Publications

Found 4192 results
[ Author(Asc)] Title Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
T
Thompson, C.., Levy R.., & Manning C.. (2003).  A Generative Model for Semantic Role Labeling. Proceedings of the 14th European Conference on Machine Learning (ECML 2006). 397-408.
Thomee, B., Shamma D. A., Elizalde B. Martinez, Friedland G., Ni K., Poland D., et al. (2015).  YFCC100M: The New Data in Multimedia Research.
Thomee, B., Borth D., & Bernd J. (2016).  Proceedings of the 2016 ACM Workshop on Multimedia COMMONS.
Thomee, B., Borth D., & Bernd J. (2016).  Multimedia COMMONS Workshop 2016 (MMCommons'16): Datasets, Evaluation, and Reproducibility. Proceedings of the 2016 ACM Conference on Multimedia (MM '16). 1485-1486.
Thomas, K., Iatskiv D., Bursztein E., Pietraszek T., Grier C., & McCoy D. (2014).  Dialing Back Abuse on Phone Veri?ed Accounts.
Thomas, K., McCoy D., Grier C., Kolcz A., & Paxson V. (2013).  Traf?cking Fraudulent Accounts: The Role of the Underground Market in Twitter Spam and Abuse.
Thomas, K., Li F., Grier C., & Paxson V. (2014).  Consequences of Connectivity: Characterizing Account Hijacking on Twitter.
Thomas, K., Bursztein E., Jagpal N., Rajab M. Abu, Provos N., Pearce P., et al. (2015).  Ad Injection at Scale: Assessing Deceptive Advertisement Modifications.
Thomas, K., Grier C., Paxson V., & Song D. (2011).  Suspended Accounts in Retrospect: An Analysis of Twitter Spam.
Thomas, K., Grier C., & Paxson V. (2012).  Adapting Social Spam Infrastructure for Political Censorship.
Thomas, K., Grier C., Ma J., Paxson V., & Song D. (2011).  Design and Evaluation of a Real-Time URL Spam Filtering Service. 447-464.
Thom, A.., & Kramer O. (2010).  Acceleration of DBSCAN-Based Clustering with Reduced Neighborhood Evaluations. 195-202.
Thiem, S., & Lässig J. (2010).  Comparative Study of Different Approaches to Particle Swarm Optimization in Theory and Practice.
Thielscher, M. (1996).  Qualification and Causality.
Thielscher, M. (1996).  Ramification and Causality.
Thiébaux, S., Hertzberg J., Shoaff W., & Schneider M. (1993).  A Stochastic Model of Actions and Plans for Anytime Planning Under Uncertainty.
Thiagarajan, V., & Shapiro V. (2016).  Adaptively Weighted Numerical Integration in the Finite Cell Method. Computer Methods in Applied Mechanics and Engineering. 311, 250-279.
Thiagarajan, V., & Shapiro V. (2018).  Shape Aware Quadratures. Journal of Computational Physics. 374, 1239-1260.
Thaw, D., Feldman J., & Li J. (2008).  CoPE: Democratic CSCW in Support of e-Learning. 481-486.
Thaw, D., Feldman J., Li J., & Caballé S. (2009).  Communities of Practice Environment (CoPE): Democratic CSCW for Group Production and e-Learning. 65-81.
Thaler, D., Handley M., & Estrin D. (2000).  The Internet Multicast Address Allocation Architecture.
Thaler, D., & Handley M. (2000).  On the Aggregatability of Multicast Forwarding State. Proceedings of Infocom 2000.
Tesema, F. B., Awada A., Viering I., Simsek M., & Fettweis G. (2016).  Fast Cell Select for Mobility Robustness in Intra-frequency 5G Ultra Dense Networks. Proceedings of International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC) 2016.
Tesema, F. B., Awada A., Viering I., Simsek M., & Fettweis G. (2017).  Impact of Cyclic Prefix Configuration on Mobility Performance of Multi-Connectivity in 5G Networks. Conference on Standards for Communications and Networking (CSCN) 17.
Tenenbaum, J.. M., Kay A.. C., Binford T.. O., Falk G., Feldman J., Grape G.., et al. (1971).  A Laboratory for Hand-Eye Research. Proceedings of IFIP Congress 71. 1, 206-210.

Pages