Found 183 results
[ Author(Asc)] Title Type Year
Filters: First Letter Of Last Name is L  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
Lindfors, E., Gopalacharyulu P. V., Halperin E., & Orešič M. (2009).  Detection of Molecular Paths Associated with Insulitis and Type 1 Diabetes in Non-Obese Diabetic Mouse. PLoS ONE. 4(10), 
Lin, H.., Amanatidis C.., Sideri M.., Karp R. M., & Papadimitriou C. H. (2008).  Linked Decomposition of Networks and the Power of Choice in Polya Urns. Proceedings of ACM-SIAM Symposium on Discrete Algorithms (SODA 2008). 993-1002.
Lim, C-C., & Stolcke A. (1991).  Sather Language Design and Performance Evaluation.
Lim, C-C. (1993).  A Parallel Object-Oriented System for Realizing Reusable and Efficient Data Abstractions.
Liebeherr, J., Wrege D. E., & Ferrari D. (1994).  Admission Control in Networks with Bounded Delay Services.
Liebeherr, J., & Wrege D. E. (1994).  Design and Analysis of a High-Performance Packet Multiplexer for Multiservice Networks with Delay Guarantees.
Lickteig, T. Michael (1990).  On Semi-Algebraic Decision Complexity.
Liao, Y., & Moody J. (2000).  Constructing Heterogeneous Committees via Input Feature Grouping. 12,
Liao, Y., Moody J., & Wu L. (2002).  Neural Networks for Time Series Analysis.
Liao, Y., & Moody J. (1996).  A Neural Network Visualization and Sensitivity Analysis Toolkit. Proceedings of the International Conference on Neural Information Processing. 1069-1074.
Li, Z., Atre R., Huda Z. Ul, Jannesari A., & Wolf F. (2016).  Unveiling Parallelization Opportunities in Sequential Programs. Journal of Systems and Software. 117, 282–295.
Li, M. (2003).  SchemaDB - An Extensible Schema Database System Using ECG Representation.
Li, F., Ho G., Kuan E., Niu Y., Ballard L., Thomas K., et al. (2016).  Remedying Web Hijacking: Notification Effectiveness and Webmaster Comprehension. Proceedings of the International World Wide Web Conference.
Li, Z., Goyal A., Chen Y., & Paxson V. (2011).  Towards Situational Awareness of Large-Scale Botnet Probing Events. IEEE Transactions on Information Forensics and Security. 6(1), 175-188.
Li, F., Shin R., & Paxson V. (2015).  Exploring Privacy Preservation in Outsourced K-Nearest Neighbors with Multiple Data Owners. Proceedings of ACM Cloud Computing Security Workshop.
Li, Z., Goyal A., Chen Y., & Paxson V. (2009).  Automating Analysis of Large-Scale Botnet Probing Events. 11-22.
Li, F., Durumeric Z., Czyz J., Karami M., Bailey M., McCoy D., et al. (2016).  You’ve Got Vulnerability: Exploring Effective Vulnerability Notifications. Proceedings of the 25th USENIX Security Symposium.
Li, F.., & Paxson V.. (2018).   A Large-Scale Empirical Study of Security Patches. USENIX ;login:. 43(1), 
Li, H., Ghodsi A., Zaharia M., Shenker S., & Stoica I. (2014).  Reliable, Memory Speed Storage for Cluster Computing Frameworks.
Levit, M., Boschee E.., & Freedman M. (2007).  Selecting On-topic Sentences from Natural Language Corpora. Proceedings of the 8th Annual Conference of the International Speech Communication Association (Interspeech 2007). 2793-2796.
Levit, M., Hakkani-Tür D., Tur G., & Gillick D. (2009).  IXIR: A Statistical Information Distillation System. Journal of Computer Speech and Language. 23(4), 527-542.
Levit, M., & Roy D.. (2007).  Interpretation of Spatial Language in a Map Navigation Task. IEEE Transactions on Systems. 37(3), 667-679.
Levis, P., Patel N., Culler D. E., & Shenker S. (2004).  Trickle: A Self-Regulation Algorithm for Code Propogation and Maintenance in Wireless Sensor Networks. Proceedings of the First USENIX Symposium on Networked Systems Design and Implementation (NSDI '04). 15-28.
Levis, P., Brewer E., Culler D. E., Gay D., Madden S., Patel N., et al. (2008).  The Emergence of a Networking Primitive in Wireless Sensor Networks. Communications of the ACM. 51(7), 99-106.
Levine, S., Finn C., Darrell T., & Abbeel P. (2016).  End-to-end training of deep visuomotor policies. Journal of Machine Learning Research. 17, 1–40.