Publications

Found 4228 results
[ Author(Asc)] Title Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
T
Torres, E.., Ibáñez P.., Viñals-Yúfera V.., & J. Llaberia M. (2009).  Store Buffer Design for Multibanked Data Caches. IEEE Transactions on Computers. 58(10), 1307-1320.
Torrent, TT., Baker CF., Czulo O., Ohara K., & Petruck M. R. L. (2020).  Proceedings of the LREC International FrameNet Workshop 2020: Towards a Global, Multilingual FrameNet.
Torrent, T. Timponi, & Ellsworth M. (2013).  Behind the Labels: Criteria for Defining Analytical Categories in FrameNet Brazil. 17(1), 44-65.
Torrent, T. Timponi, Ellsworth M., Baker C. F., & Matos E. Edison da (2018).  The Multilingual FrameNet Shared Annotation Task: a Preliminary Report.
Töpfer, A., Zagordi O., Prabhakaran S., Roth V., Halperin E., & Beerenwinkel N. (2013).  Probabilistic Inference of Viral Quasispecies Subject to Recombination. Journal of Computational Biology. 20(2), 113-123.
Tootoonchian, A., Panda A., Lan C., Walls M., Argyraki K., Ratnasamy S., et al. (2018).  ResQ: Enabling SLOs in Network Function Virtualization. Proceedings of NSDI 2018.
Tootoonchian, A., Gorbunov S., Ganjali Y., Casado M., & Sherwood R. (2012).  On Controller Performance in Software-Defined Networks.
Tomlinson, B., Norton J., Baumer E. P. S., Pufal M., & Raghavan B. (2015).  Self-Obviating Systems and their Application to Sustainability.
Tombros, T., & Crestani F. (1999).  A Study of Users' Perception of Relevance of Spoken Documents.
Tolley, W. J., Kujath B., Khan M. Taha, Vallina-Rodriguez N., & Crandall J. R. (2021).  Blind In/On-Path Attacks and Applications to VPNs. 30th USENIX Security Symposium '21. 3129-3146.
Tiwari, M., Mohan P., Osheroff A., Alkaff H., Shi E., Love E., et al. (2012).  Context-Centric Security.
Titus, A. J., Hamilton K. E., & Holko M. (2023).  Cyber and Information Security in the Bioeconomy. Cyberbiosecurity. 17-36.
Thompson, C.., Levy R.., & Manning C.. (2003).  A Generative Model for Semantic Role Labeling. Proceedings of the 14th European Conference on Machine Learning (ECML 2006). 397-408.
Thomee, B., Borth D., & Bernd J. (2016).  Multimedia COMMONS Workshop 2016 (MMCommons'16): Datasets, Evaluation, and Reproducibility. Proceedings of the 2016 ACM Conference on Multimedia (MM '16). 1485-1486.
Thomee, B., Shamma D. A., Elizalde B. Martinez, Friedland G., Ni K., Poland D., et al. (2015).  YFCC100M: The New Data in Multimedia Research.
Thomee, B., Borth D., & Bernd J. (2016).  Proceedings of the 2016 ACM Workshop on Multimedia COMMONS.
Thomas, K., Grier C., & Paxson V. (2012).  Adapting Social Spam Infrastructure for Political Censorship.
Thomas, K., Grier C., Ma J., Paxson V., & Song D. (2011).  Design and Evaluation of a Real-Time URL Spam Filtering Service. 447-464.
Thomas, K., Iatskiv D., Bursztein E., Pietraszek T., Grier C., & McCoy D. (2014).  Dialing Back Abuse on Phone Veri?ed Accounts.
Thomas, K., McCoy D., Grier C., Kolcz A., & Paxson V. (2013).  Traf?cking Fraudulent Accounts: The Role of the Underground Market in Twitter Spam and Abuse.
Thomas, K., Bursztein E., Jagpal N., Rajab M. Abu, Provos N., Pearce P., et al. (2015).  Ad Injection at Scale: Assessing Deceptive Advertisement Modifications.
Thomas, K., Li F., Grier C., & Paxson V. (2014).  Consequences of Connectivity: Characterizing Account Hijacking on Twitter.
Thomas, K., Grier C., Paxson V., & Song D. (2011).  Suspended Accounts in Retrospect: An Analysis of Twitter Spam.
Thom, A.., & Kramer O. (2010).  Acceleration of DBSCAN-Based Clustering with Reduced Neighborhood Evaluations. 195-202.
Thiem, S., & Lässig J. (2010).  Comparative Study of Different Approaches to Particle Swarm Optimization in Theory and Practice.

Pages