Found 4220 results
Author Title [ Type(Desc)] Year
Technical Report
Luby, M., & Rackoff C. (1989).  A Study of Password Security.
Zlatev, J. (1992).  A Study of Perceptually Grounded Polysemy in a Spatial Microdomain.
Tombros, T., & Crestani F. (1999).  A Study of Users' Perception of Relevance of Spoken Documents.
Karpinski, M., & Rytter W. (1993).  On a Sublinear Time Parallel Construction of Optimal Binary Search Trees.
Liskiewicz, M., & Reischuk R. (1993).  The Sublogarithmic Space World.
Gibbons, P. B., Karp R. M., Miller G. L., & Soroker D. (1989).  Subtree Isomorphism is in Random NC.
Antoniotti, M., & Mishra B. (1995).  The Supervisor Synthesis Problem for Unrestricted CTL is NP-complete.
Jähnichen, S., Gabriel R., Weber M., & Anlauff M. (1989).  Supporting Formal Program Developments: the DEVA Environment.
Bregler, C., & Omohundro S. (1994).  Surface Learning with Applications to Lip-Reading.
Baraldi, A., & Blonda P. (1998).  A Survey of Fuzzy Clustering Algorithms for Pattern Recognition.
Govindan, R., Keshav S., & Verma D. C. (1989).  A Survey of Optical Fibers in Communication.
Partridge, C., Rockwell D.., Allman M., Krishnan R., & Sterbenz J. P. G. (2002).  A Swifter Start for TCP.
Jurafsky, D., Shriberg E., & Biasca D.. (1997).  Switchboard-DAMSL Labeling Project Coder's Manual.
Chang, S. (2002).  A Syllable, Articulatory-Feature, and Stress-Accent Model of Speech Recognition.
Hauenstein, A. (1996).  The Syllable Re-revisited.
Bachrach, J. (1992).  A Symbolic Complexity Analysis of Connectionist Algorithms for Distributed-Memory Machines.
Bretones, C. (2001).  Synaesthetic Metaphors in English.
Feldman, J. (1977).  Synchronizing Distant Cooperating Processes.
Storn, R. (1996).  System Design by Constraint Adaptation and Differential Evolution.
Asanović, K., & Beck J. (1996).  T0 Engineering Data.
Guesgen, H. Werner (1989).  A Tagging Method for Distributed Constraint Satisfaction.
Elizalde, B. Martinez, & Friedland G. (2013).  Taming the Wild: Acoustic Segmentation in Consumer?Produced Videos.
Handley, M., Padhye J., & Floyd S. (1999).  TCP Congestion Window Validation.
Craven, R., Beverly R., & Allman M. (2014).  Techniques for the Detection of Faulty Packet Header Modifications.
Rasti, R., Murthy M., & Paxson V. (2014).  Temporal Lensing and its Application in Pulsing Denial of Service Attacks.