Publications

Found 1845 results
Author [ Title(Desc)] Type Year
Filters: First Letter Of Last Name is S  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
A
Jansen, T., & Sudholt D. (2010).  Analysis of an Asymmetric Mutation Operator. Evolutionary Computation. 18(1), 1-26.
Sudholt, D., & Zarges C. (2010).  Analysis of an Iterated Local Search Algorithm for Vertex Coloring.
Marczak, B., Weaver N., Dalek J., Ensafi R., Fifield D., McKune S., et al. (2015).  An Analysis of China’s “Great Cannon”. Proceedings of the USENIX Workshop on Free and Open Communications on the Internet (FOCI).
Friedrich, T., Oliveto P.. S., Sudholt D., & Witt C. (2009).  Analysis of Diversity-Preserving Mechanisms for Global Exploration. Evolutionary Computation. 17(4), 455-476.
Vasudeva, K., Simsek M., & López-Pérez D. (2017).  Analysis of Handover Failures in Heterogeneous Networks With Fading. IEEE Transactions on Vehicular Technology. 66(7), 
Luby, M., Mitzenmacher M., M. Shokrollahi A., & Spielman D. A. (1997).  Analysis of Low Density Codes and Improved Designs Using Irregular Graphs.
Luby, M., Mitzenmacher M., M. Shokrollahi A., & Spielman D. A. (1997).  Analysis of Low Density Codes and Improved Designs Using Irregular Graphs.
Luby, M., Mitzenmacher M., & M. Shokrollahi A. (1997).  Analysis of Random Processes via And-Or Tree Evaluation.
Cuendet, S., Shriberg E., Favre B., Fung J., & Hakkani-Tür D. (2007).  An Analysis of Sentence Segmentation Features for Broadcast News, Broadcast Conversations, and Meetings. 43-59.
Stoutamire, D., Zimmermann W., & Trapp M. (1996).  An Analysis of the Divergence of Two Sather Dialects.
Ikram, M., Vallina-Rodriguez N., Seneviratne S., Kaafar M. Ali, & Paxson V. (2016).  An Analysis of the Privacy and Security Risks of Android VPN Permission-enabled Apps. Proceedings of ACM Internet Measurement Conference.
Eklund, R., Bates R., Kuyper C., Willingham E., & Shriberg E. (2006).  The Annotation and Analysis of Importance in Meetings.
Sinha, S. (2008).  Answering Questions about Complex Events.
Horoba, C., & Sudholt D. (2010).  Ant Colony Optimization for Stochastic Shortest Path Problems. 1465-1472.
Ferrer, L., Sönmez K., & Shriberg E. (2009).  An Anticorrelation Kernel for Subsystem Training in Multiple Classifier Systems. Journal of Machine Learning Research. 10, 2079-2114.
Ferrer, L., Sönmez K., & Shriberg E. (2009).  An Anticorrelation Kernel for Subsystem Training in Multiple Classifier Systems. Journal of Machine Learning Research. 10, 2079-2114.
Zaharia, M., Xin R. S., Wendell P., Das T., Armbrust M., Dave A., et al. (2016).  Apache Spark: a unified engine for big data processing. Communications of the ACM. 59(11), 56-65.
Zaharia, M., Xin R. S., Wendell P., Das T., Armbrust M., Dave A., et al. (2016).  Apache Spark: a unified engine for big data processing. Communications of the ACM. 59(11), 56-65.
Haban, D., & Shin K. G. (1989).  Application of Real-Time Monitoring to Scheduling Tasks with Random.
Ratnasamy, S., Handley M., Karp R. M., & Shenker S. (2001).  Application-Level Multicast Using Content-Addressable Networks. 2233, 14-29.
Tavakoli, A., Casado M., Koponen T., & Shenker S. (2009).  Applying NOX to the Datacenter.
Hößler, T., Scheuvens L., Franchi N., Simsek M., & Fettweis G. (2017).  Applying Reliability Theory for Future Wireless Communication Networks. Proceedings of the IEEE International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC) 17.
Hößler, T., Scheuvens L., Franchi N., Simsek M., & Fettweis G. (2017).  Applying Reliability Theory for Future Wireless Communication Networks. Proceedings of the IEEE International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC) 17.
Pan, R., Prabhakar B., Breslau L., & Shenker S. (2003).  Approximate Fair Allocation of Link Bandwidth. 36-43.
Pan, R., Breslau L., Prabhakar B., & Shenker S. (2003).  Approximate Fairness Through Differential Dropping. ACM SIGCOMM Computer Communication Review. 33(2), 23-39.

Pages