Found 4190 results
[ Author(Desc)] Title Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
Thielscher, M. (1996).  Ramification and Causality.
Thielscher, M. (1996).  Qualification and Causality.
Thiem, S., & Lässig J. (2010).  Comparative Study of Different Approaches to Particle Swarm Optimization in Theory and Practice.
Thom, A.., & Kramer O. (2010).  Acceleration of DBSCAN-Based Clustering with Reduced Neighborhood Evaluations. 195-202.
Thomas, K., Iatskiv D., Bursztein E., Pietraszek T., Grier C., & McCoy D. (2014).  Dialing Back Abuse on Phone Veri?ed Accounts.
Thomas, K., McCoy D., Grier C., Kolcz A., & Paxson V. (2013).  Traf?cking Fraudulent Accounts: The Role of the Underground Market in Twitter Spam and Abuse.
Thomas, K., Bursztein E., Jagpal N., Rajab M. Abu, Provos N., Pearce P., et al. (2015).  Ad Injection at Scale: Assessing Deceptive Advertisement Modifications.
Thomas, K., Li F., Grier C., & Paxson V. (2014).  Consequences of Connectivity: Characterizing Account Hijacking on Twitter.
Thomas, K., Grier C., Paxson V., & Song D. (2011).  Suspended Accounts in Retrospect: An Analysis of Twitter Spam.
Thomas, K., Grier C., & Paxson V. (2012).  Adapting Social Spam Infrastructure for Political Censorship.
Thomas, K., Grier C., Ma J., Paxson V., & Song D. (2011).  Design and Evaluation of a Real-Time URL Spam Filtering Service. 447-464.
Thomee, B., Shamma D. A., Elizalde B. Martinez, Friedland G., Ni K., Poland D., et al. (2015).  YFCC100M: The New Data in Multimedia Research.
Thomee, B., Borth D., & Bernd J. (2016).  Proceedings of the 2016 ACM Workshop on Multimedia COMMONS.
Thomee, B., Borth D., & Bernd J. (2016).  Multimedia COMMONS Workshop 2016 (MMCommons'16): Datasets, Evaluation, and Reproducibility. Proceedings of the 2016 ACM Conference on Multimedia (MM '16). 1485-1486.
Thompson, C.., Levy R.., & Manning C.. (2003).  A Generative Model for Semantic Role Labeling. Proceedings of the 14th European Conference on Machine Learning (ECML 2006). 397-408.
Tiwari, M., Mohan P., Osheroff A., Alkaff H., Shi E., Love E., et al. (2012).  Context-Centric Security.
Tolley, W. J., Kujath B., Khan M. Taha, Vallina-Rodriguez N., & Crandall J. R. (2021).  Blind In/On-Path Attacks and Applications to VPNs. 30th USENIX Security Symposium '21. 3129-3146.
Tombros, T., & Crestani F. (1999).  A Study of Users' Perception of Relevance of Spoken Documents.
Tomlinson, B., Norton J., Baumer E. P. S., Pufal M., & Raghavan B. (2015).  Self-Obviating Systems and their Application to Sustainability.
Tootoonchian, A., Panda A., Lan C., Walls M., Argyraki K., Ratnasamy S., et al. (2018).  ResQ: Enabling SLOs in Network Function Virtualization. Proceedings of NSDI 2018.
Tootoonchian, A., Gorbunov S., Ganjali Y., Casado M., & Sherwood R. (2012).  On Controller Performance in Software-Defined Networks.
Töpfer, A., Zagordi O., Prabhakaran S., Roth V., Halperin E., & Beerenwinkel N. (2013).  Probabilistic Inference of Viral Quasispecies Subject to Recombination. Journal of Computational Biology. 20(2), 113-123.
Torrent, T. Timponi, & Ellsworth M. (2013).  Behind the Labels: Criteria for Defining Analytical Categories in FrameNet Brazil. 17(1), 44-65.
Torrent, T. Timponi, Ellsworth M., Baker C. F., & Matos E. Edison da (2018).  The Multilingual FrameNet Shared Annotation Task: a Preliminary Report.
Torrent, TT., Baker CF., Czulo O., Ohara K., & Petruck M. R. L. (2020).  Proceedings of the LREC International FrameNet Workshop 2020: Towards a Global, Multilingual FrameNet.