Publications

Found 411 results
[ Author(Desc)] Title Type Year
Filters: First Letter Of Last Name is S  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
S
Schnitzspan, P., Fritz M., Roth S., & Schiele B. (2009).  Discriminative Structure Learning of Hierarchical Representations for Object Detection. 2238-2245.
Schnorr, C. P. (1992).  Block Korkin-Zolotarev Bases and Successive Minima.
Schnorr, C. P., & Vaudenay S. (1994).  Black Box Cryptanalysis of Hash Networks Based on Multipermutations.
Scholl, M.., & Voisard A. (2009).  Spatial Operations and Map Operations. 2719-2725.
Scholz, R., & Ziem A. (2013).  Lexikometrie Meets FrameNet. 155-184.
Schomp, K., Rabinovich M., & Allman M. (2016).  Towards a Model of DNS Client Behavior. Proceedings of Passive and Active Measurement Conference (PAM).
Schomp, K., Callahan T., Rabinovich M., & Allman M. (2013).  On Measuring the Client-Side DNS Infrastructure. 77-90.
Schomp, K., Callahan T., Rabinovich M., & Allman M. (2014).  Assessing DNS Vulnerability to Record Injection.
Schomp, K., Allman M., & Rabinovich M. (2014).  DNS Resolvers Considered Harmful.
Schröder-Preikschat, W. (1993).  Design Principles of Parallel Operating Systems: ?A PEACE Case Study?.
Schryen, G., & Kadura R.. (2009).  Open Source vs. Closed Source Software: Towards Measuring Security. 2016-2023.
Schryen, G. (2009).  Security of Open Source and Closed Source Software: An Empirical Comparison of Published Vulnerabilities.
Schryen, G. (2009).  A Comprehensive and Comparative Analysis of the Patching Behavior of Open Source and Closed Source Software Vendors. 153-168.
Schryen, G. (2008).  Practical Security of Large-scale Elections: An Exploratory Case Study of Internet Voting in Estonia. 37-50.
Schuett, D.., Eckhardt U.., & Suda P.. (1992).  Boot Algebras.
Schulz, P., Ong L., Littlewood P., Abdullah B., Simsek M., & Fettweis G. (2019).  End-to-End Latency Analysis in Wireless Networks with Queing Models for General Prioritized Traffic. Proceedings of the IEEE International Conference on Communications 2019.
Schulz, P., Matthé M., Klessig H., Simsek M., Fettweis G., Ansari J., et al. (2017).  Latency Critical IoT Applications in 5G: Perspective on the Design of Radio Interface and Network Architecture. IEEE Communications Magazine. 55(2), 
Schumacher, A., Pireddu L., Niemenmaa M., Kallio A., Korpelainen E., Zanetti G., et al. (2014).  SeqPig: Simple and Scalable Scripting for Large Sequencing Data Sets in Hadoop. Bioinformatics. 30(1), 119-120.
Schwarm, S.., Bulyko I., & Ostendorf M. (2004).  Adaptive Language Modeling with Varied Sources to Cover New Vocabulary Items. IEEE Transactions on Speech and Audio Processing. 12(3), 334-342.
Schwarz, C., Teich J., Welzl E., & Evans B. (1994).  On Finding a Minimal Enclosing Parallelgram.
Schwenk, H.. (1999).  Using Boosting to Improve a Hybrid HMM/Neural Network Speech Recognizer. Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP 1999).
Scott, J., & Karp R. M. (2004).  Achieving Fairness Through Selective Early Dropping.
Scott, J., Ideker T. E., Karp R. M., & Sharan R. (2005).  Efficient Algorithms for Detecting Signaling Pathways in Protein Interaction Networks. Proceedings of the 9th Annual International Conference on Research in Computational Molecular Biology (RECOMB'05). 133-144.
Scott, C., Wundsam A., Raghavan B., Liu Z., Whitlock S., El-Hassany A., et al. (2014).  Troubleshooting Blackbox SDN Control Software with Minimal Causal Sequences. 395-406.
Scott, C., Wundsam A., Whitlock S., Or A., Huang E., Zarifis K., et al. (2013).  How Did We Get Into This Mess? Isolating Fault-Inducing Inputs to SDN Control Software.

Pages