Publications

Found 96 results
[ Author(Desc)] Title Type Year
Filters: First Letter Of Title is O  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
S
Scheffczyk, J., Baker C. F., & Narayanan S. (2006).  Ontology-Based Reasoning about Lexical Resources. Proceedings of the Workshop on Interfacing Ontologies and Lexical Resources for Semantic Web Technologies (OntoLex 2006). 1-8.
Schryen, G., & Kadura R.. (2009).  Open Source vs. Closed Source Software: Towards Measuring Security. 2016-2023.
Shamir, R., & Sharan R. (2004).  Optimal Fully Dynamic Algorithms for Cograph Recognition. 329-340.
Shenker, S. J., McKeown N., Anderson T., Balakrishnan H., Parulkar G., Peterson L., et al. (2008).  OpenFlow: enabling innovation in campus networks. ACM SIGCOMM Computer Communication Review . 38(2), 71.
Shenker, S. J., & Weinrib A. (1989).  The Optimal Control of Heterogeneous Queuing Systems: A Paradigm for Load-Sharing and Routing. IEEE Transactions of Computers. 38(12), 1724-1735.
Shriberg, E., Stolcke A., & Baron D. (2001).  Observations on Overlap: Findings and Implications for Automatic Processing of Multi-Party Conversation. Proceedings of the 7th European Conference on Speech Communication and Technology (Eurospeech 2001).
Sommer, R., & Paxson V. (2010).  Outside the Closed World: On Using Machine Learning for Network Intrusion Detection. 305-316.
Stribling, J., Councill I. G., Li J., M. Kaashoek F., Karger D.. R., Morris R., et al. (2005).  OverCite: A Cooperative Digital Research Library. Proceedings of the Fourth International Workshop on Peer-to-Peer Systems (IPTPS05). 69-79.
W
Wijesekera, P., Razaghpanah A., Reardon J., Reyes I., Vallina-Rodriguez N., Egelman S., et al. (2017).  “Is Our Children’s Apps Learning?” Automatically Detecting COPPA Violations. Proceedings of the Workshop on Technology and Consumer Protection (ConPro ’17).

Pages