Publications

Found 340 results
Author [ Title(Desc)] Type Year
Filters: First Letter Of Last Name is T  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
C
Tan, Z., Waterman A., Cook H., Bird S., Asanović K., & Patterson D. (2010).  A Case for FAME: FPGA Architecture Model Execution. 290-301.
Afroz, S., Fifield D., Tschantz M. Carl, Paxson V., & Tygar J.D.. (2015).  Censorship Arms Race: Research vs. Practice. Proceedings of the Workshop on Hot Topics in Privacy Enhancing Technologies (HotPETs).
Afroz, S., Fifield D., Tschantz M. Carl, Paxson V., & Tygar J.D.. (2015).  Censorship Arms Race: Research vs. Practice. Proceedings of the Workshop on Hot Topics in Privacy Enhancing Technologies (HotPETs).
Radoslavov, P., Tangmunarunkit H., Yu H., Govindan R., Shenker S. J., & Estrin D. (2000).  On Characterizing Network Topologies and Analyzing Their Impact on Protocol Design.
Singh, R., Nithyanand R., Afroz S., Tschantz M. Carl, Gill P., & Paxson V. (2017).  Characterizing the Nature and Dynamics of Tor Exit Blocking.. Proceedings of USENIX Security 2017.
Yaman, S., Hakkani-Tür D., Tur G., Grishman R., Harper M. P., McKeown K. R., et al. (2009).  Classification-Based Strategies for Combining Multiple 5-W Question Answering Systems. 2703-2706.
Shamir, R., Sharan R., & Tsur D.. (2004).  Cluster Graph Modification Problems.
Caballé, S., Feldman J., & Thaw D. (2009).  CoLPE: Support for Communities of Learning Practice by the Effective Embedding of Information and Knowledge About Group Activity. 113-127.
Yaman, S., Hakkani-Tür D., & Tur G. (2009).  Combining Semantic and Syntactic Information Sources for 5-W Question Answering. 2707-2710.
Zaslavsky, N., Kemp C., Tishby N., & Regier T. (2019).  Communicative need in colour naming. Cognitive Neuropsychology.
Thaw, D., Feldman J., Li J., & Caballé S. (2009).  Communities of Practice Environment (CoPE): Democratic CSCW for Group Production and e-Learning. 65-81.
Medina, A., Taft N., Salamatian K., Bhattacharyya S., & Diot C. (2002).  Comparative Analysis of Traffic Matrix Estimation Methods.
Thiem, S., & Lässig J. (2010).  Comparative Study of Different Approaches to Particle Swarm Optimization in Theory and Practice.
Tantau, T. (2004).  Comparing Verboseness for Finite Automata and Turing Machines. Theory of Computing Systems. 31(1), 95-109.
El-Yaniv, R., Fiat A., Karp R. M., & Turpin G. (1992).  Competitive Analysis of Financial Games.
El-Yaniv, R., Fiat A., Karp R. M., & Turpin G. (1992).  Competitive analysis of financial games. Proceedings 33rd Annual Symposium on Foundations of Computer Science. 327-333.
Gramm, J., Nierhoff T., Sharan R., & Tantau T. (2004).  On the Complexity of Haplotyping via Perfect Phylogeny. Proceedings of the Second RECOMB Satellite Workshop on Computational Methods for SNPs and Haplotypes. 35-46.
Tsai, T.. J., & Janin A. (2013).  Confidence-Based Scoring: A Useful Diagnostic Tool for Detection Tasks.
Thomas, K., Li F., Grier C., & Paxson V. (2014).  Consequences of Connectivity: Characterizing Account Hijacking on Twitter.
Tiwari, M., Mohan P., Osheroff A., Alkaff H., Shi E., Love E., et al. (2012).  Context-Centric Security.
Wijesekera, P., Reardon J., Reyes I., Tsai L., Chen J-W., Good N., et al. (2018).  Contextualizing Privacy Decisions for Better Prediction (and Protection). Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI ’18).
Tootoonchian, A., Gorbunov S., Ganjali Y., Casado M., & Sherwood R. (2012).  On Controller Performance in Software-Defined Networks.
Medina, A., Salamatian K., Taft N., Matta I., Tsang Y., & Diot C. (2003).  On the Convergence of Statistical Techniques for Estimating Network Traffic Demands.
Medina, A., Salamatian K., Taft N., Matta I., Tsang Y., & Diot C. (2003).  On the Convergence of Statistical Techniques for Estimating Network Traffic Demands.
Bertasius, G., Torresani L., Yu S. X., & Shi J. (2016).  Convolutional Random Walk Networks for Semantic Image Segmentation.

Pages