for Computational Linguistics (COLING-ACL).
Jurafsky, D., Wooters C., Tajchman G., Segal J., Stolcke A., Fosler-Lussier E., et al. (1994).  The Berkeley Restaurant Project. Proceedings of the Third International Conference on Spoken Language Processing (ICSLP 94). 2139-2142.
Wooters, C., Jurafsky D., Tajchman G., & Morgan N. (1993).  The Berkeley Restaurant Project. Proceedings of the Speech Research Symposium XIII. 119-128.
Narayan, A., Panda A., Alizadeh M., Balakrishnan H., Krishnamurthy A., & Shenker S. J. (2020).  Bertha: Tunneling through the Network API. HotNets '20: Proceedings of the 19th ACM Workshop on Hot Topics in Networks. 53-59.
[Anonymous] (2009).  Best Papers from the 10th IEEE International Symposium on Multimedia. (Friedland, G., & Chen S-C., Ed.).International Journal of Semantic Computing. 3,
[Anonymous] (2008).  Best Papers from the Second IEEE International Conference on Semantic Computing (IJSC). (Friedland, G., & Martell C.., Ed.).International Journal of Semantic Computing. 2,
Breslau, L., & Shenker S. J. (1998).  Best-Effort versus Reservations: A Simple Comparative Analysis. ACM Computer Communication Review. 28, 3-16.
Omohundro, S. (1992).  Best-First Model Merging for Dynamic Learning and Recognition.
Stolcke, A., & Omohundro S. (1994).  Best-First Model Merging for Hidden Markov Model Induction.
Mok, E., & Bryant J. (2006).  A Best-Fit Approach to Productive Omission of Arguments.
Afroz, S., Javed M., Paxson V., Qazi S. Asif, Sajid S., & Tschantz M. Carl (2018).  A Bestiary of Blocking The Motivations and Modes behind Website Unavailability.
Frik, A., Egelman S., Harbach M., Malkin N., & Peer E. (2018).  Better Late(r) than Never: Increasing Cyber-Security Compliance by Reducing Present Bias. Proceedings of WEIS '18.
Kantchelian, A., Tschantz M. Carl, Afroz S., Miller B., Shankar V., Bachwani R., et al. (2015).  Better Malware Ground Truth: Techniques for Weighting Anti-Virus Vendor Labels. Proceedings of the 8th ACM Workshop on Artificial Intelligence and Security. 45–56.
Virtue, P., Yu S. X., & Lustig M. (2017).  Better than Real: Complex-valued Neural Networks for MRI Fingerprinting. Proceedings of the International Conference on Image Processing 2017.
Haghighi, A.., Blitzer J.., DeNero J., & Klein D. (2009).  Better Word Alignments with Supervised ITG Models.
Freytag, A., Rodner E., Bodesheim P., & Denzler J. (2012).  Beyond Classification -- Large-Scale Gaussian Process Inference and Uncertainty Prediction.
J. Boese, H., Andrzejak A.., & Hoegqvist M.. (2010).  Beyond Online Aggregation: Parallel and Incremental Data Mining with Online Map-Reduce. Proceedings of the Workshop on Massive Data Analytics on the Cloud (MDAC 2010).
De Carli, L., Sommer R., & Jha S. (2014).  Beyond Pattern Matching: A Concurrency Model for Stateful Deep Packet Inspection.
Surana, S., Patra R., Nedevschi S., Ramos M., Subramanian L., Ben-David Y., et al. (2008).  Beyond Pilots: Keeping Rural Wireless Networks Alive.
Jia, Y., Huang C., & Darrell T. (2012).  Beyond Spatial Pyramids: Receptive Field Learning for Pooled Image Features. 3370-3377.

Pages