Found 410 results
Author Title Type [ Year(Asc)]
Filters: First Letter Of Title is C  [Clear All Filters]
Oliner, A. J., Iyer A. P., Lagerspetz E., Stoica I., & Tarkoma S. (2012).  Carat: Collaborative Energy Bug Detection.
Bachrach, J., Vo H., Richards B., Lee Y., Waterman A., Avižienis R., et al. (2012).  Chisel: Constructing Hardware in a Scala Embedded Language.
Kay, P., & Sag I. A. (2012).  Cleaning up the Big Mess: Discontinuous Dependencies and Complex Determiners.
Martignoni, L., Poosankam P., Zaharia M., Han J., McCamant S., Song D., et al. (2012).  Cloud Terminal: Secure Access to Sensitive Applications from Untrusted Systems. 165-176.
Wang, Z., Hormozdiari F., Yang W-Y., Halperin E., & Eskin E. (2012).  CNVeM: Copy Number Variation Detection Using Uncertainty of Read Mapping. 326-340.
Slager, S.. L., Skibola C. F., & Halperin E. (2012).  Common Variation at 6p21.31 (BAK1) Influences the Risk of Chronic Lymphocytic Leukemia. Blood. 120(4), 843-846.
Kirkpatrick, B., Reshef Y., Finucane H., Jiang H., Zhu B., & Karp R. M. (2012).  Comparing Pedigree Graphs. Journal of Computational Biology. 19(9), 998-1014.
Lönneker-Rodman, B., & Narayanan S. (2012).  Computational Models of Figurative Language.
de Melo, G., & Weikum G. (2012).  Constructing and Utilizing Wordnets using Statistical Methods. Journal of Language Resources and Evaluation. 46(2), 287-311.
Janin, A., Friedland G., & Sommer R. (2012).  Content?based Privacy for Consumer?Produced Multimedia.
Tiwari, M., Mohan P., Osheroff A., Alkaff H., Shi E., Love E., et al. (2012).  Context-Centric Security.
Tootoonchian, A., Gorbunov S., Ganjali Y., Casado M., & Sherwood R. (2012).  On Controller Performance in Software-Defined Networks.
Bansal, M., & Klein D. (2012).  Coreference Semantics from Web Features.
Boehme, R., & Kirchner M. (2012).  Counter-Forensics: Attacking Image Forensics. 327-366.
Luque, C., Moretó M., Cazorla F. J., Gioiosa R., Buyuktosunoglu A., & Valero M. (2012).  CPU Accounting for Multicore Processors. IEEE Transactions on Computers. Vol. 61.
Friedland, G. (2012).  Cybercasing the Joint: Language Technologies, Multimedia Retrieval, and Online Privacy.