Publications

Found 4258 results
Author [ Title(Desc)] Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
C
Amaro, E., Branner-Augmon C., Luo Z., Ousterhout A., Aguilera M. K., Panda A., et al. (2020).  Can far memory improve job throughput?. EuroSys '20: Proceedings of the Fifteenth European Conference on Computer Systems. 1-16.
Lv, Q., Ratnasamy S., & Shenker S. J. (2002).  Can Heterogeneity Make Gnutella Scalable?. 94-103.
Chen, G., Davis D., Krause M., Aivaloglou E., Hauff C., & Houben G-J. (2016).  Can Learners be Earners? Investigating a Design to Enable MOOC Learners to Apply their Skills and Earn Money in an Online Market Place. IEEE Transactions on Learning Technologies.
Ouyang, T., Ray S., Rabinovich M., & Allman M. (2011).  Can Network Characteristics Detect Spam Effectively in a Stand-Alone Enterprise?.
Hermansky, H., & Morgan N. (1993).  A Can of RASTA Worms. Proceedings of the Speech Research Symposium XIII, Johns Hopkins University. 343-350.
Shriberg, E., Stolcke A., & Baron D. (2001).  Can Prosody Aid the Automatic Processing of Multi-Party Meetings? Evidence from Predicting Punctuation, Disfluencies, and Overlapping Speech. Proceedings of the ISCA Tutorial and Research Workshop on Prosody in Speech Recognition and Understanding.
Argyraki, K., Baset S., Chun B-G., Fall K., Iannaccone G., Knies A., et al. (2008).  Can Software Routers Scale?.
Friedland, G., Knipping L., Hürst W., & Muhlhauser M.. (2009).  Can We Escape the Trough of Disillusionment?--A Perspective on E-learning Technology Research from the ACM Workshop on Educational Multimedia and Multimedia Education. ACM E-Learn Journal.
Pan, V. (1992).  Can We Utilize the Cancellation of the Most Significant Digits?.
Panda, A., Scott C., Ghodsi A., Koponen T., & Shenker S. J. (2013).  CAP for Networks. 91-96.
Rückert, U. (2009).  Capacity Control for Partially Ordered Feature Sets. 318-333.
Feldman, J., Hayhoe M.., & Lachter J.. (1991).  Capacity Limitations in the Integration of Information Across Saccades.
Hopfgartner, F. (2011).  Capturing Long-Term User Interests in Online Television News Program.
Elizalde, B. Martinez, Lei H., Friedland G., & Peters N. (2013).  Capturing the Acoustic Scene Characteristics for Audio Scene Detection.
Oliner, A. J., Iyer A. P., Lagerspetz E., Stoica I., & Tarkoma S. (2012).  Carat: Collaborative Energy Bug Detection.
Guz, U., Tur G., Hakkani-Tür D., & Cuendet S. (2010).  Cascaded Model Adaptation for Dialog Act Segmentation and Tagging. Journal of Computer Speech and Language. 24(2), 289-306.
Akkus, I. Ekin, & Weaver N. (2015).  The Case for a General and Interaction-Based Third-Party Cookie Policy.
Shriberg, E., & Stolcke A. (2008).  The Case for Automatic Higher-Level Features in Forensic Speaker Recognition. 1509-1512.
Fillmore, C. J. (1968).  The Case for Case. 1-88.
Fillmore, C. J. (1977).  The Case for Case Reopened. 59-81.
Tan, Z., Waterman A., Cook H., Bird S., Asanović K., & Patterson D. (2010).  A Case for FAME: FPGA Architecture Model Execution. 290-301.
Batten, C., Aoki H.., & Asanović K. (2008).  The Case for Malleable Stream Architectures.
Vo, H., Lee Y., Waterman A., & Asanović K. (2013).  A Case for OS-Friendly Hardware Accelerators.
Ousterhout, K., Panda A., Rosen J., Venkataraman S., Xin R., Ratnasamy S., et al. (2013).  The Case for Tiny Tasks in Compute Clusters. 1-6.
Chawathe, Y., Ramabhadran S., Ratnasamy S., LaMarca A., Shenker S. J., & Hellerstein J. M. (2005).  A Case Study in Building Layered DHT Applications. Proceedings of ACM Special Interest Group on Data Communications Conference (SIGCOMM 2005). 97-108.

Pages